Anonymous | Login | Signup for a new account | 2025-07-23 06:17 UTC | ![]() |
My View | View Issues | Change Log | Roadmap | Zandronum Issue Support Ranking | Rules | My Account |
View Issue Details [ Jump to Notes ] | [ Issue History ] [ Print ] | ||||||||
ID | Project | Category | View Status | Date Submitted | Last Update | ||||
0001286 | Zandronum | [All Projects] Bug | public | 2013-02-23 23:01 | 2014-06-13 17:48 | ||||
Reporter | Anthrax | ||||||||
Assigned To | |||||||||
Priority | high | Severity | crash | Reproducibility | always | ||||
Status | closed | Resolution | unable to reproduce | ||||||
Platform | Linux | OS | Ubuntu 12.04 x86_64 | OS Version | 3.2.0-38-generic | ||||
Product Version | 1.0 | ||||||||
Target Version | Fixed in Version | ||||||||
Summary | 0001286: Cannot load saved games from Military Base | ||||||||
Description | Version: Zandronum v1.1-alpha - SVN revision 130120-0905 - SDL version Compiled on Jan 20 2013 E1M9 - Military Base Skin 'bloodpoolstains.png' not found in 'NashGore_BloodSpot' *** Fatal Error *** Address not mapped to object (signal 11) Address: 0x100162f650 Generating zandronum-crash.log and killing process 3321, please wait... sh: 1: gxmessage: not found Killed | ||||||||
Steps To Reproduce | 1. save at military base 2. load the one above 3. crash | ||||||||
Additional Information | using brutal doom 18a | ||||||||
Attached Files | ![]() ![]() | ||||||||
![]() |
|
Edward-san (developer) 2013-02-24 00:48 |
what happens if you install 'gxmessage' in your system and retry again? |
Anthrax (reporter) 2013-02-24 18:38 |
Hi, I've attached a file with the output of 'gxmessage'. Please take a look. |
Edward-san (developer) 2013-02-24 21:34 edited on: 2013-02-24 21:35 |
can you reproduce this without some of these wads:Wad 2: DoomMetalVol3.wad ? |
Anthrax (reporter) 2013-02-25 05:47 |
Hi, I can tell that only tomorrow. So far - under Windows 7 x86_64, the same build with the same set of wads DIDN'T crash at Military Base or anywhere else. Although I doubt very much that OpenGL render was active. Both, software and OpenGL renders look exactly the same under Windows, despite the fact that I've restarted Zandro in order to apply new settings. |
Anthrax (reporter) 2013-02-26 18:41 |
Sorry for such a delay between messages. The bug obviously caused by Brutal Doom. I've removed all the WADS, and there was no crash. Too bad that Brutal Doom doesn't have Bugtracker. |
Edward-san (developer) 2013-02-26 22:12 |
So, can you reproduce this with gzdoom 1.7.1? Brutal Doom should run with it. |
Anthrax (reporter) 2013-02-27 05:19 |
GZDoom 1.7.1 (r4164) doesn't have such a problem. Tested today, with the same brutaldoom version 18a. |
Edward-san (developer) 2013-02-27 08:12 |
What about gzdoom 323:'http://zandronum.com/downloads/upstream/gzdoom-r323linux.tar.bz2 [^]' ? |
Anthrax (reporter) 2013-02-27 21:49 |
Could not run it, error report attached ^^ |
Mr. Chris (reporter) 2013-03-05 17:05 edited on: 2013-03-05 22:42 |
Hello, I have access violation after dying a number of times, reloading save with +use key and said save game cannot be loaded without crashing with the same message as well as unrecoverable. Unlike the first post, I tested a savegame made in E1M9 and loaded it. I did not crash at all. This is crash data from November '12 Code: C0000005 (Access Violation - tried to read address 19971EA1) Address: 004C57A5 Flags: 00000000 Windows NT 6.1 Build 7601 Service Pack 1 GS=002b FS=0053 ES=002b DS=002b EAX=00000000 EBX=00000020 ECX=1308b3e8 EDX=06aaf400 ESI=1308b3e8 EDI=19971e9f EBP=00000000 EIP=004c57a5 ESP=0018f25c CS=0023 SS=002b EFlags=00010246 CF- PF+ AF- ZF+ SF- TF- IF+ DF- OF- NT- RF+ VM- AC- VI- VP- FPU State: ControlWord=027f StatusWord=0133 TagWord=ffff ErrorOffset=00000000 ErrorSelector=00000000 DataOffset=000000a0 DataSelector=00000000 Cr0NpxState=00000000 MM0=ccccccccccccd000 MM1=0000000000000000 MM2=fc21ed6000000000 MM3=0000000000000000 MM4=0000002b00000000 MM5=1308b3e819971e9f MM6=0000000000000000 MM7=0000002b0018f25c Running threads: 000007c8 at 004C57A5* 00001280 00001254 000011e8 000010a4 000013f8 000002e0 00001324 000005e0 00000d8c 00000c40 00000408 000011b4 00001270 00000aa8 000010b4 0000121c 0000122c 00001330 000012a0 0000135c 00000fac 00001370 00001318 00001258 00001170 000011bc 00000a58 Zandronum version 1.0-r120819-2011 (Aug 19 2012) Command line: E:/Doom2/Zandronum/zandronum.exe -iwad E:/Doom2/DOOM2.WAD -file E:/Doom2/Zandronum/skulltag_actors.pk3 E:/Doom2/Zandronum/skulltag_data.pk3 E:/Doom2/~RMG5.wad E:/Doom2/brutalv017.pk3 E:/Doom2/cchest4.wad Wad 0: zandronum.pk3 Wad 1: DOOM2.WAD Wad 2: ZanACG.pk3 Wad 3: ZanGeneric.pk3 Wad 4: skulltag_actors.pk3 Wad 5: skulltag_data.pk3 Wad 6: ~RMG5.wad Wad 7: brutalv017.pk3 Wad 8: brutalv017.pk3:terrain.wad Wad 9: cchest4.wad Current map: MAP10 Network state: SINGLE viewx = -105450419 viewy = -29788092 viewz = -262201 viewangle = 3ed80000 |
Mr. Chris (reporter) 2013-03-10 05:09 edited on: 2013-03-10 05:10 |
Another one from simply myself having quicksaved but never dying, this crash happened when I did a load from using F3 under Windows 7 64 bit.. Memory dump plus info:'http://www.mediafire.com/?1lml17f10ly3v5t [^]' Zandronum version 1.0-r120819-2011 (Aug 19 2012) Command line: E:/Doom2/Zandronum/zandronum.exe -iwad E:/Doom2/DOOM2.WAD -file E:/Doom2/brutalv018a.pk3 E:/Doom2/BDMutator_noscreeneffects.pk3 E:/Doom2/nerve.wad E:/Doom2/skies01.wad E:/Doom2/D2MUS2012.wad E:/Doom2/NERVEINFO.WAD Wad 0: zandronum.pk3 Wad 1: DOOM2.WAD Wad 2: ZanACG.pk3 Wad 3: ZanGeneric.pk3 Wad 4: brutalv018a.pk3 Wad 5: brutalv018a.pk3:terrain.wad Wad 6: BDMutator_noscreeneffects.pk3 Wad 7: nerve.wad Wad 8: skies01.wad Wad 9: D2MUS2012.wad Wad 10: NERVEINFO.WAD Current map: MAP05 Network state: SINGLE viewx = 7697172 viewy = 17067416 viewz = 3014656 viewangle = ce1be334 Code: C0000005 (Access Violation - tried to read address 19699B10) Address: 004C57A5 Flags: 00000000 Windows NT 6.1 Build 7601 Service Pack 1 GS=002b FS=0053 ES=002b DS=002b EAX=00000000 EBX=00000020 ECX=0d4a8608 EDX=06a43700 ESI=0d4a8608 EDI=19699b0e EBP=00000000 EIP=004c57a5 ESP=0018f25c CS=0023 SS=002b EFlags=00010246 CF- PF+ AF- ZF+ SF- TF- IF+ DF- OF- NT- RF+ VM- AC- VI- VP- FPU State: ControlWord=027f StatusWord=0133 TagWord=ffff ErrorOffset=03f456e0 ErrorSelector=fffff880 DataOffset=000000a0 DataSelector=00000000 Cr0NpxState=071da010 MM0=ccccccccccccd000 MM1=9000000000000000 MM2=b07d5d8000000000 MM3=b6404ac000000000 MM4=0000002b071da010 MM5=0d4a860819699b0e MM6=0000000000000000 MM7=0000002b0018f25c Running threads: 00000190 at 004C57A5* 000037ec 000037f0 00001f78 000010f0 00003e64 00000b54 0000129c 00003fa4 00002d9c 00003cb0 00001bd0 00003ef0 000034c8 00002acc 00001f7c 000022fc 000023d8 00003a70 Loaded modules: 00400000 - 013E8FFF *zandronum.exe 77820000 - 7799FFFF ntdll.dll 72960000 - 7299BFFF snxhk.dll 759E0000 - 75AEFFFF KERNEL32.dll 75130000 - 75176FFF KERNELBASE.dll 75180000 - 7520FFFF GDI32.dll 76830000 - 7692FFFF USER32.dll 75940000 - 759DFFFF ADVAPI32.dll 75000000 - 750ABFFF msvcrt.dll 754F0000 - 75508FFF sechost.dll 75380000 - 7546FFFF RPCRT4.dll 74F00000 - 74F5FFFF SspiCli.dll 74EF0000 - 74EFBFFF CRYPTBASE.dll 754D0000 - 754D9FFF LPK.dll 75AF0000 - 75B8CFFF USP10.dll 729E0000 - 72B7DFFF COMCTL32.dll 74F70000 - 74FC6FFF SHLWAPI.dll 75BE0000 - 76829FFF SHELL32.dll 750B0000 - 7512AFFF COMDLG32.dll 75210000 - 7536BFFF ole32.dll 74BC0000 - 74BC6FFF WSOCK32.dll 76C60000 - 76C94FFF WS2_32.dll 74F60000 - 74F65FFF NSI.dll 73B50000 - 73B81FFF WINMM.dll 10000000 - 101C2FFF fmodex.dll 72320000 - 72333FFF MSACM32.dll 65C20000 - 65CE7FFF OPENGL32.dll 740B0000 - 740D1FFF GLU32.dll 65B30000 - 65C16FFF DDRAW.dll 74280000 - 74285FFF DCIMAN32.dll 75510000 - 756ACFFF SETUPAPI.dll 75BB0000 - 75BD6FFF CFGMGR32.dll 76930000 - 769BEFFF OLEAUT32.dll 75B90000 - 75BA1FFF DEVOBJ.dll 72090000 - 720A2FFF dwmapi.dll 76A50000 - 76AAFFFF IMM32.DLL 76E90000 - 76F5BFFF MSCTF.dll 71820000 - 71895FFF riched20.dll 726A0000 - 7271FFFF uxtheme.dll 66DB0000 - 66DCDFFF ltc_help32-68721.dll 76E60000 - 76E8CFFF WINTRUST.dll 75700000 - 7581DFFF CRYPT32.dll 75370000 - 7537BFFF MSASN1.dll 03A50000 - 03CCCFFF xfire_toucan_46105.dll 74E20000 - 74E24FFF MSIMG32.dll 7C340000 - 7C395FFF MSVCR71.DLL 74B70000 - 74B7CFFF wtsapi32.dll 730A0000 - 730C8FFF WINSTA.dll 769C0000 - 76A42FFF CLBCatQ.DLL 720C0000 - 720F8FFF MMDevApi.dll 724F0000 - 725E4FFF PROPSYS.dll 6E810000 - 6E83FFFF wdmaud.drv 718A0000 - 718A3FFF ksuser.dll 6E540000 - 6E546FFF AVRT.dll 6E520000 - 6E535FFF bassmididrv.dll 11000000 - 11062FFF BASS.dll 10600000 - 10610FFF BASSMIDI.dll 72650000 - 72685FFF AUDIOSES.DLL 63190000 - 63197FFF msacm32.drv 63180000 - 63186FFF midimap.dll 74B80000 - 74BBBFFF mswsock.dll 73690000 - 73694FFF wshtcpip.dll 72D90000 - 72D9FFFF NLAapi.dll 72D80000 - 72D8FFFF napinsp.dll 72D60000 - 72D71FFF pnrpnsp.dll 72CD0000 - 72D13FFF DNSAPI.dll 72CC0000 - 72CC7FFF winrnr.dll 72C50000 - 72C70FFF mdnsNSP.dll 74CE0000 - 74CFBFFF Iphlpapi.DLL 74CD0000 - 74CD6FFF WINNSI.DLL 72BB0000 - 72BE7FFF fwpuclnt.dll 72BF0000 - 72BF5FFF rasadhlp.dll 72060000 - 7208FFFF dinput8.dll 72850000 - 72858FFF HID.DLL 740E0000 - 740E6FFF atiglpxx.dll 69030000 - 6A289FFF atioglxx.dll 74E10000 - 74E18FFF VERSION.dll 65970000 - 65A2BFFF aticfx32.dll 656C0000 - 6571BFFF atiadlxy.dll 74B50000 - 74B66FFF USERENV.dll 74B40000 - 74B4AFFF profapi.dll 754E0000 - 754E4FFF PSAPI.DLL 740A0000 - 740AAFFF atigktxx.dll Bytes near EIP: 004C5795: 8b 86 b8 00 00 00 a9 00 80 00 00 57 8b 7c 24 14 004C57A5: 0f bf 6f 02 75 1a a9 00 00 01 00 75 58 b9 03 00 004C57B5: 00 00 e8 74 81 f9 ff 85 c0 0f 95 c0 84 c0 74 45 Possible call trace: 004c57a5 BOOM 004C5853 call 004C5790 004CD982 call 004C5820 0044438B call 004449C0 00447EDB call eax 00447FF4 call 00447E10 004E88EB call 00447FB0 006b9177 call [006f5134] 006b930a call [006f5124] 006B3923 call 006B929E 006D2551 jmp 004154F0 => jmp 00466AF0 00455189 call 004E8110 0043E445 call 00454B40 0043AE23 call 0043E030 006cedf0 004f0120 004f0120 004f0120 0056b64b call [006f54dc] 0056b5a0 0056B629 call 006AD72F 004f0120 004f0120 004f0120 0056b5a0 004f0120 0056b5a0 006afdc9 call [006f52e4] 005459f9 call [006f52e4] 006CE693 jmp 005459E0 00417B1E call 00417A50 0056CC93 call 00417B10 0056CCC5 call 006AD72F 00466C0A call 006B3F33 00416BA4 call 00466BF0 006CEE42 jmp 005459E0 0056C44E call 0043B3A0 0056b5a0 006D5663 jmp 004154F0 => jmp 00466AF0 00646463 0056C8CE call 0056C020 006B5336 call 0056C850 006b49c0 006b53a4 006b53a4 |
This issue is already marked as resolved. If you feel that is not the case, please reopen it and explain why. |
|
Supporters: | Mr. Chris |
Opponents: | No one explicitly opposes this issue yet. |
![]() |
|||
Date Modified | Username | Field | Change |
2013-02-23 23:01 | Anthrax | New Issue | |
2013-02-24 00:48 | Edward-san | Note Added: 0006068 | |
2013-02-24 18:38 | Anthrax | File Added: gxmessage.txt | |
2013-02-24 18:38 | Anthrax | Note Added: 0006073 | |
2013-02-24 21:34 | Edward-san | Note Added: 0006075 | |
2013-02-24 21:35 | Edward-san | Note Edited: 0006075 | View Revisions |
2013-02-25 05:47 | Anthrax | Note Added: 0006078 | |
2013-02-26 18:41 | Anthrax | Note Added: 0006081 | |
2013-02-26 22:12 | Edward-san | Note Added: 0006082 | |
2013-02-27 05:19 | Anthrax | Note Added: 0006085 | |
2013-02-27 08:12 | Edward-san | Note Added: 0006086 | |
2013-02-27 21:49 | Anthrax | Note Added: 0006089 | |
2013-02-27 21:49 | Anthrax | File Added: GZDoomV121.txt | |
2013-03-05 17:05 | Mr. Chris | Note Added: 0006093 | |
2013-03-05 17:07 | Mr. Chris | Note Edited: 0006093 | View Revisions |
2013-03-05 20:26 | Mr. Chris | Note Edited: 0006093 | View Revisions |
2013-03-05 22:42 | Mr. Chris | Note Edited: 0006093 | View Revisions |
2013-03-10 05:09 | Mr. Chris | Note Added: 0006099 | |
2013-03-10 05:10 | Mr. Chris | Note Edited: 0006099 | View Revisions |
2014-06-13 17:48 | Watermelon | Status | new => closed |
2014-06-13 17:48 | Watermelon | Resolution | open => unable to reproduce |
Copyright © 2000 - 2025 MantisBT Team |