https://bugs.winehq.org/show_bug.cgi?id=49253
--- Comment #4 from Anastasius Focht focht@gmx.net --- Hello RafaĆ,
from your trace log:
--- snip --- ... 1340.303:015c:trace:process:CreateProcessInternalW app (null) cmdline L""Z:\home\rafal\Pobrane\2048Portable\App\2048\2048-portable-nw.exe" --type=renderer --no-sandbox --field-trial-handle=988 --primordial-pipe-token=27D32A78DC24013F9175C3EFB4F44EDC --lang=pl --user-data-dir="C:\users\rafal\Local Settings\Application Data\2048 Portable\User Da"... 1340.303:015c:trace:process:find_exe_file looking for L"Z:\home\rafal\Pobrane\2048Portable\App\2048\2048-portable-nw.exe" in L"Z:\home\rafal\Pobrane\2048Portable\App\2048;.;C:\windows\system32;C:\windows\system;C:\windows;C:\windows\system32;C:\windows;C:\windows\system32\wbem;C:\windows\system32\WindowsPowershell\v1.0"
1340.303:015c:fixme:process:CreateProcessInternalW Unsupported attribute 0x20002. ... 0.000:01cc:trace:loaddll:load_native_dll Loaded L"C:\windows\system32\kernelbase.dll" at 0x7b000000: PE builtin 0.000:01cc:trace:loaddll:load_so_dll Loaded L"C:\windows\system32\kernel32.dll" at 0x7b420000: builtin 0.000:01cc:trace:loaddll:load_native_dll Loaded L"Z:\home\rafal\Pobrane\2048Portable\App\2048\2048-portable-nw.exe" at 0x400000: native ... 1340.319:015c:trace:process:RtlCreateUserProcess L"\??\Z:\home\rafal\Pobrane\2048Portable\App\2048\2048-portable-nw.exe" pid 01c8 tid 01cc handles 0x3f4/0x3f8 1340.319:015c:trace:process:CreateProcessInternalW started process pid 01c8 tid 01cc ... 1340.723:01cc:trace:process:GetEnvironmentVariableW (L"WINEDLLDIR0" 00C026B8 30) 1340.723:01cc:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc726ec ip=7bc726ec tid=01cc 1340.723:01cc:trace:seh:raise_exception info[0]=00000000 1340.723:01cc:trace:seh:raise_exception info[1]=00db2710 1340.723:01cc:trace:seh:raise_exception eax=00ba0000 ebx=00db2710 ecx=001aff50 edx=00c027c0 esi=00dc0000 edi=00c027d0 1340.723:01cc:trace:seh:raise_exception ebp=0031ef88 esp=0031ef70 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010206 1340.723:01cc:trace:seh:call_stack_handlers calling handler at 0x45d200 code=c0000005 flags=0 1340.723:01cc:trace:seh:call_stack_handlers handler at 0x45d200 returned 1 1340.723:01cc:trace:seh:call_stack_handlers calling handler at 0x7b45aad0 code=c0000005 flags=0 Backtrace: (No symbol) [0x7BC726EC] (No symbol) [0x7BC7286B] (No symbol) [0x7BC734F1] (No symbol) [0x7BC95E1D] (No symbol) [0x7BC963C3] ... --- snip ---
There is a crash in 'kernel32.dll' module. The app restarts the process and fails again in same place.
Could yopu attach 'WINEDEBUG=+seh,+relay,+process' log. It will be large hence filter for traces only from the crashing child process until/including the first exception like above. Use the child process main thread id to filter only those lines. With the help of 'process' debug channel you'll find it in a line like this:
--- snip --- 1340.319:015c:trace:process:CreateProcessInternalW started process pid 01c8 tid 01cc --- snip ---
01cc = child process main thread id
Create filtered log from full log:
--- snip --- $ grep 01cc: log.txt > 01cc.txt --- snip ---
---
--- quote --- It is normal that WINEDEBUG=+heap always crash? --- quote ---
No, that's actually another bug (regression). I've created bug 49262 to track this.
Regards