el_es <el_es_cr <at> yahoo.co.uk> writes: > > el_es <el_es_cr <at> yahoo.co.uk> writes: > [...] > > I have done a debug trace with 1.1.26. > The new debug trace is here : > > http://rapidshare.com/files/262053290/DEBSTdebug1126.txt.bz2.html > MD5: 824E5BD4057455FCC3BEF34789208C0E > > Thanks in advance :) > > Lukasz > > Now I got some time to browse through the debug trace, I found this : 0009:Call oleaut32.SysFreeString(019e1d6c L"Select * From BasicSettings") ret=6610207f 0009:Call ntdll.RtlFreeHeap(00110000,00000000,019e1d68) ret=7ea0283d 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7ea0283d 0009:Ret oleaut32.SysFreeString() retval=00000001 ret=6610207f 0009:trace:seh:__regs_RtlUnwind handler at 0x4055d6 returned 1 0009:Ret ntdll.RtlUnwind() retval=00000000 ret=66102497 0009: eax=00000000 ebx=7b82d730 ecx=0032ee1c edx=0013bc88 esi=004013d0 edi=0032ee1c ebp=0032e69c esp=0032e690 ds=007b es=007b fs=0033 gs=003b flags=00000202 (sorry for mangling this, gmane doesn't like more than 80 chars in line...) Can be found at around line 1961045 in the trace. also this looks interesting : (line 2005552 +) 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,0042419c "SpeedTest32",ffffffff,0021771c,0000000c) ret=66026f50 0009:Ret KERNEL32.MultiByteToWideChar() retval=0000000c ret=66026f50 0009:Call KERNEL32.TlsGetValue(00000004) ret=66026d10 0009:Ret KERNEL32.TlsGetValue() retval=0013bc88 ret=66026d10 0009:Call KERNEL32.RaiseException(c000008f,00000001,00000002,0032e7f0) ret=66026d97 0009:trace:seh:raise_exception code=c000008f flags=1 addr=0x7b844623 ip=7b844623 tid=0009 0009:trace:seh:raise_exception info[0]=deadcafe 0009:trace:seh:raise_exception info[1]=deadcafe 0009:trace:seh:raise_exception eax=7b82ee21 ebx=7b8b7ff4 ecx=00000000 edx=0032e7f0 esi=0032e7f0 edi=0032e770 0009:trace:seh:raise_exception ebp=0032e758 esp=0032e6f4 cs=0073 ds=007b es=007b fs=0033 gs=003b flags=00000246 0009:trace:seh:call_vectored_handlers calling handler at 0x7e82f010 code=c000008f flags=1 0009:trace:seh:call_vectored_handlers handler at 0x7e82f010 returned 0 0009:trace:seh:call_vectored_handlers calling handler at 0x7b841280 code=c000008f flags=1 0009:trace:seh:call_vectored_handlers handler at 0x7b841280 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x4055d6 code=c000008f flags=1 0009:Call KERNEL32.IsBadReadPtr(004013c0,00000004) ret=660270ae 0009:Ret KERNEL32.IsBadReadPtr() retval=00000000 ret=660270ae 0009:Call KERNEL32.TlsGetValue(00000004) ret=66026dc9 0009:Ret KERNEL32.TlsGetValue() retval=0013bc88 ret=66026dc9 0009:Call ntdll.RtlUnwind(0032ef1c,66102497,00000000,00000000) ret=66102497 0009: eax=00000001 ebx=7b82d730 ecx=0032ef1c edx=0013bc88 esi=004013c0 edi=0032ef1c ebp=0032e25c esp=0032e250 ds=007b es=007b fs=0033 gs=003b flags=00000202 0009:trace:seh:__regs_RtlUnwind code=c0000027 flags=2 0009:trace:seh:__regs_RtlUnwind calling handler at 0x7bc6b990 code=c0000027 flags=2 0009:trace:seh:__regs_RtlUnwind handler at 0x7bc6b990 returned 1 0009:Ret ntdll.RtlUnwind() retval=00000000 ret=66102497 0009: eax=00000000 ebx=7b82d730 ecx=0032ef1c edx=0013bc88 esi=004013c0 edi=0032ef1c ebp=0032e25c esp=0032e250 ds=007b es=007b fs=0033 gs=003b flags=00000202 (this is the after last hit when searching for 'type' in this file, which is finding line 2005538 - the one with SysFreeString L"Type mismatch". Just before that, it goes SysFreeString L"SpeedTest32"; Would that help to see what's going on there ? Lukasz