https://bugs.winehq.org/show_bug.cgi?id=55710
Dmitry Timoshkov dmitry@baikal.ru changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |pgofman@codeweavers.com
--- Comment #18 from Dmitry Timoshkov dmitry@baikal.ru --- According to the regression testing this bug is caused by
https://github.com/wine-staging/wine-staging/blob/master/patches/ntdll-Sysca...
Author: Paul Gofman pgofman@codeweavers.com Date: Tue Jul 14 15:00:34 2020 +0300
ntdll: Support x86_64 syscall emulation.
Reverting this patch makes wine-staging able to run 64-bit applications.
Running with WINEDEBUG=+seh shows:
002c:trace:seh:install_bpf Installing seccomp filters. 002c:trace:seh:check_bpf_jit_enable enabled 0x31. 002c:fixme:winediag:LdrInitializeThunk wine-staging 8.17 is a testing version containing experimental patches. 002c:fixme:winediag:LdrInitializeThunk Please mention your exact version when filing bug reports on winehq.org. 002c:trace:seh:sigsys_handler SIGSYS, rax 0x101, rip 0x32d9a1b56d. 002c:trace:seh:sigsys_handler SIGSYS, rax 0, rip 0x32d9a1b634. 002c:fixme:sync:NtAcceptConnectPort ((nil),832,0x90000002,31,0x7ffffe0ff338,0x7d7d01f6b000),stub! 002c:trace:seh:sigsys_handler SIGSYS, rax 0x3, rip 0x32d9a1b737. 002c:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7f55bef10eff ip=7f55bef10eff tid=002c 002c:trace:seh:handle_syscall_fault info[0]=0000000000000001 002c:trace:seh:handle_syscall_fault info[1]=0000000000000000 002c:trace:seh:handle_syscall_fault rax=00000000c000000d rbx=0000000000000001 rcx=0000000000000000 rdx=0000000000000000 002c:trace:seh:handle_syscall_fault rsi=000000007f07f900 rdi=0000000000000001 rbp=000000007f07f900 rsp=00007ffffe0ffa98 002c:trace:seh:handle_syscall_fault r8=0000000000000000 r9=00007ffffe0ff31f r10=00007f55bef4f640 r11=00000000fe0ff200 002c:trace:seh:handle_syscall_fault r12=0000000000000000 r13=0000000000000000 r14=0000000000000003 r15=0000000000000000 002c:trace:seh:handle_syscall_fault returning to user mode ip=00000032d9a1b737 ret=c0000005 *** stack smashing detected ***: <unknown> terminated
Paul, does that ring any bells? What kind of information would be helpful to investigate this further?