Page 1 of 1

Crashing

Posted: Wed Jul 26, 2006 8:26 am
by wolfcape
I started up Ryzom repeatedly yesterday and today, and once was interuppted by the patching :P and the rest were notifications saying ACESS VIOLATION > :( So can somebody help me here? because i really DO want to get Ryzom running for more than a second ...please?

Re: Crashing

Posted: Wed Jul 26, 2006 10:32 am
by Zerlin
If you were crashing during patching then your issues would most likely be heat or virus related.

Check to make sure that your cooling fins and fans are dust free and that the fans rotate smoothly.

For good measure you may want to run your antivirus software and scan your system thoroughly.

And for extra checks you may want to download memtest from http://www.memtest.org and run your RAM through it's paces.


At the very least delete the UNPACK folder and then select 'check data' from the launcher window.

Re: Crashing

Posted: Thu Jul 27, 2006 8:04 am
by wolfcape
Nah it didn't crash during patching. but i'll take a look at the dust though. but everything else is fine.
After i posted this, Ryzom ran perfectly well throughout the day, but it's iffy now

here's the report i'm getting
__________________________________________________
Access Violation exception generated at 0xAA0222, thread attempts to write at <NULL>.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------

Log with no filter:
-------------------------------
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16375] as [&MISM&You miss %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 32899] as [Puny Gingo] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16334] as [&DGM&You hit %s %s's %s for %i (%i) points of damage.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52507] as [front legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52504] as [body] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52510] as [rear legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [728705] as [Miew(Arispotle)] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16551] as [&SYS&You are now at full %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52540] as [health] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16584] as [&CHK&%s %s is already being quartered by %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16435] as [&SPLM&You invoke a beneficial spell on %s %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16462] as [&SPLM&You succesfully cast your spell.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16541] as [&SPLM&You heal %s %s %i hit points.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16552] as [&SYS&%s %s is now at full %s and no longer needs %s recovery spells.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16392] as [&MISM&%s %s has parried your attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16390] as [&MIS&You dodged %s %s's attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407775] as [&SYS&%s %s is now getting a penalty on his dodging.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 22599] as [Basic Yelk Mushroom] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30757] as [Fragment of Basic Yelk Pelvis] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30727] as [Fragment of Basic Yelk Skin] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [737827] as [Grumbold(Arispotle)$Refugee$] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13341] as [&EMT&%s bows to %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13342] as [&EMT&%s bows respectfully.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13581] as [&EMT&%s smiles, excited.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407940] as [&EMT&%s is having a wicked time.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 net_manager.cpp 3401 : CNetManager::update : Connection Ready.
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=2/lastAck=-1/nextSentPacket=3)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=4/lastAck=2/nextSentPacket=5)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 1 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=6/lastAck=3/nextSentPacket=7)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 2 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 104 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=763) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=7/lastAck=5/nextSentPacket=9)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 86: number 0 part 3 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3034 : CLMPNET[036744E0]: Received a TOTAL generic action MP size: number 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3048 : CLMPNET[036744E0]: Received a generic action size 656
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 net_manager.cpp 312 : impulseCallBack : Received CONNECTION:USER_CHARS
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 connection.cpp 808 : impulseCallBack : received userChars list
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
-------------------------------
User Crash Callback:
-------------------------------
UserId: 291619
ShardId: 0
Application: ryzom_live
No user entity informations
ViewPosition: 0.00 0.00 0.00
Time in game: 1h 11min 28sec
LocalTime: 2006/07/27 10:03:04
ServerTick: 576620065
ConnectState: Connected
LocalAddress: :1200 (192.168.1.65)
Language: English
ClientVersion: 1.2.0.800
PatchVersion: 502
Client is online
NumServerHOP: 0
NumFarTP: 0
NumReselectPerso: 0
Connection Events:
Memory: 88MB/511MB
Process Virtual Memory: 527MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) XP 2000+ / x86 Family 6 Model 8 Stepping 1 / AuthenticAMD / 1667MHz / 1 Processors found
CPUID: 383fbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / ati2dvag.dll / RADEON 9550 / \\.\DISPLAY1 / driver version : 6.14.10.6561
3DCard: RADEON 9550, version 6.5.6.1
Sound mixer:
Playing sources: 0

__________________________________

Access Violation

Posted: Thu Jul 27, 2006 10:59 am
by wolfcape
I keep getting this message, i'm in a rush so i'll post the report and hope you brainboxes can figure it out.

here's the report i'm getting
__________________________________________________
Access Violation exception generated at 0xAA0222, thread attempts to write at <NULL>.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------

Log with no filter:
-------------------------------
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16375] as [&MISM&You miss %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 32899] as [Puny Gingo] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16334] as [&DGM&You hit %s %s's %s for %i (%i) points of damage.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52507] as [front legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52504] as [body] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52510] as [rear legs] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [728705] as [Miew(Arispotle)] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16551] as [&SYS&You are now at full %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 52540] as [health] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16584] as [&CHK&%s %s is already being quartered by %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16435] as [&SPLM&You invoke a beneficial spell on %s %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16462] as [&SPLM&You succesfully cast your spell.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16541] as [&SPLM&You heal %s %s %i hit points.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16552] as [&SYS&%s %s is now at full %s and no longer needs %s recovery spells.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16392] as [&MISM&%s %s has parried your attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 16390] as [&MIS&You dodged %s %s's attack.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407775] as [&SYS&%s %s is now getting a penalty on his dodging.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 22599] as [Basic Yelk Mushroom] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30757] as [Fragment of Basic Yelk Pelvis] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 30727] as [Fragment of Basic Yelk Skin] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [737827] as [Grumbold(Arispotle)$Refugee$] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13341] as [&EMT&%s bows to %s.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13342] as [&EMT&%s bows respectfully.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [ 13581] as [&EMT&%s smiles, excited.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 string_manager_client.cpp 162 : SM : loading string [407940] as [&EMT&%s is having a wicked time.] in cache
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 net_manager.cpp 3401 : CNetManager::update : Connection Ready.
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=2/lastAck=-1/nextSentPacket=3)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=4/lastAck=2/nextSentPacket=5)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 1 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 208 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=1595) at level 1 (channel 1)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=6/lastAck=3/nextSentPacket=7)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 190: number 0 part 2 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 104 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 2 (len=763) at level 1 (channel 0)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=7/lastAck=5/nextSentPacket=9)
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3062 : CLMPNET[01488578]: Received a generic action MP size 86: number 0 part 3 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3034 : CLMPNET[036744E0]: Received a TOTAL generic action MP size: number 0 nbblock 4
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 network_connection.cpp 3048 : CLMPNET[036744E0]: Received a generic action size 656
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 net_manager.cpp 312 : impulseCallBack : Received CONNECTION:USER_CHARS
2006/07/27 10:02:58 client_ryzom_rd.exe INF 6e0 connection.cpp 808 : impulseCallBack : received userChars list
2006/07/27 10:02:58 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
2006/07/27 10:02:59 client_ryzom_rd.exe DBG 6e0 udp_sock.cpp 174 : LNETL0: Socket 140 received 9 bytes from peer rsfe034.juk.shards.nevrax.com:47851 (213.208.119.149)
-------------------------------
User Crash Callback:
-------------------------------
UserId: 291619
ShardId: 0
Application: ryzom_live
No user entity informations
ViewPosition: 0.00 0.00 0.00
Time in game: 1h 11min 28sec
LocalTime: 2006/07/27 10:03:04
ServerTick: 576620065
ConnectState: Connected
LocalAddress: :1200 (192.168.1.65)
Language: English
ClientVersion: 1.2.0.800
PatchVersion: 502
Client is online
NumServerHOP: 0
NumFarTP: 0
NumReselectPerso: 0
Connection Events:
Memory: 88MB/511MB
Process Virtual Memory: 527MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) XP 2000+ / x86 Family 6 Model 8 Stepping 1 / AuthenticAMD / 1667MHz / 1 Processors found
CPUID: 383fbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / ati2dvag.dll / RADEON 9550 / \\.\DISPLAY1 / driver version : 6.14.10.6561
3DCard: RADEON 9550, version 6.5.6.1
Sound mixer:
Playing sources: 0

Re: Access Violation

Posted: Thu Jul 27, 2006 11:01 am
by wolfcape
And now when i try and type in my password it shuts down without an error report D :D :D :D D:

Re: Access Violation

Posted: Thu Jul 27, 2006 12:25 pm
by wolfcape
Ugh is anyone going to reply? (Bumping the topic)

Re: Access Violation

Posted: Thu Jul 27, 2006 12:32 pm
by rushin
you tried forcing openGL from the config?

and usual virus/spyware scan, memtest, overheating, etc :-)

Re: Access Violation

Posted: Fri Jul 28, 2006 4:00 am
by magick1
Only two reasons for Access Violations, software and hardware (why there is no easy answer).

Does it only happen in SoR? If so, then do a check of the game data, it has a program for that in the game directory, if you can't launch the login window.

Did you test the RAM ?