(and Ryzom using 1.4gb of mem o.o)
evil error wrote:Access Violation exception generated at 0x5A5A59, thread attempts to read at <NULL>.
The thread attempted to read from or write to a virtual address for which it does not have the appropriate access.
-------------------------------
Log with no filter:
-------------------------------
2007/01/18 00:47:59 client_ryzom_rd.exe DBG c40 net_manager.cpp 758 : <impulseChat> Received CHAT : @{CC3F}Zenon says :@{FFFF} >.< with category sys
2007/01/18 00:47:59 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 47 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:47:59 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 51 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:47:59 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 51 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:00 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 36 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:00 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 51 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:00 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 47 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:00 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 39 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:00 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 32 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:01 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 130 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:01 client_ryzom_rd.exe INF c40 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 1 (len=603) at level 1 (channel 0)
2007/01/18 00:48:01 client_ryzom_rd.exe DBG c40 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 0), 1 actions (ReceivedAck=13472/lastAck=13431/nextSentPacket=13473)
2007/01/18 00:48:01 client_ryzom_rd.exe DBG c40 net_manager.cpp 758 : <impulseChat> Received CHAT : @{CC3F}Suaishun says :@{FFFF} never been to PR in the beta with category sys
2007/01/18 00:48:01 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 39 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:01 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 50 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:01 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 51 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:01 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 65 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:02 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 57 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:02 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 55 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:02 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 81 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:02 client_ryzom_rd.exe INF c40 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 1 (len=331) at level 1 (channel 1)
2007/01/18 00:48:02 client_ryzom_rd.exe DBG c40 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=13479/lastAck=13464/nextSentPacket=13480)
2007/01/18 00:48:02 client_ryzom_rd.exe DBG c40 net_manager.cpp 758 : <impulseChat> Received CHAT : @{CC3F}Zenon says :@{FFFF} i hate stun with category sys
2007/01/18 00:48:02 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 81 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:02 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 47 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:03 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 32 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:03 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 39 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:03 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 39 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:03 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 44 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:03 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 47 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:04 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 44 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:04 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 36 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:04 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 51 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:04 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 53 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:04 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 32 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:05 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 47 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:05 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 51 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:05 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 36 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:05 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 39 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:05 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 39 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:06 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 57 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:06 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 47 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:06 client_ryzom_rd.exe DBG c40 udp_sock.cpp 174 : LNETL0: Socket 120 received 117 bytes from peer rsfe113.juk.shards.nevrax.com:47852 (213.208.119.54)
2007/01/18 00:48:06 client_ryzom_rd.exe INF c40 impulse_decoder.cpp 72 : CLIMPD: received new impulsion 1 (len=419) at level 1 (channel 1)
2007/01/18 00:48:06 client_ryzom_rd.exe DBG c40 impulse_decoder.cpp 82 : CLIMPD: at level 1 (channel 1), 1 actions (ReceivedAck=13499/lastAck=13480/nextSentPacket=13500)
2007/01/18 00:48:10 client_ryzom_rd.exe DBG c40 sock.cpp 353 : LNETL0: Socket 1788 connecting to mx1.nevrax.com:25 (195.68.21.202)...
2007/01/18 00:48:10 client_ryzom_rd.exe DBG c40 sock.cpp 388 : LNETL0: Socket 1788 connected to mx1.nevrax.com:25 (195.68.21.202) (local :1363 (192.168.2.20))
2007/01/18 00:48:13 client_ryzom_rd.exe DBG c40 sock.cpp 304 : LNETL0: Socket 1788 closing for mx1.nevrax.com:25 (195.68.21.202) at :1363 (192.168.2.20)
2007/01/18 00:48:13 client_ryzom_rd.exe DBG c40 sock.cpp 353 : LNETL0: Socket 1784 connecting to mx1.nevrax.com:25 (195.68.21.202)...
2007/01/18 00:48:13 client_ryzom_rd.exe DBG c40 sock.cpp 388 : LNETL0: Socket 1784 connected to mx1.nevrax.com:25 (195.68.21.202) (local :1364 (192.168.2.20))
2007/01/18 00:48:16 client_ryzom_rd.exe DBG c40 sock.cpp 304 : LNETL0: Socket 1784 closing for mx1.nevrax.com:25 (195.68.21.202) at :1364 (192.168.2.20)
-------------------------------
User Crash Callback:
-------------------------------
UserId: 173269
HomeId: 103
ShardId: 103
SessionId: 37646
Role: ur_animator
Application: ryzom_live
Player Name: 'Rushin'
UserPosition: 22871.19 -1142.09 74.90
ViewPosition: 22871.19 -1142.09 74.90
Time in game: 4h 15min 57sec
LocalTime: 2007/01/18 00:48:57
ServerTick: 11557668
ConnectState: Connected
LocalAddress: :1312 (192.168.2.20)
Language: English
ClientVersion: 1.2.0.904
PatchVersion: 608
Client is online
NumServerHOP: 0
NumFarTP: 3
NumReselectPerso: 0
Connection Events: FTP, FTP, FTP
Memory: 1409MB/2047MB
Process Virtual Memory: 66MB
NeL Memory: 0B
OS: Microsoft Windows XP Service Pack 2 (Build 2600) (5.1 2600)
Processor: AMD Athlon(tm) 64 X2 Dual Core Processor 4200+ / x86 Family 15 Model 43 Stepping 1 / AuthenticAMD / 2200MHz / 2 Processors found
CPUID: 178bfbff
HT: NO
CpuMask: 1
NeL3D: Direct3d / nv4_disp.dll / NVIDIA GeForce 6800 GT / \\.\DISPLAY1 / driver version : 6.14.10.9131
3DCard: NVIDIA GeForce 6800 GT, version 9.1.3.1
No sound
-------------------------------