http://bugs.winehq.org/show_bug.cgi?id=18426
--- Comment #9 from Anastasius Focht focht@gmx.net 2010-02-17 14:25:21 --- Hello,
this also affects TecDoc 2010 DVD electronic spare parts catalogue.
--- snip --- ... wine: Unhandled page fault on read access to 0x012f0000 at address 0x680b2546 (thread 001d), starting debugger... Unhandled exception: page fault on read access to 0x012f0000 in 32-bit code (0x680b2546). ... 00000019 (D) C:\TECDOC_CD\1_2010\db\tbmux32.exe 0000001d 0 <== 0000001b 0 0000001a 0 ... Backtrace: =>0 0x680b2546 (0x012eddd4) 1 0x7bc79a64 NtCreateMutant+0xae(MutantHandle=0x12eded4, access=0x1f0001, attr=0x12edeb4, InitialOwner=0) [/opt/wine/wine-git/dlls/ntdll/sync.c:429] in ntdll (0x012ede94) 2 0x7b869dc8 CreateMutexExW+0xb2(sa=0x12ee16c, name="Global\TBSEM ( TECDOC_C ) = (Key=32769, Ind=0)", flags=0, access=0x1f0001) [/opt/wine/wine-git/dlls/kernel32/sync.c:653] in kernel32 (0x012edee4) 3 0x7b869d0c CreateMutexExA+0xb6(sa=0x12ee16c, name="Global\TBSEM ( TECDOC_C ) = (Key=32769, Ind=0)", flags=0, access=0x1f0001) [/opt/wine/wine-git/dlls/kernel32/sync.c:626] in kernel32 (0x012ee124) 4 0x7b869c08 CreateMutexA+0x3a(sa=0x12ee16c, owner=0, name="Global\TBSEM ( TECDOC_C ) = (Key=32769, Ind=0)") [/opt/wine/wine-git/dlls/kernel32/sync.c:599] in kernel32 (0x012ee144) 5 0x0041a2a3 in tbmux32 (+0x1a2a3) (0x682b0bfb) 6 0x458d28ec (0x83e58955) ... --- snip ---
--- snip --- ... 000f:Call KERNEL32.CreateProcessW(00000000,00118330 L"C:\TECDOC_CD\1_2010\db\tbmux32.exe",00000000,00000000,00000000,00000000,00000000,00000000,0033fd2c,0033fd70) ret=68331d67 ... 000f:trace:process:CreateProcessW starting L"C:\TECDOC_CD\1_2010\db\tbmux32.exe" as Win32 binary (0x400000-0x473000) ... 000f:trace:process:CreateProcessW started process pid 0019 tid 001a ... 001d:Call advapi32.InitializeSecurityDescriptor(012ee2bc,00000001) ret=00419b06 001d:Ret advapi32.InitializeSecurityDescriptor() retval=00000001 ret=00419b06 001d:Call advapi32.InitializeAcl(012ede8c,00000400,00000002) ret=00419b28 001d:trace:ntdll:RtlCreateAcl 0x12ede8c 0x00000400 0x00000002 001d:Ret advapi32.InitializeAcl() retval=00000001 ret=00419b28 001d:Call advapi32.InitializeSid(012eda8c,012eda84,00000001) ret=00419b47 001d:Ret advapi32.InitializeSid() retval=00000001 ret=00419b47 001d:Call advapi32.GetSidSubAuthority(012eda8c,00000000) ret=00419b60 001d:Ret advapi32.GetSidSubAuthority() retval=012eda94 ret=00419b60 001d:Call advapi32.AddAccessAllowedAce(012ede8c,00000002,10000000,012eda8c) ret=00419b7c 001d:trace:ntdll:RtlAddAccessAllowedAceEx (0x12ede8c,0x00000002,0x10000000,0x12eda8c) 001d:trace:ntdll:RtlValidAcl (0x12ede8c) 001d:trace:ntdll:RtlLengthSid sid=0x12eda8c 001d:trace:ntdll:RtlLengthSid sid=0x12eda8c 001d:Ret advapi32.AddAccessAllowedAce() retval=00000001 ret=00419b7c 001d:Call advapi32.SetSecurityDescriptorDacl(012ee2bc,00000001,012ede8c,00000000) ret=00419b9e 001d:Ret advapi32.SetSecurityDescriptorDacl() retval=00000001 ret=00419b9e 001d:Call KERNEL32.CreateMutexA(012ee2b0,00000000,012ee2d0 "Global\TBSEM ( TECDOC_C ) = (Key=808607544, Ind=0)") ret=0041a2a3 001d:trace:ntdll:RtlGetSaclSecurityDescriptor (0x12ee2bc,0x12ede70,0x12ede74,0x12ede6f) 001d:trace:ntdll:RtlGetDaclSecurityDescriptor (0x12ee2bc,0x12ede71,0x12ede78,0x12ede6f) 001d: create_mutex( access=001f0001, attributes=00000080, owned=0, objattr={rootdir=0018,sd={control=00000004,owner=<not present>,group=<not present>,sacl={},dacl={{AceType=unknown<156>,AceFlags=e2},{AceType=unknown<46>,AceFlags=1}},name=L"Global\TBSEM ( TECDOC_C ) = (Key=808607544, Ind=0)"} ) 001d: create_mutex() = INVALID_SECURITY_DESCR { handle=0000 } --- snip ---
Regards