[Bug 48171] Call of Duty: Modern Warfare (2019) exception

WineHQ Bugzilla wine-bugs at winehq.org
Sun Apr 19 04:04:18 CDT 2020


https://bugs.winehq.org/show_bug.cgi?id=48171

Louis Lenders <xerox.xerox2000x at gmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
     Ever confirmed|0                           |1
                 CC|                            |xerox.xerox2000x at gmail.com
                URL|                            |https://eu.shop.battle.net/
                   |                            |en-gb/product/call-of-duty-
                   |                            |warzone
             Status|UNCONFIRMED                 |NEW
           Keywords|                            |download

--- Comment #3 from Louis Lenders <xerox.xerox2000x at gmail.com> ---
>Btw call of duty warzone is basically the same game (if not even the same >executable?) and it's free to play for anyone to test.

Hi, thanks for the info. I downloaded it and got basically a similar crash as 
OP in comment 1. Below last lines of +relay,+seh log. 
Maybe it`s related/similar to https://bugs.winehq.org/show_bug.cgi?id=47320?
No idea.

(For fun I copied over a native gdi32 from my windows-drive, and the crash then
changed (apparently because it tried to load lpk.dll), after copying that over
I got crash in unimplemented function usp10.LpkPresent so this seems to be a
dead end...)

Anyway, I'm guessing the free Warzone is crashing same as this program; The
executable is also called ModernWarfare, so confirming and adding download
keyword




002b:Call KERNEL32.CreateFileW(000443a0
L"C:\\windows\\system32\\gdi32.dll",80000000,00000001,00000000,00000003,00000080,00000000)
ret=1400145b8
002b:Call ntdll._wcsicmp(000443a0 L"C:\\windows\\system32\\gdi32.dll",7b073db8
L"CONIN$") ret=7b012973
002b:Ret  ntdll._wcsicmp() retval=ffffffcb ret=7b012973
002b:Call ntdll._wcsicmp(000443a0 L"C:\\windows\\system32\\gdi32.dll",7b073dc6
L"CONOUT$") ret=7b0129cc
002b:Ret  ntdll._wcsicmp() retval=ffffffcb ret=7b0129cc
002b:Call ntdll.wcsncmp(000443a0 L"C:\\windows\\system32\\gdi32.dll",7b073dd6
L"\\\\.\\",00000004) ret=7b012a06
002b:Ret  ntdll.wcsncmp() retval=ffffffe7 ret=7b012a06
002b:Call ntdll.RtlIsDosDeviceName_U(000443a0
L"C:\\windows\\system32\\gdi32.dll") ret=7b012a79
002b:Ret  ntdll.RtlIsDosDeviceName_U() retval=00000000 ret=7b012a79
002b:Call ntdll.RtlDosPathNameToNtPathName_U(000443a0
L"C:\\windows\\system32\\gdi32.dll",0022c4c0,00000000,00000000) ret=7b012bea
002b:Ret  ntdll.RtlDosPathNameToNtPathName_U() retval=00000001 ret=7b012bea
002b:Call
ntdll.NtCreateFile(0022c4a8,80100080,0022c4e0,0022c4d0,00000000,00000080,00000001,00000001,00000060,00000000,00000000)
ret=7b012ced
002b:Ret  ntdll.NtCreateFile() retval=00000000 ret=7b012ced
002b:Call ntdll.RtlFreeUnicodeString(0022c4c0) ret=7b012e5c
002b:Ret  ntdll.RtlFreeUnicodeString() retval=00000001 ret=7b012e5c
002b:Ret  KERNEL32.CreateFileW() retval=00000094 ret=1400145b8
002b:Call KERNEL32.GetFileSize(00000094,00000000) ret=140015e61
002b:Call
ntdll.NtQueryInformationFile(00000094,0022c620,0022c630,00000018,00000005)
ret=7b019bf0
002b:Ret  ntdll.NtQueryInformationFile() retval=00000000 ret=7b019bf0
002b:Ret  KERNEL32.GetFileSize() retval=00009be0 ret=140015e61
002b:Call KERNEL32.VirtualAlloc(00000000,00009be0,00001000,00000004)
ret=140017684
002b:Call
ntdll.NtAllocateVirtualMemory(ffffffffffffffff,0022c648,00000000,0022c670,00001000,00000004)
ret=7b02f566
002b:Ret  ntdll.NtAllocateVirtualMemory() retval=00000000 ret=7b02f566
002b:Ret  KERNEL32.VirtualAlloc() retval=036c0000 ret=140017684
002b:Call KERNEL32.ReadFile(00000094,036c0000,00009be0,0022cb1c,00000000)
ret=140018ece
002b:Call
ntdll.NtReadFile(00000094,00000000,00000000,00000000,0022c5f0,036c0000,00009be0,00000000,00000000)
ret=7b01adfa
002b:Ret  ntdll.NtReadFile() retval=00000000 ret=7b01adfa
002b:Ret  KERNEL32.ReadFile() retval=00000001 ret=140018ece
002b:Call KERNEL32.CloseHandle(00000094) ret=14001a76f
002b:Call ntdll.NtClose(00000094) ret=7b040c04
002b:Ret  ntdll.NtClose() retval=00000000 ret=7b040c04
002b:Ret  KERNEL32.CloseHandle() retval=00000001 ret=14001a76f
002b:Call KERNEL32.VirtualAlloc(00000000,0000c000,00001000,00000040)
ret=14001bfb0
002b:Call
ntdll.NtAllocateVirtualMemory(ffffffffffffffff,0022c648,00000000,0022c670,00001000,00000040)
ret=7b02f566
002b:Ret  ntdll.NtAllocateVirtualMemory() retval=00000000 ret=7b02f566
002b:Ret  KERNEL32.VirtualAlloc() retval=036d0000 ret=14001bfb0
002b:trace:seh:raise_exception code=80000003 flags=0 addr=0x36d1a90 ip=36d1a91
tid=002b

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list