Hi,
i'm trying to run a game within wine using a 32bit chroot. Ago two days
it was working fine, then i did something (I don't exactly remember
what i did as i was doing a lot of stuff, like updating the box etc) and
the game is not working anymore as "user".
Game: Rainbow Six Vegas
Game Version 1.6
Wine Version 1.1.25 (I also tried 1.1.17 and older versions of wine,
same thing)
Starting the Game as user does not work, Starting the game as root
works. I removed the .wine folder completly and tried again, did not
helped. i've setup the chroot completly again, did not helped. I can
play the game fine if i start it as root, just not as user. I think some
permissions are wrong somewhere but i dont exactly know which and
thought you might help me to find out. If i start the game, the video is
displaying fine, then there's a dialog of the game coming "press a key
to continue" or similar as soon as i press a key - the game is crashing
without any message. The last messages from WINEDEBUG are:
fixme:d3d9:Direct3DShaderValidatorCreate9 stub
fixme:d3d9:Direct3DShaderValidatorCreate9 stub
fixme:d3d9:Direct3DShaderValidatorCreate9 stub
fixme:dsound:DllCanUnloadNow (void): stub
But as i get those as root, too and as it's working as root i dont think
those are important.
However, i tried using winedbg (but well i'm new to that, never used)
and got the following, right after pressing a key like the game wants i get
stack overflow in 32-bit code
after issuing "cont" to winedbg i get:
page fault on read access to 0x0024082c in 32-bit code (0x117d3005).
issued cont a lot of time, it's always the same thing with the same data
(page fault on read access). At the End of the mail you can see those.
Hope you got some ideas what i could check,
thanks in advance
Jean
First chance exception: stack overflow in 32-bit code (0x117d3005).
Register dump:
CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
EIP:117d3005 ESP:0063f824 EBP:0063f83c EFLAGS:00010206( R- -- I - -P- )
EAX:00241878 EBX:0063f878 ECX:0024182c EDX:00e92940
ESI:0063f878 EDI:0ca6ed00
Stack dump:
0x0063f824: 0063f878 10df04e4 091a0000 0063f874
0x0063f834: 3d1560a5 0063f878 00000000 10d02934
0x0063f844: 091a0000 0063f878 017afa40 091a0000
0x0063f854: 10d03d9a 091a0000 00000000 3d1560a5
0x0063f864: 094c0000 0ca36810 00000012 00000012
0x0063f874: 0000000b 7f000000 0063f878 0063f878
Backtrace:
=>0 0x117d3005 in r6vegas_game (+0xed3005) (0x0063f83c)
1 0x10d02934 in r6vegas_game (+0x402934) (0x00000000)
0x117d3005: testl %eax,0x0(%ecx)
First chance exception: page fault on read access to 0x0024082c in
32-bit code (0x117d3005).
Register dump:
CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
EIP:117d3005 ESP:0063f824 EBP:0063f83c EFLAGS:00010206( R- -- I - -P- )
EAX:00240878 EBX:0063f878 ECX:0024082c EDX:00e92940
ESI:0063f878 EDI:0ca6ed00
Stack dump:
0x0063f824: 0063f878 10df04e4 091a0000 0063f874
0x0063f834: 3d1560a5 0063f878 00000000 10d02934
0x0063f844: 091a0000 0063f878 017afa40 091a0000
0x0063f854: 10d03d9a 091a0000 00000000 3d1560a5
0x0063f864: 094c0000 0ca36810 00000012 00000012
0x0063f874: 0000000b 7f000000 0063f878 0063f878
Backtrace:
=>0 0x117d3005 in r6vegas_game (+0xed3005) (0x0063f83c)
1 0x10d02934 in r6vegas_game (+0x402934) (0x00000000)
0x117d3005: testl %eax,0x0(%ecx)
First chance exception: page fault on read access to 0x0024082c in
32-bit code (0x117d3005).
Register dump:
CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
EIP:117d3005 ESP:0063f824 EBP:0063f83c EFLAGS:00010206( R- -- I - -P- )
EAX:00240878 EBX:0063f878 ECX:0024082c EDX:00e92940
ESI:0063f878 EDI:0ca6ed00
Stack dump:
0x0063f824: 0063f878 10df04e4 091a0000 0063f874
0x0063f834: 3d1560a5 0063f878 00000000 10d02934
0x0063f844: 091a0000 0063f878 017afa40 091a0000
0x0063f854: 10d03d9a 091a0000 00000000 3d1560a5
0x0063f864: 094c0000 0ca36810 00000012 00000012
0x0063f874: 0000000b 7f000000 0063f878 0063f878
Backtrace:
=>0 0x117d3005 in r6vegas_game (+0xed3005) (0x0063f83c)
1 0x10d02934 in r6vegas_game (+0x402934) (0x00000000)
0x117d3005: testl %eax,0x0(%ecx)
First chance exception: page fault on read access to 0x0024082c in
32-bit code (0x117d3005).
Register dump:
CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
EIP:117d3005 ESP:0063f824 EBP:0063f83c EFLAGS:00010206( R- -- I - -P- )
EAX:00240878 EBX:0063f878 ECX:0024082c EDX:00e92940
ESI:0063f878 EDI:0ca6ed00
Stack dump:
0x0063f824: 0063f878 10df04e4 091a0000 0063f874
0x0063f834: 3d1560a5 0063f878 00000000 10d02934
0x0063f844: 091a0000 0063f878 017afa40 091a0000
0x0063f854: 10d03d9a 091a0000 00000000 3d1560a5
0x0063f864: 094c0000 0ca36810 00000012 00000012
0x0063f874: 0000000b 7f000000 0063f878 0063f878
Backtrace:
=>0 0x117d3005 in r6vegas_game (+0xed3005) (0x0063f83c)
1 0x10d02934 in r6vegas_game (+0x402934) (0x00000000)
0x117d3005: testl %eax,0x0(%ecx)