I use the newest version of libcod
+ default ones.Code://EXTRA OPTIONS/// self setClientCvar("menutext","Extra"); self setClientCvar("extra1","1. Reset Score"); self setClientCvar("extra2","2. FPS ^2On^7/^1Off"); self setClientCvar("extra3","3. Lagometer ^2On^7/^1Off"); self setClientCvar("extra4","4. Rename"); self setClientCvar("extra5","5. Admin Login"); self setClientCvar("extra6",""); self setClientCvar("extra7",""); //Stats self setClientCvar("title1","^9evil^1.^7Current Stats"); self setClientCvar("bestkillnameround","Name of Player"); self setClientCvar("bestkillround","Kills"); self setClientCvar("bestheadnameround","Name of Player"); self setClientCvar("bestheadround","Head"); self setClientCvar("bestbashnameround","Name of Player"); self setClientCvar("bestbashround","Bash"); self setClientCvar("title2","^9evil^1.^7Best Stats"); self setClientCvar("bestkillname","Name of Player"); self setClientCvar("bestkill","Kills"); self setClientCvar("bestheadname","Name of Player"); self setClientCvar("besthead","Head"); self setClientCvar("bestbashname","Name of Player"); self setClientCvar("bestbash","Bash");
Try connecting to your server with 'cl_maxpackets' set to 100 and 'packetdup' on 5.
If you can duplicate the crash then you might find out how to prevent it.
Edit: snaps is irrelevant. (it is the data you receive from the server)
Com_maxfps set to 100 is high enough
http://mare-server.forumotion.com/t1...our-connection
http://bashandslash.com/index.php?op...590&Itemid=106
Test something like this:
Now on !test you run these commands on your server:PHP Code:
/say !test;name test;wait 5;reconnect
And on connect you also add a few cvars.PHP Code:
self setClientCvar("com_maxfps", 125); // just an example
self setClientCvar("cl_allowdownload", 1); // a few cvars to fill your user commands
Edit: you can post crash's segmentation fault error? It should be the last line when you run 'dmesg'. Then i might be able to backtrace the error.
kung foo man (15th April 2015)
And now the error was CmdCount <1.Code:UDP: short packet: From 85.174.67.140:0 0/39 to 46.4.55.66:20480 UDP: short packet: From 85.174.67.140:0 0/39 to 46.4.55.66:20480 UDP: short packet: From 85.174.67.140:0 0/40 to 46.4.55.66:20480 UDP: short packet: From 85.174.67.140:0 0/58 to 46.4.55.66:20480 UDP: short packet: From 85.174.67.140:0 0/58 to 46.4.55.66:20480 UDP: short packet: From 85.174.67.140:0 0/59 to 46.4.55.66:20480 UDP: short packet: From 85.174.67.140:0 0/39 to 46.4.55.66:20480 UDP: short packet: From 85.174.67.140:0 273/40 to 46.4.55.66:0 UDP: short packet: From 85.174.67.140:0 273/40 to 46.4.55.66:0 UDP: short packet: From 85.174.67.140:0 21487/39 to 46.4.55.66:29109 UDP: short packet: From 95.59.187.183:11398 21023/38 to 46.4.55.66:31166 UDP: short packet: From 41.227.52.9:29136 57385/57 to 46.4.55.66:29027 UDP: short packet: From 188.212.224.204:12874 4148/52 to 46.4.55.66:28958 UDP: short packet: From 81.214.181.88:28960 46/44 to 46.4.55.66:28962 UDP: short packet: From 85.173.218.75:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 5.234.117.90:12318 4141/45 to 46.4.55.66:28958 UDP: bad checksum. From 46.183.220.250:3099 to 46.4.55.66:47808 ulen 25 UDP: short packet: From 41.225.218.200:28961 2611/50 to 46.4.55.66:28962 UDP: short packet: From 31.180.161.147:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 31.180.161.147:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 31.180.161.147:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 31.180.161.147:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 31.180.161.147:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 78.174.59.67:28960 43/38 to 46.4.55.66:28962 UDP: bad checksum. From 46.183.220.250:3099 to 46.4.55.66:67 ulen 321 UDP: short packet: From 31.180.141.88:0 0/23 to 46.4.55.66:20480 UDP: bad checksum. From 46.183.220.250:3099 to 46.4.55.66:5008 ulen 72 UDP: short packet: From 31.180.173.95:0 0/23 to 46.4.55.66:20480 cod2_lnxded_1_0[835]: segfault at 84 ip 00000000080e983d sp 00000000ff923d40 error 4 in cod2_lnxded_1_0a_va_loc[8048000+13e000] cod2_lnxded[16420]: segfault at 84 ip 00000000080e983d sp 00000000ffcbebc0 error 4 in cod2_lnxded[8048000+13e000] UDP: short packet: From 178.149.22.246:20072 49320/39 to 46.4.55.66:28958 UDP: short packet: From 41.227.159.112:12939 26401/37 to 46.4.55.66:10549 cod2_lnxded[27669]: segfault at 84 ip 00000000080e983d sp 00000000ffa5bf00 error 4 in cod2_lnxded[8048000+13e000] UDP: short packet: From 41.225.113.233:1128 49211/59 to 46.4.55.66:28989 UDP: short packet: From 41.225.113.233:1032 313/41 to 46.4.55.66:28958 UDP: short packet: From 94.233.22.187:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 94.233.22.187:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 94.233.22.187:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 31.180.130.94:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 94.232.201.101:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 94.232.201.101:0 0/23 to 46.4.55.66:20480 UDP: bad checksum. From 46.183.220.250:3099 to 46.4.55.66:67 ulen 321 cod2_lnxded[12099]: segfault at 84 ip 00000000080e983d sp 00000000ff82af00 error 4 in cod2_lnxded[8048000+13e000] cod2_lnxded[11820]: segfault at 84 ip 00000000080e983d sp 00000000ff850310 error 4 in cod2_lnxded[8048000+13e000] cod2_lnxded_1_0[32390]: segfault at 84 ip 00000000080e983d sp 00000000ff80fa80 error 4 in cod2_lnxded_1_0a_va_loc[8048000+13e000] UDP: short packet: From 94.232.201.101:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 94.232.201.101:0 0/23 to 46.4.55.66:20480 cod2_lnxded[19653]: segfault at 84 ip 00000000080e983d sp 00000000ffd50330 error 4 in cod2_lnxded[8048000+13e000] UDP: short packet: From 85.174.85.10:0 0/23 to 46.4.55.66:20480 UDP: short packet: From 85.174.85.10:0 0/23 to 46.4.55.66:20480
WTF?!
Error 4 should be interrupted system call according to http://stackoverflow.com/questions/2...fault-messages.
Points toPHP Code:
cod2_lnxded_1_0[32390]: segfault at 84 ip 00000000080e983d sp 00000000ff80fa80 error 4 in cod2_lnxded_1_0a_va_loc[8048000+13e000]
Edit: the offset (at) might be the offset of the address (ip). Then it points a different get weapon call.PHP Code:
v3 = sub_80E9270(a2); // get weapon
if ( !*(_DWORD *)(v3 + 132) // offhandClass (80e983d)
Edit 2: it is possible the crash is caused by the function giveweapon when someone reconnects.