[Bug 34125] JX3Client.exe crashes at start
wine-bugs at winehq.org
wine-bugs at winehq.org
Thu Jul 25 11:33:36 CDT 2013
http://bugs.winehq.org/show_bug.cgi?id=34125
--- Comment #8 from Qian Hong <fracting at gmail.com> 2013-07-25 11:33:36 CDT ---
Created attachment 45389
--> http://bugs.winehq.org/attachment.cgi?id=45389
dummy hack suggested by Ken
With this hack, the backtrace is:
--- snip ---
fixme:d3d:wined3d_device_set_software_vertex_processing device 0x168d88,
software 0 stub!
Unhandled exception: page fault on read access to 0x55667788 in 32-bit code
(0x0759e6e9).
Register dump:
CS:0073 SS:007b DS:007b ES:007b FS:0033 GS:003b
EIP:0759e6e9 ESP:0033cda8 EBP:00000000 EFLAGS:00210202( R- -- I - - - )
EAX:55667788 EBX:1aa55f98 ECX:00162060 EDX:00000000
ESI:23defcd8 EDI:23df20dc
Stack dump:
0x0033cda8: 80004005 1aa53080 00000000 1aa55f98
0x0033cdb8: 00000000 23defcd8 23df20c0 1aa55f98
0x0033cdc8: 00000018 00000040 0000001c 00000000
0x0033cdd8: 0060161e 00000020 00000034 00000000
0x0033cde8: 001476a0 00000114 001476a4 001476a4
0x0033cdf8: 00000000 0000000c 0000001c 55667788
Backtrace:
=>0 0x0759e6e9 in kg3dengine (+0x16e6e9) (0x00000000)
0x0759e6e9: movl 0x0(%eax),%ecx
Wine-dbg>
--- snip ---
Notice that the address 0x55667788 exactly matches
dummy[7],dummy[6],dummy[5],dummy[4] in the hack.
--
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.
More information about the wine-bugs
mailing list