https://bugs.winehq.org/show_bug.cgi?id=48171
Louis Lenders xerox.xerox2000x@gmail.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Ever confirmed|0 |1 CC| |xerox.xerox2000x@gmail.com URL| |https://eu.shop.battle.net/ | |en-gb/product/call-of-duty- | |warzone Status|UNCONFIRMED |NEW Keywords| |download
--- Comment #3 from Louis Lenders xerox.xerox2000x@gmail.com ---
Btw call of duty warzone is basically the same game (if not even the same >executable?) and it's free to play for anyone to test.
Hi, thanks for the info. I downloaded it and got basically a similar crash as OP in comment 1. Below last lines of +relay,+seh log. Maybe it`s related/similar to https://bugs.winehq.org/show_bug.cgi?id=47320? No idea.
(For fun I copied over a native gdi32 from my windows-drive, and the crash then changed (apparently because it tried to load lpk.dll), after copying that over I got crash in unimplemented function usp10.LpkPresent so this seems to be a dead end...)
Anyway, I'm guessing the free Warzone is crashing same as this program; The executable is also called ModernWarfare, so confirming and adding download keyword
002b:Call KERNEL32.CreateFileW(000443a0 L"C:\windows\system32\gdi32.dll",80000000,00000001,00000000,00000003,00000080,00000000) ret=1400145b8 002b:Call ntdll._wcsicmp(000443a0 L"C:\windows\system32\gdi32.dll",7b073db8 L"CONIN$") ret=7b012973 002b:Ret ntdll._wcsicmp() retval=ffffffcb ret=7b012973 002b:Call ntdll._wcsicmp(000443a0 L"C:\windows\system32\gdi32.dll",7b073dc6 L"CONOUT$") ret=7b0129cc 002b:Ret ntdll._wcsicmp() retval=ffffffcb ret=7b0129cc 002b:Call ntdll.wcsncmp(000443a0 L"C:\windows\system32\gdi32.dll",7b073dd6 L"\\.\",00000004) ret=7b012a06 002b:Ret ntdll.wcsncmp() retval=ffffffe7 ret=7b012a06 002b:Call ntdll.RtlIsDosDeviceName_U(000443a0 L"C:\windows\system32\gdi32.dll") ret=7b012a79 002b:Ret ntdll.RtlIsDosDeviceName_U() retval=00000000 ret=7b012a79 002b:Call ntdll.RtlDosPathNameToNtPathName_U(000443a0 L"C:\windows\system32\gdi32.dll",0022c4c0,00000000,00000000) ret=7b012bea 002b:Ret ntdll.RtlDosPathNameToNtPathName_U() retval=00000001 ret=7b012bea 002b:Call ntdll.NtCreateFile(0022c4a8,80100080,0022c4e0,0022c4d0,00000000,00000080,00000001,00000001,00000060,00000000,00000000) ret=7b012ced 002b:Ret ntdll.NtCreateFile() retval=00000000 ret=7b012ced 002b:Call ntdll.RtlFreeUnicodeString(0022c4c0) ret=7b012e5c 002b:Ret ntdll.RtlFreeUnicodeString() retval=00000001 ret=7b012e5c 002b:Ret KERNEL32.CreateFileW() retval=00000094 ret=1400145b8 002b:Call KERNEL32.GetFileSize(00000094,00000000) ret=140015e61 002b:Call ntdll.NtQueryInformationFile(00000094,0022c620,0022c630,00000018,00000005) ret=7b019bf0 002b:Ret ntdll.NtQueryInformationFile() retval=00000000 ret=7b019bf0 002b:Ret KERNEL32.GetFileSize() retval=00009be0 ret=140015e61 002b:Call KERNEL32.VirtualAlloc(00000000,00009be0,00001000,00000004) ret=140017684 002b:Call ntdll.NtAllocateVirtualMemory(ffffffffffffffff,0022c648,00000000,0022c670,00001000,00000004) ret=7b02f566 002b:Ret ntdll.NtAllocateVirtualMemory() retval=00000000 ret=7b02f566 002b:Ret KERNEL32.VirtualAlloc() retval=036c0000 ret=140017684 002b:Call KERNEL32.ReadFile(00000094,036c0000,00009be0,0022cb1c,00000000) ret=140018ece 002b:Call ntdll.NtReadFile(00000094,00000000,00000000,00000000,0022c5f0,036c0000,00009be0,00000000,00000000) ret=7b01adfa 002b:Ret ntdll.NtReadFile() retval=00000000 ret=7b01adfa 002b:Ret KERNEL32.ReadFile() retval=00000001 ret=140018ece 002b:Call KERNEL32.CloseHandle(00000094) ret=14001a76f 002b:Call ntdll.NtClose(00000094) ret=7b040c04 002b:Ret ntdll.NtClose() retval=00000000 ret=7b040c04 002b:Ret KERNEL32.CloseHandle() retval=00000001 ret=14001a76f 002b:Call KERNEL32.VirtualAlloc(00000000,0000c000,00001000,00000040) ret=14001bfb0 002b:Call ntdll.NtAllocateVirtualMemory(ffffffffffffffff,0022c648,00000000,0022c670,00001000,00000040) ret=7b02f566 002b:Ret ntdll.NtAllocateVirtualMemory() retval=00000000 ret=7b02f566 002b:Ret KERNEL32.VirtualAlloc() retval=036d0000 ret=14001bfb0 002b:trace:seh:raise_exception code=80000003 flags=0 addr=0x36d1a90 ip=36d1a91 tid=002b