PhysX icon indicating copy to clipboard operation
PhysX copied to clipboard

Mysterious PVDapp crash

Open WXGopher opened this issue 4 years ago • 0 comments

Hi,

We am using PVD to visualize a fairly large scene (5km x 5km). The PVD app crashes mysteriously and pops out a stack trace as follows.

We are working on a big-world project. This crash does not always happen for other (even larger) parts of this world, so I believe it's safe to rule out the reason "this scene is too large".

Thanks in advance!

We were also wondering if it would be possible for NVIDIA to open-source PVDapp so we might be able to contribute bug fixes :)


==============================================================================
   A Program Fault occurred:
   Error code 0xC0000005: EXCEPTION_ACCESS_VIOLATION
   Address: 0x00007FFD81A9151E
   Flags: 0x00000000
==============================================================================
==                             STACK TRACE                                  ==
==============================================================================
function: memcpy at 0x7FFD81A9151E
		***  0 called from 0x00007FFD81A9151E  STACK 0x000000A45A8F9E58   AddrReturn 0x00007FF6656A198A
function: OpenGLWidget::addGeometry at 0x7FF6656A198A
		***  1 called from 0x00007FF6656A198A  STACK 0x000000A45A8F9E60   AddrReturn 0x00007FF6656BB86F
function: RenderTranslator::prepareTriangleMesh at 0x7FF6656BB86F
		***  2 called from 0x00007FF6656BB86F  STACK 0x000000A45A8F9EE0   AddrReturn 0x00007FF6656DC94F
function: PVDRenderer::loadGraphicsFromFrame at 0x7FF6656DC94F
		***  3 called from 0x00007FF6656DC94F  STACK 0x000000A45A8F9F70   AddrReturn 0x00007FF665691969
function: PVDMainWindow::playFrame at 0x7FF665691969
		***  4 called from 0x00007FF665691969  STACK 0x000000A45A8FA160   AddrReturn 0x00007FF6656E5B50
function: PVDMainWindow::qt_static_metacall at 0x7FF6656E5B50
		***  5 called from 0x00007FF6656E5B50  STACK 0x000000A45A8FA1F0   AddrReturn 0x00000000763BF5FF
function: QMetaObject::activate at 0x763BF5FF
		***  6 called from 0x00000000763BF5FF  STACK 0x000000A45A8FA2F0   AddrReturn 0x0000000076874C5A
function: QAbstractSlider::setValue at 0x76874C5A
		***  7 called from 0x0000000076874C5A  STACK 0x000000A45A8FA410   AddrReturn 0x00007FF66568D9E6
function: PVDMainWindow::updateClipTable at 0x7FF66568D9E6
		***  8 called from 0x00007FF66568D9E6  STACK 0x000000A45A8FA480   AddrReturn 0x00007FF6656E6007
function: PVDMainWindow::qt_static_metacall at 0x7FF6656E6007
		***  9 called from 0x00007FF6656E6007  STACK 0x000000A45A8FA5D0   AddrReturn 0x00000000763BF5FF
function: QMetaObject::activate at 0x763BF5FF
		*** 10 called from 0x00000000763BF5FF  STACK 0x000000A45A8FA6D0   AddrReturn 0x00000000763CC23D
function: QTimer::timerEvent at 0x763CC23D
		*** 11 called from 0x00000000763CC23D  STACK 0x000000A45A8FA7F0   AddrReturn 0x00000000763C5088
function: QObject::event at 0x763C5088
		*** 12 called from 0x00000000763C5088  STACK 0x000000A45A8FA830   AddrReturn 0x00000000767985A0
function: QApplicationPrivate::notify_helper at 0x767985A0
		*** 13 called from 0x00000000767985A0  STACK 0x000000A45A8FA9D0   AddrReturn 0x0000000076797557
function: QApplication::notify at 0x76797557
		*** 14 called from 0x0000000076797557  STACK 0x000000A45A8FAA00   AddrReturn 0x000000007639FB89
function: QCoreApplication::notifyInternal2 at 0x7639FB89
		*** 15 called from 0x000000007639FB89  STACK 0x000000A45A8FB0F0   AddrReturn 0x00000000763E9335
function: QEventDispatcherWin32Private::sendTimerEvent at 0x763E9335
		*** 16 called from 0x00000000763E9335  STACK 0x000000A45A8FB170   AddrReturn 0x00000000763E7284
function: QEventDispatcherWin32::event at 0x763E7284
		*** 17 called from 0x00000000763E7284  STACK 0x000000A45A8FB1D0   AddrReturn 0x00000000767985A0
function: QApplicationPrivate::notify_helper at 0x767985A0
		*** 18 called from 0x00000000767985A0  STACK 0x000000A45A8FB240   AddrReturn 0x0000000076797557
function: QApplication::notify at 0x76797557
		*** 19 called from 0x0000000076797557  STACK 0x000000A45A8FB270   AddrReturn 0x000000007639FB89
function: QCoreApplication::notifyInternal2 at 0x7639FB89
		*** 20 called from 0x000000007639FB89  STACK 0x000000A45A8FB960   AddrReturn 0x00000000763A1A71
function: QCoreApplicationPrivate::sendPostedEvents at 0x763A1A71
		*** 21 called from 0x00000000763A1A71  STACK 0x000000A45A8FB9E0   AddrReturn 0x00007FFCC123D9EF
function: qt_plugin_query_metadata at 0x7FFCC123D9EF
		*** 22 called from 0x00007FFCC123D9EF  STACK 0x000000A45A8FBAB0   AddrReturn 0x00000000763E8336
function: QEventDispatcherWin32::processEvents at 0x763E8336
		*** 23 called from 0x00000000763E8336  STACK 0x000000A45A8FBAE0   AddrReturn 0x00007FFDA5BDE7E8
function: CallWindowProcW at 0x7FFDA5BDE7E8
		*** 24 called from 0x00007FFDA5BDE7E8  STACK 0x000000A45A8FBC30   AddrReturn 0x00007FFDA5BDE229
function: DispatchMessageW at 0x7FFDA5BDE229
		*** 25 called from 0x00007FFDA5BDE229  STACK 0x000000A45A8FBDC0   AddrReturn 0x00000000763E7B00
function: QEventDispatcherWin32::processEvents at 0x763E7B00
		*** 26 called from 0x00000000763E7B00  STACK 0x000000A45A8FBE40   AddrReturn 0x00007FFCC123D9C9
function: qt_plugin_query_metadata at 0x7FFCC123D9C9
		*** 27 called from 0x00007FFCC123D9C9  STACK 0x000000A45A8FEFB0   AddrReturn 0x000000007639B99B
function: QEventLoop::exec at 0x7639B99B
		*** 28 called from 0x000000007639B99B  STACK 0x000000A45A8FEFE0   AddrReturn 0x000000007639EA21
function: QCoreApplication::exec at 0x7639EA21
		*** 29 called from 0x000000007639EA21  STACK 0x000000A45A8FF060   AddrReturn 0x00007FF66567026F
function: main at 0x7FF66567026F
		*** 30 called from 0x00007FF66567026F  STACK 0x000000A45A8FF0D0   AddrReturn 0x00007FF665756DD4
function: WinMain at 0x7FF665756DD4
	filename: c:\users\qt\work\qt\qtbase\src\winmain\qtmain_win.cpp, line 104
		*** 31 called from 0x00007FF665756DD4  STACK 0x000000A45A8FF6D0   AddrReturn 0x00007FF66575601A
function: __scrt_common_main_seh at 0x7FF66575601A
	filename: d:\agent\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl, line 288
		*** 32 called from 0x00007FF66575601A  STACK 0x000000A45A8FF760   AddrReturn 0x00007FFDA4B27034
function: BaseThreadInitThunk at 0x7FFDA4B27034
		*** 33 called from 0x00007FFDA4B27034  STACK 0x000000A45A8FF7A0   AddrReturn 0x00007FFDA5E82651
function: RtlUserThreadStart at 0x7FFDA5E82651
		*** 34 called from 0x00007FFDA5E82651  STACK 0x000000A45A8FF7D0   AddrReturn 0x0000000000000000
function: RtlUserThreadStart at 0x7FFDA5E82651
		*** 35 called from 0x00007FFDA5E82651  STACK 0x000000A45A8FF7D0   AddrReturn 0x0000000000000000

if we record without visualization (without PxPvdInstrumentationFlag::eDEBUG):

==============================================================================
   A Program Fault occurred:
   Error code 0xC0000005: EXCEPTION_ACCESS_VIOLATION
   Address: 0x00000000763A1A2A
   Flags: 0x00000000
==============================================================================
==                             STACK TRACE                                  ==
==============================================================================
function: QCoreApplicationPrivate::sendPostedEvents at 0x763A1A2A
		***  0 called from 0x00000000763A1A2A  STACK 0x0000000560D4C150   AddrReturn 0x00007FFCC26BD9EF
function: qt_plugin_query_metadata at 0x7FFCC26BD9EF
		***  1 called from 0x00007FFCC26BD9EF  STACK 0x0000000560D4C220   AddrReturn 0x00000000763E8336
function: QEventDispatcherWin32::processEvents at 0x763E8336
		***  2 called from 0x00000000763E8336  STACK 0x0000000560D4C250   AddrReturn 0x00007FFDA5BDE7E8
function: CallWindowProcW at 0x7FFDA5BDE7E8
		***  3 called from 0x00007FFDA5BDE7E8  STACK 0x0000000560D4C3A0   AddrReturn 0x00007FFDA5BDE229
function: DispatchMessageW at 0x7FFDA5BDE229
		***  4 called from 0x00007FFDA5BDE229  STACK 0x0000000560D4C530   AddrReturn 0x00000000763E7B00
function: QEventDispatcherWin32::processEvents at 0x763E7B00
		***  5 called from 0x00000000763E7B00  STACK 0x0000000560D4C5B0   AddrReturn 0x00007FFCC26BD9C9
function: qt_plugin_query_metadata at 0x7FFCC26BD9C9
		***  6 called from 0x00007FFCC26BD9C9  STACK 0x0000000560D4F720   AddrReturn 0x000000007639B99B
function: QEventLoop::exec at 0x7639B99B
		***  7 called from 0x000000007639B99B  STACK 0x0000000560D4F750   AddrReturn 0x000000007639EA21
function: QCoreApplication::exec at 0x7639EA21
		***  8 called from 0x000000007639EA21  STACK 0x0000000560D4F7D0   AddrReturn 0x00007FF66567026F
function: main at 0x7FF66567026F
		***  9 called from 0x00007FF66567026F  STACK 0x0000000560D4F840   AddrReturn 0x00007FF665756DD4
function: WinMain at 0x7FF665756DD4
	filename: c:\users\qt\work\qt\qtbase\src\winmain\qtmain_win.cpp, line 104
		*** 10 called from 0x00007FF665756DD4  STACK 0x0000000560D4FE40   AddrReturn 0x00007FF66575601A
function: __scrt_common_main_seh at 0x7FF66575601A
	filename: d:\agent\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl, line 288
		*** 11 called from 0x00007FF66575601A  STACK 0x0000000560D4FED0   AddrReturn 0x00007FFDA4B27034
function: BaseThreadInitThunk at 0x7FFDA4B27034
		*** 12 called from 0x00007FFDA4B27034  STACK 0x0000000560D4FF10   AddrReturn 0x00007FFDA5E82651
function: RtlUserThreadStart at 0x7FFDA5E82651
		*** 13 called from 0x00007FFDA5E82651  STACK 0x0000000560D4FF40   AddrReturn 0x0000000000000000
function: RtlUserThreadStart at 0x7FFDA5E82651
		*** 14 called from 0x00007FFDA5E82651  STACK 0x0000000560D4FF40   AddrReturn 0x0000000000000000


WXGopher avatar Nov 12 '21 06:11 WXGopher