Jump to content

Mission crashes as a "t01" but works as a normal mission?!


teppe

Recommended Posts

I have recently created a mission on the "Mosque" map. The mission works completely fine in "custom missions", but crashes when I try it as a training mission? Any suggestions to make it work? Here's the Ike and Ike crash;


***** User's system configuration *****
CPU: GenuineIntel 2700 MHz Pentium III Coppermine
RAM: 4072 MB
O/S: Microsoft Windows NT Family 6.1 Service Pack 1 build 7601
Ghost Recon (RELEASE) version = 1.4.0.0(0)
RSDisplayMgr::CreateGameWindow: Creating a 1920x1080 window at 0,0 on monitor Standard PnP-skærm attached to AMD Radeon HD 6770M
RSDisplayMgr::CreateGameWindow: Game running on primary display Standard PnP-skærm attached to AMD Radeon HD 6770M
HAL (hw vp): AMD Radeon HD 6770M R5G6B5
RSFILEDATA: FindFile could not find file ike_fx_fire_type2.tga
RSFILEDATA: FindFile could not find file ike_fx_fire_type2.rsb
Unable to find ike_fx_fire_type2.tga anywhere.
RSFILEDATA: FindFile could not find file lighthalo_effect3.rsb
RSFILEDATA: FindFile could not find file lighthalo_effect3.rsb
Unable to find lighthalo_effect3.rsb anywhere.
RSSoundMgrPC: Selecting sound device Hovedtelefoner (Cirrus Logic CS4206A (AB 09))
driver is {0.0.0.00000000}.{bc454e90-4885-438a-aaa3-0782dced45f8}
RSInputImpl: Could not acquire keyboardE_ACCESSDENIED
Failed to Reset Device
RSSoundMgrPC: Selecting sound device Hovedtelefoner (Cirrus Logic CS4206A (AB 09))
driver is {0.0.0.00000000}.{bc454e90-4885-438a-aaa3-0782dced45f8}
CRASH;
GhostRecon caused an Access Violation in module GhostRecon.exe at 0023:0051c320.
Exception handler called in Main Thread.
Error occurred at 1/23/2013 15:38:40.
C:\Program Files (x86)\Red Storm Entertainment\Ghost Recon\GhostRecon.exe, run by Teppe.
4 processor(s), type 586.
4072 MBytes physical memory.
Read from location 00000008 caused an access violation.
Registers:
EAX=00000000 CS=0023 EIP=0051c320 EFLGS=00010246
EBX=031537d4 SS=002b ESP=0018fd1c EBP=000000a8
ECX=00000000 DS=002b ESI=0455f050 FS=0053
EDX=00854750 ES=002b EDI=00000004 GS=002b
Bytes at CS:EIP:
8b 50 08 8d 48 08 ff 52 04 8a 86 f0 03 00 00 84
Stack trace:
0051C320: GhostRecon.exe! <no symbol>, <no file>, <no line>
Module list: names, addresses, sizes, time stamps and file times:
C:\Program Files (x86)\Red Storm Entertainment\Ghost Recon\GhostRecon.exe, loaded at 0x00400000 - 6402084 bytes - 3da72199 - file date is 10/11/2002 15:08:34
C:\Users\Teppe\AppData\Local\Temp\~ef2e13\~df394b.tmp, loaded at 0x10000000 - 822824 bytes - 3c76503b - file date is 1/23/2013 15:38:08
C:\Windows\AppPatch\AcGenral.DLL, loaded at 0x64550000 - 2175488 bytes - 4ce7b6ff - file date is 11/21/2010 04:24:02
C:\Windows\system32\d3d8.dll, loaded at 0x64770000 - 1036800 bytes - 4a5bd9a7 - file date is 7/14/2009 02:15:10
C:\Windows\system32\DINPUT8.dll, loaded at 0x6b1d0000 - 145408 bytes - 4a5bd9c1 - file date is 7/14/2009 02:15:12
C:\Windows\system32\cryptnet.dll, loaded at 0x6b320000 - 103936 bytes - 4fc99667 - file date is 6/2/2012 05:36:30
C:\Windows\SysWOW64\bcryptprimitives.dll, loaded at 0x6b340000 - 249680 bytes - 4a5bd987 - file date is 7/14/2009 02:17:56
C:\Windows\system32\ncrypt.dll, loaded at 0x6b380000 - 220160 bytes - 50ab0c4b - file date is 11/20/2012 05:51:10
C:\Windows\system32\atiu9pag.dll, loaded at 0x71780000 - 28672 bytes - 4d23d4f3 - file date is 6/13/2011 17:34:24
C:\Windows\system32\sfc_os.DLL, loaded at 0x71cc0000 - 40960 bytes - 4a5bdb02 - file date is 7/14/2009 02:16:16
C:\Windows\system32\bcrypt.dll, loaded at 0x71cf0000 - 80896 bytes - 4a5bdb38 - file date is 7/14/2009 02:11:22
C:\Windows\system32\sfc.dll, loaded at 0x72360000 - 2560 bytes - 4a5bdb01 - file date is 7/14/2009 02:10:24
C:\Windows\system32\WINMM.dll, loaded at 0x72390000 - 194048 bytes - 4ce7ba42 - file date is 11/21/2010 04:24:18
C:\Windows\system32\WSOCK32.dll, loaded at 0x72540000 - 15360 bytes - 4a5bdb63 - file date is 7/14/2009 02:16:22
C:\Windows\system32\dwmapi.dll, loaded at 0x72590000 - 67072 bytes - 4a5bda07 - file date is 7/14/2009 02:15:14
C:\Windows\system32\rsaenh.dll, loaded at 0x72730000 - 242936 bytes - 4a5bdae0 - file date is 7/14/2009 02:17:56
C:\Windows\system32\CRYPTSP.dll, loaded at 0x72770000 - 78848 bytes - 4a5bda3d - file date is 7/14/2009 02:15:08
C:\Windows\system32\samcli.dll, loaded at 0x728e0000 - 51200 bytes - 4ce7b9a0 - file date is 11/21/2010 04:23:56
C:\Program Files (x86)\Red Storm Entertainment\Ghost Recon\DBGHELP.dll, loaded at 0x72a00000 - 163088 bytes - 3af32067 - file date is 8/10/2001 09:27:10
C:\Windows\system32\MPR.dll, loaded at 0x72c60000 - 64000 bytes - 4a5bda36 - file date is 7/14/2009 02:15:42
C:\Windows\system32\GPAPI.dll, loaded at 0x72cd0000 - 79872 bytes - 4a5bd9e0 - file date is 7/14/2009 02:15:24
C:\Windows\system32\SensApi.dll, loaded at 0x72cf0000 - 10752 bytes - 4a5bdb11 - file date is 7/14/2009 02:16:14
C:\Windows\system32\d3d8thk.dll, loaded at 0x73870000 - 11264 bytes - 4a5bd9a8 - file date is 7/14/2009 02:15:10
C:\Windows\system32\POWRPROF.dll, loaded at 0x739c0000 - 145408 bytes - 4a5bdb0c - file date is 7/14/2009 02:16:14
C:\Windows\system32\DSOUND.dll, loaded at 0x739f0000 - 453632 bytes - 4a5bd9fd - file date is 7/14/2009 02:15:14
C:\Windows\system32\MSACM32.dll, loaded at 0x73a80000 - 72192 bytes - 4a5bda4e - file date is 7/14/2009 02:15:44
C:\Windows\system32\VERSION.dll, loaded at 0x742a0000 - 21504 bytes - 4a5bdb2b - file date is 7/14/2009 02:16:18
C:\Windows\system32\apphelp.dll, loaded at 0x742f0000 - 295936 bytes - 4ce7b73e - file date is 11/21/2010 04:24:16
C:\Windows\system32\UxTheme.dll, loaded at 0x744f0000 - 245760 bytes - 4a5bdb3c - file date is 7/14/2009 02:11:26
C:\Windows\system32\profapi.dll, loaded at 0x74580000 - 31744 bytes - 4a5bbf41 - file date is 7/14/2009 02:16:14
C:\Windows\system32\USERENV.dll, loaded at 0x74590000 - 81920 bytes - 4ce7ba28 - file date is 11/21/2010 04:24:18
c:\progra~3\browse~1\23787~1.43\{16cdf~1\browse~1.dll, loaded at 0x745b0000 - 2068504 bytes - 50755a64 - file date is 10/10/2012 12:23:18
C:\Windows\syswow64\CRYPTBASE.dll, loaded at 0x74940000 - 36864 bytes - 4a5bbf41 - file date is 7/14/2009 02:15:08
C:\Windows\syswow64\SspiCli.dll, loaded at 0x74950000 - 96768 bytes - 4fc997c1 - file date is 6/2/2012 05:34:10
C:\Windows\syswow64\OLEAUT32.dll, loaded at 0x749b0000 - 571904 bytes - 4e58702a - file date is 8/27/2011 05:26:28
C:\Windows\syswow64\WS2_32.dll, loaded at 0x74a40000 - 206848 bytes - 4ce7ba68 - file date is 11/21/2010 04:23:56
C:\Windows\syswow64\DEVOBJ.dll, loaded at 0x74a80000 - 64512 bytes - 4ddb887d - file date is 5/24/2011 11:40:06
C:\Windows\syswow64\msvcrt.dll, loaded at 0x74aa0000 - 690688 bytes - 4eeaf722 - file date is 12/16/2011 08:53:00
C:\Windows\syswow64\PSAPI.DLL, loaded at 0x74b50000 - 6144 bytes - 4a5bdace - file date is 7/14/2009 02:16:14
C:\Windows\syswow64\SETUPAPI.dll, loaded at 0x74b60000 - 1667584 bytes - 4ce7b9d9 - file date is 11/21/2010 04:23:52
C:\Windows\syswow64\USP10.dll, loaded at 0x74d00000 - 626688 bytes - 50adaddf - file date is 11/22/2012 05:45:04
C:\Windows\syswow64\WINTRUST.dll, loaded at 0x74da0000 - 172544 bytes - 5037b19b - file date is 8/24/2012 17:57:50
C:\Windows\syswow64\SHELL32.dll, loaded at 0x74dd0000 - 12873728 bytes - 4fd2d1d9 - file date is 6/9/2012 05:41:02
C:\Windows\syswow64\CRYPT32.dll, loaded at 0x75a20000 - 1159680 bytes - 4fc99664 - file date is 6/2/2012 05:36:30
C:\Windows\syswow64\MSASN1.dll, loaded at 0x75b40000 - 34304 bytes - 4ce7b8c9 - file date is 11/21/2010 04:23:50
C:\Windows\syswow64\MSCTF.dll, loaded at 0x75b50000 - 828928 bytes - 4a5bda69 - file date is 7/14/2009 02:15:44
C:\Windows\syswow64\NSI.dll, loaded at 0x75c20000 - 8704 bytes - 4a5bdad9 - file date is 7/14/2009 02:16:12
C:\Windows\syswow64\RPCRT4.dll, loaded at 0x75c30000 - 663040 bytes - 4ce7ba59 - file date is 11/21/2010 04:24:12
C:\Windows\syswow64\USER32.dll, loaded at 0x75d20000 - 833024 bytes - 4ce7ba59 - file date is 11/21/2010 04:24:22
C:\Windows\syswow64\Normaliz.dll, loaded at 0x75e20000 - 2048 bytes - 4a5bdad4 - file date is 7/14/2009 02:09:02
C:\Windows\syswow64\urlmon.dll, loaded at 0x75e30000 - 1103872 bytes - 50a2fa94 - file date is 11/14/2012 02:57:46
C:\Windows\syswow64\CFGMGR32.dll, loaded at 0x76060000 - 145920 bytes - 4ddb8851 - file date is 5/24/2011 11:39:40
C:\Windows\system32\IMM32.DLL, loaded at 0x76090000 - 119808 bytes - 4ce7ba53 - file date is 11/21/2010 04:24:26
C:\Windows\syswow64\GDI32.dll, loaded at 0x760f0000 - 311296 bytes - 4ce7ba53 - file date is 11/21/2010 04:24:16
C:\Windows\SysWOW64\sechost.dll, loaded at 0x76180000 - 92160 bytes - 4a5bdb04 - file date is 7/14/2009 02:16:14
C:\Windows\syswow64\WLDAP32.dll, loaded at 0x761a0000 - 269824 bytes - 4ce7ba62 - file date is 11/21/2010 04:24:18
C:\Windows\syswow64\ole32.dll, loaded at 0x76280000 - 1414144 bytes - 4ce7b96f - file date is 11/21/2010 04:24:02
C:\Windows\syswow64\WININET.dll, loaded at 0x763e0000 - 1129472 bytes - 50a2fa7c - file date is 11/14/2012 02:57:38
C:\Windows\syswow64\SHLWAPI.dll, loaded at 0x76560000 - 350208 bytes - 4ce7b9e2 - file date is 11/21/2010 04:23:50
C:\Windows\syswow64\kernel32.dll, loaded at 0x765c0000 - 1114112 bytes - 50b83c89 - file date is 11/30/2012 05:54:00
C:\Windows\syswow64\KERNELBASE.dll, loaded at 0x766d0000 - 274944 bytes - 50b83c8a - file date is 11/30/2012 05:54:00
C:\Windows\syswow64\imagehlp.dll, loaded at 0x76720000 - 159232 bytes - 4f4f07d3 - file date is 3/1/2012 06:33:24
C:\Windows\syswow64\iertutil.dll, loaded at 0x76750000 - 1793024 bytes - 50a2f7ee - file date is 11/14/2012 02:46:40
C:\Windows\syswow64\ADVAPI32.dll, loaded at 0x76910000 - 640512 bytes - 4ce7b706 - file date is 11/21/2010 04:24:30
C:\Windows\syswow64\LPK.dll, loaded at 0x77240000 - 25600 bytes - 4a5bdb3b - file date is 7/14/2009 02:11:24
C:\Windows\SysWOW64\ntdll.dll, loaded at 0x77270000 - 1292080 bytes - 4ec49b8f - file date is 11/17/2011 06:38:40

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...