[Bug 3056] New: apps that return to the prompt immediately

Wine Bugs wine-bugs at winehq.org
Sat Jun 11 09:26:39 CDT 2005


http://bugs.winehq.org/show_bug.cgi?id=3056

           Summary: apps that return to the prompt immediately
           Product: Wine
           Version: CVS
          Platform: PC
        OS/Version: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: wine-binary
        AssignedTo: wine-bugs at winehq.org
        ReportedBy: xerox_xerox2000 at yahoo.co.uk


Hi, i encountered a few apps that just immediately return to the prompt, without
leaving error messages or whatsoever. Yahoo messenger is one of them, and
ispqVideochat (http://www.ispq.nl/html/download.asp) For the last one i got a
+relay debug log (last lines), but i wasn't able to pinpoint the cause of the error

0009:Call user32.MessageBeep(00000000) ret=660728b9
0009:Call advapi32.RegOpenKeyW(00000040,5a2fce00 L"Control
Panel\\Sound",4c70ee8c) ret=5a2ce19d
0009:Call ntdll.RtlInitUnicodeString(4c70ed80,5a2fce00 L"Control Panel\\Sound")
ret=202772e2
0009:Ret  ntdll.RtlInitUnicodeString() retval=00000028 ret=202772e2
0009:Call ntdll.NtOpenKey(4c70ee8c,000f003f,4c70ed88) ret=202772f1
0009:Ret  ntdll.NtOpenKey() retval=c0000034 ret=202772f1
0009:Call ntdll.RtlNtStatusToDosError(c0000034) ret=202772f7
0009:Ret  ntdll.RtlNtStatusToDosError() retval=00000002 ret=202772f7
0009:Ret  advapi32.RegOpenKeyW() retval=00000002 ret=5a2ce19d
0009:Call advapi32.RegOpenKeyW(80000001,5a2fce00 L"Control
Panel\\Sound",4c70ee8c) ret=5a2ce1ad
0009:Call ntdll.RtlInitUnicodeString(4c70ed80,5a2fce00 L"Control Panel\\Sound")
ret=202772e2
0009:Ret  ntdll.RtlInitUnicodeString() retval=00000028 ret=202772e2
0009:Call ntdll.NtOpenKey(4c70ee8c,000f003f,4c70ed88) ret=202772f1
0009:Ret  ntdll.NtOpenKey() retval=00000000 ret=202772f1
0009:Call ntdll.RtlNtStatusToDosError(00000000) ret=202772f7
0009:Ret  ntdll.RtlNtStatusToDosError() retval=00000000 ret=202772f7
0009:Ret  advapi32.RegOpenKeyW() retval=00000000 ret=5a2ce1ad
0009:Call advapi32.RegQueryValueExW(0000004c,5a2fcdf6
L"Beep",00000000,4c70ee88,4c70f828,4c70eea8) ret=5a2ce1c9
0009:Call ntdll.RtlInitUnicodeString(4c70eca0,5a2fcdf6 L"Beep") ret=20278bfe
0009:Ret  ntdll.RtlInitUnicodeString() retval=0000000a ret=20278bfe
0009:Call
ntdll.NtQueryValueKey(0000004c,4c70eca0,00000002,4c70eca8,00000016,4c70ec9c)
ret=20278c4a
0009:Ret  ntdll.NtQueryValueKey() retval=c0000034 ret=20278c4a
0009:Call ntdll.RtlNtStatusToDosError(c0000034) ret=20278caa
0009:Ret  ntdll.RtlNtStatusToDosError() retval=00000002 ret=20278caa
0009:Ret  advapi32.RegQueryValueExW() retval=00000002 ret=5a2ce1c9
0009:Call advapi32.RegCloseKey(0000004c) ret=5a2ce1dc
0009:Call ntdll.NtClose(0000004c) ret=20278046
0009:Ret  ntdll.NtClose() retval=00000000 ret=20278046
0009:Call ntdll.RtlNtStatusToDosError(00000000) ret=2027804c
0009:Ret  ntdll.RtlNtStatusToDosError() retval=00000000 ret=2027804c
0009:Ret  advapi32.RegCloseKey() retval=00000000 ret=5a2ce1dc
0009:Call winex11.drv.Beep() ret=5a2c0852
0009:Call kernel32.TlsGetValue(00000000) ret=30516eba
0009:Ret  kernel32.TlsGetValue() retval=77e0c360 ret=30516eba
0009:Ret  winex11.drv.Beep() retval=00000000 ret=5a2c0852
0009:Ret  user32.MessageBeep() retval=00000001 ret=660728b9
0009:Call kernel32.TlsGetValue(00000002) ret=660726d2
0009:Ret  kernel32.TlsGetValue() retval=00000000 ret=660726d2
0009:Call kernel32.TlsGetValue(00000002) ret=6600382a
0009:Ret  kernel32.TlsGetValue() retval=00000000 ret=6600382a
0009:Call kernel32.TlsGetValue(00000002) ret=6600382a
0009:Ret  kernel32.TlsGetValue() retval=00000000 ret=6600382a
0009:Call ntdll.RtlAllocateHeap(6fd50000,00000000,00000400) ret=66072899
0009:Ret  ntdll.RtlAllocateHeap() retval=6fd50098 ret=66072899
0009:Call user32.LoadStringA(66000000,000059d9,6fd50098,00000400) ret=66072c1a
0009:Call ntdll.RtlAllocateHeap(77de0000,00000000,00000800) ret=5a2c893e
0009:Ret  ntdll.RtlAllocateHeap() retval=77e2a510 ret=5a2c893e
0009:Call kernel32.FindResourceW(66000000,0000059e,00000006) ret=5a2c87c6
0009:Call ntdll.LdrFindResource_U(66000000,4c70f9b4,00000003,4c70f8f0) ret=201d1159
0009:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=201d1159
0009:Ret  kernel32.FindResourceW() retval=66113108 ret=5a2c87c6
0009:Call kernel32.LoadResource(66000000,66113108) ret=5a2c87d7
0009:Call ntdll.LdrAccessResource(66000000,66113108,4c70fa08,00000000) ret=201d1fc0
0009:Ret  ntdll.LdrAccessResource() retval=00000000 ret=201d1fc0
0009:Ret  kernel32.LoadResource() retval=6613a938 ret=5a2c87d7
0009:Call kernel32.LockResource(6613a938) ret=5a2c87e3
0009:Ret  kernel32.LockResource() retval=6613a938 ret=5a2c87e3
0009:Call kernel32.WideCharToMultiByte(00000000,00000000,77e2a510 L"Unexpected
error; quitting",0000001a,6fd50098,000003ff,00000000,00000000) ret=5a2c89db
0009:Ret  kernel32.WideCharToMultiByte() retval=0000001a ret=5a2c89db
0009:Call ntdll.RtlFreeHeap(77de0000,00000000,77e2a510) ret=5a2c8970
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=5a2c8970
0009:Ret  user32.LoadStringA() retval=0000001a ret=66072c1a
0009:Call kernel32.lstrlenA(6fd50098 "Unexpected error; quitting") ret=66072c63
0009:Ret  kernel32.lstrlenA() retval=0000001a ret=66072c63
0009:Call user32.CharNextA(6fd50098 "Unexpected error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000055) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd50099 ret=66072d19
0009:Call user32.CharNextA(6fd50099 "nexpected error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(0000006e) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd5009a ret=66072d19
0009:Call user32.CharNextA(6fd5009a "expected error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000065) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd5009b ret=66072d19
0009:Call user32.CharNextA(6fd5009b "xpected error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000078) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd5009c ret=66072d19
0009:Call user32.CharNextA(6fd5009c "pected error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000070) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd5009d ret=66072d19
0009:Call user32.CharNextA(6fd5009d "ected error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000065) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd5009e ret=66072d19
0009:Call user32.CharNextA(6fd5009e "cted error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000063) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd5009f ret=66072d19
0009:Call user32.CharNextA(6fd5009f "ted error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000074) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a0 ret=66072d19
0009:Call user32.CharNextA(6fd500a0 "ed error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000065) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a1 ret=66072d19
0009:Call user32.CharNextA(6fd500a1 "d error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000064) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a2 ret=66072d19
0009:Call user32.CharNextA(6fd500a2 " error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000020) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a3 ret=66072d19
0009:Call user32.CharNextA(6fd500a3 "error; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000065) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a4 ret=66072d19
0009:Call user32.CharNextA(6fd500a4 "rror; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000072) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a5 ret=66072d19
0009:Call user32.CharNextA(6fd500a5 "ror; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000072) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a6 ret=66072d19
0009:Call user32.CharNextA(6fd500a6 "or; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(0000006f) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a7 ret=66072d19
0009:Call user32.CharNextA(6fd500a7 "r; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000072) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a8 ret=66072d19
0009:Call user32.CharNextA(6fd500a8 "; quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(0000003b) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500a9 ret=66072d19
0009:Call user32.CharNextA(6fd500a9 " quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000020) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500aa ret=66072d19
0009:Call user32.CharNextA(6fd500aa "quitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000071) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500ab ret=66072d19
0009:Call user32.CharNextA(6fd500ab "uitting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000075) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500ac ret=66072d19
0009:Call user32.CharNextA(6fd500ac "itting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000069) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500ad ret=66072d19
0009:Call user32.CharNextA(6fd500ad "tting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000074) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500ae ret=66072d19
0009:Call user32.CharNextA(6fd500ae "ting") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000074) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500af ret=66072d19
0009:Call user32.CharNextA(6fd500af "ing") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000069) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500b0 ret=66072d19
0009:Call user32.CharNextA(6fd500b0 "ng") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(0000006e) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500b1 ret=66072d19
0009:Call user32.CharNextA(6fd500b1 "g") ret=66072d19
0009:Call kernel32.IsDBCSLeadByte(00000067) ret=5a2aeebd
0009:Ret  kernel32.IsDBCSLeadByte() retval=00000000 ret=5a2aeebd
0009:Ret  user32.CharNextA() retval=6fd500b2 ret=66072d19
0009:Call user32.MessageBeep(00000000) ret=6607292b
0009:Call winex11.drv.Beep() ret=5a2c0852
0009:Call kernel32.TlsGetValue(00000000) ret=30516eba
0009:Ret  kernel32.TlsGetValue() retval=77e0c360 ret=30516eba
0009:Ret  winex11.drv.Beep() retval=00000000 ret=5a2c0852
0009:Ret  user32.MessageBeep() retval=00000001 ret=6607292b
0009:Call user32.GetCapture() ret=660226d7
0009:Ret  user32.GetCapture() retval=00000000 ret=660226d7
0009:Call user32.GetCapture() ret=6606f689
0009:Ret  user32.GetCapture() retval=00000000 ret=6606f689
0009:Call user32.ReleaseCapture() ret=6606f6fc
0009:Ret  user32.ReleaseCapture() retval=00000000 ret=6606f6fc
0009:Call kernel32.TlsGetValue(00000002) ret=660726d2
0009:Ret  kernel32.TlsGetValue() retval=00000000 ret=660726d2
0009:Call kernel32.TlsGetValue(00000002) ret=6600382a
0009:Ret  kernel32.TlsGetValue() retval=00000000 ret=6600382a
0009:Call ntdll.RtlFreeHeap(6fd50000,00000000,6fd50098) ret=660333bb
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=660333bb
0009:Call kernel32.ExitProcess(00000000) ret=6600ded0
0009:Call ntdll.LdrShutdownProcess() ret=201c793d
0009:Call PE DLL (proc=0x66001ad8,module=0x66000000
L"MSVBVM60.DLL",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.TlsGetValue(00000002) ret=6600371e
0009:Ret  kernel32.TlsGetValue() retval=00000000 ret=6600371e
0009:Call kernel32.GetCurrentThreadId() ret=66003538
0009:Ret  kernel32.GetCurrentThreadId() retval=00000009 ret=66003538
0009:Call kernel32.TlsGetValue(00000002) ret=6600371e
0009:Ret  kernel32.TlsGetValue() retval=00000000 ret=6600371e
0009:Call kernel32.GetCurrentThreadId() ret=66003538
0009:Ret  kernel32.GetCurrentThreadId() retval=00000009 ret=66003538
0009:Call kernel32.TlsFree(00000002) ret=6600374b
0009:Call ntdll.RtlAcquirePebLock() ret=201c7c33
0009:Ret  ntdll.RtlAcquirePebLock() retval=00000000 ret=201c7c33
0009:Call ntdll.RtlAreBitsSet(269538f0,00000002,00000001) ret=201c7c91
0009:Ret  ntdll.RtlAreBitsSet() retval=00000001 ret=201c7c91
0009:Call ntdll.RtlClearBits(269538f0,00000002,00000001) ret=201c7cbf
0009:Ret  ntdll.RtlClearBits() retval=ffff00ff ret=201c7cbf
0009:Call ntdll.NtSetInformationThread(fffffffe,0000000a,4c70fb68,00000004)
ret=201c7cd2
0009:Ret  ntdll.NtSetInformationThread() retval=00000000 ret=201c7cd2
0009:Call ntdll.RtlReleasePebLock() ret=201c7c6d
0009:Ret  ntdll.RtlReleasePebLock() retval=00000000 ret=201c7c6d
0009:Ret  kernel32.TlsFree() retval=00000001 ret=6600374b
0009:Call kernel32.HeapDestroy(6fd50000) ret=66003783
0009:Call ntdll.RtlDestroyHeap(6fd50000) ret=201ac4e1
0009:Ret  ntdll.RtlDestroyHeap() retval=00000000 ret=201ac4e1
0009:Ret  kernel32.HeapDestroy() retval=00000001 ret=66003783
0009:Call ntdll.RtlDeleteCriticalSection(6610fc6c) ret=66019863
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66019863
0009:Call ntdll.RtlDeleteCriticalSection(6610f664) ret=66003907
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003907
0009:Call ntdll.RtlDeleteCriticalSection(6610f644) ret=66003924
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003924
0009:Call ntdll.RtlDeleteCriticalSection(6610f59c) ret=66003941
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003941
0009:Call kernel32.CloseHandle(00000044) ret=660039cc
0009:Call ntdll.NtClose(00000044) ret=201c8251
0009:Ret  ntdll.NtClose() retval=00000000 ret=201c8251
0009:Ret  kernel32.CloseHandle() retval=00000001 ret=660039cc
0009:Call ntdll.RtlDeleteCriticalSection(6610f564) ret=660039e4
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=660039e4
0009:Call ntdll.RtlDeleteCriticalSection(6610f544) ret=660039f1
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=660039f1
0009:Call ntdll.RtlDeleteCriticalSection(6610f524) ret=660039fe
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=660039fe
0009:Call ntdll.RtlDeleteCriticalSection(6610f4fc) ret=66003978
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003978
0009:Call ntdll.RtlDeleteCriticalSection(6610f4dc) ret=66003987
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003987
0009:Call ntdll.RtlDeleteCriticalSection(6610f4bc) ret=66003994
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003994
0009:Call ntdll.RtlDeleteCriticalSection(6610f49c) ret=660039a1
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=660039a1
0009:Call kernel32.InitializeCriticalSection(6fe70b70) ret=66001f4a
0009:Call ntdll.RtlInitializeCriticalSection(6fe70b70) ret=201d7dc8
0009:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=201d7dc8
0009:Ret  kernel32.InitializeCriticalSection() retval=00000000 ret=66001f4a
0009:Call kernel32.InitializeCriticalSection(6fe70b90) ret=66001f4a
0009:Call ntdll.RtlInitializeCriticalSection(6fe70b90) ret=201d7dc8
0009:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=201d7dc8
0009:Ret  kernel32.InitializeCriticalSection() retval=00000000 ret=66001f4a
0009:Call kernel32.InitializeCriticalSection(6fe70bb0) ret=66001f4a
0009:Call ntdll.RtlInitializeCriticalSection(6fe70bb0) ret=201d7dc8
0009:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=201d7dc8
0009:Ret  kernel32.InitializeCriticalSection() retval=00000000 ret=66001f4a
0009:Call kernel32.InitializeCriticalSection(6fe70bd0) ret=66001f4a
0009:Call ntdll.RtlInitializeCriticalSection(6fe70bd0) ret=201d7dc8
0009:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=201d7dc8
0009:Ret  kernel32.InitializeCriticalSection() retval=00000000 ret=66001f4a
0009:Call ntdll.RtlFreeHeap(70280000,00000000,702807a0) ret=66002764
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=66002764
0009:Call ntdll.RtlDeleteCriticalSection(6fe70b70) ret=66003d1e
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003d1e
0009:Call ntdll.RtlDeleteCriticalSection(6fe70180) ret=66003d1e
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003d1e
0009:Call ntdll.RtlDeleteCriticalSection(6fe70b90) ret=66003d1e
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003d1e
0009:Call ntdll.RtlDeleteCriticalSection(6fe70bb0) ret=66003d1e
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003d1e
0009:Call ntdll.RtlDeleteCriticalSection(6fe70bd0) ret=66003d1e
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003d1e
0009:Call ntdll.RtlDeleteCriticalSection(6610d148) ret=66003cde
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003cde
0009:Call ntdll.RtlDeleteCriticalSection(6610d160) ret=66003ce7
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003ce7
0009:Call ntdll.RtlDeleteCriticalSection(6610d130) ret=66003cef
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003cef
0009:Call ntdll.RtlDeleteCriticalSection(6610d118) ret=66003cf8
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=66003cf8
0009:Call kernel32.TlsFree(00000001) ret=66003cac
0009:Call ntdll.RtlAcquirePebLock() ret=201c7c33
0009:Ret  ntdll.RtlAcquirePebLock() retval=00000000 ret=201c7c33
0009:Call ntdll.RtlAreBitsSet(269538f0,00000001,00000001) ret=201c7c91
0009:Ret  ntdll.RtlAreBitsSet() retval=00000001 ret=201c7c91
0009:Call ntdll.RtlClearBits(269538f0,00000001,00000001) ret=201c7cbf
0009:Ret  ntdll.RtlClearBits() retval=ffff00ff ret=201c7cbf
0009:Call ntdll.NtSetInformationThread(fffffffe,0000000a,4c70fb78,00000004)
ret=201c7cd2
0009:Ret  ntdll.NtSetInformationThread() retval=00000000 ret=201c7cd2
0009:Call ntdll.RtlReleasePebLock() ret=201c7c6d
0009:Ret  ntdll.RtlReleasePebLock() retval=00000000 ret=201c7c6d
0009:Ret  kernel32.TlsFree() retval=00000001 ret=66003cac
0009:Call kernel32.VirtualFree(6fe70000,00000000,00008000) ret=66003d86
0009:Call ntdll.NtFreeVirtualMemory(ffffffff,4c70fb48,4c70fb4c,00008000)
ret=201e3bc4
0009:Ret  ntdll.NtFreeVirtualMemory() retval=00000000 ret=201e3bc4
0009:Ret  kernel32.VirtualFree() retval=00000001 ret=66003d86
0009:Call kernel32.HeapDestroy(70280000) ret=66003d9c
0009:Call ntdll.RtlDestroyHeap(70280000) ret=201ac4e1
0009:Ret  ntdll.RtlDestroyHeap() retval=00000000 ret=201ac4e1
0009:Ret  kernel32.HeapDestroy() retval=00000001 ret=66003d9c
0009:Ret  PE DLL (proc=0x66001ad8,module=0x66000000
L"MSVBVM60.DLL",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x408b762a,module=0x408b0000
L"oleaut32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.__wine_dll_unregister_16(40911880) ret=408ba560
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000017 ret=408ba560
0009:Call kernel32.__wine_dll_unregister_16(40912a60) ret=408ba7a0
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000018 ret=408ba7a0
0009:Ret  PE DLL (proc=0x408b762a,module=0x408b0000
L"oleaut32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x3e8e1ed2,module=0x3e8e0000
L"ole32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call user32.UnregisterClassW(3e924a20 L"OleMainThreadWndClass 0x########
",3e8e0000) ret=3e8f46c9
0009:Call kernel32.GlobalFindAtomW(3e924a20 L"OleMainThreadWndClass 0x########
") ret=5a2839de
0009:Ret  kernel32.GlobalFindAtomW() retval=0000c016 ret=5a2839de
0009:Call kernel32._EnterSysLevel(5a31d5e0) ret=5a2d9ed8
0009:Ret  kernel32._EnterSysLevel() retval=20250340 ret=5a2d9ed8
0009:Call kernel32.UnMapLS(00000000) ret=5a282fd4
0009:Ret  kernel32.UnMapLS() retval=2692a3d3 ret=5a282fd4
0009:Call ntdll.RtlFreeHeap(77de0000,00000000,00000000) ret=5a282fe7
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=5a282fe7
0009:Call ntdll.RtlFreeHeap(77de0000,00000000,77e27fb0) ret=5a282ff8
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=5a282ff8
0009:Call kernel32._LeaveSysLevel(5a31d5e0) ret=5a2d9efc
0009:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=5a2d9efc
0009:Ret  user32.UnregisterClassW() retval=00000001 ret=3e8f46c9
0009:Call kernel32.__wine_dll_unregister_16(3e930ac0) ret=3e8e53ec
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000010 ret=3e8e53ec
0009:Call kernel32.__wine_dll_unregister_16(3e932f40) ret=3e8e66d4
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000011 ret=3e8e66d4
0009:Call kernel32.__wine_dll_unregister_16(3e934700) ret=3e8e6828
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000012 ret=3e8e6828
0009:Call kernel32.__wine_dll_unregister_16(3e9348a0) ret=3e8e6aa4
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000013 ret=3e8e6aa4
0009:Call kernel32.__wine_dll_unregister_16(3e934ba0) ret=3e8e6b3c
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000014 ret=3e8e6b3c
0009:Call kernel32.__wine_dll_unregister_16(3e934ca0) ret=3e8e6c74
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000015 ret=3e8e6c74
0009:Call kernel32.__wine_dll_unregister_16(3e934e40) ret=3e8e7438
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000016 ret=3e8e7438
0009:Ret  PE DLL (proc=0x3e8e1ed2,module=0x3e8e0000
L"ole32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x202b17dc,module=0x202a0000
L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.CloseHandle(0000003c) ret=202c2f0b
0009:Call ntdll.NtClose(0000003c) ret=201c8251
0009:Ret  ntdll.NtClose() retval=00000000 ret=201c8251
0009:Ret  kernel32.CloseHandle() retval=00000001 ret=202c2f0b
0009:Ret  PE DLL (proc=0x202b17dc,module=0x202a0000
L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x202e793e,module=0x202e0000
L"iphlpapi.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call ntdll.RtlDeleteCriticalSection(202eff4c) ret=202e8488
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=202e8488
0009:Call ntdll.RtlFreeHeap(77de0000,00000000,00000000) ret=202e849e
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=202e849e
0009:Call ntdll.RtlFreeHeap(77de0000,00000000,00000000) ret=202e84b4
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=202e84b4
0009:Ret  PE DLL (proc=0x202e793e,module=0x202e0000
L"iphlpapi.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x5a26f4fe,module=0x5a260000
L"user32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.FreeLibrary(304f0000) ret=5a2da084
0009:Call ntdll.LdrUnloadDll(304f0000) ret=201bc3f2
0009:Ret  ntdll.LdrUnloadDll() retval=00000000 ret=201bc3f2
0009:Ret  kernel32.FreeLibrary() retval=00000001 ret=5a2da084
0009:Call kernel32.__wine_dll_unregister_16(5a305680) ret=5a272df4
0009:Ret  kernel32.__wine_dll_unregister_16() retval=0000000a ret=5a272df4
0009:Call kernel32.__wine_dll_unregister_16(5a305c80) ret=5a273428
0009:Ret  kernel32.__wine_dll_unregister_16() retval=0000000b ret=5a273428
0009:Call kernel32.__wine_dll_unregister_16(5a306720) ret=5a273774
0009:Ret  kernel32.__wine_dll_unregister_16() retval=0000000c ret=5a273774
0009:Call kernel32.__wine_dll_unregister_16(5a306b60) ret=5a2738b4
0009:Ret  kernel32.__wine_dll_unregister_16() retval=0000000d ret=5a2738b4
0009:Call kernel32.__wine_dll_unregister_16(5a306f00) ret=5a276324
0009:Ret  kernel32.__wine_dll_unregister_16() retval=0000000e ret=5a276324
0009:Ret  PE DLL (proc=0x5a26f4fe,module=0x5a260000
L"user32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x304f4000,module=0x304f0000
L"winex11.drv",reason=PROCESS_DETACH,res=0x1)
0009:Call ntdll.RtlDeleteCriticalSection(30547e20) ret=30526887
0009:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=30526887
0009:Call kernel32.TlsFree(00000000) ret=30526894
0009:Call ntdll.RtlAcquirePebLock() ret=201c7c33
0009:Ret  ntdll.RtlAcquirePebLock() retval=00000000 ret=201c7c33
0009:Call ntdll.RtlAreBitsSet(269538f0,00000000,00000001) ret=201c7c91
0009:Ret  ntdll.RtlAreBitsSet() retval=00000001 ret=201c7c91
0009:Call ntdll.RtlClearBits(269538f0,00000000,00000001) ret=201c7cbf
0009:Ret  ntdll.RtlClearBits() retval=fffffffe ret=201c7cbf
0009:Call ntdll.NtSetInformationThread(fffffffe,0000000a,4c70f994,00000004)
ret=201c7cd2
0009:Ret  ntdll.NtSetInformationThread() retval=00000000 ret=201c7cd2
0009:Call ntdll.RtlReleasePebLock() ret=201c7c6d
0009:Ret  ntdll.RtlReleasePebLock() retval=00000000 ret=201c7c6d
0009:Ret  kernel32.TlsFree() retval=00000001 ret=30526894
0009:Ret  PE DLL (proc=0x304f4000,module=0x304f0000
L"winex11.drv",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x204fd6fc,module=0x204f0000
L"imm32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call user32.UnregisterClassW(2050240c L"IME",00000000) ret=204fe7e0
0009:Call kernel32.GlobalFindAtomW(2050240c L"IME") ret=5a2839de
0009:Call ntdll.RtlNtStatusToDosError(c0000034) ret=20196e57
0009:Ret  ntdll.RtlNtStatusToDosError() retval=00000002 ret=20196e57
0009:Ret  kernel32.GlobalFindAtomW() retval=00000000 ret=5a2839de
0009:Ret  user32.UnregisterClassW() retval=00000000 ret=204fe7e0
0009:Call kernel32.__wine_dll_unregister_16(20504200) ret=204fe784
0009:Ret  kernel32.__wine_dll_unregister_16() retval=0000000f ret=204fe784
0009:Ret  PE DLL (proc=0x204fd6fc,module=0x204f0000
L"imm32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x685aca2c,module=0x685a0000
L"gdi32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.__wine_dll_unregister_16(685f0b80) ret=685ae8a8
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000007 ret=685ae8a8
0009:Call kernel32.__wine_dll_unregister_16(685f0c80) ret=685b0918
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000008 ret=685b0918
0009:Call kernel32.__wine_dll_unregister_16(685f47a0) ret=685b0b28
0009:Ret  kernel32.__wine_dll_unregister_16() retval=00000009 ret=685b0b28
0009:Ret  PE DLL (proc=0x685aca2c,module=0x685a0000
L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x2026db1a,module=0x20260000
L"advapi32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Ret  PE DLL (proc=0x2026db1a,module=0x20260000
L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x2018cac6,module=0x20180000
L"kernel32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Ret  PE DLL (proc=0x2018cac6,module=0x20180000
L"kernel32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x2690a8da,module=0x26900000
L"ntdll.dll",reason=PROCESS_DETACH,res=0x1)
0009:Ret  PE DLL (proc=0x2690a8da,module=0x26900000
L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Ret  ntdll.LdrShutdownProcess() retval=00000000 ret=201c793d

-- 
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the wine-bugs mailing list