[Bug 47320] Black Ops 4 Unhandled Exception When Loading gdi32.dll

WineHQ Bugzilla wine-bugs at winehq.org
Sat May 16 09:57:07 CDT 2020


https://bugs.winehq.org/show_bug.cgi?id=47320

--- Comment #11 from minion <minion.procyk at gmail.com> ---
no stack overflow but still the same problem, application fails to map
gdi32.dll. Tried both wine/wine staging.

65207.895:0120:0124:trace:file:find_drive_rootA
"/media/big_drive/media/Games/battlenet/drive_c/windows/system32/gdi32.dll" ->
drive C:, root="/media/big_drive/media/Games/battlenet/drive_c",
name="/windows/system32/gdi32.dll"
65207.896:0120:0124:trace:heap:RtlFreeHeap (0x10000,30000062,0x3b5b0):
returning TRUE
65207.896:0120:0124:trace:heap:RtlAllocateHeap (0x10000,30000062,00000044):
returning 0x363a0
65207.896:0120:0124:trace:heap:RtlFreeHeap (0x10000,30000062,0x363a0):
returning TRUE
65207.896:0120:0124:trace:heap:RtlFreeHeap (0x10000,30000062,0x11dbae0):
returning TRUE
65207.896:0120:0124:Ret  ntdll.NtQueryInformationFile() retval=00000000
ret=7b01ea13
65207.896:0120:0124:Ret  KERNEL32.GetFileInformationByHandleEx()
retval=00000001 ret=140029da5
65207.896:0120:0124:Call
ntdll.NtCreateSection(0021dae0,000f001f,00000000,0021daf0,00000020,01000000,000000a8)
ret=14002ace2
0124: create_mapping( access=000f001f, flags=01000000, file_access=00000001,
size=00000000, file_handle=00a8, objattr={} )
0124: create_mapping() = 0 { handle=00ac }
65207.896:0120:0124:Ret  ntdll.NtCreateSection() retval=00000000 ret=14002ace2
65207.896:0120:0124:Call
ntdll.NtMapViewOfSection(000000ac,ffffffffffffffff,0021da90,00000000,00000000,00000000,0021dae8,00000002,00000000,00000020)
ret=14002af04
65207.896:0120:0124:trace:virtual:NtMapViewOfSection handle=0xac
process=0xffffffffffffffff addr=(nil) off=000000000 size=0 access=20
0124: get_mapping_info( handle=00ac, access=0000000c )
0124: get_mapping_info() = 0 { size=00007000, flags=01800000, shared_file=0000,
image={base=10000000,entry_point=10001000,map_size=00007000,stack_size=00100000,stack_commit=00001000,zerobits=00000000,subsystem=00000000,subsystem_low=0000,subsystem_high=0004,gp=00000000,image_charact=2022,dll_charact=0100,machine=8664,contains_code=1,image_flags=80,loader_flags=00000000,header_size=00000200,file_size=000045e0,checksum=00000000,cpu=x86_64}
}
0124: get_handle_fd( handle=00ac )
0124: *fd* 00ac -> 162
0124: get_handle_fd() = 0 { type=1, cacheable=1, access=000f001f,
options=00000020 }
65207.896:0120:0124:trace:module:map_image mapped PE file at
0x10000000-0x10007000
65207.896:0120:0124:trace:module:map_image mapping section .text at 0x10001000
off 200 size 5 virt 1000 flags 60000020
65207.896:0120:0124:trace:module:map_image clearing 0x10001200 - 0x10002000
65207.896:0120:0124:trace:module:map_image mapping section .reloc at 0x10002000
off 400 size 8 virt 1000 flags 42000040
65207.896:0120:0124:trace:module:map_image clearing 0x10002200 - 0x10003000
65207.896:0120:0124:trace:module:map_image mapping section .rsrc at 0x10003000
off 600 size 3fe0 virt 4000 flags 40000040
0124: map_view( mapping=00ac, access=0000000c, base=10000000, size=00007000,
start=00000000 )
0124: map_view() = 0
65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView View: 0x10000000 -
0x10006fff (image)
65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10000000 -
0x10000fff c-r--
65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10001000 -
0x10001fff c-r-x
65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10002000 -
0x10006fff c-r--
65207.896:0120:0124:Ret  ntdll.NtMapViewOfSection() retval=00000000
ret=14002af04
65207.896:0120:0124:Call KERNEL32.CloseHandle(000000ac) ret=14002b1ae
65207.896:0120:0124:Call ntdll.NtClose(000000ac) ret=7b04a2e4
0124: close_handle( handle=00ac )
0124: close_handle() = 0
65207.896:0120:0124:Ret  ntdll.NtClose() retval=00000000 ret=7b04a2e4
65207.896:0120:0124:Ret  KERNEL32.CloseHandle() retval=00000001 ret=14002b1ae
65207.896:0120:0124:Call KERNEL32.CloseHandle(000000a8) ret=14002b454
65207.896:0120:0124:Call ntdll.NtClose(000000a8) ret=7b04a2e4
0124: close_handle( handle=00a8 )
0124: close_handle() = 0
65207.896:0120:0124:Ret  ntdll.NtClose() retval=00000000 ret=7b04a2e4
65207.896:0120:0124:Ret  KERNEL32.CloseHandle() retval=00000001 ret=14002b454
65207.897:0120:0124:Call
KERNEL32.VirtualProtect(10000000,00000000,00000004,0021dad0) ret=14002c8b2
65207.897:0120:0124:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0021d978,0021d980,00000004,0021dad0)
ret=7b038536
65207.897:0120:0124:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff
0x10000000 00000000 00000004
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView View: 0x10000000 -
0x10006fff (image)
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10000000 -
0x10000fff c-r--
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10001000 -
0x10001fff c-r-x
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10002000 -
0x10006fff c-r--
65207.897:0120:0124:Ret  ntdll.NtProtectVirtualMemory() retval=00000000
ret=7b038536
65207.897:0120:0124:Ret  KERNEL32.VirtualProtect() retval=00000001
ret=14002c8b2
65207.897:0120:0124:Call
KERNEL32.VirtualProtect(10000000,00000000,00000002,0021dad0) ret=14002cf4c
65207.897:0120:0124:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0021d978,0021d980,00000002,0021dad0)
ret=7b038536
65207.897:0120:0124:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff
0x10000000 00000000 00000002
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView View: 0x10000000 -
0x10006fff (image)
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10000000 -
0x10000fff c-r--
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10001000 -
0x10001fff c-r-x
65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView       0x10002000 -
0x10006fff c-r--
65207.897:0120:0124:Ret  ntdll.NtProtectVirtualMemory() retval=00000000
ret=7b038536
65207.897:0120:0124:Ret  KERNEL32.VirtualProtect() retval=00000001
ret=14002cf4c
65207.897:0120:0124:trace:seh:raise_exception code=c0000005 flags=0
addr=0x15324d8e8 ip=15324d8e8 tid=0124
65207.897:0120:0124:trace:seh:raise_exception  info[0]=0000000000000000
65207.897:0120:0124:trace:seh:raise_exception  info[1]=0000000010405a4d
65207.897:0120:0124:trace:seh:raise_exception  rax=000000000021db58
rbx=0000000000000000 rcx=00000000b5d11452 rdx=0000000000000064
65207.897:0120:0124:trace:seh:raise_exception  rsi=0000000010000000
rdi=0000000000000000 rbp=000000000021db20 rsp=000000000021da20
65207.897:0120:0124:trace:seh:raise_exception   r8=0000000000000065 
r9=0000000010000000 r10=000000000021db58 r11=00000000101e7ef5
65207.897:0120:0124:trace:seh:raise_exception  r12=0000000010000000
r13=0000000010000000 r14=0000000010000060 r15=0000000000000060

wine-5.8-173-g9e26bc8116

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list