http://bugs.winehq.org/show_bug.cgi?id=34698
Qian Hong fracting@gmail.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Component|-unknown |msvcrt
--- Comment #6 from Qian Hong fracting@gmail.com 2013-12-03 00:07:18 CST --- Assume component msvcrt, workaround by native msvcrt.
Related logs: 002c:warn:module:load_dll Failed to load module L"BugTrace.dll"; status=c0000135 002c:Ret KERNEL32.LoadLibraryA() retval=00000000 ret=101796fe 002c:Call msvcrt.??2@YAPAXI@Z(00000164) ret=1013ac2e 002c:Call ntdll.RtlAllocateHeap(00110000,00000000,00000164) ret=7eb53b66 002c:Ret ntdll.RtlAllocateHeap() retval=00162420 ret=7eb53b66 002c:trace:msvcrt:MSVCRT_operator_new (356) returning 0x162420 002c:Ret msvcrt.??2@YAPAXI@Z() retval=00162420 ret=1013ac2e 002c:trace:seh:raise_exception code=c0000005 flags=0 addr=0x1000c886 ip=1000c886 tid=002c 002c:trace:seh:raise_exception info[0]=00000000 002c:trace:seh:raise_exception info[1]=00000000 002c:trace:seh:raise_exception eax=00000000 ebx=00000000 ecx=00160dd4 edx=1009af34 esi=00162420 edi=00160dd0 002c:trace:seh:raise_exception ebp=00000000 esp=0032fb98 cs=0073 ds=007b es=007b fs=0033 gs=003b flags=00210206 002c:trace:seh:call_stack_handlers calling handler at 0x10098763 code=c0000005 flags=0 002c:trace:seh:call_stack_handlers handler at 0x10098763 returned 1 002c:trace:seh:call_stack_handlers calling handler at 0x7bca3d06 code=c0000005 flags=0 002c:trace:seh:__regs_RtlUnwind code=c0000005 flags=2 002c:trace:seh:__regs_RtlUnwind calling handler at 0x7bc85e6b code=c0000005 flags=2 002c:trace:seh:__regs_RtlUnwind handler at 0x7bc85e6b returned 1 002c:trace:seh:__regs_RtlUnwind calling handler at 0x10098763 code=c0000005 flags=2 002c:trace:seh:cxx_local_unwind calling unwind handler 0x10098750 trylevel 0 last -1 ebp 0x32fbf4 002c:Call msvcrt.??3@YAXPAX@Z(00000000) ret=10035181 002c:trace:msvcrt:MSVCRT_operator_delete ((nil)) 002c:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=7eb53d30 002c:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7eb53d30 002c:Ret msvcrt.??3@YAXPAX@Z() retval=00000001 ret=10035181 002c:trace:seh:__regs_RtlUnwind handler at 0x10098763 returned 1 002c:exception in PE entry point (proc=0x100782e7,module=0x10000000,reason=PROCESS_ATTACH,res=0x1) 002c:Ret PE DLL (proc=0x100782e7,module=0x10000000 L"TenSLX.dll",reason=PROCESS_ATTACH,res=0x1) retval=0 002c:Call PE DLL (proc=0x100782e7,module=0x10000000 L"TenSLX.dll",reason=PROCESS_DETACH,res=0x1) 002c:Call msvcrt.free(00160cd8) ret=100782d8 002c:Call ntdll.RtlFreeHeap(00110000,00000000,00160cd8) ret=7eb543db 002c:Ret ntdll.RtlFreeHeap() retval=00000000 ret=7eb543db 002c:Ret msvcrt.free() retval=00000000 ret=100782d8 002c:Ret PE DLL (proc=0x100782e7,module=0x10000000 L"TenSLX.dll",reason=PROCESS_DETACH,res=0x1) retval=1 002c:warn:module:process_attach Initialization of L"TenSLX.dll" failed 002c:trace:module:process_attach (L"TenSLX.dll",0x1) - END 002c:trace:module:process_attach (L"QQGame.exe",0x1) - END 002c:err:module:attach_process_dlls "TenSLX.dll" failed to initialize, aborting