http://bugs.winehq.com/show_bug.cgi?id=1202
------- Additional Comments From puoti@inwind.it 2003-01-07 16:28 ------- Here is the output using current cvs (01/07/2003)
Auto-generated debug report by Wine Quick Debug Report Maker Thingy: WINE Version: Wine 20021219 Windows Version: None Installed Distribution: Mandrake 9.0 Kernel Version: 2.4.19-16mdk OS Type: Linux CPU: i686 GCC Version: Configured with: ../configure --prefix=/usr --libdir=/usr/lib --with-slibdir=/lib --mandir=/usr/share/man --infodir=/usr/share/info --enable-shared --enable-threads=posix --disable-checking --enable-long-long --enable-__cxa_atexit --enable-languages=c,c++,ada,f77,objc,java --host=i586-mandrake-linux-gnu --with-system-zlib Program: Microsoft Motocross Madness Trial Program Type: Win32 Debug Options: -debugmsg +relay Other Extra Commands Passed: Extra ./configure Commands: None Wine Dependencies:
Last 200 lines of debug output follows: 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32.LOCAL_Lock(0000017f,00000cb6) ret=4096b74f 080e7dd8:Ret kernel32.LOCAL_Lock() retval=403635d6 ret=4096b74f 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32.LOCAL_Lock(0000017f,00000cb2) ret=4096b74f 080e7dd8:Ret kernel32.LOCAL_Lock() retval=403635be ret=4096b74f 080e7dd8:Call kernel32.LOCAL_Unlock(0000017f,00000cb2) ret=4096b84d 080e7dd8:Ret kernel32.LOCAL_Unlock() retval=00000000 ret=4096b84d 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Call kernel32.LOCAL_Unlock(0000017f,00000cb6) ret=4096b84d 080e7dd8:Ret kernel32.LOCAL_Unlock() retval=00000000 ret=4096b84d 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Call x11drv.SetDeviceClipping(403aef78,00000cb6) ret=4095dce1 080e7dd8:Call gdi32.GetRegionData(00000cb6,00000000,00000000) ret=409c5522 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32.LOCAL_Lock(0000017f,00000cb6) ret=4096b74f 080e7dd8:Ret kernel32.LOCAL_Lock() retval=403635d6 ret=4096b74f 080e7dd8:Call kernel32.LOCAL_Unlock(0000017f,00000cb6) ret=4096b84d 080e7dd8:Ret kernel32.LOCAL_Unlock() retval=00000000 ret=4096b84d 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Ret gdi32.GetRegionData() retval=00000030 ret=409c5522 080e7dd8:Call ntdll.RtlAllocateHeap(40360000,00000000,00000030) ret=409c5544 080e7dd8:Ret ntdll.RtlAllocateHeap() retval=403add48 ret=409c5544 080e7dd8:Call gdi32.GetRegionData(00000cb6,00000030,403add48) ret=409c555b 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32.LOCAL_Lock(0000017f,00000cb6) ret=4096b74f 080e7dd8:Ret kernel32.LOCAL_Lock() retval=403635d6 ret=4096b74f 080e7dd8:Call kernel32.LOCAL_Unlock(0000017f,00000cb6) ret=4096b84d 080e7dd8:Ret kernel32.LOCAL_Unlock() retval=00000000 ret=4096b84d 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Ret gdi32.GetRegionData() retval=00000030 ret=409c555b 080e7dd8:Call ntdll.RtlEnterCriticalSection(40a0bc6c) ret=409f0a5c 080e7dd8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=409f0a5c 080e7dd8:Call ntdll.RtlLeaveCriticalSection(40a0bc6c) ret=409f0a8c 080e7dd8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=409f0a8c 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403add48) ret=409c56c1 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=409c56c1 080e7dd8:Ret x11drv.SetDeviceClipping() retval=00000001 ret=4095dce1 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Call x11drv.DeleteDC(403aef78) ret=4096026b 080e7dd8:Call ntdll.RtlEnterCriticalSection(40a0bc6c) ret=409f0a5c 080e7dd8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=409f0a5c 080e7dd8:Call ntdll.RtlLeaveCriticalSection(40a0bc6c) ret=409f0a8c 080e7dd8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=409f0a8c 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403aef78) ret=409d3edb 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=409d3edb 080e7dd8:Ret x11drv.DeleteDC() retval=00000001 ret=4096026b 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32.LOCAL_Lock(0000017f,00000cb2) ret=4096b74f 080e7dd8:Ret kernel32.LOCAL_Lock() retval=403635be ret=4096b74f 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403af3b8) ret=40970a39 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40970a39 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403af010) ret=40970a4b 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40970a4b 080e7dd8:Call kernel32.LOCAL_Unlock(0000017f,00000cb2) ret=4096b60b 080e7dd8:Ret kernel32.LOCAL_Unlock() retval=00000000 ret=4096b60b 080e7dd8:Call kernel32.LOCAL_Free(0000017f,00000cb2) ret=4096b61e 080e7dd8:Ret kernel32.LOCAL_Free() retval=00000000 ret=4096b61e 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b576 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b576 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32.LOCAL_Lock(0000017f,00000cb6) ret=4096b74f 080e7dd8:Ret kernel32.LOCAL_Lock() retval=403635d6 ret=4096b74f 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403af408) ret=40970a39 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40970a39 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403af3e0) ret=40970a4b 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40970a4b 080e7dd8:Call kernel32.LOCAL_Unlock(0000017f,00000cb6) ret=4096b60b 080e7dd8:Ret kernel32.LOCAL_Unlock() retval=00000000 ret=4096b60b 080e7dd8:Call kernel32.LOCAL_Free(0000017f,00000cb6) ret=4096b61e 080e7dd8:Ret kernel32.LOCAL_Free() retval=00000000 ret=4096b61e 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b576 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b576 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403af280) ret=4096b5d4 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4096b5d4 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b576 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b576 080e7dd8:Call ntdll.RtlEnterCriticalSection(40990cf0) ret=40974f05 080e7dd8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=40974f05 080e7dd8:Call ntdll.RtlLeaveCriticalSection(40990cf0) ret=40974f2d 080e7dd8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=40974f2d 080e7dd8:Ret gdi32.DeleteDC() retval=00000001 ret=404b5a28 080e7dd8:Call gdi32.DeleteObject(00000cc2) ret=404b5a0c 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call kernel32.LOCAL_Lock(0000017f,00000cc2) ret=4096b74f 080e7dd8:Ret kernel32.LOCAL_Lock() retval=4036361e ret=4096b74f 080e7dd8:Call kernel32.LOCAL_Unlock(0000017f,00000cc2) ret=4096b60b 080e7dd8:Ret kernel32.LOCAL_Unlock() retval=00000000 ret=4096b60b 080e7dd8:Call kernel32.LOCAL_Free(0000017f,00000cc2) ret=4096b61e 080e7dd8:Ret kernel32.LOCAL_Free() retval=00000000 ret=4096b61e 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b576 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b576 080e7dd8:Ret gdi32.DeleteObject() retval=00000001 ret=404b5a0c 080e7dd8:Call gdi32.DeleteObject(00000100) ret=404b59fe 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403bb808) ret=4095d2f8 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4095d2f8 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403bb460) ret=4096b5d4 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4096b5d4 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b576 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b576 080e7dd8:Ret gdi32.DeleteObject() retval=00000001 ret=404b59fe 080e7dd8:Call gdi32.DeleteObject(000000f8) ret=404b59f6 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Call x11drv.DeleteBitmap(000000f8) ret=4095d306 080e7dd8:Call gdi32.GDI_GetObjPtr(000000f8,00004f4b) ret=409c4be0 080e7dd8:Call kernel32._EnterSysLevel(40990c60) ret=4096b658 080e7dd8:Ret kernel32._EnterSysLevel() retval=400f2bd0 ret=4096b658 080e7dd8:Ret gdi32.GDI_GetObjPtr() retval=403b1790 ret=409c4be0 080e7dd8:Call ntdll.RtlEnterCriticalSection(40a0bc6c) ret=409f0a5c 080e7dd8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=409f0a5c 080e7dd8:Call ntdll.RtlLeaveCriticalSection(40a0bc6c) ret=409f0a8c 080e7dd8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=409f0a8c 080e7dd8:Call gdi32.GDI_ReleaseObj(000000f8) ret=409c4c03 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b807 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b807 080e7dd8:Ret gdi32.GDI_ReleaseObj() retval=00000000 ret=409c4c03 080e7dd8:Ret x11drv.DeleteBitmap() retval=00000001 ret=4095d306 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403b1790) ret=4096b5d4 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4096b5d4 080e7dd8:Call kernel32._LeaveSysLevel(40990c60) ret=4096b576 080e7dd8:Ret kernel32._LeaveSysLevel() retval=00000000 ret=4096b576 080e7dd8:Ret gdi32.DeleteObject() retval=00000001 ret=404b59f6 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,40361230) ret=404b59e8 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=404b59e8 080e7dd8:Call kernel32.CloseHandle(00000024) ret=404b6b8e 080e7dd8:Ret kernel32.CloseHandle() retval=00000001 ret=404b6b8e 080e7dd8:Call kernel32.CloseHandle(00000044) ret=404b6b86 080e7dd8:Ret kernel32.CloseHandle() retval=00000001 ret=404b6b86 080e7dd8:Call kernel32.CloseHandle(00000028) ret=404b6b7d 080e7dd8:Ret kernel32.CloseHandle() retval=00000001 ret=404b6b7d 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403af848) ret=404b6b75 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=404b6b75 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,40361ff8) ret=404b6b5c 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=404b6b5c 080e7dd8:Call kernel32.ExitProcess(00000000) ret=404b04c3 080e7dd8:Call PE DLL (proc=0x408b25f0,module=0x40830000,type=0,res=0x1) 080e7dd8:Ret PE DLL (proc=0x408b25f0,module=0x40830000,type=0,res=0x1) retval=1 080e7dd8:Call PE DLL (proc=0x409f1a60,module=0x409c0000,type=0,res=0x1) 080e7dd8:Call ntdll.RtlEnterCriticalSection(40a0bca4) ret=409f29ce 080e7dd8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=409f29ce 080e7dd8:Call ntdll.RtlLeaveCriticalSection(40a0bca4) ret=409f29fe 080e7dd8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=409f29fe 080e7dd8:Call kernel32.CloseHandle(00000040) ret=409f18ba 080e7dd8:Ret kernel32.CloseHandle() retval=00000001 ret=409f18ba 080e7dd8:Call ntdll.RtlEnterCriticalSection(40a0bc6c) ret=409f0a5c 080e7dd8:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=409f0a5c 080e7dd8:Call ntdll.RtlLeaveCriticalSection(40a0bc6c) ret=409f0a8c 080e7dd8:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=409f0a8c 080e7dd8:Call ntdll.RtlFreeHeap(40360000,00000000,403ac9f8) ret=409f18e0 080e7dd8:Ret ntdll.RtlFreeHeap() retval=00000001 ret=409f18e0 080e7dd8:Call ntdll.RtlDeleteCriticalSection(40a0bc6c) ret=409f192c 080e7dd8:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=409f192c 080e7dd8:Ret PE DLL (proc=0x409f1a60,module=0x409c0000,type=0,res=0x1) retval=1 080e7dd8:Call PE DLL (proc=0x409782a0,module=0x40940000,type=0,res=0x1) 080e7dd8:Ret PE DLL (proc=0x409782a0,module=0x40940000,type=0,res=0x1) retval=1 080e7dd8:Call PE DLL (proc=0x407a9bf0,module=0x40780000,type=0,res=0x1) 080e7dd8:Ret PE DLL (proc=0x407a9bf0,module=0x40780000,type=0,res=0x1) retval=1 080e7dd8:Call kernel32.__wine_unregister_dll_16(408e2244) ret=40839c8c 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=0000000b ret=40839c8c 080e7dd8:Call kernel32.__wine_unregister_dll_16(408e2600) ret=40839fcc 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=0000000c ret=40839fcc 080e7dd8:Call kernel32.__wine_unregister_dll_16(408e2c54) ret=4083a53c 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=0000000d ret=4083a53c 080e7dd8:Call kernel32.__wine_unregister_dll_16(408e3424) ret=4083acac 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=0000000e ret=4083acac 080e7dd8:Call kernel32.__wine_unregister_dll_16(408e3624) ret=4083ae5c 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=0000000f ret=4083ae5c 080e7dd8:Call kernel32.__wine_unregister_dll_16(409902bc) ret=409511dc 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=00000008 ret=409511dc 080e7dd8:Call kernel32.__wine_unregister_dll_16(409903e4) ret=409512ac 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=00000009 ret=409512ac 080e7dd8:Call kernel32.__wine_unregister_dll_16(409906f0) ret=409515cc 080e7dd8:Ret kernel32.__wine_unregister_dll_16() retval=0000000a ret=409515cc
I have a copy of the full debug report, if it is needed. Thank you!
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT http://bugs.winehq.com/show_bug.cgi?id=1202. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.