Since the old version broke unexpectedly, I have installed the latest
released RPM's for FC3. Now quicken fails silently, even when I revert
to the earlier version.
I have turned on logging with WINDEDEBUG=all. Here are the last 400
lines of the log.
I would appreciate any assistance that you can give.
0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count
after 1
0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80
0009:Call kernel32.UnMapLS(00000000) ret=7f89427f
0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb8b8) ret=7f8942c2
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb8b8): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2
0009:Call kernel32.98(7f94e320) ret=7f903fa8
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
before 1
0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
after 0
0009:Ret kernel32.98() retval=00000052 ret=7f903fa8
0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb71b7a
0009:Call user32.UnregisterClassW(7fa7fbc4
L"msctls_trackbar32",00000000) ret=7eb75934
0009:Call kernel32.GlobalFindAtomW(7fa7fbc4 L"msctls_trackbar32")
ret=7f894e02
0009:Call ntdll.NtFindAtom(7fa7fbc4,00000022,7fa7f9ba) ret=7fccb7d7
0009: find_atom( table=(nil), name=L"msctls_trackbar32" )
0009: find_atom() = 0 { atom=c017 }
0009:trace:atom:NtFindAtom L"msctls_trackbar32" -> c017
0009:Ret ntdll.NtFindAtom() retval=00000000 ret=7fccb7d7
0009:Ret kernel32.GlobalFindAtomW() retval=0000c017 ret=7f894e02
0009:trace:class:UnregisterClassW L"msctls_trackbar32" (nil) c017
0009: destroy_class( atom=c017, instance=(nil) )
0009: destroy_class() = 0 { client_ptr=0x7fdeb900 }
0009:trace:class:CLASS_FreeClass 0x7fdeb900
0009:Call kernel32.97(7f94e320) ret=7f903f80
0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count
before 0
0009:Call ntdll.RtlEnterCriticalSection(7f94e320) ret=7fd1fa24
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24
0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count
after 1
0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80
0009:Call kernel32.UnMapLS(00000000) ret=7f89427f
0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb900) ret=7f8942c2
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb900): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2
0009:Call kernel32.98(7f94e320) ret=7f903fa8
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
before 1
0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
after 0
0009:Ret kernel32.98() retval=00000052 ret=7f903fa8
0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb75934
0009:Call user32.UnregisterClassW(7fa7fbd4 L"SysTreeView32",00000000)
ret=7eb7f966
0009:Call kernel32.GlobalFindAtomW(7fa7fbd4 L"SysTreeView32")
ret=7f894e02
0009:Call ntdll.NtFindAtom(7fa7fbd4,0000001a,7fa7f9ca) ret=7fccb7d7
0009: find_atom( table=(nil), name=L"SysTreeView32" )
0009: find_atom() = 0 { atom=c018 }
0009:trace:atom:NtFindAtom L"SysTreeView32" -> c018
0009:Ret ntdll.NtFindAtom() retval=00000000 ret=7fccb7d7
0009:Ret kernel32.GlobalFindAtomW() retval=0000c018 ret=7f894e02
0009:trace:class:UnregisterClassW L"SysTreeView32" (nil) c018
0009: destroy_class( atom=c018, instance=(nil) )
0009: destroy_class() = 0 { client_ptr=0x7fdeb948 }
0009:trace:class:CLASS_FreeClass 0x7fdeb948
0009:Call kernel32.97(7f94e320) ret=7f903f80
0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count
before 0
0009:Call ntdll.RtlEnterCriticalSection(7f94e320) ret=7fd1fa24
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24
0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count
after 1
0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80
0009:Call kernel32.UnMapLS(00000000) ret=7f89427f
0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb948) ret=7f8942c2
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb948): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2
0009:Call kernel32.98(7f94e320) ret=7f903fa8
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
before 1
0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
after 0
0009:Ret kernel32.98() retval=00000052 ret=7f903fa8
0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb7f966
0009:Call user32.UnregisterClassW(7fa7fbd4
L"msctls_updown32",00000000)
ret=7eb81c64
0009:Call kernel32.GlobalFindAtomW(7fa7fbd4 L"msctls_updown32")
ret=7f894e02
0009:Call ntdll.NtFindAtom(7fa7fbd4,0000001e,7fa7f9ca) ret=7fccb7d7
0009: find_atom( table=(nil), name=L"msctls_updown32" )
0009: find_atom() = 0 { atom=c019 }
0009:trace:atom:NtFindAtom L"msctls_updown32" -> c019
0009:Ret ntdll.NtFindAtom() retval=00000000 ret=7fccb7d7
0009:Ret kernel32.GlobalFindAtomW() retval=0000c019 ret=7f894e02
0009:trace:class:UnregisterClassW L"msctls_updown32" (nil) c019
0009: destroy_class( atom=c019, instance=(nil) )
0009: destroy_class() = 0 { client_ptr=0x7fdeb990 }
0009:trace:class:CLASS_FreeClass 0x7fdeb990
0009:Call kernel32.97(7f94e320) ret=7f903f80
0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count
before 0
0009:Call ntdll.RtlEnterCriticalSection(7f94e320) ret=7fd1fa24
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24
0009:trace:syslevel:_EnterSysLevel (0x7f94e320, level 2): thread 9 count
after 1
0009:Ret kernel32.97() retval=7fd9e220 ret=7f903f80
0009:Call kernel32.UnMapLS(00000000) ret=7f89427f
0009:Ret kernel32.UnMapLS() retval=7fd19bed ret=7f89427f
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,00000000) ret=7f8942a2
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942a2
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb990) ret=7f8942c2
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb990): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7f8942c2
0009:Call kernel32.98(7f94e320) ret=7f903fa8
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
before 1
0009:Call ntdll.RtlLeaveCriticalSection(7f94e320) ret=7fd1fbce
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce
0009:trace:syslevel:_LeaveSysLevel (0x7f94e320, level 2): thread 9 count
after 0
0009:Ret kernel32.98() retval=00000052 ret=7f903fa8
0009:Ret user32.UnregisterClassW() retval=00000001 ret=7eb81c64
0009:Call gdi32.DeleteObject(000001b8) ret=7eb06425
0009:Call kernel32.97(7f849460) ret=7eeb96ec
0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count
before 0
0009:Call ntdll.RtlEnterCriticalSection(7f849460) ret=7fd1fa24
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24
0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count
after 1
0009:Ret kernel32.97() retval=7fd9e220 ret=7eeb96ec
0009:trace:gdi:GDI_GetObjPtr (0x1b8): enter 1
0009:trace:gdi:DeleteObject 0x1b8
0009:Call kernel32.97(7f849460) ret=7eeb96ec
0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count
before 1
0009:Call ntdll.RtlEnterCriticalSection(7f849460) ret=7fd1fa24
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24
0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count
after 2
0009:Ret kernel32.97() retval=7fd9e220 ret=7eeb96ec
0009:trace:gdi:GDI_GetObjPtr (0x1bc): enter 2
0009:trace:gdi:DeleteObject 0x1bc
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb5d0) ret=7ee93591
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb5d0): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7ee93591
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb570) ret=7eeba00b
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb570): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7eeba00b
0009:trace:gdi:GDI_FreeObject (0x1bc): leave 2
0009:Call kernel32.98(7f849460) ret=7eeb9fa4
0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count
before 2
0009:Call ntdll.RtlLeaveCriticalSection(7f849460) ret=7fd1fbce
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce
0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count
after 1
0009:Ret kernel32.98() retval=00000052 ret=7eeb9fa4
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb548) ret=7eeba00b
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb548): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7eeba00b
0009:trace:gdi:GDI_FreeObject (0x1b8): leave 1
0009:Call kernel32.98(7f849460) ret=7eeb9fa4
0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count
before 1
0009:Call ntdll.RtlLeaveCriticalSection(7f849460) ret=7fd1fbce
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce
0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count
after 0
0009:Ret kernel32.98() retval=00000052 ret=7eeb9fa4
0009:Ret gdi32.DeleteObject() retval=00000001 ret=7eb06425
0009:Call gdi32.DeleteObject(000001b4) ret=7eb0643c
0009:Call kernel32.97(7f849460) ret=7eeb96ec
0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count
before 0
0009:Call ntdll.RtlEnterCriticalSection(7f849460) ret=7fd1fa24
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd1fa24
0009:trace:syslevel:_EnterSysLevel (0x7f849460, level 3): thread 9 count
after 1
0009:Ret kernel32.97() retval=7fd9e220 ret=7eeb96ec
0009:trace:gdi:GDI_GetObjPtr (0x1b4): enter 1
0009:trace:gdi:DeleteObject 0x1b4
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb530) ret=7ee93591
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb530): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7ee93591
0009:Call ntdll.RtlFreeHeap(7fda0000,00000000,7fdeb4e8) ret=7eeba00b
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb4e8): returning
TRUE
0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=7eeba00b
0009:trace:gdi:GDI_FreeObject (0x1b4): leave 1
0009:Call kernel32.98(7f849460) ret=7eeb9fa4
0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count
before 1
0009:Call ntdll.RtlLeaveCriticalSection(7f849460) ret=7fd1fbce
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd1fbce
0009:trace:syslevel:_LeaveSysLevel (0x7f849460, level 3): thread 9 count
after 0
0009:Ret kernel32.98() retval=00000052 ret=7eeb9fa4
0009:Ret gdi32.DeleteObject() retval=00000001 ret=7eb0643c
0009:Call kernel32.GlobalDeleteAtom(0000c00b) ret=7eb0645a
0009:Call ntdll.NtDeleteAtom(0000c00b) ret=7fccb4fe
0009: delete_atom( table=(nil), atom=c00b )
0009: delete_atom() = 0
0009:Ret ntdll.NtDeleteAtom() retval=00000000 ret=7fccb4fe
0009:Ret kernel32.GlobalDeleteAtom() retval=00000000 ret=7eb0645a
0009:trace:commctrl:DllMain Subclassing atom deleted: 0xc00b
0009:Call kernel32.FreeLibrary(7db20000) ret=7eb81d63
0009:Call ntdll.LdrUnloadDll(7db20000) ret=7fcfb177
0009:trace:module:LdrUnloadDll (0x7db20000)
0009:Ret ntdll.LdrUnloadDll() retval=00000000 ret=7fcfb177
0009:Ret kernel32.FreeLibrary() retval=00000001 ret=7eb81d63
0009:Ret PE DLL (proc=0x7eb81d6c,module=0x7eaf0000
L"comctl32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7db2fe00,module=0x7db20000
L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1)
0009:trace:uxtheme:DllMain 0x7db20000 0x0 0x1: stub
0009:Ret PE DLL (proc=0x7db2fe00,module=0x7db20000
L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7ebea630,module=0x7ebc0000
L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1)
0009:trace:shell:DllMain 0x7ebc0000 0x0 0x1
0009:Call kernel32.TlsFree(00000003) ret=7ebde5ac
0009:Call ntdll.RtlAcquirePebLock() ret=7fd077f4
0009:Ret ntdll.RtlAcquirePebLock() retval=00000000 ret=7fd077f4
0009:Call ntdll.RtlAreBitsSet(7beff86c,00000003,00000001) ret=7fd0786d
0009:trace:ntdll:RtlAreBitsSet (0x7beff86c,3,1)
0009:Ret ntdll.RtlAreBitsSet() retval=00000001 ret=7fd0786d
0009:Call ntdll.RtlClearBits(7beff86c,00000003,00000001) ret=7fd078b1
0009:trace:ntdll:RtlClearBits (0x7beff86c,3,1)
0009:Ret ntdll.RtlClearBits() retval=ffff00ff ret=7fd078b1
0009:Call ntdll.NtSetInformationThread
(fffffffe,0000000a,7fa7fb5c,00000004) ret=7fd078df
0009:Ret ntdll.NtSetInformationThread() retval=00000000 ret=7fd078df
0009:Call ntdll.RtlReleasePebLock() ret=7fd0783d
0009:Ret ntdll.RtlReleasePebLock() retval=00000000 ret=7fd0783d
0009:Ret kernel32.TlsFree() retval=00000001 ret=7ebde5ac
0009:Ret PE DLL (proc=0x7ebea630,module=0x7ebc0000
L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x65f17038,module=0x65f00000
L"ole32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.CreateMutexA(7fa7fa90,00000000,65f17294
"OleHeapDestroyMutex") ret=65f207c8
0009:Call ntdll.RtlInitUnicodeString(7fa7f758,7fa7f7a8
L"OleHeapDestroyMutex") ret=7fd1d0fc
0009:Ret ntdll.RtlInitUnicodeString() retval=00000028 ret=7fd1d0fc
0009:Call ntdll.NtCreateMutant(7fa7f754,001f0001,7fa7f760,00000000)
ret=7fd1d124
0009: create_mutex( access=001f0001, attributes=00000040, owned=0,
name=L"OleHeapDestroyMutex" )
0009: create_mutex() = 0 { handle=0x100 }
0009:Ret ntdll.NtCreateMutant() retval=00000000 ret=7fd1d124
0009:Call ntdll.RtlNtStatusToDosError(00000000) ret=7fd1d12f
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000000 ret=7fd1d12f
0009:Ret kernel32.CreateMutexA() retval=00000100 ret=65f207c8
0009:Call kernel32.GetLastError() ret=65f207d8
0009:Ret kernel32.GetLastError() retval=00000000 ret=65f207d8
0009:Call kernel32.WaitForSingleObject(00000100,ffffffff) ret=65f20800
0009:Call ntdll.NtWaitForMultipleObjects
(00000001,7fa7f8a0,00000000,00000000,00000000) ret=7fd1c47f
0009: select( flags=4, cookie=0x7fa7f6b0, signal=(nil), timeout=0,
handles={0x100} )
0009: select() = 0
0009:Ret ntdll.NtWaitForMultipleObjects() retval=00000000 ret=7fd1c47f
0009:Ret kernel32.WaitForSingleObject() retval=00000000 ret=65f20800
0009:Call kernel32.ReleaseMutex(00000100) ret=65f1719d
0009:Call ntdll.NtReleaseMutant(00000100,00000000) ret=7fd1d353
0009: release_mutex( handle=0x100 )
0009: release_mutex() = 0 { prev_count=00000001 }
0009:Ret ntdll.NtReleaseMutant() retval=00000000 ret=7fd1d353
0009:Ret kernel32.ReleaseMutex() retval=00000001 ret=65f1719d
0009:Call kernel32.CloseHandle(00000100) ret=65f171a6
0009:Call ntdll.NtClose(00000100) ret=7fd07f3a
0009: close_handle( handle=0x100 )
0009: close_handle() = 0 { fd=-1 }
0009:Ret ntdll.NtClose() retval=00000000 ret=7fd07f3a
0009:Ret kernel32.CloseHandle() retval=00000001 ret=65f171a6
0009:Call ntdll.RtlEnterCriticalSection(65fb3520) ret=65f20841
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=65f20841
0009:Call kernel32.ReleaseMutex(000000c4) ret=65f3b601
0009:Call ntdll.NtReleaseMutant(000000c4,00000000) ret=7fd1d353
0009: release_mutex( handle=0xc4 )
0009: release_mutex() = MUTANT_NOT_OWNED { prev_count=00000000 }
0009:Ret ntdll.NtReleaseMutant() retval=c0000046 ret=7fd1d353
0009:Call ntdll.RtlNtStatusToDosError(c0000046) ret=7fd1d370
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000120 ret=7fd1d370
0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b601
0009:Call kernel32.CloseHandle(000000c4) ret=65f3b60d
0009:Call ntdll.NtClose(000000c4) ret=7fd07f3a
0009: close_handle( handle=0xc4 )
0009: close_handle() = 0 { fd=-1 }
0009:Ret ntdll.NtClose() retval=00000000 ret=7fd07f3a
0009:Ret kernel32.CloseHandle() retval=00000001 ret=65f3b60d
0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b62a
0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353
0009: release_mutex( handle=(nil) )
0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 }
0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370
0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b62a
0009:Call kernel32.CloseHandle(00000000) ret=65f3b636
0009:Call ntdll.NtClose(00000000) ret=7fd07f3a
0009: close_handle( handle=(nil) )
0009: close_handle() = INVALID_HANDLE { fd=0 }
0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a
0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b636
0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b653
0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353
0009: release_mutex( handle=(nil) )
0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 }
0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370
0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b653
0009:Call kernel32.CloseHandle(00000000) ret=65f3b65f
0009:Call ntdll.NtClose(00000000) ret=7fd07f3a
0009: close_handle( handle=(nil) )
0009: close_handle() = INVALID_HANDLE { fd=0 }
0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a
0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b65f
0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b67c
0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353
0009: release_mutex( handle=(nil) )
0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 }
0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370
0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b67c
0009:Call kernel32.CloseHandle(00000000) ret=65f3b688
0009:Call ntdll.NtClose(00000000) ret=7fd07f3a
0009: close_handle( handle=(nil) )
0009: close_handle() = INVALID_HANDLE { fd=0 }
0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a
0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b688
0009:Call kernel32.ReleaseMutex(00000000) ret=65f3b695
0009:Call ntdll.NtReleaseMutant(00000000,00000000) ret=7fd1d353
0009: release_mutex( handle=(nil) )
0009: release_mutex() = INVALID_HANDLE { prev_count=00000000 }
0009:Ret ntdll.NtReleaseMutant() retval=c0000008 ret=7fd1d353
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd1d370
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd1d370
0009:Ret kernel32.ReleaseMutex() retval=00000000 ret=65f3b695
0009:Call kernel32.CloseHandle(00000000) ret=65f3b6a1
0009:Call ntdll.NtClose(00000000) ret=7fd07f3a
0009: close_handle( handle=(nil) )
0009: close_handle() = INVALID_HANDLE { fd=0 }
0009:Ret ntdll.NtClose() retval=c0000008 ret=7fd07f3a
0009:Call ntdll.RtlNtStatusToDosError(c0000008) ret=7fd07f6a
0009:Ret ntdll.RtlNtStatusToDosError() retval=00000006 ret=7fd07f6a
0009:Ret kernel32.CloseHandle() retval=00000000 ret=65f3b6a1
0009:Call ntdll.RtlDeleteCriticalSection(65fb3538) ret=65f0f4f2
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb498): returning
TRUE
0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=65f0f4f2
0009:Call ntdll.RtlLeaveCriticalSection(65fb3520) ret=65f20862
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=65f20862
0009:Call ntdll.RtlDeleteCriticalSection(65fb3520) ret=65f3b6ce
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fdeb470): returning
TRUE
0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=65f3b6ce
0009:Ret PE DLL (proc=0x65f17038,module=0x65f00000
L"ole32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7f917f98,module=0x7f880000
L"user32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.__wine_dll_unregister_16(7f9469dc) ret=7f8822bd
0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000a
ret=7f8822bd
0009:Call kernel32.__wine_dll_unregister_16(7f947090) ret=7f8827cd
0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000b
ret=7f8827cd
0009:Call kernel32.__wine_dll_unregister_16(7f947b4c) ret=7f882a35
0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000c
ret=7f882a35
0009:Call kernel32.__wine_dll_unregister_16(7f947fdc) ret=7f882b0d
0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000d
ret=7f882b0d
0009:Call kernel32.__wine_dll_unregister_16(7f948398) ret=7f884825
0009:Ret kernel32.__wine_dll_unregister_16() retval=0000000e
ret=7f884825
0009:Ret PE DLL (proc=0x7f917f98,module=0x7f880000
L"user32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7dd6bb90,module=0x7dd10000
L"winex11.drv",reason=PROCESS_DETACH,res=0x1)
0009:Call ntdll.RtlEnterCriticalSection(7dd7f3c0) ret=7dd5a90a
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7dd5a90a
0009:Call ntdll.RtlLeaveCriticalSection(7dd7f3c0) ret=7dd5a97c
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7dd5a97c
0009:Call ntdll.RtlEnterCriticalSection(7dd7f3c0) ret=7dd5a90a
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7dd5a90a
0009:Call ntdll.RtlLeaveCriticalSection(7dd7f3c0) ret=7dd5a97c
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7dd5a97c
0009:Call ntdll.RtlEnterCriticalSection(7dd7f660) ret=7dd66e0f
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7dd66e0f
0009:Call ntdll.RtlLeaveCriticalSection(7dd7f660) ret=7dd66e40
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7dd66e40
0009:Call ntdll.RtlDeleteCriticalSection(7dd7f3c0) ret=7dd5ac9d
0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=7dd5ac9d
0009:Call kernel32.TlsFree(00000000) ret=7dd5acb0
0009:Call ntdll.RtlAcquirePebLock() ret=7fd077f4
0009:Ret ntdll.RtlAcquirePebLock() retval=00000000 ret=7fd077f4
0009:Call ntdll.RtlAreBitsSet(7beff86c,00000000,00000001) ret=7fd0786d
0009:trace:ntdll:RtlAreBitsSet (0x7beff86c,0,1)
0009:Ret ntdll.RtlAreBitsSet() retval=00000001 ret=7fd0786d
0009:Call ntdll.RtlClearBits(7beff86c,00000000,00000001) ret=7fd078b1
0009:trace:ntdll:RtlClearBits (0x7beff86c,0,1)
0009:Ret ntdll.RtlClearBits() retval=000000fe ret=7fd078b1
0009:Call ntdll.NtSetInformationThread
(fffffffe,0000000a,7fa7f9cc,00000004) ret=7fd078df
0009:Ret ntdll.NtSetInformationThread() retval=00000000 ret=7fd078df
0009:Call ntdll.RtlReleasePebLock() ret=7fd0783d
0009:Ret ntdll.RtlReleasePebLock() retval=00000000 ret=7fd0783d
0009:Ret kernel32.TlsFree() retval=00000001 ret=7dd5acb0
0009:Ret PE DLL (proc=0x7dd6bb90,module=0x7dd10000
L"winex11.drv",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x763912c0,module=0x76390000
L"imm32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call ntdll.RtlDeleteCriticalSection(763a6020) ret=76391307
0009:trace:heap:RtlFreeHeap (0x7fda0000,00000002,0x7fde91a8): returning
TRUE
0009:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=76391307
0009:Ret PE DLL (proc=0x763912c0,module=0x76390000
L"imm32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7eee0894,module=0x7ee80000
L"gdi32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call kernel32.__wine_dll_unregister_16(7f844ed8) ret=7ee89b4d
0009:Ret kernel32.__wine_dll_unregister_16() retval=00000007
ret=7ee89b4d
0009:Call kernel32.__wine_dll_unregister_16(7f844fd0) ret=7ee8b4dd
0009:Ret kernel32.__wine_dll_unregister_16() retval=00000008
ret=7ee8b4dd
0009:Call kernel32.__wine_dll_unregister_16(7f848d70) ret=7ee8b699
0009:Ret kernel32.__wine_dll_unregister_16() retval=00000009
ret=7ee8b699
0009:Ret PE DLL (proc=0x7eee0894,module=0x7ee80000
L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7ed907d0,module=0x7ed70000
L"advapi32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Ret PE DLL (proc=0x7ed907d0,module=0x7ed70000
L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7fd317ec,module=0x7fcc0000
L"kernel32.dll",reason=PROCESS_DETACH,res=0x1)
0009:Call ntdll.RtlEnterCriticalSection(7fd9e160) ret=7fd12055
0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd12055
0009:Call ntdll.RtlLeaveCriticalSection(7fd9e160) ret=7fd12065
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd12065
0009:Ret PE DLL (proc=0x7fd317ec,module=0x7fcc0000
L"kernel32.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Call PE DLL (proc=0x7bee2948,module=0x7bea0000
L"ntdll.dll",reason=PROCESS_DETACH,res=0x1)
0009:Ret PE DLL (proc=0x7bee2948,module=0x7bea0000
L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) retval=1
0009:Ret ntdll.LdrShutdownProcess() retval=00000000 ret=7fd0745f
0009:Call ntdll.NtTerminateProcess(ffffffff,00000000) ret=7fd0746f
0009: terminate_process( handle=0xffffffff, exit_code=0 )
0009: terminate_process() = 0 { self=1 }
0009: *killed* exit_code=0
wineserver: exiting (pid=4467)
On Fri, 2005-11-25 at 21:05 -0600, David Johnson wrote: > Wine 20050111 has been working fine until today ... now it fails when I
> go to run Quicken 2002.
>
> I am running Fedora Core 3 on a Pentium 3 with all of the current
> updates, wine 20050111. Windows Version is set to "Win98"
>
> Error message:
>
> fixme:msvcrt:_setmbcp Unreal codepages (e.g. -3) not implemented.
>
> What has happened?
>
> Thanks,
>
> David Johnson
>
>
> _______________________________________________
> wine-users mailing list
> wine-users@winehq.org
> http://www.winehq.org/mailman/listinfo/wine-users