[Bug 31351] New: Program crashes with: err:seh:setup_exception_record stack overflow 1472 bytes in thread 0009
wine-bugs at winehq.org
wine-bugs at winehq.org
Sun Jul 29 15:03:34 CDT 2012
http://bugs.winehq.org/show_bug.cgi?id=31351
Bug #: 31351
Summary: Program crashes with: err:seh:setup_exception_record
stack overflow 1472 bytes in thread 0009
Product: Wine
Version: 1.5.9
Platform: x86
OS/Version: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: -unknown
AssignedTo: wine-bugs at winehq.org
ReportedBy: kenorb at gmail.com
Classification: Unclassified
I'm running following application by: wine ex4_to_mq4.exe
It crashes after 2 seconds with the following error:
err:seh:setup_exception_record stack overflow 1472 bytes in thread 0009 eip
7bc327cc esp 00240d70 stack 0x240000-0x241000-0x340000
Here is some part from the trace:
11.336:000d:trace:heap:RtlAllocateHeap (0x110000,70000062,00000012): returning
0x141f18^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling
handler at 0x7bc679c0 code=c0000005 flags=10
11.336:000d:Ret ntdll.RtlAllocateHeap() retval=00141f18 ret=42e74993
11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
c) ret=42e749cb
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:00
0d:trace:reg:RegQueryValueExW (0x44,(null),0x0,0x0,0x141f18,0x34f45c=18)
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling
handler at 0x7bc679c0 code=c0000005 flags=10
11.336:000d:trace:reg:NtQueryValueKey (0x44,(null),2,0x34f21c,30)
11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
000d: get_key_value( hkey=0044, name=L"" )
handler at 0x7bc679c0 returned 2
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
66,00,69,00,6c,00,65,00,00,00} }
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling
handler at 0x7bc679c0 code=c0000005 flags=10
11.336:0009:trace:seh:call_stack_handlers handler at 0x7bc679c0 returned 2
11.336:000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=42e749cb
de=c0000005 flags=10
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers handler a
t 0x7bc679c0 returned 2
11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc679c0
code=c0000005 flags=10
8) ret=42e74b9f
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:00
0d:trace:reg:NtOpenKey (0x40,L"htmlfile",20019,0x34f4d8)
turned 2
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
11.336:0009:trace:seh:call_stack_handlers calling handler at 0xffff
ffff code=c0000005 flags=10
000d: open_key( parent=0040, access=00020019, attributes=00000000,
name=L"htmlfile" )
000d: open_key() = 0 { hkey=0048 }
11.336:000d:trace:reg:NtOpenKey <- 0x48
11.336:000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42e74b9f
11.336:000d:Call ntdll.RtlFreeHeap(00110000,00000000,00141f18) ret=42e74bc5
11.336:0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc67b1e
ip=7bc67b1e tid=0009
11.336:0009:trace:seh:raise_exception info[0]=00000000
11.336:0009:trace:seh:raise_exception info[1]=ffffffff
11.336:0009:trace:seh:raise_exception eax=00253910 ebx=7bc67adf ecx=ffffffff
edx=00253d20 esi=002539e8 edi=00254704
11.336:0009:trace:seh:raise_exception ebp=00253978 esp=002538e0 cs=0017
ds=001f es=001f fs=1007 gs=0037 flags=00010246
11.336:0009:trace:seh:call_stack_handlers calling handler at 0x7bc7ea80
code=c0000005 flags=0
11.336:0009:trace:virtual:VIRTUAL_SetProt 0x251000-0x251fff c-rw-
11.336:0009:trace:virtual:VIRTUAL_SetProt forcing exec permission on
0x251000-0x251fff
11.336:0009:trace:virtual:VIRTUAL_DumpView View: 0x250000 - 0x34ffff (valloc)
11.336:0009:trace:virtual:VIRTUAL_DumpView 0x250000 - 0x250fff c----
11.336:0009:trace:virtual:VIRTUAL_DumpView 0x251000 - 0x34ffff c-rw-
11.337:0009:err:seh:setup_exception_record stack overflow 2272 bytes in thread
0009 eip 9798dc86 esp 00250a50 stack 0x250000-0x251000-0x350000
Full log in the attachment.
--
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.
More information about the wine-bugs
mailing list