https://bugs.winehq.org/show_bug.cgi?id=47320
--- Comment #11 from minion minion.procyk@gmail.com --- no stack overflow but still the same problem, application fails to map gdi32.dll. Tried both wine/wine staging.
65207.895:0120:0124:trace:file:find_drive_rootA "/media/big_drive/media/Games/battlenet/drive_c/windows/system32/gdi32.dll" -> drive C:, root="/media/big_drive/media/Games/battlenet/drive_c", name="/windows/system32/gdi32.dll" 65207.896:0120:0124:trace:heap:RtlFreeHeap (0x10000,30000062,0x3b5b0): returning TRUE 65207.896:0120:0124:trace:heap:RtlAllocateHeap (0x10000,30000062,00000044): returning 0x363a0 65207.896:0120:0124:trace:heap:RtlFreeHeap (0x10000,30000062,0x363a0): returning TRUE 65207.896:0120:0124:trace:heap:RtlFreeHeap (0x10000,30000062,0x11dbae0): returning TRUE 65207.896:0120:0124:Ret ntdll.NtQueryInformationFile() retval=00000000 ret=7b01ea13 65207.896:0120:0124:Ret KERNEL32.GetFileInformationByHandleEx() retval=00000001 ret=140029da5 65207.896:0120:0124:Call ntdll.NtCreateSection(0021dae0,000f001f,00000000,0021daf0,00000020,01000000,000000a8) ret=14002ace2 0124: create_mapping( access=000f001f, flags=01000000, file_access=00000001, size=00000000, file_handle=00a8, objattr={} ) 0124: create_mapping() = 0 { handle=00ac } 65207.896:0120:0124:Ret ntdll.NtCreateSection() retval=00000000 ret=14002ace2 65207.896:0120:0124:Call ntdll.NtMapViewOfSection(000000ac,ffffffffffffffff,0021da90,00000000,00000000,00000000,0021dae8,00000002,00000000,00000020) ret=14002af04 65207.896:0120:0124:trace:virtual:NtMapViewOfSection handle=0xac process=0xffffffffffffffff addr=(nil) off=000000000 size=0 access=20 0124: get_mapping_info( handle=00ac, access=0000000c ) 0124: get_mapping_info() = 0 { size=00007000, flags=01800000, shared_file=0000, image={base=10000000,entry_point=10001000,map_size=00007000,stack_size=00100000,stack_commit=00001000,zerobits=00000000,subsystem=00000000,subsystem_low=0000,subsystem_high=0004,gp=00000000,image_charact=2022,dll_charact=0100,machine=8664,contains_code=1,image_flags=80,loader_flags=00000000,header_size=00000200,file_size=000045e0,checksum=00000000,cpu=x86_64} } 0124: get_handle_fd( handle=00ac ) 0124: *fd* 00ac -> 162 0124: get_handle_fd() = 0 { type=1, cacheable=1, access=000f001f, options=00000020 } 65207.896:0120:0124:trace:module:map_image mapped PE file at 0x10000000-0x10007000 65207.896:0120:0124:trace:module:map_image mapping section .text at 0x10001000 off 200 size 5 virt 1000 flags 60000020 65207.896:0120:0124:trace:module:map_image clearing 0x10001200 - 0x10002000 65207.896:0120:0124:trace:module:map_image mapping section .reloc at 0x10002000 off 400 size 8 virt 1000 flags 42000040 65207.896:0120:0124:trace:module:map_image clearing 0x10002200 - 0x10003000 65207.896:0120:0124:trace:module:map_image mapping section .rsrc at 0x10003000 off 600 size 3fe0 virt 4000 flags 40000040 0124: map_view( mapping=00ac, access=0000000c, base=10000000, size=00007000, start=00000000 ) 0124: map_view() = 0 65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView View: 0x10000000 - 0x10006fff (image) 65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10000000 - 0x10000fff c-r-- 65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10001000 - 0x10001fff c-r-x 65207.896:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10002000 - 0x10006fff c-r-- 65207.896:0120:0124:Ret ntdll.NtMapViewOfSection() retval=00000000 ret=14002af04 65207.896:0120:0124:Call KERNEL32.CloseHandle(000000ac) ret=14002b1ae 65207.896:0120:0124:Call ntdll.NtClose(000000ac) ret=7b04a2e4 0124: close_handle( handle=00ac ) 0124: close_handle() = 0 65207.896:0120:0124:Ret ntdll.NtClose() retval=00000000 ret=7b04a2e4 65207.896:0120:0124:Ret KERNEL32.CloseHandle() retval=00000001 ret=14002b1ae 65207.896:0120:0124:Call KERNEL32.CloseHandle(000000a8) ret=14002b454 65207.896:0120:0124:Call ntdll.NtClose(000000a8) ret=7b04a2e4 0124: close_handle( handle=00a8 ) 0124: close_handle() = 0 65207.896:0120:0124:Ret ntdll.NtClose() retval=00000000 ret=7b04a2e4 65207.896:0120:0124:Ret KERNEL32.CloseHandle() retval=00000001 ret=14002b454 65207.897:0120:0124:Call KERNEL32.VirtualProtect(10000000,00000000,00000004,0021dad0) ret=14002c8b2 65207.897:0120:0124:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,0021d978,0021d980,00000004,0021dad0) ret=7b038536 65207.897:0120:0124:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0x10000000 00000000 00000004 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView View: 0x10000000 - 0x10006fff (image) 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10000000 - 0x10000fff c-r-- 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10001000 - 0x10001fff c-r-x 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10002000 - 0x10006fff c-r-- 65207.897:0120:0124:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b038536 65207.897:0120:0124:Ret KERNEL32.VirtualProtect() retval=00000001 ret=14002c8b2 65207.897:0120:0124:Call KERNEL32.VirtualProtect(10000000,00000000,00000002,0021dad0) ret=14002cf4c 65207.897:0120:0124:Call ntdll.NtProtectVirtualMemory(ffffffffffffffff,0021d978,0021d980,00000002,0021dad0) ret=7b038536 65207.897:0120:0124:trace:virtual:NtProtectVirtualMemory 0xffffffffffffffff 0x10000000 00000000 00000002 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView View: 0x10000000 - 0x10006fff (image) 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10000000 - 0x10000fff c-r-- 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10001000 - 0x10001fff c-r-x 65207.897:0120:0124:trace:virtual:VIRTUAL_DumpView 0x10002000 - 0x10006fff c-r-- 65207.897:0120:0124:Ret ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b038536 65207.897:0120:0124:Ret KERNEL32.VirtualProtect() retval=00000001 ret=14002cf4c 65207.897:0120:0124:trace:seh:raise_exception code=c0000005 flags=0 addr=0x15324d8e8 ip=15324d8e8 tid=0124 65207.897:0120:0124:trace:seh:raise_exception info[0]=0000000000000000 65207.897:0120:0124:trace:seh:raise_exception info[1]=0000000010405a4d 65207.897:0120:0124:trace:seh:raise_exception rax=000000000021db58 rbx=0000000000000000 rcx=00000000b5d11452 rdx=0000000000000064 65207.897:0120:0124:trace:seh:raise_exception rsi=0000000010000000 rdi=0000000000000000 rbp=000000000021db20 rsp=000000000021da20 65207.897:0120:0124:trace:seh:raise_exception r8=0000000000000065 r9=0000000010000000 r10=000000000021db58 r11=00000000101e7ef5 65207.897:0120:0124:trace:seh:raise_exception r12=0000000010000000 r13=0000000010000000 r14=0000000010000060 r15=0000000000000060
wine-5.8-173-g9e26bc8116