Jump to content
Eternal Lands Official Forums
eagleprince

Please don't ban me... was just hungry!

Recommended Posts

Erm, went to TG storage to do some manuing, and was trying to save on feasting pots. Had loads of FE and meat, so I picked some sticks and started a fire. As soon as I cooked the meat, bang! EL client explodes in my face! Tried again... logged on, started fire, started cooking meat, and guess what? BANG again!!

 

Anyone noticed this in TG or anywhere, or is cooking in storage just against teh rules?! :wub:

I was not trying to crash teh server! Honest! :(

Edited by EaglePrince

Share this post


Link to post
Share on other sites

In general we do not support cooking at all. We support eating raw, bloody and juicy meat.

Now seriously:

Have you thought of reporting it as a bug? Can somebody else confirm it?

Share this post


Link to post
Share on other sites

In general we do not support cooking at all. We support eating raw, bloody and juicy meat.

Now seriously:

Have you thought of reporting it as a bug? Can somebody else confirm it?

 

Just tried again... cooked 1 meat and ***BOOM***

 

I will report a bug if anyone else has had a similar exp.

Share this post


Link to post
Share on other sites

Might be worthwhile to give some details about your system, such as:

CPU Speed,

RAM,

GPU (Graphics Card) Model, make and memory size,

Operating System.

Share this post


Link to post
Share on other sites

Might be worthwhile to give some details about your system, such as:

CPU Speed,

RAM,

GPU (Graphics Card) Model, make and memory size,

Operating System.

 

My system is a home built PC with :-

 

O/S Slackware Linux 10.2

Graphics card.: ATI Sapphire 9550 256MB

RAM: 1 Gig Corsair DDR 400

CPU AMD 2600+

Mobo : Gigabyte 7N400 Pro 2.

 

On other thing, I notice significant slowdown down to 2-3 FPS in MM in particular when it's dark.

I also set an FPS limit of 35, cos anything higher than that used to hang my pc when playing under Win2K.

Share this post


Link to post
Share on other sites

Hmmm, I suppose your running the latest drivers? I know of someone else with the client crashing when using F9 to create a fire (maybe try this?), except they are running with NVidia IIRC (which perhaps suggests a bug more than a driver/GPU/X issue?)

 

It might also help if you run the client with GDB and paste a backtrace.

Share this post


Link to post
Share on other sites

I tried cooking meat in TG storage, no prob at all :)

 

Perhaps youre a vegetarian at heart..;)

 

*hugs*

 

Jez

Share this post


Link to post
Share on other sites

Hmmm, I suppose your running the latest drivers? I know of someone else with the client crashing when using F9 to create a fire (maybe try this?), except they are running with NVidia IIRC (which perhaps suggests a bug more than a driver/GPU/X issue?)

 

It might also help if you run the client with GDB and paste a backtrace.

 

I tried booting into Windows 2K to see if it behaves differently. However I got this

 

The error message was like this.

I tracked down the Dr Watson error log and found this :-

 

<Watson's log start>

 

Microsoft ® Windows 2000 Version 5.00 DrWtsn32

Copyright © 1985-1999 Microsoft Corp. All rights reserved.

 

 

 

Application exception occurred:

App: (pid=332)

When: 3/24/2006 @ 16:58:23.390

Exception number: c0000005 (access violation)

 

*----> System Information <----*

Computer Name: XXXXXX

User Name: XXXX

Number of Processors: 1

Processor Type: x86 Family 6 Model 10 Stepping 0

Windows 2000 Version: 5.0

Current Build: 2195

Service Pack: 4

Current Type: Uniprocessor Free

Registered Organization: JKL Inc.

Registered Owner: XXXX

 

*----> Task List <----*

0 Idle.exe

8 System.exe

168 smss.exe

196 csrss.exe

216 winlogon.exe

244 services.exe

256 lsass.exe

380 ati2evxx.exe

460 svchost.exe

488 SPOOLSV.exe

528 iSafe.exe

544 svchost.exe

604 regsvc.exe

620 mstask.exe

648 winmgmt.exe

692 svchost.exe

916 ati2evxx.exe

964 explorer.exe

1076 AirGCFG.exe

1104 WZCSLDR2.exe

1124 atiptaxx.exe

1044 CAVTray.exe

336 CAVRid.exe

1068 internat.exe

1276 CAV.exe

744 VetMsg.exe

976 firefox.exe

332 el.exe

476 drwtsn32.exe

0 _Total.exe

 

(00400000 - 014CB000)

(77F80000 - 77FFB000)

(10000000 - 100F2000)

(7C4E0000 - 7C599000)

(77570000 - 775A0000)

(77E10000 - 77E75000)

(77F40000 - 77F7C000)

(7C2D0000 - 7C332000)

(77D30000 - 77DA1000)

(77A50000 - 77B47000)

(014D0000 - 015A9000)

(78000000 - 78045000)

(60A00000 - 60AF1000)

(6FAC0000 - 6FADF000)

(69510000 - 695D7000)

(51000000 - 5104D000)

(728A0000 - 728A6000)

(015B0000 - 016AE000)

(652C0000 - 6539D000)

(75050000 - 75058000)

(75030000 - 75044000)

(75020000 - 75028000)

(016B0000 - 016C2000)

(016D0000 - 016D6000)

(016E0000 - 0171C000)

(782F0000 - 78538000)

(77C70000 - 77CBA000)

(77B50000 - 77BD9000)

(01720000 - 01727000)

(01730000 - 0173D000)

(01740000 - 01832000)

(5F580000 - 5F620000)

(6E420000 - 6E426000)

(75E60000 - 75E7A000)

(6F9A0000 - 6F9A8000)

(77880000 - 7790E000)

(7C0F0000 - 7C152000)

(20430000 - 20A6F000)

(775A0000 - 77626000)

(779B0000 - 77A4B000)

(51080000 - 510DA000)

(77820000 - 77827000)

(759B0000 - 759B6000)

(77560000 - 77568000)

(77400000 - 77408000)

(77410000 - 77423000)

(782C0000 - 782CC000)

(77980000 - 779A4000)

(77340000 - 77353000)

(77520000 - 77525000)

(77320000 - 77337000)

(75150000 - 7515F000)

(75170000 - 751BF000)

(7C340000 - 7C34F000)

(751C0000 - 751C6000)

(77950000 - 7797A000)

(773B0000 - 773DF000)

(77380000 - 773A3000)

(77830000 - 7783E000)

(774E0000 - 77513000)

(774C0000 - 774D1000)

(77530000 - 77552000)

(77360000 - 77379000)

(777E0000 - 777E8000)

(777F0000 - 777F5000)

(3B470000 - 3B482000)

(74FD0000 - 74FEE000)

(3B4C0000 - 3B4D8000)

(75010000 - 75017000)

 

State Dump for Thread Id 0x3dc

 

eax=00000000 ebx=00000000 ecx=00001402 edx=00000000 esi=0000018a edi=00000025

eip=00425832 esp=0022fc00 ebp=0022fc48 iopl=0 nv up ei ng nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00200286

 

 

function: <nosymbols>

00425803 46 inc esi

00425804 3b75d0 cmp esi,[ebp+0xd0] ss:00cb9b2e=00000000

00425807 0f83a6000000 jnb 004258b3

0042580d 8b0d04634e00 mov ecx,[004e6304] ds:004e6304=20132810

00425813 6959108c020000 imul ebx,[ecx+0x10],0x28c ds:00a8b2e8=00000000

0042581a 8d3c76 lea edi,[esi+esi*2] ds:0000018a=????????

0042581d 8b940bd8000000 mov edx,[ebx+ecx+0xd8] ds:000014da=????????

00425824 8d0cbe lea ecx,[esi+edi*4] ds:00000025=????????

00425827 8b7c8a30 mov edi,[edx+ecx*4+0x30] ds:00a8b2e9=00000000

0042582b 8b14bde00a2a01 mov edx,[012a0ae0+edi*4] ds:00000025=????????

FAULT ->00425832 8b02 mov eax,[edx] ds:00000000=????????

00425834 8945d8 mov [ebp+0xd8],eax ss:00cb9b2e=00000000

00425837 8b5a04 mov ebx,[edx+0x4] ds:00a89ee6=00000000

0042583a 8d45d8 lea eax,[ebp+0xd8] ss:00cb9b2e=00000000

0042583d 895ddc mov [ebp+0xdc],ebx ss:00cb9b2e=00000000

00425840 8b4a08 mov ecx,[edx+0x8] ds:00a89ee6=00000000

00425843 bb03120000 mov ebx,0x1203

00425848 c745e40000803f ss:00cb9b2e=00000000

mov dword ptr [ebp+0xe4],0x3f800000

0042584f 894de0 mov [ebp+0xe0],ecx ss:00cb9b2e=00000000

00425852 89442408 mov [esp+0x8],eax ss:00cb9ae7=00000000

00425856 895c2404 mov [esp+0x4],ebx ss:00cb9ae7=00000000

0042585a 8b5dd4 mov ebx,[ebp+0xd4] ss:00cb9b2e=00000000

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

0022FC48 00476EAF 00000000 BE800000 00000000 00000000 !<nosymbols>

0022FD78 00459DED 20119C50 3F800000 3F800000 000000C4 !<nosymbols>

0022FD98 00459EF1 20119C50 3F800000 3F800000 00000000 !<nosymbols>

0022FDC8 004140B6 00000001 00000000 00000000 00000000 !<nosymbols>

0022FDE8 004275FC 20165008 00000007 004E0C57 004E0C34 !<nosymbols>

0022FE48 00427A65 002341D8 004DA164 0022FE8C 01DF0000 !<nosymbols>

0022FEF8 004A1F7A 00400000 00000000 00234200 00000001 !<nosymbols>

0022FF78 004011E7 00000001 01DF3DA8 01DF2968 004E5000 !<nosymbols>

0022FFB0 00401258 00000002 00000009 0022FFF0 7C4E87F5 !<nosymbols>

0022FFC0 7C4E87F5 00000000 00000000 7FFDF000 C0000005 !<nosymbols>

0022FFF0 00000000 00401240 00000000 000000C8 00000100 kernel32!DosDateTimeToFileTime

 

*----> Raw Stack Dump <----*

0022fc00 07 40 00 00 01 12 00 00 - 20 fc 22 00 0f 00 00 00 .@...... .".....

0022fc10 b7 1e 85 3e ce cc cc 3e - a9 01 00 00 00 00 00 00 ...>...>........

0022fc20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0022fc30 00 00 c8 43 00 00 c8 43 - 00 00 fa 43 00 00 00 00 ...C...C...C....

0022fc40 0f 00 00 00 01 00 00 00 - 78 fd 22 00 af 6e 47 00 ........x."..nG.

0022fc50 00 00 00 00 00 00 80 be - 00 00 00 00 00 00 00 00 ................

0022fc60 00 00 00 00 93 0a 14 c0 - 00 00 00 00 00 00 00 00 ................

0022fc70 ff ff ff 00 00 00 00 00 - ff ff 7f 4b a8 83 ac 20 ...........K...

0022fc80 80 00 c8 34 b8 d6 70 20 - f4 2e 0c 35 a1 d7 70 20 ...4..p ...5..p

0022fc90 f8 2e 0c 35 a8 83 ac 20 - 01 45 00 00 00 00 a7 20 ...5... .E.....

0022fca0 c0 b6 0d 35 00 00 80 3f - 00 00 00 00 00 00 00 00 ...5...?........

0022fcb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 80 3f ...............?

0022fcc0 00 00 80 3f 00 00 00 00 - 00 00 00 00 00 00 00 00 ...?............

0022fcd0 00 00 00 00 00 00 00 00 - 00 00 80 3f 00 00 00 00 ...........?....

0022fce0 c0 b6 0d 35 6d b4 7f 20 - c0 b6 0d 35 80 00 c8 34 ...5m.. ...5...4

0022fcf0 d3 c6 7f 20 dd c6 7f 20 - 28 fc 16 20 80 00 c8 34 ... ... (.. ...4

0022fd00 c8 fd 22 00 1b 00 00 00 - ce e7 7f 20 50 b4 7f 20 .."........ P..

0022fd10 10 fe 22 00 00 00 00 00 - 00 b8 90 40 00 00 00 00 .."........@....

0022fd20 d3 c6 7f 20 dd c6 7f 20 - 50 9c 11 20 03 02 00 00 ... ... P.. ....

0022fd30 78 fd 22 00 3a 03 00 00 - 84 e3 7f 20 a0 ca 7f 20 x.".:...... ...

 

State Dump for Thread Id 0x318

 

eax=7ffdd000 ebx=00000001 ecx=00000000 edx=00000000 esi=77f93233 edi=00000001

eip=77f9323e esp=2042fecc ebp=2042ff18 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246

 

 

function: NtWaitForMultipleObjects

77f93233 b8e9000000 mov eax,0xe9

77f93238 8d542404 lea edx,[esp+0x4] ss:20eb9db3=00000000

77f9323c cd2e int 2e

77f9323e c21400 ret 0x14

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

2042FF18 77E13990 2042FEF0 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects

2042FF74 5F586B53 2042FF40 00000000 FFFFFFFF 000000FF user32!MsgWaitForMultipleObjectsEx

2042FFB4 7C4E987C 00240DF0 0022F1E8 77F83404 00240DF0 !<nosymbols>

2042FFEC 00000000 5F586AF1 00240DF0 00000000 00905A4D kernel32!SetThreadExecutionState

 

*----> Raw Stack Dump <----*

2042fecc d7 bd 4e 7c 01 00 00 00 - f0 fe 42 20 01 00 00 00 ..N|......B ....

2042fedc 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

2042feec 01 00 00 00 38 01 00 00 - fc fe 42 20 28 00 00 00 ....8.....B (...

2042fefc 00 00 0e 00 02 02 00 00 - c9 79 58 5f 56 6e e3 77 .........yX_Vn.w

2042ff0c 9d 03 00 00 92 02 00 00 - 00 00 00 00 74 ff 42 20 ............t.B

2042ff1c 90 39 e1 77 f0 fe 42 20 - 01 00 00 00 00 00 00 00 .9.w..B ........

2042ff2c 00 00 00 00 01 00 00 00 - 00 00 00 00 08 b6 4e 7c ..............N|

2042ff3c f0 0d 24 00 38 01 00 00 - f0 0d 24 00 74 ff 42 20 ..$.8.....$.t.B

2042ff4c 5f 36 e1 77 98 ff 42 20 - 00 00 00 00 00 00 00 00 _6.w..B ........

2042ff5c 00 00 00 00 01 00 00 00 - 01 00 00 00 cc d6 fd 7f ................

2042ff6c 00 00 00 00 38 01 00 00 - b4 ff 42 20 53 6b 58 5f ....8.....B SkX_

2042ff7c 40 ff 42 20 00 00 00 00 - ff ff ff ff ff 00 00 00 @.B ............

2042ff8c 02 00 00 00 e8 f1 22 00 - 04 34 f8 77 00 00 00 00 ......"..4.w....

2042ff9c 13 01 00 00 ee 7f 00 00 - ee 6a 58 5f a5 db 0b 00 .........jX_....

2042ffac 9e 03 00 00 92 02 00 00 - ec ff 42 20 7c 98 4e 7c ..........B |.N|

2042ffbc f0 0d 24 00 e8 f1 22 00 - 04 34 f8 77 f0 0d 24 00 ..$..."..4.w..$.

2042ffcc 00 d0 fd 7f 00 00 00 00 - c0 ff 42 20 00 00 00 00 ..........B ....

2042ffdc ff ff ff ff b4 f0 4f 7c - 60 d3 4e 7c 00 00 00 00 ......O|`.N|....

2042ffec 00 00 00 00 00 00 00 00 - f1 6a 58 5f f0 0d 24 00 .........jX_..$.

2042fffc 00 00 00 00 4d 5a 90 00 - 03 00 00 00 04 00 00 00 ....MZ..........

 

State Dump for Thread Id 0x4d8

 

eax=0024e710 ebx=80020000 ecx=0024f388 edx=00000000 esi=0024f0c8 edi=00000100

eip=77f839c7 esp=39aefe28 ebp=39aeff74 iopl=0 nv up ei pl nz na pe nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

 

 

function: NtReplyWaitReceivePortEx

77f839bc b8ac000000 mov eax,0xac

77f839c1 8d542404 lea edx,[esp+0x4] ss:3a579d0f=????????

77f839c5 cd2e int 2e

77f839c7 c21400 ret 0x14

77f839ca 8b4710 mov eax,[edi+0x10] ds:00a89fe6=00000000

77f839cd 8b483c mov ecx,[eax+0x3c] ds:00cd85f6=00000000

77f839d0 f6400801 test byte ptr [eax+0x8],0x1 ds:00cd85f6=00

77f839d4 7502 jnz RtlCreateProcessParameters+0xd (77f83cd8)

77f839d6 03c8 add ecx,eax

77f839d8 894de4 mov [ebp+0xe4],ecx ss:3a579e5a=????????

77f839db 8b4710 mov eax,[edi+0x10] ds:00a89fe6=00000000

77f839de 668b4038 mov ax,[eax+0x38] ds:00cd85f7=0000

77f839e2 668945e0 mov [ebp+0xe0],ax ss:3a579e5b=????

77f839e6 668945e2 mov [ebp+0xe2],ax ss:3a579e5b=????

77f839ea 53 push ebx

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

39AEFF74 77D3D9DB 77D3DD59 0024F0C8 40249768 00000070 ntdll!NtReplyWaitReceivePortEx

39AEFFA8 77D3DD0B 0024F070 39AEFFEC 7C4E987C 0024F210 rpcrt4!RpcBindingSetOption

39AEFFB4 7C4E987C 0024F210 40249768 00000070 0024F210 rpcrt4!RpcBindingSetOption

39AEFFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetThreadExecutionState

 

State Dump for Thread Id 0x514

 

eax=77562bda ebx=00000002 ecx=0000001c edx=00000000 esi=77f93233 edi=00000002

eip=77f9323e esp=39f4ff24 ebp=39f4ff70 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246

 

 

function: NtWaitForMultipleObjects

77f93233 b8e9000000 mov eax,0xe9

77f93238 8d542404 lea edx,[esp+0x4] ss:3a9d9e0b=????????

77f9323c cd2e int 2e

77f9323e c21400 ret 0x14

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

39F4FF70 7C4FABFB 39F4FF48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects

39F4FFB4 7C4E987C 00000000 7FFDEBF8 00000000 00000000 kernel32!WaitForMultipleObjects

39F4FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetThreadExecutionState

 

State Dump for Thread Id 0x348

 

eax=510c005a ebx=00000040 ecx=0000020a edx=00000000 esi=77f93233 edi=00000040

eip=77f9323e esp=3a64fddc ebp=3a64fe28 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246

 

 

function: NtWaitForMultipleObjects

77f93233 b8e9000000 mov eax,0xe9

77f93238 8d542404 lea edx,[esp+0x4] ss:3b0d9cc3=????????

77f9323c cd2e int 2e

77f9323e c21400 ret 0x14

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

3A64FE28 7C4FABFB 00240CE8 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects

3A64FF74 510BFDE5 FFFFFFFF 0000003F 39CF4288 3A64FF90 kernel32!WaitForMultipleObjects

3A64FF94 510BF96C 0023DE78 39CF423C 0000024C 3A64FFEC !<nosymbols>

3A64FFA8 510BF9D6 39CF2740 510C0063 7C4E987C 39CF423C !<nosymbols>

3A64FFEC 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

 

State Dump for Thread Id 0x524

 

eax=3d400000 ebx=00000001 ecx=00010101 edx=00000000 esi=77f93233 edi=00000001

eip=77f9323e esp=3a84fde4 ebp=3a84fe30 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246

 

 

function: NtWaitForMultipleObjects

77f93233 b8e9000000 mov eax,0xe9

77f93238 8d542404 lea edx,[esp+0x4] ss:3b2d9ccb=????????

77f9323c cd2e int 2e

77f9323e c21400 ret 0x14

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

3A84FE30 7C4FABFB 3A84FE08 00000001 00000000 3A84FE28 ntdll!NtWaitForMultipleObjects

3A84FF7C 510A1566 000001F4 00000000 00000000 00000000 kernel32!WaitForMultipleObjects

3A84FFA8 510BF9D6 0022F358 510C0063 7C4E987C 39CF1EFC !<nosymbols>

3A84FFEC 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

 

State Dump for Thread Id 0x3e4

 

eax=00000000 ebx=77593780 ecx=00000080 edx=00000000 esi=77593a78 edi=00000003

eip=77f9323e esp=3aa4ff4c ebp=77f89103 iopl=0 nv up ei pl nz na pe nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

 

 

function: NtWaitForMultipleObjects

77f93233 b8e9000000 mov eax,0xe9

77f93238 8d542404 lea edx,[esp+0x4] ss:3b4d9e33=????????

77f9323c cd2e int 2e

77f9323e c21400 ret 0x14

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

77F89103 8B000000 83042454 0F00147A 011E5085 42FF9000 ntdll!NtWaitForMultipleObjects

180D8B64 3C008311 002A9400 3C208720 0808A400 34020700 <nosymbols>

00228400 00000000 00000000 00000000 00000000 00000000 <nosymbols>

 

*----> Raw Stack Dump <----*

3aa4ff4c 2f 93 57 77 03 00 00 00 - 74 ff a4 3a 01 00 00 00 /.Ww....t..:....

3aa4ff5c 01 00 00 00 00 00 00 00 - 91 81 f9 77 98 2a f9 77 ...........w.*.w

3aa4ff6c ec ff a4 3a 00 00 00 00 - 84 03 00 00 8c 03 00 00 ...:............

3aa4ff7c ac 03 00 00 00 00 00 00 - 00 00 00 00 d6 11 43 80 ..............C.

3aa4ff8c 00 00 00 00 00 00 00 00 - 0f 12 43 80 20 c0 5e 85 ..........C. .^.

3aa4ff9c 20 a0 57 85 ff ff ff ff - 8f 13 43 80 00 00 00 00 .W.......C.....

3aa4ffac 00 00 00 00 00 00 00 00 - d7 4b f8 77 7c 98 4e 7c .........K.w|.N|

3aa4ffbc 00 00 00 00 91 81 f9 77 - 98 2a f9 77 00 00 00 00 .......w.*.w....

3aa4ffcc 00 70 fd 7f 5c c3 fc 77 - c0 ff a4 3a 5c c3 fc 77 .p..\..w...:\..w

3aa4ffdc ff ff ff ff b4 f0 4f 7c - 60 d3 4e 7c 00 00 00 00 ......O|`.N|....

3aa4ffec 00 00 00 00 00 00 00 00 - 7f 92 57 77 00 00 00 00 ..........Ww....

3aa4fffc 00 00 00 00 08 00 00 00 - 04 01 00 00 ee ff ee ff ................

3aa5000c 00 00 00 00 00 00 a7 20 - 00 10 3d 00 00 00 a5 3a ....... ..=....:

3aa5001c 00 08 00 00 40 00 a5 3a - 00 00 25 3b 33 04 00 00 ....@..:..%;3...

3aa5002c 0a 00 00 00 c8 05 a7 20 - 00 00 00 00 b0 ba e7 3a ....... .......:

3aa5003c 00 00 00 00 01 20 08 00 - 04 01 08 00 00 00 00 00 ..... ..........

3aa5004c 00 00 00 00 00 00 00 00 - 55 55 55 55 00 00 00 00 ........UUUU....

3aa5005c 00 00 00 00 00 00 00 00 - 55 55 55 55 00 00 00 00 ........UUUU....

3aa5006c 00 00 00 00 00 00 00 00 - 55 55 55 55 00 00 00 00 ........UUUU....

3aa5007c 00 00 00 00 00 00 00 00 - 55 55 55 55 00 00 00 00 ........UUUU....

 

State Dump for Thread Id 0x444

 

eax=00000000 ebx=00000001 ecx=000000c0 edx=00000000 esi=77f89153 edi=3b6eff24

eip=77f8915e esp=3b6eff10 ebp=3b6eff2c iopl=0 nv up ei pl nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206

 

 

function: ZwDelayExecution

77f89153 b832000000 mov eax,0x32

77f89158 8d542404 lea edx,[esp+0x4] ss:3c179df7=????????

77f8915c cd2e int 2e

77f8915e c20800 ret 0x8

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

3B6EFF2C 7C4FAC79 000001F4 00000000 01702BCB 000001F4 ntdll!ZwDelayExecution

3B6EFF90 017031DE 00000000 201867C8 77FCC5B4 000000F8 kernel32!Sleep

00000000 00000000 00000000 00000000 00000000 00000000 !SDL_Delay

 

State Dump for Thread Id 0x458

 

eax=00000038 ebx=20165008 ecx=3b8efd38 edx=00000000 esi=77f89153 edi=3b8eff44

eip=77f8915e esp=3b8eff30 ebp=3b8eff4c iopl=0 nv up ei pl nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206

 

 

function: ZwDelayExecution

77f89153 b832000000 mov eax,0x32

77f89158 8d542404 lea edx,[esp+0x4] ss:3c379e17=????????

77f8915c cd2e int 2e

77f8915e c20800 ret 0x8

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

3B8EFF4C 7C4FAC79 0000000A 00000000 01702BCB 0000000A ntdll!ZwDelayExecution

3B8EFF90 017031DE 004E5520 201864F0 77FCC5B4 000000F8 kernel32!Sleep

004E5520 004E5510 00000000 00000000 00000000 00000000 !SDL_Delay

20165008 201867C8 20186248 00000000 00030005 00080101 !<nosymbols>

201867C8 2018D090 00736E61 00006563 00030009 00080101 <nosymbols>

00000000 00000000 00000000 00000000 00000000 00000000 <nosymbols>

 

State Dump for Thread Id 0x358

 

eax=77d3dcf3 ebx=00258af8 ecx=00230178 edx=00000000 esi=0024f0c8 edi=00000100

eip=77f839c7 esp=3d3ffe28 ebp=3d3fff74 iopl=0 nv up ei pl nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206

 

 

function: NtReplyWaitReceivePortEx

77f839bc b8ac000000 mov eax,0xac

77f839c1 8d542404 lea edx,[esp+0x4] ss:3de89d0f=????????

77f839c5 cd2e int 2e

77f839c7 c21400 ret 0x14

77f839ca 8b4710 mov eax,[edi+0x10] ds:00a89fe6=00000000

77f839cd 8b483c mov ecx,[eax+0x3c] ds:787c7bd9=????????

77f839d0 f6400801 test byte ptr [eax+0x8],0x1 ds:787c7bd9=??

77f839d4 7502 jnz RtlCreateProcessParameters+0xd (77f83cd8)

77f839d6 03c8 add ecx,eax

77f839d8 894de4 mov [ebp+0xe4],ecx ss:3de89e5a=????????

77f839db 8b4710 mov eax,[edi+0x10] ds:00a89fe6=00000000

77f839de 668b4038 mov ax,[eax+0x38] ds:787c7bda=????

77f839e2 668945e0 mov [ebp+0xe0],ax ss:3de89e5b=????

77f839e6 668945e2 mov [ebp+0xe2],ax ss:3de89e5b=????

77f839ea 53 push ebx

 

*----> Stack Back Trace <----*

 

FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name

3D3FFF74 77D3D9DB 77D3DD59 0024F0C8 000004AC 00000000 ntdll!NtReplyWaitReceivePortEx

3D3FFFA8 77D3DD0B 002828A8 3D3FFFEC 7C4E987C 00258AF8 rpcrt4!RpcBindingSetOption

3D3FFFB4 7C4E987C 00258AF8 000004AC 00000000 00258AF8 rpcrt4!RpcBindingSetOption

3D3FFFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetThreadExecutionState

 

 

 

<Ends>

I hope that provides something useful....

Share this post


Link to post
Share on other sites

Here's what happened to me...

 

I started a fire and cook some meat...no problem here, I sat around and waited a bit. Minute or so later, the fire went out and "**BOOM**" :) client crashed. Don't know if this is the same issue or different entirely.

 

*EDIT* I can reproduce this 100% of the time...I will post shortly with my dxdiag info, if that will help.

Edited by sbarstow

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×