Untitled

 avatar
unknown
plain_text
a month ago
25 kB
13
Indexable
System information:
    Wine build: wine-9.0 (Staging)
    Platform: x86_64 (guest: i386)
    Version: Windows 10
    Host system: Linux
    Host version: 6.11.10-304.bazzite.fc41.x86_64
7345.771:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc0000005.
7345.771:0124:0128:trace:seh:dispatch_exception code=c0000005 flags=0 addr=00006FFFFAAA6A22 ip=6ffffaaa6a22
7345.771:0124:0128:trace:seh:dispatch_exception  info[0]=0000000000000000
7345.771:0124:0128:trace:seh:dispatch_exception  info[1]=0000000000000010
7345.771:0124:0128:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
7345.771:0124:0128:trace:seh:dispatch_exception  rax=000000000000017a rbx=000000000081e7b0 rcx=0000000000000000 rdx=0000000000000000
7345.771:0124:0128:trace:seh:dispatch_exception  rsi=000000000081e6a8 rdi=0000000000000000 rbp=000000000081e540 rsp=000000000081e520
7345.771:0124:0128:trace:seh:dispatch_exception   r8=0000000000000000  r9=0000000000000000 r10=0000000000000008 r11=0000000000000202
7345.771:0124:0128:trace:seh:dispatch_exception  r12=000000012d040080 r13=0000000000000000 r14=000000012d042468 r15=00006ffffab36920
7345.771:0124:0128:trace:seh:call_vectored_handlers calling handler at 00006FFFFA8E0680 code=c0000005 flags=0
7345.771:0124:0128:trace:seh:call_vectored_handlers handler at 00006FFFFA8E0680 returned 0
7345.771:0124:0128:trace:seh:call_vectored_handlers calling handler at 00006FFFFD46B190 code=c0000005 flags=0
7345.771:0124:0128:trace:seh:call_vectored_handlers handler at 00006FFFFD46B190 returned 0
7345.771:0124:0128:trace:seh:call_vectored_handlers calling handler at 00006FFFFD83C060 code=c0000005 flags=0
7345.771:0124:0128:trace:seh:call_vectored_handlers handler at 00006FFFFD83C060 returned 0
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAA6A22: L"d3d12core.dll" + 00000000001E6A22.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaaa6a22 rsp 81e520
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 1e6a10-1e6b11
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC6BA4 flags 0 prolog 0xf bytes function 00006FFFFAAA6A10-00006FFFFAAA6B11
7345.771:0124:0128:trace:unwind:dump_unwind_info     frame register rbp offset 0x20(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xf: leaq 0x20(%rsp),rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: subq $0x20,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x5: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x4: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x3: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1: pushq %rbp
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAA811A: L"d3d12core.dll" + 00000000001E811A.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaaa811a rsp 81e570
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 1e6e70-1e8ada
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC2ABC flags 0 prolog 0x1b bytes function 00006FFFFAAA6E70-00006FFFFAAA8ADA
7345.771:0124:0128:trace:unwind:dump_unwind_info     frame register rbp offset 0xb0(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1b: leaq 0xb0(%rsp),rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x13: subq $0xb8,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xb: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x9: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x7: pushq %r13
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x5: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x3: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1: pushq %rbp
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAE1FAC: L"d3d12core.dll" + 0000000000221FAC.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaae1fac rsp 81e670
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 221f30-2220c4
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC48C0 flags 0 prolog 0xe bytes function 00006FFFFAAE1F30-00006FFFFAAE20C4
7345.771:0124:0128:trace:unwind:dump_unwind_info     frame register rbp offset 0x40(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xe: leaq 0x40(%rsp),rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x9: subq $0x48,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x5: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x4: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x3: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1: pushq %rbp
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAAC6D7C: L"d3d12core.dll" + 0000000000206D7C.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffaac6d7c rsp 81e6e0
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 2066f0-207404
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFABC215C flags 0 prolog 0x1b bytes function 00006FFFFAAC66F0-00006FFFFAAC7404
7345.771:0124:0128:trace:unwind:dump_unwind_info     frame register rbp offset 0x80(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1b: leaq 0x80(%rsp),rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x13: subq $0x5a8,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xb: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x9: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x7: pushq %r13
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x5: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x3: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1: pushq %rbp
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFAD318B7: L"d3d12.dll" + 00000000000118B7.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffad318b7 rsp 81ecd0
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 11860-118cf
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFAD4208C flags 0 prolog 0xf bytes function 00006FFFFAD31860-00006FFFFAD318CF
7345.771:0124:0128:trace:unwind:dump_unwind_info     frame register rbp offset 0x30(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xf: leaq 0x30(%rsp),rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: subq $0x30,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x5: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x4: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x3: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1: pushq %rbp
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind inside epilog.
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D10DC1: L"PathOfExileSteam.exe" + 0000000000D10DC1.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d10dc1 rsp 81ed30
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d10cb0-d10f33
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CBEC30 flags 2 prolog 0x1d bytes function 0000000140D10CB0-0000000140D10F33
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1d: movq %rbx,0x1c8(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1d: subq $0x180,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x11: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xf: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xd: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xb: pushq %rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142CBEC4C
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D120B1: L"PathOfExileSteam.exe" + 0000000000D120B1.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d120b1 rsp 81eee0
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d11c70-d131c5
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CBEE0C flags 2 prolog 0x2f bytes function 0000000140D11C70-0000000140D131C5
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x2f: subq $0x368,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x20: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1e: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1c: pushq %r13
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1a: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x18: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x17: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x16: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x15: pushq %rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142CBEE28
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D396CF: L"PathOfExileSteam.exe" + 0000000000D396CF.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d396cf rsp 81f290
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d395d0-d3985a
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CC2E80 flags 2 prolog 0x12 bytes function 0000000140D395D0-0000000140D3985A
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x12: movq %rbp,0x98(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x12: movq %rbx,0x90(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x12: subq $0x70,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xe: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xb: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142CC2E98
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140C8B112: L"PathOfExileSteam.exe" + 0000000000C8B112.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140c8b112 rsp 81f320
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func c8aef0-c8b274
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CB5B24 flags 2 prolog 0x18 bytes function 0000000140C8AEF0-0000000140C8B274
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x18: movq %rbx,0x1a0(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x18: subq $0x160,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x8: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x7: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: pushq %rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142CB5B40
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140C8AC1E: L"PathOfExileSteam.exe" + 0000000000C8AC1E.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140c8ac1e rsp 81f4b0
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func c8ac00-c8ac28
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CB5A4C flags 3 prolog 0xd bytes function 0000000140C8AC00-0000000140C8AC28
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xd: subq $0x160,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142CB5A5C
7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232364C (rec=000000000081E270, frame=000000000081F4B0 context=000000000081D7D0, dispatch=000000000081D6A0)
7345.771:0124:0128:trace:seh:call_handler handler at 000000014232364C returned 1
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140C90AC5: L"PathOfExileSteam.exe" + 0000000000C90AC5.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140c90ac5 rsp 81f620
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func c90460-c90b13
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CB6180 flags 2 prolog 0x1c bytes function 0000000140C90460-0000000140C90B13
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1c: subq $0x198,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xd: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xb: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x9: pushq %r13
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x7: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x5: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x4: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x3: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x2: pushq %rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142CB619C
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400D86FF: L"PathOfExileSteam.exe" + 00000000000D86FF.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400d86ff rsp 81f800
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d8430-d88ed
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BCEF18 flags 2 prolog 0x19 bytes function 00000001400D8430-00000001400D88ED
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x19: movq %rbp,0x150(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x19: movq %rbx,0x140(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x19: subq $0x110,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x12: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x10: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xe: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xb: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142BCEF38
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 000000014139B64C: L"PathOfExileSteam.exe" + 000000000139B64C.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 14139b64c rsp 81f940
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 139b580-139b8ca
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142D50400 flags 2 prolog 0x22 bytes function 000000014139B580-000000014139B8CA
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x22: movaps %xmm7,0x140(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1e: movaps %xmm6,0x150(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1a: movq %rsi,0x190(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1a: movq %rbx,0x188(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1a: subq $0x160,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xf: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xd: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142D50424
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001411FA909: L"PathOfExileSteam.exe" + 00000000011FA909.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1411fa909 rsp 81fac0
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 11fa7f0-11faa65
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142D2A2BC flags 2 prolog 0x27 bytes function 00000001411FA7F0-00000001411FAA65
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x27: movaps %xmm8,0x140(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x22: movaps %xmm7,0x150(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1e: movaps %xmm6,0x160(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1a: subq $0x170,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xe: pushq %r14
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xc: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xb: pushq %rsi
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x9: pushq %rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142D2A2E0
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 0000000140D71815: L"PathOfExileSteam.exe" + 0000000000D71815.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 140d71815 rsp 81fc60
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func d715f7-d7193f
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CC82A0 flags 4 prolog 0x4e bytes function 0000000140D715F7-0000000140D7193F
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x4e: movaps %xmm7,0x80(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x46: movaps %xmm6,0x90(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x3e: movq %rdi,0xb8(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x36: movq %rbx,0xc8(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x25: movaps %xmm8,0x70(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x18: movq %r14,0xa8(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x10: movq %r13,0xb0(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x8: movq %rbp,0xc0(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     chained to function 0000000140D715B0-0000000140D715F7
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142CC8290 flags 0 prolog 0xd bytes function 0000000140D715B0-0000000140D715F7
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xd: subq $0xd0,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: pushq %r15
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x4: pushq %r12
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x2: pushq %rsi
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2A70: L"PathOfExileSteam.exe" + 00000000000E2A70.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2a70 rsp 81fd50
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2a50-e2a76
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD01F4 flags 3 prolog 0x4 bytes function 00000001400E2A50-00000001400E2A76
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x4: subq $0x28,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142BD0200
7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232364C (rec=000000000081E270, frame=000000000081FD50 context=000000000081D7D0, dispatch=000000000081D6A0)
7345.771:0124:0128:trace:seh:call_handler handler at 000000014232364C returned 1
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2BB7: L"PathOfExileSteam.exe" + 00000000000E2BB7.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2bb7 rsp 81fd80
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2a80-e2c9d
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD0228 flags 2 prolog 0x1c bytes function 00000001400E2A80-00000001400E2C9D
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1c: movq %rdi,0x140(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1c: movq %rsi,0x138(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1c: movq %rbx,0x130(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x1c: subq $0x120,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x10: pushq %rbp
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142BD0244
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2DC0: L"PathOfExileSteam.exe" + 00000000000E2DC0.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2dc0 rsp 81feb0
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2d80-e2dcd
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD0294 flags 1 prolog 0x6 bytes function 00000001400E2D80-00000001400E2DCD
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: subq $0x20,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x2: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232370C data at 0000000142BD02A0
7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232370C (rec=000000000081E270, frame=000000000081FEB0 context=000000000081D7D0, dispatch=000000000081D6A0)
7345.771:0124:0128:trace:seh:call_handler handler at 000000014232370C returned 1
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001400E2E99: L"PathOfExileSteam.exe" + 00000000000E2E99.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1400e2e99 rsp 81fee0
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func e2dd0-e2ea0
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142BD02B4 flags 3 prolog 0x6 bytes function 00000001400E2DD0-00000001400E2EA0
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: subq $0x50,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x2: pushq %rbx
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232364C data at 0000000142BD02C0
7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232364C (rec=000000000081E270, frame=000000000081FEE0 context=000000000081D7D0, dispatch=000000000081D6A0)
7345.771:0124:0128:trace:seh:call_handler handler at 000000014232364C returned 1
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00000001422CC532: L"PathOfExileSteam.exe" + 00000000022CC532.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 1422cc532 rsp 81ff40
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 22cc42c-22cc59d
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 0000000142E553FC flags 1 prolog 0xa bytes function 00000001422CC42C-00000001422CC59D
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: movq %rbx,0x40(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0xa: subq $0x30,%rsp
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x6: pushq %rdi
7345.771:0124:0128:trace:unwind:dump_unwind_info     handler 000000014232370C data at 0000000142E5540C
7345.771:0124:0128:trace:seh:call_handler calling handler 000000014232370C (rec=000000000081E270, frame=000000000081FF40 context=000000000081D7D0, dispatch=000000000081D6A0)
7345.771:0124:0128:trace:seh:call_handler handler at 000000014232370C returned 1
7345.771:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFFED482D: L"kernel32.dll" + 000000000001482D.
7345.771:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6fffffed482d rsp 81ff80
7345.771:0124:0128:trace:unwind:dump_unwind_info **** func 14820-14836
7345.771:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFFF03D8C flags 0 prolog 0x8 bytes function 00006FFFFFED4820-00006FFFFFED4836
7345.771:0124:0128:trace:unwind:dump_unwind_info     frame register rbp offset 0x0(%rsp)
7345.771:0124:0128:trace:unwind:dump_unwind_info     0x8: subq $0x20,%rsp
7345.772:0124:0128:trace:unwind:dump_unwind_info     0x4: leaq 0x0(%rsp),rbp
7345.772:0124:0128:trace:unwind:dump_unwind_info     0x1: pushq %rbp
7345.772:0124:0128:warn:seh:virtual_unwind backtrace: 00006FFFFFF4F44F: L"ntdll.dll" + 000000000000F44F.
7345.772:0124:0128:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffff4f44f rsp 81ffb0
7345.772:0124:0128:trace:unwind:dump_unwind_info **** func f438-f450
7345.772:0124:0128:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFDDD5C flags 1 prolog 0x4 bytes function 00006FFFFFF4F438-00006FFFFFF4F450
7345.772:0124:0128:trace:unwind:dump_unwind_info     0x4: subq $0x28,%rsp
7345.772:0124:0128:trace:unwind:dump_unwind_info     handler 00006FFFFFF82950 data at 00006FFFFFFDDD68
7345.772:0124:0128:trace:seh:call_handler calling handler 00006FFFFFF82950 (rec=000000000081E270, frame=000000000081FFB0 context=000000000081D7D0, dispatch=000000000081D6A0)
7345.950:00e0:0278:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
7345.972:0030:0280:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
7345.973:0030:027c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
7345.975:0030:0284:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
7345.976:0030:0288:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
7345.977:0030:028c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
Leave a Comment