Guest User

Untitled

a guest
Feb 19th, 2025
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.73 KB | None | 0 0
  1. wine: using kernel write watches, use_kernel_writewatch 1.
  2. fsync: up and running.
  3. wine: using kernel write watches, use_kernel_writewatch 1.
  4. wine: using kernel write watches, use_kernel_writewatch 1.
  5. fsync: up and running.
  6. wine: using kernel write watches, use_kernel_writewatch 1.
  7. Fossilize INFO: Autogroup scheduling is not enabled on this kernel. Will rely entirely on nice().
  8. wine: using kernel write watches, use_kernel_writewatch 1.
  9. fsync: up and running.
  10. wine: using kernel write watches, use_kernel_writewatch 1.
  11. chdir "/home/nullmax17/.local/share/Steam/steamapps/common/Deep Rock Galactic"
  12. ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  13. ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  14. ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  15. ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  16. ERROR: ld.so: object '/home/nullmax17/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  17. Game Recording - would start recording game 548430, but recording for this game is disabled
  18. Adding process 68726 for gameID 548430
  19. Adding process 68727 for gameID 548430
  20. Adding process 68728 for gameID 548430
  21. Adding process 68886 for gameID 548430
  22. Adding process 68888 for gameID 548430
  23. wine: using kernel write watches, use_kernel_writewatch 1.
  24. fsync: up and running.
  25. Adding process 68890 for gameID 548430
  26. wine: using kernel write watches, use_kernel_writewatch 1.
  27. 9966.011:0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\wineboot.exe"
  28. 9966.011:0028:002c:trace:module:get_load_order got hardcoded default for L"wineboot.exe"
  29. 9966.011:0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\wineboot.exe"
  30. 9966.011:0028:002c:trace:module:get_load_order got hardcoded default for L"wineboot.exe"
  31. 9966.011:0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\wineboot.exe" at 0x140000000-0x140024000
  32. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .text at 0x140001000 off 1000 size 9000 virt 83a0 flags 60000020
  33. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .data at 0x14000a000 off a000 size 1000 virt 7e0 flags c0000040
  34. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .rdata at 0x14000b000 off b000 size c000 virt bc40 flags 40000040
  35. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .pdata at 0x140017000 off 17000 size 1000 virt 2f4 flags 40000040
  36. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .xdata at 0x140018000 off 18000 size 1000 virt 3ac flags 40000040
  37. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .idata at 0x140019000 off 19000 size 2000 virt 1ac0 flags c0000040
  38. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .rsrc at 0x14001b000 off 1b000 size 8000 virt 7ef0 flags 40000040
  39. 9966.011:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .reloc at 0x140023000 off 23000 size 1000 virt 6c flags 42000040
  40. 9966.012:0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ntdll.dll" at 0x6ffffff40000-0x6ffffffec000
  41. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text at 0x6ffffff41000 off 1000 size 6e000 virt 6d400 flags 60000020
  42. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .data at 0x6ffffffaf000 off 6f000 size 5000 virt 46a0 flags c0000040
  43. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rodata at 0x6ffffffb4000 off 74000 size 3000 virt 2068 flags c0000040
  44. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .mrdata at 0x6ffffffb7000 off 77000 size 4000 virt 3020 flags c0000040
  45. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rdata at 0x6ffffffbb000 off 7b000 size 13000 virt 12ec0 flags 40000040
  46. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section /4 at 0x6ffffffce000 off 8e000 size 1000 virt 8f0 flags 40000040
  47. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .pdata at 0x6ffffffcf000 off 8f000 size 9000 virt 8178 flags 40000040
  48. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .xdata at 0x6ffffffd8000 off 98000 size 6000 virt 5ea0 flags 40000040
  49. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .edata at 0x6ffffffde000 off 9e000 size b000 virt a0d0 flags 40000040
  50. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .idata at 0x6ffffffe9000 off a9000 size 1000 virt 18 flags c0000040
  51. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rsrc at 0x6ffffffea000 off aa000 size 1000 virt 3b0 flags 40000040
  52. 9966.012:0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .reloc at 0x6ffffffeb000 off ab000 size 1000 virt 134 flags 42000040
  53. 9966.012:0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ntdll.dll" dynamic base 170000000 -> 6ffffff40000 mapped at 0x6ffffff40000
  54. 9966.012:0028:002c:err:virtual:map_image_into_view failed to set 60000020 protection on L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text, noexec filesystem?
  55. 9966.012:0028:002c:trace:module:load_apiset_dll loaded L"\\??\\C:\\windows\\system32\\apisetschema.dll" apiset at 0x221000
  56. 9966.012:0028:002c:trace:seh:install_bpf Installing seccomp filters.
  57. 9966.012:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  58. 9966.012:0028:002c:err:virtual:virtual_setup_exception stack overflow 1344 bytes addr 0x6ffffff4f28c stack 0x20ac0 (0x20000-0x21000-0x220000)
  59. 9966.018:0020:0024:trace:module:get_load_order looking for L"C:\\windows\\system32\\steam.exe"
  60. 9966.018:0020:0024:trace:module:get_load_order_value got environment b for L"steam.exe"
  61. 9966.018:0020:0024:trace:module:get_load_order looking for L"C:\\windows\\system32\\steam.exe"
  62. 9966.018:0020:0024:trace:module:get_load_order_value got environment b for L"steam.exe"
  63. 9966.018:0020:0024:trace:module:load_builtin L"\\??\\C:\\windows\\system32\\steam.exe" is a fake Wine dll
  64. 9966.019:0020:0024:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ntdll.dll" at 0x6ffffff40000-0x6ffffffec000
  65. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text at 0x6ffffff41000 off 1000 size 6e000 virt 6d400 flags 60000020
  66. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .data at 0x6ffffffaf000 off 6f000 size 5000 virt 46a0 flags c0000040
  67. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rodata at 0x6ffffffb4000 off 74000 size 3000 virt 2068 flags c0000040
  68. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .mrdata at 0x6ffffffb7000 off 77000 size 4000 virt 3020 flags c0000040
  69. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rdata at 0x6ffffffbb000 off 7b000 size 13000 virt 12ec0 flags 40000040
  70. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section /4 at 0x6ffffffce000 off 8e000 size 1000 virt 8f0 flags 40000040
  71. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .pdata at 0x6ffffffcf000 off 8f000 size 9000 virt 8178 flags 40000040
  72. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .xdata at 0x6ffffffd8000 off 98000 size 6000 virt 5ea0 flags 40000040
  73. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .edata at 0x6ffffffde000 off 9e000 size b000 virt a0d0 flags 40000040
  74. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .idata at 0x6ffffffe9000 off a9000 size 1000 virt 18 flags c0000040
  75. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rsrc at 0x6ffffffea000 off aa000 size 1000 virt 3b0 flags 40000040
  76. 9966.019:0020:0024:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .reloc at 0x6ffffffeb000 off ab000 size 1000 virt 134 flags 42000040
  77. 9966.019:0020:0024:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ntdll.dll" dynamic base 170000000 -> 6ffffff40000 mapped at 0x6ffffff40000
  78. 9966.019:0020:0024:err:virtual:map_image_into_view failed to set 60000020 protection on L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text, noexec filesystem?
  79. 9966.020:0020:0024:trace:module:load_apiset_dll loaded L"\\??\\C:\\windows\\system32\\apisetschema.dll" apiset at 0x121000
  80. 9966.020:0020:0024:trace:seh:install_bpf Installing seccomp filters.
  81. 9966.020:0020:0024:trace:seh:check_bpf_jit_enable enabled 0x31.
  82. Adding process 68891 for gameID 548430
  83. 9966.020:0020:0024:err:virtual:virtual_setup_exception stack overflow 1600 bytes addr 0x6ffffff4f28c stack 0x209c0 (0x20000-0x21000-0x120000)
  84. pid 68892 != 68891, skipping destruction (fork without exec?)
  85. Adding process 68894 for gameID 548430
  86. Game Recording - game stopped [gameid=548430]
  87. Removing process 68894 for gameID 548430
  88. Removing process 68891 for gameID 548430
  89. Removing process 68890 for gameID 548430
  90. Removing process 68888 for gameID 548430
  91. Removing process 68886 for gameID 548430
  92. Removing process 68728 for gameID 548430
  93. Removing process 68727 for gameID 548430
  94. Removing process 68726 for gameID 548430
Advertisement
Add Comment
Please, Sign In to add comment