Checkpoint Firewall 4.1 Admin Gui
Matthew Mintel
ninetyninewaystodie at lycos.com
Wed Mar 14 17:58:19 CST 2001
g.patel at wanadoo.fr wrote:
> On Tue, 13 Mar 2001 12:49:08 -0500, "Salvatore Innanone"
> <ninetyninewaystodie at lycos.com> wrote:
>
>> I need to run the CheckPoint Firewall 4.1 Admin GUI at work, the 4.0 wines wonderfully...but 4.1 dumps out with the following (even when I changed flags), if anyone can help it's greatly appreciated...
>>
>> Dump is:
>
>
> not good enough.
> Try with -debugmsg +relay,+seh and post the 200
> lines before the crash.
>
> Gerard
>
> _______________________________________________
> wine-users mailing list
> wine-users at winehq.com
> http://www.winehq.com/mailman/listinfo/wine-users
>
How's This?
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409163a0) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d2190) ret=5f41244e fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d2190) ret=5f412427 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0024) ret=5f412277 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412277
fs=008f
Call kernel32.613: LocalFree(403cc788) ret=5f4100e0 fs=008f
Ret kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0024) ret=5f4122b7 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f4122b7
fs=008f
Call kernel32.613: LocalFree(403cb3d4) ret=5f4100e0 fs=008f
Ret kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0024) ret=5f412277 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412277
fs=008f
Call kernel32.613: LocalFree(403cac64) ret=5f4100e0 fs=008f
Ret kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0024) ret=5f4122b7 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f4122b7
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0100) ret=5f412437 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,4090d534) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0100) ret=5f41244e fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0100) ret=5f412427 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d00d8) ret=5f412437 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409173bc) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d00d8) ret=5f41244e fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d00d8) ret=5f412427 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d00b0) ret=5f412437 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,4090b118) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d00b0) ret=5f41244e fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d00b0) ret=5f412427 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0088) ret=5f412437 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40909920) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40908504) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409070e8) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40905ccc) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409048b0) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40903494) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40902078) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40900c5c) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408ff840) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408fe424) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408fd008) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408e0d34) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0088) ret=5f41244e fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0088) ret=5f412427 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0040) ret=5f412538 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412538
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0178) ret=5f41255c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f41255c
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0220) ret=5f41255c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f41255c
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d02f8) ret=5f41255c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f41255c
fs=008f
Call kernel32.435: GetModuleHandleA(5f49df24 "MSVCRT.DLL") ret=5f40fade
fs=008f
Ret kernel32.435: GetModuleHandleA() retval=78000000 ret=5f40fade fs=008f
Call kernel32.317: FreeLibrary(78000000) ret=5f40fae5 fs=008f
Ret kernel32.317: FreeLibrary() retval=00000001 ret=5f40fae5 fs=008f
Call kernel32.844: TlsFree(00000002) ret=5f41259a fs=008f
Ret kernel32.844: TlsFree() retval=00000001 ret=5f41259a fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0024) ret=5f40ffce fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f40ffce
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0024) ret=5f40ffde fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f40ffde
fs=008f
Call kernel32.613: LocalFree(403df218) ret=5f40ffe7 fs=008f
Ret kernel32.613: LocalFree() retval=00000000 ret=5f40ffe7 fs=008f
Call kernel32.613: LocalFree(403dbc18) ret=5f4100e0 fs=008f
Ret kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call kernel32.847: TlsSetValue(00000002,00000000) ret=5f40fffd fs=008f
Ret kernel32.847: TlsSetValue() retval=00000001 ret=5f40fffd fs=008f
Call kernel32.539: GlobalHandle(403cab58) ret=5f4125c2 fs=008f
Ret kernel32.539: GlobalHandle() retval=403cab32 ret=5f4125c2 fs=008f
Call kernel32.547: GlobalUnlock(403cab32) ret=5f4125cb fs=008f
Ret kernel32.547: GlobalUnlock() retval=00000000 ret=5f4125cb fs=008f
Call kernel32.536: GlobalFree(403cab32) ret=5f4125d2 fs=008f
Ret kernel32.536: GlobalFree() retval=00000000 ret=5f4125d2 fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0024) ret=5f4125dc fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f4125dc
fs=008f
trace:relay:PE_InitDLL
CallTo32(entryproc=0x40729fe8,module=40719000,type=0,res=0x1)
trace:relay:PE_InitDLL
CallTo32(entryproc=0x40e02e30,module=40e01000,type=0,res=0x1)
trace:relay:PE_InitDLL
CallTo32(entryproc=0x40686cc4,module=40681000,type=0,res=0x1)
trace:relay:PE_InitDLL
CallTo32(entryproc=0x780017fd,module=78000000,type=0,res=0x1)
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408e009c) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.343: RtlDeleteCriticalSection(409fa490) ret=78005842 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005842
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(409f0980) ret=78005842 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005842
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(409f0180) ret=78005842 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005842
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075
fs=008fCall ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1
fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(78037118) ret=78005854 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005854
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(78037130) ret=7800585c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=7800585c
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(78037100) ret=78005864 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005864
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(780370e8) ret=7800586c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=7800586c
fs=008f
Call kernel32.844: TlsFree(00000001) ret=780057f7 fs=008f
Ret kernel32.844: TlsFree() retval=00000001 ret=780057f7 fs=008f
Call kernel32.872: VirtualFree(409f0000,00000000,00008000) ret=780058a0
fs=008f
Ret kernel32.872: VirtualFree() retval=00000001 ret=780058a0 fs=008f
Call kernel32.557: HeapDestroy(408e0000) ret=780058b2 fs=008f
Ret kernel32.557: HeapDestroy() retval=00000001 ret=780058b2 fs=008f
trace:relay:PE_InitDLL
CallTo32(entryproc=0x40627dc8,module=40618000,type=0,res=0x1)
More information about the wine-users
mailing list