Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Downgrade not working (via steam/Linux) #31

Open
picobyte opened this issue Feb 16, 2022 · 4 comments
Open

Downgrade not working (via steam/Linux) #31

picobyte opened this issue Feb 16, 2022 · 4 comments

Comments

@picobyte
Copy link

picobyte commented Feb 16, 2022

Describe the bug
The downgrade fails when running in steam on Linux. Running via console as such indicates the problem:

~/proton_fallout.sh BestOfBoth_1.6.353.0-1.5.97.0.exe-57618-2022-01-21-1642729421.exe
[...]
Failure processing application bundle.
Failed to create directory [Z:\home\john_doe\dnld\archives\Skyrim_SE_mods\dnld\/home
/john_doe/.cache/dotnet_bundle_extract\] for extracting bundled files.
[...]

I believe, but not 100% sure, that steam can live with the wrong path slash, but the line break included is also real, which might be the actual problem.

I'd like to fix the source of course, but then I cannot build it easily.

Desktop (please complete the following information):

  • OS: Linux 5.16.4-arch1-1 #1 SMP PREEMPT
  • Game Version you started from: 1.6.353.0
  • Game Version you to downgrade: 1.5.97.0
  • Mod Manager MO2, but running in steam, wouldn't run in MO2 either.
@picobyte
Copy link
Author

picobyte commented Feb 16, 2022

Nevermind may not be downgrade related resolved by exporting DOTNET_BUNDLE_EXTRACT_BASE_DIR and setting it to point to a directory using windows slashes and ".." to point to a valid directory.

@picobyte picobyte reopened this Feb 16, 2022
@picobyte
Copy link
Author

picobyte commented Feb 16, 2022

actually it does fail later. no crash, but it hangs. Logs:

filtered wine output ``` wineserver: using server-side synchronization. 00b4:fixme:heap:GetNumaHighestNodeNumber semi-stub: 00000000006BEFA0 00b4:fixme:ntdll:EtwEventRegister ({e13c0d23-ccbc-4e12-931b-d9cc2eee27e4}, 0000000140201A90, 0000000140777120, 0000000140777120) stub. 00b4:fixme:ntdll:EtwEventRegister ({763fd754-7086-4dfe-95eb-c01a46faf4ca}, 0000000140201A90, 0000000140777170, 0000000140777170) stub. 00b4:fixme:ntdll:EtwEventRegister ({a669021c-c450-4609-a035-5af59af4df18}, 0000000140201A90, 00000001407771C0, 00000001407771C0) stub. 00b4:fixme:seh:WerRegisterRuntimeExceptionModule (L"Z:\\home\\john_doe\\.local\\share\\Steam\\steamapps\\common\\downgrade_patcher\\mscordaccore.dll", 0000000140000000) stub 00b4:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION 00d8:fixme:font:opentype_enum_font_names handle name format 1 00b4:fixme:ntdll:EtwEventRegister ({49592c0f-5a05-516d-aa4b-a64e02026c89}, 00000000E0833024, 0000000000000000, 0000000013D13DF8) stub. 00b4:fixme:ntdll:EtwEventRegister ({e13c0d23-ccbc-4e12-931b-d9cc2eee27e4}, 00000000E0833064, 0000000000000000, 0000000013D14108) stub. 00b4:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 0000000180160738, 34) stub 00b4:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 0000000180157FF0, 17) stub 00b4:fixme:ntdll:NtQuerySystemInformation (0x000000ce,0x6b86f0,0x00000008,(nil)) stub 00b4:fixme:ntdll:RtlGetCurrentProcessorNumberEx (00000000006BA590) :semi-stub 00b4:fixme:ntdll:EtwEventRegister ({8e9f5090-2d75-4d03-8a81-e5afbf85daf1}, 00000000E0B37724, 0000000000000000, 0000000013D5B740) stub. 00b4:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 0000000180158C80, 51) stub 00b4:fixme:seh:NtSetInformationThread Can't set other thread's platform description 00b4:fixme:nls:get_dummy_preferred_ui_language (0x8 00000000006BE0A0 0000000000000000 00000000006BE098) returning a dummy value (current locale) 00b4:fixme:nls:get_dummy_preferred_ui_language (0x8 00000000006BE0A0 00000000006BDFF0 00000000006BE098) returning a dummy value (current locale) 00b4:err:seh:dispatch_exception Fatal EXCEPTION_WINE_CXX_EXCEPTION exception (code=e06d7363) raised 00b4:err:seh:dispatch_exception Fatal unknown exception (code=e0434352) raised 00b4:fixme:ntdll:EtwEventRegister ({0866b2b8-5cef-5db9-2612-0c0ffd814a44}, 00000000E0B377E4, 0000000000000000, 0000000013D731E8) stub. 00b4:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 000000018015D3E0, 38) stub 00b4:fixme:dwrite:opentype_decode_namerecord handle NAME format 1 00b4:fixme:nls:CompareStringEx semi-stub behavior for flag(s) 0x8000000 00b4:err:seh:dispatch_exception Fatal EXCEPTION_WINE_CXX_EXCEPTION exception (code=e06d7363) raised [repeated several times] 00b4:err:seh:dispatch_exception Fatal unknown exception (code=e0434352) raised 00b4:fixme:win:RegisterTouchWindow (0000000000010054 00000000): stub 00b4:err:seh:dispatch_exception Fatal unknown exception (code=e0434352) raised 00b4:err:virtual:virtual_setup_exception stack overflow 4880 bytes in thread 00b4 addr 0x7bc8063e stack 0x53fcf0 (0x540000-0x541000-0x6c0000) 0110:fixme:virtual:NtFlushProcessWriteBuffers stub ```

@picobyte
Copy link
Author

picobyte commented Feb 16, 2022

Some information here: https://wiki.winehq.org/Debugging_Reason_3
running with +relay,+seh,+tid:
12 exceptions raised, 6 of which are MSVC++ exceptions, containing e06d7363, others are idiosyncratic.

00d8:Call KERNEL32.RaiseException(000006ba,00000000,00000000,00000000) ret=7f87e5f89765
00b4:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,006bda28) ret=1405a7ae8
00b4:Call KERNEL32.RaiseException(e0434352,00000001,00000005,006be238) ret=140057eef
00b4:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,006ba2a8) ret=1405a7ae8
00b4:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,006b85e8) ret=1405a7ae8
00b4:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,006ba180) ret=1405a6be0
00b4:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,006b69b8) ret=1405a7ae8
00b4:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,006b8590) ret=1405a6be0
00b4:Call KERNEL32.RaiseException(e0434352,00000001,00000005,006bad58) ret=140057eef
00b4:Call KERNEL32.RaiseException(e0434352,00000001,00000005,006be2f8) ret=140057eef
0080:Call KERNEL32.RaiseException(000006ba,00000000,00000000,00000000) ret=7f418a455765
0080:Call KERNEL32.RaiseException(000006ba,00000000,00000000,00000000) ret=7f418a455765
the first exception
00d8:Ret  KERNEL32.CreateFileA() retval=ffffffffffffffff ret=7f87e5f809fc
00d8:Call KERNEL32.WaitNamedPipeA(004101d0 "\\\\.\\pipe\\lrpc\\irpcss",ffffffff) ret=7f87e5f80a23
00d8:Call ntdll.strlen(004101d0 "\\\\.\\pipe\\lrpc\\irpcss") ret=7b05b248
00d8:Ret  ntdll.strlen() retval=00000014 ret=7b05b248
00d8:Call ntdll.RtlDosPathNameToNtPathName_U(0063e060 L"\\\\.\\pipe\\lrpc\\irpcss",0063df80,00000000,00000000) ret=7b09a449
00d8:Ret  ntdll.RtlDosPathNameToNtPathName_U() retval=00000001 ret=7b09a449
00d8:Call ntdll._wcsnicmp(00302bd0 L"\\??\\pipe\\lrpc\\irpcss",7b0c22ac L"\\??\\PIPE\\",00000009) ret=7b09a47a
00d8:Ret  ntdll._wcsnicmp() retval=00000000 ret=7b09a47a
00d8:Call ntdll.RtlAllocateHeap(00020000,00000000,00000024) ret=7b09a4af
00d8:Ret  ntdll.RtlAllocateHeap() retval=00302c90 ret=7b09a4af
00d8:Call ntdll.NtOpenFile(0063df78,00100080,0063dfb0,0063dfa0,00000003,00000020) ret=7b09a546
00d8:Ret  ntdll.NtOpenFile() retval=00000000 ret=7b09a546
00d8:Call ntdll.memcpy(00302c9e,00302be2,00000016) ret=7b09a58f
00d8:Ret  ntdll.memcpy() retval=00302c9e ret=7b09a58f
00d8:Call ntdll.RtlFreeUnicodeString(0063df80) ret=7b09a597
00d8:Ret  ntdll.RtlFreeUnicodeString() retval=0063df80 ret=7b09a597
00d8:Call ntdll.NtFsControlFile(000000b0,00000000,00000000,00000000,0063dfa0,00110018,00302c90,00000024,00000000,00000000) ret=7b09a5d9
00d8:Ret  ntdll.NtFsControlFile() retval=c0000034 ret=7b09a5d9
00d8:Call ntdll.RtlFreeHeap(00020000,00000000,00302c90) ret=7b09a5ed
00d8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b09a5ed
00d8:Call ntdll.NtClose(000000b0) ret=7b09a5f7
00d8:Ret  ntdll.NtClose() retval=00000000 ret=7b09a5f7
00d8:Call ntdll.RtlNtStatusToDosError(c0000034) ret=7b09a697
00d8:Ret  ntdll.RtlNtStatusToDosError() retval=00000002 ret=7b09a697
00d8:Ret  KERNEL32.WaitNamedPipeA() retval=00000000 ret=7f87e5f80a23
00d8:Call KERNEL32.HeapFree(00020000,00000000,004101d0) ret=7f87e5f8acf3
00d8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7f87e5f8acf3
00d8:Call KERNEL32.HeapFree(00020000,00000000,00410190) ret=7f87e5f8805a
00d8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7f87e5f8805a
00d8:Call KERNEL32.HeapFree(00020000,00000000,00410150) ret=7f87e5f88063
00d8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7f87e5f88063
00d8:Call KERNEL32.HeapFree(00020000,00000000,00000000) ret=7f87e5f88076
00d8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7f87e5f88076
00d8:Call KERNEL32.HeapFree(00020000,00000000,00000000) ret=7f87e5f88089
00d8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7f87e5f88089
00d8:Call KERNEL32.HeapFree(00020000,00000000,00251310) ret=7f87e5f6ddd6
00d8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7f87e5f6ddd6
00d8:Call KERNEL32.HeapFree(00020000,00000000,002e8e30) ret=7f87e5f8acf3
00d8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7f87e5f8acf3
00d8:Call KERNEL32.RaiseException(000006ba,00000000,00000000,00000000) ret=7f87e5f89765
the second exception
00b4:Ret  KERNEL32.LocalFree() retval=00000000 ret=1402e8222
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,00000002) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=0050c1d0 ret=1402d79fb
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,00000024) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=012e05f0 ret=1402d79fb
00b4:Call KERNEL32.HeapFree(00020000,00000000,0050c1d0) ret=14000ef68
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=14000ef68
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,0000003c) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=012e0650 ret=1402d79fb
00b4:Call KERNEL32.HeapFree(00020000,00000000,012e05f0) ret=1402db706
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=1402db706
00b4:Call ucrtbase._errno() ret=1402e7bf9
00b4:Ret  ucrtbase._errno() retval=00310060 ret=1402e7bf9
00b4:Call ucrtbase.__stdio_common_vsnwprintf_s(00000024,006bd7e8,00000029,ffffffffffffffff,1406c45b0 L"0x%.8X",00000000,006bda10) ret=1400ef8ef
00b4:Ret  ucrtbase.__stdio_common_vsnwprintf_s() retval=0000000a ret=1400ef8ef
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,0000000e) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=0050c1d0 ret=1402d79fb
00b4:Call ucrtbase.wcscpy_s(0050c1d0,00000007,1406c45b0 L"0x%.8X") ret=14000f630
00b4:Ret  ucrtbase.wcscpy_s() retval=00000000 ret=14000f630
00b4:Call KERNEL32.HeapFree(00020000,00000000,0050c1d0) ret=1402e7c99
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=1402e7c99
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,0000005d) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=004e3ed0 ret=1402d79fb
00b4:Call KERNEL32.HeapFree(00020000,00000000,012e0650) ret=1402db706
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=1402db706
00b4:Call KERNEL32.HeapFree(00020000,00000000,0126d490) ret=1402db444
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=1402db444
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,000000f8) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=002d03b0 ret=1402d79fb
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,00000022) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=0126d490 ret=1402d79fb
00b4:Call ucrtbase.wcscpy_s(0126d490,00000011,006bdbd8 L"av_libGLESv2.dll") ret=1400630d8
00b4:Ret  ucrtbase.wcscpy_s() retval=00000000 ret=1400630d8
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,0000003e) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=012e0650 ret=1402d79fb
00b4:Call ucrtbase.wcscpy_s(012e0650,0000001f,004e3ed0 L"Module not found. (0x8007007E)") ret=14006325b
00b4:Ret  ucrtbase.wcscpy_s() retval=00000000 ret=14006325b
00b4:Call ntdll.RtlPcToFileHeader(140772f20,006bda20) ret=1405a7aa2
00b4:Ret  ntdll.RtlPcToFileHeader() retval=140000000 ret=1405a7aa2
00b4:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,006bda28) ret=1405a7ae8

just near the 10th there are some pagefaults:

line:grepped code
6466505:00b4:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
6466516:00b4:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
6466459:00b4:Call KERNEL32.RaiseException(e0434352,00000001,00000005,006be2f8) ret=140057eef
trace
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c10d5
00b4:Call KERNEL32.GetLastError() ret=1400c10d5
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c10d5
00b4:Call KERNEL32.GetLastError() ret=1400c10d5
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c10d5
00b4:Call KERNEL32.GetLastError() ret=1400c10d5
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c10d5
00b4:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,14438e5c L"mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0000004b,00000000,00000000,>
00b4:Call ntdll.RtlUnicodeToUTF8N(00000000,00000000,006bb94c,14438e5c,2928656500000096) ret=7b053d4e
00b4:Ret  ntdll.RtlUnicodeToUTF8N() retval=00000000 ret=7b053d4e
00b4:Ret  KERNEL32.WideCharToMultiByte() retval=0000004b ret=14010bd85
00b4:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,14438e5c L"mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0000004b,006bbcc8,0000004c,>
00b4:Call ntdll.RtlUnicodeToUTF8N(006bbcc8,0000004c,006bb94c,14438e5c,2928656500000096) ret=7b053d4e
00b4:Ret  ntdll.RtlUnicodeToUTF8N() retval=00000000 ret=7b053d4e
00b4:Ret  KERNEL32.WideCharToMultiByte() retval=0000004b ret=14010be63
00b4:Call ucrtbase.strcmp(1406b098a "",1406b5098 "neutral") ret=14012f1c6
00b4:Ret  ucrtbase.strcmp() retval=ffffffff ret=14012f1c6
00b4:Call ucrtbase.strlen(001606a8 "mscorlib") ret=14000d59c
00b4:Ret  ucrtbase.strlen() retval=00000008 ret=14000d59c
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,00000009) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=015142d0 ret=1402d79fb
00b4:Call ucrtbase.strcpy_s(015142d0,00000009,001606a8 "mscorlib") ret=14000d5bc
00b4:Ret  ucrtbase.strcpy_s() retval=00000000 ret=14000d5bc
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,00000008) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=01514190 ret=1402d79fb
00b4:Call ucrtbase.strlen(1406b098a "") ret=14000d613
00b4:Ret  ucrtbase.strlen() retval=00000000 ret=14000d613
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,00000001) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=01514390 ret=1402d79fb
00b4:Call ucrtbase.strcpy_s(01514390,00000001,1406b098a "") ret=14000d633
00b4:Ret  ucrtbase.strcpy_s() retval=00000000 ret=14000d633
00b4:Call ntdll.RtlAllocateHeap(00020000,00000000,00000009) ret=1402d79fb
00b4:Ret  ntdll.RtlAllocateHeap() retval=01514250 ret=1402d79fb
00b4:Call ucrtbase.strcpy_s(01514250,00000009,015142d0 "mscorlib") ret=1400191b0
00b4:Ret  ucrtbase.strcpy_s() retval=00000000 ret=1400191b0
00b4:Call KERNEL32.HeapFree(00020000,00000000,01514250) ret=14010ba86
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=14010ba86
00b4:Call ucrtbase.strlen(01514390 "") ret=1400b0fc0
00b4:Ret  ucrtbase.strlen() retval=00000000 ret=1400b0fc0
00b4:Call ucrtbase.strlen(015142d0 "mscorlib") ret=1400b0fc0
00b4:Ret  ucrtbase.strlen() retval=00000008 ret=1400b0fc0
00b4:Call KERNEL32.MultiByteToWideChar(0000fde9,00000000,015142d0 "mscorlib",00000008,006bb3b8,7f6800000008) ret=1400b10af
00b4:Call ntdll.RtlUTF8ToUnicodeN(006bb3b8,00000010,006bb1cc,015142d0,6573616200000008) ret=7b053c70
00b4:Ret  ntdll.RtlUTF8ToUnicodeN() retval=00000000 ret=7b053c70
00b4:Ret  KERNEL32.MultiByteToWideChar() retval=00000008 ret=1400b10af
00b4:Call KERNEL32.HeapFree(00020000,00000000,015142d0) ret=1401065f8
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=1401065f8
00b4:Call KERNEL32.HeapFree(00020000,00000000,01514190) ret=140106615
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=140106615
00b4:Call KERNEL32.HeapFree(00020000,00000000,01514390) ret=14010664f
00b4:Ret  KERNEL32.HeapFree() retval=00000001 ret=14010664f
00b4:Call KERNEL32.GetLastError() ret=1400c10d5
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c10d5
00b4:Call KERNEL32.GetLastError() ret=1400c10d5
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c10d5
00b4:Call KERNEL32.GetLastError() ret=1400c10d5
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c10d5
00b4:Call KERNEL32.GetLastError() ret=1400c0780
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=1400c0780
00b4:Call KERNEL32.RaiseException(e0434352,00000001,00000005,006be2f8) ret=140057eef
00b4:Call ntdll.memcpy(006be180,006be2f8,00000028) ret=7b0398cd
00b4:Ret  ntdll.memcpy() retval=006be180 ret=7b0398cd
00b4:trace:seh:dispatch_exception code=e0434352 flags=1 addr=000000007B0398D7 ip=000000007B0398D7 tid=00b4
00b4:trace:seh:dispatch_exception  info[0]=0000000080131509
00b4:trace:seh:dispatch_exception  info[1]=0000000000000000
00b4:trace:seh:dispatch_exception  info[2]=0000000000000000
00b4:trace:seh:dispatch_exception  info[3]=0000000000000000
00b4:trace:seh:dispatch_exception  info[4]=0000000040000000
00b4:err:seh:dispatch_exception Fatal unknown exception (code=e0434352) raised
00b4:trace:seh:dispatch_exception  rax=00000000006be180 rbx=00000000006be2f8 rcx=00000000006be160 rdx=0000000000000000
00b4:trace:seh:dispatch_exception  rsi=00000000006be2a0 rdi=00000000006be230 rbp=00000000006be200 rsp=00000000006be140
00b4:trace:seh:dispatch_exception   r8=0000000000000000  r9=00000000006bdc71 r10=00000000006bdc70 r11=0000000000000293
00b4:trace:seh:dispatch_exception  r12=0000000000000004 r13=00000000006be910 r14=00000000e0434352 r15=00000000006bea80
00b4:trace:seh:call_vectored_handlers calling handler at 000000014005D880 code=e0434352 flags=1
00b4:Call KERNEL32.GetLastError() ret=14005d8bb
00b4:Ret  KERNEL32.GetLastError() retval=00000000 ret=14005d8bb
00b4:trace:seh:call_vectored_handlers handler at 000000014005D880 returned 0
00b4:trace:seh:call_vectored_handlers calling handler at 000000007B0334A0 code=e0434352 flags=1
00b4:trace:seh:call_vectored_handlers handler at 000000007B0334A0 returned 0
00b4:trace:seh:dwarf_virtual_unwind function 7b0398d7 base 0x7b039838 cie 0x7b0cf138 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
00b4:trace:seh:execute_cfa_instructions 7b039838: DW_CFA_def_cfa %rsp, 8
00b4:trace:seh:execute_cfa_instructions 7b039838: DW_CFA_offset %rip, -8
00b4:trace:seh:dwarf_virtual_unwind fde 0x7b0d8288 len 24 personality (nil) lsda (nil) code 7b039838-7b0398d9
00b4:trace:seh:execute_cfa_instructions 7b039838: DW_CFA_advance_loc 5
00b4:trace:seh:execute_cfa_instructions 7b03983d: DW_CFA_def_cfa_offset 16
00b4:trace:seh:execute_cfa_instructions 7b03983d: DW_CFA_offset %rbp, -16
00b4:trace:seh:execute_cfa_instructions 7b03983d: DW_CFA_advance_loc 3
00b4:trace:seh:execute_cfa_instructions 7b039840: DW_CFA_def_cfa_register %rbp
00b4:trace:seh:execute_cfa_instructions 7b039840: DW_CFA_advance_loc1 96
00b4:trace:seh:execute_cfa_instructions 7b0398a0: DW_CFA_remember_state
00b4:trace:seh:execute_cfa_instructions 7b0398a0: DW_CFA_restore %rbp
00b4:trace:seh:execute_cfa_instructions 7b0398a0: DW_CFA_def_cfa %rsp, 8
00b4:trace:seh:execute_cfa_instructions 7b0398a0: DW_CFA_advance_loc 8
00b4:trace:seh:execute_cfa_instructions 7b0398a8: DW_CFA_restore_state
00b4:trace:seh:execute_cfa_instructions 7b0398a8: DW_CFA_advance_loc 48
00b4:trace:seh:dwarf_virtual_unwind next function rip=000000007bc7086f
00b4:trace:seh:dwarf_virtual_unwind   rax=00000000006be180 rbx=00000000006be2f8 rcx=00000000006be160 rdx=0000000000000000
00b4:trace:seh:dwarf_virtual_unwind   rsi=00000000006be2a0 rdi=00000000006be230 rbp=00000000006be268 rsp=00000000006be210
00b4:trace:seh:dwarf_virtual_unwind    r8=0000000000000000  r9=00000000006bdc71 r10=00000000006bdc70 r11=0000000000000293
00b4:trace:seh:dwarf_virtual_unwind   r12=0000000000000004 r13=00000000006be910 r14=00000000e0434352 r15=00000000006bea80
00b4:trace:seh:call_stack_handlers found wine frame 00000000006B9190 rsp 00000000006BE210 handler 000000000000003C
00b4:trace:seh:call_teb_handler calling TEB handler 000000000000003C (rec=00000000006BE160, frame=00000000006B9190 context=00000000006BD680, dispatch=00000000006BD550)
00b4:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000000000003C ip=000000000000003C tid=00b4
00b4:trace:seh:dispatch_exception  info[0]=0000000000000008
00b4:trace:seh:dispatch_exception  info[1]=000000000000003c
00b4:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
Nope, impossible to understand how the crash log relates to the code. the log was 1.2 Gb lines after aminute, mostly full of unrelated wine/windows calls

@picobyte picobyte changed the title Path issue prevents downgrade (via steam/Linux) Downgrade not working (via steam/Linux), memcpy out of bounds? Feb 16, 2022
@picobyte picobyte changed the title Downgrade not working (via steam/Linux), memcpy out of bounds? Downgrade not working (via steam/Linux), after MultiByteToWideChar? Feb 16, 2022
@picobyte picobyte changed the title Downgrade not working (via steam/Linux), after MultiByteToWideChar? Downgrade not working (via steam/Linux) Feb 16, 2022
@ValeTheVioletMote
Copy link

Can this be compiled for linux?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants