[Wine] Re: rundll32.exe error

hotai wineforum-user at winehq.org
Thu Oct 14 15:12:21 CDT 2010


Also I don't know if this one helps or not, it's the output from the pylotro patcher window.


Code:
Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100).
Register dump:
 CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037
 EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202(  R- --  I   - - - )
 EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:00010080
 ESI:10004bb0 EDI:00000001
Stack dump:
0x0033fcc0:  00220620 00000000 7b818699 7b8440dc
0x0033fcd0:  00133f90 00110000 00000000 00133f88
0x0033fce0:  00000001 10040734 00000010 00000010
0x0033fcf0:  0033fd9c 7b9698a0 0033fd18 405a72ac
0x0033fd00:  10004bb0 00000001 0033fe28 10004bbb
0x0033fd10:  0033fe48 10004bbb 10040734 405a765b
0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw-
Backtrace:
=>0 0x4316d100 (0x0033fd08)
  1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
  2 0x405a7f0a (0x0033fea8)
  3 0x405a7e58 (0x0033fec8)
  4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
  5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
  6 0x7bc63e0c (0x0033ff48)
  7 0x7bc64fea (0x0033ffc8)
  8 0x7bc3d95e (0x0033ffe8)
0x4316d100: movl	0x0(%eax),%edx
Modules:
Module	Address			Debug info	Name (23 modules)
PE	  340000-  352000	Deferred        zlib1t
PE	10000000-100a3000	Export          patchclient
PE	405a0000-405a3000	Deferred        rundll32
PE	405b0000-405b4000	Deferred        version
PE	40710000-40714000	Deferred        gdi32
PE	42560000-42597000	Deferred        user32
PE	426b0000-426b4000	Deferred        advapi32
PE	42d80000-42d84000	Deferred        winex11
PE	42fb0000-42fb4000	Deferred        imm32
PE	43140000-43143000	Deferred        msvcr71
PE	43150000-43154000	Deferred        msvcrt
PE	431f0000-431f4000	Deferred        rpcrt4
PE	43280000-4328c000	Deferred        wininet
PE	432e0000-432e8000	Deferred        mpr
PE	43310000-43317000	Deferred        shlwapi
PE	43380000-434b8000	Deferred        shell32
PE	435a0000-435cb000	Deferred        comctl32
PE	436b0000-436b4000	Deferred        ws2_32
PE	436f0000-43752000	Deferred        winmm
PE	43790000-43794000	Deferred        uxtheme
PE	437c0000-437c4000	Deferred        ole32
PE	7b810000-7b8f9000	Export          kernel32
PE	7bc10000-7bc14000	Deferred        ntdll
Threads:
process  tid      prio (all id:s are in hex)
00000008 pylotro.exe
	0000001d    0
	0000001c    0
	00000009    0
0000000e services.exe
	00000016    0
	00000015    0
	00000014    0
	00000010    0
	0000000f    0
00000011 winedevice.exe
	00000018    0
	00000017    0
	00000013    0
	00000012    0
00000019 explorer.exe
	0000001a    0
0000001e (D) C:\windows\system32\rundll32.exe
	0000001f    0 <==
Backtrace:
=>0 0x4316d100 (0x0033fd08)
  1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
  2 0x405a7f0a (0x0033fea8)
  3 0x405a7e58 (0x0033fec8)
  4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
  5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
  6 0x7bc63e0c (0x0033ff48)
  7 0x7bc64fea (0x0033ffc8)
  8 0x7bc3d95e (0x0033ffe8)

Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100).
Register dump:
 CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037
 EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202(  R- --  I   - - - )
 EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:0002008a
 ESI:10004bb0 EDI:00000001
Stack dump:
0x0033fcc0:  00220620 00000000 7b818699 7b8440dc
0x0033fcd0:  00133f90 00110000 00000000 00133f88
0x0033fce0:  00000001 10040734 00000010 00000010
0x0033fcf0:  0033fd9c 7b9698a0 0033fd18 404a72ac
0x0033fd00:  10004bb0 00000001 0033fe28 10004bbb
0x0033fd10:  0033fe48 10004bbb 10040734 404a765b
0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw-
Backtrace:
=>0 0x4316d100 (0x0033fd08)
  1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
  2 0x404a7f0a (0x0033fea8)
  3 0x404a7e58 (0x0033fec8)
  4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
  5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
  6 0x7bc63e0c (0x0033ff48)
  7 0x7bc64fea (0x0033ffc8)
  8 0x7bc3d95e (0x0033ffe8)
0x4316d100: movl	0x0(%eax),%edx
Modules:
Module	Address			Debug info	Name (23 modules)
PE	  340000-  352000	Deferred        zlib1t
PE	10000000-100a3000	Export          patchclient
PE	404a0000-404a3000	Deferred        rundll32
PE	404b0000-404b4000	Deferred        version
PE	40710000-40714000	Deferred        gdi32
PE	42560000-42597000	Deferred        user32
PE	426b0000-426b4000	Deferred        advapi32
PE	42d80000-42d84000	Deferred        winex11
PE	42fb0000-42fb4000	Deferred        imm32
PE	43140000-43143000	Deferred        msvcr71
PE	43150000-43154000	Deferred        msvcrt
PE	431f0000-431f4000	Deferred        rpcrt4
PE	43280000-4328c000	Deferred        wininet
PE	432e0000-432e8000	Deferred        mpr
PE	43310000-43317000	Deferred        shlwapi
PE	43380000-434b8000	Deferred        shell32
PE	435a0000-435cb000	Deferred        comctl32
PE	436b0000-436b4000	Deferred        ws2_32
PE	436f0000-43752000	Deferred        winmm
PE	43790000-43794000	Deferred        uxtheme
PE	437c0000-437c4000	Deferred        ole32
PE	7b810000-7b8f9000	Export          kernel32
PE	7bc10000-7bc14000	Deferred        ntdll
Threads:
process  tid      prio (all id:s are in hex)
00000008 pylotro.exe
	0000001d    0
	0000001c    0
	00000009    0
0000000e services.exe
	00000016    0
	00000015    0
	00000014    0
	00000010    0
	0000000f    0
00000011 winedevice.exe
	00000018    0
	00000017    0
	00000013    0
	00000012    0
00000019 explorer.exe
	0000001a    0
00000022 (D) C:\windows\system32\rundll32.exe
	00000023    0 <==
Backtrace:
=>0 0x4316d100 (0x0033fd08)
  1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
  2 0x404a7f0a (0x0033fea8)
  3 0x404a7e58 (0x0033fec8)
  4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
  5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
  6 0x7bc63e0c (0x0033ff48)
  7 0x7bc64fea (0x0033ffc8)
  8 0x7bc3d95e (0x0033ffe8)

Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100).
Register dump:
 CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037
 EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202(  R- --  I   - - - )
 EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:00030088
 ESI:10004bb0 EDI:00000001
Stack dump:
0x0033fcc0:  00220620 00000000 7b818699 7b8440dc
0x0033fcd0:  00133f90 00110000 00000000 00133f88
0x0033fce0:  00000001 10040734 00000010 00000010
0x0033fcf0:  0033fd9c 7b9698a0 0033fd18 404a72ac
0x0033fd00:  10004bb0 00000001 0033fe28 10004bbb
0x0033fd10:  0033fe48 10004bbb 10040734 404a765b
0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw-
Backtrace:
=>0 0x4316d100 (0x0033fd08)
  1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
  2 0x404a7f0a (0x0033fea8)
  3 0x404a7e58 (0x0033fec8)
  4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
  5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
  6 0x7bc63e0c (0x0033ff48)
  7 0x7bc64fea (0x0033ffc8)
  8 0x7bc3d95e (0x0033ffe8)
0x4316d100: movl	0x0(%eax),%edx
Modules:
Module	Address			Debug info	Name (23 modules)
PE	  340000-  352000	Deferred        zlib1t
PE	10000000-100a3000	Export          patchclient
PE	404a0000-404a3000	Deferred        rundll32
PE	404b0000-404b4000	Deferred        version
PE	40710000-40714000	Deferred        gdi32
PE	42560000-42597000	Deferred        user32
PE	426b0000-426b4000	Deferred        advapi32
PE	42d80000-42d84000	Deferred        winex11
PE	42fb0000-42fb4000	Deferred        imm32
PE	43140000-43143000	Deferred        msvcr71
PE	43150000-43154000	Deferred        msvcrt
PE	431f0000-431f4000	Deferred        rpcrt4
PE	43280000-4328c000	Deferred        wininet
PE	432e0000-432e8000	Deferred        mpr
PE	43310000-43317000	Deferred        shlwapi
PE	43380000-434b8000	Deferred        shell32
PE	435a0000-435cb000	Deferred        comctl32
PE	436b0000-436b4000	Deferred        ws2_32
PE	436f0000-43752000	Deferred        winmm
PE	43790000-43794000	Deferred        uxtheme
PE	437c0000-437c4000	Deferred        ole32
PE	7b810000-7b8f9000	Export          kernel32
PE	7bc10000-7bc14000	Deferred        ntdll
Threads:
process  tid      prio (all id:s are in hex)
00000008 pylotro.exe
	0000001d    0
	0000001c    0
	00000009    0
0000000e services.exe
	00000016    0
	00000015    0
	00000014    0
	00000010    0
	0000000f    0
00000011 winedevice.exe
	00000018    0
	00000017    0
	00000013    0
	00000012    0
00000019 explorer.exe
	0000001a    0
00000026 (D) C:\windows\system32\rundll32.exe
	00000027    0 <==
Backtrace:
=>0 0x4316d100 (0x0033fd08)
  1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
  2 0x404a7f0a (0x0033fea8)
  3 0x404a7e58 (0x0033fec8)
  4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
  5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
  6 0x7bc63e0c (0x0033ff48)
  7 0x7bc64fea (0x0033ffc8)
  8 0x7bc3d95e (0x0033ffe8)

*** Finished ***









More information about the wine-users mailing list