WineHQ
Bug Tracking Database – Bug 31111

 Bugzilla

 

Last modified: 2014-03-07 14:13:48 UTC  

wmp9 install fails with builtin pidgen

Bug 31111 - wmp9 install fails with builtin pidgen
wmp9 install fails with builtin pidgen
Status: CLOSED FIXED
AppDB: Show Apps affected by this bug
Product: Wine
Classification: Unclassified
Component: -unknown
1.5.7
x86 Linux
: P2 normal
: ---
Assigned To: Mr. Bugs
: download, Installer
Depends on:
Blocks:
  Show dependency tree
 
Reported: 2012-07-03 00:30 UTC by Dan Kegel
Modified: 2014-03-07 14:13 UTC (History)
1 user (show)

See Also:
Regression SHA1:
Fixed by SHA1:
Distribution: ---
Staged patchset:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dan Kegel 2012-07-03 00:30:33 UTC
Windows Media Player 9 installer complains
wine: Call from 0x7ece4712 to unimplemented function pidgen.dll.PIDGenSimpW, aborting
with current wine.  
Overriding pidgen to native works around the problem.

Oddly, even though builtin pidgen returns FALSE from DLL_WINE_PREATTACH, the builtin dll is used by default?
Comment 1 Austin English 2014-02-25 16:11:27 UTC
Works fine in 1.6 and wine-1.7.13-53-g37e0a1a. I'm hesitant to mark fixed, though, since this doesn't seem like it should've happened in the first place...Dan, please retest.
Comment 2 Anastasius Focht 2014-02-25 16:34:45 UTC
Hello Austin,

works as designed for me too.

A simple +module trace would have revealed the problem very quickly ... it's not very hard to do.
Anyway, resolving 'fixed'.

--- snip ---
...
002a:Call KERNEL32.LoadLibraryW(0033eac0 L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll") ret=0101a4ad
002a:trace:module:load_dll looking for L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll" in L"C:\\users\\focht\\Temp\\IXP000.TMP;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem"
002a:trace:module:get_load_order looking for L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:trace:module:get_load_order got hardcoded default for L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:trace:module:load_builtin_dll Trying built-in L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:warn:module:load_builtin_dll failed to load .so lib for builtin L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll": /home/focht/.wine/dosdevices/c:/users/focht/Temp/IXP000.TMP/PidGen.dll: invalid ELF header
002a:trace:module:load_builtin_dll Trying built-in L"pidgen.dll"
002a:trace:module:load_dll looking for L"kernel32.dll" in L"C:\\users\\focht\\Temp\\IXP000.TMP;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem"
002a:trace:module:load_dll Found L"C:\\windows\\system32\\KERNEL32.dll" for L"kernel32.dll" at 0x7b810000, count=-1
002a:trace:module:load_builtin_callback loaded pidgen.dll 0x4439e0 0x7d090000
002a:Call PE DLL (proc=0x7d097808,module=0x7d090000 L"pidgen.dll",reason=WINE_PREATTACH,res=(nil))
002a:Ret  PE DLL (proc=0x7d097808,module=0x7d090000 L"pidgen.dll",reason=WINE_PREATTACH,res=(nil)) retval=0
002a:trace:module:load_dll L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll" pre-attach returned FALSE, preferring native
002a:trace:module:LdrUnloadDll (0x7d090000)
002a:trace:module:LdrUnloadDll (L"pidgen.dll") - START
002a:trace:module:MODULE_DecRefCount (L"pidgen.dll") ldr.LoadCount: 0
002a:trace:module:free_modref  unloading L"C:\\windows\\system32\\pidgen.dll"
002a:trace:module:LdrUnloadDll END
002a:trace:module:load_native_dll Trying native dll L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll"
002a:trace:module:map_image mapped PE file at 0x10000000-0x10007000
002a:trace:module:map_image mapping section .text at 0x10001000 off 400 size 3000 virt 2ed3 flags 60000020
002a:trace:module:map_image mapping section .data at 0x10004000 off 3400 size 200 virt 1b4 flags c0000040
002a:trace:module:map_image clearing 0x10004200 - 0x10005000
002a:trace:module:map_image mapping section .rsrc at 0x10005000 off 3600 size 800 virt 6f8 flags 40000040
002a:trace:module:map_image clearing 0x10005800 - 0x10006000
002a:trace:module:map_image mapping section .reloc at 0x10006000 off 3e00 size 200 virt 124 flags 42000040
002a:trace:module:map_image clearing 0x10006200 - 0x10007000
002a:warn:module:alloc_module disabling no-exec because of L"pidgen.dll"
...
002a:trace:module:load_dll looking for L"ADVAPI32.dll" in L"C:\\users\\focht\\Temp\\IXP000.TMP;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem"
002a:trace:module:load_dll Found L"C:\\windows\\system32\\advapi32.dll" for L"ADVAPI32.dll" at 0x7ecb0000, count=-1
002a:trace:module:load_dll Loaded module L"C:\\users\\focht\\Temp\\IXP000.TMP\\pidgen.dll" (native) at 0x10000000
002a:trace:module:process_attach (L"pidgen.dll",(nil)) - START
002a:Call PE DLL (proc=0x10001504,module=0x10000000 L"pidgen.dll",reason=PROCESS_ATTACH,res=(nil))
002a:Ret  PE DLL (proc=0x10001504,module=0x10000000 L"pidgen.dll",reason=PROCESS_ATTACH,res=(nil)) retval=1
002a:trace:module:process_attach (L"pidgen.dll",(nil)) - END
002a:Ret  KERNEL32.LoadLibraryW() retval=10000000 ret=0101a4ad
002a:Call KERNEL32.GetProcAddress(10000000,010021bc "PIDGenSimpW") ret=01011fe8
002a:Ret  KERNEL32.GetProcAddress() retval=10001f61 ret=01011fe8 
--- snip ---

Regards
Comment 3 Alexandre Julliard 2014-03-07 14:13:48 UTC
Closing bugs fixed in 1.7.14.


Privacy Policy
If you have a privacy inquiry regarding this site, please write to [email protected]

Hosted By CodeWeavers