Code:
======================
Proton: 1713555428 experimental-9.0-20240419b
SteamGameId: 1245620
Command: ['/media/gamedisk/SteamLibrary/steamapps/common/ELDEN RING/Game/start_protected_game.exe']
Options: {'forcelgadd'}
depot: 0.20240415.84603
pressure-vessel: 0.20240415.0 scout
scripts: 0.20240415.0
sniper: 0.20240415.84603 sniper 0.20240415.84603
Kernel: Linux 5.4.0-177-generic #197-Ubuntu SMP Thu Mar 28 22:45:47 UTC 2024 x86_64
Language: LC_ALL None, LC_MESSAGES None, LC_CTYPE None
Effective WINEDEBUG: +timestamp,+pid,+tid,+seh,+unwind,+threadname,+debugstr,+loaddll,+mscoree
======================
esync: up and running.
00000034 0
00000038 0 wine_rpcrt4_server
00000044 0 wine_rpcrt4_io
00000048 0 wine_threadpool_worker
00000054 0 wine_rpcrt4_io
0000006c 0 wine_rpcrt4_io
00000078 0 wine_rpcrt4_io
0000009c 0 wine_rpcrt4_io
000000b4 0 wine_rpcrt4_io
000000c8 0
000000e8 0 wine_rpcrt4_io
000000ec 0 wine_threadpool_worker
0000003c winedevice.exe
00000040 0
0000004c 0
00000050 0 wine_sechost_service
00000058 0
0000005c 0
00000060 0
000000c0 0
000000c4 0
00000064 winedevice.exe
00000068 0
00000070 0
00000074 0 wine_sechost_service
0000007c 0
00000080 0
00000084 0
00000088 0
00000090 0
00000094 plugplay.exe
00000098 0
000000a0 0
000000a4 0 wine_sechost_service
000000a8 0 wine_rpcrt4_server
000000ac svchost.exe
000000b0 0
000000b8 0
000000bc 0 wine_sechost_service
000000cc explorer.exe
000000d0 0
000000d4 0
000000d8 0 wine_rpcrt4_server
000000e0 rpcss.exe
000000e4 0
000000f0 0
000000f4 0 wine_sechost_service
000000f8 0 wine_rpcrt4_server
000000fc 0 wine_rpcrt4_server
00000100 0 wine_rpcrt4_io
00000104 0 wine_threadpool_worker
00000108 tabtip.exe
0000010c 0
00000114 0 wine_rpcrt4_server
0000011c 0
0000017c 0
00000144 (D) E:\SteamLibrary\steamapps\common\ELDEN RING\Game\eldenring.exe
00000148 1 <==
00000150 0 Core.Logging.BackgroundStrategy
00000154 1 FD4JobWorker:0
00000158 1 FD4JobWorker:1
0000015c 1 FD4JobWorker:2
00000160 1 FD4JobWorker:3
00000164 1 FD4JobWorker:4
00000168 1 FD4JobWorker:5
00000170 -15 CSPlacementDebugMan1
00000174 1 HttpManagerThread
00000178 1 LibwebsocketsThread
00000180 -2 CSCheatDetectionTitleModule::Thread
00000184 0 HavokWorkerThread
00000188 0 HavokWorkerThread
0000018c 0 HavokWorkerThread
00000190 1 EzWorkPool_HIGHEST_0
00000194 1 EzWorkPool_HIGHEST_1
00000198 1 EzWorkPool_HIGHEST_2
0000019c 1 EzWorkPool_HIGHEST_3
000001a0 1 EzWorkPool_HIGHEST_1
000001a4 1 EzWorkPool_HIGHEST_2
000001a8 1 EzWorkPool_HIGHEST_3
000001ac 1 EzWorkPool_HIGHEST_2
000001b0 -1 EzWorkPool_LOW_Clus0
000001b4 -1 EzWorkPool_LOW_Clus1
000001b8 -1 EzWorkPool_LOW_Clus2
000001bc -1 EzWorkPool_LOW_Clus3
000001c0 -1 EzWorkPool_LOW_AllC1
000001c4 -1 EzWorkPool_LOW_AllC2
000001c8 -1 EzWorkPool_LOW_AllC3
000001cc -1 EzWorkPool_LOW_AllC4
000001d0 -1 EzWorkPool_LOW_AllC5
000001d4 -1 EzWorkPool_LOW_Sing1
000001d8 -1 EzWork_LOWEST_Not01
000001ec 0
000001e4 conhost.exe
000001e8 0
System information:
Wine build: wine-9.0
Platform: x86_64 (guest: i386)
Version: Windows 10
Host system: Linux
Host version: 5.4.0-177-generic
470.400:0144:0148:warn:seh:dispatch_exception backtrace: --- Exception 0xc0000005.
470.400:0144:0148:trace:seh:dispatch_exception code=c0000005 flags=0 addr=0000000141E5A84B ip=141e5a84b
470.400:0144:0148:trace:seh:dispatch_exception info[0]=0000000000000000
470.400:0144:0148:trace:seh:dispatch_exception info[1]=0000000000000000
470.400:0144:0148:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
470.400:0144:0148:trace:seh:dispatch_exception rax=0000000000000000 rbx=00007ffefe025340 rcx=0000000000000000 rdx=0000000140000000
470.400:0144:0148:trace:seh:dispatch_exception rsi=00007ffefe025408 rdi=00007ffefe025330 rbp=000000000011ead0 rsp=000000000011e9d0
470.400:0144:0148:trace:seh:dispatch_exception r8=000000000011ebf0 r9=0000000000000008 r10=0000000144558220 r11=00007ffefe025818
470.400:0144:0148:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=00007ffefe025588 r15=0000000000000000
470.400:0144:0148:trace:seh:call_vectored_handlers calling handler at 00006FFFFDA9C050 code=c0000005 flags=0
470.400:0144:0148:trace:seh:call_vectored_handlers handler at 00006FFFFDA9C050 returned 0
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 0000000141E5A84B: L"eldenring.exe" + 0000000001E5A84B.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 141e5a84b rsp 11e9d0
470.400:0144:0148:trace:unwind:dump_unwind_info **** func 1e5a6e0-1e5a9e8
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 0000000143964E94 flags 3 prolog 0x26 bytes function 0000000141E5A6E0-0000000141E5A9E8
470.400:0144:0148:trace:unwind:dump_unwind_info 0x15: movq %rbx,0x298(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x15: subq $0x280,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %rbp
470.400:0144:0148:trace:unwind:dump_unwind_info handler 00000001424B4450 data at 0000000143964EA8
470.400:0144:0148:trace:seh:call_handler calling handler 00000001424B4450 (rec=000000000011E7B0, frame=000000000011E9D0 context=000000000011DD10, dispatch=000000000011DBE0)
470.400:0144:0148:trace:seh:call_handler handler at 00000001424B4450 returned 1
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 0000000141AADFEB: L"eldenring.exe" + 0000000001AADFEB.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 141aadfeb rsp 11ec60
470.400:0144:0148:trace:unwind:dump_unwind_info **** func 1aad8a0-1aae3ae
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001438B1588 flags 3 prolog 0x35 bytes function 0000000141AAD8A0-0000000141AAE3AE
470.400:0144:0148:trace:unwind:dump_unwind_info 0x1c: subq $0x1c8,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0xd: pushq %r15
470.400:0144:0148:trace:unwind:dump_unwind_info 0xb: pushq %r14
470.400:0144:0148:trace:unwind:dump_unwind_info 0x9: pushq %r13
470.400:0144:0148:trace:unwind:dump_unwind_info 0x7: pushq %r12
470.400:0144:0148:trace:unwind:dump_unwind_info 0x5: pushq %rdi
470.400:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rsi
470.400:0144:0148:trace:unwind:dump_unwind_info 0x3: pushq %rbx
470.400:0144:0148:trace:unwind:dump_unwind_info 0x2: pushq %rbp
470.400:0144:0148:trace:unwind:dump_unwind_info handler 00000001424B44CC data at 00000001438B15A4
470.400:0144:0148:trace:seh:call_handler calling handler 00000001424B44CC (rec=000000000011E7B0, frame=000000000011EC60 context=000000000011DD10, dispatch=000000000011DBE0)
470.400:0144:0148:trace:seh:call_handler handler at 00000001424B44CC returned 1
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 00000001419A37C1: L"eldenring.exe" + 00000000019A37C1.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 1419a37c1 rsp 11ee70
470.400:0144:0148:trace:unwind:dump_unwind_info **** func 19a3740-19a382a
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001438819A8 flags 2 prolog 0x19 bytes function 00000001419A3740-00000001419A382A
470.400:0144:0148:trace:unwind:dump_unwind_info 0x19: movq %rsi,0x58(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x14: movq %rbx,0x50(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x6: subq $0x30,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0x2: pushq %rdi
470.400:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 00000001438819BC
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 0000000141AA3558: L"eldenring.exe" + 0000000001AA3558.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 141aa3558 rsp 11eeb0
470.400:0144:0148:trace:unwind:dump_unwind_info **** func 1aa3470-1aa360a
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001438AF7D0 flags 3 prolog 0x2a bytes function 0000000141AA3470-0000000141AA360A
470.400:0144:0148:trace:unwind:dump_unwind_info 0x1b: movq %rsi,0xa0(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x17: movq %rbx,0x98(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0xb: subq $0x80,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rdi
470.400:0144:0148:trace:unwind:dump_unwind_info handler 00000001424B44CC data at 00000001438AF7E4
470.400:0144:0148:trace:seh:call_handler calling handler 00000001424B44CC (rec=000000000011E7B0, frame=000000000011EEB0 context=000000000011DD10, dispatch=000000000011DBE0)
470.400:0144:0148:trace:seh:call_handler handler at 00000001424B44CC returned 1
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 0000000141AA2ED9: L"eldenring.exe" + 0000000001AA2ED9.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 141aa2ed9 rsp 11ef40
470.400:0144:0148:trace:unwind:dump_unwind_info **** func 1aa2e20-1aa2f3a
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001438AF670 flags 2 prolog 0x26 bytes function 0000000141AA2E20-0000000141AA2F3A
470.400:0144:0148:trace:unwind:dump_unwind_info 0x26: movq %rsi,0x78(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x21: movq %rbp,0x70(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x1c: movq %rbx,0x68(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0xe: subq $0x40,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0xa: pushq %r15
470.400:0144:0148:trace:unwind:dump_unwind_info 0x8: pushq %r14
470.400:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %rdi
470.400:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 00000001438AF68C
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 0000000141AA3051: L"eldenring.exe" + 0000000001AA3051.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 141aa3051 rsp 11efa0
470.400:0144:0148:trace:unwind:dump_unwind_info **** func 1aa2fd0-1aa3086
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001438AF740 flags 2 prolog 0x18 bytes function 0000000141AA2FD0-0000000141AA3086
470.400:0144:0148:trace:unwind:dump_unwind_info 0x18: movq %rsi,0x68(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x14: movq %rbx,0x60(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x8: subq $0x50,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rdi
470.400:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 00000001438AF754
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 000000014199CD23: L"eldenring.exe" + 000000000199CD23.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 14199cd23 rsp 11f000
470.400:0144:0148:trace:unwind:dump_unwind_info **** func 199c910-199ed5f
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 000000014387FB18 flags 3 prolog 0x3c bytes function 000000014199C910-000000014199ED5F
470.400:0144:0148:trace:unwind:dump_unwind_info 0x2b: movq %rbx,0x3a0(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x1b: subq $0x350,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0xc: pushq %r15
470.400:0144:0148:trace:unwind:dump_unwind_info 0xa: pushq %r14
470.400:0144:0148:trace:unwind:dump_unwind_info 0x8: pushq %r13
470.400:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %r12
470.400:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rdi
470.400:0144:0148:trace:unwind:dump_unwind_info 0x3: pushq %rsi
470.400:0144:0148:trace:unwind:dump_unwind_info 0x2: pushq %rbp
470.400:0144:0148:trace:unwind:dump_unwind_info handler 00000001424B44CC data at 000000014387FB38
470.400:0144:0148:trace:seh:call_handler calling handler 00000001424B44CC (rec=000000000011E7B0, frame=000000000011F000 context=000000000011DD10, dispatch=000000000011DBE0)
470.400:0144:0148:trace:seh:call_handler handler at 00000001424B44CC returned 1
470.400:0144:0148:warn:seh:virtual_unwind backtrace: 0000000140AEB48A: L"eldenring.exe" + 0000000000AEB48A.
470.400:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 140aeb48a rsp 11f390
470.400:0144:0148:trace:unwind:dump_unwind_info **** func aeaed0-aeb61e
470.400:0144:0148:trace:unwind:dump_unwind_info unwind info at 000000014369BA44 flags 3 prolog 0x3c bytes function 0000000140AEAED0-0000000140AEB61E
470.400:0144:0148:trace:unwind:dump_unwind_info 0x2b: movq %rbx,0x778(%rsp)
470.400:0144:0148:trace:unwind:dump_unwind_info 0x1b: subq $0x720,%rsp
470.400:0144:0148:trace:unwind:dump_unwind_info 0xc: pushq %r15
470.401:0144:0148:trace:unwind:dump_unwind_info 0xa: pushq %r14
470.401:0144:0148:trace:unwind:dump_unwind_info 0x8: pushq %r13
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %r12
470.401:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x3: pushq %rsi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x2: pushq %rbp
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424B44CC data at 000000014369BA64
470.401:0144:0148:trace:seh:call_handler calling handler 00000001424B44CC (rec=000000000011E7B0, frame=000000000011F390 context=000000000011DD10, dispatch=000000000011DBE0)
470.401:0144:0148:trace:seh:call_handler handler at 00000001424B44CC returned 1
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000140AEEFCD: L"eldenring.exe" + 0000000000AEEFCD.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 140aeefcd rsp 11faf0
470.401:0144:0148:trace:unwind:dump_unwind_info **** func aeee70-aef063
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 000000014369CCF0 flags 2 prolog 0x1f bytes function 0000000140AEEE70-0000000140AEF063
470.401:0144:0148:trace:unwind:dump_unwind_info 0x1f: movq %rbp,0xc8(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x1b: movq %rbx,0xc0(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0xe: subq $0xa0,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x7: pushq %r14
470.401:0144:0148:trace:unwind:dump_unwind_info 0x5: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rsi
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 000000014369CD0C
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000140AEDD77: L"eldenring.exe" + 0000000000AEDD77.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 140aedd77 rsp 11fbb0
470.401:0144:0148:trace:unwind:dump_unwind_info **** func aedc80-aedec3
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 000000014369C830 flags 3 prolog 0x2a bytes function 0000000140AEDC80-0000000140AEDEC3
470.401:0144:0148:trace:unwind:dump_unwind_info 0x1b: movq %rbp,0xa8(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x17: movq %rbx,0xa0(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0xb: subq $0x70,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x7: pushq %r14
470.401:0144:0148:trace:unwind:dump_unwind_info 0x5: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rsi
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424B44CC data at 000000014369C848
470.401:0144:0148:trace:seh:call_handler calling handler 00000001424B44CC (rec=000000000011E7B0, frame=000000000011FBB0 context=000000000011DD10, dispatch=000000000011DBE0)
470.401:0144:0148:trace:seh:call_handler handler at 00000001424B44CC returned 1
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000142690165: L"eldenring.exe" + 0000000002690165.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 142690165 rsp 11fc40
470.401:0144:0148:trace:unwind:dump_unwind_info **** func 2690100-2690179
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 0000000143A8DA78 flags 2 prolog 0x14 bytes function 0000000142690100-0000000142690179
470.401:0144:0148:trace:unwind:dump_unwind_info 0x14: movq %rbx,0x50(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: subq $0x40,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x2: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 0000000143A8DA88
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000142690460: L"eldenring.exe" + 0000000002690460.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 142690460 rsp 11fc90
470.401:0144:0148:trace:unwind:dump_unwind_info **** func 2690180-2690510
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 0000000143A8DAAC flags 2 prolog 0x27 bytes function 0000000142690180-0000000142690510
470.401:0144:0148:trace:unwind:dump_unwind_info 0x27: movq %rbx,0xa8(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x17: subq $0x60,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x10: pushq %r15
470.401:0144:0148:trace:unwind:dump_unwind_info 0xe: pushq %r14
470.401:0144:0148:trace:unwind:dump_unwind_info 0xc: pushq %r13
470.401:0144:0148:trace:unwind:dump_unwind_info 0xa: pushq %r12
470.401:0144:0148:trace:unwind:dump_unwind_info 0x8: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x7: pushq %rsi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %rbp
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 0000000143A8DAC8
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 00000001426474F2: L"eldenring.exe" + 00000000026474F2.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 1426474f2 rsp 11fd30
470.401:0144:0148:trace:unwind:dump_unwind_info **** func 26471c0-2647549
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 0000000143A831E4 flags 2 prolog 0x26 bytes function 00000001426471C0-0000000142647549
470.401:0144:0148:trace:unwind:dump_unwind_info 0x26: movq %rbx,0xb8(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x1a: subq $0x60,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x16: pushq %r15
470.401:0144:0148:trace:unwind:dump_unwind_info 0x14: pushq %r14
470.401:0144:0148:trace:unwind:dump_unwind_info 0x12: pushq %r13
470.401:0144:0148:trace:unwind:dump_unwind_info 0x10: pushq %r12
470.401:0144:0148:trace:unwind:dump_unwind_info 0xe: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info 0xd: pushq %rsi
470.401:0144:0148:trace:unwind:dump_unwind_info 0xc: pushq %rbp
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 0000000143A83200
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 000000014260FFAE: L"eldenring.exe" + 000000000260FFAE.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 14260ffae rsp 11fdd0
470.401:0144:0148:trace:unwind:dump_unwind_info **** func 260ff50-260ffd4
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 0000000143A78E88 flags 0 prolog 0xa bytes function 000000014260FF50-000000014260FFD4
470.401:0144:0148:trace:unwind:dump_unwind_info 0xa: movq %rbx,0x40(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %rdi
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000140E726B4: L"eldenring.exe" + 0000000000E726B4.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 140e726b4 rsp 11fe10
470.401:0144:0148:trace:unwind:dump_unwind_info **** func e72660-e72778
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001437774E0 flags 2 prolog 0xf bytes function 0000000140E72660-0000000140E72778
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: subq $0x30,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x2: pushq %rbx
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 00000001437774EC
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000140DAFC04: L"eldenring.exe" + 0000000000DAFC04.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 140dafc04 rsp 11fe50
470.401:0144:0148:trace:unwind:dump_unwind_info **** func daf8f0-dafddf
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 0000000143742B10 flags 2 prolog 0x1a bytes function 0000000140DAF8F0-0000000140DAFDDF
470.401:0144:0148:trace:unwind:dump_unwind_info 0x1a: movaps %xmm6,0x40(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x16: movq %rbx,0x80(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0xa: subq $0x50,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x5: pushq %rsi
470.401:0144:0148:trace:unwind:dump_unwind_info 0x4: pushq %rbp
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D5828 data at 0000000143742B28
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000140C60355: L"eldenring.exe" + 0000000000C60355.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 140c60355 rsp 11fec0
470.401:0144:0148:trace:unwind:dump_unwind_info **** func c60340-c6052c
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001436F084C flags 0 prolog 0xb bytes function 0000000140C60340-0000000140C6052C
470.401:0144:0148:trace:unwind:dump_unwind_info 0xb: movaps %xmm6,0x20(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: subq $0x30,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x2: pushq %rbx
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 0000000140C606DE: L"eldenring.exe" + 0000000000C606DE.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 140c606de rsp 11ff00
470.401:0144:0148:trace:unwind:dump_unwind_info **** func c6065f-c606f8
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001436F0828 flags 4 prolog 0x5 bytes function 0000000140C6065F-0000000140C606F8
470.401:0144:0148:trace:unwind:dump_unwind_info 0x5: movq %rdi,0x40(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info chained to function 0000000140C60610-0000000140C6065F
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 00000001436F0818 flags 0 prolog 0xf bytes function 0000000140C60610-0000000140C6065F
470.401:0144:0148:trace:unwind:dump_unwind_info 0xf: movq %rbp,0x50(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0xf: movq %rbx,0x48(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0xf: subq $0x30,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0xb: pushq %rsi
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 00000001424B52BB: L"eldenring.exe" + 00000000024B52BB.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 1424b52bb rsp 11ff40
470.401:0144:0148:trace:unwind:dump_unwind_info **** func 24b51a4-24b5310
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 0000000143A5A108 flags 1 prolog 0xa bytes function 00000001424B51A4-00000001424B5310
470.401:0144:0148:trace:unwind:dump_unwind_info 0xa: movq %rbx,0x40(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x6: pushq %rdi
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00000001424D6728 data at 0000000143A5A118
470.401:0144:0148:trace:seh:call_handler calling handler 00000001424D6728 (rec=000000000011E7B0, frame=000000000011FF40 context=000000000011DD10, dispatch=000000000011DBE0)
470.401:0144:0148:trace:seh:call_handler handler at 00000001424D6728 returned 1
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 00006FFFFFED473D: L"kernel32.dll" + 000000000001473D.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 6fffffed473d rsp 11ff80
470.401:0144:0148:trace:unwind:dump_unwind_info **** func 14730-14746
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 00006FFFFFF02D84 flags 0 prolog 0x8 bytes function 00006FFFFFED4730-00006FFFFFED4746
470.401:0144:0148:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
470.401:0144:0148:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
470.401:0144:0148:trace:unwind:dump_unwind_info 0x1: pushq %rbp
470.401:0144:0148:warn:seh:virtual_unwind backtrace: 00006FFFFFF4F3FF: L"ntdll.dll" + 000000000000F3FF.
470.401:0144:0148:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffff4f3ff rsp 11ffb0
470.401:0144:0148:trace:unwind:dump_unwind_info **** func f3e8-f400
470.401:0144:0148:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7CF0 flags 1 prolog 0x4 bytes function 00006FFFFFF4F3E8-00006FFFFFF4F400
470.401:0144:0148:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
470.401:0144:0148:trace:unwind:dump_unwind_info handler 00006FFFFFF81D20 data at 00006FFFFFFD7CFC
470.401:0144:0148:trace:seh:call_handler calling handler 00006FFFFFF81D20 (rec=000000000011E7B0, frame=000000000011FFB0 context=000000000011DD10, dispatch=000000000011DBE0)
470.453:0030:01f0:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
470.453:0030:01f4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
470.453:0030:01f8:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
470.454:0030:01fc:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
pid 4739 != 4738, skipping destruction (fork without exec?)