Code: Select all
End
OpenFile(#PB_Any, "bla-bla")
Code: Select all
End
OpenFile(#PB_Any, "bla-bla")
And you're calling it a PB bug?kemsky_by wrote:That's why i call it strange, it happens only on one particular system.
If i remove OpenFile line(which is not even executed) - it works, if i rename exe - it works. Also i don't have any issues with all other software and tools. So I'm pretty sure that it is not OS fault.juror wrote:And you're calling it a PB bug?kemsky_by wrote:That's why i call it strange, it happens only on one particular system.
Code: Select all
delay(5000)
End
OpenFile(#PB_Any, "bla-bla")
I feel I am missing something painfully obvious but I must ask. Is there more code? Doesn't the program hit the 'end' command and end?kemsky_by wrote:Compiled with threadsafe and unicode, 5.31 x86:Code: Select all
End OpenFile(#PB_Any, "bla-bla")
Code: Select all
EnableExplicit
Delay(5000)
End
OpenFile(#PB_Any, "bla-bla")
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Application Error" />
<EventID Qualifiers="0">1000</EventID>
<Level>2</Level>
<Task>100</Task>
<Keywords>0x80000000000000</Keywords>
<TimeCreated SystemTime="2015-05-20T11:25:35.000000000Z" />
<EventRecordID>11440</EventRecordID>
<Channel>Application</Channel>
<Computer>---</Computer>
<Security />
</System>
<EventData>
<Data>ArchiveManagerHelper.exe</Data>
<Data>1.0.0.3</Data>
<Data>555c6f1e</Data>
<Data>ntdll.dll</Data>
<Data>6.3.9600.17736</Data>
<Data>550f42c2</Data>
<Data>80000003</Data>
<Data>00026f80</Data>
<Data>1948</Data>
<Data>01d092efad75bcaa</Data>
<Data>---\ArchiveManagerHelper.exe</Data>
<Data>C:\Windows\SYSTEM32\ntdll.dll</Data>
<Data>ee6d8a7e-fee2-11e4-8269-10bf48e2abe4</Data>
<Data>
</Data>
<Data>
</Data>
</EventData>
</Event>
Code: Select all
-<avrf:logEntry Severity="Error" StopCode="0x202" LayerName="Locks" Time="2015-05-20 : 14:30:21">
<avrf:message>Freeing heap block containing an active critical section.</avrf:message>
<avrf:parameter1>9775fe8 - Critical section address.</avrf:parameter1>
<avrf:parameter2>3e8b754 - Critical section initialization stack trace.</avrf:parameter2>
<avrf:parameter3>9775fc8 - Heap block address.</avrf:parameter3>
<avrf:parameter4>38 - Heap block size.</avrf:parameter4>
-<avrf:stackTrace>
<avrf:trace>vfbasics!+6645c55e ( @ 0)</avrf:trace>
<avrf:trace>vfbasics!+66456e4c ( @ 0)</avrf:trace>
<avrf:trace>vfbasics!+66460164 ( @ 0)</avrf:trace>
<avrf:trace>ntdll!RtlRemoveVectoredContinueHandler+4dd ( @ 0)</avrf:trace>
<avrf:trace>verifier!VerifierDisableFaultInjectionExclusionRange+2d32 ( @ 0)</avrf:trace>
<avrf:trace>ntdll!LdrSetAppCompatDllRedirectionCallback+5394 ( @ 0)</avrf:trace>
<avrf:trace>vfbasics!+6646021f ( @ 0)</avrf:trace>
<avrf:trace>kernelbase!HeapDestroy+e ( @ 0)</avrf:trace>
<avrf:trace>ArchiveManagerHelper!+40109c ( @ 0)</avrf:trace>
<avrf:trace>ntdll!RtlInitializeExceptionChain+8f ( @ 0)</avrf:trace>
<avrf:trace>ntdll!RtlInitializeExceptionChain+5a ( @ 0)</avrf:trace>
</avrf:stackTrace>
</avrf:logEntry>