http://bugs.winehq.com/show_bug.cgi?id=1027
Summary: "x11drv_main.c: X11DRV_CritSection" wait timed out Product: Wine Version: 20020904 Platform: PC OS/Version: Linux Status: UNCONFIRMED Severity: normal Priority: P2 Component: wine-x11driver AssignedTo: wine-bugs@winehq.com ReportedBy: till@informatik.uni-bremen.de
The bug appears with both wine 20020710 and wine 20020904 on a SuSe 7.3 machine, using a copy of a Windows 98 installation. The program is FITCH.EXE (see http://www-csli.stanford.edu/LPL ). It is not free, but can be obtained from me, if needed.
Stdout output of the command
wine /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE
After the follwing probably harmless problems (I have deleted repeated stuff):
fixme:win32:CreateMailslotA ("\\.\mailslot\Openproof/Fitch 1.0",520,100,(nil)): stub fixme:win32:CreateMailslotA ("\\.\mailslot\Z/\usr\local\LPL\LPL Software\Fitch Folder\FITCH.EXE",520,100,(nil)): stub fixme:ntdll:RtlAddAccessAllowedAce (0x405c58d4,0x00000002,0x000f003f,0x403bef78),stub! fixme:reg:RegFlushKey (48): stub fixme:win32:GetMailslotInfo (0001): stub fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen! fixme:win32:GetMailslotInfo (0001): stub
then the error occurs (infinitely often):
err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c: X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809df48 wine: Unhandled exception, starting debugger...
Unfortunately, the debugger window does not appear. With an earlier version of wine (20020710), it appears, and sometimes even the error does not appear. If needed, I can try to reconstruct the debugger output.
Stderr Output of the command
wine --debugmsg +relay /usr/local/LPL/LPL\ Software/Fitch\ Folder/FITCH.EXE
[snip]
Some 400 lines of the section before the error occurs:
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e 0809d330:Call kernel32.GetTickCount() ret=40fee0bb 0809d330:Ret kernel32.GetTickCount() retval=00014386 ret=40fee0bb 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 080713c8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c fixme:event:EVENT_ProcessEvent Got SelectionNotify - must not happen! 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Ret x11drv.MsgWaitForMultipleObjectsEx() retval=00000000 ret=408fd663 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 080713c8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 080713c8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 080713c8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 080713c8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 080713c8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 080713c8:Call kernel32.WaitForMultipleObjectsEx(00000001,405c6368,00000000,00000000,00000000) ret=40b05dd3 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.GetPropA(00010021,0000c01c) ret=1801785d 080713c8:Ret kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3 080713c8:Ret x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=408fd663 080713c8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 080713c8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 080713c8:Ret kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27 080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b 080713c8:Ret kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b 0809dfa8:Ret user32.GetPropA() retval=00000000 ret=1801785d 0809dfa8:Call user32.CallNextHookEx(4b48008c,00000000,00000001,48846b34) ret=18017681 0809dfa8:Ret user32.CallNextHookEx() retval=00000000 ret=18017681 0809dfa8:Ret user32.PeekMessageA() retval=00000001 ret=180177b6 0809dfa8:Call user32.TranslateMessage(48846c54) ret=180177e2 0809dfa8:Ret user32.TranslateMessage() retval=00000000 ret=180177e2 0809dfa8:Call user32.DispatchMessageA(48846c54) ret=180177e9 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706ba) ret=408e660e 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e660e 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,40e706c8) ret=408e662c 0809dfa8:Ret kernel32.HeapValidate() retval=00000001 ret=408e662c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c) ret=408b56d3 080713c8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 080713c8:Ret kernel32.GetThreadQueue16() retval=00000237 ret=408d4a27 080713c8:Call kernel32.GlobalLock16(00000237) ret=408d4a4b 080713c8:Ret kernel32.GlobalLock16() retval=403b8f18 ret=408d4a4b 080713c8:Call kernel32.ReleaseThunkLock(405c6544) ret=408fd6cc 080713c8:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc 080713c8:Ret user32.PeekMessageA() retval=00000000 ret=004072c9 080713c8:Call kernel32.GetMailslotInfo(00000001,00000000,405c6628,00000000,00000000) ret=00407051 fixme:win32:GetMailslotInfo (0001): stub 080713c8:Ret kernel32.GetMailslotInfo() retval=00000001 ret=00407051 080713c8:Call kernel32.ReadFile(00000001,405c6b0c,00000208,405c6620,00000000) ret=00407093 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868 L"theAwtToolkitWindow",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call window proc 0x18017410 (hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000) 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.GetCursorPos(48846ad4) ret=18017440 0809dfa8:Call x11drv.GetCursorPos(48846ad4) ret=408c6813 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 080713c8:Ret kernel32.ReadFile() retval=00000000 ret=00407093 080713c8:Call kernel32.Sleep(00000208) ret=00407100 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Ret x11drv.GetCursorPos() retval=000001bf ret=408c6813 0809dfa8:Ret user32.GetCursorPos() retval=00000001 ret=18017440 0809dfa8:Call user32.WindowFromPoint(00000224,000001bf) ret=18017450 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5 0809dfa8:Ret ntdll.RtlAllocateHeap() retval=403e8b40 ret=408dded5 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000080) ret=408dded5 0809dfa8:Ret ntdll.RtlAllocateHeap() retval=403e8bc8 ret=408dded5 0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8bc8) ret=408ddead 0809dfa8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=408ddead 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003572) ret=408e660e 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e660e 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,18003580) ret=408e662c 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e662c 0809dfa8:Call kernel32.IsBadReadPtr16(18003580,0000000e) ret=408e6641 0809dfa8:Ret kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call window proc 0x18003580 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=1800359b 0809dfa8:Ret user32.GetPropA() retval=412d1860 ret=1800359b 0809dfa8:Call user32.CallWindowProcA(409225e0,00010023,00000084,00000000,01bf0224) ret=18004571 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225d2) ret=408e660e 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e660e 0809dfa8:Call kernel32.HeapValidate(40e70000,00000000,409225e0) ret=408e662c 0809dfa8:Ret kernel32.HeapValidate() retval=00000000 ret=408e662c 0809dfa8:Call kernel32.IsBadReadPtr16(409225e0,0000000e) ret=408e6641 0809dfa8:Ret kernel32.IsBadReadPtr16() retval=00000001 ret=408e6641 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call window proc 0x409225e0 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call user32.DefWindowProcA(00010023,00000084,00000000,01bf0224) ret=408e623b 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret user32.DefWindowProcA() retval=00000001 ret=408e623b 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret window proc 0x409225e0 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) retval=00000001 0809dfa8:Ret user32.CallWindowProcA() retval=00000001 ret=18004571 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01e,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000c ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5b58 L"",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret window proc 0x18003580 (hwnd=00010023,msg=WM_NCHITTEST,wp=00000000,lp=01bf0224) retval=00000001 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e3da6 0809dfa8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=408e3da6 0809dfa8:Ret user32.WindowFromPoint() retval=00010023 ret=18017450 0809dfa8:Call user32.GetPropA(00010023,0000c01c) ret=18017465 0809dfa8:Ret user32.GetPropA() retval=412d1860 ret=18017465 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Call kernel32.GlobalGetAtomNameW(0000c01b,40931f30,0000003c) ret=408b56d3 0809dfa8:Ret kernel32.GlobalGetAtomNameW() retval=0000000d ret=408b56d3 0809dfa8:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809dfa8:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809dfa8:Call kernel32.lstrcpynW(40931fa8,403d5868 L"theAwtToolkitWindow",00000010) ret=408e15b4 0809dfa8:Ret kernel32.lstrcpynW() retval=40931fa8 ret=408e15b4 0809dfa8:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809dfa8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809dfa8:Ret window proc 0x18017410 (hwnd=00010021,msg=WM_TIMER,wp=00000101,lp=00000000) retval=00000000 0809dfa8:Ret user32.DispatchMessageA() retval=00000000 ret=180177e9 0809dfa8:Call user32.PeekMessageA(48846c54,00000000,00000000,00000000,00000001) ret=180177f8 0809dfa8:Call x11drv.MsgWaitForMultipleObjectsEx(00000000,00000000,00000000,00000000,00000000) ret=408fd663 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call kernel32.WaitForMultipleObjectsEx(00000001,48846954,00000000,00000000,00000000) ret=40b05dd3 0809dfa8:Ret kernel32.WaitForMultipleObjectsEx() retval=00000102 ret=40b05dd3 0809dfa8:Ret x11drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=408fd663 0809dfa8:Call kernel32._ConfirmSysLevel(40930d58) ret=408ddb6e 0809dfa8:Ret kernel32._ConfirmSysLevel() retval=00000000 ret=408ddb6e 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.ReleaseThunkLock(48846b30) ret=408fd6cc 0809dfa8:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=408fd6cc 0809dfa8:Ret user32.PeekMessageA() retval=00000000 ret=180177f8 0809dfa8:Call user32.WaitMessage() ret=1801776a 0809dfa8:Call kernel32.GetThreadQueue16(00000000) ret=408d4a27 0809dfa8:Ret kernel32.GetThreadQueue16() retval=0000036f ret=408d4a27 0809dfa8:Call kernel32.GlobalLock16(0000036f) ret=408d4a4b 0809dfa8:Ret kernel32.GlobalLock16() retval=403d5450 ret=408d4a4b 0809dfa8:Call kernel32.ReleaseThunkLock(48846a3c) ret=408cc817 0809dfa8:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=408cc817 0809dfa8:Call x11drv.MsgWaitForMultipleObjectsEx(00000001,48846ab4,ffffffff,000000ff,00000000) ret=408cc83f 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809dfa8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809dfa8:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809dfa8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Call kernel32.WaitForMultipleObjectsEx(00000002,48846850,00000000,ffffffff,00000000) ret=40b05dd3 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809d910:Call user32.GetOpenClipboardWindow() ret=40b03a47 0809d910:Ret user32.GetOpenClipboardWindow() retval=00010021 ret=40b03a47 0809d910:Call user32.CLIPBOARD_EmptyCache(00000001) ret=40b03a87 0809d910:Ret user32.CLIPBOARD_EmptyCache() retval=00000001 ret=40b03a87 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809d910:Call user32.GetAncestor(00010021,00000002) ret=40b03ad3 0809d910:Call ntdll.RtlAllocateHeap(40360000,00000000,00000040) ret=408e22b9 0809d910:Ret ntdll.RtlAllocateHeap() retval=403e8b40 ret=408e22b9 0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809d910:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809d910:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809d910:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809d910:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809d910:Call ntdll.RtlFreeHeap(40360000,00000000,403e8b40) ret=408e1b90 0809d910:Ret ntdll.RtlFreeHeap() retval=00000001 ret=408e1b90 0809d910:Ret user32.GetAncestor() retval=00010021 ret=40b03ad3 0809d910:Call user32.WIN_GetPtr(00010021) ret=40b0dbed 0809d910:Call kernel32._EnterSysLevel(40930d58) ret=408dc6ec 0809d910:Ret kernel32._EnterSysLevel() retval=00000008 ret=408dc6ec 0809d910:Ret user32.WIN_GetPtr() retval=403d53b8 ret=40b0dbed 0809d910:Call user32.USER_Unlock() ret=40b0dc15 0809d910:Call kernel32._LeaveSysLevel(40930d58) ret=408dc71c 0809d910:Ret kernel32._LeaveSysLevel() retval=00000000 ret=408dc71c 0809d910:Ret user32.USER_Unlock() retval=00000000 ret=40b0dc15 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d910:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40b127fc 0809d910:Call ntdll.RtlLeaveCriticalSection(40b25704) ret=40b1282c 0809d910:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40b1282c 0809dfa8:Ret kernel32.WaitForMultipleObjectsEx() retval=00000001 ret=40b05dd3 0809dfa8:Call ntdll.RtlEnterCriticalSection(40b25704) ret=40b127fc 0809d330:Call kernel32.GetTickCount() ret=40fedefa 0809d330:Ret kernel32.GetTickCount() retval=0001439a ret=40fedefa
Then come about 10000 quite boring lines, containing the following:
These four lines:
0809d330:Call kernel32.GetTickCount() ret=40fee0bb 0809d330:Ret kernel32.GetTickCount() retval=00015683 ret=40fee0bb 0809d330:Call kernel32.GetTickCount() ret=40fedefa 0809d330:Ret kernel32.GetTickCount() retval=00015695 ret=40fedefa
repeatedly interleaved with approx. 25 times these four lines:
0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e
Then comes the error:
0809d330:Call kernel32.GetTickCount() ret=40fee0bb 0809d330:Ret kernel32.GetTickCount() retval=00015699 ret=40fee0bb 0809d190:Ret kernel32.WaitForMultipleObjects() retval=00000102 ret=1a00e7d8 err:ntdll:RtlpWaitForCriticalSection section 0x40b25704 "x11drv_main.c: X11DRV_CritSection" wait timed out, retrying (60 sec) tid=0809dfa8 0809d190:Call winmm.timeGetTime() ret=1a00e815 0809d190:Call kernel32.ReleaseThunkLock(47816d30) ret=40fee8cc 0809d190:Ret kernel32.ReleaseThunkLock() retval=00000000 ret=40fee8cc 0809d190:Call kernel32.RestoreThunkLock(00000000) ret=40fee8d5 0809d190:Ret kernel32.RestoreThunkLock() retval=00000000 ret=40fee8d5 0809d190:Call kernel32.IsBadWritePtr(403d0ae8,00000054) ret=40fee120 0809d190:Ret kernel32.IsBadWritePtr() retval=00000000 ret=40fee120 0809d190:Ret winmm.timeGetTime() retval=00015695 ret=1a00e815 0809d190:Call kernel32.Sleep(00000001) ret=1a00e7be 0809d330:Call kernel32.GetTickCount() ret=40fedefa 0809d330:Ret kernel32.GetTickCount() retval=000157d1 ret=40fedefa 0809d330:Call ntdll.RtlEnterCriticalSection(403d0afc) ret=40fedf55 0809d330:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40fedf55 0809d330:Call ntdll.RtlLeaveCriticalSection(403d0afc) ret=40fee01e 0809d330:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40fee01e
and then the last four lines again get repeated many times etc.
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT http://bugs.winehq.com/show_bug.cgi?id=1027. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.