windows programs in iso crash when mounted by "archive mounter" (run with WINE)

Bug #1036238 reported by Richard S.
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
gvfs (Ubuntu)
New
Undecided
Unassigned

Bug Description

Hi, this is my first time writing a bug report.

I am not sure if this is a problem in WINE or gvfs, but executables inside ISO's mounted via. the 'mount' command _work_ properly, so I assume this is a problem with gvfs or 'Archive Mounter'.

So I have decided to install a game from an ISO, so I mounted it with 'right click -> Open With Archive Mounter' (Nautilus as file manager). I used the shortcut in Nautilus to get to the mounted ISO. I then execute _any_ executable inside the mounted ISO and they all crash.

$ wine Setup.exe:
wine: Unhandled page fault on read access to 0x006108b6 at address 0xf758d180 (thread 0009), starting debugger...
Unhandled exception: page fault on read access to 0x006108b6 in 32-bit code (0xf758d180).
Register dump:
 CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
 EIP:f758d180 ESP:0032df00 EBP:0032df70 EFLAGS:00010206( R- -- I - -P- )
 EAX:006108b6 EBX:7eb43ff4 ECX:00000780 EDX:00700880
 ESI:00700880 EDI:006108b6
Stack dump:
0x0032df00: 7eb43ff4 7ead955c 00700880 006108b6
0x0032df10: 00000780 00000001 000003e8 000003e8
0x0032df20: 00000000 0032e064 00000000 00000083
0x0032df30: 00000000 00001000 fffff880 fffff880
0x0032df40: 3f5e1a96 00000000 3f5e1a96 00000000
0x0032df50: 3f5e1a96 00000000 00000004 00000000
Backtrace:
=>0 0xf758d180 in libc.so.6 (+0x137180) (0x0032df70)
  1 0x7ead955c in gdi32 (+0x2955b) (0x0032df70)
  2 0x7eac8283 in gdi32 (+0x18282) (0x0032dff0)
  3 0x7eac9516 in gdi32 (+0x19515) (0x0032e380)
  4 0x7eac5b60 in gdi32 (+0x15b5f) (0x0032e8f0)
  5 0x7eac60c7 StretchDIBits+0x116() in gdi32 (0x0032eda0)
  6 0x7eb8eccd LoadImageW+0x65c() in user32 (0x0032eeb0)
  7 0x7eb8f286 LoadImageA+0x125() in user32 (0x0032efa0)
  8 0x0040723a in setup (+0x7239) (0x0032f0d8)
  9 0x0040321e in setup (+0x321d) (0x0032f130)
  10 0x00402d4e in setup (+0x2d4d) (0x0032f7f4)
  11 0x00402a07 in setup (+0x2a06) (0x0032fe0c)
  12 0x0040254e in setup (+0x254d) (0x0032fe70)
  13 0x7b85bb6c call_process_entry+0xb() in kernel32 (0x0032fe88)
  14 0x7b85cddf in kernel32 (+0x4cdde) (0x0032fec8)
  15 0x7bc72050 call_thread_func_wrapper+0xb() in ntdll (0x0032fed8)
  16 0x7bc74b2d call_thread_func+0x7c() in ntdll (0x0032ffa8)
  17 0x7bc7202e RtlRaiseException+0x21() in ntdll (0x0032ffc8)
  18 0x7bc4a1ae call_dll_entry_point+0x61d() in ntdll (0x0032ffe8)
0xf758d180: repe movq 0x0(%eax),%mm0
Modules:
Module Address Debug info Name (61 modules)
PE 400000- 411000 Export setup
ELF 7b800000-7ba2d000 Dwarf kernel32<elf>
  \-PE 7b810000-7ba2d000 \ kernel32
ELF 7bc00000-7bcc4000 Dwarf ntdll<elf>
  \-PE 7bc10000-7bcc4000 \ ntdll
ELF 7bf00000-7bf04000 Deferred <wine-loader>
ELF 7e321000-7e355000 Deferred uxtheme<elf>
  \-PE 7e330000-7e355000 \ uxtheme
ELF 7e355000-7e360000 Deferred libxcursor.so.1
ELF 7e3c7000-7e3f1000 Deferred libexpat.so.1
ELF 7e3f1000-7e425000 Deferred libfontconfig.so.1
ELF 7e425000-7e435000 Deferred libxi.so.6
ELF 7e435000-7e439000 Deferred libxcomposite.so.1
ELF 7e439000-7e442000 Deferred libxrandr.so.2
ELF 7e442000-7e44c000 Deferred libxrender.so.1
ELF 7e44c000-7e452000 Deferred libxxf86vm.so.1
ELF 7e452000-7e456000 Deferred libxinerama.so.1
ELF 7e456000-7e478000 Deferred imm32<elf>
  \-PE 7e460000-7e478000 \ imm32
ELF 7e478000-7e47f000 Deferred libxdmcp.so.6
ELF 7e47f000-7e483000 Deferred libxau.so.6
ELF 7e483000-7e4a4000 Deferred libxcb.so.1
ELF 7e4a4000-7e4be000 Deferred libice.so.6
ELF 7e4be000-7e5f2000 Deferred libx11.so.6
ELF 7e5f2000-7e604000 Deferred libxext.so.6
ELF 7e604000-7e68d000 Deferred winex11<elf>
  \-PE 7e610000-7e68d000 \ winex11
ELF 7e68d000-7e6a3000 Deferred libz.so.1
ELF 7e6a3000-7e73d000 Deferred libfreetype.so.6
ELF 7e73d000-7e75c000 Deferred libtinfo.so.5
ELF 7e75c000-7e77e000 Deferred libncurses.so.5
ELF 7e781000-7e787000 Deferred libxfixes.so.3
ELF 7e796000-7e8a5000 Deferred oleaut32<elf>
  \-PE 7e7b0000-7e8a5000 \ oleaut32
ELF 7e8a5000-7e91b000 Deferred rpcrt4<elf>
  \-PE 7e8b0000-7e91b000 \ rpcrt4
ELF 7e91b000-7ea22000 Deferred ole32<elf>
  \-PE 7e930000-7ea22000 \ ole32
ELF 7ea22000-7ea3b000 Deferred version<elf>
  \-PE 7ea30000-7ea3b000 \ version
ELF 7ea3b000-7ea9d000 Deferred advapi32<elf>
  \-PE 7ea50000-7ea9d000 \ advapi32
ELF 7ea9d000-7eb5c000 Dwarf gdi32<elf>
  \-PE 7eab0000-7eb5c000 \ gdi32
ELF 7eb5c000-7ec9c000 Dwarf user32<elf>
  \-PE 7eb70000-7ec9c000 \ user32
ELF 7ec9c000-7ed95000 Deferred comctl32<elf>
  \-PE 7eca0000-7ed95000 \ comctl32
ELF 7ef95000-7efa2000 Deferred libnss_files.so.2
ELF 7efa2000-7efbc000 Deferred libnsl.so.1
ELF 7efbc000-7efe8000 Deferred libm.so.6
ELF 7efeb000-7eff7000 Deferred libnss_nis.so.2
ELF 7eff7000-7f000000 Deferred libnss_compat.so.2
ELF f7451000-f7456000 Deferred libdl.so.2
ELF f7456000-f75fb000 Dwarf libc.so.6
ELF f75fc000-f7617000 Deferred libpthread.so.0
ELF f7618000-f761e000 Deferred libuuid.so.1
ELF f761e000-f7627000 Deferred libsm.so.6
ELF f762f000-f7771000 Dwarf libwine.so.1
ELF f7773000-f7795000 Deferred ld-linux.so.2
ELF f7795000-f7796000 Deferred [vdso].so
Threads:
process tid prio (all id:s are in hex)
00000008 (D) Z:\home\richard\.gvfs\morrowind.iso\Setup.exe
 00000009 0 <==
0000000e services.exe
 0000001f 0
 0000001e 0
 00000018 0
 00000017 0
 00000015 0
 00000010 0
 0000000f 0
00000012 winedevice.exe
 0000001c 0
 00000019 0
 00000014 0
 00000013 0
0000001a plugplay.exe
 00000020 0
 0000001d 0
 0000001b 0
00000021 explorer.exe
 00000022 0

$ lsb_release -rd:
Description: Ubuntu 12.04 LTS
Release: 12.04

# apt-cache policy gvfs:
gvfs:
  Installed: 1.12.1-0ubuntu1
  Candidate: 1.12.1-0ubuntu1
  Version table:
 *** 1.12.1-0ubuntu1 0
        500 http://de.archive.ubuntu.com/ubuntu/ precise/main amd64 Packages

        100 /var/lib/dpkg/status

I have tried other ISO's with executables in them, and all of them have the same behaviour.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.