Game Crashes during Custom Map - Server.dll access violation

brownboy390

New member
My friends and I have been trying to play 1v1s or 2v2s with the following custom map however after 10-20mins the game will crash for the host and the rest of the players to get kicked out. After some digging I was able to find the dumpfile. This only happens with this map if we play a regular game we don't experience any crashes. Any insight into what could be causing this?

*******************************************************************************
* *
* Exception Analysis *
* *
*******************************************************************************


KEY_VALUES_STRING: 1

Key : AV.Type
Value: Read

Key : Analysis.CPU.mSec
Value: 390

Key : Analysis.Elapsed.mSec
Value: 6547

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 1

Key : Analysis.IO.Write.Mb
Value: 5

Key : Analysis.Init.CPU.mSec
Value: 328

Key : Analysis.Init.Elapsed.mSec
Value: 9977

Key : Analysis.Memory.CommitPeak.Mb
Value: 163

Key : Analysis.Version.DbgEng
Value: 10.0.29457.1000

Key : Analysis.Version.Description
Value: 10.2506.23.01 amd64fre

Key : Analysis.Version.Ext
Value: 1.2506.23.1

Key : Failure.Bucket
Value: INVALID_POINTER_READ_c0000005_server.dll!Unknown

Key : Failure.Exception.Code
Value: 0xc0000005

Key : Failure.Exception.IP.Address
Value: 0x7ff9a7331c8e

Key : Failure.Exception.IP.Module
Value: server

Key : Failure.Exception.IP.Offset
Value: 0x6d1c8e

Key : Failure.Hash
Value: {8d9ff6b7-69ef-4871-e8ee-bcc47a0c732c}

Key : Failure.ProblemClass.Primary
Value: INVALID_POINTER_READ

Key : Timeline.Process.Start.DeltaSec
Value: 1235


FILE_IN_CAB: deadlock_2025_1021_004235_0_accessviolation.mdmp

NTGLOBALFLAG: 0

CONTEXT: (.ecxr)
rax=000003b88b6bfd80 rbx=0000000000000000 rcx=0000000100000006
rdx=00000000ffffffff rsi=00000000000000c6 rdi=0000000000000002
rip=00007ff9a7331c8e rsp=000000ddf55eaed0 rbp=000000ddf55eafd0
r8=00000011980df0d3 r9=000000ddf55eb328 r10=0000000000004020
r11=000003b82c027038 r12=0000000000000000 r13=0000000000007fff
r14=000003b904c1c800 r15=0000000000000002
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
server+0x6d1c8e:
00007ff9`a7331c8e 488b4310 mov rax,qword ptr [rbx+10h] ds:00000000`00000010=????????????????
Resetting default scope

EXCEPTION_RECORD: (.exr -1)
ExceptionAddress: 00007ff9a7331c8e (server+0x00000000006d1c8e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010

PROCESS_NAME: deadlock.exe

READ_ADDRESS: 0000000000000010

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000010

STACK_TEXT:
000000dd`f55eaed0 00007ff9`a732e0ce : 000003b9`abaa5000 00000000`00000000 000000dd`f55eb840 00000000`ffffffff : server+0x6d1c8e
000000dd`f55eb310 00007ff9`a71d451d : 000003b9`abaa5000 000003b9`04c1c800 000000dd`f55eb840 00000000`00000000 : server+0x6ce0ce
000000dd`f55eb5d0 00007ff9`a756fee1 : 00000000`44798d00 000003b9`04c1c800 00000000`0000001b 00000000`0000003b : server+0x57451d
000000dd`f55eb7e0 00007ff9`a74f22b0 : 000003b8`e3572000 000000dd`f55eb9b0 00000000`00000000 000003b8`e3572000 : server+0x90fee1
000000dd`f55eb8b0 00007ff9`a708469c : 00000000`00000000 000003b8`e3572000 00007ff9`a7084650 000003b8`e3572000 : server+0x8922b0
000000dd`f55ebce0 00007ff9`a7565b41 : 000003b8`e3572000 000003b8`e3572000 000000dd`f55ebdb0 000003b8`e3572000 : server+0x42469c
000000dd`f55ebd40 00007ff9`a7f31065 : 00007ff9`a7084650 000000dd`f55ebeb0 000003b8`00000000 000003b8`e3572000 : server+0x905b41
000000dd`f55ebdb0 00007ff9`a7f3139b : 00000000`0000f98d 00000000`00000001 00000000`00000000 00000000`0000f98d : server+0x12d1065
000000dd`f55ebf80 00007ff9`a766395c : 000003b8`e3572000 00000000`00000024 000003b9`0000f98d 000003b9`00000000 : server+0x12d139b
000000dd`f55ebfb0 00007ff9`a7ec38ee : 000003b9`ab754058 00000000`44798d00 00000000`00000000 000000dd`f55ee079 : server+0xa0395c
000000dd`f55ee020 00007ffa`0408e49a : 000003b9`ab754000 00007ffa`04021401 000000dd`f55ee700 00007ffa`048bb601 : server+0x12638ee
000000dd`f55ee0e0 00007ffa`041b1222 : 00007ffa`048bb620 00007ffa`048bcad8 00007ffa`04568001 00000000`00000000 : engine2!antlr3dfaspecialStateTransition+0x451da
000000dd`f55ee180 00007ffa`0401a7ef : 00000000`00000001 00000000`00000001 00007ffa`045c15f0 00000000`00000000 : engine2!antlr3dfaspecialStateTransition+0x167f62
000000dd`f55ee1b0 00007ffa`041fb911 : 00000011`980dc774 000000dd`f55ee360 000003b8`8bfe0800 00007ffa`04085eef : engine2!antlr3dfaspecialTransition+0x26f6f
000000dd`f55ee240 00007ffa`041f726e : 00007ffa`045c15f0 00000000`00000000 00007ffa`2a2690c0 00007ffa`041cd880 : engine2!Source2Main+0x1df81
000000dd`f55ee290 00007ffa`041e1696 : 00007ffa`2a269000 00000000`00000000 000000dd`f55ee2e0 00000000`00000438 : engine2!Source2Main+0x198de
000000dd`f55ee610 00007ffa`041d9afd : 00000002`00000000 00000000`00000001 00000000`00000000 00000011`980dbe48 : engine2!Source2Main+0x3d06
000000dd`f55eea60 00007ffa`041dad26 : 000003b8`2cf08520 00000000`00000003 000000dd`f55edff0 00000000`00000000 : engine2!antlr3dfaspecialStateTransition+0x19083d
000000dd`f55eeb70 00007ffa`041ddb5f : 00000000`00000001 00000000`00000000 00007ffa`2a48c320 00000000`00000000 : engine2!antlr3dfaspecialStateTransition+0x191a66
000000dd`f55eebf0 00007ff7`5e884be0 : 00007ffa`041dd990 0000024c`f4dd3848 00000000`00000000 0000024c`f4dd3848 : engine2!Source2Main+0x1cf
000000dd`f55eec80 00007ff7`5e88e8de : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : deadlock+0x4be0
000000dd`f55efbf0 00007ffa`6f6c7374 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : deadlock!BSecureAllowed+0x9c5e
000000dd`f55efc30 00007ffa`716dcc91 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
000000dd`f55efc60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


STACK_COMMAND: ~0s; .ecxr ; kb

SYMBOL_NAME: server+6d1c8e

MODULE_NAME: server

IMAGE_NAME: server.dll

FAILURE_BUCKET_ID: INVALID_POINTER_READ_c0000005_server.dll!Unknown

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8d9ff6b7-69ef-4871-e8ee-bcc47a0c732c}

Followup: MachineOwner
---------
 
Back
Top