[Bug 1027] New: - "x11drv_main.c: X11DRV_CritSection" wait timed out

wine-bugs at winehq.com wine-bugs at winehq.com
Sat Sep 14 11:08:31 CDT 2002


http://bugs.winehq.com/show_bug.cgi?id=1027

           Summary: "x11drv_main.c: X11DRV_CritSection" wait timed out
           Product: Wine
           Version: 20020904
          Platform: PC
        OS/Version: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: wine-x11driver
        AssignedTo: wine-bugs at winehq.com
        ReportedBy: till at informatik.uni-bremen.de


The bug appears with both wine 20020710 and wine 20020904 on a SuSe 7.3 machine,
using a copy of a Windows 98 installation.
The program is FITCH.EXE (see http://www-csli.stanford.edu/LPL ).
It is not free, but can be obtained from me, if needed.

Stdout output of the command

wine  /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE

After the follwing probably harmless problems (I have deleted repeated stuff):

fixme:win32:CreateMailslotA ("\\\\.\\mailslot\\Openproof/Fitch
1.0",520,100,(nil)): stub
fixme:win32:CreateMailslotA ("\\\\.\\mailslot\\Z/\\usr\\local\\LPL\\LPL
Software\\Fitch Folder\\FITCH.EXE",520,100,(nil)): stub
fixme:ntdll:RtlAddAccessAllowedAce
(0x405c58d4,0x00000002,0x000f003f,0x403bef78),stub!
fixme:reg:RegFlushKey (48): stub
fixme:win32:GetMailslotInfo (0001): stub
fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen!
fixme:win32:GetMailslotInfo (0001): stub

then the error occurs (infinitely often):

err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c:
X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809df48
wine: Unhandled exception, starting debugger...

Unfortunately, the debugger window does not appear.
With an earlier version of wine (20020710), it appears, and sometimes
even the error does not appear. If needed, I can try to
reconstruct the debugger output.

Stderr Output of the command

wine --debugmsg +relay /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE

[snip]

Some 400 lines of the section before the error occurs:

0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e
0809d330:Call kernel32.GetTickCount() ret=40fee0bb
0809d330:Ret  kernel32.GetTickCount() retval=00014386 ret=40fee0bb
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
080713c8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen!
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Ret  x11drv.MsgWaitForMultipleObjectsEx() retval=00000000 ret=408fd663
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
080713c8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
080713c8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
080713c8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
080713c8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
080713c8:Call
kernel32.WaitForMultipleObjectsEx(00000001,405c6368,00000000,00000000,00000000)
ret=40b05dd3
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e
0809dfa8:Call user32.GetPropA(00010021,0000c01c) ret=1801785d
080713c8:Ret  kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3
080713c8:Ret  x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=408fd663
080713c8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e
080713c8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e
080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
080713c8:Ret  kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27
080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b
080713c8:Ret  kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b
0809dfa8:Ret  user32.GetPropA() retval=00000000 ret=1801785d
0809dfa8:Call user32.CallNextHookEx(4b48008c,00000000,00000001,48846b34)
ret=18017681
0809dfa8:Ret  user32.CallNextHookEx() retval=00000000 ret=18017681
0809dfa8:Ret  user32.PeekMessageA() retval=00000001 ret=180177b6
0809dfa8:Call user32.TranslateMessage(48846c54) ret=180177e2
0809dfa8:Ret  user32.TranslateMessage() retval=00000000 ret=180177e2
0809dfa8:Call user32.DispatchMessageA(48846c54) ret=180177e9
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706ba) ret=408e660e
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e660e
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706c8) ret=408e662c
0809dfa8:Ret  kernel32.HeapValidate() retval=00000001 ret=408e662c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c)
ret=408b56d3
080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
080713c8:Ret  kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27
080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b
080713c8:Ret  kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b
080713c8:Call kernel32.ReleaseThunkLock(405c6544) ret=408fd6cc
080713c8:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc
080713c8:Ret  user32.PeekMessageA() retval=00000000 ret=004072c9
080713c8:Call
kernel32.GetMailslotInfo(00000001,00000000,405c6628,00000000,00000000)
ret=00407051
fixme:win32:GetMailslotInfo (0001): stub
080713c8:Ret  kernel32.GetMailslotInfo() retval=00000001 ret=00407051
080713c8:Call kernel32.ReadFile(00000001,405c6b0c,00000208,405c6620,00000000)
ret=00407093
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868
L"theAwtToolkitWindow",00000010) ret=408e15b4
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call window proc 0x18017410
(hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000)
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e
0809dfa8:Call user32.GetCursorPos(48846ad4) ret=18017440
0809dfa8:Call x11drv.GetCursorPos(48846ad4) ret=408c6813
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
080713c8:Ret  kernel32.ReadFile() retval=00000000 ret=00407093
080713c8:Call kernel32.Sleep(00000208) ret=00407100
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Ret  x11drv.GetCursorPos() retval=000001bf ret=408c6813
0809dfa8:Ret  user32.GetCursorPos() retval=00000001 ret=18017440
0809dfa8:Call user32.WindowFromPoint(00000224,000001bf) ret=18017450
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5
0809dfa8:Ret  ntdll.RtlAllocateHeap() retval=403e8b40 ret=408dded5
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5
0809dfa8:Ret  ntdll.RtlAllocateHeap() retval=403e8bc8 ret=408dded5
0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8bc8) ret=408ddead
0809dfa8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=408ddead
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003572) ret=408e660e
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e660e
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003580) ret=408e662c
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e662c
0809dfa8:Call kernel32.IsBadReadPtr16(18003580,0000000e) ret=408e6641
0809dfa8:Ret  kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c)
ret=408b56d3
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call window proc 0x18003580
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224)
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e
0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=1800359b
0809dfa8:Ret  user32.GetPropA() retval=412d1860 ret=1800359b
0809dfa8:Call
user32.CallWindowProcA(409225e0,00010023,00000084,00000000,01bf0224)
ret=18004571
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225d2) ret=408e660e
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e660e
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225e0) ret=408e662c
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e662c
0809dfa8:Call kernel32.IsBadReadPtr16(409225e0,0000000e) ret=408e6641
0809dfa8:Ret  kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c)
ret=408b56d3
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call window proc 0x409225e0
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224)
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e
0809dfa8:Call user32.DefWindowProcA(00010023,00000084,00000000,01bf0224)
ret=408e623b
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Ret  user32.DefWindowProcA() retval=00000001 ret=408e623b
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c)
ret=408b56d3
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Ret  window proc 0x409225e0
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) retval=00000001
0809dfa8:Ret  user32.CallWindowProcA() retval=00000001 ret=18004571
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c)
ret=408b56d3
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Ret  window proc 0x18003580
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) retval=00000001
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e3da6
0809dfa8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=408e3da6
0809dfa8:Ret  user32.WindowFromPoint() retval=00010023 ret=18017450
0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=18017465
0809dfa8:Ret  user32.GetPropA() retval=412d1860 ret=18017465
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c)
ret=408b56d3
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868
L"theAwtToolkitWindow",00000010) ret=408e15b4
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809dfa8:Ret  window proc 0x18017410
(hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000) retval=00000000
0809dfa8:Ret  user32.DispatchMessageA() retval=00000000 ret=180177e9
0809dfa8:Call user32.PeekMessageA(48846c54,00000000,00000000,00000000,00000001)
ret=180177f8
0809dfa8:Call
x11drv.MsgWaitForMultipleObjectsEx(00000000,00000000,00000000,00000000,00000000)
ret=408fd663
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Call
kernel32.WaitForMultipleObjectsEx(00000001,48846954,00000000,00000000,00000000)
ret=40b05dd3
0809dfa8:Ret  kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3
0809dfa8:Ret  x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=408fd663
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call kernel32.ReleaseThunkLock(48846b30) ret=408fd6cc
0809dfa8:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc
0809dfa8:Ret  user32.PeekMessageA() retval=00000000 ret=180177f8
0809dfa8:Call user32.WaitMessage() ret=1801776a
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b
0809dfa8:Call kernel32.ReleaseThunkLock(48846a3c) ret=408cc817
0809dfa8:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=408cc817
0809dfa8:Call
x11drv.MsgWaitForMultipleObjectsEx(00000001,48846ab4,ffffffff,000000ff,00000000)
ret=408cc83f
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Call
kernel32.WaitForMultipleObjectsEx(00000002,48846850,00000000,ffffffff,00000000)
ret=40b05dd3
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809d910:Call user32.GetOpenClipboardWindow() ret=40b03a47
0809d910:Ret  user32.GetOpenClipboardWindow() retval=00010021 ret=40b03a47
0809d910:Call user32.CLIPBOARD_EmptyCache(00000001) ret=40b03a87
0809d910:Ret  user32.CLIPBOARD_EmptyCache() retval=00000001 ret=40b03a87
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809d910:Call user32.GetAncestor(00010021,00000002) ret=40b03ad3
0809d910:Call ntdll.RtlAllocateHeap(40360000,00000000,00000040) ret=408e22b9
0809d910:Ret  ntdll.RtlAllocateHeap() retval=403e8b40 ret=408e22b9
0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809d910:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809d910:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809d910:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809d910:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809d910:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e1b90
0809d910:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=408e1b90
0809d910:Ret  user32.GetAncestor() retval=00010021 ret=40b03ad3
0809d910:Call user32.WIN_GetPtr(00010021) ret=40b0dbed
0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec
0809d910:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec
0809d910:Ret  user32.WIN_GetPtr() retval=403d53b8 ret=40b0dbed
0809d910:Call user32.USER_Unlock() ret=40b0dc15
0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c
0809d910:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c
0809d910:Ret  user32.USER_Unlock() retval=00000000 ret=40b0dc15
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c
0809dfa8:Ret  kernel32.WaitForMultipleObjectsEx() retval=00000001 ret=40b05dd3
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc
0809d330:Call kernel32.GetTickCount() ret=40fedefa
0809d330:Ret  kernel32.GetTickCount() retval=0001439a ret=40fedefa

Then come about 10000 quite boring lines, containing the following:

These four lines:

0809d330:Call kernel32.GetTickCount() ret=40fee0bb
0809d330:Ret  kernel32.GetTickCount() retval=00015683 ret=40fee0bb
0809d330:Call kernel32.GetTickCount() ret=40fedefa
0809d330:Ret  kernel32.GetTickCount() retval=00015695 ret=40fedefa

repeatedly interleaved with approx. 25 times these four lines:

0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e

Then comes the error:

0809d330:Call kernel32.GetTickCount() ret=40fee0bb
0809d330:Ret  kernel32.GetTickCount() retval=00015699 ret=40fee0bb
0809d190:Ret  kernel32.WaitForMultipleObjects() retval=00000102 ret=1a00e7d8
err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c:
X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809dfa8
0809d190:Call winmm.timeGetTime() ret=1a00e815
0809d190:Call kernel32.ReleaseThunkLock(47816d30) ret=40fee8cc
0809d190:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=40fee8cc
0809d190:Call kernel32.RestoreThunkLock(00000000) ret=40fee8d5
0809d190:Ret  kernel32.RestoreThunkLock() retval=00000000 ret=40fee8d5
0809d190:Call kernel32.IsBadWritePtr(403d0ae8,00000054) ret=40fee120
0809d190:Ret  kernel32.IsBadWritePtr() retval=00000000 ret=40fee120
0809d190:Ret  winmm.timeGetTime() retval=00015695 ret=1a00e815
0809d190:Call kernel32.Sleep(00000001) ret=1a00e7be
0809d330:Call kernel32.GetTickCount() ret=40fedefa
0809d330:Ret  kernel32.GetTickCount() retval=000157d1 ret=40fedefa
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e

and then the last four lines again get repeated many times etc.

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://bugs.winehq.com/show_bug.cgi?id=1027>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.



More information about the wine-bugs mailing list