[Bug 1757] New: Ran Caseware 2001 under Wine and crashed Linux

Wine Bugs wine-bugs at winehq.com
Mon Oct 6 18:05:32 CDT 2003


http://bugs.winehq.com/show_bug.cgi?id=1757

           Summary: Ran Caseware 2001 under Wine and crashed Linux
           Product: Wine
           Version: unspecified
          Platform: PC
               URL: http://[email protected]
        OS/Version: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: wine-binary
        AssignedTo: wine-bugs at winehq.com
        ReportedBy: alan at asandco.co.uk


Wine Debug Report
=================
I attempted to run Caseware 2001 under Wine
 
 // (wine-20030911-1rh9winehq.i686.rpm)
 // Red Hat 9
 // KDE 3.1.10
 // Kernel 2.4 20-8
 // Hardware
 // ========
 // Gigabyte 6INXP mothereboard
 // Pentium IV 2.53 Ghz
 // 256 Meg of RAM
 // Dual Boot using GRUB
  
This caused Linux crash, requiring a hardware reset to restart. This was
reproduced several times.
 
The execution point was the directory holding the data file to be opened by
Caseware:
 "/mnt/win98d/caseware_data_files/"
The file being: "1069-02-BRIT.ac".
 
The program name is "cwin32.exe"
I then ran the program from bash using the following two commands:
 
# echo quit | wine -debugmsg +relay "/mnt/win98c/program
files/caseware/cwin32.exe" >& cware.out
# tail -n 100 cware.out > cware_report.txt

The resultant file cware_report.txt holds the last 100 lines see below signoff.

Alan Secker
alan at asandco.co.uk

0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009
0009:Ret  ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret  window proc 0x101b4bf2
(hwnd=0x2003c,msg=WM_STYLECHANGED,wp=ffffffec,lp=40860748) retval=00000000
0009:Call ntdll.GlobalLock16(0000018f) ret=408f675c
0009:Ret  ntdll.GlobalLock16() retval=4057b770 ret=408f675c
0009:Ret  user32.SetWindowLongA() retval=00000000 ret=40f048fc
0009:Ret  shell32.DragAcceptFiles() retval=00000000 ret=5f40bdc3
0009:Call user32.SetActiveWindow(0002003c) ret=1010d9be
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret  user32.SetActiveWindow() retval=00010024 ret=1010d9be
0009:Call ntdll.TlsGetValue(00000001) ret=5f401018
0009:Ret  ntdll.TlsGetValue() retval=4057bff0 ret=5f401018
0009:Call ntdll.TlsGetValue(00000001) ret=5f401018
0009:Ret  ntdll.TlsGetValue() retval=4057bff0 ret=5f401018
0009:Call user32.GetParent(00010024) ret=5f401281
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret  user32.GetParent() retval=00000000 ret=5f401281
0009:Call ntdll.TlsGetValue(00000001) ret=5f401018
0009:Ret  ntdll.TlsGetValue() retval=4057bff0 ret=5f401018
0009:Call user32.CallWindowProcA(409553d0,0002003c,00000001,00000000,40861150)
ret=5f401f01
0009:Call ntdll.IsBadReadPtr16(409553d0,0000000e) ret=4090b694
0009:Ret  ntdll.IsBadReadPtr16() retval=00000001 ret=4090b694
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009
0009:Ret  ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call window proc 0x409553d0
(hwnd=0x2003c,msg=WM_CREATE,wp=00000000,lp=40861150)
0009:Call ntdll._ConfirmSysLevel(40963a40) ret=408ffce5
0009:Ret  ntdll._ConfirmSysLevel() retval=00000000 ret=408ffce5
0009:Call user32.DefWindowProcA(0002003c,00000001,00000000,40861150) ret=4090b20f
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret  user32.DefWindowProcA() retval=00000000 ret=4090b20f
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009
0009:Ret  ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009
0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52
0009:Ret  ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52
0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82
0009:Ret  ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82
0009:Ret  window proc 0x409553d0
(hwnd=0x2003c,msg=WM_CREATE,wp=00000000,lp=40861150) retval=00000000
0009:Ret  user32.CallWindowProcA() retval=00000000 ret=5f401f01
0009:Call ntdll.RtlAllocateHeap(41190000,00000000,0d466980) ret=78001089
0009:Ret  ntdll.RtlAllocateHeap() retval=4aa60020 ret=78001089
000a:Ret  ntdll.SetEvent() retval=00000001 ret=5f40dfc7
000a:Call ntdll.WaitForSingleObject(00000234,ffffffff) ret=5f40dfd0
000a:Ret  ntdll.WaitForSingleObject() retval=00000000 ret=5f40dfd0
000a:Call ntdll.CloseHandle(00000234) ret=5f40dfd7
000a:Ret  ntdll.CloseHandle() retval=00000001 ret=5f40dfd7
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376
000a:Ret  ntdll.Sleep() retval=00000000 ret=10109376
000a:Call ntdll.Sleep(000000c8) ret=10109376

-- 
Configure bugmail: http://bugs.winehq.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the wine-bugs mailing list