Advertisement
fusionnetxls

BZII QF2 Mission 12 Error

Mar 25th, 2014
87
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.02 KB | None | 0 0
  1. ---- Battlezone II Log File ----
  2. //=====================================================
  3. App version: bzone 1.3.6.4z19 Public Beta Jan 29 2014 21:37:38
  4. Windows version: Windows Version: 6.1.7601 'Service Pack 1' PlatformID=2
  5.  
  6. Last few battlezone.log lines (may or may not be relevant):
  7. WARN| ParameterDB:1701 |04:28:36|9517047|WARNING: ODF yyseek01.odf, [GameObjectClass]::effectName3 tries to point to EffectClass qvserv.shadow3, but couldn't find it. Might want to check ODFs
  8. WARN| ParticleRenderClass:465 |04:28:36|9517048|ERROR: Effect "qvserv.shadow4" has no base class specified
  9. DIAG| ParameterDB:209 |04:28:36|9517048|Last few opened ODFs:
  10. DIAG| ParameterDB:214 |04:28:36|9517048| 1 : qvserv.odf
  11. DIAG| ParameterDB:214 |04:28:36|9517048| 2 : qvserv.odf
  12. DIAG| ParameterDB:214 |04:28:36|9517048| 3 : qvserv.odf
  13. DIAG| ParameterDB:214 |04:28:36|9517048| 4 : qvserv.odf
  14. WARN| ParameterDB:1701 |04:28:36|9517048|WARNING: ODF yyseek01.odf, [GameObjectClass]::effectName4 tries to point to EffectClass qvserv.shadow4, but couldn't find it. Might want to check ODFs
  15. (done)
  16.  
  17. Exception code: C0000005 (ACCESS VIOLATION) WRITING to 00000000h
  18. Message : Exception
  19. Error occurred at 3/26/2014 04:28:38.
  20. C:\Users\Mac\Documents\BZII\Battlezone II 1.3PB6\bzone.exe, run by Mac.
  21. C:\Users\Mac\Documents\BZII\Battlezone II 1.3PB6\bzone.exe, run by Mac.
  22. CPU: 8 processor(s), Intel(R) Core(TM) i7-3740QM CPU @ 2.70GHz
  23. Intel64 Family 6 Model 58 Stepping 9
  24. Process Memory : 285 MB free out of 2048 MB total
  25. Physical memory: 9069 MB free out of 16267 MB total
  26. Page(swap) file: 24312 MB free out of 32531 MB total
  27. This exe is using 1181 MB (196 MB dlmalloc), peak use 1332 MB
  28.  
  29. Fault address: 00C7B00F 01:0023A00F C:\Users\Mac\Documents\BZII\Battlezone II 1.3PB6\bzone.exe
  30.  
  31. Registers:
  32. EAX:00000000
  33. EBX:00000000
  34. ECX:0216CC38
  35. EDX:0216CC3C
  36. ESI:20E2EAE8
  37. EDI:2E58FF98
  38. CS:EIP:0023:00C7B00F
  39. SS:ESP:002B:0066D40C EBP:73BABDB0
  40. DS:002B ES:002B FS:0053 GS:002B
  41. Flags:00010206
  42.  
  43. Call stack:
  44. Address Offset1 Offset2 Module SourceFile
  45. 00C7B00F +0023B00F 0000000F bzone (bzone): : BZ2MemMalloc
  46.  
  47. 00B519C2 +001119C2 000004A3 bzone (bzone): : EntityClass::Find
  48.  
  49. 00B519E0 +001119E0 000004C1 bzone (bzone): : EntityClass::Find
  50.  
  51. 00C779E3 +002379E3 00000043 bzone (bzone): : dlmalloc
  52.  
  53. 00C7B00A +0023B00A 0000000A bzone (bzone): : BZ2MemMalloc
  54.  
  55. 00B7272D +0013272D 0000004A bzone (bzone): : std::list<std::pair<unsigned long const ,ExplosionClass const *>,std::allocator<std::pair<unsigned long const ,ExplosionClass const *> > >::_Insert
  56.  
  57. 00A7F328 +0003F328 000000AF bzone (bzone): : stdext::_Hash<stdext::_Hmap_traits<unsigned long,AudioCacheItem *,stdext::hash_compare<unsigned long,std::less<unsigned long> >,std::allocator<std::pair<unsigned long const ,AudioCacheItem *> >,0> >::_Insert
  58.  
  59. 00A7F0A3 +0003F0A3 00000075 bzone (bzone): : AudioCache::GetItem
  60.  
  61. 00A80653 +00040653 0000000B bzone (bzone): : PreloadGASSound
  62.  
  63. 00A7F65C +0003F65C 00000014 bzone (bzone): : PreloadAudioMessage
  64.  
  65. 70C3143A +0000143A 00000278 qf2cmpms08 (qf2cmpms08): : GetMisnAPI
  66.  
  67. 00B66F84 +00126F84 000004B1 bzone (bzone): : LoadGame
  68.  
  69. 00B66946 +00126946 00000104 bzone (bzone): : LoadGame
  70.  
  71. 00A98BE8 +00058BE8 0000040F bzone (bzone): : InitHandler::Process
  72.  
  73. 00C70C74 +00230C74 00000064 bzone (bzone): : Main::MessagePump
  74.  
  75. 00A8B43F +0004B43F 000004F0 bzone (bzone): : HandledMain
  76.  
  77. 00A8B0F2 +0004B0F2 000001A3 bzone (bzone): : HandledMain
  78.  
  79. 00A882A9 +000482A9 00000069 bzone (bzone): : WinMain
  80.  
  81. 00C12B8F +001D2B8F 00000191 bzone (bzone): : strcat
  82.  
  83. 75D0336A +0001336A 00000012 kernel32 (kernel32): : BaseThreadInitThunk
  84.  
  85. 77A69F72 +00039F72 00000063 ntdll (ntdll): : RtlInitializeExceptionChain
  86.  
  87. 77A69F45 +00039F45 00000036 ntdll (ntdll): : RtlInitializeExceptionChain
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement