http://bugs.winehq.org/show_bug.cgi?id=37085
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Keywords| |download Status|UNCONFIRMED |NEW URL| |http://www.murge.com/files/ | |download/MindManager2002_St | |andard.zip CC| |focht@gmx.net Component|-unknown |user32 Ever confirmed|0 |1
--- Comment #3 from Anastasius Focht focht@gmx.net --- Hello folks,
confirming.
It's an MDI app - not bug 19505 from first glance.
--- snip --- $ pwd /home/focht/.wine/drive_c/Program Files/Mindjet/MindManager 2002
$ WINEDEBUG=+tid,+seh,+relay wine ./MindMan.exe >>log.txt 2>&1 ... 0023:Call user32.SendMessageA(0001012c,00000117,000102c4,00000000) ret=00590d2c 0023:Call window proc 0x601210 (hwnd=0x1012c,msg=WM_INITMENUPOPUP,wp=000102c4,lp=00000000) 0023:Call user32.GetMenuItemID(000102c4,00000000) ret=00437439 0023:Ret user32.GetMenuItemID() retval=0000891c ret=00437439 0023:Call user32.GetFocus() ret=0060d239 0023:Ret user32.GetFocus() retval=000101fa ret=0060d239 0023:Call user32.GetWindowLongA(000101fa,fffffff0) ret=0060d0ec 0023:Ret user32.GetWindowLongA() retval=50021000 ret=0060d0ec 0023:Call user32.GetParent(000101fa) ret=0060d25c 0023:Ret user32.GetParent() retval=000101f6 ret=0060d25c 0023:Call user32.GetWindowLongA(000101f6,fffffff0) ret=0060d0ec 0023:Ret user32.GetWindowLongA() retval=44c40044 ret=0060d0ec 0023:Call user32.GetMenu(0001012c) ret=0061c12a 0023:Ret user32.GetMenu() retval=00000000 ret=0061c12a 0023:Call user32.GetMenuItemCount(000102c4) ret=0061c17e 0023:Ret user32.GetMenuItemCount() retval=00000005 ret=0061c17e 0023:Call user32.GetMenuItemID(000102c4,00000000) ret=0061c19b 0023:Ret user32.GetMenuItemID() retval=0000891c ret=0061c19b 0023:Call user32.GetFocus() ret=00431404 0023:Ret user32.GetFocus() retval=000101fa ret=00431404 0023:Call user32.IsWindow(0001023c) ret=00431438 0023:Ret user32.IsWindow() retval=00000001 ret=00431438 0023:Call user32.IsWindow(000101ac) ret=00544f7b 0023:Ret user32.IsWindow() retval=00000001 ret=00544f7b 0023:Call user32.IsWindow(00000000) ret=00544f7b 0023:Ret user32.IsWindow() retval=00000000 ret=00544f7b 0023:Call user32.IsWindow(000101b2) ret=00544f7b 0023:Ret user32.IsWindow() retval=00000001 ret=00544f7b 0023:Call user32.IsWindow(000101b8) ret=00544f7b 0023:Ret user32.IsWindow() retval=00000001 ret=00544f7b 0023:Call user32.IsWindow(000101be) ret=00544f7b 0023:Ret user32.IsWindow() retval=00000001 ret=00544f7b 0023:Call user32.IsWindow(000101c4) ret=00544f7b 0023:Ret user32.IsWindow() retval=00000001 ret=00544f7b 0023:trace:seh:raise_exception code=c0000005 flags=0 addr=0x451e7d ip=00451e7d tid=0023 0023:trace:seh:raise_exception info[0]=00000000 0023:trace:seh:raise_exception info[1]=000005f0 0023:trace:seh:raise_exception eax=00a6e520 ebx=00a730c8 ecx=00000000 edx=ffffffff esi=00000000 edi=0033ec88 0023:trace:seh:raise_exception ebp=0033ec8c esp=0033ec1c cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00210246 0023:trace:seh:call_stack_handlers calling handler at 0x642197 code=c0000005 flags=0 0023:trace:seh:call_stack_handlers handler at 0x642197 returned 1 ... Unhandled exception: page fault on read access to 0x000005f0 in 32-bit code (0x00451e7d). Register dump: CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b EIP:00451e7d ESP:0033ec1c EBP:0033ec8c EFLAGS:00210246( R- -- I Z- -P- ) EAX:00a6e520 EBX:00a730c8 ECX:00000000 EDX:ffffffff ESI:00000000 EDI:0033ec88 ... Backtrace: =>0 0x00451e7d in mindman (+0x51e7d) (0x0033ec8c) 1 0x0060468e in mindman (+0x20468d) (0x0033eca0) 2 0x006047af in mindman (+0x2047ae) (0x0033ecd0) 3 0x00544fb6 in mindman (+0x144fb5) (0x0033ecec) 4 0x0043159d in mindman (+0x3159c) (0x0033ed10) 5 0x00604a3d in mindman (+0x204a3c) (0x0033ed3c) 6 0x0061c1fd in mindman (+0x21c1fc) (0x0033ed84) 7 0x0043750a in mindman (+0x37509) (0x0033ef2c) 8 0x00602574 in mindman (+0x202573) (0x0033efac) 9 0x00602106 in mindman (+0x202105) (0x0033efcc) 10 0x00601033 in mindman (+0x201032) (0x0033f02c) 11 0x0060123b in mindman (+0x20123a) (0x0033f048) 12 0x7ea5bb6a WINPROC_wrapper+0x19() in user32 (0x0033f078) 13 0x7ea5bcdf call_window_proc+0xcc(hwnd=0x1012c, msg=0x117, wp=0x102c4, lp=0, result=0x33f15c, arg=0x601210) [/home/focht/projects/wine/wine.repo/src/dlls/user32/winproc.c:244] in user32 (0x0033f0b8) 14 0x7ea5df2e WINPROC_call_window+0x213(hwnd=0x1012c, msg=0x117, wParam=0x102c4, lParam=0, result=0x33f15c, unicode=0, mapping=WMCHAR_MAP_SENDMESSAGE) [/home/focht/projects/wine/wine.repo/src/dlls/user32/winproc.c:909] in user32 (0x0033f108) 15 0x7ea1ae1e call_window_proc+0xbf(hwnd=0x1012c, msg=0x117, wparam=0x102c4, lparam=0, unicode=0, same_thread=0x1, mapping=WMCHAR_MAP_SENDMESSAGE) [/home/focht/projects/wine/wine.repo/src/dlls/user32/message.c:2223] in user32 (0x0033f168) 16 0x7ea1dc53 send_message+0x137(info=0x33f1e0, res_ptr=0x33f20c, unicode=0) [/home/focht/projects/wine/wine.repo/src/dlls/user32/message.c:3263] in user32 (0x0033f1c8) 17 0x7ea1e2e2 SendMessageA+0x68(hwnd=0x1012c, msg=0x117, wparam=0x102c4, lparam=0) [/home/focht/projects/wine/wine.repo/src/dlls/user32/message.c:3479] in user32 (0x0033f218) 18 0x7bc6db6a relay_call+0x39() in ntdll (0x0033f244) 19 0x7e9b420d in user32 (+0x1420c) (0x00000000) 0x00451e7d: movl 0x5f0(%ecx),%eax Modules: Module Address Debug info Name (96 modules) PE 400000- 72c000 Export mindman PE 10000000-1014c000 Deferred mmlang-eng PE 25840000-258fd000 Deferred ter32mm PE 26840000-2688a000 Deferred hts32mm PE 60c90000-60cc6000 Deferred vic32 ... Threads: process tid prio (all id:s are in hex) ... 00000022 (D) C:\Program Files\Mindjet\MindManager 2002\MindMan.exe 00000028 0 00000027 0 00000026 0 00000025 0 00000024 0 00000023 0 <== --- snip ---
$ sha1sum MindManager2002_Standard.zip e992e613c3a7ee8a9fd184bb02528abbf46949c4 MindManager2002_Standard.zip
$ du -sh MindManager2002_Standard.zip 14M MindManager2002_Standard.zip
$ wine --version wine-1.7.24
Regards