http://bugs.winehq.org/show_bug.cgi?id=11746
--- Comment #3 from Dan Kegel dank@kegel.com 2008-02-26 18:24:33 --- Recompiling server with -O0 -g shows a more complete stack trace in valgrind:
==11223== Invalid read of size 4 ==11223== at 0x804C1AF: filter_from_inode (change.c:579) ==11223== by 0x804CBA5: inotify_adjust_changes (change.c:872) ==11223== by 0x804D14B: req_read_directory_changes (change.c:1062) ==11223== by 0x8071C7B: call_req_handler (request.c:286) ==11223== by 0x8071DD0: read_request (request.c:320) ==11223== by 0x80772CE: thread_poll_event (thread.c:234) ==11223== by 0x8056412: fd_poll_event (fd.c:437) ==11223== by 0x8056357: main_loop_epoll (fd.c:532) ==11223== by 0x805615E: main_loop (fd.c:776) ==11223== by 0x805EAD1: main (main.c:138) ==11223== Address 0x4C9057C is 20 bytes inside a block of size 68 free'd ==11223== at 0x402237F: free (vg_replace_malloc.c:233) ==11223== by 0x804BEDC: free_inode (change.c:475) ==11223== by 0x804BE43: free_inode (change.c:457) ==11223== by 0x804B85A: dir_destroy (change.c:314) ==11223== by 0x8062A71: release_object (object.c:282) ==11223== by 0x805BB31: close_handle (handle.c:377) ==11223== by 0x805C082: req_close_handle (handle.c:565) ==11223== by 0x8071C7B: call_req_handler (request.c:286) ==11223== by 0x8071DD0: read_request (request.c:320) ==11223== by 0x80772CE: thread_poll_event (thread.c:234) ==11223== by 0x8056412: fd_poll_event (fd.c:437) ==11223== by 0x8056357: main_loop_epoll (fd.c:532)