Open ghost opened 9 years ago
Access violation, can be anything.
Just build it as a debug (not Final) and when something like that happens, you will see names of the functions on call stack, something like this:
jampgamex86.dll(Cmd_Ignore_f+0x40) [0x202762D0] jampgamex86.dll(ClientCommand+0x7FB) [0x2026D52B] jampgamex86.dll(vmMain+0xE1) [0x202BE361]
2015-10-12 20:08 GMT+02:00 sithjka notifications@github.com:
Any ideas?
[url] https://www.dropbox.com/s/p53p3vni89vwig5/crash_log_2015-10-12_19-49-38.log?dl=0[/url]
— Reply to this email directly or view it on GitHub https://github.com/TheSil/base_enhanced/issues/128.
Of course with my luck, the crash disappears for weeks, and then as soon as I start building Final again, it happens again.
Here was the crash log from yesterday.
Shares some similarities with Sith's.
-----------------------------------
Register Dump
-----------------------------------
General Purpose & Control Registers:
EAX: 0x00000000, EBX: 0x00000000, ECX: 0x00000000
EDX: 0x00000000, EBP: 0xFFFFFFFF, EDI: 0x01666608
EIP: 0x00447A8C, ESI: 0x038EA838, ESP: 0x0018F824
Segment Registers:
CS: 0x00000023, DS: 0x0000002B, ES: 0x0000002B
FS: 0x00000053, GS: 0x0000002B, SS: 0x0000002B
-----------------------------------
Call Stack Trace
-----------------------------------
jampDed.exe [0x447A8C]
jampDed.exe [0x44B3D2]
jampDed.exe [0x43EDEA]
jampgamex86.dll(vmMain+0xE16C) [0x20072D9C]
jampgamex86.dll(dllEntry+0x43A8D) [0x200BEF4D]
jampgamex86.dll(dllEntry+0x43C5A) [0x200BF11A]
jampgamex86.dll(dllEntry+0x3CE58) [0x200B8318]
jampgamex86.dll(dllEntry+0x3CA7F) [0x200B7F3F]
jampgamex86.dll(dllEntry+0x3C21B) [0x200B76DB]
jampgamex86.dll(dllEntry+0x1CBEE) [0x200980AE]
jampgamex86.dll(dllEntry+0x1D72D) [0x20098BED]
jampgamex86.dll [0x20064285]
jampgamex86.dll [0x20063F30]
jampgamex86.dll(vmMain+0xA4) [0x20064CD4]
jampDed.exe [0x4226FF]
jampDed.exe [0x44C751]
jampDed.exe [0x411E0D]
kernel32.dll(BaseThreadInitThunk+0x12) [0x770D337A]
ntdll.dll(RtlInitializeExceptionChain+0x63) [0x77609882]
ntdll.dll(RtlInitializeExceptionChain+0x36) [0x77609855]
Got crash again; luckily it was on debug compile. Here it is:
Process File Name: E:\UserFiles\STANISLAW\GameServers\TC65283561160275672083286\GameData\jampDed.exe
Module File Name: OJK633B.tmp
Exception Code: 0xC0000005 (Access Violation)
Exception Address: 0x204CCB9D (OJK633B.tmp+0x4CCB9D)
-----------------------------------
Register Dump
-----------------------------------
General Purpose & Control Registers:
EAX: 0x00000000, EBX: 0x00000000, ECX: 0x20DD7A00
EDX: 0x00017F80, EBP: 0x0072ECCC, EDI: 0x0072ECCC
EIP: 0x204CCB9D, ESI: 0x00000008, ESP: 0x0072EBA8
Segment Registers:
CS: 0x00000023, DS: 0x0000002B, ES: 0x0000002B
FS: 0x00000053, GS: 0x0000002B, SS: 0x0000002B
-----------------------------------
Call Stack Trace
-----------------------------------
OJK633B.tmp(dllEntry+0x2DF1E1) [0x204CCB9D]
OJK633B.tmp(dllEntry+0x2EB44B) [0x204D8E07]
OJK633B.tmp(dllEntry+0x2EF0C9) [0x204DCA85]
OJK633B.tmp(dllEntry+0xFDB26) [0x202EB4E2]
OJK633B.tmp(dllEntry+0x1007E8) [0x202EE1A4]
jampDed.exe [0x567A9]
jampDed.exe [0x74E9A]
jampDed.exe [0x7118F]
jampDed.exe [0x3FE77]
jampDed.exe [0x9E05F]
jampDed.exe [0xC92F7]
kernel32.dll(BaseThreadInitThunk+0x12) [0x75A5337A]
ntdll.dll(RtlInitializeExceptionChain+0x63) [0x77AD9882]
ntdll.dll(RtlInitializeExceptionChain+0x36) [0x77AD9855]
Any ideas?
https://www.dropbox.com/s/p53p3vni89vwig5/crash_log_2015-10-12_19-49-38.log?dl=0