[Bug 2850] Cannot use first megabyte for DOS address.... (with jack_fst)

Wine Bugs wine-bugs at winehq.org
Sun Apr 3 20:55:23 CDT 2005


http://bugs.winehq.org/show_bug.cgi?id=2850





------- Additional Comments From nklepeis at sbcglobal.net  2005-03-04 20:55 -------
Here's more info on jack_fst.

Obtained from: http://www.linuxaudiosystems.com/fst/

(Use with Wine version 20050310)

Here are the last lines of debugging output:
(WINEDEBUG=+relay jack_fst Ambience.dll >& fstdebug.out;)

0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995
0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83
0009:Ret  kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995
0009:Ret  user32.GetWindowLongW() retval=04c00000 ret=7ef7e717
0009:Ret  x11drv.CreateWindow() retval=00000001 ret=7f132d17
0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d
0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24
0009:Ret  kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d
0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995
0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83
0009:Ret  kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995
0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d
0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24
0009:Ret  kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d
0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995
0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83
0009:Ret  kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995
0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d
0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24
0009:Ret  kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d
0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995
0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83
0009:Ret  kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995
0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d
0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24
0009:Ret  kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d
0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995
0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83
0009:Ret  kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995
0009:Call kernel32.GlobalLock16(0000110f) ret=7f129229
0009:Ret  kernel32.GlobalLock16() retval=7fea8a90 ret=7f129229
0009:Ret  user32.CreateWindowExW() retval=00010024 ret=7c12845f
0009:Call ntdll.RtlEnterCriticalSection(7c172940) ret=7c12837e
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=7c12837e
0009:Call ntdll.RtlLeaveCriticalSection(7c172940) ret=7c1283ac
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7c1283ac
0009:Call kernel32.GlobalAlloc(00002042,00000018) ret=7c125b8c
0009:Call ntdll.RtlLockHeap(7fe70000) ret=7fdb77ab
0009:Ret  ntdll.RtlLockHeap() retval=00000001 ret=7fdb77ab
0009:Call ntdll.RtlAllocateHeap(7fe70000,00000000,00000008) ret=7fdb7686
0009:Ret  ntdll.RtlAllocateHeap() retval=7fea9170 ret=7fdb7686
0009:Call ntdll.RtlAllocateHeap(7fe70000,00000008,00000020) ret=7fdb7686
0009:Ret  ntdll.RtlAllocateHeap() retval=7fed7b70 ret=7fdb7686
0009:Call ntdll.RtlUnlockHeap(7fe70000) ret=7fdb7803
0009:Ret  ntdll.RtlUnlockHeap() retval=00000001 ret=7fdb7803
0009:Ret  kernel32.GlobalAlloc() retval=7fea9172 ret=7c125b8c
0009:Call kernel32.GlobalLock(7fea9172) ret=7c125b9f
0009:Call ntdll.RtlLockHeap(7fe70000) ret=7fdb78f5
0009:Ret  ntdll.RtlLockHeap() retval=00000001 ret=7fdb78f5
0009:Call ntdll.RtlUnlockHeap(7fe70000) ret=7fdb7992
0009:Ret  ntdll.RtlUnlockHeap() retval=00000001 ret=7fdb7992
0009:Ret  kernel32.GlobalLock() retval=7fed7b78 ret=7c125b9f
0009:Call user32.RegisterClassA(bffff5ac) ret=7c1438df
0009:Call kernel32.GetModuleHandleW(00000000) ret=7f10d3ba
0009:Ret  kernel32.GetModuleHandleW() retval=b7fe0000 ret=7f10d3ba
0009:Call kernel32.GlobalAddAtomA(7c165800 "WineDragDropTracker32")
ret=7f10d3cb0009:Ret  kernel32.GlobalAddAtomA() retval=0000c028 ret=7f10d3cb
0009:Call ntdll.RtlAllocateHeap(7fe70000,00000008,00000044) ret=7f10cf4d
0009:Ret  ntdll.RtlAllocateHeap() retval=7fed7b98 ret=7f10cf4d
0009:Call kernel32.GlobalDeleteAtom(0000c028) ret=7f10cfc9
0009:Ret  kernel32.GlobalDeleteAtom() retval=00000000 ret=7f10cfc9
0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d
0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24
0009:Ret  kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d
0009:Call ntdll.RtlEnterCriticalSection(7f1c7940) ret=7f1390bc
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=7f1390bc
0009:Call ntdll.RtlLeaveCriticalSection(7f1c7940) ret=7f1390d8
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7f1390d8
0009:Call kernel32.UnMapLS(00000000) ret=7f10c909
0009:Ret  kernel32.UnMapLS() retval=00000000 ret=7f10c909
0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995
0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83
0009:Ret  kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995
0009:Ret  user32.RegisterClassA() retval=0000c028 ret=7c1438df
0009:Ret  ole32.OleInitialize() retval=00000000 ret=100011cb
0009:Call ntdll.RtlEnterCriticalSection(1002a990) ret=1001623d
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=1001623d
0009:Call ntdll.RtlLeaveCriticalSection(1002a990) ret=1001616d
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=1001616d
0009:Call ntdll.RtlEnterCriticalSection(1002a990) ret=1001623d
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=1001623d
0009:Call ntdll.RtlLeaveCriticalSection(1002a990) ret=1001616d
0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=1001616d
0009:Call ntdll.RtlAllocateHeap(7bc40000,00000000,00002a70) ret=100114ef
0009:Ret  ntdll.RtlAllocateHeap() retval=7bc48240 ret=100114ef
0009:Call ntdll.RtlEnterCriticalSection(7bc4576c) ret=1000dbe9
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=1000dbe9
fst signal handler 4, thread = 0xb7fca8e0
fst signal handler 4 (TEB=0x7ff85000)





-- 
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the wine-bugs mailing list