[Bug 34125] JX3Client.exe crashes at start

wine-bugs at winehq.org wine-bugs at winehq.org
Thu Jul 25 11:33:36 CDT 2013


http://bugs.winehq.org/show_bug.cgi?id=34125

--- Comment #8 from Qian Hong <fracting at gmail.com> 2013-07-25 11:33:36 CDT ---
Created attachment 45389
  --> http://bugs.winehq.org/attachment.cgi?id=45389
dummy hack suggested by Ken

With this hack, the backtrace is:

--- snip ---
fixme:d3d:wined3d_device_set_software_vertex_processing device 0x168d88,
software 0 stub!
Unhandled exception: page fault on read access to 0x55667788 in 32-bit code
(0x0759e6e9).
Register dump:
 CS:0073 SS:007b DS:007b ES:007b FS:0033 GS:003b
 EIP:0759e6e9 ESP:0033cda8 EBP:00000000 EFLAGS:00210202(  R- --  I   - - - )
 EAX:55667788 EBX:1aa55f98 ECX:00162060 EDX:00000000
 ESI:23defcd8 EDI:23df20dc
Stack dump:
0x0033cda8:  80004005 1aa53080 00000000 1aa55f98
0x0033cdb8:  00000000 23defcd8 23df20c0 1aa55f98
0x0033cdc8:  00000018 00000040 0000001c 00000000
0x0033cdd8:  0060161e 00000020 00000034 00000000
0x0033cde8:  001476a0 00000114 001476a4 001476a4
0x0033cdf8:  00000000 0000000c 0000001c 55667788
Backtrace:
=>0 0x0759e6e9 in kg3dengine (+0x16e6e9) (0x00000000)
0x0759e6e9: movl    0x0(%eax),%ecx
Wine-dbg>
--- snip ---

Notice that the address 0x55667788 exactly matches
dummy[7],dummy[6],dummy[5],dummy[4] in the hack.

-- 
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.



More information about the wine-bugs mailing list