[Bug 19296] Multiple apps wrapped with Shrinker 3.5 fail with unexpected guard page fault caused by Wine's ATL thunk check (Uru: Ages beyond Myst, Football Manager 2010 Demo)

wine-bugs at winehq.org wine-bugs at winehq.org
Wed Oct 15 13:42:57 CDT 2014


https://bugs.winehq.org/show_bug.cgi?id=19296

Anastasius Focht <focht at gmx.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
      Fixed by SHA1|                            |34b2d920b47122007b65d435e06
                   |                            |4d018fb37b21f
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #24 from Anastasius Focht <focht at gmx.net> ---
Hello folks,

indeed, this works now.

Thanks Sebastian

--- snip ---
$ WINEDEBUG=+tid,+seh,+loaddll,+virtual,+module wine ./remove.exe >>log.txt
2>&1
...
0009:trace:module:load_native_dll Trying native dll
L"Z:\\home\\focht\\Downloads\\remove.exe"
0009:trace:virtual:NtMapViewOfSection handle=0x1c process=0xffffffff addr=(nil)
off=000000000 size=0 access=20
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff (anonymous)
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x436fff c-rWx
0009:trace:module:map_image mapped PE file at 0x400000-0x437000
0009:trace:module:map_image mapping section .shrink0 at 0x401000 off 0 size 0
virt 2b000 flags c0000082
0009:trace:module:map_image mapping section .shrink1 at 0x42c000 off 6000 size
200 virt 1000 flags 40000042
0009:trace:module:map_image clearing 0x42c200 - 0x42d000
0009:trace:module:map_image mapping section .rdata at 0x42d000 off 1a800 size
200 virt 1a8 flags 40000040
0009:trace:module:map_image clearing 0x42d200 - 0x42e000
0009:trace:module:map_image mapping section .data at 0x42e000 off 600 size 1600
virt 26ec flags c0000040
0009:trace:module:map_image clearing 0x42f600 - 0x430000
0009:trace:module:map_image mapping section .idata at 0x431000 off 1c00 size
a00 virt 896 flags c0000040
0009:trace:module:map_image clearing 0x431a00 - 0x432000
0009:trace:module:map_image mapping section .load at 0x432000 off 2600 size
3200 virt 31ee flags 68040020
0009:trace:module:map_image clearing 0x435200 - 0x436000
0009:trace:module:map_image mapping section .reloc at 0x436000 off 5800 size
800 virt 6f6 flags 42000040
0009:trace:module:map_image clearing 0x436800 - 0x437000
0009:trace:virtual:VIRTUAL_SetProt 0x400000-0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff (anonymous)
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x401000 - 0x42bfff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x42c000 - 0x42ffff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x430000 - 0x430fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x431000 - 0x436fff c-rW-
0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x42bfff c-rW-
...
0009:warn:module:alloc_module disabling no-exec because of L"remove.exe"
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x110000-0x11ffff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x220000-0x220fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x230000-0x232fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x400000-0x400fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x401000-0x42bfff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x42c000-0x42dfff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x42e000-0x431fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x436000-0x436fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x7b810000-0x7b810fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x7b8be000-0x7ba63fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x7bc10000-0x7bc10fff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x7bcd1000-0x7bcedfff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x7ffd8000-0x7ffdbfff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x7ffdf000-0x7ffdffff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0x7ffe0000-0x7ffeffff
0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for
0xffbf0000-0xfffeffff
0009:trace:loaddll:load_native_dll Loaded
L"Z:\\home\\focht\\Downloads\\remove.exe" at 0x400000: native
...
0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x4320e3 ip=004320e3
tid=0009
0009:trace:seh:raise_exception  info[0]=00000001
0009:trace:seh:raise_exception  info[1]=0043207e
0009:trace:seh:raise_exception  eax=0043207e ebx=7b8be000 ecx=7b8be000
edx=0013f464 esi=00400000 edi=00000000
0009:trace:seh:raise_exception  ebp=0033fdb0 esp=0033fd88 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010216
0009:trace:seh:call_vectored_handlers calling handler at 0x7ed5f07b
code=c0000005 flags=0
0009:trace:seh:call_vectored_handlers handler at 0x7ed5f07b returned 0
0009:trace:seh:call_stack_handlers calling handler at 0x434b4c code=c0000005
flags=0
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x43207e 00000001 00000040
0009:trace:virtual:VIRTUAL_SetProt 0x432000-0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x401000 - 0x42bfff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x436000 - 0x436fff c-r--
0009:trace:seh:call_stack_handlers handler at 0x434b4c returned 0
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 0002b000 00000001
0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x42bfff c----
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x401000 - 0x42bfff c----
0009:trace:virtual:VIRTUAL_DumpView       0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x436000 - 0x436fff c-r-- 
...
0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x402ec6 ip=00402ec6
tid=0009
0009:trace:seh:raise_exception  info[0]=00000001
0009:trace:seh:raise_exception  info[1]=00429aac
0009:trace:seh:raise_exception  eax=00000001 ebx=7b8be000 ecx=00000002
edx=0033fcd6 esi=0033fcb4 edi=00000094
0009:trace:seh:raise_exception  ebp=0033fdc4 esp=0033fcb4 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010293
0009:trace:seh:call_vectored_handlers calling handler at 0x7ed5f07b
code=c0000005 flags=0
0009:trace:seh:call_vectored_handlers handler at 0x7ed5f07b returned 0
0009:trace:seh:call_stack_handlers calling handler at 0x407aa8 code=c0000005
flags=0
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x428000 00003494 00000004
0009:trace:virtual:VIRTUAL_SetProt 0x428000-0x42bfff c-rW-
0009:trace:virtual:mprotect_exec forcing exec permission on 0x428000-0x42bfff
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x401000 - 0x408fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x409000 - 0x421fff c----
0009:trace:virtual:VIRTUAL_DumpView       0x422000 - 0x426fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x427000 - 0x427fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x428000 - 0x42bfff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x436000 - 0x436fff c-r--
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x428000 00003494 00000004
0009:trace:virtual:VIRTUAL_SetProt 0x428000-0x42bfff c-rW-
0009:trace:virtual:mprotect_exec forcing exec permission on 0x428000-0x42bfff
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView       0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x401000 - 0x408fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x409000 - 0x421fff c----
0009:trace:virtual:VIRTUAL_DumpView       0x422000 - 0x426fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x427000 - 0x427fff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x428000 - 0x42bfff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView       0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView       0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView       0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView       0x436000 - 0x436fff c-r--
0009:trace:seh:call_stack_handlers handler at 0x407aa8 returned 0 
...
--- snip ---

The faults happening after guard page setup are intended, faults caused by
Wine's ATL thunk checks are no longer seen.

Regards

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list