Hello all, I've spent the last year writing an ORM in Python which I'm reasonably pleased with. But I have a recent problem: I can't seem to migrate tables from Microsoft Access (using ADO) to MySQL (using MySQLdb) without a crash. But, don't let the context fool you: when it crashes, I don't think I'm doing *anything* with the ADO connection, and I actually get the same crash when using Postgres instead of MySQL.
I'm not a Windows guru by any means, but I have noticed a pattern: throughout my (many, naive) code changes to try to avoid the crash, the same functions keep popping up in drwtsn32.log: function: PyComplex_AsCComplex function: NtWaitForSingleObject (multiple times) function: NtWaitForMultipleObjects function: ZwReplyWaitReceivePortEx function: NtDelayExecution function: ScrollDC ...where PyComplex_AsCComplex is the first one listed, and (if I'm reading MSDN correctly) is therefore the function "where the fault occurred". So the question is, what's the next step in tracking down the bug? PyComplex_AsCComplex is a pretty simple function. Or am I way off-base and should be looking elsewhere? Robert Brewer MIS Amor Ministries [EMAIL PROTECTED] Application exception occurred: App: (pid=1436) When: 1/10/2005 @ 10:31:47.869 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: REDROVER User Name: rbre Number of Processors: 1 Processor Type: x86 Family 15 Model 2 Stepping 7 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 4 Current Type: Uniprocessor Free Registered Organization: Registered Owner: Valued Sony Customer *----> Task List <----* 0 Idle.exe 8 System.exe 156 SMSS.exe 180 CSRSS.exe 176 WINLOGON.exe 228 SERVICES.exe 240 LSASS.exe 420 svchost.exe 448 spoolsv.exe 524 svchost.exe 544 sqlservr.exe 620 sqlservr.exe 636 mysqld-nt.exe 672 pg_ctl.exe 792 postmaster.exe 800 WinMgmt.exe 808 inetinfo.exe 908 postgres.exe 924 postgres.exe 944 postgres.exe 964 postgres.exe 1264 explorer.exe 1324 PcfMgr.exe 1168 Apoint.exe 1144 prpcui.exe 1132 WlanUtil.exe 1120 atiptaxx.exe 1112 qttask.exe 604 PhoneManager.ex.exe 1444 ApntEx.exe 1452 sqlmangr.exe 548 CMD.exe 1340 mysql.exe 1488 openvpnserv.exe 492 openvpn.exe 600 Pythonwin.exe 784 CMD.exe 1332 CMD.exe 1436 python.exe 1500 DRWTSN32.exe 0 _Total.exe (1D000000 - 1D005000) (77F80000 - 77FFD000) (1E000000 - 1E0F0000) (7C570000 - 7C623000) (77E10000 - 77E75000) (77F40000 - 77F7B000) (7C2D0000 - 7C332000) (77D30000 - 77DA1000) (782F0000 - 78535000) (63180000 - 631E9000) (78000000 - 78045000) (71710000 - 71794000) (75E60000 - 75E7A000) (1E1E0000 - 1E1EE000) (1D180000 - 1D18B000) (1E1D0000 - 1E1DC000) (75050000 - 75058000) (75030000 - 75044000) (75020000 - 75028000) (10000000 - 1007C000) (1D110000 - 1D115000) (00E60000 - 00E73000) (77A50000 - 77B3F000) (779B0000 - 77A4B000) (01290000 - 012DE000) (012E0000 - 012F0000) (77820000 - 77827000) (759B0000 - 759B6000) (7C340000 - 7C34F000) (013F0000 - 01426000) (782C0000 - 782CC000) (77980000 - 779A4000) (77340000 - 77353000) (77520000 - 77525000) (77320000 - 77337000) (75150000 - 7515F000) (75170000 - 751BF000) (77BF0000 - 77C01000) (77950000 - 7797A000) (751C0000 - 751C6000) (773B0000 - 773DF000) (77380000 - 773A3000) (77830000 - 7783E000) (77880000 - 7790E000) (7C0F0000 - 7C151000) (774E0000 - 77513000) (774C0000 - 774D1000) (77530000 - 77552000) (77360000 - 77379000) (777E0000 - 777E8000) (777F0000 - 777F5000) (74FD0000 - 74FEE000) (75010000 - 75017000) (775A0000 - 77630000) (1F440000 - 1F4BD000) (1F670000 - 1F693000) (76B30000 - 76B6E000) (1F890000 - 1F8FC000) (1F900000 - 1F911000) (1B570000 - 1B5C5000) (1B000000 - 1B170000) (1B5D0000 - 1B665000) (1B2C0000 - 1B2CD000) (1B2D0000 - 1B2F6000) (78740000 - 788AF000) (6DE80000 - 6DEE4000) (6DF80000 - 6E037000) (6A7A0000 - 6A7B0000) (73930000 - 73940000) (689D0000 - 689DD000) (1B810000 - 1B84A000) (0F9A0000 - 0F9AB000) (0F9C0000 - 0FA22000) (1F530000 - 1F53D000) State Dump for Thread Id 0x5cc eax=00000001 ebx=00cee0a0 ecx=00000001 edx=1e0b4480 esi=1e0b2317 edi=00000005 eip=1e0328ee esp=0012e910 ebp=00000001 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 function: PyComplex_AsCComplex *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 00000001 00000000 00000000 00000000 00000000 00000000 !PyComplex_AsCComplex *----> Raw Stack Dump <----* 0012e910 a0 e0 ce 00 01 00 00 00 - a0 34 7f 00 06 00 00 00 .........4...... 0012e920 e2 cf 02 1e a0 e0 ce 00 - 17 23 0b 1e 01 00 00 00 .........#...... 0012e930 f0 96 b3 00 46 ae 02 1e - f0 96 b3 00 17 23 0b 1e ....F........#.. 0012e940 01 00 00 00 a0 34 7f 00 - f0 96 b3 00 ff ff ff ff .....4.......... 0012e950 c8 f9 0c 1e a0 34 7f 00 - a0 34 7f 00 5b a2 02 1e .....4...4..[... 0012e960 f0 96 b3 00 a0 34 7f 00 - 01 00 00 00 70 3d cd 00 .....4......p=.. 0012e970 00 43 c6 00 f0 96 b3 00 - 70 3d cd 00 00 00 00 00 .C......p=...... 0012e980 00 00 00 00 bc 38 cb 00 - e0 bb 02 1e f0 96 b3 00 .....8.......... 0012e990 a0 34 7f 00 00 00 00 00 - 70 3d cd 00 f0 96 b3 00 .4......p=...... 0012e9a0 ff ff ff ff 90 93 cf 00 - 00 00 00 00 04 3a 01 1b .............:.. 0012e9b0 ff ff ff ff 00 19 f3 01 - 00 00 00 00 00 00 00 00 ................ 0012e9c0 00 00 00 00 d0 e9 12 00 - 00 00 00 00 40 00 00 00 [EMAIL PROTECTED] 0012e9d0 00 35 04 1b 90 0e f3 01 - 00 00 00 00 00 00 00 00 .5.............. 0012e9e0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0012e9f0 d8 e8 58 7c ff ff ff ff - 44 ea 12 00 00 00 87 01 ..X|....D....... 0012ea00 00 00 00 00 e8 ea 12 00 - 00 00 00 00 03 c6 fc 77 ...............w 0012ea10 00 00 87 01 e0 c4 fc 77 - 50 06 87 01 60 06 87 01 .......wP...`... 0012ea20 00 00 00 00 30 02 94 02 - 30 02 94 02 f0 12 f3 01 ....0...0....... 0012ea30 b8 eb 12 00 3c 81 00 1b - 44 e6 f3 01 f0 12 f3 01 ....<...D....... 0012ea40 00 00 00 00 b8 eb 12 00 - 00 00 00 00 30 02 94 02 ............0... State Dump for Thread Id 0x5f8 eax=41e2ca13 ebx=00000000 ecx=0000026b edx=00000000 esi=77f82865 edi=00000364 eip=77f82870 esp=013ef878 ebp=013ef89c iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForSingleObject 77f82865 b8ea000000 mov eax,0xea 77f8286a 8d542404 lea edx,[esp+0x4] ss:01ee975f=???????? 77f8286e cd2e int 2e 77f82870 c20c00 ret 0xc *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 013EF89C 7C57B3DB 00000364 FFFFFFFF 00000000 1E080331 ntdll!NtWaitForSingleObject 013EF96C 00000001 00000000 00000000 0085EC38 00785B58 kernel32!WaitForSingleObject *----> Raw Stack Dump <----* 013ef878 e4 9f 59 7c 64 03 00 00 - 00 00 00 00 00 00 00 00 ..Y|d........... 013ef888 68 d5 a2 00 b6 91 00 78 - 78 4b b8 00 68 d5 a2 00 h......xxK..h... 013ef898 68 d5 a2 00 6c f9 3e 01 - db b3 57 7c 64 03 00 00 h...l.>...W|d... 013ef8a8 ff ff ff ff 00 00 00 00 - 31 03 08 1e 64 03 00 00 ........1...d... 013ef8b8 ff ff ff ff 00 00 00 00 - b6 91 00 78 8b 05 08 1e ...........x.... 013ef8c8 68 d5 a2 00 ff ff ff ff - d8 2a 01 1e 68 d5 a2 00 h........*..h... 013ef8d8 01 00 00 00 78 4b b8 00 - 32 00 00 00 00 00 00 00 ....xK..2....... 013ef8e8 43 17 08 1e 78 4b b8 00 - 40 0e 08 1e c8 bd 86 00 [EMAIL PROTECTED] 013ef8f8 71 0e 08 1e 00 00 00 00 - 00 00 49 40 9a 99 99 99 [EMAIL PROTECTED] 013ef908 99 99 a9 3f 96 91 05 1e - 00 00 00 00 b0 0b 7f 00 ...?............ 013ef918 01 00 00 00 c8 bd 86 00 - 2c b9 9d 00 fb 69 01 1e ........,....i.. 013ef928 c8 bd 86 00 b0 0b 7f 00 - 00 00 00 00 6c f9 3e 01 ............l.>. 013ef938 01 00 00 00 e0 20 82 00 - e0 18 86 00 82 00 00 00 ..... .......... 013ef948 38 ec 85 00 00 00 00 00 - 85 4b 01 1e 6c f9 3e 01 8........K..l.>. 013ef958 b0 0b 7f 00 00 00 00 00 - 20 40 86 00 14 b9 9d 00 ........ @...... 013ef968 c0 b7 9d 00 30 b9 9d 00 - 01 00 00 00 00 00 00 00 ....0........... 013ef978 00 00 00 00 38 ec 85 00 - 58 5b 78 00 3c eb 85 00 ....8...X[x.<... 013ef988 00 00 00 00 00 00 00 00 - 00 00 00 00 78 4b b8 00 ............xK.. 013ef998 20 40 86 00 20 40 86 00 - 2c b9 9d 00 01 00 00 00 @.. @..,....... 013ef9a8 94 1c 83 00 ff ff ff ff - 00 00 00 00 b0 7f 81 00 ................ State Dump for Thread Id 0x438 eax=778321fe ebx=00000004 ecx=0012e7fc edx=00000000 esi=77f82873 edi=00000004 eip=77f8287e esp=0153fd24 ebp=0153fd70 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForMultipleObjects 77f82873 b8e9000000 mov eax,0xe9 77f82878 8d542404 lea edx,[esp+0x4] ss:02039c0b=???????? 77f8287c cd2e int 2e 77f8287e c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0153FD70 7C59A0C2 0153FD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects 0153FFB4 7C57B388 00000005 000B000A 7C325107 00157838 kernel32!WaitForMultipleObjects 0153FFEC 00000000 778321FE 00157838 00000000 000000C8 kernel32!lstrcmpiW *----> Raw Stack Dump <----* 0153fd24 af a1 59 7c 04 00 00 00 - 48 fd 53 01 01 00 00 00 ..Y|....H.S..... 0153fd34 00 00 00 00 00 00 00 00 - 01 00 00 00 38 78 15 00 ............8x.. 0153fd44 01 00 00 00 00 03 00 00 - fc 02 00 00 ec 02 00 00 ................ 0153fd54 84 02 00 00 d0 bc 04 82 - 00 00 00 00 80 14 48 80 ..............H. 0153fd64 a8 b2 0a 82 c4 7b 12 ba - b8 bc 04 82 b4 ff 53 01 .....{........S. 0153fd74 c2 a0 59 7c 48 fd 53 01 - 01 00 00 00 00 00 00 00 ..Y|H.S......... 0153fd84 00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00 00 .........".w.... 0153fd94 b0 fe 53 01 00 00 00 00 - ff ff ff ff 38 78 15 00 ..S.........8x.. 0153fda4 07 51 32 7c 0a 00 0b 00 - 00 00 00 00 00 00 00 00 .Q2|............ 0153fdb4 00 00 00 00 00 00 00 00 - 01 00 00 00 38 00 00 00 ............8... 0153fdc4 23 00 00 00 23 00 00 00 - 0a 00 0b 00 07 51 32 7c #...#........Q2| 0153fdd4 38 78 15 00 ff ff ff ff - fc e7 12 00 fe 21 83 77 8x...........!.w 0153fde4 f8 eb fd 7f 00 b7 57 7c - 1b 00 00 00 00 02 00 00 ......W|........ 0153fdf4 fc ff 53 01 23 00 00 00 - 24 00 01 e1 98 00 00 00 ..S.#...$....... 0153fe04 43 ef 01 00 48 ce 3b 82 - 00 07 00 00 1e b4 44 80 C...H.;.......D. 0153fe14 43 ef 01 00 48 ce 3b 82 - 43 ef 01 00 48 ce 3b 82 C...H.;.C...H.;. 0153fe24 01 d2 fd 7f ae 06 00 00 - 4b bd 44 80 ae 06 00 00 ........K.D..... 0153fe34 30 e2 55 81 00 d0 fd 7f - fc 07 30 c0 00 00 00 00 0.U.......0..... 0153fe44 34 00 00 c0 ae 06 00 00 - 80 14 48 80 00 00 00 00 4.........H..... 0153fe54 01 00 00 00 00 00 00 00 - 00 e0 fd 7f fc 07 30 c0 ..............0. State Dump for Thread Id 0x548 eax=77d358be ebx=001452d0 ecx=0012e6c8 edx=00000000 esi=001592b8 edi=00000100 eip=77f83310 esp=0166fe28 ebp=0166ff74 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202 function: ZwReplyWaitReceivePortEx 77f83305 b8ac000000 mov eax,0xac 77f8330a 8d542404 lea edx,[esp+0x4] ss:02169d0f=???????? 77f8330e cd2e int 2e 77f83310 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0166FF74 77D37B4C 77D35924 001592B8 77D33E01 00130000 ntdll!ZwReplyWaitReceivePortEx 0166FFA8 77D358D6 00145160 0166FFEC 7C57B388 001452D0 rpcrt4!NdrCorrelationInitialize 0166FFB4 7C57B388 001452D0 77D33E01 00130000 001452D0 rpcrt4!RpcBindingFree 0166FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW State Dump for Thread Id 0x620 eax=77ab502c ebx=00000102 ecx=01dc01da edx=00000000 esi=77f82826 edi=0176ff74 eip=77f82831 esp=0176ff60 ebp=0176ff7c iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206 function: NtDelayExecution 77f82826 b832000000 mov eax,0x32 77f8282b 8d542404 lea edx,[esp+0x4] ss:02269e47=???????? 77f8282f cd2e int 2e 77f82831 c20800 ret 0x8 77f82834 53 push ebx 77f82835 51 push ecx 77f82836 6a00 push 0x0 77f82838 c70701000000 mov dword ptr [edi],0x1 ds:0176ff74=dc3cba00 77f8283e ff750c push dword ptr [ebp+0xc] ss:02269e62=???????? 77f82841 50 push eax 77f82842 e879fdffff call RtlMultiByteToUnicodeN (77f825c0) 77f82847 e928fcffff jmp RtlConsoleMultiByteToUnicodeN+0x333 (77f82474) *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0176FF7C 7C59A20E 0000EA60 00000000 77AB8FFB 0000EA60 ntdll!NtDelayExecution 00007530 00000000 00000000 00000000 00000000 00000000 kernel32!Sleep State Dump for Thread Id 0x3ec eax=1f444878 ebx=001703ce ecx=01870fb4 edx=00000000 esi=0186ff54 edi=00000000 eip=77e11555 esp=0186ff18 ebp=0186ff30 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: ScrollDC 77e11533 8d542404 lea edx,[esp+0x4] ss:02369dff=???????? 77e11537 cd2e int 2e 77e11539 c21c00 ret 0x1c 77e1153c b838110000 mov eax,0x1138 77e11541 8d542404 lea edx,[esp+0x4] ss:02369dff=???????? 77e11545 cd2e int 2e 77e11547 c20400 ret 0x4 77e1154a b89a110000 mov eax,0x119a 77e1154f 8d542404 lea edx,[esp+0x4] ss:02369dff=???????? 77e11553 cd2e int 2e 77e11555 c21000 ret 0x10 77e11558 6a01 push 0x1 77e1155a 58 pop eax 77e1155b c20800 ret 0x8 77e1155e b839110000 mov eax,0x1139 77e11563 8d542404 lea edx,[esp+0x4] ss:02369dff=???????? 77e11567 cd2e int 2e 77e11569 c20800 ret 0x8 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0186FF30 77ABBAD5 0186FF54 00000000 00000000 00000000 user32!ScrollDC 0186FF70 77ABBA23 7C599F73 00147910 00000102 000001CC ole32!CoInstall 0186FF8C 77ABB95E 77AB50EE 77B2E278 77A50000 00147910 ole32!CoInstall 00007530 00000000 00000000 00000000 00000000 00000000 ole32!CoInstall *----> Raw Stack Dump <----* 0186ff18 d7 15 e1 77 54 ff 86 01 - 00 00 00 00 00 00 00 00 ...wT........... 0186ff28 00 00 00 00 b0 15 e1 77 - 70 ff 86 01 d5 ba ab 77 .......wp......w 0186ff38 54 ff 86 01 00 00 00 00 - 00 00 00 00 00 00 00 00 T............... 0186ff48 00 00 00 00 78 e2 b2 77 - 00 00 00 00 ce 03 17 00 ....x..w........ 0186ff58 00 04 00 00 be ba 00 00 - 34 ac 14 00 5d 33 b9 02 ........4...]3.. 0186ff68 3f 03 00 00 dc 00 00 00 - 8c ff 86 01 23 ba ab 77 ?...........#..w 0186ff78 73 9f 59 7c 10 79 14 00 - 02 01 00 00 cc 01 00 00 s.Y|.y.......... 0186ff88 40 7a 14 00 30 75 00 00 - 5e b9 ab 77 ee 50 ab 77 @z..0u..^..w.P.w 0186ff98 78 e2 b2 77 00 00 a5 77 - 10 79 14 00 ec ff 86 01 x..w...w.y...... 0186ffa8 10 79 14 00 46 50 ab 77 - 30 02 00 00 00 00 00 00 .y..FP.w0....... 0186ffb8 88 b3 57 7c 10 79 14 00 - 30 02 00 00 00 00 00 00 ..W|.y..0....... 0186ffc8 10 79 14 00 00 90 fd 7f - 74 e3 12 00 c0 ff 86 01 .y......t....... 0186ffd8 74 e3 12 00 ff ff ff ff - 44 1f 5c 7c 08 2b 57 7c t.......D.\|.+W| 0186ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 2c 50 ab 77 ............,P.w 0186fff8 10 79 14 00 00 00 00 00 - c1 00 00 00 00 01 00 00 .y.............. 01870008 ff ee ff ee 03 10 00 00 - 01 00 00 00 00 fe 00 00 ................ 01870018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... .. 01870028 a8 01 00 00 ff ef fd 7f - 07 00 08 06 00 00 00 00 ................ 01870038 00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 87 01 ................ 01870048 0f 00 00 00 f8 ff ff ff - 50 00 87 01 50 00 87 01 ........P...P... State Dump for Thread Id 0x4ac eax=00000001 ebx=0283fd74 ecx=77b2d090 edx=00000000 esi=77f82865 edi=00000184 eip=77f82870 esp=0283fd58 ebp=0283fd7c iopl=0 nv up ei ng nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297 function: NtWaitForSingleObject 77f82865 b8ea000000 mov eax,0xea 77f8286a 8d542404 lea edx,[esp+0x4] ss:03339c3f=???????? 77f8286e cd2e int 2e 77f82870 c20c00 ret 0xc *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0283FD7C 7C57B3DB 00000184 00002710 00000000 7878DB85 ntdll!NtWaitForSingleObject 00000000 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject *----> Raw Stack Dump <----* 0283fd58 e4 9f 59 7c 84 01 00 00 - 00 00 00 00 74 fd 83 02 ..Y|........t... 0283fd68 f4 c5 13 00 00 00 00 00 - 0c c6 13 00 00 1f 0a fa ................ 0283fd78 ff ff ff ff 00 00 00 00 - db b3 57 7c 84 01 00 00 ..........W|.... 0283fd88 10 27 00 00 00 00 00 00 - 85 db 78 78 84 01 00 00 .'........xx.... 0283fd98 10 27 00 00 00 00 00 00 - 24 ec 12 00 ec ff 83 02 .'......$....... 0283fda8 f4 c5 13 00 00 00 74 78 - 43 00 3a 00 5c 00 57 00 ......txC.:.\.W. 0283fdb8 49 00 4e 00 4e 00 54 00 - 5c 00 53 00 79 00 73 00 I.N.N.T.\.S.y.s. 0283fdc8 74 00 65 00 6d 00 33 00 - 32 00 5c 00 63 00 6f 00 t.e.m.3.2.\.c.o. 0283fdd8 6d 00 73 00 76 00 63 00 - 73 00 2e 00 64 00 6c 00 m.s.v.c.s...d.l. 0283fde8 6c 00 00 00 1b 00 00 00 - 00 02 00 00 fc ff 83 02 l............... 0283fdf8 23 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 #............... 0283fe08 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe18 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe28 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe38 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe48 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe58 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe68 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe78 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0283fe88 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ State Dump for Thread Id 0x420 eax=00000000 ebx=06a3ff0c ecx=00000400 edx=00000000 esi=77f82865 edi=0000019c eip=77f82870 esp=06a3fef0 ebp=06a3ff14 iopl=0 nv up ei ng nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297 function: NtWaitForSingleObject 77f82865 b8ea000000 mov eax,0xea 77f8286a 8d542404 lea edx,[esp+0x4] ss:07539dd7=???????? 77f8286e cd2e int 2e 77f82870 c20c00 ret 0xc *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 06A3FF14 7C57B3DB 0000019C 00001388 00000000 1B009B78 ntdll!NtWaitForSingleObject 00000000 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject State Dump for Thread Id 0x598 eax=00000000 ebx=00000000 ecx=00000400 edx=00000000 esi=77f82865 edi=0000019c eip=77f82870 esp=06b3fef0 ebp=06b3ff14 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForSingleObject 77f82865 b8ea000000 mov eax,0xea 77f8286a 8d542404 lea edx,[esp+0x4] ss:07639dd7=???????? 77f8286e cd2e int 2e 77f82870 c20c00 ret 0xc *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 06B3FF14 7C57B3DB 0000019C FFFFFFFF 00000000 1B009B78 ntdll!NtWaitForSingleObject 00000000 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject State Dump for Thread Id 0x294 eax=00000000 ebx=00000000 ecx=00000400 edx=00000000 esi=77f82865 edi=0000019c eip=77f82870 esp=06c3fef0 ebp=06c3ff14 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForSingleObject 77f82865 b8ea000000 mov eax,0xea 77f8286a 8d542404 lea edx,[esp+0x4] ss:07739dd7=???????? 77f8286e cd2e int 2e 77f82870 c20c00 ret 0xc *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 06C3FF14 7C57B3DB 0000019C FFFFFFFF 00000000 1B009B78 ntdll!NtWaitForSingleObject 00000000 00000000 00000000 00000000 00000000 00000000 kernel32!WaitForSingleObject *----> Raw Stack Dump <----* 06c3fef0 e4 9f 59 7c 9c 01 00 00 - 00 00 00 00 00 00 00 00 ..Y|............ 06c3ff00 7c ff c3 06 a0 08 f3 01 - 01 00 00 00 9c 01 00 00 |............... 06c3ff10 9c 01 00 00 00 00 00 00 - db b3 57 7c 9c 01 00 00 ..........W|.... 06c3ff20 ff ff ff ff 00 00 00 00 - 78 9b 00 1b 9c 01 00 00 ........x....... 06c3ff30 ff ff ff ff c7 9a 00 1b - ff ff ff ff 7c ff c3 06 ............|... 06c3ff40 20 c5 58 7c 10 e8 f3 01 - 00 00 00 00 d0 0d 12 1b .X|............ 06c3ff50 00 00 00 00 ff ff ff ff - 94 02 00 00 8c 35 00 1b .............5.. 06c3ff60 7c ff c3 06 20 c5 58 7c - 24 e9 12 00 ec ff c3 06 |... .X|$....... 06c3ff70 d0 0d 12 1b 10 e8 f3 01 - 5c 01 00 00 01 00 00 00 ........\....... 06c3ff80 00 00 00 00 13 e7 42 80 - 00 00 00 00 97 02 00 00 ......B......... 06c3ff90 be e7 42 80 60 bd 52 81 - 40 db 4b 81 ff ff ff ff [EMAIL PROTECTED] 06c3ffa0 00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................ 06c3ffb0 00 00 00 00 bf 80 f8 77 - 88 b3 57 7c d0 0d 12 1b .......w..W|.... 06c3ffc0 20 c5 58 7c 24 e9 12 00 - d0 0d 12 1b 00 50 fd 7f .X|$........P.. 06c3ffd0 55 1f f8 77 c0 ff c3 06 - 55 1f f8 77 ff ff ff ff U..w....U..w.... 06c3ffe0 44 1f 5c 7c 08 2b 57 7c - 00 00 00 00 00 00 00 00 D.\|.+W|........ 06c3fff0 00 00 00 00 9b 34 00 1b - d0 0d 12 1b 00 00 00 00 .....4.......... 06c40000 01 00 00 00 00 40 00 00 - 00 c0 17 00 37 01 c4 06 [EMAIL PROTECTED] 06c40010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 06c40020 00 00 00 00 08 20 87 02 - 90 0e f3 01 3f 00 00 00 ..... ......?... _______________________________________________ Python-win32 mailing list Python-win32@python.org http://mail.python.org/mailman/listinfo/python-win32