17.01.2017, 12:48
Доброго времени суток. Уважаемые, расскажите пожалуйста с каким способом можно расшифровать лог краша. Для того, чтобы принять комплекс мер по устранению этого краша. Будучи работая в samp ни когда не сталкивался с этой бедой, но в crmp это очень частое явление.
Логи, которые скидывали мне игроки
Логи, которые скидывали мне игроки
PHP Code:
SA-MP 0.3e
Exception At Address: 0x004D46AE
Registers:
EAX: 0x00000000 EBX: 0x576A6A00 ECX: 0x909090BF EDX: 0x00000000
ESI: 0x00000438 EDI: 0x909090C3 EBP: 0x00000003 ESP: 0x0023F400
EFLAGS: 0x00010246
Stack:
+0000: 0x00000000 0x0BEEDAA4 0x0C770010 0x576A6A00
+0010: 0x0023F424 0x1F494090 0x00008B00 0x00000000
+0020: 0x00000000 0x0068581A 0x0C8588EC 0x00000036
+0030: 0x00000003 0x447A0000 0x0C770010 0x00000004
+0040: 0x576A6A01 0x006818BB 0x0BEEDAA4 0x00000002
+0050: 0x00000000 0x00000000 0x0C77000C 0x576A6A01
+0060: 0x00601761 0x576A6A01 0x0023F644 0x0BEEDAA4
+0070: 0x0023F4B8 0x00000000 0xFFFFFFFF 0x0C737288
+0080: 0x0C77000C 0x0023F630 0x0083E826 0xFFFFFFFF
+0090: 0x005E4147 0x00000001 0x0023F644 0x044633A8
+00A0: 0x03D0497F 0x448DA19D 0xC4FECCE9 0x428A3333
+00B0: 0x00000000 0x0BEEDAA4 0x0023FA60 0x03D0F082
+00C0: 0x448DA19D 0xC4FECCE9 0x428A3333 0x12D02FA0
+00D0: 0xBF1D9BFD 0x3F49BB13 0x00000000 0x0023F4F0
+00E0: 0xBF49BB13 0xBF1D9BFD 0x00000000 0x044633A8
+00F0: 0x00000000 0x00000000 0x3F800000 0x0023FA60
+0100: 0x448DA19D 0xC4FECCE9 0x428A3333 0x00230000
+0110: 0x03ED39D2 0x00000001 0x01000028 0x00000010
+0120: 0x00000010 0x00000008 0x0023F644 0x00000000
+0130: 0x12D401B8 0x00000004 0x12D4F128 0x00000000
+0140: 0x12D40090 0x00000002 0x00000002 0x00000000
+0150: 0x00000000 0x00000010 0x00000000 0x00000000
+0160: 0x00000246 0x00000246 0x000002FF 0x12D401B8
+0170: 0x00000004 0x0023F5E4 0x0023F58C 0x12D4F128
+0180: 0x12D4F160 0xDB2F0362 0x0023F5D4 0x00000004
+0190: 0x0023F5E4 0x0023F5A8 0x76F0ABF0 0x00000246
+01A0: 0x5B3841E1 0x03F00D8E 0x0023F5E4 0x03D1B38A
+01B0: 0x04460000 0x00000000 0x03D1B38F 0x12D401B8
+01C0: 0x00000004 0x12D4F128 0x0023F5E8 0x0023F5BC
+01D0: 0x03D34C7B 0x0023FABC 0x03D1BCD4 0x03D43F80
+01E0: 0xFFFFFFFF 0x03D1B38F 0x03D1B3AC 0x00000004
+01F0: 0x03D1B3D7 0x00000004 0x00000000 0x03D1AAA3
+0200: 0x00000004 0x00000004 0x0023F97C 0x0023FA60
+0210: 0x0023FA94 0x0023FA94 0x03C88C00 0x0023FA94
+0220: 0xFFFFFFFC 0x0023F644 0x0023FA60 0x576A6A01
+0230: 0x0023FABC 0x03ED4511 0x00000000 0x03CA6120
+0240: 0x0023FA90 0x03CA6001 0x12D0C572 0x12D0C570
+0250: 0x00000000 0xFFFF003A 0x00000002 0x00000AC2
+0260: 0x00000002 0x00000000 0x00000000 0x00000000
+0270: 0x00000000 0x00000000 0x00000000 0x00000000
SCM Op: 0x4D7, lDbg: 0
Game Version: US 1.0
State Information: Ped Context: 0
P0 (0,0) P1 (0,0) P2 (0,0) P3 (0,0)
P5 (0,0) P7 (0,0)
P8 (0,0) P9 (0,0) P10 (0,0)
PHP Code:
Exception At Address: 0x0074DA25
Registers:
EAX: 0x00000000 EBX: 0x00000010 ECX: 0x2FD19FE8 EDX: 0x00000068
ESI: 0x00000000 EDI: 0x049634B0 EBP: 0x2FD19FE8 ESP: 0x0028FC88
EFLAGS: 0x00210202
Stack:
+0000: 0x00000000 0x0074E171 0x00000000 0x2FD19FC8
+0010: 0x03ABB168 0x25406238 0xFFFFFFFF 0x0074CD3E
+0020: 0x2FD19FE8 0x2D43F01C 0x00749DF1 0x2FD19FC8
+0030: 0x25406238 0x03ABB168 0x004C4472 0x2D43F01C
+0040: 0x0000BBBC 0x00000963 0x004089DD 0x00000020
+0050: 0x00000000 0x008F087C 0x00000963 0x0040D266
+0060: 0x00000963 0x00067A98 0x00070800 0x008E4A60
+0070: 0x0040E13D 0x00000020 0x000052EE 0x0040E2AC
+0080: 0x00070800 0x00000000 0xCFF4C4BF 0x0028FD94
+0090: 0xCFF4C4BF 0x00000000 0x000000E1 0x015670CF
+00A0: 0x00000000 0x0040E800 0x3FF52BD0 0x00000000
+00B0: 0x0028FD94 0x00561A8E 0x43DF5627 0x442FEC99
+00C0: 0x41387174 0x0053BF10 0x0000001A 0xCFF4C39A
+00D0: 0x00000000 0x03958091 0x039A0B23 0xCFF4C39A
+00E0: 0x039D7986 0x0000001A 0xCFF4C39A 0x00000000
+00F0: 0x04452BC0 0x0028FD6C 0x0028F85C 0x0028FF78
+0100: 0x039EBCD4 0x03A109F8 0x00000001 0x75996C30
+0110: 0x0053E986 0x00000001 0x778BFD85 0x779280FC
+0120: 0x0053ECC2 0x00000001 0x00619B71 0x0000001A
+0130: 0x00000001 0x00000001 0x0000000A 0x00748DA0
+0140: 0x0000001A 0x00000001 0x75FD1245 0x00000000
+0150: 0x0028FF88 0x7EFDE000 0x01740000 0x4F4FF4B5
+0160: 0x017410F0 0x00000008 0x00000100 0x00000008
+0170: 0x00000102 0x44700000 0x44070000 0x00000000
+0180: 0x00000000 0x00000780 0x00000438 0x00000000
+0190: 0x00000001 0x00170544 0x00000200 0x00000000
+01A0: 0x021C03C0 0x022FF741 0x000003C0 0x0000021C
+01B0: 0x0000002C 0x00400000 0x03F89FF0 0x75FD1245
+01C0: 0x00000000 0x0028FF88 0x5B954437 0x00400000
+01D0: 0x008246EB 0x75FD1245 0x00000000 0x008246F1
+01E0: 0x00400000 0x00000000 0x01AC3239 0x0000000A
+01F0: 0x00000094 0x00000006 0x00000001 0x00001DB1
+0200: 0x00000002 0x76726553 0x20656369 0x6B636150
+0210: 0x00003120 0x00000000 0x00000000 0x00000000
+0220: 0x00000000 0x00000000 0x00000000 0x00000000
+0230: 0x00000000 0x00000000 0x00000000 0x00000000
+0240: 0x00000000 0x00000000 0x00000000 0x00000000
+0250: 0x00000000 0x00000000 0x00000000 0x00000000
+0260: 0x00000000 0x00000000 0x00000000 0x00000000
+0270: 0x00000000 0x00000000 0x00000000 0x00000000
SCM Op: 0x77E, lDbg: 0
Game Version: US 1.0
State Information: Ped Context: 0
P0 (67,172) P1 (145,0) P3 (67,144)
P4 (0,0) P5 (67,167) P6 (0,0) P7 (0,0)
P8 (0,0) P9 (0,0) P10 (0,0) P14 (0,0) P15 (145,0)
P17 (0,0)
PHP Code:
A-MP 0.3e
Exception At Address: 0x007324B6
Registers:
EAX: 0xC1000000 EBX: 0x0000002E ECX: 0x0162C7F8 EDX: 0x00000000
ESI: 0x00000007 EDI: 0x2DC61018 EBP: 0x37351B14 ESP: 0x0022FCA8
EFLAGS: 0x00010283
Stack:
+0000: 0x031EB168 0x031EB168 0x00000000 0x00000000
+0010: 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF 0x00C4FFFF
+0020: 0x00000018 0x04E93690 0x00000000 0x0022FCF4
+0030: 0x6769017F 0x0000001C 0x00000000 0x04E93690
+0040: 0x00000001 0x0022FD0C 0x6769017F 0x0000001C
+0050: 0x00000001 0x00000001 0x00000001 0x04E93460
+0060: 0x0000001C 0x0022FD30 0x6768CD5E 0x01B36800
+0070: 0x0022FD28 0x0000001C 0xBE8B5A80 0x00000000
+0080: 0x0000001C 0x00000001 0x00000000 0x00000000
+0090: 0x3EA74EFE 0x00000001 0xAA819E2F 0x0000001A
+00A0: 0x00000001 0x75A680E0 0x00732639 0x37351B14
+00B0: 0x00000000 0x03C87138 0x00732BDC 0x031EB168
+00C0: 0x37351B14 0x00000000 0x75A680E0 0x0000001A
+00D0: 0x0162F0F8 0x00733F2A 0x03C87100 0x44D4E2BF
+00E0: 0x00000001 0x0053E01E 0x00000000 0x0053EAA6
+00F0: 0x03DC0434 0x0053EAC4 0x442AC000 0x43C00000
+0100: 0x0053ECC2 0x00000001 0x00619B71 0x0000001A
+0110: 0x00000001 0x00000001 0x0000000A 0x00748DA0
+0120: 0x0000001A 0x00000001 0x772DCF41 0x00000000
+0130: 0x0022FF88 0x7FFD6000 0x01620000 0x4EF8332D
+0140: 0x016210F0 0x00000008 0x00000100 0x00000008
+0150: 0x00000102 0x442AC000 0x43C00000 0x00000000
+0160: 0x00000000 0x00000556 0x00000300 0x00000000
+0170: 0x00000001 0x0055035C 0x00000200 0x00000000
+0180: 0x018002AB 0x00CFCCB4 0x000002AB 0x00000180
+0190: 0x0000002C 0x00400000 0x03049EC0 0x772DCF41
+01A0: 0x00000000 0x0022FF88 0x57734437 0x00400000
+01B0: 0x008246EB 0x772DCF41 0x00000000 0x008246F1
+01C0: 0x00400000 0x00000000 0x0197215E 0x0000000A
+01D0: 0x00000094 0x00000006 0x00000001 0x00001DB1
+01E0: 0x00000002 0x76726553 0x20656369 0x6B636150
+01F0: 0x00003120 0x00000000 0x00000000 0x00000000
+0200: 0x00000000 0x00000000 0x00000000 0x00000000
+0210: 0x00000000 0x00000000 0x00000000 0x00000000
+0220: 0x00000000 0x00000000 0x00000000 0x00000000
+0230: 0x00000000 0x00000000 0x00000000 0x00000000
+0240: 0x00000000 0x00000000 0x00000000 0x00000000
+0250: 0x00000000 0x00000000 0x00000000 0x00000000
+0260: 0x00824588 0x00000000 0x00000000 0x7FFD6000
+0270: 0xC0000005 0x00000000 0x0197215E 0x00000044
SCM Op: 0x470, lDbg: 0
Game Version: US 1.0
State Information: Ped Context: 0
P1 (0,0) P2 (0,0) P3 (0,0)
P4 (0,0) P5 (144,0) P6 (0,0) P7 (0,0)
P8 (0,0) P9 (0,0) P10 (0,0) P13 (0,0) P14 (0,0) P15 (0,0)
P17 (0,0)