[Bug 43656] 32-bit World of Warcraft client reports ' Game Initialization Failed!' or crashes on startup with stack overflow

wine-bugs at winehq.org wine-bugs at winehq.org
Mon Mar 19 21:20:45 CDT 2018


https://bugs.winehq.org/show_bug.cgi?id=43656

Olivier F. R. Dierick <o.dierick at piezo-forte.be> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
  Attachment #59089|0                           |1
        is obsolete|                            |

--- Comment #21 from Olivier F. R. Dierick <o.dierick at piezo-forte.be> ---
Created attachment 60807
  --> https://bugs.winehq.org/attachment.cgi?id=60807
log wine-staging 3.4 +seh,+relay,+ntdll (compressed)

Same kind of exception in TLS callback:

--- start log ---
...
0009:Call TLS callback
(proc=0x40d8a0,module=0x400000,reason=PROCESS_ATTACH,reserved=0)
0009:Call ntdll.RtlAddVectoredExceptionHandler(00000001,0042ac80) ret=0040bcbb
0009:Ret  ntdll.RtlAddVectoredExceptionHandler() retval=00117a50 ret=0040bcbb
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40bda0 ip=0040bda0
tid=0009
0009:trace:seh:raise_exception  eax=00006267 ebx=7bd111a5 ecx=00006bea
edx=00000000 esi=00000162 edi=00000000
0009:trace:seh:raise_exception  ebp=0033e340 esp=0033e308 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010293
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40c0fd ip=0040c0fd
tid=0009
0009:trace:seh:raise_exception  eax=000000cc ebx=7b63e93d ecx=7b423258
edx=7b63b1a4 esi=7b420000 edi=00000000
0009:trace:seh:raise_exception  ebp=0033e340 esp=0033e308 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010202
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40c4a4 ip=0040c4a4
tid=0009
0009:trace:seh:raise_exception  eax=236e6246 ebx=7b643a10 ecx=00000000
edx=7b63b1a4 esi=0000048c edi=00000000
0009:trace:seh:raise_exception  ebp=0033e340 esp=0033e308 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010297
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40c8f0 ip=0040c8f0
tid=0009
0009:trace:seh:raise_exception  eax=40c65139 ebx=7bd0ff35 ecx=00000000
edx=00000000 esi=7b420000 edi=00000000
0009:trace:seh:raise_exception  ebp=0033e340 esp=0033e308 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010206
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40cc7e ip=0040cc7e
tid=0009
0009:trace:seh:raise_exception  eax=00000024 ebx=7b641e1a ecx=7b426b88
edx=7b63b1a4 esi=7b420000 edi=00000000
0009:trace:seh:raise_exception  ebp=0033e340 esp=0033e308 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010297
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40d071 ip=0040d071
tid=0009
0009:trace:seh:raise_exception  eax=56d3906f ebx=7b420000 ecx=3bc81dfe
edx=00000000 esi=00000000 edi=00000000
0009:trace:seh:raise_exception  ebp=0033e340 esp=0033e308 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010293
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40d709 ip=0040d709
tid=0009
0009:trace:seh:raise_exception  eax=4b6f5401 ebx=7bd1304f ecx=2dd41343
edx=00000000 esi=00000012 edi=001105b8
0009:trace:seh:raise_exception  ebp=0033e340 esp=0033e310 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010216
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x40f15b ip=0040f15b
tid=0009
0009:trace:seh:raise_exception  eax=b18dfbeb ebx=0033e9f4 ecx=0033e7df
edx=00400000 esi=00000398 edi=00000010
0009:trace:seh:raise_exception  ebp=0033e9e0 esp=0033e350 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010213
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000096
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned ffffffff
0009:fixme:thread:create_user_shared_data_thread Creating user shared data
update thread.
0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x40f7c1 ip=0040f7c1
tid=0009
0009:trace:seh:raise_exception  info[0]=00000000
0009:trace:seh:raise_exception  info[1]=7ffd6060
0009:trace:seh:raise_exception  eax=00000060 ebx=0033e9f4 ecx=7ffd8000
edx=00000006 esi=00000001 edi=7ffd6000
0009:trace:seh:raise_exception  ebp=0033e9e0 esp=0033e350 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010217
0009:trace:seh:call_vectored_handlers calling handler at 0x42ac80 code=c0000005
flags=0
0009:trace:seh:call_vectored_handlers handler at 0x42ac80 returned 0
0009:trace:seh:call_stack_handlers calling handler at 0x7bccd690 code=c0000005
flags=0
0009:trace:seh:__regs_RtlUnwind code=c0000005 flags=2
0009:trace:seh:__regs_RtlUnwind eax=00000000 ebx=7bd0bd8c ecx=0033e2f8
edx=0033ea5c esi=0033ea5c edi=7bccd500
0009:trace:seh:__regs_RtlUnwind ebp=0033deb8 esp=0033de98 eip=7bccd55c cs=0023
ds=002b fs=0063 gs=006b flags=00000206
0009:trace:seh:__regs_RtlUnwind calling handler at 0x7bca6b80 code=c0000005
flags=2
0009:trace:seh:__regs_RtlUnwind handler at 0x7bca6b80 returned 1
0009:exception in TLS callback
(proc=0x1080308,module=0x400000,reason=PROCESS_ATTACH,reserved=0)
0009:Starting process L"C:\\Program Files\\World of Warcraft\\Wow.exe"
(entryproc=0x4afb10)
0009:trace:ntdll:NtQueryInformationProcess
(0xffffffff,0x00000007,0x33febc,0x00000004,(nil))
0009:Call user32.MessageBoxW(00000000,0033fe10 L"Game Initialization
Failed!",0033fe54 L"ERROR",00000010) ret=004b0123
...
--- end log ---

It seems that none of the wine-staging patches fixes my issue.

I've downloaded x64dbg but don't know how to use it yet.

I've also changed the summary of the bug because although the 64-bit analysis
and fix are correct, it's not my issue.

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list