http://bugs.winehq.org/show_bug.cgi?id=31279
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |focht@gmx.net
--- Comment #4 from Anastasius Focht focht@gmx.net 2012-07-22 08:51:50 CDT --- Hello,
SafeDisc bugs with no version should be avoided. Please run the 'ProtectionID' tool (http://pid.gamecopyworld.com/) to determine the exact SafeDisc version and paste the output of the tool. Example output in bug report: http://bugs.winehq.org/show_bug.cgi?id=27417
I see you already added a custom trace message to logs.
Good one:
--- snip --- 002c:trace:ntoskrnl:process_ioctl ioctl ef002407 device 0x11ad80 in_size 1300 out_size 1552 002c:Call ntdll.NtGetTickCount() ret=404a0e26 002c:Ret ntdll.NtGetTickCount() retval=00002256 ret=404a0e26 002c:Call driver dispatch 0x546328 (device=0x11ad80,irp=0x53f14c) 002c:trace:seh:raise_exception code=c0000005 flags=0 addr=0x54287f ip=0054287f tid=002c 002c:trace:seh:raise_exception info[0]=00000000 002c:trace:seh:raise_exception info[1]=00821008 002c:trace:seh:raise_exception eax=00821008 ebx=404a1f6c ecx=00000000 edx=0053f14c esi=00000000 edi=0011ad80 002c:trace:seh:raise_exception ebp=0053efec esp=0053efac cs=0017 ds=001f es=001f fs=1017 gs=0037 flags=00010202 002c:trace:seh:call_vectored_handlers calling handler at 0x4049db30 code=c0000005 flags=0 002c:trace:seh:call_vectored_handlers handler at 0x4049db30 returned ffffffff 002c:trace:seh:raise_exception code=c0000005 flags=0 addr=0x542884 ip=00542884 tid=002c 002c:trace:seh:raise_exception info[0]=00000000 002c:trace:seh:raise_exception info[1]=00821018 002c:trace:seh:raise_exception eax=00821018 ebx=00000100 ecx=00000000 edx=0053f14c esi=00000000 edi=0011ad80 002c:trace:seh:raise_exception ebp=0053efec esp=0053efac cs=0017 ds=001f es=001f fs=1017 gs=0037 flags=00010206 002c:trace:seh:call_vectored_handlers calling handler at 0x4049db30 code=c0000005 flags=0 002c:trace:seh:call_vectored_handlers handler at 0x4049db30 returned ffffffff 002c:trace:ntoskrnl:__regs_IofCompleteRequest 0x53f14c 0 002c:trace:ntoskrnl:IoCompleteRequest 0x53f14c 0 002c:Ret driver dispatch 0x546328 (device=0x11ad80,irp=0x53f14c) retval=00000000 --- snip ---
Bad one:
--- snip --- 002c:trace:ntoskrnl:process_ioctl ioctl ef002407 device 0x11ad80 in_size 1300 out_size 1552 002c:Call ntdll.NtGetTickCount() ret=404a0e26 002c:Ret ntdll.NtGetTickCount() retval=00002257 ret=404a0e26 002c:Call driver dispatch 0x546328 (device=0x11ad80,irp=0x53f14c) 002c:trace:seh:raise_exception code=c0000005 flags=0 addr=0x54287f ip=0054287f tid=002c 002c:trace:seh:raise_exception info[0]=00000000 002c:trace:seh:raise_exception info[1]=00821008 002c:trace:seh:raise_exception eax=00821008 ebx=404a1f6c ecx=00000000 edx=0053f14c esi=00000000 edi=0011ad80 002c:trace:seh:raise_exception ebp=0053efec esp=0053efac cs=0017 ds=001f es=001f fs=1017 gs=0037 flags=00010202 002c:trace:seh:call_vectored_handlers calling handler at 0x4049db30 code=c0000005 flags=0 002c:err:int:emulate_instruction cannot emulate instruction at 0x54287f: 8b 002c:trace:seh:call_vectored_handlers handler at 0x4049db30 returned 0 002c:trace:seh:call_stack_handlers calling handler at 0x7bc7c450 code=c0000005 flags=0 002c:Call KERNEL32.UnhandledExceptionFilter(0053e548) ret=7bc7c485 wine: Unhandled page fault on read access to 0x00821008 at address 0x54287f (thread 002c), starting debugger... 002c:trace:seh:start_debugger Starting debugger "winedbg --auto 38 84" --- snip ---
Dumping the first 3 opcode bytes using TRACE() in emulate_instruction would certainly help. Please add a trace doing that before the switch:
http://source.winehq.org/git/wine.git/blob/57e4e608dcd73b36f1084e0cfcb7cf092...
Create another +tid,+relay,+seh,+services,+winedevice,+ntoskrnl trace log with patch applied and attach it with correct mime type set.
Regards