http://bugs.winehq.org/show_bug.cgi?id=18570
Summary: Virtualfree called immediatly after VirtualAlloc while loading native dll Product: Wine Version: 1.1.21 Platform: PC-x86-64 OS/Version: Linux Status: UNCONFIRMED Severity: major Priority: P1 Component: kernel32 AssignedTo: wine-bugs@winehq.org ReportedBy: yugandhar_bireddy@satyam.com
Hi,
Am using wine-1.1.21 configured with win64. When my 64bit application is loading native dll,exception is occuring as follows as virtualfree is getting called immediatly after VirtualAlloc:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 0009:Ret KERNEL32.CreateSemaphoreA() retval=000000a4 ret=5841a76d 0009:Call advapi32.RegOpenKeyExW(ffffffff80000002,5840b958 L"Software\Microsoft\Msxml60",00000000,00000001,2b8e4090e1c0) ret=58416fa9 0009:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=58416fa9 0009:Call advapi32.RegQueryValueExW(000000a8,58404190 L"GCThreshold",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f 0009:Ret advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f 0009:Call advapi32.RegQueryValueExW(000000a8,58404170 L"MaxGCThreshold",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f 0009:Ret advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f 0009:Call advapi32.RegQueryValueExW(000000a8,58404158 L"NoFullGC",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f 0009:Ret advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f 0009:Call advapi32.RegQueryValueExW(000000a8,58404130 L"MaxXSLProcessors",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f 0009:Ret advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f 0009:Call advapi32.RegQueryValueExW(000000a8,58404110 L"DebugLeakInfo",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f 0009:Ret advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f 0009:Call advapi32.RegQueryValueExW(000000a8,584040f0 L"DebugMaxLines",00000000,2b8e4090e1b4,2b8e4090e1b8,2b8e4090e1bc) ret=58441b0f 0009:Ret advapi32.RegQueryValueExW() retval=00000002 ret=58441b0f 0009:Call advapi32.RegCloseKey(000000a8) ret=58441b47 0009:Ret advapi32.RegCloseKey() retval=00000000 ret=58441b47 0009:Call KERNEL32.TlsGetValue(00000004) ret=5840b1b9 0009:Ret KERNEL32.TlsGetValue() retval=2b8e3cde8900 ret=5840b1b9 0009:Call ntdll.RtlAllocateHeap(2b8e46630000,00000000,00001010) ret=5840b31d 0009:Ret ntdll.RtlAllocateHeap() retval=2b8e46630500 ret=5840b31d 0009:Call KERNEL32.FormatMessageA(00001000,00000000,8007000e,00000400,2b8e46630510,00001000,00000000) ret=5840b569 0009:Ret KERNEL32.FormatMessageA() retval=00000000 ret=5840b569 0009:Call KERNEL32.GetModuleHandleA(58422cc0 "URLMON.DLL") ret=58422d1a 0009:Ret KERNEL32.GetModuleHandleA() retval=00000000 ret=58422d1a 0009:Call KERNEL32.GetModuleHandleA(58422cb0 "WININET.DLL") ret=58422d1a 0009:Ret KERNEL32.GetModuleHandleA() retval=00000000 ret=58422d1a 0009:Call KERNEL32.TlsGetValue(00000004) ret=5840b1b9 0009:Ret KERNEL32.TlsGetValue() retval=2b8e3cde8900 ret=5840b1b9 0009:Call KERNEL32.VirtualAlloc(00000000,00400000,00002000,00000004) ret=58417b63 0009:Ret KERNEL32.VirtualAlloc() retval=2b8e46eb0000 ret=58417b63 0009:Call KERNEL32.VirtualAlloc(2b8e46eb0000,00010000,00001000,00000004) ret=58417ba4 0009:Ret KERNEL32.VirtualAlloc() retval=2b8e46eb0000 ret=58417ba4 0009:Call KERNEL32.VirtualFree(2b8e46eb0000,00000000,00008000) ret=584410d2 0009:Ret KERNEL32.VirtualFree() retval=00000001 ret=584410d2 0009:Call ntdll.RtlAllocateHeap(2b8e46630000,00000000,00000048) ret=5840b31d 0009:Ret ntdll.RtlAllocateHeap() retval=2b8e46631520 ret=5840b31d 0009:Call KERNEL32.TlsGetValue(00000004) ret=5840b114 0009:Ret KERNEL32.TlsGetValue() retval=2b8e3cde8900 ret=5840b114 0009:trace:seh:raise_exception code=c0000096 flags=0 addr=0x5840b47a ip=5840b47a tid=0009 0009:trace:seh:raise_exception rax=0000000000000001 rbx=fefe30fefefe3030 rcx=0000000000000000 rdx=00000000000015c7 0009:trace:seh:raise_exception rsi=0000000000002b8e rdi=00000000000008cc rbp=0000000000000001 rsp=00002b8e4090e040 0009:trace:seh:raise_exception r8=00002b8e46631530 r9=0000000000000000 r10=0000000000000001 r11=0000000000000246 0009:trace:seh:raise_exception r12=00000571c8cc62a6 r13=00002b8e46631530 r14=00000000585f8510 r15=0000000000030291 0009:fixme:seh:call_stack_handlers not implemented on x86_64
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Thanks, Yugandhar