http://bugs.winehq.org/show_bug.cgi?id=34125
--- Comment #8 from Qian Hong fracting@gmail.com 2013-07-25 11:33:36 CDT --- Created attachment 45389 --> http://bugs.winehq.org/attachment.cgi?id=45389 dummy hack suggested by Ken
With this hack, the backtrace is:
--- snip --- fixme:d3d:wined3d_device_set_software_vertex_processing device 0x168d88, software 0 stub! Unhandled exception: page fault on read access to 0x55667788 in 32-bit code (0x0759e6e9). Register dump: CS:0073 SS:007b DS:007b ES:007b FS:0033 GS:003b EIP:0759e6e9 ESP:0033cda8 EBP:00000000 EFLAGS:00210202( R- -- I - - - ) EAX:55667788 EBX:1aa55f98 ECX:00162060 EDX:00000000 ESI:23defcd8 EDI:23df20dc Stack dump: 0x0033cda8: 80004005 1aa53080 00000000 1aa55f98 0x0033cdb8: 00000000 23defcd8 23df20c0 1aa55f98 0x0033cdc8: 00000018 00000040 0000001c 00000000 0x0033cdd8: 0060161e 00000020 00000034 00000000 0x0033cde8: 001476a0 00000114 001476a4 001476a4 0x0033cdf8: 00000000 0000000c 0000001c 55667788 Backtrace: =>0 0x0759e6e9 in kg3dengine (+0x16e6e9) (0x00000000) 0x0759e6e9: movl 0x0(%eax),%ecx Wine-dbg> --- snip ---
Notice that the address 0x55667788 exactly matches dummy[7],dummy[6],dummy[5],dummy[4] in the hack.