Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wine: using kernel write watches, use_kernel_writewatch 1.
- fsync: up and running.
- wine: using kernel write watches, use_kernel_writewatch 1.
- wine: using kernel write watches, use_kernel_writewatch 1.
- fsync: up and running.
- wine: using kernel write watches, use_kernel_writewatch 1.
- Fossilize INFO: Autogroup scheduling is not enabled on this kernel. Will rely entirely on nice().
- wine: using kernel write watches, use_kernel_writewatch 1.
- fsync: up and running.
- wine: using kernel write watches, use_kernel_writewatch 1.
- chdir "/home/nullmax17/.local/share/Steam/steamapps/common/Deep Rock Galactic"
- ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
- ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- Game Recording - would start recording game 548430, but recording for this game is disabled
- Adding process 68726 for gameID 548430
- Adding process 68727 for gameID 548430
- Adding process 68728 for gameID 548430
- Adding process 68886 for gameID 548430
- Adding process 68888 for gameID 548430
- wine: using kernel write watches, use_kernel_writewatch 1.
- fsync: up and running.
- Adding process 68890 for gameID 548430
- wine: using kernel write watches, use_kernel_writewatch 1.
- 9966.011:0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\wineboot.exe"
- 9966.011:0028:002c:trace:module:get_load_order got hardcoded default for L"wineboot.exe"
- 9966.011:0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\wineboot.exe"
- 9966.011:0028:002c:trace:module:get_load_order got hardcoded default for L"wineboot.exe"
- 9966.011:0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\wineboot.exe" at 0x140000000-0x140024000
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .text at 0x140001000 off 1000 size 9000 virt 83a0 flags 60000020
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .data at 0x14000a000 off a000 size 1000 virt 7e0 flags c0000040
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .rdata at 0x14000b000 off b000 size c000 virt bc40 flags 40000040
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .pdata at 0x140017000 off 17000 size 1000 virt 2f4 flags 40000040
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .xdata at 0x140018000 off 18000 size 1000 virt 3ac flags 40000040
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .idata at 0x140019000 off 19000 size 2000 virt 1ac0 flags c0000040
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .rsrc at 0x14001b000 off 1b000 size 8000 virt 7ef0 flags 40000040
- 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .reloc at 0x140023000 off 23000 size 1000 virt 6c flags 42000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ntdll.dll" at 0x6ffffff40000-0x6ffffffec000
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text at 0x6ffffff41000 off 1000 size 6e000 virt 6d400 flags 60000020
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .data at 0x6ffffffaf000 off 6f000 size 5000 virt 46a0 flags c0000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rodata at 0x6ffffffb4000 off 74000 size 3000 virt 2068 flags c0000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .mrdata at 0x6ffffffb7000 off 77000 size 4000 virt 3020 flags c0000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rdata at 0x6ffffffbb000 off 7b000 size 13000 virt 12ec0 flags 40000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section /4 at 0x6ffffffce000 off 8e000 size 1000 virt 8f0 flags 40000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .pdata at 0x6ffffffcf000 off 8f000 size 9000 virt 8178 flags 40000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .xdata at 0x6ffffffd8000 off 98000 size 6000 virt 5ea0 flags 40000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .edata at 0x6ffffffde000 off 9e000 size b000 virt a0d0 flags 40000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .idata at 0x6ffffffe9000 off a9000 size 1000 virt 18 flags c0000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rsrc at 0x6ffffffea000 off aa000 size 1000 virt 3b0 flags 40000040
- 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .reloc at 0x6ffffffeb000 off ab000 size 1000 virt 134 flags 42000040
- 9966.012:0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ntdll.dll" dynamic base 170000000 -> 6ffffff40000 mapped at 0x6ffffff40000
- 9966.012:0028:002c:err:virtual:map_image_into_view failed to set 60000020 protection on L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text, noexec filesystem?
- 9966.012:0028:002c:trace:module:load_apiset_dll loaded L"\\??\\C:\\windows\\system32\\apisetschema.dll" apiset at 0x221000
- 9966.012:0028:002c:trace:seh:install_bpf Installing seccomp filters.
- 9966.012:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
- 9966.012:0028:002c:err:virtual:virtual_setup_exception stack overflow 1344 bytes addr 0x6ffffff4f28c stack 0x20ac0 (0x20000-0x21000-0x220000)
- 9966.018:0020:0024:trace:module:get_load_order looking for L"C:\\windows\\system32\\steam.exe"
- 9966.018:0020:0024:trace:module:get_load_order_value got environment b for L"steam.exe"
- 9966.018:0020:0024:trace:module:get_load_order looking for L"C:\\windows\\system32\\steam.exe"
- 9966.018:0020:0024:trace:module:get_load_order_value got environment b for L"steam.exe"
- 9966.018:0020:0024:trace:module:load_builtin L"\\??\\C:\\windows\\system32\\steam.exe" is a fake Wine dll
- 9966.019:0020:0024:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ntdll.dll" at 0x6ffffff40000-0x6ffffffec000
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text at 0x6ffffff41000 off 1000 size 6e000 virt 6d400 flags 60000020
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .data at 0x6ffffffaf000 off 6f000 size 5000 virt 46a0 flags c0000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rodata at 0x6ffffffb4000 off 74000 size 3000 virt 2068 flags c0000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .mrdata at 0x6ffffffb7000 off 77000 size 4000 virt 3020 flags c0000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rdata at 0x6ffffffbb000 off 7b000 size 13000 virt 12ec0 flags 40000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section /4 at 0x6ffffffce000 off 8e000 size 1000 virt 8f0 flags 40000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .pdata at 0x6ffffffcf000 off 8f000 size 9000 virt 8178 flags 40000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .xdata at 0x6ffffffd8000 off 98000 size 6000 virt 5ea0 flags 40000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .edata at 0x6ffffffde000 off 9e000 size b000 virt a0d0 flags 40000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .idata at 0x6ffffffe9000 off a9000 size 1000 virt 18 flags c0000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rsrc at 0x6ffffffea000 off aa000 size 1000 virt 3b0 flags 40000040
- 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .reloc at 0x6ffffffeb000 off ab000 size 1000 virt 134 flags 42000040
- 9966.019:0020:0024:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ntdll.dll" dynamic base 170000000 -> 6ffffff40000 mapped at 0x6ffffff40000
- 9966.019:0020:0024:err:virtual:map_image_into_view failed to set 60000020 protection on L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text, noexec filesystem?
- 9966.020:0020:0024:trace:module:load_apiset_dll loaded L"\\??\\C:\\windows\\system32\\apisetschema.dll" apiset at 0x121000
- 9966.020:0020:0024:trace:seh:install_bpf Installing seccomp filters.
- 9966.020:0020:0024:trace:seh:check_bpf_jit_enable enabled 0x31.
- Adding process 68891 for gameID 548430
- 9966.020:0020:0024:err:virtual:virtual_setup_exception stack overflow 1600 bytes addr 0x6ffffff4f28c stack 0x209c0 (0x20000-0x21000-0x120000)
- pid 68892 != 68891, skipping destruction (fork without exec?)
- Adding process 68894 for gameID 548430
- Game Recording - game stopped [gameid=548430]
- Removing process 68894 for gameID 548430
- Removing process 68891 for gameID 548430
- Removing process 68890 for gameID 548430
- Removing process 68888 for gameID 548430
- Removing process 68886 for gameID 548430
- Removing process 68728 for gameID 548430
- Removing process 68727 for gameID 548430
- Removing process 68726 for gameID 548430
Advertisement
Add Comment
Please, Sign In to add comment