• Welcome to Battlezone Universe.
 

News:

Welcome to the BZU Archive dated December 24, 2009. Topics and posts are in read-only mode. Those with accounts will be able to login and browse anything the account had access granted to at the time. No changes to permissions will be made to be given access to particular content. If you have any questions, please reach out to squirrelof09/Rapazzini.

Main Menu

pb4 crash

Started by mag, July 25, 2008, 10:12:23 AM

Previous topic - Next topic

mag

Hi, first off thanks for the creation of this patch, and the time it took. I have had a number of crashes with no log of why it happened. the common occurance is on instant action I am playing scion vs. isdf and a sabre is in the picture. sometime myself or my men are attacking it.

I also had a av with a log, sorry I don't remember the situation at the time.
---- Battlezone II Log File ----
//=====================================================
App version: Patch 1.3pb4 EDITOR Jun  9 2008 22:21:16
Exception code: C0000005 (ACCESS VIOLATION) READING from 00000350h
Message :  Exception
Error occurred at 7/14/2008 16:53:46.
C:\Program Files\Battlezone II 1.3 pb4\BZ2Edit.exe, run by Mag.
2 processor(s), type 586.
Process Memory :   1774 MB free out of   2048 MB total
Physical memory:    492 MB free out of   1023 MB total
Page(swap) file:   2018 MB free out of   2460 MB total
Fault address:  00426E6A 01:00025E6A C:\Program Files\Battlezone II 1.3 pb4\BZ2Edit.exe

Registers:
EAX:00000000
EBX:0E431F90
ECX:0AAA497C
EDX:E88051EC
ESI:00000005
EDI:000FFFFF
CS:EIP:001B:00426E6A
SS:ESP:0023:0228FA3C  EBP:0228FAC8
DS:0023  ES:0023  FS:003B  GS:0000
Flags:00210202

Call stack:
Address   Return    Function            SourceFile
00426E6A  00000000  0042C07F  Attacker::Execute+0x00000710
0042C07F  00000000  004016A1  ExecuteSchedPlans+0x0000054C
004016A1  00000000  00401F4B  AiMission::Update+0x00000103
00401F4B  00000000  0046C170  AI_Update+0x00000006
0046C170  00000000  0046CCEB  MoveOneTurn+0x00000109
0046CCEB  00000000  0057CF20  MissionHandler::State::RunState::Process+0x000003BE
0057CF20  00000000  0046A5F1  RunCodes::Process+0x0000019F
0046A5F1  00000000  0057CF20  MissionHandler::Process+0x00000011
0057CF20  00000000  0057C941  RunCodes::Process+0x0000019F
0057C941  00000000  00455EED  Main::MessagePump+0x0000004A
00455EED  00000000  00455BD7  HandledMain+0x00000444
00455BD7  00000000  00453701  HandledMain+0x0000012E
00453701  00000000  0058D126  WinMain+0x00000059
0058D126  00000000  7C816FD7  memset+0x00000192
7C816FD7  00000000  00000000  RegisterWaitForInputIdle+0x00000049

I will also add my comment about the other post about stupid scavs, I noticed (hard not too) the scavs and healers like to run into extracters and gun towers instead of going around them.

Steeveeo


(Click it for more art, y'know you wanna!)

Gone to college, but I now have internet.

mag

I've read it, what's your point?

Steeveeo

Quote from: Commando on June 16, 2008, 10:07:39 PM
3. If your AV has the following under CallStack, there is no need to post your AV.  A good 60% of the AVs posted are identical and involve the following.  It is a known issue that has been addressed.

Quote
Call stack:
Address   Return    Function            SourceFile
00426AC1  00000000  0042BD30  Attacker::Execute+0x00000710


Thats my point :P

(Click it for more art, y'know you wanna!)

Gone to college, but I now have internet.

mag

that's your point huh, maybe you should learn how to read before posting. the address and function have different numbers.

Warfreak

Ignorant fool (always wanted to say that :P) The first line says all, its the infamous pb4 Attacker crash.

If you want to be dumb and deny this (anyone), be my guest......

GSH

The numbers in the first and third columns are slightly different, because they were reported in bzone.exe vs bz2edit.exe. The function name and offset (Attacker::Execute+0x00000710) is identical, which is the most important part.

-- GSH

Steeveeo

Quote from: GSH on July 25, 2008, 02:14:19 PM
The numbers in the first and third columns are slightly different, because they were reported in bzone.exe vs bz2edit.exe. The function name and offset (Attacker::Execute+0x00000710) is identical, which is the most important part.

-- GSH
Quite possibly need to add that to the Readme

"Blah Blah Blah Attacker::Execute and such for BZone.exe"

And

"Bleh Bleh Bleh Attacker Execute and the like for BZ2edit.exe"

Would help to avoid confusions like this.

(Click it for more art, y'know you wanna!)

Gone to college, but I now have internet.

Feared_1

Bit of a touchy topic.

bigbadbogie

NO!! Don't touch it!!!
Others would merely say it was good humour.


My BZ2 mods:

QF2: Essence to a Thief - Development is underway.

Fleshstorm 2: The Harvest - Released on the 6th of November 2009. Got to www.bz2md.com for details.

QF Mod - My first mod, finished over a year ago. It can be found on BZ2MD.com

Nielk1

Can't...

Resist...

POKE

Click on the image...

bigbadbogie

N1s finger is ripped off and eaten by the topic.
Others would merely say it was good humour.


My BZ2 mods:

QF2: Essence to a Thief - Development is underway.

Fleshstorm 2: The Harvest - Released on the 6th of November 2009. Got to www.bz2md.com for details.

QF Mod - My first mod, finished over a year ago. It can be found on BZ2MD.com

Nielk1

Luckily my voodoo powers can regrow my finger...

I am pretty sure the numbers would be irrelevant no matter what they were (though 0x00000000 might need posting), its still a crash in the same function of the same class.

Click on the image...

squirrelof09

Congratulations, you guys have successfully run mag off.
fight till death our forums -> http://www.forums.bzfiend.com/index.php?

General BlackDragon

 :lol:

Naw, He's part of the family now...

:)

But really, Thats the first AV reported I think...it's been fixed in pb4a.



*****General BlackDragon*****