[Bug 37487] Multiple applications need ntdll.NtOpenFile to support opening files through NT device paths '\\SystemRoot\\' (Quicken 2014, Tencent QQProtect Application 'QQProtect.sys', SmartGaga)

WineHQ Bugzilla wine-bugs at winehq.org
Fri Feb 12 05:29:48 CST 2021


https://bugs.winehq.org/show_bug.cgi?id=37487

Anastasius Focht <focht at gmx.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                URL|http://www.chip.de/download |https://web.archive.org/web
                   |s/Quicken-2014-Vollversion_ |/20210212084041/https://dlg
                   |68671713.html               |bit.winfuture.de/djQ7tSh5Sd
                   |                            |rBWqwLnqKALg/1613162398/317
                   |                            |2/software/Quicken/Quicken_
                   |                            |2014tb.exe

--- Comment #5 from Anastasius Focht <focht at gmx.net> ---
Hello folks,

revisiting, still present.

Quicken 2014 installer prerequisites:

* 'winetricks -q msxml3'
* 'winetricks -q dotnet40' (optional, for later bugs)

Trace log:

--- snip ---
$ pwd
/home/focht/.wine/drive_c/Program Files (x86)/Lexware/Quicken/2014

$ WINEDEBUG=+seh,+relay,+ntdll wine ./QwStart.exe >>log.txt 2>&1
...
0100:Call ntdll.RtlInitUnicodeString(0031ef8c,006cee98
L"\\SystemRoot\\SysWOW64\\ntdll.dll") ret=006cbb29
0100:Ret  ntdll.RtlInitUnicodeString() retval=0000003e ret=006cbb29
0100:Call
ntdll.NtOpenFile(0031efa4,80100000,0031ef6c,0031ef84,00000005,00000000)
ret=006cbb60
0100:Ret  ntdll.NtOpenFile() retval=c000003a ret=006cbb60
--- snip ---

The failure is not critical though, it tries more native NT path variants
later.

--- snip ---
...
0100:Call KERNEL32.GetModuleHandleW(006ce2e8 L"ntdll.dll") ret=006c1bb9
0100:Call ntdll.RtlInitUnicodeString(0031f66c,006ce2e8 L"ntdll.dll")
ret=7b01b8c4
0100:Ret  ntdll.RtlInitUnicodeString() retval=00000014 ret=7b01b8c4
0100:Call ntdll.LdrGetDllHandle(00000000,00000000,0031f66c,0031f668)
ret=7b01b8d2
0100:Ret  ntdll.LdrGetDllHandle() retval=00000000 ret=7b01b8d2
0100:Ret  KERNEL32.GetModuleHandleW() retval=7bc00000 ret=006c1bb9
0100:Call KERNEL32.GetModuleHandleW(006ce2fc L"kernel32.dll") ret=006c1bcd
0100:Call ntdll.RtlInitUnicodeString(0031f66c,006ce2fc L"kernel32.dll")
ret=7b01b8c4
0100:Ret  ntdll.RtlInitUnicodeString() retval=0000001a ret=7b01b8c4
0100:Call ntdll.LdrGetDllHandle(00000000,00000000,0031f66c,0031f668)
ret=7b01b8d2
0100:Ret  ntdll.LdrGetDllHandle() retval=00000000 ret=7b01b8d2
0100:Ret  KERNEL32.GetModuleHandleW() retval=7b600000 ret=006c1bcd
0100:Call KERNEL32.GetModuleHandleW(006ce318 L"user32.dll") ret=006c1be1
0100:Call ntdll.RtlInitUnicodeString(0031f66c,006ce318 L"user32.dll")
ret=7b01b8c4
0100:Ret  ntdll.RtlInitUnicodeString() retval=00000016 ret=7b01b8c4
0100:Call ntdll.LdrGetDllHandle(00000000,00000000,0031f66c,0031f668)
ret=7b01b8d2
0100:Ret  ntdll.LdrGetDllHandle() retval=00000000 ret=7b01b8d2
0100:Ret  KERNEL32.GetModuleHandleW() retval=10000000 ret=006c1be1
0100:Call
ntdll.NtQueryVirtualMemory(ffffffff,7bc00000,00000002,0031f5fc,00000008,0031f604)
ret=006cbdf3
0100:Ret  ntdll.NtQueryVirtualMemory() retval=80000005 ret=006cbdf3
0100:Call
ntdll.NtQueryVirtualMemory(ffffffff,7bc00000,00000002,0031f5fc,00000008,0031f604)
ret=006cbdf3
0100:Ret  ntdll.NtQueryVirtualMemory() retval=80000005 ret=006cbdf3
0100:Call ntdll.memset(01400920,00000000,0000004c) ret=006cbe5d
0100:Ret  ntdll.memset() retval=01400920 ret=006cbe5d
0100:Call
ntdll.NtQueryVirtualMemory(ffffffff,7bc00000,00000002,01400920,0000004c,0031f604)
ret=006cbe70
0100:Ret  ntdll.NtQueryVirtualMemory() retval=00000000 ret=006cbe70
0100:Call ntdll.RtlInitUnicodeString(0031f660,014008b0
L"\\??\\C:\\windows\\system32\\ntdll.dll") ret=006c5669
0100:Ret  ntdll.RtlInitUnicodeString() retval=00000044 ret=006c5669
0100:Call
ntdll.NtCreateFile(0031f650,80100000,0031f670,0031f668,00000000,00000000,00000005,00000001,00000060,00000000,00000000)
ret=006c56b1
0100:Ret  ntdll.NtCreateFile() retval=00000000 ret=006c56b1
--- snip ---

It then runs into bug 37488

--- snip ---
0100:Call
ntdll.NtCreateSection(0031f654,000f0005,00000000,00000000,00000008,08000000,000000a4)
ret=006c56d2
0100:Ret  ntdll.NtCreateSection() retval=00000000 ret=006c56d2
0100:Call ntdll.NtClose(000000a4) ret=006c56e0
0100:Ret  ntdll.NtClose() retval=00000000 ret=006c56e0
0100:Call
ntdll.NtMapViewOfSection(000000a8,ffffffff,0031f64c,00000000,00000000,00000000,0031f658,00000002,00000000,00000008)
ret=006c570a
0100:Ret  ntdll.NtMapViewOfSection() retval=00000000 ret=006c570a
0100:Call ntdll.NtClose(000000a8) ret=006c5712
0100:Ret  ntdll.NtClose() retval=00000000 ret=006c5712
0100:Call ntdll.NtAreMappedFilesTheSame(7bc00000,01420000) ret=006c5723
0100:Ret  ntdll.NtAreMappedFilesTheSame() retval=c00000d4 ret=006c5723
0100:Call ntdll.NtUnmapViewOfSection(ffffffff,01420000) ret=006c5733
0100:Ret  ntdll.NtUnmapViewOfSection() retval=00000000 ret=006c5733
0100:trace:seh:dispatch_exception code=c0000005 flags=0 addr=006C6CC6
ip=006c6cc6 tid=0100
0100:trace:seh:dispatch_exception  info[0]=00000000
0100:trace:seh:dispatch_exception  info[1]=01420000
0100:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception
(code=c0000005) raised
0100:trace:seh:dispatch_exception  eax=00000000 ebx=00000007 ecx=01420000
edx=00005a4d esi=00000000 edi=7bc00000 
--- snip ---

Stable download links via Internet Archive:

Quicken 2014 Deluxe:

https://web.archive.org/web/20210212084041/https://dlgbit.winfuture.de/djQ7tSh5SdrBWqwLnqKALg/1613162398/3172/software/Quicken/Quicken_2014tb.exe

Quicken 2015 free:

https://web.archive.org/web/20210212083345/https://securedl.cdn.chip.de/downloads/25033498/Quicken2015Free.exe?cid=68671712&platform=chip&1613118496-1613125996-17a5be-B-a2ce8eb43eb9b7c81ffd6b32e9b647d6.exe=

SmartGaga 1.1.646.1:

https://web.archive.org/web/20210212083145/https://dl.filehorse.com/win/desktop-enhancements/smartgaga/SmartGaGa-1.1.646.1.exe?st=UXb-Ylz8he_QMz7inrvzTA&e=1613205052&fn=Setup_AndroidFs442_1.1.646.1.exe

$ sha1sum Quicken_2014tb.exe 
d2374d907e2ee568f1f93dba48afd602723dcad6f  Quicken_2014tb.exe

$ du -sh Quicken_2014tb.exe 
319M    Quicken_2014tb.exe

$ wine --version
wine-6.1-315-gb922b5aeef1

Regards

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.


More information about the wine-bugs mailing list