Hi all,
Just that this doesn't get lost, trunk's broken in two ways:
1) after 45640 you get the "CMP_WaitNoPending..." in 2nd stage in vbox being unable to proceed. Bug 4142: http://www.reactos.org/bugzilla/show_bug.cgi?id=4142
2) after 45645 installation stops at 1st stage with an assert: Assertion 'GuardedMutex->Owner != Thread' failed at ntoskrnl\include/internal/k e_x.h line 1596 Entered debugger on embedded INT3 at 0x0008:0x808dc52e. kdb:> PuTTYbt Eip: <ntoskrnl.exe:dc52f (lib\rtl\i386\debug_asm.S:33 (DbgBreakPoint@0))> Frames: <ntoskrnl.exe:9aaa4 (ntoskrnl/include//internal/ke_x.h:1596 (MmNotPresentFault@1 2))> <ntoskrnl.exe:9b6e3 (ntoskrnl/mm/mmfault.c:298 (MmAccessFault@16))> <ntoskrnl.exe:66fb (ntoskrnl/ke/i386/traphdlr.c:1132 (@KiTrap0EHandler@4))> <ntoskrnl.exe:1b21c (ntoskrnl/cc/view.c:463 (CcRosLookupCacheSegment@8))> <ntoskrnl.exe:ac31a (ntoskrnl/mm/section.c:1251 (MmNotPresentFaultSectionView@16 ))> <ntoskrnl.exe:9adb9 (ntoskrnl/mm/mmfault.c:219 (MmNotPresentFault@12))> <ntoskrnl.exe:9b6e3 (ntoskrnl/mm/mmfault.c:298 (MmAccessFault@16))> <ntoskrnl.exe:66fb (ntoskrnl/ke/i386/traphdlr.c:1132 (@KiTrap0EHandler@4))> <b085a008> <ntoskrnl.exe:601e <ntoskrnl.exe:6412 (ntoskrnl/ke/i386/traphdlr.c:1517 (@KiFastC allEntryHandler@8))> <00000000> kdb:> Thanks. _________________________________________________________________ La tua privacy è al sicuro con Internet Explorer 8. Scopri di più http://www.microsoft.com/italy/windows/internet-explorer/features/browse-pri...
Gabriel ilardi wrote:
Hi all,
Just that this doesn't get lost, trunk's broken in two ways:
- after *45640* you get the "CMP_WaitNoPending..." in 2nd stage in
vbox being unable to proceed. Bug 4142: http://www.reactos.org/bugzilla/show_bug.cgi?id=4142
- after *45645* installation stops at 1st stage with an assert:
Assertion 'GuardedMutex->Owner != Thread' failed at ntoskrnl\include/internal/k e_x.h line 1596 Entered debugger on embedded INT3 at 0x0008:0x808dc52e. kdb:> PuTTYbt Eip: <ntoskrnl.exe:dc52f (lib\rtl\i386\debug_asm.S:33 (DbgBreakPoint@0))> Frames: <ntoskrnl.exe:9aaa4 (ntoskrnl/include//internal/ke_x.h:1596 (MmNotPresentFault@1 2))> <ntoskrnl.exe:9b6e3 (ntoskrnl/mm/mmfault.c:298 (MmAccessFault@16))> <ntoskrnl.exe:66fb (ntoskrnl/ke/i386/traphdlr.c:1132 (@KiTrap0EHandler@4))> <ntoskrnl.exe:1b21c (ntoskrnl/cc/view.c:463 (CcRosLookupCacheSegment@8))> <ntoskrnl.exe:ac31a (ntoskrnl/mm/section.c:1251 (MmNotPresentFaultSectionView@16 ))> <ntoskrnl.exe:9adb9 (ntoskrnl/mm/mmfault.c:219 (MmNotPresentFault@12))> <ntoskrnl.exe:9b6e3 (ntoskrnl/mm/mmfault.c:298 (MmAccessFault@16))> <ntoskrnl.exe:66fb (ntoskrnl/ke/i386/traphdlr.c:1132 (@KiTrap0EHandler@4))>
<b085a008> <ntoskrnl.exe:601e <ntoskrnl.exe:6412 (ntoskrnl/ke/i386/traphdlr.c:1517 (@KiFastC allEntryHandler@8))> <00000000> kdb:>
Thanks.
I'll revert the remaining parts of the *45640* issue. It seems the service manager and services are not ready for these improvements yet.
Regards Eric
Add this one too! Random and at shutdown.
(subsystems/win32/csrss/win32csr/exitros.c:776) FIXME: Need to close all user processes! WARNING: NtUnloadKey2 at ntoskrnl/config/ntapi.c:1275 is UNIMPLEMENTED! (dll/win32/userenv/profile.c:1136) RegUnLoadKeyW() failed (Error 1) fixme:(dll/win32/msgina/stubs.c:110) WlxShutdown is UNIMPLEMENTED! (subsystems/win32/csrss/win32csr/exitros.c:776) FIXME: Need to close all user processes! fixme:(base/system/winlogon/sas.c:651) FIXME: Call SMSS API #1 (hal/halx86/generic/bios.c:83) HAL: An invalid V86 opcode was encountered at address c000:1e15 Entered debugger on embedded INT3 at 0x0008:0x808dc49e. kdb:> bt Eip: <ntoskrnl.exe:dc49f (lib/rtl/i386/debug_asm.S:33 (DbgBreakPoint@0))> Frames: <hal.dll:36e6 (hal/halx86/generic/bios.c:197 (@HalpDispatchV86Opcode@4))> <hal.dll:373f (hal/halx86/generic/bios.c:230 (@HalpTrap0DHandler@4))> <00000000> kdb:>
Similar thing on my real hardware, random, at shutdown:
fixme:(base\system\winlogon\sas.c:651) FIXME: Call SMSS API #1 (hal\halx86\generic\bios.c:83) HAL: An invalid V86 opcode was encountered at address c000:989b [7hEntered debugger on embedded INT3 at 0x0008:0x808db5fe.bt Eip: <ntoskrnl.exe:db5ff (lib\rtl\i386\debug_asm.S:33 (DbgBreakPoint@0))> Frames: <hal.dll:36e6 (hal/halx86/generic/bios.c:197 (@HalpDispatchV86Opcode@4))> <hal.dll:373f (hal/halx86/generic/bios.c:230 (@HalpTrap0DHandler@4))> <00000001> <00000000>
2010/2/23 James Tabor jimtabor.rosdev@gmail.com
Add this one too! Random and at shutdown.
Next time you encounter it, please dump the memory content of the bios code. - Calculate the linear address, by multiplying the cs segment (c000) with 16 and adding ip (989b). The result is c989b in this case - dump the memory 16 bytes before ("x 0xc988b")
Olaf Siejka wrote:
Similar thing on my real hardware, random, at shutdown:
fixme:(base\system\winlogon\sas.c:651) FIXME: Call SMSS API #1 (hal\halx86\generic\bios.c:83) HAL: An invalid V86 opcode was encountered at address c000:989b [7hEntered debugger on embedded INT3 at 0x0008:0x808db5fe.bt Eip: <ntoskrnl.exe:db5ff (lib\rtl\i386\debug_asm.S:33 (DbgBreakPoint@0))> Frames: <hal.dll:36e6 (hal/halx86/generic/bios.c:197 (@HalpDispatchV86Opcode@4))> <hal.dll:373f (hal/halx86/generic/bios.c:230 (@HalpTrap0DHandler@4))> <00000001> <00000000>
2010/2/23 James Tabor jimtabor.rosdev@gmail.com
Add this one too! Random and at shutdown.
Ros-dev mailing list Ros-dev@reactos.org http://www.reactos.org/mailman/listinfo/ros-dev