[Bug 32135] LAX installer 'remove.exe' cleanup tool fails with unexpected guard page fault caused by Wine's ATL thunk check (iRise Studio MX v8.11, Football Manager 2008)

wine-bugs at winehq.org wine-bugs at winehq.org
Wed Jan 29 02:55:44 CST 2014


http://bugs.winehq.org/show_bug.cgi?id=32135

Anastasius Focht <focht at gmx.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Keywords|                            |obfuscation
             Status|UNCONFIRMED                 |RESOLVED
                 CC|                            |focht at gmx.net
          Component|-unknown                    |ntdll
         Resolution|---                         |DUPLICATE
            Summary|remove.exe crashing         |LAX installer 'remove.exe'
                   |                            |cleanup tool fails with
                   |                            |unexpected guard page fault
                   |                            |caused by Wine's ATL thunk
                   |                            |check (iRise Studio MX
                   |                            |v8.11, Football Manager
                   |                            |2008)

--- Comment #2 from Anastasius Focht <focht at gmx.net> ---
Hello folks,

'remove.exe' is an uninstaller/cleanup tool, part of LAX installer.

Actually a dupe of bug 19296

Starting with +relay gives it away:

--- snip ---
Z:\home\focht\Downloads\remove.exe (3.5) 01/29/14 09:42:41 - Dispatcher
initialisation error 13
--- snip ---

Trace log without +relay:

--- snip ---
$ WINEDEBUG=+tid,+seh,+server,+loaddll,+virtual,+ntdll wine ./remove.exe
>>log.txt 2>&1
...
0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc8456e
ip=7bc8456e tid=0009
0009:trace:seh:raise_exception  info[0]=00000000
0009:trace:seh:raise_exception  info[1]=00402e9d
0009:trace:seh:raise_exception  eax=00402e9d ebx=7bcd1000 ecx=ffc8578f
edx=0033f968 esi=0033fa9c edi=00000000
0009:trace:seh:raise_exception  ebp=0033fa38 esp=0033f940 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010246
0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7
code=c0000005 flags=0
0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0
0009:trace:seh:call_stack_handlers calling handler at 0x7bc9ebbf code=c0000005
flags=0
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000004
0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-rW-
0009:trace:virtual:VIRTUAL_SetProt forcing exec permission on 0x401000-0x408fff
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x401000 - 0x408fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x409000 - 0x421fff c----
0009:trace:virtual:VIRTUAL_DumpView       0x422000 - 0x426fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x427000 - 0x427fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x428000 - 0x42bfff c----
0009:trace:virtual:VIRTUAL_DumpView       0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x436000 - 0x436fff c-r-- 
...
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000020
000d: get_key_value( hkey=0048, name=L"PaddedBorderWidth" )
0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-r-x
000d: get_key_value() = 0 { type=1, total=4, data={30,00,00,00} }
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x401000 - 0x408fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x409000 - 0x421fff c----
0009:trace:virtual:VIRTUAL_DumpView       0x422000 - 0x426fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x427000 - 0x427fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x428000 - 0x42bfff c----
0009:trace:virtual:VIRTUAL_DumpView       0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x436000 - 0x436fff c-r--
0009:trace:seh:call_stack_handlers handler at 0x7bc9ebbf returned 0
0009:trace:ntdll:NtQueryInformationProcess
(0xffffffff,0x00000022,0x33fa68,0x00000004,(nil))
0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x402e9d ip=00402e9d
tid=0009
0009:trace:seh:raise_exception  info[0]=00000000
0009:trace:seh:raise_exception  info[1]=00402e9d
0009:trace:seh:raise_exception  eax=00402e9d ebx=7b8bb000 ecx=00028000
edx=0013de68 esi=00000001 edi=00000000
0009:trace:seh:raise_exception  ebp=0033fe04 esp=0033fdc8 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010202
0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7
code=c0000005 flags=0
0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0
0009:trace:seh:call_stack_handlers calling handler at 0x434b4c code=c0000005
flags=0
0009:trace:seh:call_stack_handlers handler at 0x434b4c returned 1
0009:trace:seh:call_stack_handlers calling handler at 0x7bc9eb4f code=c0000005
flags=0 
--- snip ---

Regards

*** This bug has been marked as a duplicate of bug 19296 ***

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list