http://bugs.winehq.org/show_bug.cgi?id=4264
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Keywords| |Installer CC| |focht@gmx.net
--- Comment #12 from Anastasius Focht focht@gmx.net 2011-05-14 16:33:09 CDT --- Hello,
confirming, still present. You can just run the "syscheck.exe" tool which gets temporarily extracted from installer to verify.
+tid,+seh,+relay:
--- snip --- 0023:Call advapi32.RegOpenKeyExA(80000002,00413598 "Software\Classes",00000000,00020006,0033fb24) ret=00401a92 0023:Ret advapi32.RegOpenKeyExA() retval=00000000 ret=00401a92 0023:Call KERNEL32.GetProcAddress(682d0000,00416458 "GetSecurityInfo") ret=0040581a 0023:Ret KERNEL32.GetProcAddress() retval=682e0980 ret=0040581a 0023:Call advapi32.GetSecurityInfo(0000003c,00000004,00000007,00000000,00000000,00000000,00000000,0033fb10) ret=004036f4 0023:Ret advapi32.GetSecurityInfo() retval=00000000 ret=004036f4 0023:Call KERNEL32.GetProcAddress(682d0000,0041637e "GetSecurityDescriptorLength") ret=0040581a 0023:Ret KERNEL32.GetProcAddress() retval=682e0938 ret=0040581a 0023:Call advapi32.GetSecurityDescriptorLength(00147e38) ret=00401bf0 0023:Ret advapi32.GetSecurityDescriptorLength() retval=00000014 ret=00401bf0 0023:Call ntdll.RtlAllocateHeap(0042a000,00000000,00000014) ret=00405e64 0023:Ret ntdll.RtlAllocateHeap() retval=0042b3f0 ret=00405e64 0023:Call KERNEL32.GetProcAddress(682d0000,004162d4 "GetSecurityDescriptorControl") ret=0040581a 0023:Ret KERNEL32.GetProcAddress() retval=682e08f0 ret=0040581a 0023:Call advapi32.GetSecurityDescriptorControl(00147e38,0033fa90,0033fa8c) ret=00401c1d 0023:Ret advapi32.GetSecurityDescriptorControl() retval=00000001 ret=00401c1d 0023:Call KERNEL32.LocalFree(00147e38) ret=00403753 0023:Ret KERNEL32.LocalFree() retval=00000000 ret=00403753 0023:Call KERNEL32.GetProcAddress(682d0000,00416310 "GetSecurityDescriptorDacl") ret=0040581a 0023:Ret KERNEL32.GetProcAddress() retval=682e0908 ret=0040581a 0023:Call advapi32.GetSecurityDescriptorDacl(0042b3f0,0033fb20,0033fb24,0033fb1c) ret=0040359f 0023:Ret advapi32.GetSecurityDescriptorDacl() retval=00000001 ret=0040359f 0023:Call advapi32.GetSecurityDescriptorControl(0042b3f0,0033fb28,0033fb10) ret=00401b15 0023:Ret advapi32.GetSecurityDescriptorControl() retval=00000001 ret=00401b15 0023:Call ntdll.RtlFreeHeap(0042a000,00000000,0042b3f0) ret=00405f1b 0023:Ret ntdll.RtlFreeHeap() retval=00000001 ret=00405f1b 0023:Call advapi32.RegCloseKey(0000003c) ret=00401a6d 0023:Ret advapi32.RegCloseKey() retval=00000000 ret=00401a6d --- snip ---
+server:
--- snip --- 0023: open_key( parent=002c, access=00020006, attributes=00000000, name=L"Software\Classes" ) 0023: open_key() = 0 { hkey=003c } 0023: get_security_object( handle=003c, security_info=00000007 ) 0023: get_security_object() = 0 { sd_len=00000000, sd={} } 0023: get_security_object( handle=003c, security_info=00000007 ) 0023: get_security_object() = 0 { sd_len=00000000, sd={} } 0023: close_handle( handle=003c ) 0023: close_handle() = 0 --- snip ---
The tool seems to contain some bypass, allowing to continue even with registry permission check failed. Create the following key:
$ wine reg add "HKLM\Software\eAcceleration" /v bypass_reg_check /t REG_DWORD /d 1
before running the installer.
$ sha1sum eacceleration_install.exe 9d5d5bbe317ff30fa90a7a2165d2dc24c77bd725 eacceleration_install.exe
$ wine --version wine-1.3.20
Regards