https://bugs.winehq.org/show_bug.cgi?id=19296
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Fixed by SHA1| |34b2d920b47122007b65d435e06 | |4d018fb37b21f Status|NEW |RESOLVED Resolution|--- |FIXED
--- Comment #24 from Anastasius Focht focht@gmx.net --- Hello folks,
indeed, this works now.
Thanks Sebastian
--- snip --- $ WINEDEBUG=+tid,+seh,+loaddll,+virtual,+module wine ./remove.exe >>log.txt 2>&1 ... 0009:trace:module:load_native_dll Trying native dll L"Z:\home\focht\Downloads\remove.exe" 0009:trace:virtual:NtMapViewOfSection handle=0x1c process=0xffffffff addr=(nil) off=000000000 size=0 access=20 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff (anonymous) 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x436fff c-rWx 0009:trace:module:map_image mapped PE file at 0x400000-0x437000 0009:trace:module:map_image mapping section .shrink0 at 0x401000 off 0 size 0 virt 2b000 flags c0000082 0009:trace:module:map_image mapping section .shrink1 at 0x42c000 off 6000 size 200 virt 1000 flags 40000042 0009:trace:module:map_image clearing 0x42c200 - 0x42d000 0009:trace:module:map_image mapping section .rdata at 0x42d000 off 1a800 size 200 virt 1a8 flags 40000040 0009:trace:module:map_image clearing 0x42d200 - 0x42e000 0009:trace:module:map_image mapping section .data at 0x42e000 off 600 size 1600 virt 26ec flags c0000040 0009:trace:module:map_image clearing 0x42f600 - 0x430000 0009:trace:module:map_image mapping section .idata at 0x431000 off 1c00 size a00 virt 896 flags c0000040 0009:trace:module:map_image clearing 0x431a00 - 0x432000 0009:trace:module:map_image mapping section .load at 0x432000 off 2600 size 3200 virt 31ee flags 68040020 0009:trace:module:map_image clearing 0x435200 - 0x436000 0009:trace:module:map_image mapping section .reloc at 0x436000 off 5800 size 800 virt 6f6 flags 42000040 0009:trace:module:map_image clearing 0x436800 - 0x437000 0009:trace:virtual:VIRTUAL_SetProt 0x400000-0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff (anonymous) 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x42bfff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42ffff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x430000 - 0x430fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x431000 - 0x436fff c-rW- 0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x42bfff c-rW- ... 0009:warn:module:alloc_module disabling no-exec because of L"remove.exe" 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x110000-0x11ffff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x220000-0x220fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x230000-0x232fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x400000-0x400fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x401000-0x42bfff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x42c000-0x42dfff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x42e000-0x431fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x436000-0x436fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x7b810000-0x7b810fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x7b8be000-0x7ba63fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x7bc10000-0x7bc10fff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x7bcd1000-0x7bcedfff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x7ffd8000-0x7ffdbfff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x7ffdf000-0x7ffdffff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0x7ffe0000-0x7ffeffff 0009:trace:virtual:VIRTUAL_SetForceExec enabling exec prot for 0xffbf0000-0xfffeffff 0009:trace:loaddll:load_native_dll Loaded L"Z:\home\focht\Downloads\remove.exe" at 0x400000: native ... 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x4320e3 ip=004320e3 tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=0043207e 0009:trace:seh:raise_exception eax=0043207e ebx=7b8be000 ecx=7b8be000 edx=0013f464 esi=00400000 edi=00000000 0009:trace:seh:raise_exception ebp=0033fdb0 esp=0033fd88 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010216 0009:trace:seh:call_vectored_handlers calling handler at 0x7ed5f07b code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x7ed5f07b returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x434b4c code=c0000005 flags=0 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x43207e 00000001 00000040 0009:trace:virtual:VIRTUAL_SetProt 0x432000-0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x42bfff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- 0009:trace:seh:call_stack_handlers handler at 0x434b4c returned 0 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 0002b000 00000001 0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x42bfff c---- 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x42bfff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- ... 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x402ec6 ip=00402ec6 tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00429aac 0009:trace:seh:raise_exception eax=00000001 ebx=7b8be000 ecx=00000002 edx=0033fcd6 esi=0033fcb4 edi=00000094 0009:trace:seh:raise_exception ebp=0033fdc4 esp=0033fcb4 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010293 0009:trace:seh:call_vectored_handlers calling handler at 0x7ed5f07b code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x7ed5f07b returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x407aa8 code=c0000005 flags=0 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x428000 00003494 00000004 0009:trace:virtual:VIRTUAL_SetProt 0x428000-0x42bfff c-rW- 0009:trace:virtual:mprotect_exec forcing exec permission on 0x428000-0x42bfff 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x428000 00003494 00000004 0009:trace:virtual:VIRTUAL_SetProt 0x428000-0x42bfff c-rW- 0009:trace:virtual:mprotect_exec forcing exec permission on 0x428000-0x42bfff 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- 0009:trace:seh:call_stack_handlers handler at 0x407aa8 returned 0 ... --- snip ---
The faults happening after guard page setup are intended, faults caused by Wine's ATL thunk checks are no longer seen.
Regards