Regression in latest CVS

Vitaliy Margolen wine-devel at kievinfo.com
Sat Mar 22 10:46:46 CST 2003


I have a problem with latest CVS in the past several days. Every app locking up.
Any suggestions where should I look. It's not a dead loop. Something happening,
according to trace.

Here is the trace where I think the problem starts:


0009:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=0040f8d5
0009:Call user32.IsWindowVisible(00010021) ret=00444671
0009:Call kernel32._EnterSysLevel(4071cc58) ret=406c6793
0009:trace:win32:_EnterSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count before 0
0009:trace:win32:_EnterSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count after  1
0009:Ret  kernel32._EnterSysLevel() retval=400d9d20 ret=406c6793
0009:Call kernel32._LeaveSysLevel(4071cc58) ret=406c67b3
0009:trace:win32:_LeaveSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count before 1
0009:trace:win32:_LeaveSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count after  0
0009:Ret  kernel32._LeaveSysLevel() retval=00000063 ret=406c67b3
0009:Ret  user32.IsWindowVisible() retval=00000000 ret=00444671
0009:Call ntdll.RtlEnterCriticalSection(41370830) ret=0040b6c4
0009:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=0040b6c4
0009:trace:seh:EXC_RtlRaiseException code=c0000005 flags=0 addr=0x40eeb2
0009:trace:seh:EXC_RtlRaiseException  info[0]=00000000
0009:trace:seh:EXC_RtlRaiseException  info[1]=0000000c
0009: queue_exception_event( first=1, record={context={flags=00000000,eax=00000000,ebx=00457bec,ecx=400f8600,edx=400f2c30,esi=413710cc,edi=00457bec,ebp=40592d04,eip=0040eeb2,esp=40592ce4,eflags=00010246,cs=0023,ds=002b,es=002b,fs=008f,gs=004f,dr0=00000000,dr1=00000000,dr2=00000000,dr3=00000000,dr6=00000000,dr7=00000000,float={00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000}},rec={code=c0000005,flags=0,rec=(nil),addr=0x40eeb2,params={0,c}} )
0009: queue_exception_event() = 0 { handle=(nil) }
0009:trace:seh:EXC_CallHandler calling handler at 0x40f106 code=c0000005 flags=0
0009:trace:seh:EXC_CallHandler handler returned 1
0009:trace:seh:EXC_CallHandler calling handler at 0x43cfa8 code=c0000005 flags=0
0009:trace:seh:EXC_CallHandler handler returned 1
0009:trace:seh:EXC_CallHandler calling handler at 0x43cfe0 code=c0000005 flags=0
0009:trace:seh:EXC_CallHandler handler returned 1
0009:trace:seh:EXC_CallHandler calling handler at 0x43d000 code=c0000005 flags=0
0009:trace:seh:EXC_CallHandler handler returned 1
0009:trace:seh:EXC_CallHandler calling handler at 0x402ffd code=c0000005 flags=0
0009:Call user32.LoadStringA(00400000,0000ffd0,40480334,00000400) ret=00405712
0009:trace:resource:LoadStringA instance = 0x400000, id = ffd0, buffer = 40480334, length = 1024
0009:Call ntdll.RtlAllocateHeap(40240000,00000000,00000800) ret=406e9eb6
0009:trace:heap:RtlAllocateHeap (0x40240000,00000002,00000800): returning 4027d068
0009:Ret  ntdll.RtlAllocateHeap() retval=4027d068 ret=406e9eb6
0009:trace:resource:LoadStringW instance = 0x400000, id = ffd0, buffer = 4027d068, length = 1024
0009:Call kernel32.FindResourceW(00400000,00000ffe,00000006) ret=406e9d4d
0009:trace:resource:RES_FindResource2 (0x400000, 00000006, 00000ffe, 0000, W, PE)
0009:Ret  kernel32.FindResourceW() retval=00468998 ret=406e9d4d
0009:Call kernel32.LoadResource(00400000,00468998) ret=406e9d5c
0009:trace:resource:RES_LoadResource (0x400000, 0x468998, PE)
0009:Ret  kernel32.LoadResource() retval=0046c6f0 ret=406e9d5c
0009:Call kernel32.LockResource(0046c6f0) ret=406e9d6a
0009:trace:resource:LockResource (0x46c6f0)
0009:Ret  kernel32.LockResource() retval=0046c6f0 ret=406e9d6a
0009:trace:resource:LoadStringW strlen = 4
0009:trace:resource:LoadStringW L"Read" loaded !
0009:Call kernel32.WideCharToMultiByte(00000000,00000000,4027d068 L"Read",00000004,40480334,000003ff,00000000,00000000) ret=406e9eee
0009:Ret  kernel32.WideCharToMultiByte() retval=00000004 ret=406e9eee
0009:trace:resource:LoadStringA "Read" loaded !
0009:Call ntdll.RtlFreeHeap(40240000,00000000,4027d068) ret=406e9f43
0009:trace:heap:RtlFreeHeap (0x40240000,00000002,4027d068): returning TRUE
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=406e9f43
0009:Ret  user32.LoadStringA() retval=00000004 ret=00405712
0009:Call kernel32.VirtualQuery(0040eeb2,404808a4,0000001c) ret=0040a8c0
0009:Ret  kernel32.VirtualQuery() retval=0000001c ret=0040a8c0
0009:Call kernel32.GetModuleFileNameA(00400000,4048079f,00000105) ret=0040a8e2
0009:trace:heap:RtlAllocateHeap (0x40240000,00000002,00000210): returning 4027d068
0009:trace:string:lstrcpynW (0x4027d068, L"F:\\wine\\Virtual_Listview\\virtuallistview.exe", 261)
0009:trace:module:GetModuleFileNameW L"F:\\wine\\Virtual_Listview\\virtuallistview.exe"
0009:trace:heap:RtlFreeHeap (0x40240000,00000002,4027d068): returning TRUE
0009:Ret  kernel32.GetModuleFileNameA() retval=0000002c ret=0040a8e2
0009:Call user32.LoadStringA(00400000,0000ffdb,4048032c,00000400) ret=00405712
0009:trace:resource:LoadStringA instance = 0x400000, id = ffdb, buffer = 4048032c, length = 1024
0009:Call ntdll.RtlAllocateHeap(40240000,00000000,00000800) ret=406e9eb6
0009:trace:heap:RtlAllocateHeap (0x40240000,00000002,00000800): returning 4027d068
0009:Ret  ntdll.RtlAllocateHeap() retval=4027d068 ret=406e9eb6
0009:trace:resource:LoadStringW instance = 0x400000, id = ffdb, buffer = 4027d068, length = 1024
0009:Call kernel32.FindResourceW(00400000,00000ffe,00000006) ret=406e9d4d
0009:trace:resource:RES_FindResource2 (0x400000, 00000006, 00000ffe, 0000, W, PE)
0009:Ret  kernel32.FindResourceW() retval=00468998 ret=406e9d4d
0009:Call kernel32.LoadResource(00400000,00468998) ret=406e9d5c
0009:trace:resource:RES_LoadResource (0x400000, 0x468998, PE)
0009:Ret  kernel32.LoadResource() retval=0046c6f0 ret=406e9d5c
0009:Call kernel32.LockResource(0046c6f0) ret=406e9d6a
0009:trace:resource:LockResource (0x46c6f0)
0009:Ret  kernel32.LockResource() retval=0046c6f0 ret=406e9d6a
0009:trace:resource:LoadStringW strlen = 63
0009:trace:resource:LoadStringW L"Access violation at address %p in module '%s'. %s of address %p" loaded !
0009:Call kernel32.WideCharToMultiByte(00000000,00000000,4027d068 L"Access violation at address %p in module '%s'. %s of address %p",0000003f,4048032c,000003ff,00000000,00000000) ret=406e9eee
0009:Ret  kernel32.WideCharToMultiByte() retval=0000003f ret=406e9eee
0009:trace:resource:LoadStringA "Access violation at address %p in module '%s'. %s of address %p" loaded !
0009:Call ntdll.RtlFreeHeap(40240000,00000000,4027d068) ret=406e9f43
0009:trace:heap:RtlFreeHeap (0x40240000,00000002,4027d068): returning TRUE
0009:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=406e9f43
0009:Ret  user32.LoadStringA() retval=0000003f ret=00405712
0009:Call ntdll.RtlUnwind(40592d30,00403217,404809c8,00000000) ret=00403217 fs=008f
 eax=404809c8 ebx=4048090c ecx=0040eeb2 edx=40592d30 esi=404809c8 edi=400dbcc1
 ebp=40480928 esp=404808d8 ds=002b es=002b gs=0000 flags=00000246
0009:trace:seh:EXC_RtlUnwind code=c0000005 flags=2




More information about the wine-devel mailing list