Is this a known problem? When I try to run the callwave install program, or the callwave program itself, I merely get: fixme:win32:PE_CreateModule Security directory ignored err:seh:start_debugger Couldn't start debugger (debugger/winedbg 134640112 24) (2) Read the Wine Developers Guide on how to set up winedbg or another debugger Is this a configuration error on my part? Either way, is there some information I need to give to get this fixed? I appreciate it. Thanks -- -Steven In a time of universal deceit, telling the truth is a revolutionary act. -- George Orwell Freedom is slavery. Ignorance is strength. War is peace. -- George Orwell
Steven Walter wrote:
Is this a known problem? When I try to run the callwave install program, or the callwave program itself, I merely get:
fixme:win32:PE_CreateModule Security directory ignored err:seh:start_debugger Couldn't start debugger (debugger/winedbg 134640112 24) (2) Read the Wine Developers Guide on how to set up winedbg or another debugger
the first fixme is harmless the second part means that an exception occured in the program (likely a seg fault) and the debugger couldn't be launched to display the context of the error read the doc and properly set up the debugger for this information, and/or look at the various ways to submit a full bug report (running with -debugmsg +relay and quoting the 500 lines before the point the exception is triggered is quite always a good starting point) A+ -- --------------- Eric Pouech (http://perso.wanadoo.fr/eric.pouech/) "The future will be better tomorrow", Vice President Dan Quayle
On Sat, Sep 22, 2001 at 09:26:22AM +0200, eric pouech wrote:
the first fixme is harmless the second part means that an exception occured in the program (likely a seg fault) and the debugger couldn't be launched to display the context of the error read the doc and properly set up the debugger for this information, and/or look at the various ways to submit a full bug report (running with -debugmsg +relay and quoting the 500 lines before the point the exception is triggered is quite always a good starting point)
Attached is the /entire/ relay log. Its pretty obvious that it doesn't get far. Additionally, the debugger seems to get killed for some reason; it pops up, stays for a fraction of a second, and is then killed. I get the message "Terminated" in the shell where I was running wine. -- -Steven In a time of universal deceit, telling the truth is a revolutionary act. -- George Orwell Freedom is slavery. Ignorance is strength. War is peace. -- George Orwell fixme:win32:PE_CreateModule Security directory ignored fixme:pthread_kill_other_threads_np 084a9b88:Call PE DLL (proc=0x40907958,module=408f9000,type=1,res=0x1) 084a9b88:Ret PE DLL (proc=0x40907958,module=408f9000,type=1,res=0x1) retval=1 084a9b88:Call PE DLL (proc=0xbfed135c,module=bfed0000,type=1,res=0x1) 084a9b88:Call kernel32.DisableThreadLibraryCalls(bfed0000) ret=bfed136f 084a9b88:Ret kernel32.DisableThreadLibraryCalls() retval=00000001 ret=bfed136f 084a9b88:Ret PE DLL (proc=0xbfed135c,module=bfed0000,type=1,res=0x1) retval=1 084a9b88:Starting process /home/srwalter/cvs/wine/debugger/winedbg (entryproc=0x40749148) 084a9b88:Call ntdll.__wine_get_main_args(407867fc) ret=40749164 084a9b88:Ret ntdll.__wine_get_main_args() retval=00000003 ret=40749164 084a9b88:Call kernel32.IsBadWritePtr(408a6e8c,00000004) ret=bfed1795 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed1795 084a9b88:Call kernel32.VxDCall3(00010012) ret=bfed17be fs=008f eax=80000001 ebx=4076fe94 ecx=00000001 edx=408a6e8c esi=407868ac edi=40786b40 ebp=408a6e4c esp=408a6e40 ds=002b es=002b gs=0000 flags=00200282 084a9b88:Ret kernel32.VxDCall3() retval=00000000 ret=bfed17be fs=008f eax=00000000 ebx=4076fe94 ecx=00000001 edx=408a6e8c esi=407868ac edi=40786b40 ebp=408a6e4c esp=408a6e4c ds=002b es=002b gs=0000 flags=00200282 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.IsBadWritePtr(408a6e88,00000004) ret=bfed15d1 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15d1 084a9b88:Call kernel32.IsBadWritePtr(408a6e84,00000004) ret=bfed15e8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15e8 084a9b88:Call kernel32.IsBadWritePtr(408a6e80,00000004) ret=bfed15f8 084a9b88:Ret kernel32.IsBadWritePtr() retval=00000000 ret=bfed15f8 084a9b88:Call kernel32.VxDCall6(0001001a) ret=bfed1626 fs=008f eax=00000001 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e1c ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall6() retval=00000002 ret=bfed1626 fs=008f eax=00000002 ebx=408a6e80 ecx=00000000 edx=408a6e80 esi=40938960 edi=408a6e88 ebp=408a6e40 esp=408a6e34 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.VxDCall1(00010013) ret=bfed16ca fs=008f eax=00000001 ebx=4076fe94 ecx=00000000 edx=40786908 esi=0000001c edi=00000250 ebp=408a6e90 esp=408a6e50 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Ret kernel32.VxDCall1() retval=00000000 ret=bfed16ca fs=008f eax=00000000 ebx=4076fe94 ecx=00000000 edx=40786908 esi=0000001c edi=00000250 ebp=408a6e90 esp=408a6e54 ds=002b es=002b gs=0000 flags=00200202 084a9b88:Call kernel32.GetStdHandle(fffffff5) ret=4075db3b 084a9b88:Ret kernel32.GetStdHandle() retval=00000008 ret=4075db3b 084a9b88:Call kernel32.SetConsoleCursorPosition(00000008,00010000) ret=4075db41 Console: Making console complex (creating an xterm)... fixme:pthread_kill_other_threads_np fixme:pthread_kill_other_threads_np fixme:pthread_kill_other_threads_np fixme:pthread_kill_other_threads_np 084a9b88:Ret kernel32.SetConsoleCursorPosition() retval=00000001 ret=4075db41 084a9b88:Call kernel32.GetStdHandle(fffffff5) ret=4075bf58 084a9b88:Ret kernel32.GetStdHandle() retval=00000008 ret=4075bf58 084a9b88:Call kernel32.WriteFile(00000008,40785760,00000014,00000000,00000000) ret=4075bf5e 084a9b88:Ret kernel32.WriteFile() retval=00000001 ret=4075bf5e 084a9b88:Call kernel32.DebugActiveProcess(080671f0) ret=4075cac7 084a9b88:Ret kernel32.DebugActiveProcess() retval=00000001 ret=4075cac7 084a9b88:Call kernel32.SetEvent(00000018) ret=4075dbae 084a9b88:Ret kernel32.SetEvent() retval=00000001 ret=4075dbae 084a9b88:Call kernel32.CloseHandle(00000018) ret=4075dbcc 084a9b88:Ret kernel32.CloseHandle() retval=00000001 ret=4075dbcc 084a9b88:Call kernel32.GetStdHandle(fffffff5) ret=4075bf58 084a9b88:Ret kernel32.GetStdHandle() retval=00000008 ret=4075bf58 084a9b88:Call kernel32.WriteFile(00000008,40785760,00000010,00000000,00000000) ret=4075bf5e 084a9b88:Ret kernel32.WriteFile() retval=00000001 ret=4075bf5e 084a9b88:Call kernel32.WaitForDebugEvent(408a6e34,ffffffff) ret=4075d998 084a9b88:Ret kernel32.WaitForDebugEvent() retval=00000001 ret=4075d998 084a9b88:Call kernel32.ReadProcessMemory(0000001c,4011033c,408a6b28,00000004,408a6b2c) ret=4075c8af 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075c8af 084a9b88:Call kernel32.ReadProcessMemory(0000001c,40126340,408a6d10,00000100,408a6b2c) ret=4075c8d0 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075c8d0 084a9b88:Call kernel32.ReadProcessMemory(0000001c,0040003c,408a6a10,00000004,00000000) ret=40753367 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=40753367 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400108,408a6a3c,000000f8,00000000) ret=40753398 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=40753398 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400200,408a6a14,00000028,00000000) ret=40753411 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=40753411 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400228,408a6a14,00000028,00000000) ret=40753411 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=40753411 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400250,408a6a14,00000028,00000000) ret=40753411 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=40753411 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400200,408a69b0,00000028,00000000) ret=4075698d 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075698d 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400228,408a69b0,00000028,00000000) ret=4075698d 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075698d 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400250,408a69b0,00000028,00000000) ret=4075698d 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075698d 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400200,0804ef90,00000078,00000000) ret=4075679f 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075679f 084a9b88:Call kernel32.CloseHandle(00000000) ret=40754235 084a9b88:Ret kernel32.CloseHandle() retval=00000000 ret=40754235 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400200,408a66a0,00000028,00000000) ret=4075365e 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075365e 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400228,408a66a0,00000028,00000000) ret=4075365e 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075365e 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400250,408a66a0,00000028,00000000) ret=4075365e 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=4075365e 084a9b88:Call kernel32.ReadProcessMemory(0000001c,00400180,408a6670,00000008,00000000) ret=407536fb 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=407536fb 084a9b88:Call kernel32.ReadProcessMemory(0000001c,0044bc20,408a6678,00000028,00000000) ret=40753760 084a9b88:Ret kernel32.ReadProcessMemory() retval=00000001 ret=40753760 084a9b88:Call kernel32.GetStdHandle(fffffff5) ret=4075bf58 084a9b88:Ret kernel32.GetStdHandle() retval=00000008 ret=4075bf58 084a9b88:Call kernel32.WriteFile(00000008,40785760,00000012,00000000,00000000) ret=4075bf5e 084a9b88:Ret kernel32.WriteFile() retval=00000001 ret=4075bf5e
Steven Walter wrote:
On Sat, Sep 22, 2001 at 09:26:22AM +0200, eric pouech wrote:
the first fixme is harmless the second part means that an exception occured in the program (likely a seg fault) and the debugger couldn't be launched to display the context of the error read the doc and properly set up the debugger for this information, and/or look at the various ways to submit a full bug report (running with -debugmsg +relay and quoting the 500 lines before the point the exception is triggered is quite always a good starting point)
Attached is the /entire/ relay log. Its pretty obvious that it doesn't get far. Additionally, the debugger seems to get killed for some reason; it pops up, stays for a fraction of a second, and is then killed. I get the message "Terminated" in the shell where I was running wine.
what's strange is that the relay posted only targets the debugger process, not the process creating the exception... (the one creating the exception is 080671f0 and never shows up in the trace) how did you run your program ? which wine version are you using ? (from your previous post, the debugger now starts) A+ -- --------------- Eric Pouech (http://perso.wanadoo.fr/eric.pouech/) "The future will be better tomorrow", Vice President Dan Quayle
On Sat, Sep 22, 2001 at 09:55:10PM +0200, eric pouech wrote:
what's strange is that the relay posted only targets the debugger process, not the process creating the exception... (the one creating the exception is 080671f0 and never shows up in the trace) how did you run your program ? which wine version are you using ? (from your previous post, the debugger now starts)
Yes, the debugger starts, but I don't really think its configured correctly, still. In order to get it to start, I have to start wine from the directory I built it, so that it will find ./debugger/winedbg. Shouldn't it look in the path for "winedbg," rather than only the current directory? Anyway, I started the program, from the directory where I built wine, as "wine -debugmsg +relay 'c:\iamsetup.exe'" Wine version is CVS from yesterday, though it has occurred in the CVS version for several weeks; I've never not had the problem. Possibly an interesting note, when I run as "wine -debugmsg +relay", and the debugger is unable to start for whatever reason, no messages are printed that aren't also printed with just "wine". "wine -debugmsg +all" does, however, log extra stuff. Attached is the latter part of what that yields. -- -Steven In a time of universal deceit, telling the truth is a revolutionary act. -- George Orwell Freedom is slavery. Ignorance is strength. War is peace. -- George Orwell 08068490: init_process_done() = 0 { debugged=0 } 08068490:fixme:win32:PE_CreateModule Security directory ignored 08068490:trace:global:GLOBAL_Alloc 138 flags=0042 08068490:trace:heap:HeapAlloc (40620000,00000002,000000a0): returning 40621170 08068490:trace:string:lstrcpynA (0x406211e9, "IamSetup."..., 9) 08068490:trace:dosfs:GetShortPathNameA "C:\\IamSetup.exe" 08068490:trace:heap:HeapAlloc (40620000,00000002,00000400): returning 4062121c 08068490:trace:string:lstrcpynA (0x4062121f, "IamSetup.exe", 13) 08068490:trace:string:lstrcpynA ((nil), ""..., 0) 08068490:trace:dosfs:GetShortPathNameA returning (null) 08068490:trace:heap:HeapFree (40620000,00000002,4062121c): returning TRUE 08068490:trace:heap:HeapAlloc (40620000,0000000a,00000060): returning 40620438 08068490:trace:dosfs:GetShortPathNameA "C:\\IamSetup.exe" 08068490:trace:heap:HeapAlloc (40620000,00000002,00000400): returning 4062121c 08068490:trace:string:lstrcpynA (0x4062121f, "IamSetup.exe", 13) 08068490:trace:string:lstrcpynA (0x40620484, "C:\\IamSetup.exe", 16) 08068490:trace:dosfs:GetShortPathNameA returning "C:\\IamSetup.exe" 08068490:trace:heap:HeapFree (40620000,00000002,4062121c): returning TRUE 08068490:trace:win32:dump_exports *******EXPORT DATA******* 08068490:trace:win32:dump_exports 08068490:trace:seh:EXC_RtlRaiseException code=c0000005 flags=0 08068490: queue_exception_event( first=1, record={context={flags=00000000,eax=402a2a00,ebx=4033fe38,ecx=ffffffff,edx=40856c8b,esi=0000000f,edi=967c77e5,ebp=40856c8c,eip=402a2ab2,esp=40856694,eflags=00210246,cs=0023,ds=002b,es=002b,fs=008f,gs=0000,dr0=00000000,dr1=00000000,dr2=00000000,dr3=00000000,dr6=00000000,dr7=00000000,float={00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000}},rec={code=c0000005,flags=0,rec=(nil),addr=0x402a2ab2,params={0,967c77e5}} ) 08068490: queue_exception_event() = 0 { handle=0 } 08068490:trace:seh:EXC_CallHandler calling handler at 0x40070348 code=c0000005 flags=0 08068490: queue_exception_event( first=0, record={context={flags=00000000,eax=402a2a00,ebx=4033fe38,ecx=ffffffff,edx=40856c8b,esi=0000000f,edi=967c77e5,ebp=40856c8c,eip=402a2ab2,esp=40856694,eflags=00210246,cs=0023,ds=002b,es=002b,fs=008f,gs=0000,dr0=00000000,dr1=00000000,dr2=00000000,dr3=00000000,dr6=00000000,dr7=00000000,float={00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000}},rec={code=c0000005,flags=0,rec=(nil),addr=0x402a2ab2,params={0,967c77e5}} ) 08068490: queue_exception_event() = 0 { handle=0 } 08068490: create_event( manual_reset=1, initial_state=0, inherit=1, name=L"" ) 08068490: create_event() = 0 { handle=24 } 08068490:trace:heap:HeapAlloc (40620000,00000002,0000006c): returning 4062121c 08068490:trace:reg:NtOpenKey (0x80000002,L"Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug",f003f,0x40744830) 08068490: open_key( parent=-2147483646, access=000f003f, name=L"Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug" ) Open key \\Machine\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug 08068490: open_key() = 0 { hkey=32 } 08068490:trace:reg:NtOpenKey <- 0x0020 08068490:trace:heap:HeapFree (40620000,00000002,4062121c): returning TRUE 08068490:trace:reg:RegQueryValueExA (0x20,"Debugger",(nil),0x40744828,0x40744840,0x4074482c=256) 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 4062121c 08068490:trace:reg:NtQueryValueKey (0x20,L"Debugger",2,0x407446f0,256) 08068490: get_key_value( hkey=32, offset=00000000, name=L"Debugger" ) Get key \\Machine\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug value "Debugger"="debugger/winedbg %ld %ld" 08068490: get_key_value() = 0 { type=1, len=50, data={64,00,65,00,62,00,75,00,67,00,67,00,65,00,72,00,2f,00,77,00,69,00,6e,00,65,00,64,00,62,00,67,00,20,00,25,00,6c,00,64,00,20,00,25,00,6c,00,64,00,00,00} } 08068490:trace:heap:HeapFree (40620000,00000002,4062121c): returning TRUE 08068490:trace:reg:RegQueryValueExA (0x20,"Auto",(nil),0x40744828,0x40744824,0x4074482c=4) 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 4062121c 08068490:trace:reg:NtQueryValueKey (0x20,L"Auto",2,0x407446f0,256) 08068490: get_key_value( hkey=32, offset=00000000, name=L"Auto" ) Get key \\Machine\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug value "Auto"="1" 08068490: get_key_value() = 0 { type=1, len=4, data={31,00,00,00} } 08068490:trace:heap:HeapFree (40620000,00000002,4062121c): returning TRUE 08068490:trace:reg:RegQueryValueExA (0x20,"Auto",(nil),0x40744828,0x40744834,0x4074482c=10) 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 4062121c 08068490:trace:reg:NtQueryValueKey (0x20,L"Auto",2,0x407446f0,256) 08068490: get_key_value( hkey=32, offset=00000000, name=L"Auto" ) Get key \\Machine\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug value "Auto"="1" 08068490: get_key_value() = 0 { type=1, len=4, data={31,00,00,00} } 08068490:trace:heap:HeapFree (40620000,00000002,4062121c): returning TRUE 08068490: close_handle( handle=32 ) 08068490: close_handle() = 0 { fd=-1 } 08068490:trace:seh:start_debugger Starting debugger (fmt=debugger/winedbg %ld %ld) 08068490:trace:module:CreateProcessA app '(null)' cmdline 'debugger/winedbg 134640208 24' 08068490:trace:heap:HeapAlloc (40620000,00000002,00000020): returning 4062121c 08068490:trace:module:get_file_name trying 'debugger/winedbg' 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 40621248 08068490:trace:dosfs:DOSFS_GetFullName debugger/winedbg.exe (last=1) 08068490:trace:string:lstrcpynA (0x40743e70, "/home/srwalter", 1024) 08068490:trace:string:lstrcpynA (0x40743e7f, "", 1009) 08068490:trace:string:lstrcpynA (0x40744273, "", 1021) 08068490:trace:dosfs:DOSFS_FindUnixName /home/srwalter,debugger/winedbg.exe 08068490:trace:heap:HeapAlloc (40620000,00000002,0000022c): returning 4062126c 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 406214a4 08068490:warn:dosfs:DOSFS_FindUnixName 'debugger/winedbg.exe' not found in '/home/srwalter' 08068490:trace:heap:HeapFree (40620000,00000002,406214a4): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,4062126c): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621248): returning TRUE 08068490:trace:dosfs:DOSFS_GetFullName debugger/winedbg (last=1) 08068490:trace:string:lstrcpynA (0x40743e70, "/home/srwalter", 1024) 08068490:trace:string:lstrcpynA (0x40743e7f, "", 1009) 08068490:trace:string:lstrcpynA (0x40744273, "", 1021) 08068490:trace:dosfs:DOSFS_FindUnixName /home/srwalter,debugger/winedbg 08068490:trace:heap:HeapAlloc (40620000,00000002,0000022c): returning 40621248 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 40621480 08068490:warn:dosfs:DOSFS_FindUnixName 'debugger/winedbg' not found in '/home/srwalter' 08068490:trace:heap:HeapFree (40620000,00000002,40621480): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621248): returning TRUE 08068490:trace:module:get_file_name trying 'debugger/winedbg 134640208' 08068490:trace:heap:HeapAlloc (40620000,00000002,00000020): returning 40621248 08068490:trace:dosfs:DOSFS_GetFullName debugger/winedbg 134640208.exe (last=1) 08068490:trace:string:lstrcpynA (0x40743e70, "/home/srwalter", 1024) 08068490:trace:string:lstrcpynA (0x40743e7f, "", 1009) 08068490:trace:string:lstrcpynA (0x40744273, "", 1021) 08068490:trace:dosfs:DOSFS_FindUnixName /home/srwalter,debugger/winedbg 134640208.exe 08068490:trace:heap:HeapAlloc (40620000,00000002,0000022c): returning 40621274 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 406214ac 08068490:warn:dosfs:DOSFS_FindUnixName 'debugger/winedbg 134640208.exe' not found in '/home/srwalter' 08068490:trace:heap:HeapFree (40620000,00000002,406214ac): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621274): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621248): returning TRUE 08068490:trace:dosfs:DOSFS_GetFullName debugger/winedbg 134640208 (last=1) 08068490:trace:string:lstrcpynA (0x40743e70, "/home/srwalter", 1024) 08068490:trace:string:lstrcpynA (0x40743e7f, "", 1009) 08068490:trace:string:lstrcpynA (0x40744273, "", 1021) 08068490:trace:dosfs:DOSFS_FindUnixName /home/srwalter,debugger/winedbg 134640208 08068490:trace:heap:HeapAlloc (40620000,00000002,0000022c): returning 40621248 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 40621480 08068490:warn:dosfs:DOSFS_FindUnixName 'debugger/winedbg 134640208' not found in '/home/srwalter' 08068490:trace:heap:HeapFree (40620000,00000002,40621480): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621248): returning TRUE 08068490:trace:module:get_file_name trying 'debugger/winedbg 134640208 24' 08068490:trace:heap:HeapAlloc (40620000,00000002,00000024): returning 40621248 08068490:trace:dosfs:DOSFS_GetFullName debugger/winedbg 134640208 24.exe (last=1) 08068490:trace:string:lstrcpynA (0x40743e70, "/home/srwalter", 1024) 08068490:trace:string:lstrcpynA (0x40743e7f, "", 1009) 08068490:trace:string:lstrcpynA (0x40744273, "", 1021) 08068490:trace:dosfs:DOSFS_FindUnixName /home/srwalter,debugger/winedbg 134640208 24.exe 08068490:trace:heap:HeapAlloc (40620000,00000002,0000022c): returning 40621278 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 406214b0 08068490:warn:dosfs:DOSFS_FindUnixName 'debugger/winedbg 134640208 24.exe' not found in '/home/srwalter' 08068490:trace:heap:HeapFree (40620000,00000002,406214b0): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621278): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621248): returning TRUE 08068490:trace:dosfs:DOSFS_GetFullName debugger/winedbg 134640208 24 (last=1) 08068490:trace:string:lstrcpynA (0x40743e70, "/home/srwalter", 1024) 08068490:trace:string:lstrcpynA (0x40743e7f, "", 1009) 08068490:trace:string:lstrcpynA (0x40744273, "", 1021) 08068490:trace:dosfs:DOSFS_FindUnixName /home/srwalter,debugger/winedbg 134640208 24 08068490:trace:heap:HeapAlloc (40620000,00000002,0000022c): returning 40621248 08068490:trace:heap:HeapAlloc (40620000,00000002,00000018): returning 40621480 08068490:warn:dosfs:DOSFS_FindUnixName 'debugger/winedbg 134640208 24' not found in '/home/srwalter' 08068490:trace:heap:HeapFree (40620000,00000002,40621480): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,40621248): returning TRUE 08068490:trace:heap:HeapFree (40620000,00000002,4062121c): returning TRUE 08068490:err:seh:start_debugger Couldn't start debugger (debugger/winedbg 134640208 24) (2) Read the Wine Developers Guide on how to set up winedbg or another debugger 08068490: event_op( handle=24, op=1 ) 08068490: event_op() = 0 08068490:trace:seh:EXC_RtlUnwind code=c0000005 flags=2 08068490:trace:seh:EXC_CallHandler calling handler at 0x4006fbb0 code=c0000005 flags=2 08068490:trace:seh:EXC_CallHandler handler returned 1 08068490: terminate_thread( handle=-2, exit_code=-1073741819 ) 08068490: terminate_thread() = 0 { self=1, last=1 } 08068490: *killed* exit_code=-1073741819 /home/srwalter/.wine/user.reg: saving key \\User\\srwalter /home/srwalter/.wine/system.reg: saving key \\Machine /home/srwalter/.wine/userdef.reg: saving key \\User\\.Default Server: exiting (pid=15202)
Yes, the debugger starts, but I don't really think its configured correctly, still. In order to get it to start, I have to start wine from the directory I built it, so that it will find ./debugger/winedbg. Shouldn't it look in the path for "winedbg," rather than only the current directory? well, if you want to run wine from the directory it's built in, you need to : 1/ add to LD_LIBRARY_PATH the dlls subdir 2/ add to PATH the wine's dir check out the tools/winelauncher for some more on this
Possibly an interesting note, when I run as "wine -debugmsg +relay", and the debugger is unable to start for whatever reason, no messages are printed that aren't also printed with just "wine". "wine -debugmsg +all" does, however, log extra stuff. Attached is the latter part of what that yields. first, it's not a good idea to jam wine-devel with lots of logs. best practice is to put the log (if rather large, > 10k for example) somewhere on the web and put only the URL for retrieving the log in your mail (this will save bandwidth)
08068490:trace:win32:dump_exports *******EXPORT DATA******* 08068490:trace:win32:dump_exports 08068490:trace:seh:EXC_RtlRaiseException code=c0000005 flags=0 08068490: queue_exception_event( first=1, record={context={flags=00000000,eax=402a2a00,ebx=4033fe38,ecx=ffffffff,edx=40856c8b,esi=0000000f,edi=967c77e5,ebp=40856c8c,eip=402a2ab2,esp=40856694,eflags=00210246,cs=0023,ds=002b,es=002b,fs=008f,gs=0000,dr0=00000000,dr1=00000000,dr2=00000000,dr3=00000000,dr6=00000000,dr7=00000000,float={00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000}},rec={code=c0000005,flags=0,rec=(nil),addr=0x402a2ab2,params={0,967c77e5}} ) the dumping of export badly crashes did you test that your program isn't infected by a virus ? if not, what gives dumping (with winedump) the file (tools/winedump dump iamsetup.exe -x)
A+ -- --------------- Eric Pouech (http://perso.wanadoo.fr/eric.pouech/) "The future will be better tomorrow", Vice President Dan Quayle
participants (2)
-
eric pouech -
Steven Walter