TheSil / base_enhanced

sil's base_enhanced server mod
3 stars 4 forks source link

JKA base_enhanced Crash Log #128

Open ghost opened 9 years ago

ghost commented 9 years ago

Any ideas?

https://www.dropbox.com/s/p53p3vni89vwig5/crash_log_2015-10-12_19-49-38.log?dl=0

TheSil commented 9 years ago

Access violation, can be anything.

Just build it as a debug (not Final) and when something like that happens, you will see names of the functions on call stack, something like this:

jampgamex86.dll(Cmd_Ignore_f+0x40) [0x202762D0] jampgamex86.dll(ClientCommand+0x7FB) [0x2026D52B] jampgamex86.dll(vmMain+0xE1) [0x202BE361]

2015-10-12 20:08 GMT+02:00 sithjka notifications@github.com:

Any ideas?

[url] https://www.dropbox.com/s/p53p3vni89vwig5/crash_log_2015-10-12_19-49-38.log?dl=0[/url]

— Reply to this email directly or view it on GitHub https://github.com/TheSil/base_enhanced/issues/128.

deathsythe47 commented 9 years ago

Of course with my luck, the crash disappears for weeks, and then as soon as I start building Final again, it happens again.

Here was the crash log from yesterday.

Shares some similarities with Sith's.

-----------------------------------
           Register Dump           
-----------------------------------
General Purpose & Control Registers:
EAX: 0x00000000, EBX: 0x00000000, ECX: 0x00000000
EDX: 0x00000000, EBP: 0xFFFFFFFF, EDI: 0x01666608
EIP: 0x00447A8C, ESI: 0x038EA838, ESP: 0x0018F824

Segment Registers:
CS: 0x00000023, DS: 0x0000002B, ES: 0x0000002B
FS: 0x00000053, GS: 0x0000002B, SS: 0x0000002B

-----------------------------------
          Call Stack Trace           
-----------------------------------
jampDed.exe [0x447A8C]
jampDed.exe [0x44B3D2]
jampDed.exe [0x43EDEA]
jampgamex86.dll(vmMain+0xE16C) [0x20072D9C]
jampgamex86.dll(dllEntry+0x43A8D) [0x200BEF4D]
jampgamex86.dll(dllEntry+0x43C5A) [0x200BF11A]
jampgamex86.dll(dllEntry+0x3CE58) [0x200B8318]
jampgamex86.dll(dllEntry+0x3CA7F) [0x200B7F3F]
jampgamex86.dll(dllEntry+0x3C21B) [0x200B76DB]
jampgamex86.dll(dllEntry+0x1CBEE) [0x200980AE]
jampgamex86.dll(dllEntry+0x1D72D) [0x20098BED]
jampgamex86.dll [0x20064285]
jampgamex86.dll [0x20063F30]
jampgamex86.dll(vmMain+0xA4) [0x20064CD4]
jampDed.exe [0x4226FF]
jampDed.exe [0x44C751]
jampDed.exe [0x411E0D]
kernel32.dll(BaseThreadInitThunk+0x12) [0x770D337A]
ntdll.dll(RtlInitializeExceptionChain+0x63) [0x77609882]
ntdll.dll(RtlInitializeExceptionChain+0x36) [0x77609855]
deathsythe47 commented 9 years ago

Got crash again; luckily it was on debug compile. Here it is:

Process File Name: E:\UserFiles\STANISLAW\GameServers\TC65283561160275672083286\GameData\jampDed.exe
Module File Name: OJK633B.tmp
Exception Code: 0xC0000005 (Access Violation)
Exception Address: 0x204CCB9D (OJK633B.tmp+0x4CCB9D)

-----------------------------------
           Register Dump           
-----------------------------------
General Purpose & Control Registers:
EAX: 0x00000000, EBX: 0x00000000, ECX: 0x20DD7A00
EDX: 0x00017F80, EBP: 0x0072ECCC, EDI: 0x0072ECCC
EIP: 0x204CCB9D, ESI: 0x00000008, ESP: 0x0072EBA8

Segment Registers:
CS: 0x00000023, DS: 0x0000002B, ES: 0x0000002B
FS: 0x00000053, GS: 0x0000002B, SS: 0x0000002B

-----------------------------------
          Call Stack Trace           
-----------------------------------
OJK633B.tmp(dllEntry+0x2DF1E1) [0x204CCB9D]
OJK633B.tmp(dllEntry+0x2EB44B) [0x204D8E07]
OJK633B.tmp(dllEntry+0x2EF0C9) [0x204DCA85]
OJK633B.tmp(dllEntry+0xFDB26) [0x202EB4E2]
OJK633B.tmp(dllEntry+0x1007E8) [0x202EE1A4]
jampDed.exe [0x567A9]
jampDed.exe [0x74E9A]
jampDed.exe [0x7118F]
jampDed.exe [0x3FE77]
jampDed.exe [0x9E05F]
jampDed.exe [0xC92F7]
kernel32.dll(BaseThreadInitThunk+0x12) [0x75A5337A]
ntdll.dll(RtlInitializeExceptionChain+0x63) [0x77AD9882]
ntdll.dll(RtlInitializeExceptionChain+0x36) [0x77AD9855]