Advertisement
fusionnetxls

BZII QF2 Mission 7 Error

Mar 25th, 2014
83
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.96 KB | None | 0 0
  1. ---- Battlezone II Log File ----
  2. //=====================================================
  3. App version: bzone 1.3.6.4z19 Public Beta Jan 29 2014 21:37:38
  4. Windows version: Windows Version: 6.1.7601 'Service Pack 1' PlatformID=2
  5.  
  6. Last few battlezone.log lines (may or may not be relevant):
  7. DIAG| ParameterDB:214 |14:38:19|34515 | 1 : q2noeffect4.odf
  8. DIAG| ParameterDB:214 |14:38:19|34515 | 2 : wwatckball.odf
  9. DIAG| ParameterDB:214 |14:38:19|34515 | 3 : gwwatckball.odf
  10. DIAG| ParameterDB:214 |14:38:19|34516 | 4 : apwwatckball.odf
  11. WARN| ParameterDB:1701 |14:38:19|34516 |WARNING: ODF wwatckball.odf, [GameObjectClass]::damageEffect4 tries to point to EffectClass q2noeffect4, but couldn't find it. Might want to check ODFs
  12. DIAG| meshread:2188 |14:38:19|34569 |Missing binary mesh wbstowFLD.xsi, use XSI
  13. DIAG| meshread:2199 |14:38:19|34569 |Building wbstowFLD .msh
  14. DIAG| meshread:2205 |14:38:19|34569 |Missing file wbstowFLD.msh (Ignore if creating assets, but end users should NOT see this)
  15. (done)
  16.  
  17. Exception code: C0000005 (ACCESS VIOLATION) WRITING to 00000000h
  18. Message : Exception
  19. Error occurred at 3/25/2014 14:38:24.
  20. C:\Users\Mac\Documents\BZII\Battlezone II 1.3PB6\bzone.exe, run by Mac.
  21. C:\Users\Mac\Documents\BZII\Battlezone II 1.3PB6\bzone.exe, run by Mac.
  22. CPU: 8 processor(s), Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz
  23. Intel64 Family 6 Model 58 Stepping 9
  24. Process Memory : 553 MB free out of 2048 MB total
  25. Physical memory: 11141 MB free out of 16267 MB total
  26. Page(swap) file: 26874 MB free out of 32531 MB total
  27. This exe is using 1041 MB (294 MB dlmalloc), peak use 1120 MB
  28.  
  29. Fault address: 0107B00F 01:0023A00F C:\Users\Mac\Documents\BZII\Battlezone II 1.3PB6\bzone.exe
  30.  
  31. Registers:
  32. EAX:00000000
  33. EBX:00000000
  34. ECX:0256CC38
  35. EDX:0256CC3C
  36. ESI:41648518
  37. EDI:4211FE58
  38. CS:EIP:0023:0107B00F
  39. SS:ESP:002B:005CE20C EBP:7339BDB0
  40. DS:002B ES:002B FS:0053 GS:002B
  41. Flags:00010202
  42.  
  43. Call stack:
  44. Address Offset1 Offset2 Module SourceFile
  45. 0107B00F +0023B00F 0000000F bzone (bzone): : BZ2MemMalloc
  46.  
  47. 00F519C2 +001119C2 000004A3 bzone (bzone): : EntityClass::Find
  48.  
  49. 00F519E0 +001119E0 000004C1 bzone (bzone): : EntityClass::Find
  50.  
  51. 010779E3 +002379E3 00000043 bzone (bzone): : dlmalloc
  52.  
  53. 0107B00A +0023B00A 0000000A bzone (bzone): : BZ2MemMalloc
  54.  
  55. 00F7272D +0013272D 0000004A bzone (bzone): : std::list<std::pair<unsigned long const ,ExplosionClass const *>,std::allocator<std::pair<unsigned long const ,ExplosionClass const *> > >::_Insert
  56.  
  57. 00E7F328 +0003F328 000000AF bzone (bzone): : stdext::_Hash<stdext::_Hmap_traits<unsigned long,AudioCacheItem *,stdext::hash_compare<unsigned long,std::less<unsigned long> >,std::allocator<std::pair<unsigned long const ,AudioCacheItem *> >,0> >::_Insert
  58.  
  59. 00E7F0A3 +0003F0A3 00000075 bzone (bzone): : AudioCache::GetItem
  60.  
  61. 00E80653 +00040653 0000000B bzone (bzone): : PreloadGASSound
  62.  
  63. 00E7F65C +0003F65C 00000014 bzone (bzone): : PreloadAudioMessage
  64.  
  65. 4EFE146F +0000146F 000002AD qf2cmpms07 (qf2cmpms07): : GetMisnAPI
  66.  
  67. 00F66F84 +00126F84 000004B1 bzone (bzone): : LoadGame
  68.  
  69. 00F66946 +00126946 00000104 bzone (bzone): : LoadGame
  70.  
  71. 00E98BE8 +00058BE8 0000040F bzone (bzone): : InitHandler::Process
  72.  
  73. 01070C74 +00230C74 00000064 bzone (bzone): : Main::MessagePump
  74.  
  75. 00E8B43F +0004B43F 000004F0 bzone (bzone): : HandledMain
  76.  
  77. 00E8B0F2 +0004B0F2 000001A3 bzone (bzone): : HandledMain
  78.  
  79. 00E882A9 +000482A9 00000069 bzone (bzone): : WinMain
  80.  
  81. 01012B8F +001D2B8F 00000191 bzone (bzone): : strcat
  82.  
  83. 7659336A +0001336A 00000012 kernel32 (kernel32): : BaseThreadInitThunk
  84.  
  85. 77259F72 +00039F72 00000063 ntdll (ntdll): : RtlInitializeExceptionChain
  86.  
  87. 77259F45 +00039F45 00000036 ntdll (ntdll): : RtlInitializeExceptionChain
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement