http://bugs.winehq.org/show_bug.cgi?id=3125
------- Additional Comments From t.serries@lvm.de 2005-03-08 07:00 ------- Sorry, I made a mistake while creating the +syslevel,+relay output.
Here is the (hopfully) correct one:
000d:Call kernel32.InterlockedDecrement(7ef50000) ret=65f01ea2 000d:Ret kernel32.InterlockedDecrement() retval=ffffffff ret=65f01ea2 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008248) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call kernel32.InterlockedDecrement(80006560) ret=65f17637 000d:Ret kernel32.InterlockedDecrement() retval=00000001 ret=65f17637 000d:Call ntdll.RtlFreeHeap(80000000,00000000,800064b0) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call kernel32.InterlockedDecrement(80006560) ret=65f17637 000d:Ret kernel32.InterlockedDecrement() retval=00000000 ret=65f17637 000d:Call kernel32.GetCurrentThreadId() ret=65f01e46 000d:Ret kernel32.GetCurrentThreadId() retval=0000000d ret=65f01e46 000d:Call kernel32.InterlockedIncrement(7ef50000) ret=65f01e50 000d:Ret kernel32.InterlockedIncrement() retval=00000000 ret=65f01e50 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80009788) ret=65f10d3b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008760) ret=65f10d3b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008730) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call ntdll.RtlFreeHeap(80000000,00000000,8000a7b0) ret=65f10d3b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b 000d:Call ntdll.RtlFreeHeap(80000000,00000000,8000a7d0) ret=65f10d3b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f10d3b 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80008270) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006548) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call kernel32.GetCurrentThreadId() ret=65f01e83 000d:Ret kernel32.GetCurrentThreadId() retval=0000000d ret=65f01e83 000d:Call kernel32.InterlockedDecrement(7ef50000) ret=65f01ea2 000d:Ret kernel32.InterlockedDecrement() retval=ffffffff ret=65f01ea2 000d:Call kernel32.InterlockedDecrement(800061f8) ret=65f176ae 000d:Ret kernel32.InterlockedDecrement() retval=00000002 ret=65f176ae 000d:Call kernel32.InterlockedDecrement(800065c0) ret=65f176ae 000d:Ret kernel32.InterlockedDecrement() retval=00000000 ret=65f176ae 000d:Call ntdll.RtlFreeHeap(80000000,00000000,800065f8) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006590) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call kernel32.InterlockedDecrement(800061f8) ret=65f176ae 000d:Ret kernel32.InterlockedDecrement() retval=00000001 ret=65f176ae 000d:Call kernel32.InterlockedDecrement(800061f8) ret=65f176ae 000d:Ret kernel32.InterlockedDecrement() retval=00000000 ret=65f176ae 000d:Call kernel32.CloseHandle(0000017c) ret=65f0f5ce 000d:Call ntdll.NtClose(0000017c) ret=2ae4e839 000d:Ret ntdll.NtClose() retval=00000000 ret=2ae4e839 000d:Ret kernel32.CloseHandle() retval=00000001 ret=65f0f5ce 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006230) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call ntdll.RtlFreeHeap(80000000,00000000,800061c8) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80005ec0) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call kernel32.CloseHandle(00000188) ret=65f0f57e 000d:Call ntdll.NtClose(00000188) ret=2ae4e839 000d:Ret ntdll.NtClose() retval=00000000 ret=2ae4e839 000d:Ret kernel32.CloseHandle() retval=00000001 ret=65f0f57e 000d:Call kernel32.GetCurrentThreadId() ret=65f0f507 000d:Ret kernel32.GetCurrentThreadId() retval=0000000d ret=65f0f507 000d:Call kernel32.GetCurrentThreadId() ret=65f01e83 000d:Ret kernel32.GetCurrentThreadId() retval=0000000d ret=65f01e83 000d:Call kernel32.InterlockedDecrement(7fa00000) ret=65f01ea2 000d:Ret kernel32.InterlockedDecrement() retval=ffffffff ret=65f01ea2 000d:Call kernel32.UnmapViewOfFile(7fa00000) ret=65f0f520 000d:Call ntdll.NtUnmapViewOfSection(ffffffff,7fa00000) ret=2ae6a7af 000d:Ret ntdll.NtUnmapViewOfSection() retval=00000000 ret=2ae6a7af 000d:Ret kernel32.UnmapViewOfFile() retval=00000001 ret=65f0f520 000d:Call kernel32.CloseHandle(0000018c) ret=65f0f52e 000d:Call ntdll.NtClose(0000018c) ret=2ae4e839 000d:Ret ntdll.NtClose() retval=00000000 ret=2ae4e839 000d:Ret kernel32.CloseHandle() retval=00000001 ret=65f0f52e 000d:Call kernel32.CloseHandle(00000190) ret=65f0f53c 000d:Call ntdll.NtClose(00000190) ret=2ae4e839 000d:Ret ntdll.NtClose() retval=00000000 ret=2ae4e839 000d:Ret kernel32.CloseHandle() retval=00000001 ret=65f0f53c 000d:Call ntdll.RtlFreeHeap(80000000,00000000,80006468) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call ntdll.RtlFreeHeap(80000000,00000000,8000a7f0) ret=65f01bb6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=65f01bb6 000d:Call kernel32.SetErrorMode(00008001) ret=30058e03 000d:Ret kernel32.SetErrorMode() retval=00000001 ret=30058e03 000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6 000d:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6 000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2 000d:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2 000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6 000d:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6 000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2 000d:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2 000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6 000d:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6 000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2 000d:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2 000d:Call ntdll.RtlEnterCriticalSection(30d64108) ret=308e05c6 000d:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=308e05c6 000d:Call ntdll.RtlLeaveCriticalSection(30d64108) ret=308e06f2 000d:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=308e06f2 000d:Call kernel32.GetLastError() ret=3000caa6 000d:Ret kernel32.GetLastError() retval=00000000 ret=3000caa6 000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4 000d:Ret kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4 000d:Call kernel32.SetLastError(00000000) ret=3000cac1 000d:Ret kernel32.SetLastError() retval=00000000 ret=3000cac1 000d:Call kernel32.GetLastError() ret=3000caa6 000d:Ret kernel32.GetLastError() retval=00000000 ret=3000caa6 000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4 000d:Ret kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4 000d:Call kernel32.SetLastError(00000000) ret=3000cac1 000d:Ret kernel32.SetLastError() retval=00000000 ret=3000cac1 000d:Call kernel32.GetLastError() ret=3000caa6 000d:Ret kernel32.GetLastError() retval=00000000 ret=3000caa6 000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4 000d:Ret kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4 000d:Call kernel32.SetLastError(00000000) ret=3000cac1 000d:Ret kernel32.SetLastError() retval=00000000 ret=3000cac1 000d:Call kernel32.GetLastError() ret=3000caa6 000d:Ret kernel32.GetLastError() retval=00000000 ret=3000caa6 000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4 000d:Ret kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4 000d:Call kernel32.SetLastError(00000000) ret=3000cac1 000d:Ret kernel32.SetLastError() retval=00000000 ret=3000cac1 000d:Call kernel32.GlobalFree(65376b0a) ret=300a005c 000d:Call ntdll.RtlLockHeap(65300000) ret=2ae36077 000d:Ret ntdll.RtlLockHeap() retval=00000001 ret=2ae36077 000d:Call ntdll.RtlFreeHeap(65300000,00000000,6536c9b0) ret=2ae35b26 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=2ae35b26 000d:Call ntdll.RtlFreeHeap(65300000,00000000,65376b08) ret=2ae35b26 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=2ae35b26 000d:Call ntdll.RtlUnlockHeap(65300000) ret=2ae360fb 000d:Ret ntdll.RtlUnlockHeap() retval=00000001 ret=2ae360fb 000d:Ret kernel32.GlobalFree() retval=00000000 ret=300a005c 000d:Call kernel32.GetLastError() ret=3000caa6 000d:Ret kernel32.GetLastError() retval=00000000 ret=3000caa6 000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4 000d:Ret kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4 000d:Call kernel32.SetLastError(00000000) ret=3000cac1 000d:Ret kernel32.SetLastError() retval=00000000 ret=3000cac1 000d:Call kernel32.GetLastError() ret=3000caa6 000d:Ret kernel32.GetLastError() retval=00000000 ret=3000caa6 000d:Call kernel32.TlsGetValue(00000005) ret=3000cab4 000d:Ret kernel32.TlsGetValue() retval=7fa70100 ret=3000cab4 000d:Call kernel32.SetLastError(00000000) ret=3000cac1 000d:Ret kernel32.SetLastError() retval=00000000 ret=3000cac1 000d:Call user32.SetFocus(00020054) ret=30b901aa 000d:Ret user32.SetFocus() retval=00020054 ret=30b901aa 000d:Call user32.InvalidateRect(00020048,4087d7ec,00000008) ret=309de42c 000d:Call kernel32._EnterSysLevel(4d4e4f60) ret=4d489f34 trace:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): thread d count before 0 err:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): Holding 0x12b298c0, level 3. Expect deadlock! 000d:Call ntdll.RtlEnterCriticalSection(4d4e4f60) ret=2ae60c48 000d:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=2ae60c48 trace:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): thread d count after 1 000d:Ret kernel32._EnterSysLevel() retval=2aedea00 ret=4d489f34 000d:Call kernel32._LeaveSysLevel(4d4e4f60) ret=4d489f58 trace:syslevel:_LeaveSysLevel (0x4d4e4f60, level 2): thread d count before 1 000d:Call ntdll.RtlLeaveCriticalSection(4d4e4f60) ret=2ae60d60 000d:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=2ae60d60 trace:syslevel:_LeaveSysLevel (0x4d4e4f60, level 2): thread d count after 0 000d:Ret kernel32._LeaveSysLevel() retval=0000004d ret=4d489f58 000d:Call ntdll.RtlAllocateHeap(65300000,00000000,00000040) ret=4d48d3bb 000d:Ret ntdll.RtlAllocateHeap() retval=65377790 ret=4d48d3bb 000d:Call kernel32._EnterSysLevel(4d4e4f60) ret=4d489f34 trace:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): thread d count before 0 err:syslevel:_EnterSysLevel (0x4d4e4f60, level 2): Holding 0x12b298c0, level 3. Expect deadlock!