[Bug 1757] New: Ran Caseware 2001 under Wine and crashed Linux
Wine Bugs
wine-bugs at winehq.com
Mon Oct 6 18:05:32 CDT 2003
http://bugs.winehq.com/show_bug.cgi?id=1757
Summary: Ran Caseware 2001 under Wine and crashed Linux
Product: Wine
Version: unspecified
Platform: PC
URL: http://[email protected]
OS/Version: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: wine-binary
AssignedTo: wine-bugs at winehq.com
ReportedBy: alan at asandco.co.uk
Wine Debug Report
=================
I attempted to run Caseware 2001 under Wine
// (wine-20030911-1rh9winehq.i686.rpm)
// Red Hat 9
// KDE 3.1.10
// Kernel 2.4 20-8
// Hardware
// ========
// Gigabyte 6INXP mothereboard
// Pentium IV 2.53 Ghz
// 256 Meg of RAM
// Dual Boot using GRUB
This caused Linux crash, requiring a hardware reset to restart. This was
reproduced several times.
The execution point was the directory holding the data file to be opened by
Caseware:
"/mnt/win98d/caseware_data_files/"
The file being: "1069-02-BRIT.ac".
The program name is "cwin32.exe"
I then ran the program from bash using the following two commands:
# echo quit | wine -debugmsg +relay "/mnt/win98c/program
files/caseware/cwin32.exe" >& cware.out
# tail -n 100 cware.out > cware_report.txt
The resultant file cware_report.txt holds the last 100 lines see below signoff.
Alan Secker
alan at asandco.co.uk
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009
0009:Ret ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret window proc 0x101b4bf2
(hwnd=0x2003c,msg=WM_STYLECHANGED,wp=ffffffec,lp=40860748) retval=00000000
0009:Call ntdll.GlobalLock16(0000018f) ret=408f675c
0009:Ret ntdll.GlobalLock16() retval=4057b770 ret=408f675c
0009:Ret user32.SetWindowLongA() retval=00000000 ret=40f048fc
0009:Ret shell32.DragAcceptFiles() retval=00000000 ret=5f40bdc3
0009:Call user32.SetActiveWindow(0002003c) ret=1010d9be
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret user32.SetActiveWindow() retval=00010024 ret=1010d9be
0009:Call ntdll.TlsGetValue(00000001) ret=5f401018
0009:Ret ntdll.TlsGetValue() retval=4057bff0 ret=5f401018
0009:Call ntdll.TlsGetValue(00000001) ret=5f401018
0009:Ret ntdll.TlsGetValue() retval=4057bff0 ret=5f401018
0009:Call user32.GetParent(00010024) ret=5f401281
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret user32.GetParent() retval=00000000 ret=5f401281
0009:Call ntdll.TlsGetValue(00000001) ret=5f401018
0009:Ret ntdll.TlsGetValue() retval=4057bff0 ret=5f401018
0009:Call user32.CallWindowProcA(409553d0,0002003c,00000001,00000000,40861150)
ret=5f401f01
0009:Call ntdll.IsBadReadPtr16(409553d0,0000000e) ret=4090b694
0009:Ret ntdll.IsBadReadPtr16() retval=00000001 ret=4090b694
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009
0009:Ret ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call window proc 0x409553d0
(hwnd=0x2003c,msg=WM_CREATE,wp=00000000,lp=40861150)
0009:Call ntdll._ConfirmSysLevel(40963a40) ret=408ffce5
0009:Ret ntdll._ConfirmSysLevel() retval=00000000 ret=408ffce5
0009:Call user32.DefWindowProcA(0002003c,00000001,00000000,40861150) ret=4090b20f
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret user32.DefWindowProcA() retval=00000000 ret=4090b20f
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009
0009:Ret ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret window proc 0x409553d0
(hwnd=0x2003c,msg=WM_CREATE,wp=00000000,lp=40861150) retval=00000000
0009:Ret user32.CallWindowProcA() retval=00000000 ret=5f401f01
0009:Call ntdll.RtlAllocateHeap(41190000,00000000,0d466980) ret=78001089
0009:Ret ntdll.RtlAllocateHeap() retval=4aa60020 ret=78001089
000a:Ret ntdll.SetEvent() retval=00000001 ret=5f40dfc7
000a:Call ntdll.WaitForSingleObject(00000234,ffffffff) ret=5f40dfd0
000a:Ret ntdll.WaitForSingleObject() retval=00000000 ret=5f40dfd0
000a:Call ntdll.CloseHandle(00000234) ret=5f40dfd7
000a:Ret ntdll.CloseHandle() retval=00000001 ret=5f40dfd7
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
--
Configure bugmail: http://bugs.winehq.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the wine-bugs
mailing list