I started up Ryzom repeatedly yesterday and today, and once was interuppted by the patching and the rest were notifications saying ACESS VIOLATION > So can somebody help me here? because i really DO want to get Ryzom running for more than a second ...please?
Nah it didn't crash during patching. but i'll take a look at the dust though. but everything else is fine.
After i posted this, Ryzom ran perfectly well throughout the day, but it's iffy now
here's the report i'm getting
__________________________________________________
Access Violation exception generated at 0xAA0222, thread attempts to write at <NULL>.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------
Log with no filter:
-------------------------------
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16375] as [&MISM&You miss %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 32899] as [Puny Gingo] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16334] as [&DGM&You hit %s %s's %s for %i (%i) points of damage.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52507] as [front legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52504] as [body] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52510] as [rear legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [728705] as [Miew(Arispotle)] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16551] as [&SYS&You are now at full %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52540] as [health] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16584] as [&CHK&%s %s is already being quartered by %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16435] as [&SPLM&You invoke a beneficial spell on %s %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16462] as [&SPLM&You succesfully cast your spell.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16541] as [&SPLM&You heal %s %s %i hit points.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16552] as [&SYS&%s %s is now at full %s and no longer needs %s recovery spells.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16392] as [&MISM&%s %s has parried your attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16390] as [&MIS&You dodged %s %s's attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407775] as [&SYS&%s %s is now getting a penalty on his dodging.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 22599] as [Basic Yelk Mushroom] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30757] as [Fragment of Basic Yelk Pelvis] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30727] as [Fragment of Basic Yelk Skin] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [737827] as [Grumbold(Arispotle)$Refugee$] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13341] as [&EMT&%s bows to %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13342] as [&EMT&%s bows respectfully.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13581] as [&EMT&%s smiles, excited.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407940] as [&EMT&%s is having a wicked time.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 net_manager.cpp 3401 : CNetManager::update : Connection Ready.
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=2/lastAck=-1/nextSentPacket=3)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=4/lastAck=2/nextSentPacket=5)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 1 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=6/lastAck=3/nextSentPacket=7)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 2 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 104 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=763) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=7/lastAck=5/nextSentPacket=9)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 86: number 0 part 3 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3034 : CLMPNET[036744E0]: Received a TOTAL generic action MP size: number 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3048 : CLMPNET[036744E0]: Received a generic action size 656
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 net_manager.cpp 312 : impulseCallBack : Received CONNECTION:USER_CHARS
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 connection.cpp 808 : impulseCallBack : received userChars list
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
-------------------------------
User Crash Callback:
-------------------------------
UserId: 291619
ShardId: 0
Application: ryzom_live
No user entity informations
ViewPosition: 0.00 0.00 0.00
Time in game: 1h 11min 28sec
LocalTime: 2006/07/27 10:03:04
ServerTick: 576620065
ConnectState: Connected
LocalAddress: :1200 (192.168.1.65)
Language: English
ClientVersion: 1.2.0.800
PatchVersion: 502
Client is online
NumServerHOP: 0
NumFarTP: 0
NumReselectPerso: 0
Connection Events:
Memory: 88MB/511MB
Process Virtual Memory: 527MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) XP 2000+ / x86 Family 6 Model 8 Stepping 1 / AuthenticAMD / 1667MHz / 1 Processors found
CPUID: 383fbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / ati2dvag.dll / RADEON 9550 / \\.\DISPLAY1 / driver version : 6.14.10.6561
3DCard: RADEON 9550, version 6.5.6.1
Sound mixer:
Playing sources: 0
__________________________________
Last edited by wolfcape on Thu Jul 27, 2006 9:05 am, edited 1 time in total.
I keep getting this message, i'm in a rush so i'll post the report and hope you brainboxes can figure it out.
here's the report i'm getting
__________________________________________________
Access Violation exception generated at 0xAA0222, thread attempts to write at <NULL>.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------
Log with no filter:
-------------------------------
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16375] as [&MISM&You miss %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 32899] as [Puny Gingo] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16334] as [&DGM&You hit %s %s's %s for %i (%i) points of damage.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52507] as [front legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52504] as [body] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52510] as [rear legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [728705] as [Miew(Arispotle)] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16551] as [&SYS&You are now at full %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52540] as [health] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16584] as [&CHK&%s %s is already being quartered by %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16435] as [&SPLM&You invoke a beneficial spell on %s %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16462] as [&SPLM&You succesfully cast your spell.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16541] as [&SPLM&You heal %s %s %i hit points.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16552] as [&SYS&%s %s is now at full %s and no longer needs %s recovery spells.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16392] as [&MISM&%s %s has parried your attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16390] as [&MIS&You dodged %s %s's attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407775] as [&SYS&%s %s is now getting a penalty on his dodging.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 22599] as [Basic Yelk Mushroom] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30757] as [Fragment of Basic Yelk Pelvis] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30727] as [Fragment of Basic Yelk Skin] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [737827] as [Grumbold(Arispotle)$Refugee$] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13341] as [&EMT&%s bows to %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13342] as [&EMT&%s bows respectfully.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13581] as [&EMT&%s smiles, excited.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407940] as [&EMT&%s is having a wicked time.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 net_manager.cpp 3401 : CNetManager::update : Connection Ready.
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=2/lastAck=-1/nextSentPacket=3)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=4/lastAck=2/nextSentPacket=5)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 1 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=6/lastAck=3/nextSentPacket=7)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 2 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 104 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=763) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=7/lastAck=5/nextSentPacket=9)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 86: number 0 part 3 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3034 : CLMPNET[036744E0]: Received a TOTAL generic action MP size: number 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3048 : CLMPNET[036744E0]: Received a generic action size 656
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 net_manager.cpp 312 : impulseCallBack : Received CONNECTION:USER_CHARS
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 connection.cpp 808 : impulseCallBack : received userChars list
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
-------------------------------
User Crash Callback:
-------------------------------
UserId: 291619
ShardId: 0
Application: ryzom_live
No user entity informations
ViewPosition: 0.00 0.00 0.00
Time in game: 1h 11min 28sec
LocalTime: 2006/07/27 10:03:04
ServerTick: 576620065
ConnectState: Connected
LocalAddress: :1200 (192.168.1.65)
Language: English
ClientVersion: 1.2.0.800
PatchVersion: 502
Client is online
NumServerHOP: 0
NumFarTP: 0
NumReselectPerso: 0
Connection Events:
Memory: 88MB/511MB
Process Virtual Memory: 527MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) XP 2000+ / x86 Family 6 Model 8 Stepping 1 / AuthenticAMD / 1667MHz / 1 Processors found
CPUID: 383fbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / ati2dvag.dll / RADEON 9550 / \\.\DISPLAY1 / driver version : 6.14.10.6561
3DCard: RADEON 9550, version 6.5.6.1
Sound mixer:
Playing sources: 0
Only two reasons for Access Violations, software and hardware (why there is no easy answer).
Does it only happen in SoR? If so, then do a check of the game data, it has a program for that in the game directory, if you can't launch the login window.
Did you test the RAM ?
Lien Chang
"We can't stop here, this is bat country" - Fear and Loathing in Las Vegas
(\(\
(^.^)
(")")
*This is the cute bunny virus, please copy this into your sig so it can spread.