On Thu, 28 Oct 2004 11:50:24 -0700, Duane Clark <dclark@xxxxxxxxxxx> wrote: <SNIP> > > When the program crashes, does it dump you into the Wine debugger so > that you can get a backtrace? > No, it doesn't. Neither of these outputs is exactly repeatable. This is just an idea of what I see. If I rerun either of these two I get something similar, but not exactly the same. I will say that I have a suspicion that the problem is somewhat graphics related. for whatever reason wine/jack_fst builds the graphics, then erases it and draws it again in he center of the screen. When it crashes I often see the first rendering, but never the second... When I run the Crystall VST, the last 20 or so lines look like this: 000b:Call ntdll.RtlEnterCriticalSection(7fc2f000) ret=7fdebaec^M 000b:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdebaec^M 000b:Ret kernel32._EnterSysLevel() retval=7fe6db80 ret=7fc06a4b^M 000b:Call x11drv.SelectBrush(7fed6468,0000007a) ret=7fbe4680^M 000b:Call gdi32.GetObjectA(0000007a,0000000c,7f7551a0) ret=7f9eaebf^M 000b:Call kernel32._EnterSysLevel(7fc2f000) ret=7fc06a4b^M 000b:Call ntdll.RtlEnterCriticalSection(7fc2f000) ret=7fdebaec^M 000b:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdebaec^M 000b:Ret kernel32._EnterSysLevel() retval=7fe6db80 ret=7fc06a4b^M 000b:Call kernel32.LOCAL_Lock(000010bf,0000007a) ret=7fc06b4f^M 000b:Ret kernel32.LOCAL_Lock() retval=7fe823fe ret=7fc06b4f^M 000b:Call kernel32.LOCAL_Unlock(000010bf,0000007a) ret=7fc06c46^M 000b:Ret kernel32.LOCAL_Unlock() retval=00000001 ret=7fc06c46^M 000b:Call kernel32._LeaveSysLevel(7fc2f000) ret=7fc06beb^M 000b:Call ntdll.RtlLeaveCriticalSection(7fc2f000) ret=7fdebc7b^M Segmentation fault^M ^[]0;mark@flash:~^G^[[01;31mflash ^[[01;34mmark $ ^[[00m^[[Kexit^M exit^M Script done on Thu Oct 28 15:07:16 2004 For the MidiMon VST I get something like this: 000b:Call kernel32._EnterSysLevel(7fc2f000) ret=7fc06a4b^M 000b:Call ntdll.RtlEnterCriticalSection(7fc2f000) ret=7fdebaec^M 000b:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdebaec^M 000b:Ret kernel32._EnterSysLevel() retval=7fe6db80 ret=7fc06a4b^M 000b:Call kernel32._LeaveSysLevel(7fc2f000) ret=7fc06beb^M 000b:Call ntdll.RtlLeaveCriticalSection(7fc2f000) ret=7fdebc7b^M 000b:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdebc7b^M 000b:Ret kernel32._LeaveSysLevel() retval=7fe6ddef ret=7fc06beb^M 000b:Ret gdi32.GetCurrentObject() retval=000007ac ret=7f9fa873^M 000b:Call gdi32.GDI_GetObjPtr(000007ac,00004f4b) ret=7f9fa72e^M 000b:Call kernel32._EnterSysLevel(7fc2f000) ret=7fc06a4b^M 000b:Call ntdll.RtlEnterCriticalSection(7fc2f000) ret=7fdebaec^M 000b:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fdebaec^M 000b:Ret kernel32._EnterSysLevel() retval=7fe6db80 ret=7fc06a4b^M 000b:Ret gdi32.GDI_GetObjPtr() retval=7fed70e0 ret=7f9fa72e^M 000b:Call gdi32.GDI_ReleaseObj(000007ac) ret=7f9fa756^M 000b:Call kernel32._LeaveSysLevel(7fc2f000) ret=7fc06beb^M 000b:Call ntdll.RtlLeaveCriticalSection(7fc2f000) ret=7fdebc7b^M 000b:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fdebc7b^M 000b:Ret kernel32._LeaveSysLevel() retval=7fe6ddef ret=7fc06beb^M Segmentation fault^M ^[]0;mark@flash:~^G^[[01;31mflash ^[[01;34mmark $ ^[[00m^[[Kexit^M exit^M Script done on Thu Oct 28 15:15:52 2004 _______________________________________________ wine-users mailing list wine-users@xxxxxxxxxx http://www.winehq.org/mailman/listinfo/wine-users