[Bug 31111] wmp9 install fails with builtin pidgen

wine-bugs at winehq.org wine-bugs at winehq.org
Tue Feb 25 16:34:45 CST 2014


https://bugs.winehq.org/show_bug.cgi?id=31111

Anastasius Focht <focht at gmx.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
                 CC|                            |focht at gmx.net
         Resolution|---                         |FIXED

--- Comment #2 from Anastasius Focht <focht at gmx.net> ---
Hello Austin,

works as designed for me too.

A simple +module trace would have revealed the problem very quickly ... it's
not very hard to do.
Anyway, resolving 'fixed'.

--- snip ---
...
002a:Call KERNEL32.LoadLibraryW(0033eac0
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll") ret=0101a4ad
002a:trace:module:load_dll looking for
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll" in
L"C:\\users\\focht\\Temp\\IXP000.TMP;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem"
002a:trace:module:get_load_order looking for
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:trace:module:get_load_order got hardcoded default for
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:trace:module:load_builtin_dll Trying built-in
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:warn:module:load_builtin_dll failed to load .so lib for builtin
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll":
/home/focht/.wine/dosdevices/c:/users/focht/Temp/IXP000.TMP/PidGen.dll: invalid
ELF header
002a:trace:module:load_builtin_dll Trying built-in L"pidgen.dll"
002a:trace:module:load_dll looking for L"kernel32.dll" in
L"C:\\users\\focht\\Temp\\IXP000.TMP;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem"
002a:trace:module:load_dll Found L"C:\\windows\\system32\\KERNEL32.dll" for
L"kernel32.dll" at 0x7b810000, count=-1
002a:trace:module:load_builtin_callback loaded pidgen.dll 0x4439e0 0x7d090000
002a:Call PE DLL (proc=0x7d097808,module=0x7d090000
L"pidgen.dll",reason=WINE_PREATTACH,res=(nil))
002a:Ret  PE DLL (proc=0x7d097808,module=0x7d090000
L"pidgen.dll",reason=WINE_PREATTACH,res=(nil)) retval=0
002a:trace:module:load_dll L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
pre-attach returned FALSE, preferring native
002a:trace:module:LdrUnloadDll (0x7d090000)
002a:trace:module:LdrUnloadDll (L"pidgen.dll") - START
002a:trace:module:MODULE_DecRefCount (L"pidgen.dll") ldr.LoadCount: 0
002a:trace:module:free_modref  unloading L"C:\\windows\\system32\\pidgen.dll"
002a:trace:module:LdrUnloadDll END
002a:trace:module:load_native_dll Trying native dll
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:trace:module:map_image mapped PE file at 0x10000000-0x10007000
002a:trace:module:map_image mapping section .text at 0x10001000 off 400 size
3000 virt 2ed3 flags 60000020
002a:trace:module:map_image mapping section .data at 0x10004000 off 3400 size
200 virt 1b4 flags c0000040
002a:trace:module:map_image clearing 0x10004200 - 0x10005000
002a:trace:module:map_image mapping section .rsrc at 0x10005000 off 3600 size
800 virt 6f8 flags 40000040
002a:trace:module:map_image clearing 0x10005800 - 0x10006000
002a:trace:module:map_image mapping section .reloc at 0x10006000 off 3e00 size
200 virt 124 flags 42000040
002a:trace:module:map_image clearing 0x10006200 - 0x10007000
002a:warn:module:alloc_module disabling no-exec because of L"pidgen.dll"
...
002a:trace:module:load_dll looking for L"ADVAPI32.dll" in
L"C:\\users\\focht\\Temp\\IXP000.TMP;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem"
002a:trace:module:load_dll Found L"C:\\windows\\system32\\advapi32.dll" for
L"ADVAPI32.dll" at 0x7ecb0000, count=-1
002a:trace:module:load_dll Loaded module
L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll" (native) at 0x10000000
002a:trace:module:process_attach (L"pidgen.dll",(nil)) - START
002a:Call PE DLL (proc=0x10001504,module=0x10000000
L"pidgen.dll",reason=PROCESS_ATTACH,res=(nil))
002a:Ret  PE DLL (proc=0x10001504,module=0x10000000
L"pidgen.dll",reason=PROCESS_ATTACH,res=(nil)) retval=1
002a:trace:module:process_attach (L"pidgen.dll",(nil)) - END
002a:Ret  KERNEL32.LoadLibraryW() retval=10000000 ret=0101a4ad
002a:Call KERNEL32.GetProcAddress(10000000,010021bc "PIDGenSimpW") ret=01011fe8
002a:Ret  KERNEL32.GetProcAddress() retval=10001f61 ret=01011fe8 
--- snip ---

Regards

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list