Skip to main content

Notice

Please note that most of the software linked on this forum is likely to be safe to use. If you are unsure, feel free to ask in the relevant topics, or send a private message to an administrator or moderator. To help curb the problems of false positives, or in the event that you do find actual malware, you can contribute through the article linked here.
Topic: foo_shuffle crashes (Read 3513 times) previous topic - next topic
0 Members and 2 Guests are viewing this topic.

foo_shuffle crashes

The problem has been around for a while but it's realy starting to bug me now.
If I drag audio files into the playlist when "Shuffle album 2" is activated and foobar is playing the program crashes every once and a while.

I'm unable to reproduce the crash everytime I want to but it apears that the fastest way I getting it to crash is by playing a file, moving the seekbar almost to the end of the track, wait till the next song starts to play and drag in some audio files in the active playlist.
It won't crash every time but if it doesn't crash after the first or second attempt it will definitely do so after the third try.

I've got two different logs of this problem:
Code: [Select]
Illegal operation:
Code: C0000005h, flags: 00000000h, address: 00A6C0AEh
Access violation, operation: read, address: 00000010h
Call path:
playback_core_i::g_thread_func=>playback_core_i::thread_func=>input::seek::run
This is the first crash logged by this instance.
Code bytes (00A6C0AEh):
00A6C06Eh:  79 6C 00 00 8B F0 85 F6 75 CE 5E C9 C3 8B C6 EB
00A6C07Eh:  F9 56 8B F1 8B 4E 04 85 C9 74 08 8B 01 FF 10 83
00A6C08Eh:  66 04 00 5E C3 8B 49 04 85 C9 74 05 8B 01 FF 60
00A6C09Eh:  0C C3 8B 49 04 85 C9 75 05 32 C0 C2 0C 00 8B 01
00A6C0AEh:  FF 60 10 B8 90 FD AC 00 C3 56 8B F1 57 8D 46 08
00A6C0BEh:  50 E8 46 6C 00 00 8B F8 59 85 FF 75 18 85 F6 74
00A6C0CEh:  14 8B CE C7 06 B8 3A AB 00 E8 A3 FF FF FF 56 E8
00A6C0DEh:  52 68 04 00 59 8B C7 5F 5E C3 83 C1 08 51 E8 0E
Stack (0157FDE4h):
0157FDC4h:  80559E66 8237E3A8 00000007 81ED5008
0157FDD4h:  F3478CF0 00000007 80534504 82124F3C
0157FDE4h:  00A68604 00E40018 00000343 00E44018
0157FDF4h:  10001DE2 00F7F0C0 00F7F00C 8237E3B0
0157FE04h:  81F37978 805ABBC8 E11DF1A0 00000000
0157FE14h:  0157FD00 7FFDC000 0157FE74 00169300
0157FE24h:  0000000E 0157FE68 00169300 00000010
0157FE34h:  0157FE78 10001E6D 00169346 0044410C
0157FE44h:  00000010 10001DE2 0157FE74 10001E17
0157FE54h:  00000343 0157FE78 00437974 0157FED8
0157FE64h:  00000000 00F7F008 0041F4CB 00F7F00C
0157FE74h:  0000003C 0157FFA4 00420225 0157FED8
0157FE84h:  00CD03B8 00F7F008 00F7F008 00439908
0157FE94h:  0043997C 00F7F440 00000000 DA740DA7
0157FEA4h:  4071F740 00BD1FD0 00000020 0000001C
0157FEB4h:  00000001 00439974 00439960 00F8F9F0
0157FEC4h:  00000040 00000024 00000001 00439974
0157FED4h:  00439960 0043B09C 00F90008 00004807
0157FEE4h:  00004807 00000000 00F90008 00000000
0157FEF4h:  00000000 00000000 0043AF90 00000000
Registers:
EAX: 00000000, EBX: 00000000, ECX: 00F7BC98, EDX: 00E40018
ESI: 00E40008, EDI: 00E44018, EBP: 0157FE58, ESP: 0157FDE4
Crash location: "foo_input_std", loaded at 00A60000h - 00B02000h

Loaded modules:
foobar2000                       loaded at 00400000h - 00452000h
ntdll                            loaded at 77F50000h - 77FF7000h
kernel32                         loaded at 77E60000h - 77F46000h
USER32                           loaded at 77D40000h - 77DCC000h
GDI32                            loaded at 7E090000h - 7E0D1000h
ADVAPI32                         loaded at 77DD0000h - 77E5D000h
RPCRT4                           loaded at 78000000h - 78087000h
ole32                            loaded at 771B0000h - 772D4000h
COMCTL32                         loaded at 71950000h - 71A34000h
msvcrt                           loaded at 77C10000h - 77C63000h
SHLWAPI                          loaded at 70A70000h - 70AD5000h
utf8api                          loaded at 10000000h - 1000D000h
comdlg32                         loaded at 763B0000h - 763F5000h
SHELL32                          loaded at 773D0000h - 77BCA000h
foo_ape                          loaded at 008D0000h - 008F0000h
foo_audioscrobbler               loaded at 008F0000h - 00910000h
LIBCURL                          loaded at 00910000h - 00929000h
WS2_32                           loaded at 71AB0000h - 71AC5000h
WS2HELP                          loaded at 71AA0000h - 71AA8000h
WINMM                            loaded at 76B40000h - 76B6C000h
foo_cdda                         loaded at 009C0000h - 009CE000h
foo_clienc                       loaded at 009D0000h - 009DB000h
foo_console                      loaded at 009E0000h - 009E7000h
foo_diskwriter                   loaded at 009F0000h - 00A02000h
foo_flac                         loaded at 00A10000h - 00A26000h
foo_id3v2                        loaded at 00A30000h - 00A60000h
MSVCP60                          loaded at 55900000h - 55961000h
foo_input_std                    loaded at 00A60000h - 00B02000h
MSACM32                          loaded at 77BE0000h - 77BF4000h
foo_masstag                      loaded at 00B10000h - 00B21000h
foo_output_std                   loaded at 00B30000h - 00B39000h
foo_rgscan                       loaded at 00B40000h - 00B4B000h
foo_shuffle                      loaded at 00B50000h - 00B5A000h
foo_ui_std                       loaded at 00B60000h - 00B77000h
foo_vis_manager                  loaded at 00B80000h - 00B88000h
foo_wma                          loaded at 00B90000h - 00BA9000h
WMVCore                          loaded at 08530000h - 0872D000h
WMASF                            loaded at 07260000h - 07299000h
OLEAUT32                         loaded at 77120000h - 771AB000h
RTSUltraMonHook                  loaded at 00CB0000h - 00CDE000h
UxTheme                          loaded at 5AD70000h - 5ADA4000h
RTSUltraMonHookRes               loaded at 01370000h - 01373000h
CAPTLIB                          loaded at 01580000h - 015E3000h
mswsock                          loaded at 71A50000h - 71A8B000h
DNSAPI                           loaded at 76F20000h - 76F45000h
winrnr                           loaded at 76FB0000h - 76FB7000h
WLDAP32                          loaded at 76F60000h - 76F8C000h
dsound                           loaded at 51080000h - 510DA000h
VERSION                          loaded at 77C00000h - 77C07000h
wdmaud                           loaded at 72D20000h - 72D29000h
rasadhlp                         loaded at 76FC0000h - 76FC5000h
wshtcpip                         loaded at 71A90000h - 71A98000h
msacm32                          loaded at 72D10000h - 72D18000h
midimap                          loaded at 77BD0000h - 77BD7000h
KsUser                           loaded at 5EF80000h - 5EF84000h
imagehlp                         loaded at 76C90000h - 76CB2000h
DBGHELP                          loaded at 6D510000h - 6D58D000h

Stack dump analysis:
Address: 00A68604h, location: "foo_input_std", loaded at 00A60000h - 00B02000h
Address: 10001DE2h, location: "utf8api", loaded at 10000000h - 1000D000h
Symbol: "uCallStackTracker::uCallStackTracker" (+00000000h)
Address: 10001E6Dh, location: "utf8api", loaded at 10000000h - 1000D000h
Symbol: "uCallStackTracker::uCallStackTracker" (+0000008Bh)
Address: 0044410Ch, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 10001DE2h, location: "utf8api", loaded at 10000000h - 1000D000h
Symbol: "uCallStackTracker::uCallStackTracker" (+00000000h)
Address: 10001E17h, location: "utf8api", loaded at 10000000h - 1000D000h
Symbol: "uCallStackTracker::uCallStackTracker" (+00000035h)
Address: 00437974h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0041F4CBh, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00420225h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00CD03B8h, location: "RTSUltraMonHook", loaded at 00CB0000h - 00CDE000h
Address: 00439908h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043997Ch, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439974h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439960h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439974h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439960h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043B09Ch, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AF90h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFB8h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFA4h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFB8h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFA4h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 004205D8h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 77E7D33Bh, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "RegisterWaitForInputIdle" (+00000043h)
Address: 00CD03B8h, location: "RTSUltraMonHook", loaded at 00CB0000h - 00CDE000h
Address: 77E94809h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "SetThreadExecutionState" (+00000097h)
Address: 77E83DB8h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "OpenConsoleW" (+00001966h)
Address: 004205A9h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00905A4Dh, location: "foo_audioscrobbler", loaded at 008F0000h - 00910000h
Address: 10000000h, location: "utf8api", loaded at 10000000h - 1000D000h

Version info:
foobar2000 v0.8.2
UNICODE


Code: [Select]
Illegal operation:
Code: C0000005h, flags: 00000000h, address: 00B81674h
Access violation, operation: read, address: 00000020h
Call path:
WinMain=>app_mainloop=>playlist_callback::on_items_added
This is the first crash logged by this instance.
Code bytes (00B81674h):
00B81634h:  B8 00 E8 A6 0C 00 00 B9 84 51 B8 00 E8 A6 0B 00
00B81644h:  00 B9 5C 51 B8 00 E8 51 0B 00 00 80 3D 28 52 B8
00B81654h:  00 00 74 0C E8 D5 06 00 00 80 25 28 52 B8 00 00
00B81664h:  8B 0D B0 51 B8 00 85 C9 0F 84 53 01 00 00 8B 01
00B81674h:  FF 50 20 84 C0 0F 84 46 01 00 00 8B 0D B0 51 B8
00B81684h:  00 8B 01 FF 50 40 DD 5D F0 33 F6 F7 05 4C 51 B8
00B81694h:  00 FC FF FF FF 76 22 A1 44 51 B8 00 51 DD 45 F0
00B816A4h:  51 8B 0C B0 DD 1C 24 E8 2A 02 00 00 A1 4C 51 B8
Stack (0012FDC0h):
0012FDA0h:  F4798D64 0012FEBC BF87BCA8 00000286
0012FDB0h:  804F6732 E156D860 000025BF 00000000
0012FDC0h:  0012FE4C 00B815CE 0012FE84 00000001
0012FDD0h:  0012FDBC 005C0073 0012FE04 77D43A50
0012FDE0h:  000E02C6 00000113 0000029A 00000000
0012FDF0h:  00B815CE DCBAABCD 00000000 0012FE4C
0012FE00h:  00B815CE 0012FE6C 77D43B1F 00B815CE
0012FE10h:  000E02C6 00000113 0000029A 00000000
0012FE20h:  0012FF00 0012FEF8 005C1440 00480020
0012FE30h:  00000000 00000000 00000014 00000001
0012FE40h:  00000000 00000000 00000010 00000000
0012FE50h:  00000000 0012FE20 0012F9E8 0012FEBC
0012FE60h:  77D7390A 77D99B68 00000000 0012FECC
0012FE70h:  77D43D79 00000000 00B815CE 000E02C6
0012FE80h:  00000113 0000029A 00000000 005C1454
0012FE90h:  00000001 00000001 00000001 00000000
0012FEA0h:  00000001 0000029A 77D43C01 00000000
0012FEB0h:  00000000 0012FE94 0012F9E8 0012FFB0
0012FEC0h:  77D7390A 77D99B88 FFFFFFFF 0012FF18
0012FED0h:  77D43DDF 0012FEF8 00000000 100038EC
Registers:
EAX: 00000000, EBX: 00000000, ECX: 00F7F008, EDX: 00B8522C
ESI: 000E02C6, EDI: 00B8522C, EBP: 0012FDD8, ESP: 0012FDC0
Crash location: "foo_vis_manager", loaded at 00B80000h - 00B88000h

Loaded modules:
foobar2000                       loaded at 00400000h - 00452000h
ntdll                            loaded at 77F50000h - 77FF7000h
kernel32                         loaded at 77E60000h - 77F46000h
USER32                           loaded at 77D40000h - 77DCC000h
GDI32                            loaded at 7E090000h - 7E0D1000h
ADVAPI32                         loaded at 77DD0000h - 77E5D000h
RPCRT4                           loaded at 78000000h - 78087000h
ole32                            loaded at 771B0000h - 772D4000h
COMCTL32                         loaded at 71950000h - 71A34000h
msvcrt                           loaded at 77C10000h - 77C63000h
SHLWAPI                          loaded at 70A70000h - 70AD5000h
utf8api                          loaded at 10000000h - 1000D000h
comdlg32                         loaded at 763B0000h - 763F5000h
SHELL32                          loaded at 773D0000h - 77BCA000h
foo_ape                          loaded at 008D0000h - 008F0000h
foo_audioscrobbler               loaded at 008F0000h - 00910000h
LIBCURL                          loaded at 00910000h - 00929000h
WS2_32                           loaded at 71AB0000h - 71AC5000h
WS2HELP                          loaded at 71AA0000h - 71AA8000h
WINMM                            loaded at 76B40000h - 76B6C000h
foo_cdda                         loaded at 009C0000h - 009CE000h
foo_clienc                       loaded at 009D0000h - 009DB000h
foo_console                      loaded at 009E0000h - 009E7000h
foo_diskwriter                   loaded at 009F0000h - 00A02000h
foo_flac                         loaded at 00A10000h - 00A26000h
foo_id3v2                        loaded at 00A30000h - 00A60000h
MSVCP60                          loaded at 55900000h - 55961000h
foo_input_std                    loaded at 00A60000h - 00B02000h
MSACM32                          loaded at 77BE0000h - 77BF4000h
foo_masstag                      loaded at 00B10000h - 00B21000h
foo_output_std                   loaded at 00B30000h - 00B39000h
foo_rgscan                       loaded at 00B40000h - 00B4B000h
foo_shuffle                      loaded at 00B50000h - 00B5A000h
foo_ui_std                       loaded at 00B60000h - 00B77000h
foo_vis_manager                  loaded at 00B80000h - 00B88000h
foo_wma                          loaded at 00B90000h - 00BA9000h
WMVCore                          loaded at 08530000h - 0872D000h
WMASF                            loaded at 07260000h - 07299000h
OLEAUT32                         loaded at 77120000h - 771AB000h
RTSUltraMonHook                  loaded at 00CB0000h - 00CDE000h
UxTheme                          loaded at 5AD70000h - 5ADA4000h
RTSUltraMonHookRes               loaded at 01370000h - 01373000h
CAPTLIB                          loaded at 01580000h - 015E3000h
mswsock                          loaded at 71A50000h - 71A8B000h
DNSAPI                           loaded at 76F20000h - 76F45000h
winrnr                           loaded at 76FB0000h - 76FB7000h
WLDAP32                          loaded at 76F60000h - 76F8C000h
dsound                           loaded at 51080000h - 510DA000h
VERSION                          loaded at 77C00000h - 77C07000h
wdmaud                           loaded at 72D20000h - 72D29000h
rasadhlp                         loaded at 76FC0000h - 76FC5000h
wshtcpip                         loaded at 71A90000h - 71A98000h
msacm32                          loaded at 72D10000h - 72D18000h
midimap                          loaded at 77BD0000h - 77BD7000h
KsUser                           loaded at 5EF80000h - 5EF84000h
imagehlp                         loaded at 76C90000h - 76CB2000h
DBGHELP                          loaded at 6D510000h - 6D58D000h

Stack dump analysis:
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D43A50h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D43B1Fh, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D7390Ah, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "CreateAcceleratorTableA" (+0000032Dh)
Address: 77D99B68h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 77D43D79h, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "GetMessageW" (+00000125h)
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D43C01h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 77D7390Ah, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "CreateAcceleratorTableA" (+0000032Dh)
Address: 77D99B88h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 77D43DDFh, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "DispatchMessageW" (+0000000Bh)
Address: 100038ECh, location: "utf8api", loaded at 10000000h - 1000D000h
Symbol: "uDispatchMessage" (+0000000Ah)
Address: 0041247Dh, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 70A71A39h, location: "SHLWAPI", loaded at 70A70000h - 70AD5000h
Symbol: "Ordinal125" (+0000002Bh)
Address: 004110DCh, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00438D25h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00400000h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 70A71A39h, location: "SHLWAPI", loaded at 70A70000h - 70AD5000h
Symbol: "Ordinal125" (+0000002Bh)
Address: 00438D50h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043C320h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 77E814C7h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "GetCurrentDirectoryW" (+00000044h)
Address: 70A71A39h, location: "SHLWAPI", loaded at 70A70000h - 70AD5000h
Symbol: "Ordinal125" (+0000002Bh)
Address: 77E94809h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "SetThreadExecutionState" (+00000097h)
Address: 77E91210h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "OpenConsoleW" (+0000EDBEh)
Address: 00438BF1h, location: "foobar2000", loaded at 00400000h - 00452000h

Version info:
foobar2000 v0.8.2
UNICODE


OS: WinXP (Sp1)
foobar2000: 0.8.2
foo_shuffle: 1.0.24

foo_shuffle crashes

Reply #1
Does it still crash if you remove foo_audioscrobbler?

foo_shuffle crashes

Reply #2
Shortest lived version ever, I just posted v1.0.26. Please test. (Added full synchronization around the flow control objects, so playlist manipulation callbacks don't interfere while it's still picking out a new track and/or queueing it into the history. I probably should have done this some time ago...)

foo_shuffle crashes

Reply #3
@bleh: removing foo_audioscrobbler makes no difference.

It still crashes but with one difference, when I drag the files onto the playlist foobar will crash (displaying somekind of popup realy fast) but after a restart the files are added. Before the files wheren't added at all.

Code: [Select]
Illegal operation:
Code: C0000005h, flags: 00000000h, address: 00B818E5h
Access violation, operation: read, address: 00000000h
Call path:
WinMain=>app_mainloop=>playlist_callback::on_items_added
This is the first crash logged by this instance.
Code bytes (00B818E5h):
00B818A5h:  C0 40 C3 8B 65 E8 8B 75 E4 8B 0E 8B 01 FF 10 83
00B818B5h:  26 00 68 78 50 B8 00 6A 03 E8 46 17 00 00 59 59
00B818C5h:  83 4D FC FF 8B 4D F0 64 89 0D 00 00 00 00 5F 5E
00B818D5h:  5B C9 C2 04 00 55 8B EC 83 EC 20 53 8B D9 56 57
00B818E5h:  8B 0B 85 C9 0F 84 20 01 00 00 8B 01 80 65 F4 00
00B818F5h:  80 65 FF 00 FF 50 18 84 C0 74 13 8B 0B C6 45 FF
00B81905h:  01 8B 01 FF 50 1C 84 C0 74 04 C6 45 F4 01 8B 0B
00B81915h:  8B 01 FF 50 14 DC 6D 08 8B 35 EC 51 B8 00 C1 EE
Stack (0012FD84h):
0012FD64h:  F3D04D64 0012FEBC BF87BCA8 F3D04D64
0012FD74h:  BF875579 BC6D0B90 000025BF 00000000
0012FD84h:  00B8522C 00000000 00000000 3FF058B3
0012FD94h:  004060D3 00BCAE54 004208A0 00B8522C
0012FDA4h:  0007038C 00D979A4 00BCAE54 0012FDD8
0012FDB4h:  00B816B0 673081C1 40155C64 0012FE4C
0012FDC4h:  00B815CE 673081C1 40155C64 0012FDBC
0012FDD4h:  00000000 0012FE04 77D43A50 0007038C
0012FDE4h:  00000113 0000029A 00000000 00B815CE
0012FDF4h:  DCBAABCD 00000000 0012FE4C 00B815CE
0012FE04h:  0012FE6C 77D43B1F 00B815CE 0007038C
0012FE14h:  00000113 0000029A 00000000 0012FF00
0012FE24h:  0012FEF8 005AF9E8 0012FEF8 00000000
0012FE34h:  00000000 00000014 00000001 00000000
0012FE44h:  00000000 00000010 00000000 00000000
0012FE54h:  0012FE20 0012F9AC 0012FEBC 77D7390A
0012FE64h:  77D99B68 00000000 0012FECC 77D43D79
0012FE74h:  00000000 00B815CE 0007038C 00000113
0012FE84h:  0000029A 00000000 005AF9FC 00000001
0012FE94h:  00000001 00000001 00000000 00000001
Registers:
EAX: 0105F158, EBX: 00000000, ECX: 00000000, EDX: 00BCAE54
ESI: 00000000, EDI: 00B8522C, EBP: 0012FDB0, ESP: 0012FD84
Crash location: "foo_vis_manager", loaded at 00B80000h - 00B88000h

Loaded modules:
foobar2000                       loaded at 00400000h - 00452000h
ntdll                            loaded at 77F50000h - 77FF7000h
kernel32                         loaded at 77E60000h - 77F46000h
USER32                           loaded at 77D40000h - 77DCC000h
GDI32                            loaded at 7E090000h - 7E0D1000h
ADVAPI32                         loaded at 77DD0000h - 77E5D000h
RPCRT4                           loaded at 78000000h - 78087000h
ole32                            loaded at 771B0000h - 772D4000h
COMCTL32                         loaded at 71950000h - 71A34000h
msvcrt                           loaded at 77C10000h - 77C63000h
SHLWAPI                          loaded at 70A70000h - 70AD5000h
utf8api                          loaded at 10000000h - 1000D000h
comdlg32                         loaded at 763B0000h - 763F5000h
SHELL32                          loaded at 773D0000h - 77BCA000h
foo_ape                          loaded at 008D0000h - 008F0000h
foo_audioscrobbler               loaded at 008F0000h - 00910000h
LIBCURL                          loaded at 00910000h - 00929000h
WS2_32                           loaded at 71AB0000h - 71AC5000h
WS2HELP                          loaded at 71AA0000h - 71AA8000h
WINMM                            loaded at 76B40000h - 76B6C000h
foo_cdda                         loaded at 009C0000h - 009CE000h
foo_clienc                       loaded at 009D0000h - 009DB000h
foo_console                      loaded at 009E0000h - 009E7000h
foo_diskwriter                   loaded at 009F0000h - 00A02000h
foo_flac                         loaded at 00A10000h - 00A26000h
foo_id3v2                        loaded at 00A30000h - 00A60000h
MSVCP60                          loaded at 55900000h - 55961000h
foo_input_std                    loaded at 00A60000h - 00B02000h
MSACM32                          loaded at 77BE0000h - 77BF4000h
foo_masstag                      loaded at 00B10000h - 00B21000h
foo_output_std                   loaded at 00B30000h - 00B39000h
foo_rgscan                       loaded at 00B40000h - 00B4B000h
foo_shuffle                      loaded at 00B50000h - 00B5B000h
foo_ui_std                       loaded at 00B60000h - 00B77000h
foo_vis_manager                  loaded at 00B80000h - 00B88000h
foo_wma                          loaded at 00B90000h - 00BA9000h
WMVCore                          loaded at 08530000h - 0872D000h
WMASF                            loaded at 07260000h - 07299000h
OLEAUT32                         loaded at 77120000h - 771AB000h
PDSHELL                          loaded at 00CB0000h - 00CD4000h
PDTOOLS                          loaded at 00CF0000h - 00D20000h
PDRESENG                         loaded at 00D30000h - 00D5A000h
RTSUltraMonHook                  loaded at 00D90000h - 00DBE000h
UxTheme                          loaded at 5AD70000h - 5ADA4000h
RTSUltraMonHookRes               loaded at 01460000h - 01463000h
CAPTLIB                          loaded at 01670000h - 016D3000h
mswsock                          loaded at 71A50000h - 71A8B000h
DNSAPI                           loaded at 76F20000h - 76F45000h
dsound                           loaded at 51080000h - 510DA000h
VERSION                          loaded at 77C00000h - 77C07000h
winrnr                           loaded at 76FB0000h - 76FB7000h
WLDAP32                          loaded at 76F60000h - 76F8C000h
wdmaud                           loaded at 72D20000h - 72D29000h
rasadhlp                         loaded at 76FC0000h - 76FC5000h
wshtcpip                         loaded at 71A90000h - 71A98000h
msacm32                          loaded at 72D10000h - 72D18000h
midimap                          loaded at 77BD0000h - 77BD7000h
KsUser                           loaded at 5EF80000h - 5EF84000h
imagehlp                         loaded at 76C90000h - 76CB2000h
DBGHELP                          loaded at 6D510000h - 6D58D000h

Stack dump analysis:
Address: 00B8522Ch, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 004060D3h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 004208A0h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00B8522Ch, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 00D979A4h, location: "RTSUltraMonHook", loaded at 00D90000h - 00DBE000h
Address: 00B816B0h, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D43A50h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D43B1Fh, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D7390Ah, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "CreateAcceleratorTableA" (+0000032Dh)
Address: 77D99B68h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 77D43D79h, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "GetMessageW" (+00000125h)
Address: 00B815CEh, location: "foo_vis_manager", loaded at 00B80000h - 00B88000h
Address: 77D43C01h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 77D7390Ah, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "CreateAcceleratorTableA" (+0000032Dh)
Address: 77D99B88h, location: "USER32", loaded at 77D40000h - 77DCC000h
Address: 77D43DDFh, location: "USER32", loaded at 77D40000h - 77DCC000h
Symbol: "DispatchMessageW" (+0000000Bh)
Address: 100038ECh, location: "utf8api", loaded at 10000000h - 1000D000h
Symbol: "uDispatchMessage" (+0000000Ah)
Address: 0041247Dh, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 70A71A39h, location: "SHLWAPI", loaded at 70A70000h - 70AD5000h
Symbol: "Ordinal125" (+0000002Bh)
Address: 004110DCh, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00438D25h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00400000h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 70A71A39h, location: "SHLWAPI", loaded at 70A70000h - 70AD5000h
Symbol: "Ordinal125" (+0000002Bh)
Address: 00438D50h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043C320h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 77E814C7h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "GetCurrentDirectoryW" (+00000044h)
Address: 70A71A39h, location: "SHLWAPI", loaded at 70A70000h - 70AD5000h
Symbol: "Ordinal125" (+0000002Bh)
Address: 77E94809h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "SetThreadExecutionState" (+00000097h)
Address: 77E91210h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "OpenConsoleW" (+0000EDBEh)
Address: 00438BF1h, location: "foobar2000", loaded at 00400000h - 00452000h

Version info:
foobar2000 v0.8.2
UNICODE


Sometimes the files don't get added and foobar doesn't crash but after a shutdown The follwoing error gets displayed "Error: metadb_handle leaks, 6337 objects". This happend using the older version as well.

I didn't mention this before but if I want to be able to add files I first have to switch to e.g. default playback and restart foobar. Again, the difference with your new version is when I switch to default, add the files without a restart and foobar crashes, after a restart the Order does get set the default. Before it would have been Shuffle album 2 mode after the restart.

P.s. I didn't change any default foo_shuffle settings, e.g. the history save option is disabled etc.

foo_shuffle crashes

Reply #4
I've posted yet another version.

v1.0.28:
  • Objects are allocated dynamically as necessary, in a more secure fashion than the last time I tried this. This should reduce overhead by a negligible amount.
  • Reorganized redundant flow control code into a single base class.
v1.0.27:
  • Moved synchronization code
Gee, I just can't seem to make up my mind how to reorganize this mess, or make it more secure/stable.

foo_shuffle crashes

Reply #5
I'm sorry to inform you, but foobar still crashed...

Code: [Select]
Illegal operation:
Code: C0000005h, flags: 00000000h, address: 0041F4BDh
Access violation, operation: read, address: 0000001Ch
Call path:
playback_core_i::g_thread_func=>playback_core_i::thread_func
This is the first crash logged by this instance.
Code bytes (0041F4BDh):
0041F47Dh:  18 8B 8E 00 01 00 00 89 9E 10 01 00 00 53 8B 01
0041F48Dh:  FF 50 20 FF 4F 18 57 FF 15 14 90 43 00 83 BE 10
0041F49Dh:  01 00 00 00 5B 74 04 33 C0 EB 25 8D 7E 04 57 89
0041F4ADh:  7C 24 10 FF D5 FF 47 18 8B 8E 00 01 00 00 8B 01
0041F4BDh:  FF 50 1C 8D 4C 24 0C 8B F0 E8 FC 6B FE FF 8B C6
0041F4CDh:  5F 5E 5D 59 C3 55 8B EC 83 EC 24 56 8B F1 83 BE
0041F4DDh:  10 01 00 00 00 0F 85 77 03 00 00 DD 86 98 00 00
0041F4EDh:  00 53 57 DD 5D F0 E8 72 03 00 00 8B 1D 18 90 43
Stack (0166FE70h):
0166FE50h:  F8695D44 00000246 80531432 F8695D0C
0166FE60h:  82263550 FFDFF120 00000246 804FB007
0166FE70h:  0106000C 01060008 0166FFA4 0106000C
0166FE80h:  00420152 00DB03B8 01060008 01060008
0166FE90h:  00439908 0043997C 01079380 00000000
0166FEA0h:  58BF258C 4084D3F2 01053FF8 00000020
0166FEB0h:  0000001C 00000001 00439974 00439960
0166FEC0h:  01229D70 00000020 00000020 00000001
0166FED0h:  00439974 00439960 0043B09C 010D4238
0166FEE0h:  00004807 00004807 00000000 010D4238
0166FEF0h:  0000AC44 00000002 00000480 0043AF90
0166FF00h:  00000000 00000000 00000000 00000001
0166FF10h:  0043AFB8 0043AFA4 00BE5A18 00000004
0166FF20h:  00000004 00000001 0043AFB8 0043AFA4
0166FF30h:  82263584 80616B69 81DC5020 82263550
0166FF40h:  7FFDC000 00000000 F5352C8C 804FAF9C
0166FF50h:  00000000 00000005 00000000 00000000
0166FF60h:  00000000 804F81DE EAE8AB8A 3FE6A77D
0166FF70h:  0000001E 00000000 BFF00000 00445700
0166FF80h:  00000000 00000000 00896048 00000240
Registers:
EAX: 00000000, EBX: 0106000C, ECX: 0105ED98, EDX: 0106000C
ESI: 01060008, EDI: 0106000C, EBP: 77F5B2A0, ESP: 0166FE70
Crash location: "foobar2000", loaded at 00400000h - 00452000h

Loaded modules:
foobar2000                       loaded at 00400000h - 00452000h
ntdll                            loaded at 77F50000h - 77FF7000h
kernel32                         loaded at 77E60000h - 77F46000h
USER32                           loaded at 77D40000h - 77DCC000h
GDI32                            loaded at 7E090000h - 7E0D1000h
ADVAPI32                         loaded at 77DD0000h - 77E5D000h
RPCRT4                           loaded at 78000000h - 78087000h
ole32                            loaded at 771B0000h - 772D4000h
COMCTL32                         loaded at 71950000h - 71A34000h
msvcrt                           loaded at 77C10000h - 77C63000h
SHLWAPI                          loaded at 70A70000h - 70AD5000h
utf8api                          loaded at 10000000h - 1000D000h
comdlg32                         loaded at 763B0000h - 763F5000h
SHELL32                          loaded at 773D0000h - 77BCA000h
foo_ape                          loaded at 008D0000h - 008F0000h
foo_audioscrobbler               loaded at 008F0000h - 00910000h
LIBCURL                          loaded at 00910000h - 00929000h
WS2_32                           loaded at 71AB0000h - 71AC5000h
WS2HELP                          loaded at 71AA0000h - 71AA8000h
WINMM                            loaded at 76B40000h - 76B6C000h
foo_cdda                         loaded at 009C0000h - 009CE000h
foo_clienc                       loaded at 009D0000h - 009DB000h
foo_console                      loaded at 009E0000h - 009E7000h
foo_diskwriter                   loaded at 009F0000h - 00A02000h
foo_flac                         loaded at 00A10000h - 00A26000h
foo_id3v2                        loaded at 00A30000h - 00A60000h
MSVCP60                          loaded at 55900000h - 55961000h
foo_input_std                    loaded at 00A60000h - 00B02000h
MSACM32                          loaded at 77BE0000h - 77BF4000h
foo_masstag                      loaded at 00B10000h - 00B21000h
foo_output_std                   loaded at 00B30000h - 00B39000h
foo_rgscan                       loaded at 00B40000h - 00B4B000h
foo_shuffle                      loaded at 00B50000h - 00B5B000h
foo_ui_std                       loaded at 00B60000h - 00B77000h
foo_vis_manager                  loaded at 00B80000h - 00B88000h
foo_wma                          loaded at 00B90000h - 00BA9000h
WMVCore                          loaded at 08530000h - 0872D000h
WMASF                            loaded at 07260000h - 07299000h
OLEAUT32                         loaded at 77120000h - 771AB000h
PDSHELL                          loaded at 00CB0000h - 00CD4000h
PDTOOLS                          loaded at 00CF0000h - 00D20000h
PDRESENG                         loaded at 00D30000h - 00D5A000h
RTSUltraMonHook                  loaded at 00D90000h - 00DBE000h
UxTheme                          loaded at 5AD70000h - 5ADA4000h
RTSUltraMonHookRes               loaded at 01460000h - 01463000h
mswsock                          loaded at 71A50000h - 71A8B000h
DNSAPI                           loaded at 76F20000h - 76F45000h
dsound                           loaded at 51080000h - 510DA000h
VERSION                          loaded at 77C00000h - 77C07000h
wdmaud                           loaded at 72D20000h - 72D29000h
msacm32                          loaded at 72D10000h - 72D18000h
midimap                          loaded at 77BD0000h - 77BD7000h
KsUser                           loaded at 5EF80000h - 5EF84000h
winrnr                           loaded at 76FB0000h - 76FB7000h
WLDAP32                          loaded at 76F60000h - 76F8C000h
rasadhlp                         loaded at 76FC0000h - 76FC5000h
wshtcpip                         loaded at 71A90000h - 71A98000h
CAPTLIB                          loaded at 01CF0000h - 01D53000h
imagehlp                         loaded at 76C90000h - 76CB2000h
DBGHELP                          loaded at 6D510000h - 6D58D000h

Stack dump analysis:
Address: 00420152h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00DB03B8h, location: "RTSUltraMonHook", loaded at 00D90000h - 00DBE000h
Address: 00439908h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043997Ch, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439974h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439960h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439974h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 00439960h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043B09Ch, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AF90h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFB8h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFA4h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFB8h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 0043AFA4h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 004205D8h, location: "foobar2000", loaded at 00400000h - 00452000h
Address: 77E7D33Bh, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "RegisterWaitForInputIdle" (+00000043h)
Address: 00DB03B8h, location: "RTSUltraMonHook", loaded at 00D90000h - 00DBE000h
Address: 77E94809h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "SetThreadExecutionState" (+00000097h)
Address: 77E83DB8h, location: "kernel32", loaded at 77E60000h - 77F46000h
Symbol: "OpenConsoleW" (+00001966h)
Address: 004205A9h, location: "foobar2000", loaded at 00400000h - 00452000h

Version info:
foobar2000 v0.8.2
UNICODE


Do you want me to keep posting the new logs or do you just want me to let you know it still crashes after a new release?

foo_shuffle crashes

Reply #6
*poof*

v1.0.29:
  • Changed playlist_callback::on_items_added() handler, as it was doing something horribly wrong that led to heap corruption, not to mention history loss. If anyone wants to see what the code was doing, see the comments below the new code. This was the real problem, and this is definitely the real fix.
  • Optimized album and tag set search code a bit
I recommend everyone to update as soon as possible.

foo_shuffle crashes

Reply #7
Wow! So far I haven't been able to break it.
Thank you very much kode54.