[Bug 46095] Epic Games Launcher 7.x crashes on startup ( relies on native Windows behaviour: 'shcore.dll' loaded by 'shlwapi.dll')
wine-bugs at winehq.org
wine-bugs at winehq.org
Mon Nov 5 08:49:22 CST 2018
https://bugs.winehq.org/show_bug.cgi?id=46095
Anastasius Focht <focht at gmx.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|Epic Installer 7.16.0 |Epic Games Launcher 7.x
|crashed with fatal error |crashes on startup (relies
| |on native Windows
| |behaviour: 'shcore.dll'
| |loaded by 'shlwapi.dll')
CC| |focht at gmx.net
Keywords| |download
Status|UNCONFIRMED |RESOLVED
Resolution|--- |DUPLICATE
Component|-unknown |shlwapi
--- Comment #4 from Anastasius Focht <focht at gmx.net> ---
Hello folks,
confirming, dupe of bug 44793
It's not the installer but the Epic launcher crashing.
Next time please search Wine Bugzilla and appdb more carefully.
https://appdb.winehq.org/objectManager.php?sClass=version&iId=35811
--- snip ---
$ pwd
/home/focht/.wine/drive_c/Program Files (x86)/Epic
Games/Launcher/Portal/Binaries/Win32
$ WINEDEBUG=+seh,+relay wine ./EpicGamesLauncher.exe >>log.txt 2>&1
...
002c:Call KERNEL32.LoadLibraryW(06a3a8e0 L"shcore.dll") ret=005d9a55
002c:Call PE DLL (proc=0xf78c0010,module=0xf78b0000
L"shcore.dll",reason=PROCESS_ATTACH,res=(nil))
002c:Call KERNEL32.DisableThreadLibraryCalls(f78b0000) ret=f78bfed9
002c:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=f78bfed9
002c:Ret PE DLL (proc=0xf78c0010,module=0xf78b0000
L"shcore.dll",reason=PROCESS_ATTACH,res=(nil)) retval=1
002c:Ret KERNEL32.LoadLibraryW() retval=f78b0000 ret=005d9a55
002c:Call KERNEL32.SetThreadErrorMode(00000000,00000000) ret=005d5690
002c:Ret KERNEL32.SetThreadErrorMode() retval=00000001 ret=005d5690
002c:Call KERNEL32.GetProcAddress(f78b0000,01fffaac "SetProcessDpiAwareness")
ret=005d51c2
002c:Ret KERNEL32.GetProcAddress() retval=f78bfe1c ret=005d51c2
002c:Call KERNEL32.GetProcAddress(f78b0000,01fffaa4 "GetDpiForMonitor")
ret=005d51c2
002c:Ret KERNEL32.GetProcAddress() retval=f78bfdf0 ret=005d51c2
002c:Call KERNEL32.GetProcAddress(f78b0000,01fffa9c "GetProcessDpiAwareness")
ret=005d51c2
002c:Ret KERNEL32.GetProcAddress() retval=f78bfe04 ret=005d51c2
002c:Call ntdll.RtlWakeAllConditionVariable(01a2bb90) ret=01464e4a
002c:Ret ntdll.RtlWakeAllConditionVariable() retval=00000000 ret=01464e4a
002c:Call shcore.GetProcessDpiAwareness(00000000,01fffb54) ret=0060c7d5
002c:Call user32.GetProcessDpiAwarenessInternal(00000000,01fffb54) ret=f78bff3b
002c:Ret user32.GetProcessDpiAwarenessInternal() retval=00000001 ret=f78bff3b
002c:Ret shcore.GetProcessDpiAwareness() retval=00000000 ret=0060c7d5
002c:Call
ucrtbase.__stdio_common_vswprintf(000000005,01ffd72c,000001ff,01540b18
L"Setting process to per monitor DPI aware",00000000,01fffb48) ret=0055c91c
002c:Ret ucrtbase.__stdio_common_vswprintf() retval=00000028 ret=0055c91c
...
002c:Call KERNEL32.OutputDebugStringW(01ffd248 L"[2018.11.05-14.22.30:551][
0]LogInit: Setting process to per monitor DPI aware\r\n") ret=005d9b8a
...
002c:Ret KERNEL32.OutputDebugStringW() retval=7b649000 ret=005d9b8a
...
002c:Call shcore.SetProcessDpiAwareness(00000002) ret=0060c818
002c:Call user32.SetProcessDpiAwarenessInternal(00000002) ret=f78bff88
002c:Ret user32.SetProcessDpiAwarenessInternal() retval=00000001 ret=f78bff88
002c:Ret shcore.SetProcessDpiAwareness() retval=00000000 ret=0060c818
002c:Call KERNEL32.FreeLibrary(f78b0000) ret=005d494a
002c:Call PE DLL (proc=0xf78c0010,module=0xf78b0000
L"shcore.dll",reason=PROCESS_DETACH,res=(nil))
002c:Ret PE DLL (proc=0xf78c0010,module=0xf78b0000
L"shcore.dll",reason=PROCESS_DETACH,res=(nil)) retval=1
002c:Ret KERNEL32.FreeLibrary() retval=00000001 ret=005d494a
...
002c:Call user32.MonitorFromPoint(1f00000000,00000002) ret=00600883
002c:Call winex11.drv.EnumDisplayMonitors(00000000,00000000,7e760cd0,01fff3fc)
ret=7e761ec2
002c:Call winex11.drv.GetMonitorInfo(00000001,01fff278) ret=7e7619fc
002c:Ret winex11.drv.GetMonitorInfo() retval=00000001 ret=7e7619fc
002c:Ret winex11.drv.EnumDisplayMonitors() retval=00000001 ret=7e761ec2
002c:Ret user32.MonitorFromPoint() retval=00000001 ret=00600883
002c:trace:seh:raise_exception code=c0000005 flags=0 addr=0xf78bfdf0
ip=f78bfdf0 tid=002c
002c:trace:seh:raise_exception info[0]=00000001
002c:trace:seh:raise_exception info[1]=00000001
002c:trace:seh:raise_exception eax=00000001 ebx=096810e0 ecx=01fff54c
edx=00000001 esi=0854a03c edi=01fffa5c
002c:trace:seh:raise_exception ebp=01fff668 esp=01fff538 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00210202
002c:trace:seh:call_stack_handlers calling handler at 0x14654b5 code=c0000005
flags=0
002c:Call
ucrtbase._except_handler4_common(0193fb90,01464ecd,01fff4e0,01fffe54,01fff214,01fff16c)
ret=014654d3
002c:trace:seh:_except_handler4_common exception c0000005 flags=0 at 0xf78bfdf0
handler=0x14654b5 0x1fff214 0x1fff16c cookie=6df5c727 scope table=0x1908ce0
cookies=-2/0,-76/0
002c:trace:seh:_except_handler4_common level 0 prev -2 filter 0x4d2956
...
--- snip ---
Disassembly:
--- snip ---
00600850 | sub esp,8
00600853 | cmp dword ptr ds:[1921258],0
0060085A | je epicgameslauncher.600929
00600860 | cmp dword ptr ds:[1A01AB4],0
00600867 | je epicgameslauncher.6008EE
0060086D | cvttss2si eax,dword ptr ss:[esp+10]
00600873 | push 2
00600875 | cvttss2si ecx,dword ptr ss:[esp+10]
0060087B | push eax
0060087C | push ecx
0060087D | call dword ptr ds:[<&MonitorFromPoint>]
00600883 | test eax,eax
00600885 | je epicgameslauncher.600929
0060088B | lea ecx,dword ptr ss:[esp+4]
0060088F | mov dword ptr ss:[esp],0
00600896 | push ecx
00600897 | lea ecx,dword ptr ss:[esp+4]
0060089B | mov dword ptr ss:[esp+8],0
006008A3 | push ecx
006008A4 | push 0
006008A6 | push eax
006008A7 | call dword ptr ds:[1A01AB4] ; GetDpiForMonitor()
006008AD | test eax,eax
006008AF | js epicgameslauncher.6008E0
006008B1 | mov eax,dword ptr ss:[esp]
006008B4 | movd xmm0,eax
006008B8 | cvtdq2pd xmm0,xmm0
006008BC | shr eax,1F
006008BF | addsd xmm0,qword ptr ds:[eax*8+14C2F60]
006008C8 | cvtpd2ps xmm0,xmm0
006008CC | mulss xmm0,dword ptr ds:[1542C80]
006008D4 | movss dword ptr ss:[esp],xmm0
006008D9 | fld st(0),dword ptr ss:[esp]
006008DC | add esp,8
006008DF | ret
006008E0 | mov dword ptr ss:[esp],3F800000
006008E7 | fld st(0),dword ptr ss:[esp]
006008EA | add esp,8
006008ED | ret
--- snip ---
Also please don't attach warn+all logs, they're most useless in any case.
$ sha1sum EpicInstaller-7.16.0-e29b2655bd0d43faa2df12df15f3c094.msi
d608bfb4eec073df9a76cfe58877dcc86364d428
EpicInstaller-7.16.0-e29b2655bd0d43faa2df12df15f3c094.msi
$ du -sh EpicInstaller-7.16.0-e29b2655bd0d43faa2df12df15f3c094.msi
32M EpicInstaller-7.16.0-e29b2655bd0d43faa2df12df15f3c094.msi
$ wine --version
wine-3.19-116-gb78de971f6
$ wine --version
wine-3.19-865-gbf41ec2b6f (Staging)
Regards
*** This bug has been marked as a duplicate of bug 44793 ***
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
More information about the wine-bugs
mailing list