FAULTING_IP: server!CGrenadePathfollower::Detonate+340731 105b3281 8b10 mov edx,dword ptr [eax] EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 105b3281 (server!CGrenadePathfollower::Detonate+0x00340731) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000000 Attempt to read from address 00000000 PROCESS_NAME: srcds.exe ADDITIONAL_DEBUG_TEXT: Use '!findthebuild' command to search for the target build information. If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols. FAULTING_MODULE: 757a0000 kernel32 DEBUG_FLR_IMAGE_TIMESTAMP: 4b8064b5 MODULE_NAME: server ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000000 READ_ADDRESS: 00000000 FOLLOWUP_IP: server!CGrenadePathfollower::Detonate+340731 105b3281 8b10 mov edx,dword ptr [eax] FAULTING_THREAD: 000010ac BUGCHECK_STR: APPLICATION_FAULT_NULL_POINTER_READ_WRONG_SYMBOLS PRIMARY_PROBLEM_CLASS: NULL_POINTER_READ DEFAULT_BUCKET_ID: NULL_POINTER_READ LAST_CONTROL_TRANSFER: from 105b2783 to 105b3281 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. 0017d768 105b2783 0017d784 18aac228 1096699c server!CGrenadePathfollower::Detonate+0x340731 0017daf8 105b2783 0017db14 18aac228 1096699c server!CGrenadePathfollower::Detonate+0x33fc33 0017de88 105ca458 0017deac 0c22f59c 0c22f000 server!CGrenadePathfollower::Detonate+0x33fc33 00000000 00000000 00000000 00000000 00000000 server!CGERoundTimer::RoundTimerThink+0x16038 STACK_COMMAND: ~0s; .ecxr ; kb SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: server!CGrenadePathfollower::Detonate+340731 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: server.dll BUCKET_ID: WRONG_SYMBOLS FAILURE_BUCKET_ID: NULL_POINTER_READ_c0000005_server.dll!CGrenadePathfollower::Detonate WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/srcds_exe/0_0_0_0/4b071a4a/server_dll/0_0_0_0/4b8064b5/c0000005/004c3281.htm?Retriage=1 Followup: MachineOwner
I hate gungame