[cut]Revision: PhantomCore Rev: * Release Hash: * (Win32,little-endian)
Date 22:7:2010. Time 21:40
//=====================================================
*** Hardware ***
Processor: Intel® Pentium® 4 CPU 3.00GHz
Number Of Processors: 2
Physical Memory: 3134892 KB (Available: 2000292 KB)
Commit Charge Limit: 4194303 KB *** Operation System ***
Microsoft Windows XP Professional Service Pack 3 (Version 5.1, Build 2600)
//=====================================================
Exception code: C0000005 ACCESS_VIOLATION
Fault address: 00776CCF 01:00375CCF C:\ServerWoW\ÿäðî\PhantomCore.exe
Registers:
EAX:00000000
EBX:15302D08
ECX:00000000
EDX:00000000
ESI:000DBB71
EDI:00C5A910
CS:EIP: 001B:00776CCF
SS:ESP:0023:0FAEF980 EBP:0FAEF9D4
DS:0023 ES:0023 FS:003B GS:0000
Flags:00010212
Call stack:
Address Frame Function SourceFile
00776CCF 00000000 0001:00375CCF C:\ServerWoW\ÿäðî\PhantomCore.exe
009769D0 00000000 0001:005759D0 C:\ServerWoW\ÿäðî\PhantomCore.exe
00568971 00000000 0001:00167971 C:\ServerWoW\ÿäðî\PhantomCore.exe
005A08F3 00000000 0001:0019F8F3 C:\ServerWoW\ÿäðî\PhantomCore.exe
0059E973 00000000 0001:0019D973 C:\ServerWoW\ÿäðî\PhantomCore.exe
0040854E 00000000 0001:0000754E C:\ServerWoW\ÿäðî\PhantomCore.exe
00C5A929 00000000 0001:00859929 C:\ServerWoW\ÿäðî\PhantomCore.exe
00FA1614 00000000 ?invoke@ACE_OS_Thread_Adapter@@UAEKXZ+74
78543433 00000000 _endthreadex+44
785434C7 00000000 _endthreadex+D8
7C80B729 00000000 GetModuleFileNameA+1BA
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
7C802542 00000000 WaitForSingleObject+12
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
7C802542 00000000 WaitForSingleObject+12
00F9EB4D 00000000 ?cond_wait@ACE_OS@@YAHPAVACE_cond_t@@PAU_RTL_CRITICAL_SECTION@@@Z+3D
8B000000 FFFFFFFF 0000:00000000
180D8B68 00000000 0000:00000000
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
7C802542 00000000 WaitForSingleObject+12
00F9EB4D 00000000 ?cond_wait@ACE_OS@@YAHPAVACE_cond_t@@PAU_RTL_CRITICAL_SECTION@@@Z+3D
8B000000 FFFFFFFF 0000:00000000
180D8B68 00000000 0000:00000000
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
7C802542 00000000 WaitForSingleObject+12
00F9EB4D 00000000 ?cond_wait@ACE_OS@@YAHPAVACE_cond_t@@PAU_RTL_CRITICAL_SECTION@@@Z+3D
8B000000 FFFFFFFF 0000:00000000
180D8B68 00000000 0000:00000000
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
7C802542 00000000 WaitForSingleObject+12
00F9EB4D 00000000 ?cond_wait@ACE_OS@@YAHPAVACE_cond_t@@PAU_RTL_CRITICAL_SECTION@@@Z+3D
8B000000 FFFFFFFF 0000:00000000
180D8B68 00000000 0000:00000000
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
0FAEE9B8 00000000 0000:00000000
FF50D845 FFFFFFFF 0000:00000000
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
7C873071 00000000 GetConsoleInputWaitHandle+318
7C8731B8 00000000 ReadConsoleA+3B
7C8018B7 00000000 ReadFile+A5
78586A93 00000000 realloc+9F7
78586F17 00000000 _read+C0
7854EC7A 00000000 _filbuf+7D
7854E319 00000000 fgets+109
00401F63 00000000 0001:00000F63 C:\ServerWoW\ÿäðî\PhantomCore.exe
00C5A929 00000000 0001:00859929 C:\ServerWoW\ÿäðî\PhantomCore.exe
00FA1614 00000000 ?invoke@ACE_OS_Thread_Adapter@@UAEKXZ+74
78543433 00000000 _endthreadex+44
785434C7 00000000 _endthreadex+D8
7C80B729 00000000 GetModuleFileNameA+1BA
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
7C802455 00000000 Sleep+F
00C5AB10 00000000 0001:00859B10 C:\ServerWoW\ÿäðî\PhantomCore.exe
004041F8 00000000 0001:000031F8 C:\ServerWoW\ÿäðî\PhantomCore.exe
00C5A929 00000000 0001:00859929 C:\ServerWoW\ÿäðî\PhantomCore.exe
00FA1614 00000000 ?invoke@ACE_OS_Thread_Adapter@@UAEKXZ+74
78543433 00000000 _endthreadex+44
785434C7 00000000 _endthreadex+D8
7C80B729 00000000 GetModuleFileNameA+1BA
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
71A35FA7 00000000 0001:00004FA7 C:\WINDOWS.0\system32\MSWSOCK.dll
71A9314F 00000000 select+A7
00F652E5 00000000 ?wait_for_multiple_events@?$ACE_Select_Reactor_T@V?$ACE_Reactor_Token_T@VACE_Token@@@@@@MAEHAAVACE_Select_Reactor_Handle_Set@@PAVACE_Time_Va lue@@@Z+115
FFFFFFFF FFFFFFFF 0000:00000000
Call stack:
Address Frame Function SourceFile
7C90E514 00000000 KiFastSystemCallRet+0
71A35FA7 00000000 0001:00004FA7 C:\WINDOWS.0\system32\MSWSOCK.dll
71A9314F 00000000 select+A7
00F652E5 00000000 ?wait_for_multiple_events@?$ACE_Select_Reactor_T@V?$ACE_Reactor_Token_T@VACE_Token@@@@@@MAEHAAVACE_Select_Reactor_Handle_Set@@PAVACE_Time_Va lue@@@Z+115
FFFFFFFF FFFFFFFF 0000:00000000
========================
Local Variables And Parameters
Call stack:
Address Frame Function SourceFile
00776CCF 00000000 0001:00375CCF C:\ServerWoW\ÿäðî\PhantomCore.exe
009769D0 00000000 0001:005759D0 C:\ServerWoW\ÿäðî\PhantomCore.exe
00568971 00000000 0001:00167971 C:\ServerWoW\ÿäðî\PhantomCore.exe
005A08F3 00000000 0001:0019F8F3 C:\ServerWoW\ÿäðî\PhantomCore.exe
0059E973 00000000 0001:0019D973 C:\ServerWoW\ÿäðî\PhantomCore.exe
0040854E 00000000 0001:0000754E C:\ServerWoW\ÿäðî\PhantomCore.exe
00C5A929 00000000 0001:00859929 C:\ServerWoW\ÿäðî\PhantomCore.exe
00FA1614 00000000 ?invoke@ACE_OS_Thread_Adapter@@UAEKXZ+74
78543433 00000000 _endthreadex+44
785434C7 00000000 _endthreadex+D8
7C80B729 00000000 GetModuleFileNameA+1BA
========================
Global Variables
<user defined> '??4_Init_locks@std@@QAEAAV01@ABV01@@Z'
[/cut]
Добавлено (22.07.2010, 14:45)
---------------------------------------------
краш очередной
Добавлено (22.07.2010, 16:35)
---------------------------------------------
помогите плз база с чарами чото нагнулася как востановить?
Добавлено (22.07.2010, 17:05)
---------------------------------------------
о всё репаирнул базу помогло сори за офотоп)