Zandronum Chat on our Discord Server Get the latest version: 3.2
Source Code

View Issue Details Jump to Notes ] Issue History ] Print ]
IDProjectCategoryView StatusDate SubmittedLast Update
0001286Zandronum[All Projects] Bugpublic2013-02-23 23:012014-06-13 17:48
ReporterAnthrax 
Assigned To 
PriorityhighSeveritycrashReproducibilityalways
StatusclosedResolutionunable to reproduce 
PlatformLinuxOSUbuntu 12.04 x86_64OS Version3.2.0-38-generic
Product Version1.0 
Target VersionFixed in Version 
Summary0001286: Cannot load saved games from Military Base
DescriptionVersion: Zandronum v1.1-alpha - SVN revision 130120-0905 - SDL version Compiled on Jan 20 2013

E1M9 - Military Base

Skin 'bloodpoolstains.png' not found in 'NashGore_BloodSpot'


*** Fatal Error ***
Address not mapped to object (signal 11)
Address: 0x100162f650

Generating zandronum-crash.log and killing process 3321, please wait... sh: 1: gxmessage: not found
Killed
Steps To Reproduce1. save at military base
2. load the one above
3. crash
Additional Informationusing brutal doom 18a
Attached Filestxt file icon gxmessage.txt [^] (18,841 bytes) 2013-02-24 18:38 [Show Content]
txt file icon GZDoomV121.txt [^] (12,895 bytes) 2013-02-27 21:49 [Show Content]

- Relationships

-  Notes
User avatar (0006068)
Edward-san (developer)
2013-02-24 00:48

what happens if you install 'gxmessage' in your system and retry again?
User avatar (0006073)
Anthrax (reporter)
2013-02-24 18:38

Hi,

I've attached a file with the output of 'gxmessage'. Please take a look.
User avatar (0006075)
Edward-san (developer)
2013-02-24 21:34
edited on: 2013-02-24 21:35

can you reproduce this without some of these wads:

Wad 2: DoomMetalVol3.wad
Wad 3: smivhudwidescreen.wad
Wad 4: zdoom-dhtp-20121229.pk3
Wad 5: brutalv018a.pk3
Wad 6: brutalv018a.pk3:terrain.wad

?

User avatar (0006078)
Anthrax (reporter)
2013-02-25 05:47

Hi, I can tell that only tomorrow.

So far - under Windows 7 x86_64, the same build with the same set of wads DIDN'T crash at Military Base or anywhere else. Although I doubt very much that OpenGL render was active. Both, software and OpenGL renders look exactly the same under Windows, despite the fact that I've restarted Zandro in order to apply new settings.
User avatar (0006081)
Anthrax (reporter)
2013-02-26 18:41

Sorry for such a delay between messages. The bug obviously caused by Brutal Doom. I've removed all the WADS, and there was no crash. Too bad that Brutal Doom doesn't have Bugtracker.
User avatar (0006082)
Edward-san (developer)
2013-02-26 22:12

So, can you reproduce this with gzdoom 1.7.1? Brutal Doom should run with it.
User avatar (0006085)
Anthrax (reporter)
2013-02-27 05:19

GZDoom 1.7.1 (r4164) doesn't have such a problem. Tested today, with the same brutaldoom version 18a.
User avatar (0006086)
Edward-san (developer)
2013-02-27 08:12

What about gzdoom 323:'http://zandronum.com/downloads/upstream/gzdoom-r323linux.tar.bz2 [^]' ?
User avatar (0006089)
Anthrax (reporter)
2013-02-27 21:49

Could not run it, error report attached ^^
User avatar (0006093)
Mr. Chris (reporter)
2013-03-05 17:05
edited on: 2013-03-05 22:42

Hello, I have access violation after dying a number of times, reloading save with +use key and said save game cannot be loaded without crashing with the same message as well as unrecoverable.

Unlike the first post, I tested a savegame made in E1M9 and loaded it. I did not crash at all.

This is crash data from November '12

Code: C0000005 (Access Violation - tried to read address 19971EA1)
Address: 004C57A5
Flags: 00000000

Windows NT 6.1 Build 7601 Service Pack 1

GS=002b FS=0053 ES=002b DS=002b
EAX=00000000 EBX=00000020 ECX=1308b3e8 EDX=06aaf400
ESI=1308b3e8 EDI=19971e9f
EBP=00000000 EIP=004c57a5 ESP=0018f25c CS=0023 SS=002b
EFlags=00010246
 CF- PF+ AF- ZF+ SF- TF- IF+ DF- OF- NT- RF+ VM- AC- VI- VP-

FPU State:
 ControlWord=027f StatusWord=0133 TagWord=ffff
 ErrorOffset=00000000
 ErrorSelector=00000000
 DataOffset=000000a0
 DataSelector=00000000
 Cr0NpxState=00000000

MM0=ccccccccccccd000
MM1=0000000000000000
MM2=fc21ed6000000000
MM3=0000000000000000
MM4=0000002b00000000
MM5=1308b3e819971e9f
MM6=0000000000000000
MM7=0000002b0018f25c

Running threads:
000007c8 at 004C57A5*
00001280
00001254
000011e8
000010a4
000013f8
000002e0
00001324
000005e0
00000d8c
00000c40
00000408
000011b4
00001270
00000aa8
000010b4
0000121c
0000122c
00001330
000012a0
0000135c
00000fac
00001370
00001318
00001258
00001170
000011bc
00000a58

Zandronum version 1.0-r120819-2011 (Aug 19 2012)

Command line: E:/Doom2/Zandronum/zandronum.exe -iwad E:/Doom2/DOOM2.WAD -file E:/Doom2/Zandronum/skulltag_actors.pk3 E:/Doom2/Zandronum/skulltag_data.pk3 E:/Doom2/~RMG5.wad E:/Doom2/brutalv017.pk3 E:/Doom2/cchest4.wad

Wad 0: zandronum.pk3
Wad 1: DOOM2.WAD
Wad 2: ZanACG.pk3
Wad 3: ZanGeneric.pk3
Wad 4: skulltag_actors.pk3
Wad 5: skulltag_data.pk3
Wad 6: ~RMG5.wad
Wad 7: brutalv017.pk3
Wad 8: brutalv017.pk3:terrain.wad
Wad 9: cchest4.wad

Current map: MAP10

Network state: SINGLE

viewx = -105450419
viewy = -29788092
viewz = -262201
viewangle = 3ed80000

User avatar (0006099)
Mr. Chris (reporter)
2013-03-10 05:09
edited on: 2013-03-10 05:10

Another one from simply myself having quicksaved but never dying, this crash happened when I did a load from using F3 under Windows 7 64 bit..

Memory dump plus info:'http://www.mediafire.com/?1lml17f10ly3v5t [^]'

Zandronum version 1.0-r120819-2011 (Aug 19 2012)

Command line: E:/Doom2/Zandronum/zandronum.exe -iwad E:/Doom2/DOOM2.WAD -file E:/Doom2/brutalv018a.pk3 E:/Doom2/BDMutator_noscreeneffects.pk3 E:/Doom2/nerve.wad E:/Doom2/skies01.wad E:/Doom2/D2MUS2012.wad E:/Doom2/NERVEINFO.WAD

Wad 0: zandronum.pk3
Wad 1: DOOM2.WAD
Wad 2: ZanACG.pk3
Wad 3: ZanGeneric.pk3
Wad 4: brutalv018a.pk3
Wad 5: brutalv018a.pk3:terrain.wad
Wad 6: BDMutator_noscreeneffects.pk3
Wad 7: nerve.wad
Wad 8: skies01.wad
Wad 9: D2MUS2012.wad
Wad 10: NERVEINFO.WAD

Current map: MAP05

Network state: SINGLE

viewx = 7697172
viewy = 17067416
viewz = 3014656
viewangle = ce1be334

Code: C0000005 (Access Violation - tried to read address 19699B10)
Address: 004C57A5
Flags: 00000000

Windows NT 6.1 Build 7601 Service Pack 1

GS=002b FS=0053 ES=002b DS=002b
EAX=00000000 EBX=00000020 ECX=0d4a8608 EDX=06a43700
ESI=0d4a8608 EDI=19699b0e
EBP=00000000 EIP=004c57a5 ESP=0018f25c CS=0023 SS=002b
EFlags=00010246
 CF- PF+ AF- ZF+ SF- TF- IF+ DF- OF- NT- RF+ VM- AC- VI- VP-

FPU State:
 ControlWord=027f StatusWord=0133 TagWord=ffff
 ErrorOffset=03f456e0
 ErrorSelector=fffff880
 DataOffset=000000a0
 DataSelector=00000000
 Cr0NpxState=071da010

MM0=ccccccccccccd000
MM1=9000000000000000
MM2=b07d5d8000000000
MM3=b6404ac000000000
MM4=0000002b071da010
MM5=0d4a860819699b0e
MM6=0000000000000000
MM7=0000002b0018f25c

Running threads:
00000190 at 004C57A5*
000037ec
000037f0
00001f78
000010f0
00003e64
00000b54
0000129c
00003fa4
00002d9c
00003cb0
00001bd0
00003ef0
000034c8
00002acc
00001f7c
000022fc
000023d8
00003a70

Loaded modules:
00400000 - 013E8FFF *zandronum.exe
77820000 - 7799FFFF ntdll.dll
72960000 - 7299BFFF snxhk.dll
759E0000 - 75AEFFFF KERNEL32.dll
75130000 - 75176FFF KERNELBASE.dll
75180000 - 7520FFFF GDI32.dll
76830000 - 7692FFFF USER32.dll
75940000 - 759DFFFF ADVAPI32.dll
75000000 - 750ABFFF msvcrt.dll
754F0000 - 75508FFF sechost.dll
75380000 - 7546FFFF RPCRT4.dll
74F00000 - 74F5FFFF SspiCli.dll
74EF0000 - 74EFBFFF CRYPTBASE.dll
754D0000 - 754D9FFF LPK.dll
75AF0000 - 75B8CFFF USP10.dll
729E0000 - 72B7DFFF COMCTL32.dll
74F70000 - 74FC6FFF SHLWAPI.dll
75BE0000 - 76829FFF SHELL32.dll
750B0000 - 7512AFFF COMDLG32.dll
75210000 - 7536BFFF ole32.dll
74BC0000 - 74BC6FFF WSOCK32.dll
76C60000 - 76C94FFF WS2_32.dll
74F60000 - 74F65FFF NSI.dll
73B50000 - 73B81FFF WINMM.dll
10000000 - 101C2FFF fmodex.dll
72320000 - 72333FFF MSACM32.dll
65C20000 - 65CE7FFF OPENGL32.dll
740B0000 - 740D1FFF GLU32.dll
65B30000 - 65C16FFF DDRAW.dll
74280000 - 74285FFF DCIMAN32.dll
75510000 - 756ACFFF SETUPAPI.dll
75BB0000 - 75BD6FFF CFGMGR32.dll
76930000 - 769BEFFF OLEAUT32.dll
75B90000 - 75BA1FFF DEVOBJ.dll
72090000 - 720A2FFF dwmapi.dll
76A50000 - 76AAFFFF IMM32.DLL
76E90000 - 76F5BFFF MSCTF.dll
71820000 - 71895FFF riched20.dll
726A0000 - 7271FFFF uxtheme.dll
66DB0000 - 66DCDFFF ltc_help32-68721.dll
76E60000 - 76E8CFFF WINTRUST.dll
75700000 - 7581DFFF CRYPT32.dll
75370000 - 7537BFFF MSASN1.dll
03A50000 - 03CCCFFF xfire_toucan_46105.dll
74E20000 - 74E24FFF MSIMG32.dll
7C340000 - 7C395FFF MSVCR71.DLL
74B70000 - 74B7CFFF wtsapi32.dll
730A0000 - 730C8FFF WINSTA.dll
769C0000 - 76A42FFF CLBCatQ.DLL
720C0000 - 720F8FFF MMDevApi.dll
724F0000 - 725E4FFF PROPSYS.dll
6E810000 - 6E83FFFF wdmaud.drv
718A0000 - 718A3FFF ksuser.dll
6E540000 - 6E546FFF AVRT.dll
6E520000 - 6E535FFF bassmididrv.dll
11000000 - 11062FFF BASS.dll
10600000 - 10610FFF BASSMIDI.dll
72650000 - 72685FFF AUDIOSES.DLL
63190000 - 63197FFF msacm32.drv
63180000 - 63186FFF midimap.dll
74B80000 - 74BBBFFF mswsock.dll
73690000 - 73694FFF wshtcpip.dll
72D90000 - 72D9FFFF NLAapi.dll
72D80000 - 72D8FFFF napinsp.dll
72D60000 - 72D71FFF pnrpnsp.dll
72CD0000 - 72D13FFF DNSAPI.dll
72CC0000 - 72CC7FFF winrnr.dll
72C50000 - 72C70FFF mdnsNSP.dll
74CE0000 - 74CFBFFF Iphlpapi.DLL
74CD0000 - 74CD6FFF WINNSI.DLL
72BB0000 - 72BE7FFF fwpuclnt.dll
72BF0000 - 72BF5FFF rasadhlp.dll
72060000 - 7208FFFF dinput8.dll
72850000 - 72858FFF HID.DLL
740E0000 - 740E6FFF atiglpxx.dll
69030000 - 6A289FFF atioglxx.dll
74E10000 - 74E18FFF VERSION.dll
65970000 - 65A2BFFF aticfx32.dll
656C0000 - 6571BFFF atiadlxy.dll
74B50000 - 74B66FFF USERENV.dll
74B40000 - 74B4AFFF profapi.dll
754E0000 - 754E4FFF PSAPI.DLL
740A0000 - 740AAFFF atigktxx.dll

Bytes near EIP:
004C5795: 8b 86 b8 00 00 00 a9 00 80 00 00 57 8b 7c 24 14
004C57A5: 0f bf 6f 02 75 1a a9 00 00 01 00 75 58 b9 03 00
004C57B5: 00 00 e8 74 81 f9 ff 85 c0 0f 95 c0 84 c0 74 45

Possible call trace:
 004c57a5 BOOM
 004C5853 call 004C5790
 004CD982 call 004C5820
 0044438B call 004449C0
 00447EDB call eax
 00447FF4 call 00447E10
 004E88EB call 00447FB0
 006b9177 call [006f5134]
 006b930a call [006f5124]
 006B3923 call 006B929E
 006D2551 jmp 004154F0 => jmp 00466AF0
 00455189 call 004E8110
 0043E445 call 00454B40
 0043AE23 call 0043E030
 006cedf0
 004f0120
 004f0120
 004f0120
 0056b64b call [006f54dc]
 0056b5a0
 0056B629 call 006AD72F
 004f0120
 004f0120
 004f0120
 0056b5a0
 004f0120
 0056b5a0
 006afdc9 call [006f52e4]
 005459f9 call [006f52e4]
 006CE693 jmp 005459E0
 00417B1E call 00417A50
 0056CC93 call 00417B10
 0056CCC5 call 006AD72F
 00466C0A call 006B3F33
 00416BA4 call 00466BF0
 006CEE42 jmp 005459E0
 0056C44E call 0043B3A0
 0056b5a0
 006D5663 jmp 004154F0 => jmp 00466AF0
 00646463
 0056C8CE call 0056C020
 006B5336 call 0056C850
 006b49c0
 006b53a4
 006b53a4


Issue Community Support
This issue is already marked as resolved.
If you feel that is not the case, please reopen it and explain why.
Supporters: Mr. Chris
Opponents: No one explicitly opposes this issue yet.

- Issue History
Date Modified Username Field Change
2013-02-23 23:01 Anthrax New Issue
2013-02-24 00:48 Edward-san Note Added: 0006068
2013-02-24 18:38 Anthrax File Added: gxmessage.txt
2013-02-24 18:38 Anthrax Note Added: 0006073
2013-02-24 21:34 Edward-san Note Added: 0006075
2013-02-24 21:35 Edward-san Note Edited: 0006075 View Revisions
2013-02-25 05:47 Anthrax Note Added: 0006078
2013-02-26 18:41 Anthrax Note Added: 0006081
2013-02-26 22:12 Edward-san Note Added: 0006082
2013-02-27 05:19 Anthrax Note Added: 0006085
2013-02-27 08:12 Edward-san Note Added: 0006086
2013-02-27 21:49 Anthrax Note Added: 0006089
2013-02-27 21:49 Anthrax File Added: GZDoomV121.txt
2013-03-05 17:05 Mr. Chris Note Added: 0006093
2013-03-05 17:07 Mr. Chris Note Edited: 0006093 View Revisions
2013-03-05 20:26 Mr. Chris Note Edited: 0006093 View Revisions
2013-03-05 22:42 Mr. Chris Note Edited: 0006093 View Revisions
2013-03-10 05:09 Mr. Chris Note Added: 0006099
2013-03-10 05:10 Mr. Chris Note Edited: 0006099 View Revisions
2014-06-13 17:48 Watermelon Status new => closed
2014-06-13 17:48 Watermelon Resolution open => unable to reproduce






Questions or other issues? Contact Us.

Links


Copyright © 2000 - 2025 MantisBT Team
Powered by Mantis Bugtracker