http://bugs.winehq.org/show_bug.cgi?id=34125
--- Comment #9 from Qian Hong fracting@gmail.com 2013-07-25 11:37:19 CDT --- Created attachment 45390 --> http://bugs.winehq.org/attachment.cgi?id=45390 dummy hack version 2
With (and only with) this patch:
--- snip --- fixme:d3d:wined3d_device_set_software_vertex_processing device 0x15b6a0, software 0 stub! Unhandled exception: page fault on read access to 0xaabbccdd in 32-bit code (0x0ca9e6e9). Register dump: CS:0073 SS:007b DS:007b ES:007b FS:0033 GS:003b EIP:0ca9e6e9 ESP:0033cda8 EBP:00000000 EFLAGS:00210202( R- -- I - - - ) EAX:aabbccdd EBX:215d5838 ECX:00000000 EDX:00000000 ESI:24f38018 EDI:24f3afec Stack dump: 0x0033cda8: 80004005 215d2920 00000000 215d5838 0x0033cdb8: 00000000 24f38018 24f3afd0 215d5838 0x0033cdc8: 00000018 00000040 0000001c 00000000 0x0033cdd8: 00645670 00000020 00000034 00153448 0x0033cde8: 00153458 00000201 0003dec1 f5400248 0x0033cdf8: 00000000 0000000c 0000001c aabbccdd Backtrace: =>0 0x0ca9e6e9 in kg3dengine (+0x16e6e9) (0x00000000) 0x0ca9e6e9: movl 0x0(%eax),%ecx
--- snip ---
The address 0xaabbccdd match the dummy array as well.