2017-07-24 SHL http://trac.netlabs.org/efte/ticket/75 IBM OS/2 Dump Formatter for a retail or an hstrict SMP kernel. Formatter is --> Internal revision 14.106_SMP Dump file is --> Internal revision 14.109_SMP (process dump) -- This is probably Holger's patched kernel. Symbol (d:\devtools\pmdf\14_106_smp_t60\os2krnlr.sym) linked Current slot number: 0106 Slot Pid Ppid Csid Ord Sta Pri pTSD pPTDA pTCB Disp SG Name *0106# 0134 0033 0134 0002 run 0500 f9282000 f984a7c0 f93a2030 0940 1f EFTEPM eax=00000001 ebx=70207020 ecx=70207020 edx=70207020 esi=70207020 edi=70207020 eip=70207020 esp=00db9a9c ebp=70207020 iopl=0 rf -- -- nv up ei pl nz ac pe nc cs=005b ss=0053 ds=0053 es=0053 fs=150b gs=0000 cr2=00000000 cr3=00000000 p=01 Invalid linear address: 005b:70207020 # .h IBM OS/2 Dump Formatter for a retail or an hstrict SMP kernel. Formatter is --> Internal revision 14.106_SMP Dump file is --> Internal revision 14.109_SMP (process dump) Dump Requested: 01/08/2017 - 10:18:34 Dump Started: 01/08/2017 - 10:18:35 Dump Completed: 01/08/2017 - 10:18:36 Free Space Req/Actual: 10240K / 4194303K Dump File size: 69260672 Dump state: Normal Dump cause: Trap Kernel type: retail smp Trap type: 0000000e Key Pid/Tid/Slot: 0x0134/0x0002/0x0106 Req Pid/Tid: 0x0134/0x0002 Sys Collected Data: 000c1070 Defaults for System level (PDUMPSYS) dumps: SYSSUMM IDT SYSFS SYSVM SYSTK SYSSEM TRACE STRACE SMP SYSIO SYSPG Defaults for User level (PDUMPUSR) dumps: SUMM PRIVATE SHARED INSTANCE MVDM SEM SYSLDR SYSFS SYSVM SYSSEM SYSIO SYSPG Original Dump Filename: P:\EFTE\DUMP\PDUMP.001 PID:134 Requested Information: Children:0 Parents:0 Kill:N SUMM PRIVATE SHARED INSTANCE MVDM SEM SYSLDR SYSFS SYSVM SYSSEM SYSIO SYSPG ** ALL data collected ** TRAP SCREEN INFORMATION ------------------------------------------------------------ Trap screen 1 found at address #70:989c This screen is most likely related to a previous trap. P1=00000001 P2=70207020 P3=XXXXXXXX P4=XXXXXXXX CS:EIP=005b:70207020 CSACC=f0df CSLIM=ffffffff SS:ESP=0053:00db9a9c SSACC=f0f3 SSLIM=ffffffff EBP=70207020 FLG=00010216 EAX=00000001 EBX=70207020 ECX=70207020 EDX=70207020 ESI=70207020 EDI=70207020 DS=0053 DSACC=f0f3 DSLIM=ffffffff ES=0053 ESACC=f0f3 ESLIM=ffffffff FS=150b FSACC=00f3 FSLIM=00000030 GS=0000 GSACC=**** GSLIM=******* No Symbols Found ------------------------------------------------------------------------ XWPHOOK 03/29/2016 01:10:00 33,546 M:\XWORKPLACE\BIN\XWPHOOK.DLL PMMERGE 11/23/2014 18:39:22 1,754,169 M:\OS2\DLL\PMMERGE.DLL # .p Slot Pid Ppid Csid Ord Sta Pri pTSD pPTDA pTCB Disp SG Name 0105 0134 0033 0134 0001 crt 0500 f9281000 f984a7c0 f93a1d2c 0f10 1f EFTEPM *0106# 0134 0033 0134 0002 run 0500 f9282000 f984a7c0 f93a2030 0940 1f EFTEPM ------------------------------------------------------------------------ -- Peek at thread 1 # .s 105 Current slot number: 0105 # r eax=00000bb8 ebx=001c9561 ecx=00000000 edx=00000000 esi=1d684fbc edi=ffffffff eip=1fcaf331 esp=0059eee8 ebp=0059ef20 iopl=0 -- -- -- nv up ei pl zr na pe nc cs=005b ss=0053 ds=0053 es=0053 fs=150b gs=0000 cr2=00000000 cr3=00000000 p=** 005b:1fcaf331 83c40c add esp,+0c # ln %1fcaf1bc PMMERGE SleepPmq + 175 Analyzing Call Gate ... is in a call to: %1ffc09a0 DOSCALL1 DOS32PMWAITEVENTSEM # k 005b:1fcb3c31 00000bff ffffffff 00000000 0059ef5c [PMMERGE WIN32PEEKMSG + c4d] # %findsym Finding from 0059ede8 to 0059efe8 by dword 59ee08: 1fc01a02 = MatchColorDirectDefaultPalette + c86 ; PMMERGE 59ee30: 1fc4497c = UpdatePhyColorAttributes + 3e4 59eedc: 00072dc6 = GFrame__InsertView + 2e 59eee4: 1fcaf331 = SleepPmq + 175 59ef04: 00072fff = GFrame__SetMenu + 3f 59ef24: 1fcb3c31 = WIN32PEEKMSG + c4d 59ef38: 00070001 = AVIOWndProc + 439 59efac: 1fcb1893 = WIN32GETMSG + 23 59efd0: 00073721 = GUI__RunProgram + 75 59f018: 00067c17 = main + b3 Scan stopped at 59f068 stopaddr 59efe8 ------------------------------------------------------------------------ -- Back to trapping thread # .s* # .p# Slot Pid Ppid Csid Ord Sta Pri pTSD pPTDA pTCB Disp SG Name *0106# 0134 0033 0134 0002 run 0500 f9282000 f984a7c0 f93a2030 0940 1f EFTEPM # .pu# Slot Pid Ord pPTDA Name pstkframe CS:EIP SS:ESP cbargs *0106# 0134 0002 f984a7c0 EFTEPM %f9282f38 005b:70207020 0053:00db9814 0000 # dd 00db9a9c (from trap scree) 0053:00db9a9c 70207020 70207020 70207020 70207020 0053:00db9aac 70207020 70207020 70207020 70207020 0053:00db9abc 70207020 70207020 70207020 70207020 0053:00db9acc 70207020 70207020 70207020 70207020 0053:00db9adc 70207020 70207020 70207020 70207020 0053:00db9aec 70207020 70207020 70207020 70207020 0053:00db9afc 70207020 70207020 70207020 00db9bd8 0053:00db9b0c 00db9bd8 00db9bdc 00000000 00000000 0053:00db9b1c 1d6ef038 1d6da248 1d6da248 00000000 -- Stack is trashed # da %1d6da248 %1d6da248 WARPSANS # da %1d6da248 %1d6da248 WARPSANS -- Code may have been doing font action or this might just be leftovers. hookSendMsgHook stack frame - maybe eip hwnd 0053:00db9b2c 0000000c 00db9b80 1e05083f 80000043 msg mp1 mp2 0053:00db9b3c 00000008 00db9c50 00000000 00db9bd8 0053:00db9b4c 00000000 00db9bd8 1fcda7bb 00000004 0053:00db9b5c 00000004 00000000 1fcfbe02 00000009 0053:00db9b6c 00000000 1d6d03d4 1d6cf670 00db9cf4 0053:00db9b7c 00db9bb8 1fcb2f51 1fac0613 1dd2af80 0053:00db9b8c 0007a2c6 fffffffc 1d6cf670 00db9cf4 # ln %1e05083f %1e050000 XWPHOOK G_HookData + 83f ; hookSendMsgHook + 2c -- #define WM_ADJUSTWINDOWPOS 0x0008 -- Send hook handling WM_ADJUSTWINDOWPOS # dd 00db9c50 (PSWP) - gibberish - probably overwritten fl cy cx y %00db9c50 00008000 00000001 00000001 00000001 SWP_NOAUTOCLOSE x hwndIns %00db9c60 00000001 00000001 00000001 00000001 %00db9c70 00000001 00000001 00000001 1d684a4a %00db9c80 00000000 00000000 00000000 00000000 # .m %1e05083f *har par cpg va flg next prev link hash hob hal 0d2b %fdfa91bc 00000010 %1e050000 3d9 0d2a 0d2c 0000 0000 0ea9 0000 hco=02a2a hob har hobnxt flgs own hmte sown,cnt lt st xf 0ea9 0d2b 0000 0838 0ea7 0ea7 0000 00 00 00 00 shared m:xwphook.dll TCBOrdinal : 0002 TCBptib : %005b0060 # %tib %005b0060 tib_pexchain ffffffff tib_pstack 00da0000 tib_pstacklimit 00dba000 tib_ptib2 005b0078 tib_version 00000014 tib_ordinal 00000106 tib2_ultid 00000002 tib2_ulpri 00000200 tib2_version 00000014 tib2_usMCCount 0000 tib2_fMCForceFlag 0000 ? 00dba000 - 00da0000 = 0001a000H ; stack size # %findsym 00db6000 00dba000 Finding from 00db6000 to 00dba000 by dword db85e4: 0007eea9 = _parse_tz + 49 db85fc: 0007eb1b = _CacheOSTZ + 18b db8604: 000abb70 = __end_dst + 30 db8608: 000abb70 = __end_dst + 30 db8648: 000abb70 = __end_dst + 30 db8650: 000abb4c = __end_dst + c db8654: 0007f592 = _isindst + 212 db8668: 0007f164 = _brktime + 64 db868c: 000790f9 = write + 49 db86ac: 0007ea24 = _CacheOSTZ + 94 db86dc: 000773d8 = tmpnam + c8 db8774: 0007eea9 = _parse_tz + 49 db878c: 0007eb1b = _CacheOSTZ + 18b db8794: 000abb70 = __end_dst + 30 db8798: 000abb70 = __end_dst + 30 db87d8: 0007a271 = _OS2RemoveThread + 41 db87e0: 0007a179 = _AllocInitThreadData + 19 db87f8: 00074ffb = _open_flags + b db881c: 00074ca0 = use_os2_high_mem + 10 db882c: 00061238 = FileInfo__FileInfo + 28 db8838: 000614b9 = FileFind__FindFirst + 1a1 db8928: 00060a53 = SlashDir + 4b db8978: 00060d9e = ExpandPath + 236 db8988: 0007eea9 = _parse_tz + 49 db89a0: 0007eb1b = _CacheOSTZ + 18b db89a8: 000abb70 = __end_dst + 30 db89ac: 000abb70 = __end_dst + 30 db89ec: 000abb70 = __end_dst + 30 db89f4: 000abb4c = __end_dst + c db89f8: 0007f592 = _isindst + 212 db8a0c: 0007f164 = _brktime + 64 db8a30: 000790f9 = write + 49 db8a50: 0007ea24 = _CacheOSTZ + 94 db8a80: 000773d8 = tmpnam + c8 db8b7c: 0007eea9 = _parse_tz + 49 db8b94: 0007eb1b = _CacheOSTZ + 18b db8b9c: 000abb70 = __end_dst + 30 db8ba0: 000abb70 = __end_dst + 30 db8bb4: 1ffc77d9 = HT32_Exit + 5 db8bc0: 1ffc7de1 = THK32XHNDLR db8bec: 1ffc3e8b = DOS32FINDNEXT + 3b db8c34: 00061506 = FileFind__FindNext + 3a db8ccc: 00060a53 = SlashDir + 4b db8d1c: 00060d9e = ExpandPath + 236 db8d58: 1ffca438 = _xcptGPFDefaultAction + a0 db8d70: 1ffc9e7d = DOS32R3EXCEPTIONDISPATCHER + 165 db8eb4: 000751a9 = _open_flags + 1b9 db8edc: 0002c000 = EBuffer__UnTabPoint + a8 db8f14: 1ffc0053 = DOS32QUERYSYSINFO + a db8f38: 000a0c40 = HistoryFileName + 30 db8f50: 1ffc87bc = DOS32OPENL db8f60: 1ffc881b = DOS32OPENL + 5f db8f68: 1ffc77d9 = HT32_Exit + 5 db8f74: 1ffc7de1 = THK32XHNDLR db8f7c: 1ffc87bc = DOS32OPENL db8f9c: 1ffc77d9 = HT32_Exit + 5 db8fa4: 1ffc2526 = DOS32READ + 2a db8fac: 000acfc0 = FileBuffer + 30 db8fc4: 1ffc77d9 = HT32_Exit + 5 db8fd4: 000acfc0 = FileBuffer + 30 db8fec: 0007a271 = _OS2RemoveThread + 41 db8ff4: 0007a179 = _AllocInitThreadData + 19 db90c4: 1ffc5e51 = DOS32WRITE + 29 db90e4: 1ffc5e51 = DOS32WRITE + 29 db912c: 1ffc5e51 = DOS32WRITE + 29 db956c: 1ffc5e51 = DOS32WRITE + 29 db963c: 1ffc77d9 = HT32_Exit + 5 db9684: 1ffc77d9 = HT32_Exit + 5 db96ec: 1fcbcda0 = DoEnableSubfunction + 58 db96f8: 1fcbab2f = ResetDC32 + 5fb db970c: 1fcbac04 = ResetDC32 + 6d0 db9744: 11ef3c1c = p:eftepm.exe 0004:15388 ; %11ef3c1c M:\OS2\DLL\DOSCALL1.DLL db9758: 11eb1314 = p:exceptq.dll 0001:4884 db976c: 1fcc1d8a = InvertCursor + 262 db9788: 1ffca2ee = _xcptExecuteUserExceptionHandler + 46 db978c: 1ffc1b7f = DOS32UNSETEXCEPTIONHANDLER + 3b db9794: 1ffca30d = _xcptExecuteUserExceptionHandler + 65 db97a8: 1ffca330 = _xcptR3ExceptionHandler db97c4: 1ffc9f9a = _xcptR3ExceptionDispatcher + 10e db97d8: 1fcd87ea = ShowCursor + 5e db97e0: 1fac0613 = m:pmgre.dll 0002:1555 db97e8: 1fcc914c = WIN32SHOWCURSOR + 38 db97f4: 00071f5d = GView__xGView + 4d db9810: 1ffc9e7d = DOS32R3EXCEPTIONDISPATCHER + 165 db9974: fff42309 = _PGPageFault + 446 db9b34: 1e05083f = G_HookData + 83f hookSendMsgHook + 2c db9b54: 1fcda7bb = GetHookToCall + 1e3 PMMERGE db9b64: 1fcfbe02 = WinQueueWndProc + e db9b80: 1fcb2f51 = CallSendMsgHook + 17d db9b84: 1fac0613 = m:pmgre.dll 0002:1555 db9b8c: 0007a2c6 = _InitMultipleThread + 46 ; EFTEPM data db9ba0: 1e050cee = G_HookData + cee ; hookInputHook + ee db9bac: 1fac0613 = m:pmgre.dll 0002:1555 db9bb4: 1fcda7bb = GetHookToCall + 1e3 db9bc0: 1e050cee = G_HookData + cee db9be0: 1fcb2dac = CallInputHook + 174 db9be8: 1fcb2dc6 = CallInputHook + 18e PMMERGE db9bf4: 1fcbd4f2 = ReadMessage + 182 db9c2c: 1fcb371a = WIN32PEEKMSG + 736 db9c48: 00200bff = p:eftepm.exe 0003:1510399 db9c4c: 1fcb371a = WIN32PEEKMSG + 736 db9ca8: 0007a2c6 = _InitMultipleThread + 46 db9cb8: 00074603 = assert99 + c3 db9cc0: 0009c004 = p:eftepm.exe 0003:49156 db9cd0: 000723af = GView__IsActive + 3 db9cd8: 00051467 = GxView__Resize + 1f db9ce8: 0009c004 = p:eftepm.exe 0003:49156 db9cf0: 00070a00 = ConGetEvent + 1cc db9d04: 001c9464 = p:eftepm.exe 0003:1283172 db9d1c: 0059efe0 = p:eftepm.exe 0003:5304288 db9d28: 0007360a = GUI__ProcessEvent + 6e db9d34: 0007368c = GUI__Run + 64 db9d48: 000711de = ConGetEvent + 9aa db9d50: 000aacd0 = tools + 14 db9d54: 0007a2c6 = _InitMultipleThread + 46 db9d64: 0059efe0 = p:eftepm.exe 0003:5304288 db9d70: 0009d2f4 = ::min_capacity + 364 db9d7c: 00071263 = GViewPeer__GViewPeer + 63 db9e88: 11eb1270 = p:exceptq.dll 0001:4720 db9e9c: 0009a047 = p:eftepm.exe 0003:41031 db9eb4: 000804a6 = calloc + 6 db9fe4: 0007107c = ConGetEvent + 848 db9ffc: 0059efe0 = p:eftepm.exe 0003:5304288 Invalid address type: 402 - %00dba000 Scan stopped at dba000 stopaddr dba000 -- Stack trashed from approx %00db99e4 00000053 00000053 70207020 70207020 -- to %00db9afc 70207020 70207020 70207020 00db9bd8 -- 00db9afc + c - 00db99e4 - 8 = 011cH = 284T ------------------------------------------------------------------------ # u %G_HookData + 83f ( in hookSendMsgHook + 2c ) %1e05083f 83c410 add esp,+10 %1e050842 f605e800641a20 test byte ptr [1a6400e8],20 ;' ' # u %G_HookData + 83f-5 %1e05083a e89efeffff call %1e0506dd %1e05083f 83c410 add esp,+10 #ln %1e0506dd %1e050000 XWPHOOK G_HookData + 6dd # u %1e0506dd ProcessMsgsForWinlist %1e0506dd 55 push ebp %1e0506de 8bec mov ebp,esp %1e0506e0 83ec20 sub esp,+20 ;' ' %1e0506e3 53 push ebx %1e0506e4 83fa01 cmp edx,+01 ; arg2 WM_CREATE %1e0506e7 57 push edi %1e0506e8 894d10 mov dword ptr [ebp+10],ecx %1e0506eb 89550c mov dword ptr [ebp+0c],edx %1e0506ee 894508 mov dword ptr [ebp+08],eax %1e0506f1 7422 jz %1e050715 %1e0506f3 83fa02 cmp edx,+02 ; WM_ %1e0506f6 741d jz %1e050715 %1e0506f8 83fa0d cmp edx,+0d %1e0506fb 7418 jz %1e050715 %1e0506fd 83fa55 cmp edx,+55 ;'U' %1e050700 7413 jz %1e050715 %1e050702 83fa0a cmp edx,+0a %1e050705 7505 jnz %1e05070c %1e050707 f60101 test byte ptr [ecx],01 %1e05070a 7509 jnz %1e050715 %1e05070c 83fa47 cmp edx,+47 ;'G' %1e05070f 0f85fc000000 jnz %1e050811 ; goto exit %1e050715 8bd8 mov ebx,eax %1e050717 6a05 push +05 %1e050719 53 push ebx %1e05071a e8c124c601 call %1fcb2be0 ; PMMERGE WIN32QUERYWINDOW %1e05071f 83c408 add esp,+08 %1e050722 3905c40f641a cmp dword ptr [1a640fc4],eax ; hwnd 80000001 %1e050728 0f85e3000000 jnz %1e050811 %1e05072e 391da40f641a cmp dword ptr [1a640fa4],ebx ; hwnd 8000008a %1e050734 0f84d7000000 jz %1e050811 %1e05073a 55 push ebp %1e05073b 8d7de0 lea edi,[ebp-20] %1e05073e 57 push edi %1e05073f 6a1e push +1e %1e050741 53 push ebx %1e050742 e8b9fcc501 call %1fcb0400 ; PMMERGE WIN32QUERYCLASSNAME %1e050747 83c410 add esp,+10 %1e05074a 8bcf mov ecx,edi %1e05074c 85c0 test eax,eax %1e05074e 0f84bd000000 jz %1e050811 ; fail %1e050754 bf4c00061e mov edi,1e06004c ; "#1" %1e050759 8bd1 mov edx,ecx %1e05075b 33c0 xor eax,eax %1e05075d 33db xor ebx,ebx %1e05075f 90 nop %1e050760 8a02 mov al,byte ptr [edx] %1e050762 8a1f mov bl,byte ptr [edi] %1e050764 42 inc edx %1e050765 47 inc edi %1e050766 84db test bl,bl %1e050768 7404 jz %1e05076e %1e05076a 3ac3 cmp al,bl %1e05076c 74f2 jz %1e050760 %1e05076e 2bc3 sub eax,ebx %1e050770 0f8457000000 jz %1e0507cd %1e050776 bf9c00061e mov edi,1e06009c ; "wpFolder window" %1e05077b 8bd1 mov edx,ecx %1e05077d 33c0 xor eax,eax %1e05077f 33db xor ebx,ebx %1e050781 8a02 mov al,byte ptr [edx] %1e050783 8a1f mov bl,byte ptr [edi] %1e050785 42 inc edx %1e050786 47 inc edi %1e050787 84db test bl,bl %1e050789 7404 jz %1e05078f %1e05078b 3ac3 cmp al,bl %1e05078d 74f2 jz %1e050781 %1e05078f 2bc3 sub eax,ebx %1e050791 743a jz %1e0507cd %1e050793 bfac00061e mov edi,1e0600ac %1e050798 8bd1 mov edx,ecx %1e05079a 33c0 xor eax,eax %1e05079c 33db xor ebx,ebx %1e05079e 8bc0 mov eax,eax %1e0507a0 8a02 mov al,byte ptr [edx] %1e0507a2 8a1f mov bl,byte ptr [edi] %1e0507a4 42 inc edx %1e0507a5 47 inc edi %1e0507a6 84db test bl,bl %1e0507a8 7404 jz %1e0507ae %1e0507aa 3ac3 cmp al,bl %1e0507ac 74f2 jz %1e0507a0 %1e0507ae 2bc3 sub eax,ebx %1e0507b0 741b jz %1e0507cd %1e0507b2 babc00061e mov edx,1e0600bc %1e0507b7 33c0 xor eax,eax %1e0507b9 33db xor ebx,ebx %1e0507bb 8a01 mov al,byte ptr [ecx] %1e0507bd 8a1a mov bl,byte ptr [edx] %1e0507bf 41 inc ecx %1e0507c0 42 inc edx %1e0507c1 84db test bl,bl %1e0507c3 7404 jz %1e0507c9 %1e0507c5 3ac3 cmp al,bl %1e0507c7 74f2 jz %1e0507bb %1e0507c9 2bc3 sub eax,ebx %1e0507cb 7544 jnz %1e050811 %1e0507cd 837d0c47 cmp dword ptr [ebp+0c],+47 ;'G' %1e0507d1 7522 jnz %1e0507f5 %1e0507d3 8b4d10 mov ecx,dword ptr [ebp+10] %1e0507d6 8b5d08 mov ebx,dword ptr [ebp+08] %1e0507d9 51 push ecx %1e0507da 53 push ebx %1e0507db 8b1d1000641a mov ebx,dword ptr [1a640010] %1e0507e1 68ab110000 push 000011ab %1e0507e6 53 push ebx %1e0507e7 e8cc58c601 call %1fcb60b8 ; PMMERGE WIN32POSTMSG %1e0507ec 83c410 add esp,+10 %1e0507ef 5f pop edi %1e0507f0 5b pop ebx %1e0507f1 8be5 mov esp,ebp %1e0507f3 5d pop ebp %1e0507f4 c3 retd %1e0507f5 8b5d0c mov ebx,dword ptr [ebp+0c] %1e0507f8 53 push ebx %1e0507f9 8b5d08 mov ebx,dword ptr [ebp+08] %1e0507fc 53 push ebx %1e0507fd 8b1d1000641a mov ebx,dword ptr [1a640010] %1e050803 68aa110000 push 000011aa %1e050808 53 push ebx %1e050809 e8aa58c601 call %1fcb60b8 ; PMMERGE WIN32POSTMSG %1e05080e 83c410 add esp,+10 %1e050811 ebdc jmp %1e0507ef %1e050813 55 push ebp %1e050814 8bec mov ebp,esp %1e050816 83ec30 sub esp,+30 ;'0' %1e050819 53 push ebx %1e05081a 833dac0f641a00 cmp dword ptr [1a640fac],+00 %1e050821 57 push edi %1e050822 0f858f000000 jnz %1e0508b7 %1e050828 8b5d0c mov ebx,dword ptr [ebp+0c] %1e05082b 8b03 mov eax,dword ptr [ebx] %1e05082d 8b4b04 mov ecx,dword ptr [ebx+04] %1e050830 50 push eax %1e050831 8b5308 mov edx,dword ptr [ebx+08] %1e050834 83ec0c sub esp,+0c %1e050837 8b430c mov eax,dword ptr [ebx+0c] %1e05083a e89efeffff call %1e0506dd ; G_HookData + 6dd ProcessMsgsForWinlist %1e05083f 83c410 add esp,+10 %1e050842 f605e800641a20 test byte ptr [1a6400e8],20 ;' ' %1e050849 0f8468000000 jz %1e0508b7 %1e05084f 837b0855 cmp dword ptr [ebx+08],+55 ;'U' %1e050853 7562 jnz %1e0508b7 %1e050855 8b4304 mov eax,dword ptr [ebx+04] %1e050858 85c0 test eax,eax %1e05085a 745b jz %1e0508b7 %1e05085c f60004 test byte ptr [eax],04 %1e05085f 7456 jz %1e0508b7 %1e050861 a1a40f641a mov eax,dword ptr [1a640fa4] %1e050866 39430c cmp dword ptr [ebx+0c],eax %1e050869 744c jz %1e0508b7 %1e05086b 55 push ebp %1e05086c 50 push eax %1e05086d e8feddc601 call %1fcbe670 ; PMMERGE WIN32ISWINDOWVISIBLE %1e050872 83c408 add esp,+08 %1e050875 85c0 test eax,eax %1e050877 743e jz %1e0508b7 %1e050879 6a05 push +05 %1e05087b 8b4b0c mov ecx,dword ptr [ebx+0c] %1e05087e 51 push ecx %1e05087f e85c23c601 call %1fcb2be0 ; PMMERGE WIN32QUERYWINDOW %1e050884 83c408 add esp,+08 %1e050887 3905c40f641a cmp dword ptr [1a640fc4],eax %1e05088d 7528 jnz %1e0508b7 %1e05088f 55 push ebp %1e050890 ff05ac0f641a inc dword ptr [1a640fac] ; is 0 %1e050896 6a04 push +04 %1e050898 8b0da40f641a mov ecx,dword ptr [1a640fa4] %1e05089e 6a00 push +00 %1e0508a0 6a00 push +00 %1e0508a2 6a00 push +00 %1e0508a4 6a00 push +00 %1e0508a6 6a03 push +03 %1e0508a8 51 push ecx %1e0508a9 e8fe2dc701 call %1fcc36ac ; PMMERGE WIN32SETWINDOWPOS %1e0508ae 83c420 add esp,+20 ;' ' %1e0508b1 ff0dac0f641a dec dword ptr [1a640fac] %1e0508b7 8b5d0c mov ebx,dword ptr [ebp+0c] %1e0508ba 837b0855 cmp dword ptr [ebx+08],+55 ;'U' %1e0508be 7546 jnz %1e050906 %1e0508c0 833d8c00641a00 cmp dword ptr [1a64008c],+00 %1e0508c7 743d jz %1e050906 %1e0508c9 833d9000641a00 cmp dword ptr [1a640090],+00 %1e0508d0 7434 jz %1e050906 %1e0508d2 8b0d3010641a mov ecx,dword ptr [1a641030] %1e0508d8 3b4b0c cmp ecx,dword ptr [ebx+0c] %1e0508db 7529 jnz %1e050906 %1e0508dd 8b5b04 mov ebx,dword ptr [ebx+04] %1e0508e0 85db test ebx,ebx %1e0508e2 7422 jz %1e050906 %1e0508e4 f60310 test byte ptr [ebx],10 %1e0508e7 741d jz %1e050906 %1e0508e9 6a00 push +00 %1e0508eb 8b1d1000641a mov ebx,dword ptr [1a640010] %1e0508f1 6aff push -01 %1e0508f3 6899110000 push 00001199 %1e0508f8 53 push ebx %1e0508f9 e8ba57c601 call %1fcb60b8 ; PMMERGE WIN32POSTMSG %1e0508fe 83c410 add esp,+10 %1e050901 e915010000 jmp %1e050a1b %1e050906 833d7800641a00 cmp dword ptr [1a640078],+00 %1e05090d 0f8408010000 jz %1e050a1b %1e050913 f605d000641a01 test byte ptr [1a6400d0],01 %1e05091a 0f84fb000000 jz %1e050a1b %1e050920 8b450c mov eax,dword ptr [ebp+0c] %1e050923 83780833 cmp dword ptr [eax+08],+33 ;'3' ; WM_INITMENU %1e050927 751e jnz %1e050947 %1e050929 833d1020641a00 cmp dword ptr [1a642010],+00 %1e050930 0f85e5000000 jnz %1e050a1b %1e050936 8b00 mov eax,dword ptr [eax] %1e050938 a31020641a mov dword ptr [1a642010],eax %1e05093d e8a00c0000 call %1e0515e2 ; XWPHOOK WMMouseMove_AutoHideMouse ??? %1e050942 e9d4000000 jmp %1e050a1b %1e050947 83780835 cmp dword ptr [eax+08],+35 ;'5' ; WM_MENUEND %1e05094b 7522 jnz %1e05096f ------------------------------------------------------------------------ # ln %1e050813 %1e050000 XWPHOOK G_HookData + 813 # u G_HookData + 813 G_HookData + 83f ; G_HookData + 813 = hookSendMsgHook %1e050813 55 push ebp %1e050814 8bec mov ebp,esp %1e050816 83ec30 sub esp,+30 ;'0' %1e050819 53 push ebx %1e05081a 833dac0f641a00 cmp dword ptr [1a640fac],+00 ; is 0, G_HookData.cSuppressWinlistNotify %1e050821 57 push edi %1e050822 0f858f000000 jnz %1e0508b7 %1e050828 8b5d0c mov ebx,dword ptr [ebp+0c] %1e05082b 8b03 mov eax,dword ptr [ebx] %1e05082d 8b4b04 mov ecx,dword ptr [ebx+04] %1e050830 50 push eax %1e050831 8b5308 mov edx,dword ptr [ebx+08] %1e050834 83ec0c sub esp,+0c %1e050837 8b430c mov eax,dword ptr [ebx+0c] %1e05083a e89efeffff call %1e0506dd ; XWPHOOK G_HookData + 6dd ProcessMsgsForWinlist %1e05083f 83c410 add esp,+10 %1e050842 f605e800641a20 test byte ptr [1a6400e8],20 ;' ' ; PGRFL_STAYONTOP %1e050849 0f8468000000 jz %1e0508b7 %1e05084f 837b0855 cmp dword ptr [ebx+08],+55 ;'U' ; WM_WINDOWPOSCHANGED %1e050853 7562 jnz %1e0508b7 %1e050855 8b4304 mov eax,dword ptr [ebx+04] ; mp1 %1e050858 85c0 test eax,eax ; 0? %1e05085a 745b jz %1e0508b7 %1e05085c f60004 test byte ptr [eax],04 %1e05085f 7456 jz %1e0508b7 %1e050861 a1a40f641a mov eax,dword ptr [1a640fa4] %1e050866 39430c cmp dword ptr [ebx+0c],eax %1e050869 744c jz %1e0508b7 %1e05086b 55 push ebp %1e05086c 50 push eax %1e05086d e8feddc601 call %1fcbe670 %1e050872 83c408 add esp,+08 %1e050875 85c0 test eax,eax %1e050877 743e jz %1e0508b7 %1e050879 6a05 push +05 %1e05087b 8b4b0c mov ecx,dword ptr [ebx+0c] %1e05087e 51 push ecx %1e05087f e85c23c601 call %1fcb2be0 ; PMMERGE WIN32QUERYWINDOW %1e050884 83c408 add esp,+08 %1e050887 3905c40f641a cmp dword ptr [1a640fc4],eax %1e05088d 7528 jnz %1e0508b7 %1e05088f 55 push ebp %1e050890 ff05ac0f641a inc dword ptr [1a640fac] ; ++G_HookData.cSuppressWinlistNotify %1e050896 6a04 push +04 %1e050898 8b0da40f641a mov ecx,dword ptr [1a640fa4] %1e05089e 6a00 push +00 %1e0508a0 6a00 push +00 %1e0508a2 6a00 push +00 %1e0508a4 6a00 push +00 %1e0508a6 6a03 push +03 %1e0508a8 51 push ecx %1e0508a9 e8fe2dc701 call %1fcc36ac %1e0508ae 83c420 add esp,+20 ;' ' %1e0508b1 ff0dac0f641a dec dword ptr [1a640fac] %1e0508b7 8b5d0c mov ebx,dword ptr [ebp+0c] %1e0508ba 837b0855 cmp dword ptr [ebx+08],+55 ;'U' %1e0508be 7546 jnz %1e050906 %1e0508c0 833d8c00641a00 cmp dword ptr [1a64008c],+00 %1e0508c7 743d jz %1e050906 %1e0508c9 833d9000641a00 cmp dword ptr [1a640090],+00 %1e0508d0 7434 jz %1e050906 %1e0508d2 8b0d3010641a mov ecx,dword ptr [1a641030] %1e0508d8 3b4b0c cmp ecx,dword ptr [ebx+0c] %1e0508db 7529 jnz %1e050906 %1e0508dd 8b5b04 mov ebx,dword ptr [ebx+04] %1e0508e0 85db test ebx,ebx %1e0508e2 7422 jz %1e050906 %1e0508e4 f60310 test byte ptr [ebx],10 %1e0508e7 741d jz %1e050906 %1e0508e9 6a00 push +00 %1e0508eb 8b1d1000641a mov ebx,dword ptr [1a640010] %1e0508f1 6aff push -01 %1e0508f3 6899110000 push 00001199 %1e0508f8 53 push ebx %1e0508f9 e8ba57c601 call %1fcb60b8 %1e0508fe 83c410 add esp,+10 %1e050901 e915010000 jmp %1e050a1b %1e050906 833d7800641a00 cmp dword ptr [1a640078],+00 %1e05090d 0f8408010000 jz %1e050a1b %1e050913 f605d000641a01 test byte ptr [1a6400d0],01 %1e05091a 0f84fb000000 jz %1e050a1b %1e050920 8b450c mov eax,dword ptr [ebp+0c] %1e050923 83780833 cmp dword ptr [eax+08],+33 ;'3' %1e050927 751e jnz %1e050947 %1e050929 833d1020641a00 cmp dword ptr [1a642010],+00 %1e050930 0f85e5000000 jnz %1e050a1b %1e050936 8b00 mov eax,dword ptr [eax] %1e050938 a31020641a mov dword ptr [1a642010],eax %1e05093d e8a00c0000 call %1e0515e2 %1e050942 e9d4000000 jmp %1e050a1b %1e050947 83780835 cmp dword ptr [eax+08],+35 ;'5' %1e05094b 7522 jnz %1e05096f %1e05094d 8b00 mov eax,dword ptr [eax] %1e05094f 39051020641a cmp dword ptr [1a642010],eax %1e050955 0f85c0000000 jnz %1e050a1b %1e05095b c7051020641a00000000 mov dword ptr [1a642010],00000000 %1e050965 e8780c0000 call %1e0515e2 %1e05096a e9ac000000 jmp %1e050a1b %1e05096f 8bd8 mov ebx,eax %1e050971 837b0855 cmp dword ptr [ebx+08],+55 ;'U' %1e050975 0f85a0000000 jnz %1e050a1b %1e05097b 833d1020641a00 cmp dword ptr [1a642010],+00 %1e050982 0f856a000000 jnz %1e0509f2 %1e050988 8b4b04 mov ecx,dword ptr [ebx+04] %1e05098b 85c9 test ecx,ecx %1e05098d 0f845f000000 jz %1e0509f2 %1e050993 f60108 test byte ptr [ecx],08 %1e050996 745a jz %1e0509f2 %1e050998 6a05 push +05 %1e05099a 8b4b0c mov ecx,dword ptr [ebx+0c] %1e05099d 51 push ecx %1e05099e e83d22c601 call %1fcb2be0 %1e0509a3 83c408 add esp,+08 %1e0509a6 3905c40f641a cmp dword ptr [1a640fc4],eax %1e0509ac 7544 jnz %1e0509f2 %1e0509ae 55 push ebp %1e0509af 8d7dd0 lea edi,[ebp-30] %1e0509b2 57 push edi %1e0509b3 8b4b0c mov ecx,dword ptr [ebx+0c] %1e0509b6 6a1e push +1e %1e0509b8 51 push ecx %1e0509b9 e842fac501 call %1fcb0400 %1e0509be 83c410 add esp,+10 %1e0509c1 8bd7 mov edx,edi %1e0509c3 85c0 test eax,eax %1e0509c5 742b jz %1e0509f2 %1e0509c7 bfc400061e mov edi,1e0600c4 %1e0509cc 33c0 xor eax,eax %1e0509ce 33c9 xor ecx,ecx %1e0509d0 8a02 mov al,byte ptr [edx] %1e0509d2 8a0f mov cl,byte ptr [edi] %1e0509d4 42 inc edx %1e0509d5 47 inc edi %1e0509d6 84c9 test cl,cl %1e0509d8 7404 jz %1e0509de %1e0509da 3ac1 cmp al,cl %1e0509dc 74f2 jz %1e0509d0 %1e0509de 2bc1 sub eax,ecx %1e0509e0 7510 jnz %1e0509f2 %1e0509e2 8b4b0c mov ecx,dword ptr [ebx+0c] %1e0509e5 890d1020641a mov dword ptr [1a642010],ecx %1e0509eb e8f20b0000 call %1e0515e2 %1e0509f0 eb29 jmp %1e050a1b %1e0509f2 8b450c mov eax,dword ptr [ebp+0c] %1e0509f5 8b1d1020641a mov ebx,dword ptr [1a642010] %1e0509fb 3b580c cmp ebx,dword ptr [eax+0c] %1e0509fe 751b jnz %1e050a1b %1e050a00 8b4004 mov eax,dword ptr [eax+04] %1e050a03 85c0 test eax,eax %1e050a05 7414 jz %1e050a1b %1e050a07 f60010 test byte ptr [eax],10 %1e050a0a 740f jz %1e050a1b %1e050a0c c7051020641a00000000 mov dword ptr [1a642010],00000000 %1e050a16 e8c70b0000 call %1e0515e2 %1e050a1b 833dd400641a00 cmp dword ptr [1a6400d4],+00 %1e050a22 0f84ca000000 jz %1e050af2 %1e050a28 8b450c mov eax,dword ptr [ebp+0c] %1e050a2b 83780805 cmp dword ptr [eax+08],+05 %1e050a2f 7509 jnz %1e050a3a %1e050a31 668b4004 mov ax,word ptr [eax+04] %1e050a35 6685c0 test ax,ax %1e050a38 7519 jnz %1e050a53 %1e050a3a 8b450c mov eax,dword ptr [ebp+0c] %1e050a3d 83780855 cmp dword ptr [eax+08],+55 ;'U' %1e050a41 0f85ab000000 jnz %1e050af2 %1e050a47 8b4004 mov eax,dword ptr [eax+04] %1e050a4a f60008 test byte ptr [eax],08 %1e050a4d 0f849f000000 jz %1e050af2 %1e050a53 8b5d0c mov ebx,dword ptr [ebp+0c] %1e050a56 6aff push -01 %1e050a58 55 push ebp %1e050a59 6a05 push +05 %1e050a5b 8b4b0c mov ecx,dword ptr [ebx+0c] %1e050a5e 51 push ecx %1e050a5f e87c21c601 call %1fcb2be0 %1e050a64 83c40c add esp,+0c %1e050a67 50 push eax %1e050a68 e8ef73c601 call %1fcb7e5c %1e050a6d 83c408 add esp,+08 %1e050a70 663d461f cmp ax,1f46 %1e050a74 0f8478000000 jz %1e050af2 %1e050a7a 6a40 push +40 ;'@' %1e050a7c 8b4b0c mov ecx,dword ptr [ebx+0c] %1e050a7f 51 push ecx %1e050a80 e8fbe9c501 call %1fcaf480 %1e050a85 83c408 add esp,+08 %1e050a88 85c0 test eax,eax %1e050a8a 7419 jz %1e050aa5 %1e050a8c 6a00 push +00 %1e050a8e 8b1d1000641a mov ebx,dword ptr [1a640010] %1e050a94 50 push eax %1e050a95 68a6110000 push 000011a6 %1e050a9a 53 push ebx %1e050a9b e81856c601 call %1fcb60b8 %1e050aa0 83c410 add esp,+10 %1e050aa3 eb4d jmp %1e050af2 %1e050aa5 f605d800641a01 test byte ptr [1a6400d8],01 %1e050aac 7444 jz %1e050af2 %1e050aae 6a08 push +08 %1e050ab0 8b4b0c mov ecx,dword ptr [ebx+0c] %1e050ab3 51 push ecx %1e050ab4 e8a373c601 call %1fcb7e5c %1e050ab9 83c408 add esp,+08 %1e050abc 66a90001 test ax,0100 %1e050ac0 7430 jz %1e050af2 %1e050ac2 6a05 push +05 %1e050ac4 8b4b0c mov ecx,dword ptr [ebx+0c] %1e050ac7 51 push ecx %1e050ac8 e81321c601 call %1fcb2be0 %1e050acd 83c408 add esp,+08 %1e050ad0 3905c40f641a cmp dword ptr [1a640fc4],eax %1e050ad6 751a jnz %1e050af2 %1e050ad8 8b4b0c mov ecx,dword ptr [ebx+0c] %1e050adb 6a00 push +00 %1e050add 51 push ecx %1e050ade 8b0d1000641a mov ecx,dword ptr [1a640010] %1e050ae4 68a6110000 push 000011a6 %1e050ae9 51 push ecx %1e050aea e8c955c601 call %1fcb60b8 %1e050aef 83c410 add esp,+10 %1e050af2 f605e900641a20 test byte ptr [1a6400e9],20 ;' ' %1e050af9 0f8461010000 jz %1e050c60 %1e050aff 833da40f641a00 cmp dword ptr [1a640fa4],+00 %1e050b06 0f8454010000 jz %1e050c60 %1e050b0c 8b5d0c mov ebx,dword ptr [ebp+0c] %1e050b0f 668b4b04 mov cx,word ptr [ebx+04] %1e050b13 6681f90780 cmp cx,8007 %1e050b18 0f8542010000 jnz %1e050c60 %1e050b1e 833b00 cmp dword ptr [ebx],+00 %1e050b21 0f8439010000 jz %1e050c60 %1e050b27 837b0833 cmp dword ptr [ebx+08],+33 ;'3' %1e050b2b 0f85e4000000 jnz %1e050c15 %1e050b31 833d1420641a00 cmp dword ptr [1a642014],+00 %1e050b38 0f85d7000000 jnz %1e050c15 %1e050b3e 6a05 push +05 %1e050b40 8b4b0c mov ecx,dword ptr [ebx+0c] %1e050b43 51 push ecx %1e050b44 e89720c601 call %1fcb2be0 %1e050b49 83c408 add esp,+08 %1e050b4c 3905c40f641a cmp dword ptr [1a640fc4],eax %1e050b52 0f85bd000000 jnz %1e050c15 %1e050b58 33c9 xor ecx,ecx %1e050b5a 6a08 push +08 %1e050b5c 66894df0 mov word ptr [ebp-10],cx %1e050b60 894df2 mov dword ptr [ebp-0e],ecx %1e050b63 894df6 mov dword ptr [ebp-0a],ecx %1e050b66 894dfa mov dword ptr [ebp-06],ecx %1e050b69 66894dfe mov word ptr [ebp-02],cx %1e050b6d 8b4b0c mov ecx,dword ptr [ebx+0c] %1e050b70 51 push ecx %1e050b71 e86a20c601 call %1fcb2be0 %1e050b76 8b0b mov ecx,dword ptr [ebx] %1e050b78 33d2 xor edx,edx %1e050b7a 890d1420641a mov dword ptr [1a642014],ecx %1e050b80 52 push edx %1e050b81 8d4df0 lea ecx,[ebp-10] %1e050b84 8bf8 mov edi,eax %1e050b86 51 push ecx %1e050b87 8955f8 mov dword ptr [ebp-08],edx %1e050b8a 6880010000 push 00000180 %1e050b8f 8b0d1420641a mov ecx,dword ptr [1a642014] %1e050b95 66c745f0ffff mov word ptr [ebp-10],ffff %1e050b9b 66c745f20400 mov word ptr [ebp-0e],0004 %1e050ba1 51 push ecx %1e050ba2 8955fc mov dword ptr [ebp-04],edx %1e050ba5 668955f4 mov word ptr [ebp-0c],dx %1e050ba9 66c745f6fe7f mov word ptr [ebp-0a],7ffe %1e050baf e8f04fc601 call %1fcb5ba4 %1e050bb4 83c418 add esp,+18 %1e050bb7 8bc7 mov eax,edi %1e050bb9 66c745f24100 mov word ptr [ebp-0e],0041 # u G_HookData + c00 G_HookData + cee ( looks like hookInputHook ) %1e050cb2 55 push ebp %1e050cb3 33c0 xor eax,eax %1e050cb5 8bec mov ebp,esp %1e050cb7 53 push ebx %1e050cb8 57 push edi %1e050cb9 56 push esi %1e050cba 33f6 xor esi,esi %1e050cbc 83ec1c sub esp,+1c %1e050cbf 39450c cmp dword ptr [ebp+0c],eax ; if (pqmsg == NULL) %1e050cc2 8945ec mov dword ptr [ebp-14],eax %1e050cc5 7508 jnz %1e050ccf %1e050cc7 83c41c add esp,+1c %1e050cca 5e pop esi %1e050ccb 5f pop edi %1e050ccc 5b pop ebx %1e050ccd 5d pop ebp %1e050cce c3 retd %1e050ccf 3905ac0f641a cmp dword ptr [1a640fac],eax ; if (!G_HookData.cSuppressWinlistNotify) %1e050cd5 751a jnz %1e050cf1 %1e050cd7 8b450c mov eax,dword ptr [ebp+0c] %1e050cda 8b480c mov ecx,dword ptr [eax+0c] %1e050cdd 8b5004 mov edx,dword ptr [eax+04] %1e050ce0 51 push ecx %1e050ce1 8b4808 mov ecx,dword ptr [eax+08] %1e050ce4 83ec0c sub esp,+0c %1e050ce7 8b00 mov eax,dword ptr [eax] %1e050ce9 e8eff9ffff call %1e0506dd ; G_HookData + 6dd, ProcessMsgsForWinlist %1e050cee 83c410 add esp,+10 # hookInputHook stack frame # dd db9ba0 -4 fp eip hwnd WM_SIZE %00db9b9c 00db9bdc 1e050cee 800003cb 00000007 scx scy %00db9bac 1fac0613 1dd2af80 1fcda7bb 00000004 # ln %1e050cee %1e050000 XWPHOOK G_HookData + cee ( hookInputHook + ee ) # k db9b9c 005b:1e050cee 800003cb 00000007 1fac0613 1dd2af80 [XWPHOOK G_HookData + cee] 005b:1fcb2dac 00000001 1fcb2dc6 00000004 1d684a38 [PMMERGE CallInputHook + 174] -- Might be SMP serialization defect -- Might be GView::~GView defect