http://bugs.winehq.com/show_bug.cgi?id=1757
Summary: Ran Caseware 2001 under Wine and crashed Linux Product: Wine Version: unspecified Platform: PC URL: http://alan@asandco.co.uk OS/Version: Linux Status: UNCONFIRMED Severity: normal Priority: P2 Component: wine-binary AssignedTo: wine-bugs@winehq.com ReportedBy: alan@asandco.co.uk
Wine Debug Report ================= I attempted to run Caseware 2001 under Wine
// (wine-20030911-1rh9winehq.i686.rpm) // Red Hat 9 // KDE 3.1.10 // Kernel 2.4 20-8 // Hardware // ======== // Gigabyte 6INXP mothereboard // Pentium IV 2.53 Ghz // 256 Meg of RAM // Dual Boot using GRUB
This caused Linux crash, requiring a hardware reset to restart. This was reproduced several times.
The execution point was the directory holding the data file to be opened by Caseware: "/mnt/win98d/caseware_data_files/" The file being: "1069-02-BRIT.ac".
The program name is "cwin32.exe" I then ran the program from bash using the following two commands:
# echo quit | wine -debugmsg +relay "/mnt/win98c/program files/caseware/cwin32.exe" >& cware.out # tail -n 100 cware.out > cware_report.txt
The resultant file cware_report.txt holds the last 100 lines see below signoff.
Alan Secker alan@asandco.co.uk
0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009 0009:Ret ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Ret window proc 0x101b4bf2 (hwnd=0x2003c,msg=WM_STYLECHANGED,wp=ffffffec,lp=40860748) retval=00000000 0009:Call ntdll.GlobalLock16(0000018f) ret=408f675c 0009:Ret ntdll.GlobalLock16() retval=4057b770 ret=408f675c 0009:Ret user32.SetWindowLongA() retval=00000000 ret=40f048fc 0009:Ret shell32.DragAcceptFiles() retval=00000000 ret=5f40bdc3 0009:Call user32.SetActiveWindow(0002003c) ret=1010d9be 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Ret user32.SetActiveWindow() retval=00010024 ret=1010d9be 0009:Call ntdll.TlsGetValue(00000001) ret=5f401018 0009:Ret ntdll.TlsGetValue() retval=4057bff0 ret=5f401018 0009:Call ntdll.TlsGetValue(00000001) ret=5f401018 0009:Ret ntdll.TlsGetValue() retval=4057bff0 ret=5f401018 0009:Call user32.GetParent(00010024) ret=5f401281 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Ret user32.GetParent() retval=00000000 ret=5f401281 0009:Call ntdll.TlsGetValue(00000001) ret=5f401018 0009:Ret ntdll.TlsGetValue() retval=4057bff0 ret=5f401018 0009:Call user32.CallWindowProcA(409553d0,0002003c,00000001,00000000,40861150) ret=5f401f01 0009:Call ntdll.IsBadReadPtr16(409553d0,0000000e) ret=4090b694 0009:Ret ntdll.IsBadReadPtr16() retval=00000001 ret=4090b694 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009 0009:Ret ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Call window proc 0x409553d0 (hwnd=0x2003c,msg=WM_CREATE,wp=00000000,lp=40861150) 0009:Call ntdll._ConfirmSysLevel(40963a40) ret=408ffce5 0009:Ret ntdll._ConfirmSysLevel() retval=00000000 ret=408ffce5 0009:Call user32.DefWindowProcA(0002003c,00000001,00000000,40861150) ret=4090b20f 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Ret user32.DefWindowProcA() retval=00000000 ret=4090b20f 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Call ntdll.GlobalGetAtomNameW(0000c051,409658b0,0000003c) ret=408d3009 0009:Ret ntdll.GlobalGetAtomNameW() retval=0000000e ret=408d3009 0009:Call ntdll._EnterSysLevel(40963a40) ret=408ffc52 0009:Ret ntdll._EnterSysLevel() retval=400e2a40 ret=408ffc52 0009:Call ntdll._LeaveSysLevel(40963a40) ret=408ffc82 0009:Ret ntdll._LeaveSysLevel() retval=00000000 ret=408ffc82 0009:Ret window proc 0x409553d0 (hwnd=0x2003c,msg=WM_CREATE,wp=00000000,lp=40861150) retval=00000000 0009:Ret user32.CallWindowProcA() retval=00000000 ret=5f401f01 0009:Call ntdll.RtlAllocateHeap(41190000,00000000,0d466980) ret=78001089 0009:Ret ntdll.RtlAllocateHeap() retval=4aa60020 ret=78001089 000a:Ret ntdll.SetEvent() retval=00000001 ret=5f40dfc7 000a:Call ntdll.WaitForSingleObject(00000234,ffffffff) ret=5f40dfd0 000a:Ret ntdll.WaitForSingleObject() retval=00000000 ret=5f40dfd0 000a:Call ntdll.CloseHandle(00000234) ret=5f40dfd7 000a:Ret ntdll.CloseHandle() retval=00000001 ret=5f40dfd7 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376 000a:Ret ntdll.Sleep() retval=00000000 ret=10109376 000a:Call ntdll.Sleep(000000c8) ret=10109376