[Bug 3125] Deadlock when opening file in Powerpoint 2000 using File-Open-dialog

Wine Bugs wine-bugs at winehq.org
Wed Aug 3 07:00:08 CDT 2005


http://bugs.winehq.org/show_bug.cgi?id=3125





------- Additional Comments From t.serries at lvm.de  2005-03-08 07:00 -------
Sorry, I made a mistake while creating the +syslevel,+relay output.

Here is the (hopfully) correct one:

000d:Call kernel32.InterlockedDecrement(7ef50000) ret=65f01ea2
000d:Ret  kernel32.InterlockedDecrement() retval=ffffffff ret=65f01ea2
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008248) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call kernel32.InterlockedDecrement(80006560) ret=65f17637
000d:Ret  kernel32.InterlockedDecrement() retval=00000001 ret=65f17637
000d:Call ntdll.RtlFreeHeap(80000000,00000000,800064b0) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call kernel32.InterlockedDecrement(80006560) ret=65f17637
000d:Ret  kernel32.InterlockedDecrement() retval=00000000 ret=65f17637
000d:Call kernel32.GetCurrentThreadId() ret=65f01e46
000d:Ret  kernel32.GetCurrentThreadId() retval=0000000d ret=65f01e46
000d:Call kernel32.InterlockedIncrement(7ef50000) ret=65f01e50
000d:Ret  kernel32.InterlockedIncrement() retval=00000000 ret=65f01e50
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80009788) ret=65f10d3b
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008760) ret=65f10d3b
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008730) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call ntdll.RtlFreeHeap(80000000,00000000,8000a7b0) ret=65f10d3b
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b
000d:Call ntdll.RtlFreeHeap(80000000,00000000,8000a7d0) ret=65f10d3b
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008270) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006548) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call kernel32.GetCurrentThreadId() ret=65f01e83
000d:Ret  kernel32.GetCurrentThreadId() retval=0000000d ret=65f01e83
000d:Call kernel32.InterlockedDecrement(7ef50000) ret=65f01ea2
000d:Ret  kernel32.InterlockedDecrement() retval=ffffffff ret=65f01ea2
000d:Call kernel32.InterlockedDecrement(800061f8) ret=65f176ae
000d:Ret  kernel32.InterlockedDecrement() retval=00000002 ret=65f176ae
000d:Call kernel32.InterlockedDecrement(800065c0) ret=65f176ae
000d:Ret  kernel32.InterlockedDecrement() retval=00000000 ret=65f176ae
000d:Call ntdll.RtlFreeHeap(80000000,00000000,800065f8) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006590) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call kernel32.InterlockedDecrement(800061f8) ret=65f176ae
000d:Ret  kernel32.InterlockedDecrement() retval=00000001 ret=65f176ae
000d:Call kernel32.InterlockedDecrement(800061f8) ret=65f176ae
000d:Ret  kernel32.InterlockedDecrement() retval=00000000 ret=65f176ae
000d:Call kernel32.CloseHandle(0000017c) ret=65f0f5ce
000d:Call ntdll.NtClose(0000017c) ret=2ae4e839
000d:Ret  ntdll.NtClose() retval=00000000 ret=2ae4e839
000d:Ret  kernel32.CloseHandle() retval=00000001 ret=65f0f5ce
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006230) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call ntdll.RtlFreeHeap(80000000,00000000,800061c8) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80005ec0) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call kernel32.CloseHandle(00000188) ret=65f0f57e
000d:Call ntdll.NtClose(00000188) ret=2ae4e839
000d:Ret  ntdll.NtClose() retval=00000000 ret=2ae4e839
000d:Ret  kernel32.CloseHandle() retval=00000001 ret=65f0f57e
000d:Call kernel32.GetCurrentThreadId() ret=65f0f507
000d:Ret  kernel32.GetCurrentThreadId() retval=0000000d ret=65f0f507
000d:Call kernel32.GetCurrentThreadId() ret=65f01e83
000d:Ret  kernel32.GetCurrentThreadId() retval=0000000d ret=65f01e83
000d:Call kernel32.InterlockedDecrement(7fa00000) ret=65f01ea2
000d:Ret  kernel32.InterlockedDecrement() retval=ffffffff ret=65f01ea2
000d:Call kernel32.UnmapViewOfFile(7fa00000) ret=65f0f520
000d:Call ntdll.NtUnmapViewOfSection(ffffffff,7fa00000) ret=2ae6a7af
000d:Ret  ntdll.NtUnmapViewOfSection() retval=00000000 ret=2ae6a7af
000d:Ret  kernel32.UnmapViewOfFile() retval=00000001 ret=65f0f520
000d:Call kernel32.CloseHandle(0000018c) ret=65f0f52e
000d:Call ntdll.NtClose(0000018c) ret=2ae4e839
000d:Ret  ntdll.NtClose() retval=00000000 ret=2ae4e839
000d:Ret  kernel32.CloseHandle() retval=00000001 ret=65f0f52e
000d:Call kernel32.CloseHandle(00000190) ret=65f0f53c
000d:Call ntdll.NtClose(00000190) ret=2ae4e839
000d:Ret  ntdll.NtClose() retval=00000000 ret=2ae4e839
000d:Ret  kernel32.CloseHandle() retval=00000001 ret=65f0f53c
000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006468) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call ntdll.RtlFreeHeap(80000000,00000000,8000a7f0) ret=65f01bb6
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6
000d:Call kernel32.SetErrorMode(00008001) ret=30058e03
000d:Ret  kernel32.SetErrorMode() retval=00000001 ret=30058e03
000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6
000d:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6
000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2
000d:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2
000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6
000d:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6
000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2
000d:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2
000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6
000d:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6
000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2
000d:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2
000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6
000d:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6
000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2
000d:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2
000d:Call kernel32.GetLastError() ret=3000caa6
000d:Ret  kernel32.GetLastError() retval=00000000 ret=3000caa6
000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4
000d:Ret  kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4
000d:Call kernel32.SetLastError(00000000) ret=3000cac1
000d:Ret  kernel32.SetLastError() retval=00000000 ret=3000cac1
000d:Call kernel32.GetLastError() ret=3000caa6
000d:Ret  kernel32.GetLastError() retval=00000000 ret=3000caa6
000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4
000d:Ret  kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4
000d:Call kernel32.SetLastError(00000000) ret=3000cac1
000d:Ret  kernel32.SetLastError() retval=00000000 ret=3000cac1
000d:Call kernel32.GetLastError() ret=3000caa6
000d:Ret  kernel32.GetLastError() retval=00000000 ret=3000caa6
000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4
000d:Ret  kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4
000d:Call kernel32.SetLastError(00000000) ret=3000cac1
000d:Ret  kernel32.SetLastError() retval=00000000 ret=3000cac1
000d:Call kernel32.GetLastError() ret=3000caa6
000d:Ret  kernel32.GetLastError() retval=00000000 ret=3000caa6
000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4
000d:Ret  kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4
000d:Call kernel32.SetLastError(00000000) ret=3000cac1
000d:Ret  kernel32.SetLastError() retval=00000000 ret=3000cac1
000d:Call kernel32.GlobalFree(65376b0a) ret=300a005c
000d:Call ntdll.RtlLockHeap(65300000) ret=2ae36077
000d:Ret  ntdll.RtlLockHeap() retval=00000001 ret=2ae36077
000d:Call ntdll.RtlFreeHeap(65300000,00000000,6536c9b0) ret=2ae35b26
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=2ae35b26
000d:Call ntdll.RtlFreeHeap(65300000,00000000,65376b08) ret=2ae35b26
000d:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=2ae35b26
000d:Call ntdll.RtlUnlockHeap(65300000) ret=2ae360fb
000d:Ret  ntdll.RtlUnlockHeap() retval=00000001 ret=2ae360fb
000d:Ret  kernel32.GlobalFree() retval=00000000 ret=300a005c
000d:Call kernel32.GetLastError() ret=3000caa6
000d:Ret  kernel32.GetLastError() retval=00000000 ret=3000caa6
000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4
000d:Ret  kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4
000d:Call kernel32.SetLastError(00000000) ret=3000cac1
000d:Ret  kernel32.SetLastError() retval=00000000 ret=3000cac1
000d:Call kernel32.GetLastError() ret=3000caa6
000d:Ret  kernel32.GetLastError() retval=00000000 ret=3000caa6
000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4
000d:Ret  kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4
000d:Call kernel32.SetLastError(00000000) ret=3000cac1
000d:Ret  kernel32.SetLastError() retval=00000000 ret=3000cac1
000d:Call user32.SetFocus(00020054) ret=30b901aa
000d:Ret  user32.SetFocus() retval=00020054 ret=30b901aa
000d:Call user32.InvalidateRect(00020048,4087d7ec,00000008) ret=309de42c
000d:Call kernel32._EnterSysLevel(4d4e4f60) ret=4d489f34
trace:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): thread d count before 0
err:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): Holding 0x12b298c0, level 3.
Expect deadlock!
000d:Call ntdll.RtlEnterCriticalSection(4d4e4f60) ret=2ae60c48
000d:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=2ae60c48
trace:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): thread d count after  1
000d:Ret  kernel32._EnterSysLevel() retval=2aedea00 ret=4d489f34
000d:Call kernel32._LeaveSysLevel(4d4e4f60) ret=4d489f58
trace:syslevel:_LeaveSysLevel (0x4d4e4f60, level 2): thread d count before 1
000d:Call ntdll.RtlLeaveCriticalSection(4d4e4f60) ret=2ae60d60
000d:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=2ae60d60
trace:syslevel:_LeaveSysLevel (0x4d4e4f60, level 2): thread d count after  0
000d:Ret  kernel32._LeaveSysLevel() retval=0000004d ret=4d489f58
000d:Call ntdll.RtlAllocateHeap(65300000,00000000,00000040) ret=4d48d3bb
000d:Ret  ntdll.RtlAllocateHeap() retval=65377790 ret=4d48d3bb
000d:Call kernel32._EnterSysLevel(4d4e4f60) ret=4d489f34
trace:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): thread d count before 0
err:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): Holding 0x12b298c0, level 3.
Expect deadlock!


-- 
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the wine-bugs mailing list