[Bug 31351] New: Program crashes with: err:seh:setup_exception_record stack overflow 1472 bytes in thread 0009

wine-bugs at winehq.org wine-bugs at winehq.org
Sun Jul 29 15:03:34 CDT 2012


http://bugs.winehq.org/show_bug.cgi?id=31351

             Bug #: 31351
           Summary: Program crashes with: err:seh:setup_exception_record
                    stack overflow 1472 bytes in thread 0009
           Product: Wine
           Version: 1.5.9
          Platform: x86
        OS/Version: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: -unknown
        AssignedTo: wine-bugs at winehq.org
        ReportedBy: kenorb at gmail.com
    Classification: Unclassified


I'm running following application by: wine ex4_to_mq4.exe
It crashes after 2 seconds with the following error:

err:seh:setup_exception_record stack overflow 1472 bytes in thread 0009 eip
7bc327cc esp 00240d70 stack 0x240000-0x241000-0x340000


Here is some part from the trace:


 11.336:000d:trace:heap:RtlAllocateHeap (0x110000,70000062,00000012): returning
0x141f18^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling
 handler at 0x7bc679c0 code=c0000005 flags=10
 11.336:000d:Ret  ntdll.RtlAllocateHeap() retval=00141f18 ret=42e74993
11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
 11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
c) ret=42e749cb
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:00
0d:trace:reg:RegQueryValueExW (0x44,(null),0x0,0x0,0x141f18,0x34f45c=18)
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling
 handler at 0x7bc679c0 code=c0000005 flags=10
 11.336:000d:trace:reg:NtQueryValueKey (0x44,(null),2,0x34f21c,30)
 11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
 11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
000d: get_key_value( hkey=0044, name=L"" )
handler at 0x7bc679c0 returned 2
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
 11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
66,00,69,00,6c,00,65,00,00,00} }
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling
 handler at 0x7bc679c0 code=c0000005 flags=10
 11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
 11.336:000d:Ret  advapi32.RegQueryValueExW() retval=00000000 ret=42e749cb
de=c0000005 flags=10
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers handler a
t 0x7bc679c0 returned 2
 11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
8) ret=42e74b9f
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:00
0d:trace:reg:NtOpenKey (0x40,L"htmlfile",20019,0x34f4d8)
turned 2
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling handler at 0xffff
ffff code=c0000005 flags=10
000d: open_key( parent=0040, access=00020019, attributes=00000000,
name=L"htmlfile" )
000d: open_key() = 0 { hkey=0048 }
 11.336:000d:trace:reg:NtOpenKey <- 0x48
 11.336:000d:Ret  advapi32.RegOpenKeyExW() retval=00000000 ret=42e74b9f
 11.336:000d:Call ntdll.RtlFreeHeap(00110000,00000000,00141f18) ret=42e74bc5
 11.336:0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc67b1e
ip=7bc67b1e tid=0009
 11.336:0009:trace:seh:raise_exception  info[0]=00000000
 11.336:0009:trace:seh:raise_exception  info[1]=ffffffff
 11.336:0009:trace:seh:raise_exception  eax=00253910 ebx=7bc67adf ecx=ffffffff
edx=00253d20 esi=002539e8 edi=00254704
 11.336:0009:trace:seh:raise_exception  ebp=00253978 esp=002538e0 cs=0017
ds=001f es=001f fs=1007 gs=0037 flags=00010246
 11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc7ea80
code=c0000005 flags=0
 11.336:0009:trace:virtual:VIRTUAL_SetProt 0x251000-0x251fff c-rw-
 11.336:0009:trace:virtual:VIRTUAL_SetProt forcing exec permission on
0x251000-0x251fff
 11.336:0009:trace:virtual:VIRTUAL_DumpView View: 0x250000 - 0x34ffff (valloc)
 11.336:0009:trace:virtual:VIRTUAL_DumpView       0x250000 - 0x250fff c----
 11.336:0009:trace:virtual:VIRTUAL_DumpView       0x251000 - 0x34ffff c-rw-
 11.337:0009:err:seh:setup_exception_record stack overflow 2272 bytes in thread
0009 eip 9798dc86 esp 00250a50 stack 0x250000-0x251000-0x350000

Full log in the attachment.

-- 
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.



More information about the wine-bugs mailing list