Access Violation

Got a problem getting things to work? Drop us a line here and you'll find all the help you need.
Post Reply
wolfcape
Posts: 34
Joined: Sat Jul 22, 2006 11:19 am

Crashing

Post by wolfcape »

I started up Ryzom repeatedly yesterday and today, and once was interuppted by the patching :P and the rest were notifications saying ACESS VIOLATION > :( So can somebody help me here? because i really DO want to get Ryzom running for more than a second ...please?
Started the game 25/7/06
Zerlin
Posts: 514
Joined: Thu Sep 16, 2004 10:00 am

Re: Crashing

Post by Zerlin »

If you were crashing during patching then your issues would most likely be heat or virus related.

Check to make sure that your cooling fins and fans are dust free and that the fans rotate smoothly.

For good measure you may want to run your antivirus software and scan your system thoroughly.

And for extra checks you may want to download memtest from http://www.memtest.org and run your RAM through it's paces.


At the very least delete the UNPACK folder and then select 'check data' from the launcher window.
Zerlin

GameMaster
Arispotle & Cho
wolfcape
Posts: 34
Joined: Sat Jul 22, 2006 11:19 am

Re: Crashing

Post by wolfcape »

Nah it didn't crash during patching. but i'll take a look at the dust though. but everything else is fine.
After i posted this, Ryzom ran perfectly well throughout the day, but it's iffy now

here's the report i'm getting
__________________________________________________
Access Violation exception generated at 0xAA0222, thread attempts to write at <NULL>.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------

Log with no filter:
-------------------------------
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16375] as [&MISM&You miss %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 32899] as [Puny Gingo] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16334] as [&DGM&You hit %s %s's %s for %i (%i) points of damage.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52507] as [front legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52504] as [body] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52510] as [rear legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [728705] as [Miew(Arispotle)] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16551] as [&SYS&You are now at full %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52540] as [health] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16584] as [&CHK&%s %s is already being quartered by %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16435] as [&SPLM&You invoke a beneficial spell on %s %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16462] as [&SPLM&You succesfully cast your spell.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16541] as [&SPLM&You heal %s %s %i hit points.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16552] as [&SYS&%s %s is now at full %s and no longer needs %s recovery spells.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16392] as [&MISM&%s %s has parried your attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16390] as [&MIS&You dodged %s %s's attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407775] as [&SYS&%s %s is now getting a penalty on his dodging.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 22599] as [Basic Yelk Mushroom] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30757] as [Fragment of Basic Yelk Pelvis] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30727] as [Fragment of Basic Yelk Skin] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [737827] as [Grumbold(Arispotle)$Refugee$] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13341] as [&EMT&%s bows to %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13342] as [&EMT&%s bows respectfully.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13581] as [&EMT&%s smiles, excited.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407940] as [&EMT&%s is having a wicked time.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 net_manager.cpp 3401 : CNetManager::update : Connection Ready.
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=2/lastAck=-1/nextSentPacket=3)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=4/lastAck=2/nextSentPacket=5)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 1 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=6/lastAck=3/nextSentPacket=7)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 2 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 104 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=763) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=7/lastAck=5/nextSentPacket=9)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 86: number 0 part 3 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3034 : CLMPNET[036744E0]: Received a TOTAL generic action MP size: number 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3048 : CLMPNET[036744E0]: Received a generic action size 656
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 net_manager.cpp 312 : impulseCallBack : Received CONNECTION:USER_CHARS
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 connection.cpp 808 : impulseCallBack : received userChars list
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
-------------------------------
User Crash Callback:
-------------------------------
UserId: 291619
ShardId: 0
Application: ryzom_live
No user entity informations
ViewPosition: 0.00 0.00 0.00
Time in game: 1h 11min 28sec
LocalTime: 2006/07/27 10:03:04
ServerTick: 576620065
ConnectState: Connected
LocalAddress: :1200 (192.168.1.65)
Language: English
ClientVersion: 1.2.0.800
PatchVersion: 502
Client is online
NumServerHOP: 0
NumFarTP: 0
NumReselectPerso: 0
Connection Events:
Memory: 88MB/511MB
Process Virtual Memory: 527MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) XP 2000+ / x86 Family 6 Model 8 Stepping 1 / AuthenticAMD / 1667MHz / 1 Processors found
CPUID: 383fbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / ati2dvag.dll / RADEON 9550 / \\.\DISPLAY1 / driver version : 6.14.10.6561
3DCard: RADEON 9550, version 6.5.6.1
Sound mixer:
Playing sources: 0

__________________________________
Last edited by wolfcape on Thu Jul 27, 2006 9:05 am, edited 1 time in total.
Started the game 25/7/06
wolfcape
Posts: 34
Joined: Sat Jul 22, 2006 11:19 am

Access Violation

Post by wolfcape »

I keep getting this message, i'm in a rush so i'll post the report and hope you brainboxes can figure it out.

here's the report i'm getting
__________________________________________________
Access Violation exception generated at 0xAA0222, thread attempts to write at <NULL>.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------

Log with no filter:
-------------------------------
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16375] as [&MISM&You miss %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 32899] as [Puny Gingo] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16334] as [&DGM&You hit %s %s's %s for %i (%i) points of damage.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52507] as [front legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52504] as [body] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52510] as [rear legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [728705] as [Miew(Arispotle)] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16551] as [&SYS&You are now at full %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52540] as [health] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16584] as [&CHK&%s %s is already being quartered by %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16435] as [&SPLM&You invoke a beneficial spell on %s %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16462] as [&SPLM&You succesfully cast your spell.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16541] as [&SPLM&You heal %s %s %i hit points.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16552] as [&SYS&%s %s is now at full %s and no longer needs %s recovery spells.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16392] as [&MISM&%s %s has parried your attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16390] as [&MIS&You dodged %s %s's attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407775] as [&SYS&%s %s is now getting a penalty on his dodging.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 22599] as [Basic Yelk Mushroom] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30757] as [Fragment of Basic Yelk Pelvis] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30727] as [Fragment of Basic Yelk Skin] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [737827] as [Grumbold(Arispotle)$Refugee$] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13341] as [&EMT&%s bows to %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13342] as [&EMT&%s bows respectfully.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13581] as [&EMT&%s smiles, excited.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407940] as [&EMT&%s is having a wicked time.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 net_manager.cpp 3401 : CNetManager::update : Connection Ready.
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=2/lastAck=-1/nextSentPacket=3)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=4/lastAck=2/nextSentPacket=5)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 1 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=6/lastAck=3/nextSentPacket=7)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 2 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 104 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=763) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=7/lastAck=5/nextSentPacket=9)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 86: number 0 part 3 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3034 : CLMPNET[036744E0]: Received a TOTAL generic action MP size: number 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3048 : CLMPNET[036744E0]: Received a generic action size 656
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 net_manager.cpp 312 : impulseCallBack : Received CONNECTION:USER_CHARS
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 connection.cpp 808 : impulseCallBack : received userChars list
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
-------------------------------
User Crash Callback:
-------------------------------
UserId: 291619
ShardId: 0
Application: ryzom_live
No user entity informations
ViewPosition: 0.00 0.00 0.00
Time in game: 1h 11min 28sec
LocalTime: 2006/07/27 10:03:04
ServerTick: 576620065
ConnectState: Connected
LocalAddress: :1200 (192.168.1.65)
Language: English
ClientVersion: 1.2.0.800
PatchVersion: 502
Client is online
NumServerHOP: 0
NumFarTP: 0
NumReselectPerso: 0
Connection Events:
Memory: 88MB/511MB
Process Virtual Memory: 527MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) XP 2000+ / x86 Family 6 Model 8 Stepping 1 / AuthenticAMD / 1667MHz / 1 Processors found
CPUID: 383fbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / ati2dvag.dll / RADEON 9550 / \\.\DISPLAY1 / driver version : 6.14.10.6561
3DCard: RADEON 9550, version 6.5.6.1
Sound mixer:
Playing sources: 0
Started the game 25/7/06
wolfcape
Posts: 34
Joined: Sat Jul 22, 2006 11:19 am

Re: Access Violation

Post by wolfcape »

And now when i try and type in my password it shuts down without an error report D :D :D :D D:
Started the game 25/7/06
wolfcape
Posts: 34
Joined: Sat Jul 22, 2006 11:19 am

Re: Access Violation

Post by wolfcape »

Ugh is anyone going to reply? (Bumping the topic)
Started the game 25/7/06
User avatar
rushin
Posts: 1889
Joined: Tue Sep 28, 2004 11:40 pm

Re: Access Violation

Post by rushin »

you tried forcing openGL from the config?

and usual virus/spyware scan, memtest, overheating, etc :-)
rushin ~ asleep
User avatar
magick1
Posts: 857
Joined: Fri Oct 15, 2004 3:09 pm

Re: Access Violation

Post by magick1 »

Only two reasons for Access Violations, software and hardware (why there is no easy answer).

Does it only happen in SoR? If so, then do a check of the game data, it has a program for that in the game directory, if you can't launch the login window.

Did you test the RAM ?
Lien Chang

"We can't stop here, this is bat country" - Fear and Loathing in Las Vegas

(\(\
(^.^)
(")")
*This is the cute bunny virus, please copy this into your sig so it can spread.
Post Reply

Return to “Technical Support”