https://bugs.winehq.org/show_bug.cgi?id=49086
Bug ID: 49086 Summary: Blindwrite 7.0 'ezplay.sys' crashes in driver entry point Product: Wine Version: 5.7 Hardware: x86-64 OS: Linux Status: NEW Severity: normal Priority: P2 Component: ntoskrnl Assignee: wine-bugs@winehq.org Reporter: focht@gmx.net Distribution: ---
Hello folks,
to track this patch from Zeb:
https://www.winehq.org/pipermail/wine-devel/2020-May/165678.html
Download:
https://web.archive.org/web/20131210151026/http://download2.vso-software.fr/...
--- snip --- $ WINEDEBUG=+seh,+relay,+ntoskrnl,+module,+virtual wineboot >> log.txt 2>&1 ... 00b8:trace:ntoskrnl:load_driver loading driver L"C:\windows\System32\Drivers\ezplay.sys" 00b8:Call KERNEL32.LoadLibraryW(007fe230 L"C:\windows\System32\Drivers\ezplay.sys") ret=00236878 ... 00b8:trace:virtual:map_view got mem in reserved area 0xe10000-0xe2d000 00b8:trace:module:map_image mapped PE file at 0xe10000-0xe2d000 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe2cfff c-rWx ... 00b8:warn:module:alloc_module disabling no-exec because of L"ezplay.sys" ... 00b8:trace:module:load_dll Found L"C:\windows\system32\ntoskrnl.exe" for L"NTOSKRNL.exe" at 0x220000, count=-1 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe19b98 00000170 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe19fff c-rW- 00b8:trace:virtual:VIRTUAL_DumpView 0xe1a000 - 0xe2cfff c-rWx 00b8:trace:virtual:NtAllocateVirtualMemory 0xffffffffffffffff (nil) 00010000 1000 00000040 00b8:trace:virtual:map_view got mem in reserved area 0xe30000-0xe40000 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe30000 - 0xe3ffff (valloc) 00b8:trace:virtual:VIRTUAL_DumpView 0xe30000 - 0xe3ffff c-rwx 00b8:warn:module:import_dll No implementation for NTOSKRNL.exe.RtlCopyMemoryNonTemporal imported from L"C:\windows\System32\Drivers\ezplay.sys", setting to 0xe30000 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe19000 00001000 00000080 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe2cfff c-rWx ... 00b8:Ret KERNEL32.LoadLibraryW() retval=00e10000 ret=00236878 00b8:Call ntdll.RtlImageNtHeader(00e10000) ret=0023688d 00b8:Ret ntdll.RtlImageNtHeader() retval=00e100e0 ret=0023688d 00b8:Call ntdll.NtQuerySystemInformation(00000000,00cef680,00000040,00000000) ret=002368b0 00b8:Ret ntdll.NtQuerySystemInformation() retval=00000000 ret=002368b0 00b8:Call ntdll.RtlImageNtHeader(00e10000) ret=002368d2 00b8:Ret ntdll.RtlImageNtHeader() retval=00e100e0 ret=002368d2 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6c0) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe10380 00009800 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe19fff c-rW- 00b8:trace:virtual:VIRTUAL_DumpView 0xe1a000 - 0xe2cfff c-rWx 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6c4) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe19b80 0000b100 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe24fff c-rW- 00b8:trace:virtual:VIRTUAL_DumpView 0xe25000 - 0xe2cfff c-rWx 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6c8) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe24c80 00003680 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe28fff c-rW- 00b8:trace:virtual:VIRTUAL_DumpView 0xe29000 - 0xe2cfff c-rWx 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6cc) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe28300 00000b80 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe28fff c-rW- 00b8:trace:virtual:VIRTUAL_DumpView 0xe29000 - 0xe2cfff c-rWx 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6d0) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe28e80 00003300 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6d4) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe2c180 00000700 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6d8) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe2c880 00000400 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000004,00cef6dc) ret=00236983 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe2cc80 00000200 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236983 00b8:trace:ntoskrnl:perform_relocations relocating from 0000000000010000-000000000002CE80 to 0000000000E10000-0000000000E2CE80 00b8:Call ntdll.LdrProcessRelocationBlock(00e1a000,10000000a,00e2cc88,00e00000) ret=00236a44 00b8:Ret ntdll.LdrProcessRelocationBlock() retval=00e2cc9c ret=00236a44 00b8:Call ntdll.LdrProcessRelocationBlock(00e24000,100000002,00e2cca4,00e00000) ret=00236a44 00b8:Ret ntdll.LdrProcessRelocationBlock() retval=00e2cca8 ret=00236a44 00b8:Call ntdll.LdrProcessRelocationBlock(00e25000,100000010,00e2ccb0,00e00000) ret=00236a44 00b8:Ret ntdll.LdrProcessRelocationBlock() retval=00e2ccd0 ret=00236a44 00b8:Call ntdll.LdrProcessRelocationBlock(00e27000,100000018,00e2ccd8,00e00000) ret=00236a44 00b8:Ret ntdll.LdrProcessRelocationBlock() retval=00e2cd08 ret=00236a44 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000080,00cef6c0) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe10380 00009800 00000080 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe19fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe1a000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000008,00cef6c4) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe19b80 0000b100 00000008 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000008,00cef6c8) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe24c80 00003680 00000008 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000008,00cef6cc) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe28300 00000b80 00000008 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000008,00cef6d0) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe28e80 00003300 00000008 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000008,00cef6d4) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe2c180 00000700 00000008 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000008,00cef6d8) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe2c880 00000400 00000008 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef660,00cef668,00000008,00cef6dc) ret=00236b1d 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe2cc80 00000200 00000008 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=00236b1d 00b8:Call KERNEL32.VirtualProtect(00e100e0,00000108,00000004,00cef668) ret=00236b56 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef590,00cef588,00000004,00cef668) ret=7b028568 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe100e0 00000108 00000004 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe10fff c-rW- 00b8:trace:virtual:VIRTUAL_DumpView 0xe11000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b028568 00b8:Ret KERNEL32.VirtualProtect() retval=00000001 ret=00236b56 00b8:Call KERNEL32.VirtualProtect(00e100e0,00000108,00000080,00cef668) ret=00236b75 00b8:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,00cef590,00cef588,00000080,00cef668) ret=7b028568 00b8:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0xe100e0 00000108 00000080 00b8:trace:virtual:VIRTUAL_DumpView View: 0xe10000 - 0xe2cfff (image) 00b8:trace:virtual:VIRTUAL_DumpView 0xe10000 - 0xe18fff c-rWx 00b8:trace:virtual:VIRTUAL_DumpView 0xe19000 - 0xe2cfff c-rW- 00b8:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b028568 00b8:Ret KERNEL32.VirtualProtect() retval=00000001 ret=00236b75 ... 00b8:Call driver init 0000000000E2C190 (obj=00000000007FE080,str=L"\Registry\Machine\System\CurrentControlSet\Services\ezplay") 00b8:trace:seh:raise_exception code=c0000005 flags=0 addr=0xe2c190 ip=e2c190 tid=00b8 00b8:trace:seh:raise_exception info[0]=0000000000000008 00b8:trace:seh:raise_exception info[1]=0000000000e2c190 00b8:trace:seh:raise_exception rax=0000000000000081 rbx=0000000000e2c190 rcx=00000000007fe080 rdx=00000000007fe1e8 00b8:trace:seh:raise_exception rsi=0000000000cef8dc rdi=00000000000fc158 rbp=00000000000fc348 rsp=0000000000cef888 00b8:trace:seh:raise_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000000 00b8:trace:seh:raise_exception r12=00000000007fe080 r13=00007fffffea4000 r14=00000000007fe1e8 r15=0000000000000000 00b8:trace:seh:call_vectored_handlers calling handler at 0x22cde0 code=c0000005 flags=0 00b8:trace:seh:call_vectored_handlers handler at 0x22cde0 returned 0 00b8:warn:seh:virtual_unwind exception data not found in L"ezplay.sys" --- snip ---
--- snip --- $ winedump -f .wine/drive_c/windows/system32/drivers/ezplay.sys Contents of .wine/drive_c/windows/system32/drivers/ezplay.sys: 118400 bytes
File Header Machine: 8664 (AMD64) Number of Sections: 8 TimeDateStamp: 4635C037 (Mon Apr 30 12:08:55 2007) offset 232 PointerToSymbolTable: 00000000 NumberOfSymbols: 00000000 SizeOfOptionalHeader: 00F0 Characteristics: 0022 EXECUTABLE_IMAGE LARGE_ADDRESS_AWARE
Optional Header (64bit) Magic 0x20B 523 linker version 8.00 size of code 0xd200 53760 size of initialized data 0xf900 63744 size of uninitialized data 0x0 0 entrypoint RVA 0x1c190 115088 base of code 0x380 896 image base 0x10000 section align 0x80 128 file align 0x80 128 required OS version 5.02 image version 5.02 subsystem version 1.10 Win32 Version 0x0 0 size of image 0x1ce80 118400 size of headers 0x380 896 checksum 0x22220 139808 Subsystem 0x1 (Native) DLL characteristics: 0x2000 WDM_DRIVER stack reserve size 0x40000 stack commit size 0x1000 heap reserve size 0x100000 heap commit size 0x1000 loader flags 0x0 0 RVAs & sizes 0x10 16
Data Directory EXPORT rva: 0x0 size: 0x0 IMPORT rva: 0x1c1ec size: 0x3c RESOURCE rva: 0x1c880 size: 0x398 EXCEPTION rva: 0x18300 size: 0xb10 SECURITY rva: 0x0 size: 0x0 BASERELOC rva: 0x1cc80 size: 0x88 DEBUG rva: 0x9d10 size: 0x1c ARCHITECTURE rva: 0x0 size: 0x0 GLOBALPTR rva: 0x0 size: 0x0 TLS rva: 0x0 size: 0x0 LOAD_CONFIG rva: 0x0 size: 0x0 Bound IAT rva: 0x0 size: 0x0 IAT rva: 0x9b80 size: 0x190 Delay IAT rva: 0x0 size: 0x0 CLR Header rva: 0x0 size: 0x0 rva: 0x0 size: 0x0
Section Table .text VirtSize: 0x000097c9 VirtAddr: 0x00000380 raw data offs: 0x00000380 raw data size: 0x00009800 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0x68000020 CODE MEM_NOT_PAGED MEM_EXECUTE MEM_READ
.rdata VirtSize: 0x0000b0e4 VirtAddr: 0x00009b80 raw data offs: 0x00009b80 raw data size: 0x0000b100 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0x48000040 INITIALIZED_DATA MEM_NOT_PAGED MEM_READ
.data VirtSize: 0x00003610 VirtAddr: 0x00014c80 raw data offs: 0x00014c80 raw data size: 0x00003680 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0xc8000040 INITIALIZED_DATA MEM_NOT_PAGED MEM_READ MEM_WRITE
.pdata VirtSize: 0x00000b10 VirtAddr: 0x00018300 raw data offs: 0x00018300 raw data size: 0x00000b80 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0x48000040 INITIALIZED_DATA MEM_NOT_PAGED MEM_READ
PAGE VirtSize: 0x000032f4 VirtAddr: 0x00018e80 raw data offs: 0x00018e80 raw data size: 0x00003300 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0x60000020 CODE MEM_EXECUTE MEM_READ
INIT VirtSize: 0x0000069e VirtAddr: 0x0001c180 raw data offs: 0x0001c180 raw data size: 0x00000700 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0xe2000020 CODE MEM_DISCARDABLE MEM_EXECUTE MEM_READ MEM_WRITE
.rsrc VirtSize: 0x00000398 VirtAddr: 0x0001c880 raw data offs: 0x0001c880 raw data size: 0x00000400 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0x42000040 INITIALIZED_DATA MEM_DISCARDABLE MEM_READ
.reloc VirtSize: 0x00000186 VirtAddr: 0x0001cc80 raw data offs: 0x0001cc80 raw data size: 0x00000200 relocation offs: 0x00000000 relocations: 0x00000000 line # offs: 0 line #'s: 0 characteristics: 0x42000040 INITIALIZED_DATA MEM_DISCARDABLE MEM_READ
Done dumping .wine/drive_c/windows/system32/drivers/ezplay.sys --- snip ---
$ sha1sum Blindwrite7_setup.exe 8b357a5613b5f348e0105d9dbb84ef42550016ee Blindwrite7_setup.exe
$ du -sh Blindwrite7_setup.exe 14M Blindwrite7_setup.exe
$ wine --version wine-5.7-177-gad1fad8a94
Regards
https://bugs.winehq.org/show_bug.cgi?id=49086
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Keywords| |download URL| |https://web.archive.org/web | |/20131210151026/http://down | |load2.vso-software.fr/Blind | |write7_setup.exe
https://bugs.winehq.org/show_bug.cgi?id=49086
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Fixed by SHA1| |22dfb0df10b44d1c21b3d04b593 | |12670c2318431 Status|NEW |RESOLVED Resolution|--- |FIXED
--- Comment #1 from Anastasius Focht focht@gmx.net --- Hello folks,
this is fixed by commit https://source.winehq.org/git/wine.git/commitdiff/22dfb0df10b44d1c21b3d04b59... ("ntoskrnl.exe: Protect relocated pages one at a time.").
Thanks Zebediah
--- snip --- $ WINEDEBUG=+seh,+relay,+ntoskrnl,+module,+virtual wineboot >> log.txt 2>&1 ... 00ac:Call driver init 0000000000E2C190 (obj=00000000007FE220,str=L"\Registry\Machine\System\CurrentControlSet\Services\ezplay") 00ac:trace:seh:raise_exception code=c0000005 flags=0 addr=0xe2c1bc ip=e2c1bc tid=00ac 00ac:trace:seh:raise_exception info[0]=0000000000000000 00ac:trace:seh:raise_exception info[1]=fffff78000000320 00ac:trace:seh:raise_exception rax=fffff78000000320 rbx=0000000000e2c190 rcx=00000000007fe220 rdx=00000000007fe388 00ac:trace:seh:raise_exception rsi=0000000000cef8dc rdi=00000000007fcf58 rbp=00000000007fd1a8 rsp=0000000000cef888 00ac:trace:seh:raise_exception r8=0000000000e27290 r9=00002b992ddfa232 r10=0000000000000000 r11=0000000000000000 00ac:trace:seh:raise_exception r12=00000000007fe220 r13=00007fffffea4000 r14=00000000007fe388 r15=0000000000000000 00ac:trace:seh:call_vectored_handlers calling handler at 0x22cdf0 code=c0000005 flags=0 00ac:Call KERNEL32.GetTickCount64() ret=0022cf79 00ac:Ret KERNEL32.GetTickCount64() retval=02deb41a ret=0022cf79 00ac:Call msvcrt.memcpy(00cef2e8,7ffe0320,00000008) ret=0022d199 00ac:Ret msvcrt.memcpy() retval=00cef2e8 ret=0022d199 00ac:trace:seh:call_vectored_handlers handler at 0x22cdf0 returned ffffffff 00ac:Call ntoskrnl.exe.ExAllocatePoolWithTag(00000001,00000076,206d6457) ret=00e2916c 00ac:Call ntdll.RtlAllocateHeap(00950000,00000000,00000076) ret=00231dbd 00ac:Ret ntdll.RtlAllocateHeap() retval=00950330 ret=00231dbd 00ac:trace:ntoskrnl:ExAllocatePoolWithTag 118 pool 1 -> 0000000000950330 00ac:Ret ntoskrnl.exe.ExAllocatePoolWithTag() retval=00950330 ret=00e2916c 00ac:Call ntoskrnl.exe.RtlCopyUnicodeString(00e27370,007fe388) ret=00e291aa 00ac:Call ntdll.RtlCopyUnicodeString(00e27370,007fe388) ret=7bca1bbf 00ac:Ret ntdll.RtlCopyUnicodeString() retval=00950330 ret=7bca1bbf 00ac:Ret ntoskrnl.exe.RtlCopyUnicodeString() retval=00950330 ret=00e291aa 00ac:trace:seh:raise_exception code=c0000005 flags=0 addr=0xe29256 ip=e29256 tid=00ac 00ac:trace:seh:raise_exception info[0]=0000000000000000 00ac:trace:seh:raise_exception info[1]=fffff78000000320 00ac:trace:seh:raise_exception rax=fffff78000000320 rbx=0000000000e2c190 rcx=0000000000e28eb0 rdx=000000000000004b 00ac:trace:seh:raise_exception rsi=0000000000cef8dc rdi=00000000007fcf58 rbp=00000000007fd1a8 rsp=0000000000cef860 00ac:trace:seh:raise_exception r8=0000000000000000 r9=0000000000cef062 r10=0000000000000000 r11=000000000000003a 00ac:trace:seh:raise_exception r12=00000000007fe220 r13=00007fffffea4000 r14=00000000007fe388 r15=0000000000000000 00ac:trace:seh:call_vectored_handlers calling handler at 0x22cdf0 code=c0000005 flags=0 00ac:Call KERNEL32.GetTickCount64() ret=0022cf79 00ac:Ret KERNEL32.GetTickCount64() retval=02deb41a ret=0022cf79 00ac:Call msvcrt.memcpy(00cef2c8,7ffe0320,00000008) ret=0022d199 00ac:Ret msvcrt.memcpy() retval=00cef2c8 ret=0022d199 00ac:trace:seh:call_vectored_handlers handler at 0x22cdf0 returned ffffffff 00ac:Call KERNEL32.IsBadStringPtrW(007fcef0,ffffffffffffffff) ret=002355a7 00ac:Ret KERNEL32.IsBadStringPtrW() retval=00000000 ret=002355a7 00ac:Ret driver init 0000000000E2C190 (obj=00000000007FE220,str=L"\Registry\Machine\System\CurrentControlSet\Services\ezplay") retval=00000000 --- snip ---
$ wine --version wine-5.7-209-g4e2ad334b5
Regards
https://bugs.winehq.org/show_bug.cgi?id=49086
Alexandre Julliard julliard@winehq.org changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED
--- Comment #2 from Alexandre Julliard julliard@winehq.org --- Closing bugs fixed in 5.8.