[Bug 47145] Esportal client 1.0 (CS:GO anti-cheat) fails to start, reporting ' The procedure entry point K32GetWsChangesEx could not be located in the dynamic link library KERNEL32.dll '

wine-bugs at winehq.org wine-bugs at winehq.org
Fri May 10 02:15:22 CDT 2019


https://bugs.winehq.org/show_bug.cgi?id=47145

Anastasius Focht <focht at gmx.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
      Fixed by SHA1|                            |fb4116ee02cb4e8f31a2f4de7bd
                   |                            |3b6ebfdfc7a2d
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #2 from Anastasius Focht <focht at gmx.net> ---
Hello folks,

this is fixed by commit
https://source.winehq.org/git/wine.git/commitdiff/fb4116ee02cb4e8f31a2f4de7bd3b6ebfdfc7a2d
("kernel32: Add K32GetWsChangesEx stub")

Thanks Louis

The next problem is already covered by existing issues. The protection scheme
directly loads Wine placeholder/fake dlls and traverses the PE
structure/directories on its own.

--- snip ---
$ WINEDEBUG=+seh,+relay,+ntdll wine ./esportal-client.exe >>log.txt 2>&1
...
002c:Call KERNEL32.GetSystemDirectoryW(0024ee70,00000104) ret=140f9bca3
002c:Ret  KERNEL32.GetSystemDirectoryW() retval=00000013 ret=140f9bca3
002c:Call KERNEL32.GetLastError() ret=1403b5644
002c:Ret  KERNEL32.GetLastError() retval=00000000 ret=1403b5644
002c:Call KERNEL32.CreateFileW(0024f080
L"C:\\windows\\system32\\ntdll.dll",80000000,00000005,00000000,00000003,100000080,00000000)
ret=140f9bcb9
002c:trace:ntdll:FILE_CreateFile handle=0x24eae8 access=80100080
name=L"\\??\\C:\\windows\\system32\\ntdll.dll" objattr=00000040 root=(nil)
sec=(nil) io=0x24eb00 alloc_size=(nil) attr=00000080 sharing=00000005 disp=1
options=00000060 ea=(nil).0x00000000
002c:Ret  KERNEL32.CreateFileW() retval=00000074 ret=140f9bcb9
002c:Call KERNEL32.GetFileSize(00000074,00000000) ret=140f9bccc
002c:trace:ntdll:NtQueryInformationFile
(0x74,0x24ecd0,0x24ece0,0x00000018,0x00000005)
002c:Ret  KERNEL32.GetFileSize() retval=000009ac ret=140f9bccc
002c:Call
KERNEL32.CreateFileMappingW(00000074,00000000,00000002,00000000,00000000,00000000)
ret=140f9bcd7
002c:Ret  KERNEL32.CreateFileMappingW() retval=00000078 ret=140f9bcd7
002c:Call KERNEL32.MapViewOfFile(00000078,00000004,00000000,00000000,00000000)
ret=140f9bcea
002c:Ret  KERNEL32.MapViewOfFile() retval=006a0000 ret=140f9bcea
002c:trace:seh:NtRaiseException code=c0000005 flags=0 addr=0x14089eef4
ip=14089eef4 tid=002c
002c:trace:seh:NtRaiseException  info[0]=0000000000000000
002c:trace:seh:NtRaiseException  info[1]=00000000006b6934
002c:trace:seh:NtRaiseException  rax=00000000006b6934 rbx=000000000024ed00
rcx=00000001406fcd02 rdx=00000000006a0000
002c:trace:seh:NtRaiseException  rsi=000000000024edd4 rdi=0000000000000090
rbp=000000014089eee8 rsp=000000000024ebc0
002c:trace:seh:NtRaiseException   r8=9856141f3472f13f  r9=00000000000a4602
r10=0000000140ce0f97 r11=00000000000966fb
002c:trace:seh:NtRaiseException  r12=0000000000000202 r13=6600000000f972df
r14=fffffffffffc9c43 r15=0000000140ce11c4
002c:trace:seh:RtlVirtualUnwind type 1 rip 14089eef4 rsp 24ebc0
002c:trace:seh:dump_unwind_info **** func 7a15bf-95c9c7
002c:trace:seh:dump_unwind_info unwind info at 0x1407eceb4 flags 1 prolog 0x0
bytes function 0x1407a15bf-0x14095c9c7
002c:trace:seh:dump_unwind_info     0x5: subq $0xd0,%rsp
002c:trace:seh:dump_unwind_info     0x4: pushq %rbp
002c:trace:seh:dump_unwind_info     0x3: pushq %rsi
002c:trace:seh:dump_unwind_info     0x2: pushq %rdi
002c:trace:seh:dump_unwind_info     0x1: pushq %rbx
002c:trace:seh:dump_unwind_info     handler 0x14079c5a5 data at 0x1407ecec8
002c:trace:seh:call_handler calling handler 0x14079c5a5 (rec=0x24ea80,
frame=0x24ebc0 context=0x24df50, dispatch=0x24dcf0)
002c:warn:seh:setup_exception exception outside of stack limits in thread 002c
eip 0000000140d5c789 esp fffffffffffffe80 stack 0x152000-0x250000 
...
--- snip ---

* bug 4666 ("Many games bundled with HackShield anti-cheat system abort on
startup with Hackshield error 108 (copy of system dlls, native vs. Wine
placeholder)")

* bug 15437 ("Multiple programs using madCodeHook crash (in-memory PE image of
Wine builtins vs. ELF image on disk)") -> 'kernel32.dll' etc.

* bug 45377 ("StreetFighter V Arcade Edition (Steam) custom protection scheme
fails to validate in-memory 'ntdll.dll' PE header against on-disk fake-dll") ->
'ntdll.dll' etc.

Alexandre is still working on that part.

https://www.winehq.org/pipermail/wine-devel/2019-April/144818.html

$ wine --version
wine-4.7-305-g9bcaf9769c

Regards

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list