Untitled
System information: Wine build: wine-9.0 (Staging) Platform: x86_64 (guest: i386) Version: Windows 10 Host system: Linux Host version: 6.11.10-304.bazzite.fc41.x86_64 7345.771:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc0000005. 7345.771:0124:0128:trace:seh:dispatch_exception code=c0000005 flags=0 addr=00006FFFFAAA6A22 ip=6ffffaaa6a22 7345.771:0124:0128:trace:seh:dispatch_exception info[0]=0000000000000000 7345.771:0124:0128:trace:seh:dispatch_exception info[1]=0000000000000010 7345.771:0124:0128:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised 7345.771:0124:0128:trace:seh:dispatch_exception rax=000000000000017a rbx=000000000081e7b0 rcx=0000000000000000 rdx=0000000000000000 7345.771:0124:0128:trace:seh:dispatch_exception rsi=000000000081e6a8 rdi=0000000000000000 rbp=000000000081e540 rsp=000000000081e520 7345.771:0124:0128:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000000008 r11=0000000000000202 7345.771:0124:0128:trace:seh:dispatch_exception r12=000000012d040080 r13=0000000000000000 r14=000000012d042468 r15=00006ffffab36920 7345.771:0124:0128:trace:seh:call_vectored_handlers calling handler at 00006FFFFA8E0680 code=c0000005 flags=0 7345.771:0124:0128:trace:seh:call_vectored_handlers handler at 00006FFFFA8E0680 returned 0 7345.771:0124:0128:trace:seh:call_vectored_handlers calling handler at 00006FFFFD46B190 code=c0000005 flags=0 7345.771:0124:0128:trace:seh:call_vectored_handlers handler at 00006FFFFD46B190 returned 0 7345.771:0124:0128:trace:seh:call_vectored_handlers calling handler at 00006FFFFD83C060 code=c0000005 flags=0 7345.771:0124:0128:trace:seh:call_vectored_handlers handler at 00006FFFFD83C060 returned 0 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAA6A22: L"d3d12core.dll" + 00000000001E6A22. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaaa6a22 rsp 81e520 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 1e6a10-1e6b11 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC6BA4 flags 0 prolog 0xf bytes function 00006FFFFAAA6A10-00006FFFFAAA6B11 7345.771:0124:0128:trace:unwind:dump_unwind_info frame register rbp offset 0x20(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xf: leaq 0x20(%rsp),rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: subq $0x20,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x5: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x4: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x3: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1: pushq %rbp 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAA811A: L"d3d12core.dll" + 00000000001E811A. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaaa811a rsp 81e570 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 1e6e70-1e8ada 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC2ABC flags 0 prolog 0x1b bytes function 00006FFFFAAA6E70-00006FFFFAAA8ADA 7345.771:0124:0128:trace:unwind:dump_unwind_info frame register rbp offset 0xb0(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1b: leaq 0xb0(%rsp),rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x13: subq $0xb8,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xb: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x9: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x7: pushq %r13 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x5: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x3: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1: pushq %rbp 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAE1FAC: L"d3d12core.dll" + 0000000000221FAC. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaae1fac rsp 81e670 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 221f30-2220c4 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC48C0 flags 0 prolog 0xe bytes function 00006FFFFAAE1F30-00006FFFFAAE20C4 7345.771:0124:0128:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xe: leaq 0x40(%rsp),rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x9: subq $0x48,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x5: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x4: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x3: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1: pushq %rbp 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAC6D7C: L"d3d12core.dll" + 0000000000206D7C. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaac6d7c rsp 81e6e0 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 2066f0-207404 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC215C flags 0 prolog 0x1b bytes function 00006FFFFAAC66F0-00006FFFFAAC7404 7345.771:0124:0128:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x13: subq $0x5a8,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xb: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x9: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x7: pushq %r13 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x5: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x3: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1: pushq %rbp 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAD318B7: L"d3d12.dll" + 00000000000118B7. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffad318b7 rsp 81ecd0 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 11860-118cf 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFAD4208C flags 0 prolog 0xf bytes function 00006FFFFAD31860-00006FFFFAD318CF 7345.771:0124:0128:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xf: leaq 0x30(%rsp),rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x5: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x4: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x3: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1: pushq %rbp 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind inside epilog. 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D10DC1: L"PathOfExileSteam.exe" + 0000000000D10DC1. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d10dc1 rsp 81ed30 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d10cb0-d10f33 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CBEC30 flags 2 prolog 0x1d bytes function 0000000140D10CB0-0000000140D10F33 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1d: movq %rbx,0x1c8(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1d: subq $0x180,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x11: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xf: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xd: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xb: pushq %rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142CBEC4C 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D120B1: L"PathOfExileSteam.exe" + 0000000000D120B1. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d120b1 rsp 81eee0 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d11c70-d131c5 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CBEE0C flags 2 prolog 0x2f bytes function 0000000140D11C70-0000000140D131C5 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x2f: subq $0x368,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x20: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1e: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1c: pushq %r13 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1a: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x18: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x17: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x16: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x15: pushq %rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142CBEE28 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D396CF: L"PathOfExileSteam.exe" + 0000000000D396CF. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d396cf rsp 81f290 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d395d0-d3985a 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CC2E80 flags 2 prolog 0x12 bytes function 0000000140D395D0-0000000140D3985A 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x12: movq %rbp,0x98(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x12: movq %rbx,0x90(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x12: subq $0x70,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xe: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xb: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142CC2E98 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140C8B112: L"PathOfExileSteam.exe" + 0000000000C8B112. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140c8b112 rsp 81f320 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func c8aef0-c8b274 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CB5B24 flags 2 prolog 0x18 bytes function 0000000140C8AEF0-0000000140C8B274 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x18: movq %rbx,0x1a0(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x18: subq $0x160,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x8: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x7: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: pushq %rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142CB5B40 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140C8AC1E: L"PathOfExileSteam.exe" + 0000000000C8AC1E. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140c8ac1e rsp 81f4b0 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func c8ac00-c8ac28 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CB5A4C flags 3 prolog 0xd bytes function 0000000140C8AC00-0000000140C8AC28 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xd: subq $0x160,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142CB5A5C 7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232364C (rec=000000000081E270, frame=000000000081F4B0 context=000000000081D7D0, dispatch=000000000081D6A0) 7345.771:0124:0128:trace:seh:call_handler handler at 000000014232364C returned 1 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140C90AC5: L"PathOfExileSteam.exe" + 0000000000C90AC5. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140c90ac5 rsp 81f620 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func c90460-c90b13 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CB6180 flags 2 prolog 0x1c bytes function 0000000140C90460-0000000140C90B13 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1c: subq $0x198,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xd: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xb: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x9: pushq %r13 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x7: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x5: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x4: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x3: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x2: pushq %rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142CB619C 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400D86FF: L"PathOfExileSteam.exe" + 00000000000D86FF. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400d86ff rsp 81f800 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d8430-d88ed 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BCEF18 flags 2 prolog 0x19 bytes function 00000001400D8430-00000001400D88ED 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x19: movq %rbp,0x150(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x19: movq %rbx,0x140(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x19: subq $0x110,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x12: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x10: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xe: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xb: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142BCEF38 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 000000014139B64C: L"PathOfExileSteam.exe" + 000000000139B64C. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 14139b64c rsp 81f940 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 139b580-139b8ca 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142D50400 flags 2 prolog 0x22 bytes function 000000014139B580-000000014139B8CA 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x22: movaps %xmm7,0x140(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1e: movaps %xmm6,0x150(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1a: movq %rsi,0x190(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1a: movq %rbx,0x188(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1a: subq $0x160,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xf: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xd: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142D50424 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001411FA909: L"PathOfExileSteam.exe" + 00000000011FA909. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1411fa909 rsp 81fac0 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 11fa7f0-11faa65 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142D2A2BC flags 2 prolog 0x27 bytes function 00000001411FA7F0-00000001411FAA65 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x27: movaps %xmm8,0x140(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x22: movaps %xmm7,0x150(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1e: movaps %xmm6,0x160(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1a: subq $0x170,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xe: pushq %r14 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xc: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xb: pushq %rsi 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x9: pushq %rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142D2A2E0 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D71815: L"PathOfExileSteam.exe" + 0000000000D71815. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d71815 rsp 81fc60 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d715f7-d7193f 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CC82A0 flags 4 prolog 0x4e bytes function 0000000140D715F7-0000000140D7193F 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x4e: movaps %xmm7,0x80(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x46: movaps %xmm6,0x90(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x3e: movq %rdi,0xb8(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x36: movq %rbx,0xc8(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x25: movaps %xmm8,0x70(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x18: movq %r14,0xa8(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x10: movq %r13,0xb0(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x8: movq %rbp,0xc0(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info chained to function 0000000140D715B0-0000000140D715F7 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CC8290 flags 0 prolog 0xd bytes function 0000000140D715B0-0000000140D715F7 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xd: subq $0xd0,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: pushq %r15 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x4: pushq %r12 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x2: pushq %rsi 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2A70: L"PathOfExileSteam.exe" + 00000000000E2A70. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2a70 rsp 81fd50 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2a50-e2a76 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD01F4 flags 3 prolog 0x4 bytes function 00000001400E2A50-00000001400E2A76 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142BD0200 7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232364C (rec=000000000081E270, frame=000000000081FD50 context=000000000081D7D0, dispatch=000000000081D6A0) 7345.771:0124:0128:trace:seh:call_handler handler at 000000014232364C returned 1 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2BB7: L"PathOfExileSteam.exe" + 00000000000E2BB7. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2bb7 rsp 81fd80 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2a80-e2c9d 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD0228 flags 2 prolog 0x1c bytes function 00000001400E2A80-00000001400E2C9D 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1c: movq %rdi,0x140(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1c: movq %rsi,0x138(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1c: movq %rbx,0x130(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x1c: subq $0x120,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x10: pushq %rbp 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142BD0244 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2DC0: L"PathOfExileSteam.exe" + 00000000000E2DC0. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2dc0 rsp 81feb0 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2d80-e2dcd 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD0294 flags 1 prolog 0x6 bytes function 00000001400E2D80-00000001400E2DCD 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: subq $0x20,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x2: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232370C data at 0000000142BD02A0 7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232370C (rec=000000000081E270, frame=000000000081FEB0 context=000000000081D7D0, dispatch=000000000081D6A0) 7345.771:0124:0128:trace:seh:call_handler handler at 000000014232370C returned 1 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2E99: L"PathOfExileSteam.exe" + 00000000000E2E99. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2e99 rsp 81fee0 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2dd0-e2ea0 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD02B4 flags 3 prolog 0x6 bytes function 00000001400E2DD0-00000001400E2EA0 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: subq $0x50,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x2: pushq %rbx 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232364C data at 0000000142BD02C0 7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232364C (rec=000000000081E270, frame=000000000081FEE0 context=000000000081D7D0, dispatch=000000000081D6A0) 7345.771:0124:0128:trace:seh:call_handler handler at 000000014232364C returned 1 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001422CC532: L"PathOfExileSteam.exe" + 00000000022CC532. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1422cc532 rsp 81ff40 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 22cc42c-22cc59d 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142E553FC flags 1 prolog 0xa bytes function 00000001422CC42C-00000001422CC59D 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: movq %rbx,0x40(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x6: pushq %rdi 7345.771:0124:0128:trace:unwind:dump_unwind_info handler 000000014232370C data at 0000000142E5540C 7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232370C (rec=000000000081E270, frame=000000000081FF40 context=000000000081D7D0, dispatch=000000000081D6A0) 7345.771:0124:0128:trace:seh:call_handler handler at 000000014232370C returned 1 7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFFED482D: L"kernel32.dll" + 000000000001482D. 7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6fffffed482d rsp 81ff80 7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 14820-14836 7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFFF03D8C flags 0 prolog 0x8 bytes function 00006FFFFFED4820-00006FFFFFED4836 7345.771:0124:0128:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp) 7345.771:0124:0128:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp 7345.772:0124:0128:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp 7345.772:0124:0128:trace:unwind:dump_unwind_info 0x1: pushq %rbp 7345.772:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFFF4F44F: L"ntdll.dll" + 000000000000F44F. 7345.772:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffff4f44f rsp 81ffb0 7345.772:0124:0128:trace:unwind:dump_unwind_info **** func f438-f450 7345.772:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFDDD5C flags 1 prolog 0x4 bytes function 00006FFFFFF4F438-00006FFFFFF4F450 7345.772:0124:0128:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp 7345.772:0124:0128:trace:unwind:dump_unwind_info handler 00006FFFFFF82950 data at 00006FFFFFFDDD68 7345.772:0124:0128:trace:seh:call_handler calling handler 00006FFFFFF82950 (rec=000000000081E270, frame=000000000081FFB0 context=000000000081D7D0, dispatch=000000000081D6A0) 7345.950:00e0:0278:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker" 7345.972:0030:0280:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker" 7345.973:0030:027c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker" 7345.975:0030:0284:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker" 7345.976:0030:0288:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker" 7345.977:0030:028c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
Leave a Comment