|
![]() |
#1 |
Участник
|
Freeangel, включена. У Вас есть какая-то инфа о баге с этим? Я нашел инфу о том, что у некоторых отваливаются клиенты по этой причине.
Но у меня падает AOS server. Последний раз редактировалось igortsk; 06.05.2016 в 11:58. |
|
![]() |
#2 |
Участник
|
Инфы подробной нет. Сколько ни пытались не смогли отловить. Иногда и АОС падал. после выключения галки и клиенты и АОС перестали падать.
|
|
![]() |
#3 |
Участник
|
Цитата:
igortsk, удалось как-нибудь решить проблему ? у нас тоже появились падения с таким же стеком вызовов. Цитата:
CONTEXT: (.ecxr)
rax=003000300422041f rbx=0000000e0e672760 rcx=0000000e0e672760 rdx=0000000d992bd47a rsi=0000000000000000 rdi=0000000000000000 rip=00007ff7ddde5fba rsp=0000000041ccd6e0 rbp=0000000000000000 r8=0000000e0cbce870 r9=0000000e0e672760 r10=000000000001c351 r11=000000000000c36f r12=0000000000000000 r13=0000000d74707f00 r14=0000000000000000 r15=000000000000002a iopl=0 nv up ei ng nz ac po cy cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010297 Ax32Serv!SqlData::cvtField+0x1ea: 00007ff7`ddde5fba ff5018 call qword ptr [rax+18h] ds:00300030`04220437=???????????????? Resetting default scope EXCEPTION_RECORD: (.exr -1) ExceptionAddress: 00007ff7ddde5fba (Ax32Serv!SqlData::cvtField+0x00000000000001ea) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff PROCESS_NAME: Ax32Serv.exe READ_ADDRESS: ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff MISSING_CLR_SYMBOL: 0 Цитата:
STACK_TEXT:
00000000`41ccd6e0 00007ff7`ddde64a8 : 00000000`13305960 0000000d`992bd47a 0000000e`0cbce870 00007ff7`00000000 : Ax32Serv!SqlData::cvtField+0x1ea 00000000`41ccd7c0 00007ff7`ddb4c3ef : 00000000`13305960 00000000`41ccd900 0000000e`0fec2fa0 0000000e`00000000 : Ax32Serv!SqlData::cvtRecord+0x458 00000000`41ccd880 00007ff7`ddb4c952 : 80000000`00000020 0000000d`26477200 00000000`41cce430 00007ff8`949c0000 : Ax32Serv!SqlStmt::GetFetchedDataContents+0x67f 00000000`41cce1f0 00007ff7`ddb4ca6d : 00000000`00000000 00000000`00000000 00000002`00000000 00007ff8`94da5ebd : Ax32Serv!SqlStmt::next+0x382 00000000`41cce290 00007ff7`ddd40c44 : 0000000d`e30bfff0 00000000`00000000 00000000`00000000 00007ff8`00000000 : Ax32Serv!SqlStmtTimed::next+0x4d 00000000`41cce2c0 00007ff7`ddac6515 : 0000000e`0a419ac0 0000000d`65522020 00000000`00000000 00000000`00000000 : Ax32Serv!cqlDatasourceSql::fetchrec+0x384 00000000`41cce330 00007ff7`ddac90eb : 00000000`00000002 00007ff8`98ce3b10 00000000`00000020 00000000`009a0d50 : Ax32Serv!cqlCursor::__next+0x605 00000000`41cce510 00007ff7`ddac9b5c : 00000000`00000000 00000000`00000000 00000000`00000000 0000000d`dca5a7f0 : Ax32Serv!cqlCursor::_next+0x28bb 00000000`41cce7e0 00007ff8`968aa593 : 00000000`0000000f 00000000`41cceed8 00007ff7`ddac96f0 00000000`0000001e : Ax32Serv!ServerNext+0x46c 00000000`41cce960 00007ff8`96852b4b : 00000000`41cceb80 00000000`41ccee60 00007ff7`de466022 00000000`1dfa9eb0 : rpcrt4!Invoke+0x73 00000000`41ccea20 00007ff8`968953fa : 00000000`00000000 00000000`0e166f20 00000000`41ccf0d0 00007ff8`98cfaf7b : rpcrt4!NdrStubCall2+0x46b 00000000`41ccf0b0 00007ff8`9687a274 : 0000020e`6eee5cc0 00007ff8`00000001 00000000`4f397630 00000000`4f22c540 : rpcrt4!NdrServerCall2+0x1a 00000000`41ccf0e0 00007ff8`9687918d : 00000000`00000000 00007ff8`00000000 00000000`41ccf260 00000000`41ccf2b0 : rpcrt4!DispatchToStubInCNoAvrf+0x24 00000000`41ccf130 00007ff8`9687b028 : 00000000`1dfa9eb0 00000000`00000001 00000000`00000000 00000000`4f22c6a0 : rpcrt4!RPC_INTERFACE: ![]() 00000000`41ccf200 00007ff8`9687b38d : 00000000`4f22c540 00000000`00000000 00000000`000002aa 00000000`00000000 : rpcrt4!OSF_SCALL: ![]() 00000000`41ccf320 00007ff8`9687d7b0 : 00000000`000002aa 00000000`00000000 0000000d`9b78eea0 00000000`4f22c540 : rpcrt4!OSF_SCALL::ProcessReceivedPDU+0x1dd 00000000`41ccf3f0 00007ff8`9688818b : 00000000`4f3492f8 00000000`41ccf599 00000000`000002e0 00007ff8`9691f044 : rpcrt4!OSF_SCONNECTION::ProcessReceiveComplete+0x410 00000000`41ccf4f0 00007ff8`95edf130 : 00000000`41ccf9e0 00000000`4f349350 00000000`41ccf8d8 00007ff8`98cfae60 : rpcrt4!CO_ConnectionThreadPoolCallback+0x16b 00000000`41ccf5f0 00007ff8`98cfacc8 : 00000000`4f0a82c0 00000000`00000000 00000000`00000000 00000000`4f0a8388 : KERNELBASE!BasepTpIoCallback+0x50 00000000`41ccf640 00007ff8`98cdeccd : 00000000`4f0a8388 00000000`00000000 00000000`4f349350 00000000`00000010 : ntdll!TppIopExecuteCallback+0x118 00000000`41ccf6c0 00007ff8`965284d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!TppWorkerThread+0x8ed 00000000`41ccfac0 00007ff8`98d11781 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14 00000000`41ccfaf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 |
|
Теги |
.net, aoc, ax2012, crash, crash and hang analysis, crash dump, debug symbols, dump analisys, exception, lcs, stack trace, symbols, tariq bell |
|
|