Skip to content

Instantly share code, notes, and snippets.

@andres-asm
Created February 23, 2023 00:43
Show Gist options
  • Save andres-asm/e0c99e3829b25084b9f61ace41354d3d to your computer and use it in GitHub Desktop.
Save andres-asm/e0c99e3829b25084b9f61ace41354d3d to your computer and use it in GitHub Desktop.
19063.489:0120:027c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\avrt.dll" at 00000002F2930000: builtin
19063.490:0120:027c:fixme:avrt:AvSetMmThreadCharacteristicsW (L"Audio",000000004740FE34): stub
19063.490:0120:027c:fixme:avrt:AvSetMmThreadPriority (0000000012345678)->(1) stub
19063.563:0120:0124:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01260E ip=000000007B01260E tid=0124
19063.563:0120:0124:trace:unwind:dispatch_exception info[0]=0000000000001000
19063.563:0120:0124:trace:unwind:dispatch_exception info[1]=00000000004eef00
19063.563:0120:0124:trace:unwind:dispatch_exception info[2]=0000000000000284
19063.563:0120:0124:warn:seh:dispatch_exception Thread 0284 renamed to "AudioThread"
19063.563:0120:0124:trace:seh:call_vectored_handlers calling handler at 0000000359154C20 code=406d1388 flags=0
19063.563:0120:0124:trace:seh:call_vectored_handlers handler at 0000000359154C20 returned ffffffff
info: Setting display mode: 1280x800@60
info: Setting display mode: 1280x800@60
19076.773:0120:0124:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01260E ip=000000007B01260E tid=0124
19076.773:0120:0124:trace:unwind:dispatch_exception info[0]=0000000000001000
19076.773:0120:0124:trace:unwind:dispatch_exception info[1]=00000000004eea10
19076.773:0120:0124:trace:unwind:dispatch_exception info[2]=00000000000002ec
19076.773:0120:0124:warn:seh:dispatch_exception Thread 02ec renamed to "RenderThread 1"
19076.773:0120:0124:trace:seh:call_vectored_handlers calling handler at 0000000359154C20 code=406d1388 flags=0
19076.773:0120:0124:trace:seh:call_vectored_handlers handler at 0000000359154C20 returned ffffffff
19076.785:0120:0124:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01260E ip=000000007B01260E tid=0124
19076.785:0120:0124:trace:unwind:dispatch_exception info[0]=0000000000001000
19076.785:0120:0124:trace:unwind:dispatch_exception info[1]=00000000004eea10
19076.785:0120:0124:trace:unwind:dispatch_exception info[2]=00000000000002f0
19076.785:0120:0124:warn:seh:dispatch_exception Thread 02f0 renamed to "RTHeartBeat 1"
19076.785:0120:0124:trace:seh:call_vectored_handlers calling handler at 0000000359154C20 code=406d1388 flags=0
19076.785:0120:0124:trace:seh:call_vectored_handlers handler at 0000000359154C20 returned ffffffff
info: Setting display mode: 1280x720@60
info: Setting display mode: 1280x720@60
ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
info: Presenter: Actual swap chain properties:
info: Format: VK_FORMAT_B8G8R8A8_UNORM
info: Color space: VK_COLOR_SPACE_SRGB_NONLINEAR_KHR
info: Present mode: VK_PRESENT_MODE_FIFO_KHR
info: Buffer size: 1280x720
info: Image count: 4
info: Exclusive FS: 1
19082.621:0120:01e4:fixme:mfplat:topology_loader_Load iface 0000000000971E10, input_topology 000000001A14C0B0, ret_topology 0000000005B2FCF8, current_topology 0000000000000000 stub!
19082.627:0120:01e4:fixme:mfplat:media_source_QueryInterface {6ef2a662-47c0-4666-b13d-cbb717f2fa2c}, 0000000005B2FC08.
19085.400:005c:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
19085.551:0120:01a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\NETAPI32.DLL" at 00000003673D0000: builtin
19085.554:0120:01a8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\NETAPI32.DLL" : builtin
19085.556:0120:01a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00000002D4D40000: builtin
19085.559:0120:01a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\crypt32.dll" at 00000001DD3F0000: builtin
19085.559:0120:01a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 00000002DE970000: builtin
19085.564:0120:01a8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
19085.566:0120:01a8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\crypt32.dll" : builtin
19085.566:0120:01a8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\bcrypt.dll" : builtin
19085.602:0120:01a8:fixme:toolhelp:CreateToolhelp32Snapshot Unimplemented: heap list snapshot
19085.605:0120:01a8:fixme:toolhelp:Heap32ListFirst : stub
19086.823:0120:0124:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01260E ip=000000007B01260E tid=0124
19086.823:0120:0124:trace:unwind:dispatch_exception info[0]=0000000000001000
19086.823:0120:0124:trace:unwind:dispatch_exception info[1]=00000000004ee950
19086.823:0120:0124:trace:unwind:dispatch_exception info[2]=0000000000000304
19086.823:0120:0124:warn:seh:dispatch_exception Thread 0304 renamed to "TAsyncThread 0"
19086.823:0120:0124:trace:seh:call_vectored_handlers calling handler at 0000000359154C20 code=406d1388 flags=0
19086.823:0120:0124:trace:seh:call_vectored_handlers handler at 0000000359154C20 returned ffffffff
19086.839:0120:0124:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01260E ip=000000007B01260E tid=0124
19086.839:0120:0124:trace:unwind:dispatch_exception info[0]=0000000000001000
19086.839:0120:0124:trace:unwind:dispatch_exception info[1]=00000000004ee440
19086.839:0120:0124:trace:unwind:dispatch_exception info[2]=000000000000030c
19086.839:0120:0124:warn:seh:dispatch_exception Thread 030c renamed to "OnlineAsyncTaskThreadNull DefaultInstance(1)"
19086.839:0120:0124:trace:seh:call_vectored_handlers calling handler at 0000000359154C20 code=406d1388 flags=0
19086.839:0120:0124:trace:seh:call_vectored_handlers handler at 0000000359154C20 returned ffffffff
19100.055:0120:0124:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01260E ip=000000007B01260E tid=0124
19100.055:0120:0124:trace:unwind:dispatch_exception info[0]=0000000000001000
19100.055:0120:0124:trace:unwind:dispatch_exception info[1]=00000000004ee8d0
19100.055:0120:0124:trace:unwind:dispatch_exception info[2]=0000000000000318
19100.055:0120:0124:warn:seh:dispatch_exception Thread 0318 renamed to "SlateLoadingThread2"
19100.055:0120:0124:trace:seh:call_vectored_handlers calling handler at 0000000359154C20 code=406d1388 flags=0
19100.055:0120:0124:trace:seh:call_vectored_handlers handler at 0000000359154C20 returned ffffffff
19102.149:0120:01e4:fixme:mfplat:topology_loader_Load iface 0000000000971DD0, input_topology 000000001A15BB10, ret_topology 0000000005B2FCF8, current_topology 0000000000000000 stub!
19102.165:0120:01e4:fixme:mfplat:media_source_QueryInterface {6ef2a662-47c0-4666-b13d-cbb717f2fa2c}, 0000000005B2FC08.
19118.928:0120:01e4:warn:seh:dispatch_exception backtrace: --- Exception 0xc0000005.
19118.928:0120:01e4:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000017005F2A4 ip=000000017005F2A4 tid=01e4
19118.928:0120:01e4:trace:unwind:dispatch_exception info[0]=0000000000000000
19118.928:0120:01e4:trace:unwind:dispatch_exception info[1]=0000000000000053
19118.928:0120:01e4:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
19118.928:0120:01e4:trace:seh:dispatch_exception rax=000000000000002a rbx=0000000005b2f928 rcx=0000000000000000 rdx=000000000000002b
19118.928:0120:01e4:trace:seh:dispatch_exception rsi=000000017007c488 rdi=00000000360d27b0 rbp=0000000000278d00 rsp=0000000005b2f8e0
19118.928:0120:01e4:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000005b8e560 r11=0000000000000246
19118.928:0120:01e4:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000001 r14=000000017007c264 r15=0000000005b2f928
19118.928:0120:01e4:trace:seh:call_vectored_handlers calling handler at 0000000359154C20 code=c0000005 flags=0
19118.928:0120:01e4:trace:seh:call_vectored_handlers handler at 0000000359154C20 returned 0
19118.928:0120:01e4:trace:seh:call_vectored_handlers calling handler at 000000027106BA90 code=c0000005 flags=0
19118.928:0120:01e4:trace:seh:call_vectored_handlers handler at 000000027106BA90 returned 0
19118.928:0120:01e4:trace:seh:call_vectored_handlers calling handler at 00000002EDFB2C50 code=c0000005 flags=0
19118.928:0120:01e4:trace:seh:call_vectored_handlers handler at 00000002EDFB2C50 returned 0
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000017005F2A4: L"ntdll.dll" + 000000000005F2A4.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000017005F2A4 rsp 0000000005B2F8E0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 5f110-5f81a
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000170087C38 flags 0 prolog 0x13 bytes function 000000017005F110-000000017005F81A
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x13: subq $0x188,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xc: pushq %rbx
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xb: pushq %rsi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xa: pushq %rdi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x9: pushq %rbp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x8: pushq %r12
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x6: pushq %r13
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: pushq %r14
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x2: pushq %r15
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000017005F8B0: L"ntdll.dll" + 000000000005F8B0.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000017005F8B0 rsp 0000000005B2FAB0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 5f820-5f8c3
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000170087C50 flags 0 prolog 0x5 bytes function 000000017005F820-000000017005F8C3
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x5: subq $0x20,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x1: pushq %rbx
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 00000001402DE004: L"NBAPlaygrounds2-Win64-Shipping.exe" + 00000000002DE004.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 00000001402DE004 rsp 0000000005B2FAE0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 2ddfd9-2de057
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000142CDA898 flags 4 prolog 0x8 bytes function 00000001402DDFD9-00000001402DE057
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x8: movq %rbx,0x80(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info chained to function 00000001402DDFC0-00000001402DDFD9
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000142CDA88C flags 0 prolog 0x16 bytes function 00000001402DDFC0-00000001402DDFD9
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x16: subq $0x60,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x12: pushq %r15
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x10: pushq %rdi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xf: pushq %rsi
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 00000001402DB8F0: L"NBAPlaygrounds2-Win64-Shipping.exe" + 00000000002DB8F0.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 00000001402DB8F0 rsp 0000000005B2FB60
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 2db8c0-2db8f7
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000142CC8928 flags 0 prolog 0x4 bytes function 00000001402DB8C0-00000001402DB8F7
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: subq $0x38,%rsp
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 00000001402DFC09: L"NBAPlaygrounds2-Win64-Shipping.exe" + 00000000002DFC09.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 00000001402DFC09 rsp 0000000005B2FBA0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 2dfbb3-2dfc31
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000142CDAC84 flags 4 prolog 0x23 bytes function 00000001402DFBB3-00000001402DFC31
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x23: movq %r15,0x30(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x17: movq %r14,0x38(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xb: movq %r12,0x48(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: movq %rbx,0x60(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info chained to function 00000001402DFB95-00000001402DFBB3
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000142CDAC68 flags 4 prolog 0x12 bytes function 00000001402DFB95-00000001402DFBB3
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x12: movq %r13,0x40(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xb: movq %rdi,0x70(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: movq %rbp,0x68(%rsp)
19118.928:0120:01e4:trace:unwind:dump_unwind_info chained to function 00000001402DFB80-00000001402DFB95
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000142CCE64C flags 0 prolog 0x8 bytes function 00000001402DFB80-00000001402DFB95
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x8: subq $0x50,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: pushq %rsi
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000020FC7378B: L"mf.dll" + 000000000001378B.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000020FC7378B rsp 0000000005B2FC00
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 135c0-137a9
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 000000020FCAC0A4 flags 0 prolog 0xc bytes function 000000020FC735C0-000000020FC737A9
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xc: subq $0x80,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x8: pushq %rbx
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x7: pushq %rsi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x6: pushq %r12
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: pushq %r13
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x2: pushq %r14
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000020FC7541C: L"mf.dll" + 000000000001541C.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000020FC7541C rsp 0000000005B2FCB0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 153a0-15558
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 000000020FCAC340 flags 0 prolog 0x10 bytes function 000000020FC753A0-000000020FC75558
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xc: pushq %rbx
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xb: pushq %rsi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xa: pushq %rdi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x9: pushq %rbp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x8: pushq %r12
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x6: pushq %r13
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: pushq %r14
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x2: pushq %r15
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000020FC61BB1: L"mf.dll" + 0000000000001BB1.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000020FC61BB1 rsp 0000000005B2FD50
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 1b50-1bc6
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 000000020FCAB07C flags 0 prolog 0x7 bytes function 000000020FC61B50-000000020FC61BC6
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x7: subq $0x38,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x3: pushq %rbx
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x2: pushq %r12
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000033526224B: L"rtworkq.dll" + 000000000000224B.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000033526224B rsp 0000000005B2FDA0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 2220-2295
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 000000033526B0F4 flags 0 prolog 0x7 bytes function 0000000335262220-0000000335262295
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x7: subq $0x38,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x3: pushq %rbx
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x2: pushq %r12
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 0000000170062F7D: L"ntdll.dll" + 0000000000062F7D.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 0000000170062F7D rsp 0000000005B2FDF0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 62c90-632d7
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000170087F20 flags 0 prolog 0xe bytes function 0000000170062C90-00000001700632D7
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xe: subq $0xc0,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x7: pushq %rbx
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x6: pushq %rsi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x5: pushq %rdi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: pushq %r12
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x2: pushq %r13
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 00000001700633ED: L"ntdll.dll" + 00000000000633ED.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 00000001700633ED rsp 0000000005B2FEE0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 632e0-63537
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000170087F34 flags 0 prolog 0x10 bytes function 00000001700632E0-0000000170063537
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xc: pushq %rbx
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xb: pushq %rsi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0xa: pushq %rdi
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x9: pushq %rbp
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x8: pushq %r12
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x6: pushq %r13
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: pushq %r14
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x2: pushq %r15
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000007B62D759: L"kernel32.dll" + 000000000002D759.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B62D759 rsp 0000000005B2FF80
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 2d750-2d762
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 000000007B63E5B0 flags 0 prolog 0x4 bytes function 000000007B62D750-000000007B62D762
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
19118.928:0120:01e4:warn:seh:virtual_unwind backtrace: 000000017005FF37: L"ntdll.dll" + 000000000005FF37.
19118.928:0120:01e4:trace:unwind:RtlVirtualUnwind type 1 rip 000000017005FF37 rsp 0000000005B2FFB0
19118.928:0120:01e4:trace:unwind:dump_unwind_info **** func 5ff20-5ff38
19118.928:0120:01e4:trace:unwind:dump_unwind_info unwind info at 0000000170087CD4 flags 1 prolog 0x4 bytes function 000000017005FF20-000000017005FF38
19118.928:0120:01e4:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
19118.928:0120:01e4:trace:unwind:dump_unwind_info handler 00000001700605A0 data at 0000000170087CE0
19118.928:0120:01e4:trace:seh:call_handler calling handler 00000001700605A0 (rec=0000000005B2F6E0, frame=0000000005B2FFB0 context=0000000005B2EC30, dispatch=0000000005B2EB00)
19118.935:0120:012c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 0000000316370000: builtin
19126.059:0120:012c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
19126.062:0120:012c:fixme:imm:ImeSetActiveContext (0x30c0050, 1): stub
19126.068:0100:0108:fixme:oleacc:find_class_data unhandled window class: L"Static"
19126.069:0100:0108:fixme:oleacc:find_class_data unhandled window class: L"Button"
19126.070:0100:0108:fixme:oleacc:find_class_data unhandled window class: L"Static"
19126.070:0100:0108:fixme:oleacc:find_class_data unhandled window class: L"#32770"
19126.070:0100:0108:fixme:oleacc:find_class_data unhandled window class: L"#32770"
19126.070:0100:0108:fixme:oleacc:find_class_data unhandled window class: L"#32770"
19126.070:0100:0108:fixme:oleacc:find_class_data unhandled window class: L"Button"
info: Restoring display mode: 1280x800@60
info: Setting display mode: 1280x800@60
ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
info: Presenter: Actual swap chain properties:
info: Format: VK_FORMAT_B8G8R8A8_UNORM
info: Color space: VK_COLOR_SPACE_SRGB_NONLINEAR_KHR
info: Present mode: VK_PRESENT_MODE_FIFO_KHR
info: Buffer size: 1280x800
info: Image count: 4
info: Exclusive FS: 1
wine: Unhandled page fault on read access to 0000000000000053 at address 000000017005F2A4 (thread 01e4), starting debugger...
19178.933:0120:01e4:trace:seh:start_debugger Starting debugger L"winedbg --auto 288 12976"
wine: using kernel write watches (experimental).
wine: overriding CPU configuration, 8 logical CPUs, host CPUs 0,1,2,3,4,5,6,7.
19179.186:0324:0328:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
19179.186:0324:0328:trace:seh:install_bpf Seccomp filters already installed.
19179.186:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedbg.exe" at 0000000140000000: builtin
19179.187:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
19179.187:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
19179.189:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
19179.190:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
19179.190:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
19179.190:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
19179.190:0324:0328:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 00000003BE590000: builtin
19179.366:0120:01e4:trace:seh:call_handler handler at 00000001700605A0 returned 1
Unhandled exception: page fault on read access to 0x0000000000000053 in 64-bit code (0x000000017005f2a4).
Register dump:
rip:000000017005f2a4 rsp:0000000005b2f8e0 rbp:0000000000278d00 eflags:00010217 ( R- -- I -A-P-C)
rax:000000000000002a rbx:0000000005b2f928 rcx:0000000000000000 rdx:000000000000002b
rsi:000000017007c488 rdi:00000000360d27b0 r8:0000000000000000 r9:0000000000000000 r10:0000000005b8e560
r11:0000000000000246 r12:0000000000000000 r13:0000000000000001 r14:000000017007c264 r15:0000000005b2f928
Stack dump:
0x0000000005b2f8e0: 00000000009c5510 00000001700625b8
0x0000000005b2f8f0: 0000000000a43290 0000000170063d3d
0x0000000005b2f900: 0000000005c405e8 0000000005c727b0
0x0000000005b2f910: 0000000005b93250 0000000005b2fa50
0x0000000005b2f920: 0000000005c727b0 fffffffffd050f80
0x0000000005b2f930: 0000000005b2fa08 0000000000000000
0x0000000005b2f940: 0000000335262220 00000001700650d6
0x0000000005b2f950: 0000000005c727b0 000000017005ff0c
0x0000000005b2f960: 0000000000000000 000000017002e50d
0x0000000005b2f970: 0000000005c405e8 000000017002ae10
0x0000000005b2f980: 0000000005c727b0 00000001700618bc
0x0000000005b2f990: 0000000335262ed0 0000000000a43290
Backtrace:
=>0 0x000000017005f2a4 in ntdll (+0x5f2a4) (0x0000000000278d00)
1 0x000000017005f8b0 in ntdll (+0x5f8b0) (0x000000020fca1c00)
2 0x00000001402de004 in nbaplaygrounds2-win64-shipping (+0x2de004) (0x000000020fca1c00)
3 0x00000001402db8f0 in nbaplaygrounds2-win64-shipping (+0x2db8f0) (0x000000020fca1c00)
4 0x00000001402dfc09 in nbaplaygrounds2-win64-shipping (+0x2dfc09) (0x000000020fca1c00)
5 0x000000020fc7378b in mf (+0x1378b) (0x000000020fca1c20)
6 0x000000020fc7541c in mf (+0x1541c) (0x000000020fca1c20)
7 0x000000020fc61bb1 in mf (+0x1bb1) (0x0000000000a432e8)
8 0x000000033526224b in rtworkq (+0x224b) (0x0000000000a432e8)
9 0x0000000170062f7d in ntdll (+0x62f7d) (0x0000000000a432e8)
10 0x00000001700633ed in ntdll (+0x633ed) (0x0000000000a432e8)
11 0x000000007b62d759 in kernel32 (+0x2d759) (0x0000000000000000)
12 0x000000017005ff37 in ntdll (+0x5ff37) (0x0000000000000000)
0x000000017005f2a4 ntdll+0x5f2a4: movq 0x0000000000000028(%rdx),%r14
Modules:
Module Address Debug info Name (104 modules)
PE 0000000000a60000-0000000000a69000 Deferred x3daudio1_7
PE 0000000000a70000-0000000000b0d000 Deferred msvcp140
PE 0000000000b10000-0000000000b27000 Deferred vcruntime140
PE 0000000003a00000-0000000003a47000 Deferred nvcloth_x64
PE 0000000004ef0000-0000000004f02000 Deferred libogg_64
PE 0000000004f70000-0000000004f7e000 Deferred libvorbisfile_64
PE 0000000012190000-00000000121b6000 Deferred gfsdk_aftermath_lib.x64
PE 0000000012b40000-0000000012cc8000 Deferred gameoverlayrenderer64
PE 0000000017250000-0000000017263000 Deferred pxfoundation_x64
PE 0000000017270000-00000000173fc000 Deferred physx3common_x64
PE 0000000017400000-0000000017433000 Deferred pxpvdsdk_x64
PE 0000000017440000-000000001764c000 Deferred physx3_x64
PE 0000000017650000-0000000017758000 Deferred apexframework_x64
PE 0000000017760000-0000000017ac7000 Deferred apex_legacy_x64
PE 0000000017ad0000-0000000017c07000 Deferred apex_clothing_x64
PE 0000000017c20000-0000000017c61000 Deferred physx3cooking_x64
PE 000000003b400000-000000003b440000 Deferred steam_api64
PE 000000003d0b0000-000000003d13b000 Deferred xaudio2_7
PE 0000000046b60000-0000000046d07000 Deferred libvorbis_64
PE 000000007a380000-000000007a3ab000 Deferred atl100
PE 000000007a850000-000000007a854000 Deferred opengl32
PE 000000007b000000-000000007b0da000 Deferred kernelbase
PE 000000007b600000-000000007b814000 Export kernel32
PE 0000000138000000-00000001395a1000 Deferred steamclient64
PE 0000000140000000-000000014375f000 Export nbaplaygrounds2-win64-shipping
PE 0000000170000000-00000001700a3000 Export ntdll
PE 0000000180000000-0000000180015000 Deferred xapofx1_5
PE 00000001c69e0000-00000001c731b000 Deferred shell32
PE 00000001c8b40000-00000001c8b60000 Deferred msacm32
PE 00000001c8db0000-00000001c8e47000 Deferred msvcrt
PE 00000001cd860000-00000001cd868000 Deferred api-ms-win-crt-utility-l1-1-0
PE 00000001d97a0000-00000001d97a7000 Deferred api-ms-win-core-fibers-l1-1-1
PE 00000001e7610000-00000001e7617000 Deferred normaliz
PE 00000001ec2b0000-00000001ec2d6000 Deferred ws2_32
PE 00000001f51e0000-00000001f51f0000 Deferred hid
PE 000000020fc60000-000000020fccc000 Export mf
PE 000000021a7e0000-000000021a856000 Deferred setupapi
PE 0000000228450000-000000022847b000 Deferred propsys
PE 0000000231ae0000-0000000231b62000 Deferred rpcrt4
PE 0000000236370000-000000023639e000 Deferred winepulse
PE 0000000236df0000-0000000236e50000 Deferred dsound
PE 000000023d820000-000000023da6f000 Deferred user32
PE 0000000240030000-000000024005d000 Deferred iphlpapi
PE 0000000241850000-0000000241857000 Deferred api-ms-win-crt-environment-l1-1-0
PE 000000024f470000-000000024f48f000 Deferred mpr
PE 0000000253cc0000-0000000253cde000 Deferred xinput1_3
PE 000000025d740000-000000025d74e000 Deferred dwmapi
PE 0000000262250000-0000000262259000 Deferred api-ms-win-crt-runtime-l1-1-0
PE 000000026b4c0000-000000026b53a000 Deferred gdi32
PE 0000000270f60000-0000000271259000 Deferred d3d9
PE 00000002739c0000-0000000273af7000 Deferred oleaut32
PE 000000028ba60000-000000028ba67000 Deferred api-ms-win-crt-time-l1-1-0
PE 000000028dfa0000-000000028dfac000 Deferred nsi
PE 000000029cfc0000-000000029cfd6000 Deferred dnsapi
PE 000000029e400000-000000029e436000 Deferred msctf
PE 00000002bb750000-00000002bb894000 Deferred comctl32
PE 00000002c83b0000-00000002c841d000 Deferred winegstreamer
PE 00000002e3540000-00000002e3591000 Deferred shlwapi
PE 00000002e8f10000-00000002e902a000 Deferred ole32
PE 00000002edf00000-00000002ee149000 Deferred dxgi
PE 00000002f1fa0000-00000002f1fae000 Deferred version
PE 00000002f2930000-00000002f293c000 Deferred avrt
PE 00000002f61f0000-00000002f6214000 Deferred explorerframe
PE 00000002f7230000-00000002f725f000 Deferred uxtheme
PE 00000002fe110000-00000002fe11a000 Deferred api-ms-win-crt-multibyte-l1-1-0
PE 000000030a2c0000-000000030a2c9000 Deferred api-ms-win-crt-stdio-l1-1-0
PE 000000030c980000-000000030c988000 Deferred api-ms-win-core-synch-l1-2-0
PE 00000003126f0000-0000000312709000 Deferred shcore
PE 0000000316370000-000000031637b000 Deferred psapi
PE 0000000327020000-0000000327073000 Deferred combase
PE 000000032a700000-000000032a72a000 Deferred sechost
PE 0000000330260000-00000003302a0000 Deferred advapi32
PE 0000000335260000-0000000335272000 Export rtworkq
PE 0000000336850000-000000033687b000 Deferred mmdevapi
PE 000000033ea00000-000000033ea09000 Deferred api-ms-win-crt-string-l1-1-0
PE 0000000341d30000-0000000341dff000 Deferred quartz
PE 0000000344840000-0000000344848000 Deferred api-ms-win-crt-filesystem-l1-1-0
PE 0000000346ba0000-0000000346bc1000 Deferred jsproxy
PE 000000034abc0000-000000034abe1000 Deferred msdmo
PE 000000034ec90000-000000034ecba000 Deferred mfplay
PE 0000000350a30000-0000000350a39000 Deferred api-ms-win-crt-convert-l1-1-0
PE 0000000351680000-0000000351688000 Deferred api-ms-win-core-localization-l1-2-1
PE 0000000355100000-0000000355107000 Deferred api-ms-win-crt-locale-l1-1-0
PE 0000000358120000-0000000358166000 Deferred winhttp
PE 0000000359050000-00000003593ae000 Deferred d3d11
PE 000000035b570000-000000035b599000 Deferred gameux
PE 0000000360a80000-0000000360a8a000 Deferred api-ms-win-crt-math-l1-1-0
PE 00000003738e0000-00000003738e8000 Deferred api-ms-win-crt-conio-l1-1-0
PE 0000000375610000-0000000375648000 Deferred win32u
PE 000000038b5a0000-000000038b5f2000 Deferred wldap32
PE 000000039a620000-000000039a644000 Deferred msvfw32
PE 000000039b510000-000000039b518000 Deferred api-ms-win-crt-heap-l1-1-0
PE 00000003a0440000-00000003a04c3000 Deferred wininet
PE 00000003a6d40000-00000003a6da3000 Deferred mfplat
PE 00000003a77e0000-00000003a77ec000 Deferred avicap32
PE 00000003ad720000-00000003ad74f000 Deferred devenum
PE 00000003af670000-00000003af730000 Deferred ucrtbase
PE 00000003afd00000-00000003afd1a000 Deferred imm32
PE 00000003b6dc0000-00000003b6de8000 Deferred winevulkan
PE 00000003b8f00000-00000003b8fc1000 Deferred winmm
PE 00000003be590000-00000003be5f3000 Deferred dbghelp
PE 00007fe8b64b0000-00007fe8b64b3000 Deferred wineopenxr
PE 00007fe8b6940000-00007fe8b6944000 Deferred winex11
PE 00007fe8b8e80000-00007fe8b8e83000 Deferred lsteamclient
Threads:
process tid prio (all id:s are in hex)
00000020 steam.exe
["C:\windows\system32\steam.exe" "/run/media/external2/steamapps/common/NBA Playgrounds 2/NBAPlaygrounds2.exe"]
00000024 0
0000010c 0
0000011c 0
00000030 services.exe
["C:\windows\system32\services.exe"]
00000034 0
00000038 0
00000044 0
00000064 0
00000088 0
0000009c 0
000000b4 0
000000e0 0
0000003c winedevice.exe
[C:\windows\system32\winedevice.exe]
00000040 0
0000004c 0
00000050 0
00000054 0
00000058 0
000000c0 0
0000005c winedevice.exe
[C:\windows\system32\winedevice.exe]
00000060 0
00000068 0
0000006c 0
00000070 0
00000074 0
00000078 0
0000007c 0
00000084 0
00000094 0
00000098 0
0000008c plugplay.exe
[C:\windows\system32\plugplay.exe]
00000090 0
000000a0 0
000000a4 0
000000a8 0
000002a8 0
000002ac 0
000000ac svchost.exe
[C:\windows\system32\svchost.exe -k LocalServiceNetworkRestricted]
000000b0 0
000000b8 0
000000bc 0
000000c4 explorer.exe
[C:\windows\system32\explorer.exe /desktop]
000000c8 0
000000cc 0
000000d0 0
000000d8 rpcss.exe
[C:\windows\system32\rpcss.exe]
000000dc 0
000000e8 0
000000ec 0
000000f0 0
000000f4 0
000000f8 0
00000100 tabtip.exe
["C:\windows\system32\tabtip.exe"]
00000104 0
00000108 0
00000110 0
00000114 NBAPlaygrounds2.exe
["E:\steamapps\common\NBA Playgrounds 2\NBAPlaygrounds2.exe"]
00000118 0
00000120 (D) E:\steamapps\common\NBA Playgrounds 2\NBAPlaygrounds2\Binaries\Win64\NBAPlaygrounds2-Win64-Shipping.exe
["E:\steamapps\common\NBA Playgrounds 2\NBAPlaygrounds2/Binaries/Win64/NBAPlaygrounds2-Win64-Shipping.exe" NBAPlaygrounds2 ]
00000124 1
00000128 0
0000012c -1
00000130 -1
00000134 -1
00000138 -1
0000013c -1
00000140 -1
00000144 -1
00000148 -1
0000014c 0
00000150 0
00000154 0
00000158 0
0000015c 0
00000160 0
00000164 0
00000168 -2
0000016c -2
00000170 -2
00000174 -2
00000178 -2
0000017c -2
00000180 -2
00000184 0
00000188 0
0000018c 0
00000190 0
00000194 0
00000198 0
0000019c 0
000001a0 -2
000001a4 -2
000001a8 1
000001ac 1
000001b0 2
000001b4 2
000001b8 2
000001bc 2
000001cc 0
000001d0 0
000001d4 0
000001e0 0
000001e4 0 <==
000001e8 1
000001ec 0
000001fc 0
00000200 0
00000204 15
00000208 0
00000214 1
00000218 0
0000021c -2
00000220 -2
00000224 -2
00000228 1
0000022c -2
00000230 -2
00000234 -2
00000238 -2
0000023c -2
00000240 0
00000244 1
00000248 1
0000024c 1
00000250 1
00000254 1
00000258 1
0000025c 1
00000260 1
00000264 1
00000268 0
0000026c 0
00000270 0
00000274 0
00000278 0
0000027c 15
00000280 15
00000284 -1
00000288 0
0000028c 0
00000290 0
00000294 0
00000298 0
0000029c 0
000002a0 0
000002a4 0
000002b0 0
000002b4 0
000002b8 0
000002bc 0
000002c0 0
000002c4 0
000002c8 0
000002cc 0
000002d0 0
000002d4 0
000002d8 0
000002dc 0
000002e0 0
000002e4 0
000002e8 0
000002ec 1
000002f0 2
0000030c 1
0000032c 0
System information:
Wine build: wine-7.0 (Staging)
Platform: x86_64
Version: Windows 10
Host system: Linux
Host version: 5.13.0-valve36-1-neptune
19179.454:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 0000000205950000: builtin
19179.454:0114:0118:fixme:kernelbase:AppPolicyGetProcessTerminationMethod FFFFFFFFFFFFFFFA, 00000000004EFEB0
pid 59413 != 59412, skipping destruction (fork without exec?)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment