[Bug 18570] New: Virtualfree called immediatly after VirtualAlloc while loading native dll

wine-bugs at winehq.org wine-bugs at winehq.org
Fri May 22 08:50:19 CDT 2009


http://bugs.winehq.org/show_bug.cgi?id=18570

           Summary: Virtualfree called immediatly after VirtualAlloc while
                    loading native dll
           Product: Wine
           Version: 1.1.21
          Platform: PC-x86-64
        OS/Version: Linux
            Status: UNCONFIRMED
          Severity: major
          Priority: P1
         Component: kernel32
        AssignedTo: wine-bugs at winehq.org
        ReportedBy: yugandhar_bireddy at satyam.com


Hi,

Am using wine-1.1.21 configured with win64.
When my 64bit application is loading native dll,exception is occuring as
follows as virtualfree is getting called immediatly after VirtualAlloc:


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
0009:Ret  KERNEL32.CreateSemaphoreA() retval=000000a4 ret=5841a76d
0009:Call advapi32.RegOpenKeyExW(ffffffff80000002,5840b958
L"Software\\Microsoft\\Msxml60",00000000,00000001,2b8e4090e1c0) ret=58416fa9
0009:Ret  advapi32.RegOpenKeyExW() retval=00000000 ret=58416fa9
0009:Call advapi32.RegQueryValueExW(000000a8,58404190
L"GCThreshold",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f
0009:Ret  advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f
0009:Call advapi32.RegQueryValueExW(000000a8,58404170
L"MaxGCThreshold",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f
0009:Ret  advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f
0009:Call advapi32.RegQueryValueExW(000000a8,58404158
L"NoFullGC",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f
0009:Ret  advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f
0009:Call advapi32.RegQueryValueExW(000000a8,58404130
L"MaxXSLProcessors",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc)
ret=58441b0f
0009:Ret  advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f
0009:Call advapi32.RegQueryValueExW(000000a8,58404110
L"DebugLeakInfo",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f
0009:Ret  advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f
0009:Call advapi32.RegQueryValueExW(000000a8,584040f0
L"DebugMaxLines",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f
0009:Ret  advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f
0009:Call advapi32.RegCloseKey(000000a8) ret=58441b47
0009:Ret  advapi32.RegCloseKey() retval=00000000 ret=58441b47
0009:Call KERNEL32.TlsGetValue(00000004) ret=5840b1b9
0009:Ret  KERNEL32.TlsGetValue() retval=2b8e3cde8900 ret=5840b1b9
0009:Call ntdll.RtlAllocateHeap(2b8e46630000,00000000,00001010) ret=5840b31d
0009:Ret  ntdll.RtlAllocateHeap() retval=2b8e46630500 ret=5840b31d
0009:Call
KERNEL32.FormatMessageA(00001000,00000000,8007000e,00000400,2b8e46630510,00001000,00000000)
ret=5840b569
0009:Ret  KERNEL32.FormatMessageA() retval=00000000 ret=5840b569
0009:Call KERNEL32.GetModuleHandleA(58422cc0 "URLMON.DLL") ret=58422d1a
0009:Ret  KERNEL32.GetModuleHandleA() retval=00000000 ret=58422d1a
0009:Call KERNEL32.GetModuleHandleA(58422cb0 "WININET.DLL") ret=58422d1a
0009:Ret  KERNEL32.GetModuleHandleA() retval=00000000 ret=58422d1a
0009:Call KERNEL32.TlsGetValue(00000004) ret=5840b1b9
0009:Ret  KERNEL32.TlsGetValue() retval=2b8e3cde8900 ret=5840b1b9
0009:Call KERNEL32.VirtualAlloc(00000000,00400000,00002000,00000004)
ret=58417b63
0009:Ret  KERNEL32.VirtualAlloc() retval=2b8e46eb0000 ret=58417b63
0009:Call KERNEL32.VirtualAlloc(2b8e46eb0000,00010000,00001000,00000004)
ret=58417ba4
0009:Ret  KERNEL32.VirtualAlloc() retval=2b8e46eb0000 ret=58417ba4
0009:Call KERNEL32.VirtualFree(2b8e46eb0000,00000000,00008000) ret=584410d2
0009:Ret  KERNEL32.VirtualFree() retval=00000001 ret=584410d2
0009:Call ntdll.RtlAllocateHeap(2b8e46630000,00000000,00000048) ret=5840b31d
0009:Ret  ntdll.RtlAllocateHeap() retval=2b8e46631520 ret=5840b31d
0009:Call KERNEL32.TlsGetValue(00000004) ret=5840b114
0009:Ret  KERNEL32.TlsGetValue() retval=2b8e3cde8900 ret=5840b114
0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x5840b47a
ip=5840b47a tid=0009
0009:trace:seh:raise_exception  rax=0000000000000001 rbx=fefe30fefefe3030
rcx=0000000000000000 rdx=00000000000015c7
0009:trace:seh:raise_exception  rsi=0000000000002b8e rdi=00000000000008cc
rbp=0000000000000001 rsp=00002b8e4090e040
0009:trace:seh:raise_exception   r8=00002b8e46631530  r9=0000000000000000
r10=0000000000000001 r11=0000000000000246
0009:trace:seh:raise_exception  r12=00000571c8cc62a6 r13=00002b8e46631530
r14=00000000585f8510 r15=0000000000030291
0009:fixme:seh:call_stack_handlers not implemented on x86_64


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 



Thanks,
Yugandhar

-- 
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.



More information about the wine-bugs mailing list