http://bugs.winehq.org/show_bug.cgi?id=28152
--- Comment #32 from Artem S. Tashkinov t.artem@mailcity.com 2012-09-02 04:43:23 CDT --- I can confirm that this bug is solved in Wine 1.5.12.
(The Demo crashes quite often though, e.g.
X Error of failed request: BadCursor (invalid Cursor parameter) Major opcode of failed request: 2 (X_ChangeWindowAttributes)
or
fixme:d3d:wined3d_buffer_preload Too many declaration changes or converting dynamic buffer, stopping converting wine: Unhandled page fault on read access to 0x00000000 at address 0x8ed9d5 (thread 002a), starting debugger... Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x008ed9d5). Register dump: CS:0073 SS:007b DS:007b ES:007b FS:0033 GS:003b EIP:008ed9d5 ESP:033f8e98 EBP:033f8eac EFLAGS:00010202( R- -- I - - - ) EAX:37339a9c EBX:033fdd38 ECX:00000000 EDX:00000000 ESI:00000001 EDI:01dd00e4 Stack dump: 0x033f8e98: 37339a9c 01881ea0 00000000 033f8ef4 0x033f8ea8: 7bc34a63 033f8ed0 008ed621 37339a9c 0x033f8eb8: 0086b597 7bca62b0 ffffffff 01d92570 0x033f8ec8: 033f8ee8 7bc35731 033f8f04 008ecf2d 0x033f8ed8: 37339a9c 033f8f04 0087adb0 033fdc20 0x033f8ee8: 033fdd38 00000002 01dd00e4 033f8f04 Backtrace: =>0 0x008ed9d5 in might & magic heroes vi (+0x4ed9d5) (0x033f8eac) 1 0x008ed621 in might & magic heroes vi (+0x4ed620) (0x033f8ed0) 2 0x008ecf2d in might & magic heroes vi (+0x4ecf2c) (0x033f8f04) 3 0x7857dc57 in msvcr90 (+0x5dc56) (0x033fdd44) 4 0x0087b35a in might & magic heroes vi (+0x47b359) (0x033fddcc) 5 0x009414b0 in might & magic heroes vi (+0x5414af) (0x033fe6a0) 6 0x0094290a in might & magic heroes vi (+0x542909) (0x033fe93c) 7 0x008cd3b3 in might & magic heroes vi (+0x4cd3b2) (0x033fe97c) 8 0x008e96d2 in might & magic heroes vi (+0x4e96d1) (0x033fe990) 9 0x0089e8c7 in might & magic heroes vi (+0x49e8c6) (0x033fea0c) 10 0x014be491 in might & magic heroes vi (+0x10be490) (0x033fea38) 11 0x7bc711e0 call_thread_func_wrapper+0xb() in ntdll (0x033fea48) 12 0x7bc73c2d call_thread_func+0x7c() in ntdll (0x033feb18) 13 0x7bc711be call_thread_entry_point+0x11() in ntdll (0x033feb38) 14 0x7bc795b9 start_thread+0xe8() in ntdll (0x033ff388) 15 0xb7595a49 start_thread+0xc8() in libpthread.so.0 (0x033ff498) 16 0xb74db63e __clone+0x5d() in libc.so.6 (0x00000000) 17 0xb74db63e __clone+0x5d() in libc.so.6 (0x00000000) 18 0xb74db63e __clone+0x5d() in libc.so.6 (0x00000000) 19 0xb74db63e __clone+0x5d() in libc.so.6 (0x00000000) ... )