https://bugs.winehq.org/show_bug.cgi?id=39656
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Summary|steamwebhelper crashes in |Steam 'steamwebhelper.exe' |Win7 mode |crashes
--- Comment #3 from Anastasius Focht focht@gmx.net --- Hello folks,
unlikely bug 38960 but it would be a dupe of something else for sure.
There are a lot of other issues fixed in between 1.6.x and 1.8.x that can causes diagnostic asserts or crashes.
Bug 38960 would be triggered within 'libcef'.
https://bugs.winehq.org/show_bug.cgi?id=39595#c2
OP's backtrace:
--- snip --- 0x0041d79e: int $3 Modules: Module Address Debug info Name (99 modules) PE 400000- 6aa000 Export steamwebhelper PE 2ff0000- 310b000 Deferred crashhandler PE 10000000-12c4e000 Export libcef ELF 7b800000-7ba5b000 Deferred kernel32<elf> -PE 7b810000-7ba5b000 \ kernel32 ELF 7bc00000-7bcdb000 Dwarf ntdll<elf> -PE 7bc10000-7bcdb000 \ ntdll ELF 7bf00000-7bf04000 Deferred <wine-loader> ... Threads: process tid prio (all id:s are in hex) ... 00000044 Steam.exe 0000003c 0 ... 00000053 (D) C:\Program Files (x86)\Steam\bin\steamwebhelper.exe 0000002d 0 00000043 0 00000067 0 00000066 0 00000065 0 00000064 0 00000063 0 00000062 0 00000061 0 00000060 0 0000005f 0 <== 0000005e 0 0000005d 0 0000005c 0 0000005b 0 0000005a 0 00000059 0 00000058 0 00000057 0 00000056 0 00000055 0 00000054 0 ... --- snip ---
Based on OP's (limited) backtrace information, the checked the client crash site "offline" with current Steam client briefly:
--- snip --- ... 0041D740 55 PUSH EBP 0041D741 8BEC MOV EBP,ESP 0041D743 83E4 F8 AND ESP,FFFFFFF8 0041D746 83EC 08 SUB ESP,8 0041D749 56 PUSH ESI 0041D74A 57 PUSH EDI 0041D74B 8BF9 MOV EDI,ECX 0041D74D C74424 0C 00000>MOV DWORD PTR SS:[ESP+C],0 0041D755 807F 04 00 CMP BYTE PTR DS:[EDI+4],0 0041D759 75 20 JNZ SHORT steamweb.0041D77B 0041D75B FF75 08 PUSH DWORD PTR SS:[EBP+8] 0041D75E FF15 54C35200 CALL DWORD PTR DS:[<&KERNEL32.CloseHandle>] 0041D764 85C0 TEST EAX,EAX 0041D766 75 42 JNZ SHORT steamweb.0041D7AA 0041D768 3805 A0BD6400 CMP BYTE PTR DS:[64BDA0],AL 0041D76E 75 44 JNZ SHORT steamweb.0041D7B4 0041D770 CC INT3 0041D771 B0 01 MOV AL,1 0041D773 5F POP EDI 0041D774 5E POP ESI 0041D775 8BE5 MOV ESP,EBP 0041D777 5D POP EBP 0041D778 C2 0400 RETN 4 0041D77B 8B77 08 MOV ESI,DWORD PTR DS:[EDI+8] 0041D77E 56 PUSH ESI 0041D77F FF15 6CC35200 CALL DWORD PTR DS:[<&KERNEL32.EnterCriticalSection>] 0041D785 FF75 08 PUSH DWORD PTR SS:[EBP+8] 0041D788 C647 05 01 MOV BYTE PTR DS:[EDI+5],1 0041D78C FF15 54C35200 CALL DWORD PTR DS:[<&KERNEL32.CloseHandle>] 0041D792 85C0 TEST EAX,EAX 0041D794 75 09 JNZ SHORT steamweb.0041D79F 0041D796 3805 A0BD6400 CMP BYTE PTR DS:[64BDA0],AL 0041D79C 75 1D JNZ SHORT steamweb.0041D7BB 0041D79E CC INT3 ; assert() 0041D79F 56 PUSH ESI 0041D7A0 C647 05 00 MOV BYTE PTR DS:[EDI+5],0 0041D7A4 FF15 68C35200 CALL DWORD PTR DS:[<&KERNEL32.LeaveCriticalSection>] 0041D7AA 5F POP EDI 0041D7AB B0 01 MOV AL,1 0041D7AD 5E POP ESI 0041D7AE 8BE5 MOV ESP,EBP 0041D7B0 5D POP EBP 0041D7B1 C2 0400 RETN 4 --- snip ---
It seems the call site is referenced via function table, making it harder to reconstruct execution flow without actually debugging/encountering the same problem.
Would be a waste of time anyway for reasons I already told.
Regards