Checkpoint Firewall 4.1 Admin Gui

Matthew Mintel ninetyninewaystodie at lycos.com
Wed Mar 14 17:58:19 CST 2001


g.patel at wanadoo.fr wrote:

> On Tue, 13 Mar 2001 12:49:08 -0500, "Salvatore Innanone"
> <ninetyninewaystodie at lycos.com> wrote:
> 
>> I need to run the CheckPoint Firewall 4.1 Admin GUI at work, the 4.0 wines wonderfully...but 4.1 dumps out with the following (even when I changed flags), if anyone can help it's greatly appreciated...
>> 
>> Dump is:
> 
> 
> not good enough. 
> Try with -debugmsg +relay,+seh and post the 200
> lines before the crash.
> 
> Gerard
> 
> _______________________________________________
> wine-users mailing list
> wine-users at winehq.com
> http://www.winehq.com/mailman/listinfo/wine-users
> 
How's This?

Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409163a0) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d2190) ret=5f41244e fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d2190) ret=5f412427 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0024) ret=5f412277 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412277 
fs=008f
Call kernel32.613: LocalFree(403cc788) ret=5f4100e0 fs=008f
Ret  kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0024) ret=5f4122b7 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f4122b7 
fs=008f
Call kernel32.613: LocalFree(403cb3d4) ret=5f4100e0 fs=008f
Ret  kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0024) ret=5f412277 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412277 
fs=008f
Call kernel32.613: LocalFree(403cac64) ret=5f4100e0 fs=008f
Ret  kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0024) ret=5f4122b7 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f4122b7 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0100) ret=5f412437 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,4090d534) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0100) ret=5f41244e fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0100) ret=5f412427 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d00d8) ret=5f412437 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409173bc) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d00d8) ret=5f41244e fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d00d8) ret=5f412427 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d00b0) ret=5f412437 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,4090b118) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d00b0) ret=5f41244e fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d00b0) ret=5f412427 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0088) ret=5f412437 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f412437 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40909920) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40908504) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409070e8) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40905ccc) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,409048b0) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40903494) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40902078) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,40900c5c) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408ff840) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408fe424) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408fd008) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408e0d34) ret=78001436 fs=008f
Ret  kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0088) ret=5f41244e fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f41244e 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0088) ret=5f412427 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412427 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0040) ret=5f412538 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f412538 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0178) ret=5f41255c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f41255c 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0220) ret=5f41255c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f41255c 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d02f8) ret=5f41255c fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f41255c 
fs=008f
Call kernel32.435: GetModuleHandleA(5f49df24 "MSVCRT.DLL") ret=5f40fade 
fs=008f
Ret kernel32.435: GetModuleHandleA() retval=78000000 ret=5f40fade fs=008f
Call kernel32.317: FreeLibrary(78000000) ret=5f40fae5 fs=008f
Ret kernel32.317: FreeLibrary() retval=00000001 ret=5f40fae5 fs=008f
Call kernel32.844: TlsFree(00000002) ret=5f41259a fs=008f
Ret kernel32.844: TlsFree() retval=00000001 ret=5f41259a fs=008f
Call ntdll.360: RtlEnterCriticalSection(5f4d0024) ret=5f40ffce fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=5f40ffce 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(5f4d0024) ret=5f40ffde fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=5f40ffde 
fs=008f
Call kernel32.613: LocalFree(403df218) ret=5f40ffe7 fs=008f
Ret kernel32.613: LocalFree() retval=00000000 ret=5f40ffe7 fs=008f
Call kernel32.613: LocalFree(403dbc18) ret=5f4100e0 fs=008f
Ret kernel32.613: LocalFree() retval=00000000 ret=5f4100e0 fs=008f
Call kernel32.847: TlsSetValue(00000002,00000000) ret=5f40fffd fs=008f
Ret kernel32.847: TlsSetValue() retval=00000001 ret=5f40fffd fs=008f
Call kernel32.539: GlobalHandle(403cab58) ret=5f4125c2 fs=008f
Ret kernel32.539: GlobalHandle() retval=403cab32 ret=5f4125c2 fs=008f
Call kernel32.547: GlobalUnlock(403cab32) ret=5f4125cb fs=008f
Ret kernel32.547: GlobalUnlock() retval=00000000 ret=5f4125cb fs=008f
Call kernel32.536: GlobalFree(403cab32) ret=5f4125d2 fs=008f
Ret kernel32.536: GlobalFree() retval=00000000 ret=5f4125d2 fs=008f
Call ntdll.343: RtlDeleteCriticalSection(5f4d0024) ret=5f4125dc fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=5f4125dc 
fs=008f
trace:relay:PE_InitDLL 
CallTo32(entryproc=0x40729fe8,module=40719000,type=0,res=0x1)
trace:relay:PE_InitDLL 
CallTo32(entryproc=0x40e02e30,module=40e01000,type=0,res=0x1)
trace:relay:PE_InitDLL 
CallTo32(entryproc=0x40686cc4,module=40681000,type=0,res=0x1)
trace:relay:PE_InitDLL 
CallTo32(entryproc=0x780017fd,module=78000000,type=0,res=0x1)
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call kernel32.559: HeapFree(408e0000,00000000,408e009c) ret=78001436 fs=008f
Ret kernel32.559: HeapFree() retval=00000001 ret=78001436 fs=008f
Call ntdll.343: RtlDeleteCriticalSection(409fa490) ret=78005842 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005842 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(409f0980) ret=78005842 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005842 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008f
Call ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 fs=008f
Ret ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(409f0180) ret=78005842 fs=008f
Ret ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005842 
fs=008f
Call ntdll.360: RtlEnterCriticalSection(78037118) ret=78001075 fs=008f
Ret  ntdll.360: RtlEnterCriticalSection() retval=00000000 ret=78001075 
fs=008fCall ntdll.449: RtlLeaveCriticalSection(78037118) ret=780012b1 
fs=008f
Ret  ntdll.449: RtlLeaveCriticalSection() retval=00000000 ret=780012b1 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(78037118) ret=78005854 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005854 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(78037130) ret=7800585c fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=7800585c 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(78037100) ret=78005864 fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=78005864 
fs=008f
Call ntdll.343: RtlDeleteCriticalSection(780370e8) ret=7800586c fs=008f
Ret  ntdll.343: RtlDeleteCriticalSection() retval=00000000 ret=7800586c 
fs=008f
Call kernel32.844: TlsFree(00000001) ret=780057f7 fs=008f
Ret  kernel32.844: TlsFree() retval=00000001 ret=780057f7 fs=008f
Call kernel32.872: VirtualFree(409f0000,00000000,00008000) ret=780058a0 
fs=008f
Ret  kernel32.872: VirtualFree() retval=00000001 ret=780058a0 fs=008f
Call kernel32.557: HeapDestroy(408e0000) ret=780058b2 fs=008f
Ret  kernel32.557: HeapDestroy() retval=00000001 ret=780058b2 fs=008f
trace:relay:PE_InitDLL 
CallTo32(entryproc=0x40627dc8,module=40618000,type=0,res=0x1)







More information about the wine-users mailing list