Skip to content

Instantly share code, notes, and snippets.

@ArmadilloMan
Created May 31, 2021 23:30
Show Gist options
  • Save ArmadilloMan/14dc5eb157cc25c7916349e9668787a4 to your computer and use it in GitHub Desktop.
Save ArmadilloMan/14dc5eb157cc25c7916349e9668787a4 to your computer and use it in GitHub Desktop.
AoW Planetfall Proton Log
======================
Proton: 1621748480 6.9-GE-1-2-g6810f18
SteamGameId: 718850
Command: ['/home/james/.steam/debian-installation/steamapps/common/Age of Wonders Planetfall/dowser.exe']
Options: {'forcelgadd'}
SteamLinuxRuntime: v0.20210317.0-0-ge09b2e6
pressure-vessel: 0.20210415.0+srt1 scout 0.20210415.0
soldier: 0.20210415.0 soldier 0.20210415.0
======================
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
futex2: up and running.
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211906.930:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
1211906.931:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
1211906.931:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211906.931:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211906.933:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211906.933:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211906.933:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211906.933:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007F6F34D20000: builtin
1211906.933:0028:002c:fixme:winediag:LdrInitializeThunk wine-staging 6.9 is a testing version containing experimental patches.
1211906.933:0028:002c:fixme:winediag:LdrInitializeThunk Please mention your exact version when filing bug reports on winehq.org.
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211906.955:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f1cb8b8c67d.
1211906.955:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
1211906.955:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
1211906.956:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211906.956:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211906.957:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211906.957:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211906.957:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211906.957:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211906.958:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
1211906.958:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
1211906.958:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000388E20000: builtin
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211906.982:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fa3d18c267d.
1211906.982:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
1211906.982:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
1211906.983:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211906.983:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211906.984:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211906.984:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211906.984:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211906.985:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
1211906.985:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
1211906.991:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211906.994:003c:0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32k.sys" at 0000000278BD0000: builtin
1211906.995:003c:0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\dxgkrnl.sys" at 000000033C0E0000: builtin
1211906.995:003c:0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\dxgmms1.sys" at 00000002A56F0000: builtin
1211906.998:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FA3CE6D0000: builtin
1211906.999:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
1211906.999:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
1211907.003:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FA3CE320000: builtin
1211907.003:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 00000001DC4B0000: builtin
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211907.017:005c:0060:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7ff6f30b467d.
1211907.017:005c:0060:trace:seh:install_bpf Seccomp filters already installed.
1211907.017:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
1211907.017:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211907.018:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211907.019:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211907.019:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211907.019:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211907.019:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211907.020:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
1211907.020:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
1211907.020:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
1211907.020:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
1211907.427:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
1211907.427:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
1211907.427:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211907.441:0074:0078:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fc5715d467d.
1211907.441:0074:0078:trace:seh:install_bpf Seccomp filters already installed.
1211907.442:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
1211907.442:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211907.443:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211907.444:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211907.444:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211907.444:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211907.444:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
1211907.444:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
1211907.451:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211907.454:0074:0084:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32k.sys" at 0000000278BD0000: builtin
1211907.454:0074:0084:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\dxgkrnl.sys" at 000000033C0E0000: builtin
1211907.454:0074:0084:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\dxgmms1.sys" at 00000002A56F0000: builtin
1211907.457:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007FC56E3E0000: builtin
1211907.458:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
1211907.458:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
1211907.463:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
1211907.463:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
1211907.463:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\hidclass.sys" at 000000031DF10000: builtin
1211907.463:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000003BA2A0000: builtin
1211907.485:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
1211907.485:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
1211907.485:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
1211907.518:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007FC56C6D0000: builtin
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211907.535:00a4:00a8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fc84479167d.
1211907.535:00a4:00a8:trace:seh:install_bpf Seccomp filters already installed.
1211907.535:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
1211907.536:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211907.536:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211907.537:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211907.537:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211907.537:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211907.543:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 00000002EBA70000: builtin
1211907.543:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211907.547:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
1211907.548:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211907.549:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
1211907.549:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
1211907.549:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
1211907.549:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
1211907.549:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
1211907.549:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
1211907.549:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
1211907.550:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
1211907.550:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 00000002BB750000: builtin
1211907.550:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\aclui.dll" at 0000000297900000: builtin
1211907.550:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F6F340B0000: builtin
1211907.575:00b8:00bc:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f61b529967d.
1211907.575:00b8:00bc:trace:seh:install_bpf Seccomp filters already installed.
1211907.575:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
1211907.576:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211907.576:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211907.577:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211907.577:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211907.577:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211907.578:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
1211907.578:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211907.579:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
1211907.579:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
1211907.579:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
1211907.606:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
1211907.606:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
1211907.606:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
1211907.609:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F61B3730000: builtin
1211907.672:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
1211907.672:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
1211907.673:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 00000002BB750000: builtin
1211907.673:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\aclui.dll" at 0000000297900000: builtin
1211907.673:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F61AC570000: builtin
1211907.677:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
1211907.677:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
1211907.677:00b8:00bc:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01238E ip=000000007B01238E tid=00bc
1211907.677:00b8:00bc:warn:seh:dispatch_exception unknown exception (code=6ba) raised
1211907.677:00b8:00bc:trace:seh:dispatch_exception rax=000000007b012340 rbx=000000000021e9d8 rcx=000000000021e6f0 rdx=0000000000000000
1211907.677:00b8:00bc:trace:seh:dispatch_exception rsi=000000000000006c rdi=00000000002cac00 rbp=0000000140010028 rsp=000000000021e6d0
1211907.677:00b8:00bc:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000002201a8 r11=000000000021e6c8
1211907.677:00b8:00bc:trace:seh:dispatch_exception r12=000000000021e9d8 r13=00000000002c9740 r14=00000000002caa70 r15=0000000000000005
1211907.677:00b8:00bc:trace:seh:call_vectored_handlers calling handler at 000000007B00C680 code=6ba flags=0
1211907.677:00b8:00bc:trace:seh:call_vectored_handlers handler at 000000007B00C680 returned 0
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01238E rsp 000000000021E6D0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 12340-123c7
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012340-000000007B0123C7
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rdi
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B227F2 rsp 000000000021E7B0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 427e0-42827
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B227E0-0000000231B22827
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000021E7E0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 96b0-9737
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x1: pushq %rdi
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 0000000327045370 rsp 000000000021E840
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 25270-254d1
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A6DC flags 0 prolog 0x10 bytes function 0000000327045270-00000003270454D1
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x7: pushq %rdi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r12
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r13
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r14
1211907.677:00b8:00bc:trace:seh:call_stack_handlers found wine frame 000000000021E8B0 rsp 000000000021EBB0 handler 00000003270442B0
1211907.677:00b8:00bc:trace:seh:call_teb_handler calling TEB handler 00000003270442B0 (rec=000000000021E6F0, frame=000000000021E8B0 context=000000000021DC10, dispatch=000000000021DAE0)
1211907.677:00b8:00bc:trace:seh:call_teb_handler handler at 00000003270442B0 returned 1
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 0000000327039FC7 rsp 000000000021EBB0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 19ee0-19fed
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000327059F1C flags 0 prolog 0xa bytes function 0000000327039EE0-0000000327039FED
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r12
1211907.677:00b8:00bc:trace:seh:call_stack_handlers found wine frame 000000000021EBF0 rsp 000000000021ED40 handler 0000000327046730
1211907.677:00b8:00bc:trace:seh:call_teb_handler calling TEB handler 0000000327046730 (rec=000000000021E6F0, frame=000000000021EBF0 context=000000000021DC10, dispatch=000000000021DAE0)
1211907.677:00b8:00bc:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000021EBF0 target_ip=00000003270466CA rip=000000007bc53ae2
1211907.677:00b8:00bc:trace:seh:RtlUnwindEx rax=0000000067fe0000 rbx=000000000021e8b0 rcx=000000000021d480 rdx=00000003270466ca
1211907.677:00b8:00bc:trace:seh:RtlUnwindEx rsi=000000000021ebf0 rdi=000000000021e1f0 rbp=000000000021cf30 rsp=000000000021cdb0
1211907.677:00b8:00bc:trace:seh:RtlUnwindEx r8=000000000021e6f0 r9=0000000327046700 r10=000000000021d676 r11=0000000000000293
1211907.677:00b8:00bc:trace:seh:RtlUnwindEx r12=000000000021e6f0 r13=000000000021d480 r14=000000000021ebf0 r15=000000000021e6f0
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53AE2 rsp 000000000021CDB0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 53a90-5439e
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC7D644 flags 0 prolog 0x13 bytes function 000000007BC53A90-000000007BC5439E
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %r12
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r13
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r14
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r15
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC543BF rsp 000000000021D450
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 543a0-543c8
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC7D65C flags 0 prolog 0x7 bytes function 000000007BC543A0-000000007BC543C8
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 00000003270466CA rsp 000000000021D960
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 266b0-266cc
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A7B4 flags 0 prolog 0x8 bytes function 00000003270466B0-00000003270466CC
1211907.677:00b8:00bc:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x1: pushq %rbp
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 00000003270466F9 rsp 000000000021D990
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 266d0-266fa
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A7C0 flags 0 prolog 0x4 bytes function 00000003270466D0-00000003270466FA
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327046784 rsp 000000000021D9C0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 26730-26785
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A7D0 flags 0 prolog 0xa bytes function 0000000327046730-0000000327046785
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r12
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r13
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r14
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC52FD7 rsp 000000000021DA10
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 52cb0-53299
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC7D600 flags 0 prolog 0x13 bytes function 000000007BC52CB0-000000007BC53299
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x13: subq $0x6d8,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %r12
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r13
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r14
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r15
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC535A9 rsp 000000000021E130
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 532a0-537af
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC7D618 flags 0 prolog 0x10 bytes function 000000007BC532A0-000000007BC537AF
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %r12
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r13
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r14
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r15
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC511E4 rsp 000000000021E1D0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 5117c-511f1
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC7D578 flags 0 prolog 0x7 bytes function 000000007BC5117C-000000007BC511F1
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01238E rsp 000000000021E6D0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 12340-123c7
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012340-000000007B0123C7
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rdi
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B227F2 rsp 000000000021E7B0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 427e0-42827
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B227E0-0000000231B22827
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000021E7E0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 96b0-9737
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x1: pushq %rdi
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045370 rsp 000000000021E840
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 25270-254d1
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A6DC flags 0 prolog 0x10 bytes function 0000000327045270-00000003270454D1
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %rsi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x7: pushq %rdi
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r12
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r13
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r14
1211907.677:00b8:00bc:trace:seh:RtlUnwindEx found builtin frame 000000000021E8B0 handler 00000003270442B0
1211907.677:00b8:00bc:trace:seh:call_teb_unwind_handler calling TEB handler 00000003270442B0 (rec=000000000021E6F0, frame=000000000021E8B0 context=000000000021D480, dispatch=000000000021CE40)
1211907.677:00b8:00bc:trace:seh:call_teb_unwind_handler handler at 00000003270442B0 returned 1
1211907.677:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327039FC7 rsp 000000000021EBB0
1211907.677:00b8:00bc:trace:seh:dump_unwind_info **** func 19ee0-19fed
1211907.677:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000327059F1C flags 0 prolog 0xa bytes function 0000000327039EE0-0000000327039FED
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
1211907.677:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r12
1211907.677:00b8:00bc:trace:seh:RtlRestoreContext returning to 00000003270466CA stack 000000000021EBB0
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211907.690:00d4:00d8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f8c15a8467d.
1211907.690:00d4:00d8:trace:seh:install_bpf Seccomp filters already installed.
1211907.691:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
1211907.691:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211907.691:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211907.692:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211907.693:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211907.693:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
1211907.693:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211907.705:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F6F33D10000: builtin
1211907.713:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 000000024F470000: builtin
1211907.713:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 00000003A0440000: builtin
1211907.716:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\start.exe" at 00400000: builtin
1211907.716:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\kernelbase.dll" at 7B000000: builtin
1211907.716:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\kernel32.dll" at 7B600000: builtin
1211907.718:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\ucrtbase.dll" at 70B40000: builtin
1211907.718:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\sechost.dll" at 6BC00000: builtin
1211907.718:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\advapi32.dll" at 61740000: builtin
1211907.719:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\gdi32.dll" at 6C9C0000: builtin
1211907.720:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\rpcrt4.dll" at 62FC0000: builtin
1211907.721:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\version.dll" at 63480000: builtin
1211907.721:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\setupapi.dll" at 6BCC0000: builtin
1211907.721:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\user32.dll" at 6ED00000: builtin
1211907.721:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\combase.dll" at 68500000: builtin
1211907.721:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\ole32.dll" at 6A400000: builtin
1211907.721:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shcore.dll" at 63BC0000: builtin
1211907.721:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shlwapi.dll" at 64A40000: builtin
1211907.722:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\imm32.dll" at 71200000: builtin
1211907.722:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\comctl32.dll" at 6CC40000: builtin
1211907.722:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\aclui.dll" at 68E00000: builtin
1211907.722:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shell32.dll" at 7E020000: builtin
1211907.808:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\winex11.drv" at 7DCB0000: builtin
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
1211907.829:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\start.exe" at 00400000: builtin
1211907.829:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\kernelbase.dll" at 7B000000: builtin
1211907.829:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\kernel32.dll" at 7B600000: builtin
1211907.831:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\ucrtbase.dll" at 70B40000: builtin
1211907.831:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\sechost.dll" at 6BC00000: builtin
1211907.831:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\advapi32.dll" at 61740000: builtin
1211907.832:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\gdi32.dll" at 6C9C0000: builtin
1211907.833:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\rpcrt4.dll" at 62FC0000: builtin
1211907.834:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\version.dll" at 63480000: builtin
1211907.834:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\setupapi.dll" at 6BCC0000: builtin
1211907.834:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\user32.dll" at 6ED00000: builtin
1211907.834:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\combase.dll" at 68500000: builtin
1211907.834:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\ole32.dll" at 6A400000: builtin
1211907.834:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shcore.dll" at 63BC0000: builtin
1211907.834:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shlwapi.dll" at 64A40000: builtin
1211907.835:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\imm32.dll" at 71200000: builtin
1211907.835:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\comctl32.dll" at 6CC40000: builtin
1211907.835:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\aclui.dll" at 68E00000: builtin
1211907.835:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shell32.dll" at 7E020000: builtin
1211907.919:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\winex11.drv" at 7DB60000: builtin
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
1211907.941:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\steam.exe" at 7E7A0000: builtin
1211907.942:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\kernelbase.dll" at 7B000000: builtin
1211907.942:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\kernel32.dll" at 7B600000: builtin
1211907.943:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\ucrtbase.dll" at 70B40000: builtin
1211907.943:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\sechost.dll" at 6BC00000: builtin
1211907.943:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\advapi32.dll" at 61740000: builtin
1211907.944:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\gdi32.dll" at 6C9C0000: builtin
1211907.944:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\rpcrt4.dll" at 62FC0000: builtin
1211907.945:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\version.dll" at 63480000: builtin
1211907.945:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\setupapi.dll" at 6BCC0000: builtin
1211907.945:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\user32.dll" at 6ED00000: builtin
1211907.945:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\combase.dll" at 68500000: builtin
1211907.945:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\ole32.dll" at 6A400000: builtin
1211907.946:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shcore.dll" at 63BC0000: builtin
1211907.946:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shlwapi.dll" at 64A40000: builtin
1211907.947:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\imm32.dll" at 71200000: builtin
1211907.947:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\comctl32.dll" at 6CC40000: builtin
1211907.947:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\aclui.dll" at 68E00000: builtin
1211907.947:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\shell32.dll" at 7DD50000: builtin
1211908.032:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\syswow64\\winex11.drv" at 7D980000: builtin
Setting breakpad minidump AppID = 718850
Steam_SetMinidumpSteamID: Caching Steam ID: 76561197972277933 [API loaded no]
1211908.071:0104:0110:err:steam:initialize_vr_data Could not load libopenvr_api.so.
ERROR: ld.so: object '/home/james/.steam/debian-installation/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1211908.094:0114:0118:trace:seh:check_bpf_jit_enable enabled 0x31.
1211908.095:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\dowser.exe" at 0000000140000000: native
1211908.096:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
1211908.096:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
1211908.097:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000262250000: builtin
1211908.098:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
1211908.098:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000033EA00000: builtin
1211908.098:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 000000039B510000: builtin
1211908.099:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 000000030A2C0000: builtin
1211908.099:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 0000000350A30000: builtin
1211908.099:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 0000000000230000: native
1211908.099:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000355100000: builtin
1211908.099:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000360A80000: builtin
1211908.100:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-multibyte-l1-1-0.dll" at 00000002FE110000: builtin
1211908.100:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 000000028BA60000: builtin
1211908.100:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 0000000344840000: builtin
1211908.100:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000241850000: builtin
1211908.101:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 00000001CD860000: builtin
1211908.101:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0000000180000000: native
1211908.102:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
1211908.102:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ADVAPI32.dll" at 0000000330260000: builtin
1211908.103:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
1211908.104:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
1211908.105:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
1211908.105:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
1211908.105:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
1211908.105:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
1211908.105:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
1211908.106:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
1211908.106:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
1211908.106:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
1211908.106:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 00000002BB750000: builtin
1211908.107:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\aclui.dll" at 0000000297900000: builtin
1211908.107:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007F53248A0000: builtin
1211908.107:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\steam_api64.dll" at 000000013B400000: native
1211908.107:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 00000002739C0000: builtin
1211908.108:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00000002D4D40000: builtin
1211908.108:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\zip.dll" at 0000000000250000: native
1211908.109:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 00000001DD3F0000: builtin
1211908.111:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 00000001C8B40000: builtin
1211908.111:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000003B8F00000: builtin
1211908.112:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 00007F5324740000: builtin
1211908.112:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\pops_api.dll" at 0000000000280000: native
1211908.112:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\XINPUT1_3.dll" at 0000000253CC0000: builtin
1211908.113:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-conio-l1-1-0.dll" at 00000003738E0000: builtin
1211908.113:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\LIBEAY32.dll" at 00000000007E0000: native
1211908.114:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\SSLEAY32.dll" at 00000000009F0000: native
1211908.114:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IPHLPAPI.DLL" at 00007F5324710000: builtin
1211908.115:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\D3DCOMPILER_47.dll" at 00000001C8890000: builtin
1211908.115:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\vulkan-1.dll" at 00000003785E0000: builtin
1211908.116:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winevulkan.dll" at 00000003B6DC0000: builtin
1211908.116:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
1211908.116:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 00000002EDF00000: native
1211908.116:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3d11.dll" at 0000000359050000: native
1211908.117:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\fmod64.dll" at 0000000000A50000: native
1211908.118:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\fmodstudio64.dll" at 0000000000C50000: native
1211908.119:0114:0118:trace:loaddll:build_module Loaded L"Z:\\home\\james\\.steam\\debian-installation\\steamapps\\common\\Age of Wonders Planetfall\\iggy_w64.dll" at 0000000000DC0000: native
1211908.120:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winspool.drv" at 00007F53246A0000: builtin
1211908.120:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\COMDLG32.dll" at 000000031F800000: builtin
1211908.128:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 000000030C980000: builtin
1211908.128:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 00000001D97A0000: builtin
1211908.178:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F5324300000: builtin
1211908.185:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 0000000351680000: builtin
1211908.229:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\lsteamclient.dll" at 00007F5322FB0000: builtin
1211908.229:0114:0118:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient64.dll" at 0000000138000000: native
1211908.250:0114:0118:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\gameoverlayrenderer64.dll" at 0000000001A90000: native
1211908.251:0114:0118:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0118
1211908.251:0114:0118:trace:seh:dispatch_exception info[0]=0000000000001000
1211908.251:0114:0118:trace:seh:dispatch_exception info[1]=000000000198fe70
1211908.251:0114:0118:trace:seh:dispatch_exception info[2]=0000000000000118
1211908.251:0114:0118:trace:seh:dispatch_exception info[3]=0000000000000028
1211908.251:0114:0118:trace:seh:dispatch_exception info[4]=0000000000114c70
1211908.251:0114:0118:trace:seh:dispatch_exception info[5]=00000001401fb6bb
1211908.251:0114:0118:warn:seh:dispatch_exception Thread 0118 renamed to "Application Thread"
1211908.251:0114:0118:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211908.251:0114:0118:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211908.253:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 000000029CFC0000: builtin
1211908.253:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\NETAPI32.DLL" at 00000003673D0000: builtin
1211908.253:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\NETAPI32.DLL" : builtin
1211908.254:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\dnsapi.dll" : builtin
1211908.254:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 00000002DE970000: builtin
1211908.254:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
1211908.261:0114:0118:fixme:toolhelp:CreateToolhelp32Snapshot Unimplemented: heap list snapshot
1211908.262:0114:0118:fixme:toolhelp:Heap32ListFirst : stub
1211908.267:0114:0118:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
1211908.332:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-sysinfo-l1-2-1.dll" at 000000028EBE0000: builtin
1211908.333:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\secur32.dll" at 0000000201CF0000: builtin
1211908.333:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Kerberos.dll" at 0000000274A50000: builtin
1211908.333:0114:0118:err:kerberos:kerberos_LsaApInitializePackage no Kerberos support, expect problems
1211908.335:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 000000029CFC0000: builtin
1211908.335:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\netapi32.dll" at 00000003673D0000: builtin
1211908.335:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSV1_0.dll" at 000000039C380000: builtin
1211908.335:0114:0118:err:winediag:check_version ntlm_auth was not found or is outdated. Make sure that ntlm_auth >= 3.0.25 is in your path. Usually, you can find it in the winbind package of your distribution.
1211908.335:0114:0118:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems
1211908.335:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\MSV1_0.dll" : builtin
1211908.338:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\netapi32.dll" : builtin
1211908.338:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\dnsapi.dll" : builtin
1211908.339:0114:0124:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 0000000205950000: builtin
1211908.339:0114:0124:fixme:kernelbase:AppPolicyGetThreadInitializationType FFFFFFFFFFFFFFFA, 0000000001F1FE10
info: Game: dowser.exe
info: DXVK: v1.8.1-async
info: Built-in extension providers:
info: Win32 WSI
info: OpenVR
info: OpenXR
1211909.189:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineopenxr.dll" at 00007F5320D20000: builtin
warn: OpenXR: Unable to get required Vulkan instance extensions size
info: Enabled instance extensions:
info: VK_KHR_get_surface_capabilities2
info: VK_KHR_surface
info: VK_KHR_win32_surface
warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.0, 256 bits)
warn: OpenXR: Unable to get required Vulkan Device extensions size
1211909.217:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\wineopenxr.dll" : builtin
info: GeForce RTX 2080 Ti:
info: Driver: 460.73.1
info: Vulkan: 1.2.155
info: Memory Heap[0]:
info: Size: 11264 MiB
info: Flags: 0x1
info: Memory Type[7]: Property Flags = 0x1
info: Memory Heap[1]:
info: Size: 24024 MiB
info: Flags: 0x0
info: Memory Type[0]: Property Flags = 0x0
info: Memory Type[1]: Property Flags = 0x0
info: Memory Type[2]: Property Flags = 0x0
info: Memory Type[3]: Property Flags = 0x0
info: Memory Type[4]: Property Flags = 0x0
info: Memory Type[5]: Property Flags = 0x0
info: Memory Type[6]: Property Flags = 0x0
info: Memory Type[8]: Property Flags = 0x6
info: Memory Type[9]: Property Flags = 0xe
info: Memory Heap[2]:
info: Size: 246 MiB
info: Flags: 0x1
info: Memory Type[10]: Property Flags = 0x7
info: DXGI: NvAPI workaround enabled, reporting AMD GPU
1211909.225:0114:012c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=012c
1211909.225:0114:012c:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.225:0114:012c:trace:seh:dispatch_exception info[1]=00000000019cf0a0
1211909.225:0114:012c:trace:seh:dispatch_exception info[2]=000000000000012c
1211909.225:0114:012c:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.225:0114:012c:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.225:0114:012c:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.225:0114:012c:warn:seh:dispatch_exception Thread 012c renamed to "TaskThread(0)"
1211909.225:0114:012c:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.225:0114:012c:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.225:0114:0130:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0130
1211909.225:0114:0130:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.225:0114:0130:trace:seh:dispatch_exception info[1]=00000000019cf120
1211909.225:0114:0130:trace:seh:dispatch_exception info[2]=0000000000000130
1211909.225:0114:0130:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.225:0114:0130:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.225:0114:0130:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.225:0114:0130:warn:seh:dispatch_exception Thread 0130 renamed to "TaskThread(1)"
1211909.225:0114:0130:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.225:0114:0130:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.225:0114:0134:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0134
1211909.225:0114:0134:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.225:0114:0134:trace:seh:dispatch_exception info[1]=00000000019d1f40
1211909.225:0114:0134:trace:seh:dispatch_exception info[2]=0000000000000134
1211909.225:0114:0134:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.225:0114:0134:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.225:0114:0134:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.225:0114:0134:warn:seh:dispatch_exception Thread 0134 renamed to "TaskThread(2)"
1211909.225:0114:0134:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.225:0114:0134:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.236:0114:0138:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0138
1211909.236:0114:0138:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.236:0114:0138:trace:seh:dispatch_exception info[1]=00000000019d2010
1211909.236:0114:0138:trace:seh:dispatch_exception info[2]=0000000000000138
1211909.236:0114:0138:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.236:0114:0138:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.236:0114:0138:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.236:0114:0138:warn:seh:dispatch_exception Thread 0138 renamed to "TaskThread(3)"
1211909.236:0114:0138:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.236:0114:0138:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.236:0114:013c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=013c
1211909.236:0114:013c:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.236:0114:013c:trace:seh:dispatch_exception info[1]=00000000019d0a90
1211909.236:0114:013c:trace:seh:dispatch_exception info[2]=000000000000013c
1211909.236:0114:013c:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.236:0114:013c:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.236:0114:013c:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.236:0114:013c:warn:seh:dispatch_exception Thread 013c renamed to "TaskThread(4)"
1211909.236:0114:013c:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.236:0114:013c:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.236:0114:0140:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0140
1211909.236:0114:0140:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.236:0114:0140:trace:seh:dispatch_exception info[1]=00000000019cf060
1211909.236:0114:0140:trace:seh:dispatch_exception info[2]=0000000000000140
1211909.236:0114:0140:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.236:0114:0140:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.236:0114:0140:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.236:0114:0140:warn:seh:dispatch_exception Thread 0140 renamed to "TaskThread(5)"
1211909.236:0114:0140:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.236:0114:0140:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.236:0114:0144:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0144
1211909.236:0114:0144:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.236:0114:0144:trace:seh:dispatch_exception info[1]=00000000019d1640
1211909.236:0114:0144:trace:seh:dispatch_exception info[2]=0000000000000144
1211909.236:0114:0144:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.236:0114:0144:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.236:0114:0144:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.236:0114:0144:warn:seh:dispatch_exception Thread 0144 renamed to "TaskThread(6)"
1211909.236:0114:0144:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.236:0114:0144:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.236:0114:0148:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0148
1211909.236:0114:0148:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.236:0114:0148:trace:seh:dispatch_exception info[1]=00000000019d1710
1211909.236:0114:0148:trace:seh:dispatch_exception info[2]=0000000000000148
1211909.236:0114:0148:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.236:0114:0148:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.236:0114:0148:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.236:0114:0148:warn:seh:dispatch_exception Thread 0148 renamed to "TaskThread(7)"
1211909.236:0114:0148:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.236:0114:0148:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.237:0114:014c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=014c
1211909.237:0114:014c:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.237:0114:014c:trace:seh:dispatch_exception info[1]=0000000001a1dc90
1211909.237:0114:014c:trace:seh:dispatch_exception info[2]=000000000000014c
1211909.237:0114:014c:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.237:0114:014c:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.237:0114:014c:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.237:0114:014c:warn:seh:dispatch_exception Thread 014c renamed to "TaskThread(8)"
1211909.237:0114:014c:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.237:0114:014c:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.237:0114:0150:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0150
1211909.237:0114:0150:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.237:0114:0150:trace:seh:dispatch_exception info[1]=0000000001a1dd60
1211909.237:0114:0150:trace:seh:dispatch_exception info[2]=0000000000000150
1211909.237:0114:0150:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.237:0114:0150:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.237:0114:0150:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.237:0114:0150:warn:seh:dispatch_exception Thread 0150 renamed to "TaskThread(9)"
1211909.237:0114:0150:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.237:0114:0150:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.237:0114:0154:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0154
1211909.237:0114:0154:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.237:0114:0154:trace:seh:dispatch_exception info[1]=0000000001a1de30
1211909.237:0114:0154:trace:seh:dispatch_exception info[2]=0000000000000154
1211909.237:0114:0154:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.237:0114:0154:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.237:0114:0154:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.237:0114:0154:warn:seh:dispatch_exception Thread 0154 renamed to "TaskThread(10)"
1211909.237:0114:0154:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.237:0114:0154:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.237:0114:0158:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0158
1211909.237:0114:0158:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.237:0114:0158:trace:seh:dispatch_exception info[1]=0000000001a1df00
1211909.237:0114:0158:trace:seh:dispatch_exception info[2]=0000000000000158
1211909.237:0114:0158:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.237:0114:0158:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.237:0114:0158:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.237:0114:0158:warn:seh:dispatch_exception Thread 0158 renamed to "TaskThread(11)"
1211909.237:0114:0158:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.237:0114:0158:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.237:0114:015c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=015c
1211909.237:0114:015c:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.237:0114:015c:trace:seh:dispatch_exception info[1]=0000000001a1dfd0
1211909.237:0114:015c:trace:seh:dispatch_exception info[2]=000000000000015c
1211909.237:0114:015c:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.237:0114:015c:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.237:0114:015c:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.237:0114:015c:warn:seh:dispatch_exception Thread 015c renamed to "TaskThread(12)"
1211909.237:0114:015c:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.237:0114:015c:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.237:0114:0160:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0160
1211909.237:0114:0160:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.237:0114:0160:trace:seh:dispatch_exception info[1]=00000000019d0ad0
1211909.237:0114:0160:trace:seh:dispatch_exception info[2]=0000000000000160
1211909.237:0114:0160:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.237:0114:0160:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.237:0114:0160:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.237:0114:0160:warn:seh:dispatch_exception Thread 0160 renamed to "TaskThread(13)"
1211909.237:0114:0160:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.237:0114:0160:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.238:0114:0164:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0164
1211909.238:0114:0164:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.238:0114:0164:trace:seh:dispatch_exception info[1]=0000000001a1e230
1211909.238:0114:0164:trace:seh:dispatch_exception info[2]=0000000000000164
1211909.238:0114:0164:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.238:0114:0164:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.238:0114:0164:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.238:0114:0164:warn:seh:dispatch_exception Thread 0164 renamed to "TaskThread(14)"
1211909.238:0114:0164:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.238:0114:0164:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.238:0114:0168:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0168
1211909.238:0114:0168:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.238:0114:0168:trace:seh:dispatch_exception info[1]=0000000001a1e300
1211909.238:0114:0168:trace:seh:dispatch_exception info[2]=0000000000000168
1211909.238:0114:0168:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.238:0114:0168:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.238:0114:0168:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.238:0114:0168:warn:seh:dispatch_exception Thread 0168 renamed to "TaskThread(15)"
1211909.238:0114:0168:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.238:0114:0168:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.238:0114:016c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=016c
1211909.238:0114:016c:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.238:0114:016c:trace:seh:dispatch_exception info[1]=0000000001a1e3d0
1211909.238:0114:016c:trace:seh:dispatch_exception info[2]=000000000000016c
1211909.238:0114:016c:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.238:0114:016c:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.238:0114:016c:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.238:0114:016c:warn:seh:dispatch_exception Thread 016c renamed to "TaskThread(16)"
1211909.238:0114:016c:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.238:0114:016c:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.238:0114:0170:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0170
1211909.238:0114:0170:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.238:0114:0170:trace:seh:dispatch_exception info[1]=0000000001a1e4a0
1211909.238:0114:0170:trace:seh:dispatch_exception info[2]=0000000000000170
1211909.238:0114:0170:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.238:0114:0170:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.238:0114:0170:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.238:0114:0174:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0174
1211909.238:0114:0170:warn:seh:dispatch_exception Thread 0170 renamed to "TaskThread(17)"
1211909.238:0114:0174:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.238:0114:0170:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.238:0114:0174:trace:seh:dispatch_exception info[1]=0000000001a1e570
1211909.238:0114:0170:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.238:0114:0174:trace:seh:dispatch_exception info[2]=0000000000000174
1211909.238:0114:0174:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.238:0114:0174:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.238:0114:0174:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.238:0114:0174:warn:seh:dispatch_exception Thread 0174 renamed to "TaskThread(18)"
1211909.238:0114:0174:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.238:0114:0174:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.256:0114:0178:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0178
1211909.256:0114:0178:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.256:0114:0178:trace:seh:dispatch_exception info[1]=0000000001a1e640
1211909.256:0114:0178:trace:seh:dispatch_exception info[2]=0000000000000178
1211909.256:0114:0178:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.256:0114:0178:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.256:0114:0178:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.256:0114:0178:warn:seh:dispatch_exception Thread 0178 renamed to "TaskThread(19)"
1211909.256:0114:0178:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.256:0114:0178:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.256:0114:017c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=017c
1211909.256:0114:017c:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.256:0114:017c:trace:seh:dispatch_exception info[1]=0000000001a1e710
1211909.256:0114:017c:trace:seh:dispatch_exception info[2]=000000000000017c
1211909.256:0114:017c:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.256:0114:017c:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.256:0114:017c:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.256:0114:017c:warn:seh:dispatch_exception Thread 017c renamed to "TaskThread(20)"
1211909.256:0114:017c:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.256:0114:017c:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.256:0114:0180:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0180
1211909.256:0114:0180:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.256:0114:0180:trace:seh:dispatch_exception info[1]=0000000001a1e7e0
1211909.256:0114:0180:trace:seh:dispatch_exception info[2]=0000000000000180
1211909.256:0114:0180:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.256:0114:0180:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.256:0114:0180:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.256:0114:0180:warn:seh:dispatch_exception Thread 0180 renamed to "TaskThread(21)"
1211909.256:0114:0180:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.256:0114:0180:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.256:0114:0184:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0184
1211909.256:0114:0184:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.256:0114:0184:trace:seh:dispatch_exception info[1]=0000000001a1e8b0
1211909.256:0114:0184:trace:seh:dispatch_exception info[2]=0000000000000184
1211909.256:0114:0184:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.256:0114:0184:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.256:0114:0184:trace:seh:dispatch_exception info[5]=0000000140330054
1211909.256:0114:0184:warn:seh:dispatch_exception Thread 0184 renamed to "TaskThread(22)"
1211909.256:0114:0184:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.256:0114:0184:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.256:0114:0188:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=0188
1211909.256:0114:0188:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.256:0114:0188:trace:seh:dispatch_exception info[1]=0000000141cb75c0
1211909.256:0114:0188:trace:seh:dispatch_exception info[2]=0000000000000188
1211909.256:0114:0188:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.256:0114:0188:trace:seh:dispatch_exception info[4]=0000000001a24918
1211909.256:0114:0188:trace:seh:dispatch_exception info[5]=00000001408712e7
1211909.256:0114:0188:warn:seh:dispatch_exception Thread 0188 renamed to "Render Thread"
1211909.256:0114:0188:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.256:0114:0188:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
1211909.256:0114:018c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01238E ip=000000007B01238E tid=018c
1211909.256:0114:018c:trace:seh:dispatch_exception info[0]=0000000000001000
1211909.256:0114:018c:trace:seh:dispatch_exception info[1]=0000000141c559d0
1211909.256:0114:018c:trace:seh:dispatch_exception info[2]=000000000000018c
1211909.256:0114:018c:trace:seh:dispatch_exception info[3]=0000000000000000
1211909.256:0114:018c:trace:seh:dispatch_exception info[4]=0000000000000000
1211909.256:0114:018c:trace:seh:dispatch_exception info[5]=000000014034f27b
1211909.256:0114:018c:warn:seh:dispatch_exception Thread 018c renamed to "File thread"
1211909.256:0114:018c:trace:seh:call_vectored_handlers calling handler at 0000000359149BE0 code=406d1388 flags=0
1211909.256:0114:018c:trace:seh:call_vectored_handlers handler at 0000000359149BE0 returned ffffffff
info: DXGI: NvAPI workaround enabled, reporting AMD GPU
info: DXGI: NvAPI workaround enabled, reporting AMD GPU
info: DXGI: NvAPI workaround enabled, reporting AMD GPU
info: D3D11CoreCreateDevice: Probing D3D_FEATURE_LEVEL_11_0
info: D3D11CoreCreateDevice: Using feature level D3D_FEATURE_LEVEL_11_0
info: Device properties:
info: Device name: : GeForce RTX 2080 Ti
info: Driver version : 460.73.1
info: Enabled device extensions:
info: VK_EXT_4444_formats
info: VK_EXT_conservative_rasterization
info: VK_EXT_custom_border_color
info: VK_EXT_depth_clip_enable
info: VK_EXT_extended_dynamic_state
info: VK_EXT_host_query_reset
info: VK_EXT_robustness2
info: VK_EXT_shader_demote_to_helper_invocation
info: VK_EXT_shader_viewport_index_layer
info: VK_EXT_transform_feedback
info: VK_EXT_vertex_attribute_divisor
info: VK_KHR_create_renderpass2
info: VK_KHR_depth_stencil_resolve
info: VK_KHR_draw_indirect_count
info: VK_KHR_driver_properties
info: VK_KHR_image_format_list
info: VK_KHR_sampler_mirror_clamp_to_edge
info: VK_KHR_shader_float_controls
info: VK_KHR_swapchain
info: Device features:
info: robustBufferAccess : 1
info: fullDrawIndexUint32 : 1
info: imageCubeArray : 1
info: independentBlend : 1
info: geometryShader : 1
info: tessellationShader : 1
info: sampleRateShading : 1
info: dualSrcBlend : 1
info: logicOp : 1
info: multiDrawIndirect : 1
info: drawIndirectFirstInstance : 1
info: depthClamp : 1
info: depthBiasClamp : 1
info: fillModeNonSolid : 1
info: depthBounds : 1
info: multiViewport : 1
info: samplerAnisotropy : 1
info: textureCompressionBC : 1
info: occlusionQueryPrecise : 1
info: pipelineStatisticsQuery : 1
info: vertexPipelineStoresAndAtomics : 0
info: fragmentStoresAndAtomics : 1
info: shaderImageGatherExtended : 1
info: shaderStorageImageExtendedFormats : 0
info: shaderStorageImageReadWithoutFormat : 1
info: shaderStorageImageWriteWithoutFormat : 1
info: shaderClipDistance : 1
info: shaderCullDistance : 1
info: shaderFloat64 : 1
info: shaderInt64 : 1
info: variableMultisampleRate : 1
info: VK_EXT_4444_formats
info: formatA4R4G4B4 : 1
info: formatA4B4G4R4 : 1
info: VK_EXT_custom_border_color
info: customBorderColors : 1
info: customBorderColorWithoutFormat : 1
info: VK_EXT_depth_clip_enable
info: depthClipEnable : 1
info: VK_EXT_extended_dynamic_state
info: extendedDynamicState : 1
info: VK_EXT_host_query_reset
info: hostQueryReset : 1
info: VK_EXT_memory_priority
info: memoryPriority : 0
info: VK_EXT_robustness2
info: robustBufferAccess2 : 1
info: robustImageAccess2 : 1
info: nullDescriptor : 1
info: VK_EXT_shader_demote_to_helper_invocation
info: shaderDemoteToHelperInvocation : 1
info: VK_EXT_transform_feedback
info: transformFeedback : 1
info: geometryStreams : 1
info: VK_EXT_vertex_attribute_divisor
info: vertexAttributeInstanceRateDivisor : 1
info: vertexAttributeInstanceRateZeroDivisor : 1
info: Queue families:
info: Graphics : 0
info: Transfer : 1
Fossilize INFO: Overriding serialization path: "/home/james/.steam/debian-installation/steamapps/shadercache/718850/fozpipelinesv5/steamapprun_pipeline_cache".
info: DXVK: Read 0 valid state cache entries
info: DXVK: Using 16 compiler threads
info: Presenter: Actual swap chain properties:
info: Format: VK_FORMAT_B8G8R8A8_SRGB
info: Present mode: VK_PRESENT_MODE_IMMEDIATE_KHR
info: Buffer size: 104x37
info: Image count: 3
info: Exclusive FS: 1
warn: DXGI: MakeWindowAssociation: Ignoring flags
1211909.456:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
Setting breakpad minidump AppID = 718850
Steam_SetMinidumpSteamID: Caching Steam ID: 76561197972277933 [API loaded no]
1211913.284:0074:0084:trace:seh:dispatch_exception code=6be flags=0 addr=000000007B01238E ip=000000007B01238E tid=0084
1211913.284:0074:0084:warn:seh:dispatch_exception unknown exception (code=6be) raised
1211913.284:0074:0084:trace:seh:dispatch_exception rax=000000007b012340 rbx=0000000000e1f1a8 rcx=0000000000e1eed0 rdx=0000000000000000
1211913.284:0074:0084:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000050 rsp=0000000000e1eeb0
1211913.284:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000220158 r11=0000000000e1ee58
1211913.284:0074:0084:trace:seh:dispatch_exception r12=0000000000e1f1a8 r13=000000000022da00 r14=0000000000000000 r15=000000000022da00
1211913.284:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD5C0 code=6be flags=0
1211913.284:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD5C0 returned 0
1211913.284:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C680 code=6be flags=0
1211913.284:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C680 returned 0
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01238E rsp 0000000000E1EEB0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 12340-123c7
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012340-000000007B0123C7
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B227F2 rsp 0000000000E1EF90
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 427e0-42827
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B227E0-0000000231B22827
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE98A4 rsp 0000000000E1EFC0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C34EE rsp 0000000000E1F010
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 23330-23550
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4ED4 flags 0 prolog 0xe bytes function 00000002279C3330-00000002279C3550
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
1211913.284:0074:0084:trace:seh:call_stack_handlers found wine frame 0000000000E1F080 rsp 0000000000E1F370 handler 00000002279C2DF0
1211913.284:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C2DF0 (rec=0000000000E1EED0, frame=0000000000E1F080 context=0000000000E1E3F0, dispatch=0000000000E1E2C0)
1211913.284:0074:0084:trace:seh:call_teb_handler handler at 00000002279C2DF0 returned 1
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BA945 rsp 0000000000E1F370
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 1a870-1a956
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A7C flags 0 prolog 0x8 bytes function 00000002279BA870-00000002279BA956
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
1211913.284:0074:0084:trace:seh:call_stack_handlers found wine frame 0000000000E1F3A0 rsp 0000000000E1F4E0 handler 00000002279C46F0
1211913.284:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C46F0 (rec=0000000000E1EED0, frame=0000000000E1F3A0 context=0000000000E1E3F0, dispatch=0000000000E1E2C0)
1211913.284:0074:0084:trace:seh:RtlUnwindEx code=6be flags=2 end_frame=0000000000E1F3A0 target_ip=00000002279C468A rip=000000007bc53ae2
1211913.284:0074:0084:trace:seh:RtlUnwindEx rax=0000000067fc0000 rbx=0000000000e1f080 rcx=0000000000e1dc60 rdx=00000002279c468a
1211913.284:0074:0084:trace:seh:RtlUnwindEx rsi=0000000000e1f3a0 rdi=0000000000e1e9d0 rbp=0000000000e1d710 rsp=0000000000e1d590
1211913.284:0074:0084:trace:seh:RtlUnwindEx r8=0000000000e1eed0 r9=00000002279c46c0 r10=0000000000e1e040 r11=00000000000264d0
1211913.284:0074:0084:trace:seh:RtlUnwindEx r12=0000000000e1eed0 r13=0000000000e1dc60 r14=0000000000e1f3a0 r15=0000000000e1eed0
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53AE2 rsp 0000000000E1D590
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 53a90-5439e
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D644 flags 0 prolog 0x13 bytes function 000000007BC53A90-000000007BC5439E
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC543BF rsp 0000000000E1DC30
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 543a0-543c8
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D65C flags 0 prolog 0x7 bytes function 000000007BC543A0-000000007BC543C8
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C468A rsp 0000000000E1E140
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 24670-2468c
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F7C flags 0 prolog 0x8 bytes function 00000002279C4670-00000002279C468C
1211913.284:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C46B9 rsp 0000000000E1E170
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 24690-246ba
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F88 flags 0 prolog 0x4 bytes function 00000002279C4690-00000002279C46BA
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4744 rsp 0000000000E1E1A0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 246f0-24745
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F98 flags 0 prolog 0xa bytes function 00000002279C46F0-00000002279C4745
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC52FD7 rsp 0000000000E1E1F0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 52cb0-53299
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D600 flags 0 prolog 0x13 bytes function 000000007BC52CB0-000000007BC53299
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x6d8,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC535A9 rsp 0000000000E1E910
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 532a0-537af
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D618 flags 0 prolog 0x10 bytes function 000000007BC532A0-000000007BC537AF
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC511E4 rsp 0000000000E1E9B0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 5117c-511f1
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D578 flags 0 prolog 0x7 bytes function 000000007BC5117C-000000007BC511F1
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01238E rsp 0000000000E1EEB0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 12340-123c7
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012340-000000007B0123C7
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B227F2 rsp 0000000000E1EF90
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 427e0-42827
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B227E0-0000000231B22827
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE98A4 rsp 0000000000E1EFC0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C34EE rsp 0000000000E1F010
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 23330-23550
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4ED4 flags 0 prolog 0xe bytes function 00000002279C3330-00000002279C3550
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
1211913.284:0074:0084:trace:seh:RtlUnwindEx found builtin frame 0000000000E1F080 handler 00000002279C2DF0
1211913.284:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C2DF0 (rec=0000000000E1EED0, frame=0000000000E1F080 context=0000000000E1DC60, dispatch=0000000000E1D620)
1211913.284:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C2DF0 returned 1
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BA945 rsp 0000000000E1F370
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 1a870-1a956
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A7C flags 0 prolog 0x8 bytes function 00000002279BA870-00000002279BA956
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
1211913.284:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C468A stack 0000000000E1F370
1211913.284:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01238E ip=000000007B01238E tid=0084
1211913.284:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
1211913.284:0074:0084:trace:seh:dispatch_exception rax=000000007b012340 rbx=0000000000e1f1a8 rcx=0000000000e1eec0 rdx=0000000000000000
1211913.284:0074:0084:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000022b700 rbp=0000000000000050 rsp=0000000000e1eea0
1211913.284:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=000000000022a8a0 r11=0000000000e1ee98
1211913.284:0074:0084:trace:seh:dispatch_exception r12=0000000000e1f1a8 r13=000000000022da00 r14=0000000000000000 r15=000000000022da00
1211913.284:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD5C0 code=6ba flags=0
1211913.284:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD5C0 returned 0
1211913.284:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C680 code=6ba flags=0
1211913.284:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C680 returned 0
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01238E rsp 0000000000E1EEA0
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 12340-123c7
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012340-000000007B0123C7
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
1211913.284:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B227F2 rsp 0000000000E1EF80
1211913.284:0074:0084:trace:seh:dump_unwind_info **** func 427e0-42827
1211913.284:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B227E0-0000000231B22827
1211913.284:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211913.284:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 0000000000E1EFB0
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C342D rsp 0000000000E1F010
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 23330-23550
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4ED4 flags 0 prolog 0xe bytes function 00000002279C3330-00000002279C3550
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
1211913.285:0074:0084:trace:seh:call_stack_handlers found wine frame 0000000000E1F080 rsp 0000000000E1F370 handler 00000002279C2DF0
1211913.285:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C2DF0 (rec=0000000000E1EEC0, frame=0000000000E1F080 context=0000000000E1E3E0, dispatch=0000000000E1E2B0)
1211913.285:0074:0084:trace:seh:call_teb_handler handler at 00000002279C2DF0 returned 1
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BA945 rsp 0000000000E1F370
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 1a870-1a956
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A7C flags 0 prolog 0x8 bytes function 00000002279BA870-00000002279BA956
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
1211913.285:0074:0084:trace:seh:call_stack_handlers found wine frame 0000000000E1F3A0 rsp 0000000000E1F4E0 handler 00000002279C46F0
1211913.285:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C46F0 (rec=0000000000E1EEC0, frame=0000000000E1F3A0 context=0000000000E1E3E0, dispatch=0000000000E1E2B0)
1211913.285:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E1F3A0 target_ip=00000002279C468A rip=000000007bc53ae2
1211913.285:0074:0084:trace:seh:RtlUnwindEx rax=0000000067fc0000 rbx=0000000000e1f080 rcx=0000000000e1dc50 rdx=00000002279c468a
1211913.285:0074:0084:trace:seh:RtlUnwindEx rsi=0000000000e1f3a0 rdi=0000000000e1e9c0 rbp=0000000000e1d700 rsp=0000000000e1d580
1211913.285:0074:0084:trace:seh:RtlUnwindEx r8=0000000000e1eec0 r9=00000002279c46c0 r10=0000000000e1de46 r11=0000000000000293
1211913.285:0074:0084:trace:seh:RtlUnwindEx r12=0000000000e1eec0 r13=0000000000e1dc50 r14=0000000000e1f3a0 r15=0000000000e1eec0
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53AE2 rsp 0000000000E1D580
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 53a90-5439e
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D644 flags 0 prolog 0x13 bytes function 000000007BC53A90-000000007BC5439E
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC543BF rsp 0000000000E1DC20
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 543a0-543c8
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D65C flags 0 prolog 0x7 bytes function 000000007BC543A0-000000007BC543C8
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C468A rsp 0000000000E1E130
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 24670-2468c
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F7C flags 0 prolog 0x8 bytes function 00000002279C4670-00000002279C468C
1211913.285:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C46B9 rsp 0000000000E1E160
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 24690-246ba
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F88 flags 0 prolog 0x4 bytes function 00000002279C4690-00000002279C46BA
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4744 rsp 0000000000E1E190
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 246f0-24745
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F98 flags 0 prolog 0xa bytes function 00000002279C46F0-00000002279C4745
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC52FD7 rsp 0000000000E1E1E0
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 52cb0-53299
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D600 flags 0 prolog 0x13 bytes function 000000007BC52CB0-000000007BC53299
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x6d8,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC535A9 rsp 0000000000E1E900
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 532a0-537af
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D618 flags 0 prolog 0x10 bytes function 000000007BC532A0-000000007BC537AF
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC511E4 rsp 0000000000E1E9A0
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 5117c-511f1
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC7D578 flags 0 prolog 0x7 bytes function 000000007BC5117C-000000007BC511F1
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01238E rsp 0000000000E1EEA0
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 12340-123c7
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012340-000000007B0123C7
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B227F2 rsp 0000000000E1EF80
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 427e0-42827
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B227E0-0000000231B22827
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 0000000000E1EFB0
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C342D rsp 0000000000E1F010
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 23330-23550
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4ED4 flags 0 prolog 0xe bytes function 00000002279C3330-00000002279C3550
1211913.285:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
1211913.285:0074:0084:trace:seh:RtlUnwindEx found builtin frame 0000000000E1F080 handler 00000002279C2DF0
1211913.285:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C2DF0 (rec=0000000000E1EEC0, frame=0000000000E1F080 context=0000000000E1DC50, dispatch=0000000000E1D610)
1211913.285:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C2DF0 returned 1
1211913.285:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BA945 rsp 0000000000E1F370
1211913.285:0074:0084:trace:seh:dump_unwind_info **** func 1a870-1a956
1211913.285:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A7C flags 0 prolog 0x8 bytes function 00000002279BA870-00000002279BA956
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
1211913.285:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
1211913.285:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C468A stack 0000000000E1F370
pid 3457809 != 3457782, skipping destruction (fork without exec?)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment