http://bugs.winehq.org/show_bug.cgi?id=2850
------- Additional Comments From nklepeis@sbcglobal.net 2005-03-04 20:55 ------- Here's more info on jack_fst.
Obtained from: http://www.linuxaudiosystems.com/fst/
(Use with Wine version 20050310)
Here are the last lines of debugging output: (WINEDEBUG=+relay jack_fst Ambience.dll >& fstdebug.out;)
0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995 0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83 0009:Ret kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995 0009:Ret user32.GetWindowLongW() retval=04c00000 ret=7ef7e717 0009:Ret x11drv.CreateWindow() retval=00000001 ret=7f132d17 0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d 0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24 0009:Ret kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d 0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995 0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83 0009:Ret kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995 0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d 0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24 0009:Ret kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d 0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995 0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83 0009:Ret kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995 0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d 0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24 0009:Ret kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d 0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995 0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83 0009:Ret kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995 0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d 0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24 0009:Ret kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d 0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995 0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83 0009:Ret kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995 0009:Call kernel32.GlobalLock16(0000110f) ret=7f129229 0009:Ret kernel32.GlobalLock16() retval=7fea8a90 ret=7f129229 0009:Ret user32.CreateWindowExW() retval=00010024 ret=7c12845f 0009:Call ntdll.RtlEnterCriticalSection(7c172940) ret=7c12837e 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7c12837e 0009:Call ntdll.RtlLeaveCriticalSection(7c172940) ret=7c1283ac 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7c1283ac 0009:Call kernel32.GlobalAlloc(00002042,00000018) ret=7c125b8c 0009:Call ntdll.RtlLockHeap(7fe70000) ret=7fdb77ab 0009:Ret ntdll.RtlLockHeap() retval=00000001 ret=7fdb77ab 0009:Call ntdll.RtlAllocateHeap(7fe70000,00000000,00000008) ret=7fdb7686 0009:Ret ntdll.RtlAllocateHeap() retval=7fea9170 ret=7fdb7686 0009:Call ntdll.RtlAllocateHeap(7fe70000,00000008,00000020) ret=7fdb7686 0009:Ret ntdll.RtlAllocateHeap() retval=7fed7b70 ret=7fdb7686 0009:Call ntdll.RtlUnlockHeap(7fe70000) ret=7fdb7803 0009:Ret ntdll.RtlUnlockHeap() retval=00000001 ret=7fdb7803 0009:Ret kernel32.GlobalAlloc() retval=7fea9172 ret=7c125b8c 0009:Call kernel32.GlobalLock(7fea9172) ret=7c125b9f 0009:Call ntdll.RtlLockHeap(7fe70000) ret=7fdb78f5 0009:Ret ntdll.RtlLockHeap() retval=00000001 ret=7fdb78f5 0009:Call ntdll.RtlUnlockHeap(7fe70000) ret=7fdb7992 0009:Ret ntdll.RtlUnlockHeap() retval=00000001 ret=7fdb7992 0009:Ret kernel32.GlobalLock() retval=7fed7b78 ret=7c125b9f 0009:Call user32.RegisterClassA(bffff5ac) ret=7c1438df 0009:Call kernel32.GetModuleHandleW(00000000) ret=7f10d3ba 0009:Ret kernel32.GetModuleHandleW() retval=b7fe0000 ret=7f10d3ba 0009:Call kernel32.GlobalAddAtomA(7c165800 "WineDragDropTracker32") ret=7f10d3cb0009:Ret kernel32.GlobalAddAtomA() retval=0000c028 ret=7f10d3cb 0009:Call ntdll.RtlAllocateHeap(7fe70000,00000008,00000044) ret=7f10cf4d 0009:Ret ntdll.RtlAllocateHeap() retval=7fed7b98 ret=7f10cf4d 0009:Call kernel32.GlobalDeleteAtom(0000c028) ret=7f10cfc9 0009:Ret kernel32.GlobalDeleteAtom() retval=00000000 ret=7f10cfc9 0009:Call kernel32._EnterSysLevel(7f1c78e0) ret=7f12d96d 0009:Call ntdll.RtlEnterCriticalSection(7f1c78e0) ret=7fdecc24 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdecc24 0009:Ret kernel32._EnterSysLevel() retval=7fe6e500 ret=7f12d96d 0009:Call ntdll.RtlEnterCriticalSection(7f1c7940) ret=7f1390bc 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7f1390bc 0009:Call ntdll.RtlLeaveCriticalSection(7f1c7940) ret=7f1390d8 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7f1390d8 0009:Call kernel32.UnMapLS(00000000) ret=7f10c909 0009:Ret kernel32.UnMapLS() retval=00000000 ret=7f10c909 0009:Call kernel32._LeaveSysLevel(7f1c78e0) ret=7f12d995 0009:Call ntdll.RtlLeaveCriticalSection(7f1c78e0) ret=7fdecd83 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdecd83 0009:Ret kernel32._LeaveSysLevel() retval=7fe6e6ce ret=7f12d995 0009:Ret user32.RegisterClassA() retval=0000c028 ret=7c1438df 0009:Ret ole32.OleInitialize() retval=00000000 ret=100011cb 0009:Call ntdll.RtlEnterCriticalSection(1002a990) ret=1001623d 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=1001623d 0009:Call ntdll.RtlLeaveCriticalSection(1002a990) ret=1001616d 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=1001616d 0009:Call ntdll.RtlEnterCriticalSection(1002a990) ret=1001623d 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=1001623d 0009:Call ntdll.RtlLeaveCriticalSection(1002a990) ret=1001616d 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=1001616d 0009:Call ntdll.RtlAllocateHeap(7bc40000,00000000,00002a70) ret=100114ef 0009:Ret ntdll.RtlAllocateHeap() retval=7bc48240 ret=100114ef 0009:Call ntdll.RtlEnterCriticalSection(7bc4576c) ret=1000dbe9 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=1000dbe9 fst signal handler 4, thread = 0xb7fca8e0 fst signal handler 4 (TEB=0x7ff85000)