http://bugs.winehq.org/show_bug.cgi?id=32135
Bug #: 32135 Summary: remove.exe crashing Product: Wine Version: 1.5.16 Platform: x86-64 OS/Version: Linux Status: UNCONFIRMED Severity: normal Priority: P2 Component: -unknown AssignedTo: wine-bugs@winehq.org ReportedBy: branzeanu.aurel@gmail.com Classification: Unclassified
Created attachment 42397 --> http://bugs.winehq.org/attachment.cgi?id=42397 remove.exe backtrace log
When installing iRise Studio MX v8.11.0.0B836 on Ubuntu 12.04 64-bit, at the end of installation a crash window is popping up telling that remove.exe has crashed.
The Studio MX is installed, though working with glitches too.
The backtrace is attached.
http://bugs.winehq.org/show_bug.cgi?id=32135
lizhenbo litimetal@gmail.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |litimetal@gmail.com
--- Comment #1 from lizhenbo litimetal@gmail.com --- Football Manager 2008 Demo is also affected See: http://bugs.winehq.org/show_bug.cgi?id=11603#c29
http://bugs.winehq.org/show_bug.cgi?id=32135
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Keywords| |obfuscation Status|UNCONFIRMED |RESOLVED CC| |focht@gmx.net Component|-unknown |ntdll Resolution|--- |DUPLICATE Summary|remove.exe crashing |LAX installer 'remove.exe' | |cleanup tool fails with | |unexpected guard page fault | |caused by Wine's ATL thunk | |check (iRise Studio MX | |v8.11, Football Manager | |2008)
--- Comment #2 from Anastasius Focht focht@gmx.net --- Hello folks,
'remove.exe' is an uninstaller/cleanup tool, part of LAX installer.
Actually a dupe of bug 19296
Starting with +relay gives it away:
--- snip --- Z:\home\focht\Downloads\remove.exe (3.5) 01/29/14 09:42:41 - Dispatcher initialisation error 13 --- snip ---
Trace log without +relay:
--- snip --- $ WINEDEBUG=+tid,+seh,+server,+loaddll,+virtual,+ntdll wine ./remove.exe
log.txt 2>&1
... 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc8456e ip=7bc8456e tid=0009 0009:trace:seh:raise_exception info[0]=00000000 0009:trace:seh:raise_exception info[1]=00402e9d 0009:trace:seh:raise_exception eax=00402e9d ebx=7bcd1000 ecx=ffc8578f edx=0033f968 esi=0033fa9c edi=00000000 0009:trace:seh:raise_exception ebp=0033fa38 esp=0033f940 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010246 0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x7bc9ebbf code=c0000005 flags=0 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000004 0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-rW- 0009:trace:virtual:VIRTUAL_SetProt forcing exec permission on 0x401000-0x408fff 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- ... 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000020 000d: get_key_value( hkey=0048, name=L"PaddedBorderWidth" ) 0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-r-x 000d: get_key_value() = 0 { type=1, total=4, data={30,00,00,00} } 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- 0009:trace:seh:call_stack_handlers handler at 0x7bc9ebbf returned 0 0009:trace:ntdll:NtQueryInformationProcess (0xffffffff,0x00000022,0x33fa68,0x00000004,(nil)) 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x402e9d ip=00402e9d tid=0009 0009:trace:seh:raise_exception info[0]=00000000 0009:trace:seh:raise_exception info[1]=00402e9d 0009:trace:seh:raise_exception eax=00402e9d ebx=7b8bb000 ecx=00028000 edx=0013de68 esi=00000001 edi=00000000 0009:trace:seh:raise_exception ebp=0033fe04 esp=0033fdc8 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x434b4c code=c0000005 flags=0 0009:trace:seh:call_stack_handlers handler at 0x434b4c returned 1 0009:trace:seh:call_stack_handlers calling handler at 0x7bc9eb4f code=c0000005 flags=0 --- snip ---
Regards
*** This bug has been marked as a duplicate of bug 19296 ***
https://bugs.winehq.org/show_bug.cgi?id=32135
Bruno Jesus 00cpxxx@gmail.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED
--- Comment #3 from Bruno Jesus 00cpxxx@gmail.com --- Closing duplicate.