Created
May 9, 2020 22:28
-
-
Save thebozzcl/d443097713938069abb233dabd4bba47 to your computer and use it in GitHub Desktop.
Extracts from Doom Eternal freezes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
10005.047:002d:002e:trace:seh:dwarf_virtual_unwind next function rip=0000000140325af5 | |
10005.047:002d:002e:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=00000000075a1cb0 rcx=00000000008f64f0 rdx=000000007b475166 | |
10005.047:002d:002e:trace:seh:dwarf_virtual_unwind rsi=0000000000000005 rdi=0000000143fd5c20 rbp=00000000008f7cc0 rsp=00000000008f7bc0 | |
10005.047:002d:002e:trace:seh:dwarf_virtual_unwind r8=00000000008f7770 r9=000000007b4751a0 r10=000000007bd225a8 r11=0000000000000000 | |
10005.047:002d:002e:trace:seh:dwarf_virtual_unwind r12=0000000000000017 r13=0000000000000001 r14=0000000000000000 r15=ffffffffffffffff | |
10005.047:002d:002e:trace:seh:RtlRestoreContext returning to 7b475166 stack 8f7830 | |
10005.132:001d:0021:fixme:mountmgr:harddisk_ioctl The DISK_PARTITION_INFO and DISK_DETECTION_INFO structures will not be filled | |
10005.134:001d:0021:fixme:mountmgr:harddisk_ioctl The DISK_PARTITION_INFO and DISK_DETECTION_INFO structures will not be filled | |
10005.135:001d:0021:fixme:mountmgr:harddisk_ioctl The DISK_PARTITION_INFO and DISK_DETECTION_INFO structures will not be filled | |
10005.137:001d:0021:fixme:mountmgr:harddisk_ioctl The DISK_PARTITION_INFO and DISK_DETECTION_INFO structures will not be filled | |
10010.201:002d:002e:warn:debugstr:OutputDebugStringA "WARNING: PumpSessionAndNetworkPackets: Not called for 5.14 seconds\n" | |
10010.201:002d:002e:trace:seh:raise_exception code=40010006 flags=0 addr=0x7b00fdce ip=7b00fdce tid=002e | |
10010.201:002d:002e:trace:seh:raise_exception info[0]=0000000000000044 | |
10010.201:002d:002e:trace:seh:raise_exception info[1]=00000000008fef10 | |
10010.201:002d:002e:trace:seh:raise_exception rax=00000000008fe930 rbx=00007fffffea8000 rcx=00000000008fe910 rdx=0000000000000000 | |
10010.201:002d:002e:trace:seh:raise_exception rsi=00000000008fea10 rdi=00000000008fe940 rbp=00000000008fed50 rsp=00000000008fe8f0 | |
10010.201:002d:002e:trace:seh:raise_exception r8=0000000000000002 r9=00000000008fea00 r10=000000007b47aa26 r11=0000000000000000 | |
10010.201:002d:002e:trace:seh:raise_exception r12=0000000000000001 r13=0000000000000001 r14=000000014293fd90 r15=ffffffffffffffff | |
10010.201:002d:002e:trace:seh:call_vectored_handlers calling handler at 0x14094ae30 code=40010006 flags=0 | |
10010.201:002d:002e:trace:seh:call_vectored_handlers handler at 0x14094ae30 returned 0 | |
10010.201:002d:002e:trace:seh:RtlVirtualUnwind type 1 rip 7b00fdce rsp 8fe8f0 | |
10010.201:002d:002e:trace:seh:dump_unwind_info **** func fd80-fe07 | |
10010.201:002d:002e:trace:seh:dump_unwind_info unwind info at 0x7b08e344 flags 0 prolog 0x11 bytes function 0x7b00fd80-0x7b00fe07 | |
10010.201:002d:002e:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp | |
10010.201:002d:002e:trace:seh:dump_unwind_info 0xa: pushq %rsi | |
10010.201:002d:002e:trace:seh:dump_unwind_info 0x9: pushq %rdi | |
10010.201:002d:002e:trace:seh:dwarf_virtual_unwind function 7b439ca1 base 0x7b439a58 cie 0x7b490710 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip | |
10010.203:002d:002e:trace:seh:dwarf_virtual_unwind next function rip=0000000140325af5 | |
10010.203:002d:002e:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=00000000075a1cb0 rcx=00000000008fd690 rdx=000000007b475166 | |
10010.203:002d:002e:trace:seh:dwarf_virtual_unwind rsi=0000000000000005 rdi=0000000000000001 rbp=00000000008fee60 rsp=00000000008fed60 | |
10010.203:002d:002e:trace:seh:dwarf_virtual_unwind r8=00000000008fe910 r9=000000007b4751a0 r10=000000007bd225a8 r11=0000000000000000 | |
10010.203:002d:002e:trace:seh:dwarf_virtual_unwind r12=0000000000000001 r13=0000000000000001 r14=000000014293fd90 r15=ffffffffffffffff | |
10010.203:002d:002e:trace:seh:RtlRestoreContext returning to 7b475166 stack 8fe9d0 | |
10015.226:002d:002e:warn:debugstr:OutputDebugStringA "WARNING: PumpSessionAndNetworkPackets: Not called for 5.03 seconds\n" | |
10015.301:002d:002e:trace:seh:raise_exception code=40010006 flags=0 addr=0x7b00fdce ip=7b00fdce tid=002e | |
10015.301:002d:002e:trace:seh:raise_exception info[0]=0000000000000044 | |
10015.301:002d:002e:trace:seh:raise_exception info[1]=00000000008fef10 | |
10015.301:002d:002e:trace:seh:raise_exception rax=00000000008fe930 rbx=00007fffffea8000 rcx=00000000008fe910 rdx=0000000000000000 | |
10015.301:002d:002e:trace:seh:raise_exception rsi=00000000008fea10 rdi=00000000008fe940 rbp=00000000008fed50 rsp=00000000008fe8f0 | |
10015.301:002d:002e:trace:seh:raise_exception r8=0000000000000002 r9=00000000008fea00 r10=000000007b47aa26 r11=0000000000000000 | |
10015.301:002d:002e:trace:seh:raise_exception r12=0000000000000001 r13=0000000000000001 r14=000000014293fd90 r15=ffffffffffffffff | |
10015.301:002d:002e:trace:seh:call_vectored_handlers calling handler at 0x14094ae30 code=40010006 flags=0 | |
10015.301:002d:002e:trace:seh:call_vectored_handlers handler at 0x14094ae30 returned 0 | |
10015.302:002d:002e:trace:seh:dwarf_virtual_unwind next function rip=0000000140325af5 | |
10015.302:002d:002e:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=00000000075a1cb0 rcx=00000000008fd690 rdx=000000007b475166 | |
10015.302:002d:002e:trace:seh:dwarf_virtual_unwind rsi=0000000000000005 rdi=0000000000000001 rbp=00000000008fee60 rsp=00000000008fed60 | |
10015.302:002d:002e:trace:seh:dwarf_virtual_unwind r8=00000000008fe910 r9=000000007b4751a0 r10=000000007bd225a8 r11=0000000000000000 | |
10015.302:002d:002e:trace:seh:dwarf_virtual_unwind r12=0000000000000001 r13=0000000000000001 r14=000000014293fd90 r15=ffffffffffffffff | |
10015.302:002d:002e:trace:seh:RtlRestoreContext returning to 7b475166 stack 8fe9d0 | |
10015.432:002d:003e:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\dxvk_config.dll" at 0x69040000: native | |
10020.444:002d:002e:warn:debugstr:OutputDebugStringA "WARNING: PumpSessionAndNetworkPackets: Not called for 5.00 seconds\n" | |
10020.518:002d:002e:trace:seh:raise_exception code=40010006 flags=0 addr=0x7b00fdce ip=7b00fdce tid=002e | |
10020.518:002d:002e:trace:seh:raise_exception info[0]=0000000000000044 | |
10020.518:002d:002e:trace:seh:raise_exception info[1]=00000000008fef10 | |
10020.518:002d:002e:trace:seh:raise_exception rax=00000000008fe930 rbx=00007fffffea8000 rcx=00000000008fe910 rdx=0000000000000000 | |
10020.518:002d:002e:trace:seh:raise_exception rsi=00000000008fea10 rdi=00000000008fe940 rbp=00000000008fed50 rsp=00000000008fe8f0 | |
10020.518:002d:002e:trace:seh:raise_exception r8=0000000000000002 r9=00000000008fea00 r10=000000007b47aa26 r11=0000000000000000 | |
10020.518:002d:002e:trace:seh:raise_exception r12=0000000000000001 r13=0000000000000001 r14=000000014293fd90 r15=ffffffffffffffff | |
10020.518:002d:002e:trace:seh:call_vectored_handlers calling handler at 0x69060d70 code=40010006 flags=0 | |
10020.518:002d:002e:trace:seh:call_vectored_handlers handler at 0x69060d70 returned 0 | |
10020.518:002d:002e:trace:seh:call_vectored_handlers calling handler at 0x14094ae30 code=40010006 flags=0 | |
10020.518:002d:002e:trace:seh:call_vectored_handlers handler at 0x14094ae30 returned 0 | |
10020.518:002d:002e:trace:seh:RtlVirtualUnwind type 1 rip 7b00fdce rsp 8fe8f0 | |
10020.518:002d:002e:trace:seh:dump_unwind_info **** func fd80-fe07 | |
10020.518:002d:002e:trace:seh:dump_unwind_info unwind info at 0x7b08e344 flags 0 prolog 0x11 bytes function 0x7b00fd80-0x7b00fe07 | |
10020.518:002d:002e:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp | |
10020.518:002d:002e:trace:seh:dump_unwind_info 0xa: pushq %rsi | |
10020.518:002d:002e:trace:seh:dump_unwind_info 0x9: pushq %rdi | |
10020.518:002d:002e:trace:seh:dwarf_virtual_unwind function 7b439ca1 base 0x7b439a58 cie 0x7b490710 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip | |
10020.520:002d:002e:trace:seh:dwarf_virtual_unwind next function rip=0000000140325af5 | |
10020.520:002d:002e:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=00000000075a1cb0 rcx=00000000008fd690 rdx=000000007b475166 | |
10020.520:002d:002e:trace:seh:dwarf_virtual_unwind rsi=0000000000000005 rdi=0000000000000001 rbp=00000000008fee60 rsp=00000000008fed60 | |
10020.520:002d:002e:trace:seh:dwarf_virtual_unwind r8=00000000008fe910 r9=000000007b4751a0 r10=000000007bd225a8 r11=0000000000000000 | |
10020.520:002d:002e:trace:seh:dwarf_virtual_unwind r12=0000000000000001 r13=0000000000000001 r14=000000014293fd90 r15=ffffffffffffffff | |
10020.520:002d:002e:trace:seh:RtlRestoreContext returning to 7b475166 stack 8fe9d0 | |
10020.992:0023:0025:err:clipboard:convert_selection Timed out waiting for SelectionNotify event | |
10021.525:0023:0025:err:clipboard:convert_selection Timed out waiting for SelectionNotify event | |
10025.461:002d:002e:warn:debugstr:OutputDebugStringA "WARNING: PumpSessionAndNetworkPackets: Not called for 5.02 seconds\n" | |
10025.617:002d:002e:trace:seh:raise_exception code=40010006 flags=0 addr=0x7b00fdce ip=7b00fdce tid=002e | |
10025.617:002d:002e:trace:seh:raise_exception info[0]=0000000000000044 | |
10025.617:002d:002e:trace:seh:raise_exception info[1]=00000000008fef10 | |
10025.617:002d:002e:trace:seh:raise_exception rax=00000000008fe930 rbx=00007fffffea8000 rcx=00000000008fe910 rdx=0000000000000000 | |
10025.617:002d:002e:trace:seh:raise_exception rsi=00000000008fea10 rdi=00000000008fe940 rbp=00000000008fed50 rsp=00000000008fe8f0 | |
10025.617:002d:002e:trace:seh:raise_exception r8=0000000000000002 r9=00000000008fea00 r10=000000007b47aa26 r11=0000000000000000 | |
10025.617:002d:002e:trace:seh:raise_exception r12=0000000000000001 r13=0000000000000001 r14=000000014293fd90 r15=ffffffffffffffff | |
10025.617:002d:002e:trace:seh:call_vectored_handlers calling handler at 0x69060d70 code=40010006 flags=0 | |
10025.617:002d:002e:trace:seh:call_vectored_handlers handler at 0x69060d70 returned 0 | |
10025.617:002d:002e:trace:seh:call_vectored_handlers calling handler at 0x14094ae30 code=40010006 flags=0 | |
10025.617:002d:002e:trace:seh:call_vectored_handlers handler at 0x14094ae30 returned 0 | |
10025.617:002d:002e:trace:seh:RtlVirtualUnwind type 1 rip 7b00fdce rsp 8fe8f0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment