https://bugs.winehq.org/show_bug.cgi?id=49253 --- Comment #4 from Anastasius Focht <focht(a)gmx.net> --- Hello RafaĆ, from your trace log: --- snip --- ... 1340.303:015c:trace:process:CreateProcessInternalW app (null) cmdline L"\"Z:\\home\\rafal\\Pobrane\\2048Portable\\App\\2048\\2048-portable-nw.exe\" --type=renderer --no-sandbox --field-trial-handle=988 --primordial-pipe-token=27D32A78DC24013F9175C3EFB4F44EDC --lang=pl --user-data-dir=\"C:\\users\\rafal\\Local Settings\\Application Data\\2048 Portable\\User Da"... 1340.303:015c:trace:process:find_exe_file looking for L"Z:\\home\\rafal\\Pobrane\\2048Portable\\App\\2048\\2048-portable-nw.exe" in L"Z:\\home\\rafal\\Pobrane\\2048Portable\\App\\2048;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0" 1340.303:015c:fixme:process:CreateProcessInternalW Unsupported attribute 0x20002. ... 0.000:01cc:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin 0.000:01cc:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin 0.000:01cc:trace:loaddll:load_native_dll Loaded L"Z:\\home\\rafal\\Pobrane\\2048Portable\\App\\2048\\2048-portable-nw.exe" at 0x400000: native ... 1340.319:015c:trace:process:RtlCreateUserProcess L"\\??\\Z:\\home\\rafal\\Pobrane\\2048Portable\\App\\2048\\2048-portable-nw.exe" pid 01c8 tid 01cc handles 0x3f4/0x3f8 1340.319:015c:trace:process:CreateProcessInternalW started process pid 01c8 tid 01cc ... 1340.723:01cc:trace:process:GetEnvironmentVariableW (L"WINEDLLDIR0" 00C026B8 30) 1340.723:01cc:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc726ec ip=7bc726ec tid=01cc 1340.723:01cc:trace:seh:raise_exception info[0]=00000000 1340.723:01cc:trace:seh:raise_exception info[1]=00db2710 1340.723:01cc:trace:seh:raise_exception eax=00ba0000 ebx=00db2710 ecx=001aff50 edx=00c027c0 esi=00dc0000 edi=00c027d0 1340.723:01cc:trace:seh:raise_exception ebp=0031ef88 esp=0031ef70 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010206 1340.723:01cc:trace:seh:call_stack_handlers calling handler at 0x45d200 code=c0000005 flags=0 1340.723:01cc:trace:seh:call_stack_handlers handler at 0x45d200 returned 1 1340.723:01cc:trace:seh:call_stack_handlers calling handler at 0x7b45aad0 code=c0000005 flags=0 Backtrace: (No symbol) [0x7BC726EC] (No symbol) [0x7BC7286B] (No symbol) [0x7BC734F1] (No symbol) [0x7BC95E1D] (No symbol) [0x7BC963C3] ... --- snip --- There is a crash in 'kernel32.dll' module. The app restarts the process and fails again in same place. Could yopu attach 'WINEDEBUG=+seh,+relay,+process' log. It will be large hence filter for traces only from the crashing child process until/including the first exception like above. Use the child process main thread id to filter only those lines. With the help of 'process' debug channel you'll find it in a line like this: --- snip --- 1340.319:015c:trace:process:CreateProcessInternalW started process pid 01c8 tid 01cc --- snip --- 01cc = child process main thread id Create filtered log from full log: --- snip --- $ grep 01cc: log.txt > 01cc.txt --- snip --- --- --- quote --- It is normal that WINEDEBUG=+heap always crash? --- quote --- No, that's actually another bug (regression). I've created bug 49262 to track this. Regards -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.