1.5 Final (?) Build (Updated 2011-12-11)

Moderators: GSH, Ultraken

User avatar
Ultraken
Patch Creator
Posts: 373
Joined: Fri Feb 18, 2011 6:06 pm
Contact:

1.5 Final (?) Build (Updated 2011-12-11)

Postby Ultraken » Tue Dec 06, 2011 6:02 am

At last!

Downloads:
Release Executable and Symbols (version 1.5.0.120)

I'm still gathering everything else into a unified package so I'll add that when I finish it.

Update: It looks like I put the wrong .pdb file in the archive. I just fixed that.

User avatar
Red Devil
Recycler
Posts: 4380
Joined: Fri Feb 18, 2011 5:10 pm
Location: High in the Rocky Mountains
Contact:

Re: 1.5 Final (?) Build

Postby Red Devil » Tue Dec 06, 2011 10:43 pm

i have to reinstall, since i think i dorked up my install

User avatar
Axeminister
Sabre
Posts: 442
Joined: Sat Feb 19, 2011 4:03 pm
Location: Texas, USA
Contact:

Re: 1.5 Final (?) Build

Postby Axeminister » Wed Dec 07, 2011 4:21 pm

Good news, I'll have to check this out.

teepean
Scrap
Posts: 6
Joined: Thu Dec 29, 2011 2:57 pm

Re: 1.5 Final (?) Build (Updated 2011-12-11)

Postby teepean » Thu Dec 29, 2011 3:06 pm

I can't get 1.5 working and it crashes at the beginning. I collected the data mentioned in the other post.

OS: Windows 7 x64 SP1

I installed Battlezone from a CD, updated to 1.4 and updated addon, assets, anet2 and all the suggested common files.

Small update: Release Candidate 16 works perfectly!

Major update: The game works when renamed to bzint_d3d9.exe. I've disabled anti-virus (Avast) before launching but maybe something else is interfering when executable is named bzone.exe.

Autos:

Code: Select all

      ESP   0018F740   
      ECX   00000000   
      EDX   00000000   


Call stack:

Code: Select all

>   user32.dll!_NtUserGetThreadState@4()  + 0x15 bytes   
    user32.dll!_NtUserGetThreadState@4()  + 0x15 bytes   
    snxhk.dll!73594e0b()    
    [Frames below may be incorrect and/or missing, no symbols loaded for snxhk.dll]   
    KernelBase.dll!_GetProcAddress@8()  + 0x44 bytes   
    apphelp.dll!_SeiGetProcAddress@16()  + 0x46 bytes   
    00000001()   
    00000001()   
    ffffffff()   


Output:

Code: Select all

'bzone.exe': Loaded 'L:\bzone\bzone.exe', Symbols loaded.
'bzone.exe': Loaded 'C:\Windows\SysWOW64\ntdll.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\kernel32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\KernelBase.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Program Files\AVAST Software\Avast\snxhk.dll', Cannot find or open the PDB file
'bzone.exe': Loaded 'L:\bzone\anet2.dll', Binary was not built with debug information.
'bzone.exe': Loaded 'C:\Windows\SysWOW64\user32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\gdi32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\lpk.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\usp10.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\msvcrt.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\advapi32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\sechost.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\rpcrt4.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\sspicli.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\cryptbase.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\winmm.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\dsound.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\ole32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\powrprof.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\setupapi.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\cfgmgr32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\oleaut32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\devobj.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\d3d9.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\version.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\d3d8thk.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\dwmapi.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'L:\bzone\STRLKUP.DLL', Binary was not built with debug information.
'bzone.exe': Loaded 'C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\comdlg32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\shlwapi.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\shell32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcp90.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\apphelp.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\AppPatch\AcSpecfc.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\mscms.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\userenv.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\profapi.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\ddraw.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\dciman32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\mpr.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\imm32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\msctf.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\ws2_32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\nsi.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\msi.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\AppPatch\AcGenral.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\uxtheme.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\samcli.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\msacm32.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\sfc.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\sfc_os.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\urlmon.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\iertutil.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\wininet.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\normaliz.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\AppPatch\AcLayers.dll', Symbols loaded (source information stripped).
'bzone.exe': Loaded 'C:\Windows\SysWOW64\winspool.drv', Symbols loaded (source information stripped).
First-chance exception at 0x75d40de3 (user32.dll) in bzone.exe: 0xC0000005: Access violation reading location 0x00000250.


 *** An Access Violation occurred in "L:\bzone\bzone.exe" :

The instruction at 0000000077A61221 tried to read from an invalid address, 0000000000000250

 *** enter .exr 000000000008EAE0 for the exception record
 ***  enter .cxr 000000000008E5F0 for the context
 *** then kb to get the faulting stack

Unhandled exception at 0x75d40de3 (user32.dll) in bzone.exe: 0xC000041D: An unhandled exception was encountered during a user callback.
First-chance exception at 0x75d40de3 (user32.dll) in bzone.exe: 0xC0000005: Access violation reading location 0x00000250.


 *** An Access Violation occurred in "L:\bzone\bzone.exe" :

The instruction at 0000000077A61221 tried to read from an invalid address, 0000000000000250

 *** enter .exr 000000000008EAE0 for the exception record
 ***  enter .cxr 000000000008E5F0 for the context
 *** then kb to get the faulting stack

Unhandled exception at 0x75d40de3 (user32.dll) in bzone.exe: 0xC000041D: An unhandled exception was encountered during a user callback.
First-chance exception at 0x75d40de3 (user32.dll) in bzone.exe: 0xC0000005: Access violation reading location 0x00000250.


 *** An Access Violation occurred in "L:\bzone\bzone.exe" :

The instruction at 0000000077A61221 tried to read from an invalid address, 0000000000000250

 *** enter .exr 000000000008EAE0 for the exception record
 ***  enter .cxr 000000000008E5F0 for the context
 *** then kb to get the faulting stack

Unhandled exception at 0x75d40de3 (user32.dll) in bzone.exe: 0xC000041D: An unhandled exception was encountered during a user callback.


Registers:

Code: Select all

EAX = 00000000 EBX = 73580000 ECX = 00000000 EDX = 00000000 ESI = 7359C278 EDI = 75AB0000 EIP = 75D40DE3 ESP = 0018F740 EBP = 0018F988 EFL = 00000246

CS = 0023 DS = 002B ES = 002B SS = 002B FS = 0053 GS = 002B

ST0 = +0.0000000000000000e+0000   ST1 = +0.0000000000000000e+0000   ST2 = +0.0000000000000000e+0000   ST3 = +0.0000000000000000e+0000   ST4 = +0.0000000000000000e+0000   ST5 = +0.0000000000000000e+0000   ST6 = +0.0000000000000000e+0000   ST7 = +0.0000000000000000e+0000   CTRL = 027F STAT = 0000 TAGS = FFFF EIP = 00000000 EDO = 00000000

MM0 = 0000000000000000 MM1 = 0000000000000000 MM2 = 0000000000000000 MM3 = 0000000000000000 MM4 = 0000000000000000 MM5 = 0000000000000000 MM6 = 0000000000000000 MM7 = 0000000000000000

XMM0 = 00000000000000000000000000000000 XMM1 = 00000000000000000000000000000000 XMM2 = 00000000000000000000000000000000 XMM3 = 00000000000000000000000000000000 XMM4 = 00000000000000000000000000000000 XMM5 = 00000000000000000000000000000000 XMM6 = 00000000000000000000000000000000 XMM7 = 00000000000000000000000000000000 XMM00 = +0.00000E+000      XMM01 = +0.00000E+000      XMM02 = +0.00000E+000      XMM03 = +0.00000E+000      XMM10 = +0.00000E+000      XMM11 = +0.00000E+000      XMM12 = +0.00000E+000     
XMM13 = +0.00000E+000      XMM20 = +0.00000E+000      XMM21 = +0.00000E+000      XMM22 = +0.00000E+000      XMM23 = +0.00000E+000      XMM30 = +0.00000E+000      XMM31 = +0.00000E+000      XMM32 = +0.00000E+000      XMM33 = +0.00000E+000      XMM40 = +0.00000E+000      XMM41 = +0.00000E+000      XMM42 = +0.00000E+000      XMM43 = +0.00000E+000      XMM50 = +0.00000E+000      XMM51 = +0.00000E+000      XMM52 = +0.00000E+000      XMM53 = +0.00000E+000      XMM60 = +0.00000E+000      XMM61 = +0.00000E+000     
XMM62 = +0.00000E+000      XMM63 = +0.00000E+000      XMM70 = +0.00000E+000      XMM71 = +0.00000E+000      XMM72 = +0.00000E+000      XMM73 = +0.00000E+000      MXCSR = 00001F80

XMM0DL = +0.0000000000000000E+000         XMM0DH = +0.0000000000000000E+000         XMM1DL = +0.0000000000000000E+000         XMM1DH = +0.0000000000000000E+000         XMM2DL = +0.0000000000000000E+000         XMM2DH = +0.0000000000000000E+000         XMM3DL = +0.0000000000000000E+000         XMM3DH = +0.0000000000000000E+000         XMM4DL = +0.0000000000000000E+000         XMM4DH = +0.0000000000000000E+000         XMM5DL = +0.0000000000000000E+000         XMM5DH = +0.0000000000000000E+000         
XMM6DL = +0.0000000000000000E+000         XMM6DH = +0.0000000000000000E+000         XMM7DL = +0.0000000000000000E+000         XMM7DH = +0.0000000000000000E+000         

MM00 = +0.00000E+000      MM01 = +0.00000E+000      MM10 = +0.00000E+000      MM11 = +0.00000E+000      MM20 = +0.00000E+000      MM21 = +0.00000E+000      MM30 = +0.00000E+000      MM31 = +0.00000E+000      MM40 = +0.00000E+000      MM41 = +0.00000E+000      MM50 = +0.00000E+000      MM51 = +0.00000E+000      MM60 = +0.00000E+000      MM61 = +0.00000E+000      MM70 = +0.00000E+000      MM71 = +0.00000E+000     

OV = 0 UP = 0 EI = 1 PL = 0 ZR = 1 AC = 0 PE = 1 CY = 0

Apollo
Sabre
Posts: 456
Joined: Sat Feb 19, 2011 9:51 pm

Re: 1.5 Final (?) Build (Updated 2011-12-11)

Postby Apollo » Fri Dec 30, 2011 4:05 am

Windows 7 seems to cache older files, i always had to rename any executable that i had crashed with, try bzone1.5.exe, i'll bet it runs ok.

User avatar
Ultraken
Patch Creator
Posts: 373
Joined: Fri Feb 18, 2011 6:06 pm
Contact:

Re: 1.5 Final (?) Build (Updated 2011-12-11)

Postby Ultraken » Mon Jan 02, 2012 7:28 pm

Windows is most likely applying compatibility settings to bzone.exe that are incompatible with 1.5. The compatibility system recognizes it by looking for the presence of:
  • anims\jespin.avi
  • bzlogo.bmp
  • bzone.exe
  • bzone.zfs
  • splash\splash.exe

It's unfortunate that it didn't check the executable checksum, but this approach works for all official versions (1.0-1.4) and Microsoft wasn't expecting someone to release another patch almost 14 years later...

I thwarted it by renaming (or deleting) the splash folder, but you can achieve similar results by renaming the executable.


Return to “Battlezone 1 Patches”

Who is online

Users browsing this forum: No registered users and 1 guest