SA-MP 0.3.7-R3
Exception At Address: 0x00757607
Base: 0x03EA0000
Registers:
EAX: 0x00C9BC50 EBX: 0x14899AE0 ECX: 0x044DCC28 EDX: 0x08012180
ESI: 0x044C5D3C EDI: 0x00000000 EBP: 0x044DD6C0 ESP: 0x0028FD18
EFLAGS: 0x00210216
Stack:
+0000: 0x00000000 0x044C5D3C 0x76E1A1B9 0x00000000
+0010: 0x00000001 0x3F8CCCCD 0x3F666666 0x00805769
+0020: 0x044DCC28 0x00C9BC50 0x0000003E 0x14899AE0
+0030: 0x007491E4 0x044C5D3C 0x14899AE0 0x00000001
+0040: 0x04987240 0x0053439A 0x14899AE0 0x04987240
+0050: 0x00000000 0x00553308 0x00000045 0x00553CBD
+0060: 0x04987200 0x0000001A 0x00000001 0x3F80068E
+0070: 0x03F44987 0x0053DFE2 0x00000000 0x0053EAA6
+0080: 0x0161EDC4 0x0053EAC4 0x44200000 0x43B40000
+0090: 0x0053ECC2 0x00000001 0x00619B71 0x0000001A
+00A0: 0x00000001 0x00000001 0x0000000A 0x00748DA0
+00B0: 0x0000001A 0x00000001 0x75211245 0x00000000
+00C0: 0x0028FF88 0xFFFDE000 0x01610000 0x4F14449B
+00D0: 0x01611130 0x00000008 0x00000100 0x00000008
+00E0: 0x00000102 0x44200000 0x43B40000 0x00000000
+00F0: 0x00000000 0x00000500 0x000002D0 0x00000000
+0100: 0x00000001 0x001804B0 0x00000113 0x00000001
+0110: 0x00000000 0x01F22E88 0x00000280 0x00000168
+0120: 0x0000002C 0x0028FE2C 0x00825EA4 0x75211245
+0130: 0x00000000 0xFFFDE000 0xFFFFFFFF 0x00821D17
+0140: 0x00000065 0x00000065 0x0028FF88 0x008246F1
+0150: 0x00400000 0x00000000 0x019A3596 0x0000000A
+0160: 0x00000094 0x00000006 0x00000001 0x00001DB1
+0170: 0x00000002 0x76726553 0x20656369 0x6B636150
+0180: 0x00003120 0x00000000 0x00000000 0x00000000
+0190: 0x00000000 0x00000000 0x00000000 0x00000000
+01A0: 0x00000000 0x00000000 0x00000000 0x00000000
+01B0: 0x00000000 0x00000000 0x00000000 0x00000000
+01C0: 0x00000000 0x00000000 0x00000000 0x00000000
+01D0: 0x00000000 0x00000000 0x00000000 0x00000000
+01E0: 0x00000000 0x00000000 0x00000000 0x00000000
+01F0: 0x00824588 0x00000000 0x00000000 0xFFFDE000
+0200: 0xC0000005 0x00000000 0x019A3596 0x00000044
+0210: 0x019D3F40 0x019D71F0 0x019D72F8 0x00000000
+0220: 0x00000000 0x00000000 0x00000000 0x00000000
+0230: 0x00000000 0x00000000 0x00000000 0x00000000
+0240: 0x00000000 0xFFFFFFFF 0xFFFFFFFF 0xFFFFFFFF
+0250: 0x00000000 0x00000000 0x0028FE78 0x0028F8EC
+0260: 0x0028FFC4 0x00825EA4 0x00888078 0x00000000
+0270: 0x0028FF94 0x7521343D 0xFFFDE000 0x0028FFD4
SCM Op: 0x77E, lDbg: 0 LastRendObj: 1284
Game Version: US 1.0
State Information: Ped Context: 0
SA-MP 0.3.7-R3
Exception At Address: 0x00749B8A
Base: 0x03EA0000
Registers:
EAX: 0x00000000 EBX: 0x0028FCA4 ECX: 0x00000000 EDX: 0x00000078
ESI: 0x00000000 EDI: 0x13A78A30 EBP: 0x00734850 ESP: 0x0028FC84
EFLAGS: 0x00210283
Stack:
+0000: 0x0000279C 0x00B33AAC 0xFFFFFFFF 0x00B33AAC
+0010: 0x0073489D 0x13A78A28 0x00734850 0x0028FCA4
+0020: 0x00000000 0x004C4E80 0x13A78A28 0x000001FB
+0030: 0x004089DD 0x008E4A06 0x00000098 0x000024E0
+0040: 0x00000000 0x0040C16B 0x000001FB 0x000001D8
+0050: 0x008E4AF8 0x020E01FB 0x02490243 0x019001B4
+0060: 0x020401A6 0x019401A5 0x01F001AA 0x021E01CA
+0070: 0x02310218 0x01B6020F 0xFFFF0223 0xFFFFFFFF
+0080: 0x0000FFFF 0x0040E22E 0x00000000 0xB800B4A7
+0090: 0x0028FD94 0xB800B4A7 0x00000000 0x0000006C
+00A0: 0x015670CF 0x00000001 0x0040E800 0x40513C08
+00B0: 0x00B72978 0x0028FD94 0x00561A8E 0x44FCBFDE
+00C0: 0x421DB90E 0x41F042D4 0x0053BF10 0x0000001A
+00D0: 0xFFFFFFFF 0x00000000 0xFFFFFFFF 0x03F077B3
+00E0: 0xFFFFFFFF 0x03F4203E 0x0000001A 0xB8005AE4
+00F0: 0x00000000 0x159A6650 0x0028FD6C 0x0028F858
+0100: 0x0028FF78 0x03F67D04 0x03F8CA38 0x00000002
+0110: 0x75F6A1B9 0x0053E986 0x00000001 0x008241AF
+0120: 0x004D9486 0x0053ECC2 0x00000001 0x00619B71
+0130: 0x0000001A 0x00000001 0x00000001 0x0000000A
+0140: 0x00748DA0 0x0000001A 0x00000001 0x76D21245
+0150: 0x00000000 0x0028FF88 0xFFFDE000 0x012E0000
+0160: 0x4F38004F 0x002E1130 0x00000008 0x00000100
+0170: 0x00000008 0x000001FE 0x44200000 0x43B40000
+0180: 0x00000000 0x00000000 0x00000500 0x000002D0
+0190: 0x00000000 0x00000001 0x00070520 0x00000200
+01A0: 0x00000000 0x01680280 0x013E97F1 0x00000280
+01B0: 0x00000168 0x0000002C 0x0028FE2C 0x00825EA4
+01C0: 0x76D21245 0x00000000 0xFFFDE000 0xFFFFFFFF
+01D0: 0x00821D17 0x00000065 0x00000065 0x0028FF88
+01E0: 0x008246F1 0x00400000 0x00000000 0x01983596
+01F0: 0x0000000A 0x00000094 0x00000006 0x00000001
+0200: 0x00001DB1 0x00000002 0x76726553 0x20656369
+0210: 0x6B636150 0x00003120 0x00000000 0x00000000
+0220: 0x00000000 0x00000000 0x00000000 0x00000000
+0230: 0x00000000 0x00000000 0x00000000 0x00000000
+0240: 0x00000000 0x00000000 0x00000000 0x00000000
+0250: 0x00000000 0x00000000 0x00000000 0x00000000
+0260: 0x00000000 0x00000000 0x00000000 0x00000000
+0270: 0x00000000 0x00000000 0x00000000 0x00000000
SCM Op: 0x77E, lDbg: 0 LastRendObj: 1294
Game Version: US 1.0
State Information: Ped Context: 0
P0 (0,0) P1 (0,0)
SetCheckpoint(playerid, progress, totalchecks)
{
DestroyDynamicMapIcon(mapicon[playerid]);
DestroyDynamicMapIcon(mapicon2[playerid]);
new checktype;
if(gRaceType==1)checktype=0; else if(gRaceType==2) checktype=4; // тип
if(RaceCheckpoints[progress][4]==0)RaceCheckpoints[progress][4]=12.0; // размер если не указан
if (progress==totalchecks-1)SetPlayerRaceCheckpoint(playerid,1,RaceCheckpoints[progress][0],RaceCheckpoints[progress][1],RaceCheckpoints[progress][2],RaceCheckpoints[progress][0],RaceCheckpoints[progress][1],RaceCheckpoints[progress][2],RaceCheckpoints[progress][4]); // финишный
else
SetPlayerRaceCheckpoint(playerid,checktype,RaceCheckpoints[progress][0],RaceCheckpoints[progress][1],RaceCheckpoints[progress][2],RaceCheckpoints[progress+1][0],RaceCheckpoints[progress+1][1],RaceCheckpoints[progress+1][2],RaceCheckpoints[progress][4]);
mapicon[playerid] = CreateDynamicMapIcon(RaceCheckpoints[progress+1][0], RaceCheckpoints[progress+1][1], RaceCheckpoints[progress+1][2], 0, 0xFF000044, -1, -1, playerid, 1000.0);
mapicon2[playerid] = CreateDynamicMapIcon(RaceCheckpoints[progress+2][0], RaceCheckpoints[progress+2][1], RaceCheckpoints[progress+2][2], 0, 0xFF000022, -1, -1, playerid, 1000.0);
}
SA-MP 0.3.7-R4
Exception At Address: 0x0073485D
Base: 0x03CE0000
Registers:
EAX: 0x14652828 EBX: 0x0177FC8C ECX: 0x00000000 EDX: 0x00000078
ESI: 0x1658A080 EDI: 0x14651EE8 EBP: 0x00734850 ESP: 0x0177FC60
EFLAGS: 0x00010207
Stack:
+0000: 0x00749B93 0x14652828 0x0177FC8C 0x000023C8
+0010: 0x00B2A624 0xFFFFFFFF 0x00B2A624 0x0073489D
+0020: 0x14651EE0 0x00734850 0x0177FC8C 0x00000000
+0030: 0x004C4E80 0x14651EE0 0x000001CA 0x004089DD
+0040: 0x008E4A06 0x00000098 0x00002170 0x00000001
+0050: 0x0040C16B 0x000001CA 0x000001AC 0x008E4AF8
+0060: 0x01CA01DD 0x01AA0194 0x02450218 0x01B6021C
+0070: 0x022A01BD 0x0191020F 0x0226020E 0x01FB021E
+0080: 0x01A501B4 0x01A60223 0xFFFF0227 0x0000FFFF
+0090: 0x0040E22E 0x00000000 0x59BB455D 0x0177FD7C
+00A0: 0x59BB455D 0x00000000 0x00000072 0x015670CF
+00B0: 0x00000001 0x0040E800 0x405A1C6C 0x00000000
+00C0: 0x0177FD7C 0x00561A8E 0x45346F80 0xC4B2DB48
+00D0: 0x412C44A8 0x0053BF10 0x0000001A 0xFFFFFFFF
+00E0: 0x00000000 0xFFFFFFFF 0x03D47EF3 0xFFFFFFFF
+00F0: 0x03D8277E 0x0000001A 0x59BA5A0D 0x00000000
+0100: 0x16956188 0x0177FD54 0x0177F6A4 0x0177FF60
+0110: 0x03DA74E4 0x03DCCA90 0x00000002 0x75B2E7C0
+0120: 0x0053E986 0x00000001 0x008241AF 0x004D9486
+0130: 0x0053ECC2 0x00000001 0x00619B71 0x0000001A
+0140: 0x00000001 0x00000001 0x0000000A 0x00748DA0
+0150: 0x0000001A 0x00000001 0x750C8F60 0x00000000
+0160: 0x0177FF70 0x002DF000 0x018C0000 0x4EB3740F
+0170: 0x018C0ED8 0x00000008 0x00000100 0x00000008
+0180: 0x00000102 0x44480000 0x43E10000 0x00000000
+0190: 0x00000000 0x00000640 0x00000384 0x00000000
+01A0: 0x00000001 0x0004067C 0x00000200 0x00000000
+01B0: 0x01C20320 0x0043D616 0x00000320 0x000001C2
+01C0: 0x0000002C 0x0177FE14 0x00825EA4 0x0177FF60
+01D0: 0x00825EA4 0x00000000 0x002DF000 0x00821D17
+01E0: 0x00835342 0x00000065 0x0177FF70 0x008246F1
+01F0: 0x00400000 0x00000000 0x01B53706 0x0000000A
+0200: 0x00000094 0x00000006 0x00000002 0x000023F0
+0210: 0x00000002 0x00000000 0x00000000 0x00000000
+0220: 0x00000000 0x00000000 0x00000000 0x00000000
+0230: 0x00000000 0x00000000 0x00000000 0x00000000
+0240: 0x00000000 0x00000000 0x00000000 0x00000000
+0250: 0x00000000 0x00000000 0x00000000 0x00000000
+0260: 0x00000000 0x00000000 0x00000000 0x00000000
+0270: 0x00000000 0x00000000 0x00000000 0x00000000
SCM Op: 0x2BF, lDbg: 0 LastRendObj: 1290
Game Version: US 1.0
State Information: Ped Context: 0
на R4 эти варнинги остались без подробностей,
тюнинг тачек не используется в общем хз чо делать... где то что то с модом, а что я не могу понять... PHP Code:
|
.text:00734850 ; =============== S U B R O U T I N E ======================================= .text:00734850 .text:00734850 .text:00734850 ; int __cdecl findFirstAtomicWith2dfxCB(RpAtomic *atomic, void *data) .text:00734850 _findFirstAtomicWith2dfxCB proc near ; DATA XREF: _findFirstAtomicWith2dfx+Ao .text:00734850 .text:00734850 atomic = dword ptr 4 .text:00734850 data = dword ptr 8 .text:00734850 .text:00734850 000 mov eax, [esp+atomic] .text:00734854 000 mov ecx, [eax+RpAtomic.geometry] ; > RpGeometry * .text:00734857 000 mov edx, _pl253F2F8_TK .text:0073485D 000 mov ecx, [edx+ecx] .text:00734860 000 test ecx, ecx .text:00734862 000 jz short locret_734871 .text:00734864 000 cmp dword ptr [ecx], 0 .text:00734867 000 jbe short locret_734871 .text:00734869 000 mov ecx, [esp+data] .text:0073486D 000 mov [ecx], eax .text:0073486F 000 xor eax, eax .text:00734871 .text:00734871 locret_734871: ; CODE XREF: _findFirstAtomicWith2dfxCB+12j .text:00734871 ; _findFirstAtomicWith2dfxCB+17j .text:00734871 000 retn .text:00734871 _findFirstAtomicWith2dfxCB endp
твой краш в этой функции
Code:
.text:00734850 ; =============== S U B R O U T I N E ======================================= .text:00734850 .text:00734850 .text:00734850 ; int __cdecl findFirstAtomicWith2dfxCB(RpAtomic *atomic, void *data) .text:00734850 _findFirstAtomicWith2dfxCB proc near ; DATA XREF: _findFirstAtomicWith2dfx+Ao .text:00734850 .text:00734850 atomic = dword ptr 4 .text:00734850 data = dword ptr 8 .text:00734850 .text:00734850 000 mov eax, [esp+atomic] .text:00734854 000 mov ecx, [eax+RpAtomic.geometry] ; > RpGeometry * .text:00734857 000 mov edx, _pl253F2F8_TK .text:0073485D 000 mov ecx, [edx+ecx] .text:00734860 000 test ecx, ecx .text:00734862 000 jz short locret_734871 .text:00734864 000 cmp dword ptr [ecx], 0 .text:00734867 000 jbe short locret_734871 .text:00734869 000 mov ecx, [esp+data] .text:0073486D 000 mov [ecx], eax .text:0073486F 000 xor eax, eax .text:00734871 .text:00734871 locret_734871: ; CODE XREF: _findFirstAtomicWith2dfxCB+12j .text:00734871 ; _findFirstAtomicWith2dfxCB+17j .text:00734871 000 retn .text:00734871 _findFirstAtomicWith2dfxCB endp |