View Single Post
Old 07-19-2014   #65
Mystic
チェン!
Administrator
 
Mystic's Avatar
Default

While playing record attack in ERZ3. Crash occurred when hitting Metal, with the Attraction Shield in case that's relevant.

Spoiler:
SRB2 v2.1.8 -ERROR LOG-


srb2win caused an Access Violation in module srb2win.exe at 0023:0042ab3e.
Exception handler called in main thread.
Error occurred at 7/19/2014 00:03:28.
C:\Users\Mystic\srb2\v21\srb2win.exe, run by Mystic.
4 processor(s), type 586 6.10759.
Program Memory from 0x00010000 to 0x7FFEFFFF
3948 MBytes physical memory.
Read from location 12683b18 caused an access violation.

Registers:
EAX=072f5df3 CS=0023 EIP=0042ab3e EFLGS=00010a06
EBX=074bfe68 SS=002b ESP=0028fb40 EBP=0028fb98
ECX=072f5e0d DS=002b ESI=30303030 FS=0053
EDX=12121200 ES=002b EDI=00000000 GS=002b
Command Line parameters: Bytes at CS : EIP:
8b ?? 82 ?? 18 ?? 29 ?? 56 ?? 00 ?? 89 ?? 4b ?? 14 ?? a8 ?? 04 ?? 74 ?? bb ?? a9 ?? 00 ?? 00 ??
Stack dump:
0028fb40: 08fcb6d8 ce6b92d1 30303030 30303030 30303030 30303030 30303100 f8800000
0028fb60: 0e9ca330 ce6b92d1 fffffc31 fffffa93 fffc3144 08a2737d 30030000 00000000
0028fb80: 00000001 00000000 0028fcd8 09876d68 00000001 00000000 0028fcd8 004a4eb7
0028fba0: 00000020 00000001 0028fbe8 0040c321 071f7294 00601f48 00000014 00000001
0028fbc0: 00000000 00000000 00000000 00000000 00000000 00000050 0028fca8 00000000
0028fbe0: 00000050 00000000 0028fca8 00406c78 00000000 00000000 00000000 071f7294
0028fc00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0028fc20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000001
0028fc40: 00000020 005ffc30 0028fc98 00000014 00000007 00000001 0028fc88 0040bf0c
0028fc60: 0000c550 0000c550 00000000 00000000 00000000 00000000 00000000 0000c551
0028fc80: 0000c54f 0000000f 0028fca8 00404a05 00000000 00000000 00000014 00000020
0028fca0: 00000001 0000c551 0028fdb8 0040a148 00000000 00000000 00000000 00000000
0028fcc0: 00000000 00000000 0028fce8 00000020 00000010 0066ec14 0028fda8 0042d299
0028fce0: 00000001 006582f0 00000008 00670d70 0000c751 0000c751 0028fdb8 00406c78
0028fd00: 00000000 00000000 00000000 00000001 00000000 00000001 0000c751 00000000
0028fd20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0028fd40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0028fd60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0028fd80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000001
0028fda0: 0000c751 00000000 0028fdf8 0040b1f9 00000001 0000c751 0028fdf8 0040b191
0028fdc0: 00000000 9fcef6a8 00000000 0000001a 0000c750 0000c750 0028fe08 004d6fd5
0028fde0: 9fcef6a8 0000001a 00223228 00000001 0000c751 0000c751 0028fe28 00403450
0028fe00: 00000001 00000000 0028fe28 0040343d 00000106 00000106 0000c752 00000078
0028fe20: 004001ca 005bfbf3 0028feb8 00402a53 77326b73 007931f0 00000024 00030003
0028fe40: 00400178 000ca000 00641000 00400000 00000027 00000000 20000000 00000040
0028fe60: fffffffd ffffffe7 00000143 000000cb 00000030 00000003 00401e70 00000000
0028fe80: 00000000 00400000 00000000 00010007 01900011 00000000 005bfb40 00000000
0028fea0: 007931f0 00010000 00791590 00762c17 00000000 00000000 0028ff38 0051b757
0028fec0: 00400000 00000000 00762c17 00000001 0028feb0 00000002 005fe460 0051b684
0028fee0: 00000044 00791590 007977b0 007931f0 00000000 00000000 00000000 00000000
0028ff00: 00000000 00000000 00000000 00000401 00000001 00000000 00000000 00010001
0028ff20: 00000000 75f29e34 0028ff68 00401151 005ff004 ffffffff 0028ff68 004011d9
0028ff40: 00000001 008d29e0 008d1668 004011b7 75f2161e 75f215a0 00000002 008d1668
0028ff60: 00000000 7efde000 0028ff88 00401243 00000002 00000000 00000000 00000000
0028ff80: 00000000 00000000 0028ff94 7525338a 7efde000 0028ffd4 77329f72 7efde000
0028ffa0: 748f76ab 00000000 00000000 7efde000 c0000005 752776f7 752776f7 0028ffa0
0028ffc0: 0028f58c ffffffff 773671f5 03964c2f 00000000 0028ffec 77329f45 00709e90
0028ffe0: 7efde000 00000000 00000000 00000000 00000000 00709e90 7efde000 00000000
Exception encountered during stack dump.

Module list: names, addresses, sizes, time stamps and file times:
C:\Users\Mystic\srb2\v21\srb2win.exe, loaded at 0x00400000 - 1122585 bytes - 5352a8d2 - file date is 4/19/2014 13:55:20
C:\Windows\system32\igdumd32.dll, loaded at 0x02d80000 - 5692416 bytes - 4d8d3d61 - file date is 3/26/2011 09:12:06
C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\detoured.dll, loaded at 0x0f000000 - 13088 bytes - 45b12bea - file date is 11/14/2013 07:58:10
C:\Windows\system32\igdumdx32.dll, loaded at 0x10000000 - 575488 bytes - 4d8d3c9b - file date is 3/26/2011 09:08:46
C:\Users\Mystic\srb2\v21\exchndl.dll, loaded at 0x603c0000 - 392704 bytes - 41486e57 - file date is 3/15/2014 13:06:10
C:\Users\Mystic\srb2\v21\libintl-8.dll, loaded at 0x61cc0000 - 347910 bytes - 4d4a9e38 - file date is 3/15/2014 13:06:18
C:\Users\Mystic\srb2\v21\fmodex.dll, loaded at 0x63c60000 - 1256448 bytes - 516bb343 - file date is 3/15/2014 13:06:04
C:\Windows\system32\DDRAW.DLL, loaded at 0x6bd00000 - 531968 bytes - 4a5bd9b8 - file date is 7/13/2009 21:15:12
C:\Windows\system32\DINPUT.DLL, loaded at 0x6ca10000 - 136704 bytes - 4a5bd9c0 - file date is 7/13/2009 21:15:12
C:\Users\Mystic\srb2\v21\libgme.dll, loaded at 0x6e200000 - 488210 bytes - 516a380e - file date is 3/15/2014 13:05:58
C:\Windows\System32\PROPSYS.dll, loaded at 0x6eec0000 - 988160 bytes - 4ce7b983 - file date is 11/20/2010 23:24:10
C:\Windows\System32\MMDevApi.dll, loaded at 0x6efc0000 - 213504 bytes - 4ce7b892 - file date is 11/20/2010 23:23:52
C:\Windows\system32\PowrProf.dll, loaded at 0x6fb90000 - 145408 bytes - 4a5bdb0c - file date is 7/13/2009 21:16:14
C:\Windows\system32\nvumdshim.dll, loaded at 0x715a0000 - 1242400 bytes - 5280d80e - file date is 11/14/2013 07:58:18
C:\Windows\system32\HID.DLL, loaded at 0x71b40000 - 22016 bytes - 4a5bd9ec - file date is 7/13/2009 21:15:26
C:\Windows\system32\MSACM32.dll, loaded at 0x71b50000 - 72192 bytes - 4a5bda4e - file date is 7/13/2009 21:15:44
C:\Windows\system32\WSOCK32.dll, loaded at 0x72500000 - 15360 bytes - 4a5bdb63 - file date is 7/13/2009 21:16:22
C:\Windows\system32\WINNSI.DLL, loaded at 0x725b0000 - 16896 bytes - 4a5bdb43 - file date is 7/13/2009 21:16:20
C:\Windows\system32\IPHLPAPI.DLL, loaded at 0x725c0000 - 103936 bytes - 4ce7b859 - file date is 11/20/2010 23:24:34
C:\Windows\system32\DCIMAN32.dll, loaded at 0x734b0000 - 10240 bytes - 51b01541 - file date is 6/6/2013 00:50:58
C:\Windows\system32\dwmapi.dll, loaded at 0x73ae0000 - 67072 bytes - 4a5bda07 - file date is 7/13/2009 21:15:14
C:\Windows\system32\uxtheme.dll, loaded at 0x73b00000 - 245760 bytes - 4a5bdb3c - file date is 7/13/2009 21:11:26
C:\Windows\system32\AUDIOSES.DLL, loaded at 0x73cf0000 - 195584 bytes - 4ce7b725 - file date is 11/20/2010 23:23:56
C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\nvdxgiwrap.dll, loaded at 0x74810000 - 226296 bytes - 5280d7de - file date is 11/14/2013 07:58:12
C:\Program Files (x86)\NVIDIA Corporation\CoProcManager\nvd3d9wrap.dll, loaded at 0x74850000 - 324128 bytes - 5280d7e2 - file date is 11/14/2013 07:58:08
C:\Windows\SysWOW64\nvinit.dll, loaded at 0x74ae0000 - 141336 bytes - 5280d825 - file date is 11/14/2013 07:58:12
C:\Windows\system32\WINMM.dll, loaded at 0x74b10000 - 194048 bytes - 4ce7ba42 - file date is 11/20/2010 23:24:18
C:\Windows\syswow64\CRYPTBASE.dll, loaded at 0x74cf0000 - 36864 bytes - 4a5bbf41 - file date is 7/13/2009 21:15:08
C:\Windows\syswow64\SspiCli.dll, loaded at 0x74d00000 - 96768 bytes - 53907ded - file date is 6/5/2014 10:25:50
C:\Windows\syswow64\SETUPAPI.dll, loaded at 0x74d60000 - 1667584 bytes - 4ce7b9d9 - file date is 11/20/2010 23:23:52
C:\Windows\syswow64\ADVAPI32.DLL, loaded at 0x75030000 - 640512 bytes - 521ea86a - file date is 12/3/2013 05:46:08
C:\Windows\syswow64\KERNELBASE.dll, loaded at 0x75170000 - 274944 bytes - 53159a86 - file date is 3/4/2014 05:16:20
C:\Windows\syswow64\kernel32.dll, loaded at 0x75240000 - 1114112 bytes - 53159a85 - file date is 3/4/2014 05:16:18
C:\Windows\syswow64\OLEAUT32.dll, loaded at 0x75360000 - 571904 bytes - 4e58702a - file date is 8/27/2011 00:26:28
C:\Windows\syswow64\RPCRT4.dll, loaded at 0x753f0000 - 663552 bytes - 51db9710 - file date is 7/9/2013 00:52:34
C:\Windows\syswow64\SHLWAPI.dll, loaded at 0x754e0000 - 350208 bytes - 4ce7b9e2 - file date is 11/20/2010 23:23:50
C:\Windows\syswow64\MSCTF.dll, loaded at 0x75550000 - 828928 bytes - 4a5bda69 - file date is 7/13/2009 21:15:44
C:\Windows\syswow64\MSASN1.dll, loaded at 0x75650000 - 34304 bytes - 4ce7b8c9 - file date is 11/20/2010 23:23:50
C:\Windows\syswow64\CLBCatQ.DLL, loaded at 0x75880000 - 522240 bytes - 4a5bd9b1 - file date is 7/13/2009 21:15:04
C:\Windows\syswow64\NSI.dll, loaded at 0x75ae0000 - 8704 bytes - 4a5bdad9 - file date is 7/13/2009 21:16:12
C:\Windows\syswow64\USP10.dll, loaded at 0x75b00000 - 626688 bytes - 5359c2c9 - file date is 4/24/2014 22:06:18
C:\Windows\syswow64\CFGMGR32.dll, loaded at 0x75c00000 - 145920 bytes - 4ddb8851 - file date is 5/24/2011 06:39:40
C:\Windows\syswow64\WINTRUST.dll, loaded at 0x75c30000 - 175104 bytes - 51db9720 - file date is 7/9/2013 00:52:12
C:\Windows\syswow64\CRYPT32.dll, loaded at 0x75c60000 - 1168384 bytes - 52506fc6 - file date is 10/5/2013 15:57:26
C:\Windows\syswow64\ole32.dll, loaded at 0x75d90000 - 1414144 bytes - 4ce7b96f - file date is 11/20/2010 23:24:02
C:\Windows\SysWOW64\sechost.dll, loaded at 0x75ef0000 - 92160 bytes - 4a5bdb04 - file date is 7/13/2009 21:16:14
C:\Windows\syswow64\msvcrt.dll, loaded at 0x75f10000 - 690688 bytes - 4eeaf722 - file date is 12/16/2011 03:53:00
C:\Windows\system32\IMM32.DLL, loaded at 0x76c80000 - 119808 bytes - 4ce7ba53 - file date is 11/20/2010 23:24:26
C:\Windows\syswow64\LPK.dll, loaded at 0x76ce0000 - 25600 bytes - 51b0169d - file date is 6/6/2013 00:57:02
C:\Windows\syswow64\WS2_32.dll, loaded at 0x76cf0000 - 206848 bytes - 4ce7ba68 - file date is 11/20/2010 23:23:56
C:\Windows\syswow64\USER32.dll, loaded at 0x76d30000 - 833024 bytes - 4ce7ba59 - file date is 11/20/2010 23:24:22
C:\Windows\syswow64\GDI32.dll, loaded at 0x76e40000 - 311808 bytes - 524ccfcc - file date is 10/2/2013 22:00:46
C:\Windows\syswow64\DEVOBJ.dll, loaded at 0x76ed0000 - 64512 bytes - 4ddb887d - file date is 5/24/2011 06:40:06
C:\Windows\SysWOW64\ntdll.dll, loaded at 0x772f0000 - 1292192 bytes - 521ea8e7 - file date is 12/3/2013 05:46:08

-------------------

Error occured on Saturday, July 19, 2014 at 00:03:27.

C:\Users\Mystic\srb2\v21\srb2win.exe caused an Access Violation at location 0042ab3e in module C:\Users\Mystic\srb2\v21\srb2win.exe Reading from location 12683b18.

Registers:
eax=072f5df3 ebx=074bfe68 ecx=072f5e0d edx=12121200 esi=30303030 edi=00000000
eip=0042ab3e esp=0028fb40 ebp=0028fb98 iopl=0 ov up ei pl nz na po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010a06

Call stack:
0042AB3E C:\Users\Mystic\srb2\v21\srb2win.exe:0042AB3E
004A4EB7 C:\Users\Mystic\srb2\v21\srb2win.exe:004A4EB7
0042D299 C:\Users\Mystic\srb2\v21\srb2win.exe:0042D299
0040B1F9 C:\Users\Mystic\srb2\v21\srb2win.exe:0040B1F9
00403450 C:\Users\Mystic\srb2\v21\srb2win.exe:00403450
00402A53 C:\Users\Mystic\srb2\v21\srb2win.exe:00402A53
0051B757 C:\Users\Mystic\srb2\v21\srb2win.exe:0051B757
004011D9 C:\Users\Mystic\srb2\v21\srb2win.exe:004011D9
00401243 C:\Users\Mystic\srb2\v21\srb2win.exe:00401243
7525338A C:\Windows\syswow64\kernel32.dll:7525338A BaseThreadInitThunk
77329F72 C:\Windows\SysWOW64\ntdll.dll:77329F72 RtlInitializeExceptionChain
77329F45 C:\Windows\SysWOW64\ntdll.dll:77329F45 RtlInitializeExceptionChain


Mystic is offline   Reply With Quote