[Bug 1027] "x11drv_main.c: X11DRV_CritSection" wait timed out

Wine Bugs wine-bugs at winehq.com
Mon Jun 23 05:44:40 CDT 2003


http://bugs.winehq.com/show_bug.cgi?id=1027





------- Additional Comments From z_god at wanadoo.nl  2003-23-06 05:44 -------
Bug comments restored from Gmane.org: 
 
The bug appears with both wine 20020710 and wine 20020904 on a SuSe 7.3 
machine, 
using a copy of a Windows 98 installation. 
The program is FITCH.EXE (see http://www-csli.stanford.edu/LPL ). 
It is not free, but can be obtained from me, if needed. 
 
Stdout output of the command 
 
wine  /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE 
 
After the follwing probably harmless problems (I have deleted repeated stuff): 
 
fixme:win32:CreateMailslotA ("\\\\.\\mailslot\\Openproof/Fitch 
1.0",520,100,(nil)): stub 
fixme:win32:CreateMailslotA ("\\\\.\\mailslot\\Z/\\usr\\local\\LPL\\LPL 
Software\\Fitch Folder\\FITCH.EXE",520,100,(nil)): stub 
fixme:ntdll:RtlAddAccessAllowedAce 
(0x405c58d4,0x00000002,0x000f003f,0x403bef78),stub! 
fixme:reg:RegFlushKey (48): stub 
fixme:win32:GetMailslotInfo (0001): stub 
fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen! 
fixme:win32:GetMailslotInfo (0001): stub 
 
then the error occurs (infinitely often): 
 
err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c: 
X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809df48 
wine: Unhandled exception, starting debugger... 
 
Unfortunately, the debugger window does not appear. 
With an earlier version of wine (20020710), it appears, and sometimes 
even the error does not appear. If needed, I can try to 
reconstruct the debugger output. 
 
Stderr Output of the command 
 
wine --debugmsg +relay /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE 
 
[snip] 
 
Some 400 lines of the section before the error occurs: 
 
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 
0809d330:Call kernel32.GetTickCount() ret=40fee0bb 
0809d330:Ret  kernel32.GetTickCount() retval=00014386 ret=40fee0bb 
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
080713c8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen! 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Ret  x11drv.MsgWaitForMultipleObjectsEx() retval=00000000 ret=408fd663 
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
080713c8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
080713c8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
080713c8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
080713c8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
080713c8:Call 
kernel32.WaitForMultipleObjectsEx(00000001,405c6368,00000000,00000000,00000000) 
ret=40b05dd3 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 
0809dfa8:Call user32.GetPropA(00010021,0000c01c) ret=1801785d 
080713c8:Ret  kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3 
080713c8:Ret  x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 
ret=408fd663 
080713c8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 
080713c8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 
080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
080713c8:Ret  kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27 
080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b 
080713c8:Ret  kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b 
0809dfa8:Ret  user32.GetPropA() retval=00000000 ret=1801785d 
0809dfa8:Call user32.CallNextHookEx(4b48008c,00000000,00000001,48846b34) 
ret=18017681 
0809dfa8:Ret  user32.CallNextHookEx() retval=00000000 ret=18017681 
0809dfa8:Ret  user32.PeekMessageA() retval=00000001 ret=180177b6 
0809dfa8:Call user32.TranslateMessage(48846c54) ret=180177e2 
0809dfa8:Ret  user32.TranslateMessage() retval=00000000 ret=180177e2 
0809dfa8:Call user32.DispatchMessageA(48846c54) ret=180177e9 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706ba) ret=408e660e 
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e660e 
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706c8) ret=408e662c 
0809dfa8:Ret  kernel32.HeapValidate() retval=00000001 ret=408e662c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c) 
ret=408b56d3 
080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
080713c8:Ret  kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27 
080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b 
080713c8:Ret  kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b 
080713c8:Call kernel32.ReleaseThunkLock(405c6544) ret=408fd6cc 
080713c8:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc 
080713c8:Ret  user32.PeekMessageA() retval=00000000 ret=004072c9 
080713c8:Call 
kernel32.GetMailslotInfo(00000001,00000000,405c6628,00000000,00000000) 
ret=00407051 
fixme:win32:GetMailslotInfo (0001): stub 
080713c8:Ret  kernel32.GetMailslotInfo() retval=00000001 ret=00407051 
080713c8:Call kernel32.ReadFile(00000001,405c6b0c,00000208,405c6620,00000000) 
ret=00407093 
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868 
L"theAwtToolkitWindow",00000010) ret=408e15b4 
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call window proc 0x18017410 
(hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000) 
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 
0809dfa8:Call user32.GetCursorPos(48846ad4) ret=18017440 
0809dfa8:Call x11drv.GetCursorPos(48846ad4) ret=408c6813 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
080713c8:Ret  kernel32.ReadFile() retval=00000000 ret=00407093 
080713c8:Call kernel32.Sleep(00000208) ret=00407100 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Ret  x11drv.GetCursorPos() retval=000001bf ret=408c6813 
0809dfa8:Ret  user32.GetCursorPos() retval=00000001 ret=18017440 
0809dfa8:Call user32.WindowFromPoint(00000224,000001bf) ret=18017450 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5 
0809dfa8:Ret  ntdll.RtlAllocateHeap() retval=403e8b40 ret=408dded5 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5 
0809dfa8:Ret  ntdll.RtlAllocateHeap() retval=403e8bc8 ret=408dded5 
0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8bc8) ret=408ddead 
0809dfa8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=408ddead 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003572) ret=408e660e 
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e660e 
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003580) ret=408e662c 
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e662c 
0809dfa8:Call kernel32.IsBadReadPtr16(18003580,0000000e) ret=408e6641 
0809dfa8:Ret  kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) 
ret=408b56d3 
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call window proc 0x18003580 
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 
0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=1800359b 
0809dfa8:Ret  user32.GetPropA() retval=412d1860 ret=1800359b 
0809dfa8:Call 
user32.CallWindowProcA(409225e0,00010023,00000084,00000000,01bf0224) 
ret=18004571 
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225d2) ret=408e660e 
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e660e 
0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225e0) ret=408e662c 
0809dfa8:Ret  kernel32.HeapValidate() retval=00000000 ret=408e662c 
0809dfa8:Call kernel32.IsBadReadPtr16(409225e0,0000000e) ret=408e6641 
0809dfa8:Ret  kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) 
ret=408b56d3 
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call window proc 0x409225e0 
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 
0809dfa8:Call user32.DefWindowProcA(00010023,00000084,00000000,01bf0224) 
ret=408e623b 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Ret  user32.DefWindowProcA() retval=00000001 ret=408e623b 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) 
ret=408b56d3 
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Ret  window proc 0x409225e0 
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 
retval=00000001 
0809dfa8:Ret  user32.CallWindowProcA() retval=00000001 ret=18004571 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) 
ret=408b56d3 
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Ret  window proc 0x18003580 
(hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 
retval=00000001 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e3da6 
0809dfa8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=408e3da6 
0809dfa8:Ret  user32.WindowFromPoint() retval=00010023 ret=18017450 
0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=18017465 
0809dfa8:Ret  user32.GetPropA() retval=412d1860 ret=18017465 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c) 
ret=408b56d3 
0809dfa8:Ret  kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3 
0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809dfa8:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868 
L"theAwtToolkitWindow",00000010) ret=408e15b4 
0809dfa8:Ret  kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 
0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809dfa8:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809dfa8:Ret  window proc 0x18017410 
(hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000) retval=00000000 
0809dfa8:Ret  user32.DispatchMessageA() retval=00000000 ret=180177e9 
0809dfa8:Call 
user32.PeekMessageA(48846c54,00000000,00000000,00000000,00000001) 
ret=180177f8 
0809dfa8:Call 
x11drv.MsgWaitForMultipleObjectsEx(00000000,00000000,00000000,00000000,00000000) 
ret=408fd663 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Call 
kernel32.WaitForMultipleObjectsEx(00000001,48846954,00000000,00000000,00000000) 
ret=40b05dd3 
0809dfa8:Ret  kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3 
0809dfa8:Ret  x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=408fd663 
0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 
0809dfa8:Ret  kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call kernel32.ReleaseThunkLock(48846b30) ret=408fd6cc 
0809dfa8:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc 
0809dfa8:Ret  user32.PeekMessageA() retval=00000000 ret=180177f8 
0809dfa8:Call user32.WaitMessage() ret=1801776a 
0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 
0809dfa8:Ret  kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 
0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 
0809dfa8:Ret  kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 
0809dfa8:Call kernel32.ReleaseThunkLock(48846a3c) ret=408cc817 
0809dfa8:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=408cc817 
0809dfa8:Call 
x11drv.MsgWaitForMultipleObjectsEx(00000001,48846ab4,ffffffff,000000ff,00000000) 
ret=408cc83f 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809dfa8:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809dfa8:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Call 
kernel32.WaitForMultipleObjectsEx(00000002,48846850,00000000,ffffffff,00000000) 
ret=40b05dd3 
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809d910:Call user32.GetOpenClipboardWindow() ret=40b03a47 
0809d910:Ret  user32.GetOpenClipboardWindow() retval=00010021 ret=40b03a47 
0809d910:Call user32.CLIPBOARD_EmptyCache(00000001) ret=40b03a87 
0809d910:Ret  user32.CLIPBOARD_EmptyCache() retval=00000001 ret=40b03a87 
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809d910:Call user32.GetAncestor(00010021,00000002) ret=40b03ad3 
0809d910:Call ntdll.RtlAllocateHeap(40360000,00000000,00000040) ret=408e22b9 
0809d910:Ret  ntdll.RtlAllocateHeap() retval=403e8b40 ret=408e22b9 
0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809d910:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809d910:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809d910:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809d910:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809d910:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e1b90 
0809d910:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=408e1b90 
0809d910:Ret  user32.GetAncestor() retval=00010021 ret=40b03ad3 
0809d910:Call user32.WIN_GetPtr(00010021) ret=40b0dbed 
0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 
0809d910:Ret  kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 
0809d910:Ret  user32.WIN_GetPtr() retval=403d53b8 ret=40b0dbed 
0809d910:Call user32.USER_Unlock() ret=40b0dc15 
0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 
0809d910:Ret  kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 
0809d910:Ret  user32.USER_Unlock() retval=00000000 ret=40b0dc15 
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809d910:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 
0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 
0809d910:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 
0809dfa8:Ret  kernel32.WaitForMultipleObjectsEx() retval=00000001 ret=40b05dd3 
0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 
0809d330:Call kernel32.GetTickCount() ret=40fedefa 
0809d330:Ret  kernel32.GetTickCount() retval=0001439a ret=40fedefa 
 
Then come about 10000 quite boring lines, containing the following: 
 
These four lines: 
 
0809d330:Call kernel32.GetTickCount() ret=40fee0bb 
0809d330:Ret  kernel32.GetTickCount() retval=00015683 ret=40fee0bb 
0809d330:Call kernel32.GetTickCount() ret=40fedefa 
0809d330:Ret  kernel32.GetTickCount() retval=00015695 ret=40fedefa 
 
repeatedly interleaved with approx. 25 times these four lines: 
 
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 
 
Then comes the error: 
 
0809d330:Call kernel32.GetTickCount() ret=40fee0bb 
0809d330:Ret  kernel32.GetTickCount() retval=00015699 ret=40fee0bb 
0809d190:Ret  kernel32.WaitForMultipleObjects() retval=00000102 ret=1a00e7d8 
err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c: 
X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809dfa8 
0809d190:Call winmm.timeGetTime() ret=1a00e815 
0809d190:Call kernel32.ReleaseThunkLock(47816d30) ret=40fee8cc 
0809d190:Ret  kernel32.ReleaseThunkLock() retval=00000000 ret=40fee8cc 
0809d190:Call kernel32.RestoreThunkLock(00000000) ret=40fee8d5 
0809d190:Ret  kernel32.RestoreThunkLock() retval=00000000 ret=40fee8d5 
0809d190:Call kernel32.IsBadWritePtr(403d0ae8,00000054) ret=40fee120 
0809d190:Ret  kernel32.IsBadWritePtr() retval=00000000 ret=40fee120 
0809d190:Ret  winmm.timeGetTime() retval=00015695 ret=1a00e815 
0809d190:Call kernel32.Sleep(00000001) ret=1a00e7be 
0809d330:Call kernel32.GetTickCount() ret=40fedefa 
0809d330:Ret  kernel32.GetTickCount() retval=000157d1 ret=40fedefa 
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 
0809d330:Ret  ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 
0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 
0809d330:Ret  ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 
 
and then the last four lines again get repeated many times etc. 
 
 
------- Additional Comments From till <at> informatik.uni-bremen.de  2002-10-01 10:32 
------- 
Created an attachment (id=306)
 --> (http://bugs.winehq.com/attachment.cgi?id=306&action=view) 
Relay trace with PeekMessageA that does not return 

-- 
Configure bugmail: http://bugs.winehq.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the wine-bugs mailing list