[Dx4win] Cannot start after update
Mats Naslund
sm3lgo at yahoo.com
Thu Apr 30 14:00:53 EDT 2020
Hi,
I have been running v9.03 for a while but decided to try an update today. After update, DX4WIN won't start at all....The bug report says "EAssertion failed", and "Unknown IOTA OC297". Any suggestion?(I am pasting the report below.)
73, TNX
/Mats
-------------------date/time : 2020-04-30, 19:48:48, 961ms
computer name : DESKTOP-I44JCRQ
user name : sm3lg
registered owner : admin
operating system : Windows NT New x64 build 9200
system language : Swedish
system up time : 1 hour
program up time : 202 milliseconds
processors : 4x Intel(R) Core(TM) i5-2520M CPU @ 2.50GHz
physical memory : 5171/8102 MB (free/total)
free disk space : (C:) 355,84 GB
display mode : 1366x768, 32 bit
process id : $16dc
allocated memory : 114,24 MB
executable : dx4win.exe
exec. date/time : 2020-04-30 19:33
version : 9.0.9.1259
compiled with : Delphi 7
madExcept version : 3.0n
dx4win.exe.mad : $00037cc8, $b2644f86, $bd9b08ff
callstack crc : $f0bc175a, $64c35f5e, $64c35f5e
exception number : 1
exception class : EAssertionFailed
exception message : TIOTASbyPrefix: unknown IOTA=OC297 for prefix=FO (C:\dx4win_src\trunk\prefs.pas, line 1890).
main thread ($2da8):
006a9c98 +3f0 dx4win.exe segment%381 public%15606
006a6f18 +2f0 dx4win.exe segment%381 public%15546
00671921 +14d dx4win.exe segment%344 public%14685
004d83d9 +031 dx4win.exe segment%72 public%6332
004d8040 +124 dx4win.exe segment%72 public%6327
76ecd374 +034 user32.dll SetWindowTextA
004df8ad +031 dx4win.exe segment%72 public%6595
006c23c6 +06e dx4win.exe segment%401 public%16227
772c6357 +017 KERNEL32.DLL BaseThreadInitThunk
thread $33a8:
772c6357 +17 KERNEL32.DLL BaseThreadInitThunk
thread $1c24:
772c6357 +17 KERNEL32.DLL BaseThreadInitThunk
thread $1588:
772c6357 +17 KERNEL32.DLL BaseThreadInitThunk
cpu registers:
eax = 097fabe0
ebx = 00000000
ecx = 0019f0a8
edx = 006a9c98
esi = 00000061
edi = 00670b64
eip = 006a9c98
esp = 0019f07c
ebp = 0019fc14
stack dump:
0019f07c 98 9c 6a 00 de fa ed 0e - 01 00 00 00 07 00 00 00 ..j.............
0019f08c 90 f0 19 00 98 9c 6a 00 - e0 ab 7f 09 00 00 00 00 ......j.........
0019f09c 61 00 00 00 64 0b 67 00 - 14 fc 19 00 ac f0 19 00 a...d.g.........
0019f0ac 98 9c 6a 00 1c fc 19 00 - c8 50 40 00 14 fc 19 00 ..j......P at .....
0019f0bc 64 0b 67 00 10 aa ac 02 - 3c 5c 50 00 00 00 00 00 d.g.....<\P.....
0019f0cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f0dc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f0ec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f0fc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f10c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f11c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f12c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f13c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f14c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f15c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f16c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f17c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f18c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f19c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0019f1ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
disassembling:
[...]
006a9c62 lea edx, [ebp-$700]
006a9c68 call -$2a41e1 ($405a8c) ; segment%0.public%292 (dx4win.exe)
006a9c6d push dword ptr [ebp-$a48]
006a9c73 lea eax, [ebp-$a40]
006a9c79 mov edx, 4
006a9c7e call -$2a40db ($405ba8) ; segment%0.public%299 (dx4win.exe)
006a9c83 mov eax, [ebp-$a40]
006a9c89 mov ecx, $762
006a9c8e mov edx, $6a9ec0 ; 'C:\dx4win_src\trunk\prefs.pas'
006a9c93 call -$2a4524 ($405774) ; segment%0.public%275 (dx4win.exe)
006a9c98 > jmp loc_6a9cb8
006a9c9a inc dword ptr [ebp-8]
006a9c9d mov edx, [ebp-8]
006a9ca0 shl edx, 2
006a9ca3 lea eax, [ebp-4]
006a9ca6 call -$2a718b ($402b20) ; segment%0.public%95 (dx4win.exe)
006a9cab mov eax, [ebp-4]
006a9cae mov edx, [ebp-8]
006a9cb1 mov ecx, [ebp-$24]
006a9cb4 mov [eax+edx*4-4], ecx
006a9cb8 lea esi, [ebx+1]
[...]
More information about the DX4WIN
mailing list