Latest WACUP public preview for x86 & x64 is build #20202 (September 28th 2024) (x86 & x64 changelogs)
Latest restricted WACUP beta release is build #20686 (December 23rd 2024) (x86 & x64 changelogs)


NOTE: Beta testers are added in a limited & subjective manner as I can only support so many people as part of the beta test program to keep it useful for my needs.

Unless I think you're going to be helpful, not all requests will be accepted but might still be later on. Remember that beta testing is to help me & the limitations currently works for my needs for this project.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - madoin

Pages: [1]
1
Report zip did not appear but also unfortunately error went away when did change in settings: Plug-ins -> Output -> DirectSound -> Output Device -> Primary Sound Driver to Steinberg UR22mkII and back to Primary sound driver. Also then using again out_notsodirect. Bit weird as the Primary and Steinberg device definitely had to be same as only that device has vol > 0 in analog side of cables.
Just in case tried in clean Win VM (so would have no privacy concerns sending full crash dumps) with the same USB sound device redirected there but also no success to get that error again.

2
After MB/CPU upgrade, but still using same external audio device (not the new MB realtek one) latest Wacup started crashing with Next Track click, usually between 2 to 5 clicks it crashes. Before MB upgrade there were no crashes. Only happens with out_notsodirect output. Changed to out_notsowavey and no crashes to date.
Likely something with my system because quite forceful system upgrade without windows reinstall but still maybe good to know that this kind of crash exists.

relevant dump info:
(5274.1940): Security check failure or stack buffer overrun - code c0000409 (first/second chance not available)
Subcode: 0xa FAST_FAIL_GUARD_ICALL_CHECK_FAILURE
For analysis of this file, run !analyze -v
eax=00000000 ebx=00000000 ecx=0000000a edx=00000001 esi=00000001 edi=15e43a80
eip=77e88f30 esp=13d0eee4 ebp=13d0ef10 iopl=0         nv up ei pl zr na pe nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
ntdll!RtlFailFast2:
77e88f30 cd29            int     29h

CONTEXT:  13d0f00c -- (.cxr 0x13d0f00c)
eax=00000000 ebx=00000000 ecx=00000001 edx=00df0000 esi=00000001 edi=15e43a80
eip=77e88dfb esp=13d0fabc ebp=13d0fb08 iopl=0         nv up ei pl zr ac pe nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010256
ntdll!LdrpValidateUserCallTargetBitMapCheck:
77e88dfb 8b1482          mov     edx,dword ptr [edx+eax*4] ds:002b:00df0000=????????
Resetting default scope

EXCEPTION_RECORD:  13d0efbc -- (.exr 0x13d0efbc)
ExceptionAddress: 77e88dfb (ntdll!LdrpValidateUserCallTargetBitMapCheck)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 00df0000
Attempt to read from address 00df0000

PROCESS_NAME:  wacup.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000a

READ_ADDRESS:  00df0000

FAULTING_THREAD:  ffffffff

STACK_TEXT: 
13d0fabc 77e88dfb ntdll!LdrpValidateUserCallTargetBitMapCheck+0x0
13d0fac0 51cb4062 out_notsodirect+0x4062
13d0fb10 51cb3d86 out_notsodirect+0x3d86
13d0fb58 76f8fcc9 kernel32!BaseThreadInitThunk+0x19
13d0fb68 77e6809e ntdll!__RtlUserThreadStart+0x2f
13d0fbc4 77e6806e ntdll!_RtlUserThreadStart+0x1b

STACK_COMMAND:  .cxr 13d0f00c ; kb ; ** Pseudo Context ** Pseudo ** Value: 1b042e85a90 ** ; kb

SYMBOL_NAME:  out_notsodirect+4062

MODULE_NAME: out_notsodirect

IMAGE_NAME:  out_notsodirect.dll

FAILURE_BUCKET_ID:  INVALID_POINTER_READ_FAIL_FAST_GUARD_ICALL_CHECK_FAILURE_c0000409_out_notsodirect.dll!Unknown

OS_VERSION:  10.0.19041.1

3
With latest release 1.9.20.17040 (x86) this crash seems to be fixed, thanks.

4
Crash seems to appear when switching fast between wav and mp3 files with mouse double click in playlist or next track button 10+ times when active trakc goes over wav files in playlist. Files are about down 900's items in playlist where there are 10 wav files and others before and after are mp3. Tried setting DSP none, Visualization none, deactivating out_notsodirect.dll but did not help.
It is not always repeatable exacly same way with same files as one time double clicking crashed consistently few times and then it did not and next track clicking did the thing.
Crash is immediate process kill that does not create report zip file but mem dump is still created.

CONTEXT:  (.ecxr)
eax=070fe430 ebx=00000000 ecx=070fe460 edx=77613960 esi=00000002 edi=0b9c9140
eip=775d6c43 esp=070fe408 ebp=070fe440 iopl=0         nv up ei pl zr na pe nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
ntdll!RtlReportFatalFailure+0x16:
775d6c43 eb33            jmp     ntdll!RtlReportFatalFailure+0x4b (775d6c78)
Resetting default scope

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 775d6c43 (ntdll!RtlReportFatalFailure+0x00000016)
   ExceptionCode: c0000374
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 77613960

PROCESS_NAME:  wacup.exe

ERROR_CODE: (NTSTATUS) 0xc0000374 - A heap has been corrupted.

EXCEPTION_CODE_STR:  c0000374

EXCEPTION_PARAMETER1:  77613960

ADDITIONAL_DEBUG_TEXT:  Followup set based on attribute [Heap_Error_Type] from Frame:[0] on thread:[PSEUDO_THREAD] ; Followup set based on attribute [Is_ChosenCrashFollowupThread] from Frame:[0] on thread:[PSEUDO_THREAD]

FAULTING_THREAD:  ffffffff

STACK_TEXT: 
00000000 00000000 ntdll!RtlpFreeHeapInternal+0x0


STACK_COMMAND:  !heap ; ** Pseudo Context ** ManagedPseudo ** Value: ffffffff ** ; kb

SYMBOL_NAME:  ntdll!RtlpFreeHeapInternal+0

MODULE_NAME: ntdll

IMAGE_NAME:  ntdll.dll

FAILURE_BUCKET_ID:  HEAP_CORRUPTION_ACTIONABLE_BlockNotBusy_DOUBLE_FREE_c0000374_ntdll.dll!RtlpFreeHeapInternal

Pages: [1]