0% found this document useful (0 votes)
18 views1 page

26437

The document provides a log of calls made by Box64 with Dynarec v0.3.3, detailing various function calls and their return values, including memory operations and error messages related to loading a DLL. It indicates that the system will not utilize more than 4 CPU cores and reports a failure to load 'nvapi64.dll' with a specific error code. Additionally, a segmentation fault (SIGSEGV) is noted, indicating an access violation in memory during execution.

Uploaded by

Swed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views1 page

26437

The document provides a log of calls made by Box64 with Dynarec v0.3.3, detailing various function calls and their return values, including memory operations and error messages related to loading a DLL. It indicates that the system will not utilize more than 4 CPU cores and reports a failure to load 'nvapi64.dll' with a specific error code. Additionally, a segmentation fault (SIGSEGV) is noted, indicating an access violation in memory during execution.

Uploaded by

Swed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Box64 with trace with Dynarec v0.3.

3 e923d99 built on Jan 13 2025 21:21:32


Will not expose more than 4 cpu cores
Last calls
26437|0x3f0001fd7c: Calling free(0x5D792CE0, 0x3E, 0x490054, ...) => return
0xC0000034
26437|0x3f0000e82d: Calling pthread_getspecific(0x3, 0x802ECEC6, 0x14498F91B, ...)
=> return 0x7FFC0000
26437|0x3f0000e83f: Calling strlen("L"\\??\\C:\\windows\\system32\\nvapi64.dll"")
=> return 0x2B
26437|0x3f00019d17: Calling memcpy(0x7FFC31F4, 0x14498F8F0, 0x2C, ...) => return
0x7FFC31F4
26437|0x3f0000ea3c: Calling pthread_getspecific(0x3, 0x3F0008C740,
0x3F00078140, ...) => return 0x7FFC0000
26437|0x3f0000eaf7: Calling pthread_getspecific(0x3, 0x3F0008C740, 0x0, ...) =>
return 0x7FFC0000
26437|0x3f0000eb10: Calling snprintf(0x7ffc3404, 1020, "%04x:" (,0x14c)) => return
0x5(014c:)
26437|0x3f0000eaac: Calling snprintf(0x7ffc3409, 1015, "%s:%s:%s " (,0x3f0006f700))
=> return 0x17(warn:file:NtCreateFile )
26437|0x3f00018d9e: Calling vsnprintf(0x14498F540, 0x400, 0x3F000700B0, ...) =>
return 0x41
26437|0x3f0000e901: Calling pthread_getspecific(0x3, 0x400, 0x3F000700B0, ...) =>
return 0x7FFC0000
26437|0x3f0000e915: Calling strrchr(0x14498F540, 0xA, 0x3F000700B0, ...) => return
0x14498F580
26437|0x3f0000e950: Calling memcpy(0x7FFC3420, 0x14498F540, 0x41, ...) => return
0x7FFC3420
26437|0x3f0000e966: Calling write(2, 0x7ffc3404"014c:warn:file:NtCreateFile
L"\\??\\C:\\windows\\system32\\nvapi64.dll" not found (c0000034)
", 93) => return 0x5D
26437|0x3f00021fca: Calling free(0x0, 0x7FFC3404, 0x5D, ...) => return 0x5D
26437|0x3f0000e8b4: Calling write(2, 0x7ffc3404"014c:warn:module:load_dll Failed to
load module L"C:\\windows\\system32\\nvapi64.dll"; status=c0000135
", 103) => return 0x67
26437|0x3f0001ecc8: Calling closedir(0x5CE12690, 0x14498F156, 0x490054, ...) =>
return 0x0
NativeBT: GTA5.exe() [0x34a80d50]
NativeBT: linux-vdso.so.1(__kernel_rt_sigreturn+0) [0x71f4c6e5a4]
NativeBT: [0x71a437915c]
EmulatedBT: ??? [0x14121fa24]
26441|SIGSEGV @0x71a437915c (???(0x71a437915c)) (x64pc=0x14121fa24/"???",
rsp=0x81befed0, stack=0x18ded0000:0x18dfd0000 own=(nil) fp=0x81befeb0), for
accessing (nil) (code=1/prot=0),
db=0x71a40696a0(0x71a4379158:0x71a43791b3/0x14121fa24:0x14121fa2f/???:clean,
hash:fcd0c3a8/fcd0c3a8) handler=(nil)
RAX:0x0000000000000000 RCX:0x0000000081befeb8 RDX:0x000000000072a790
RBX:0x0000000000000000
RSP:0x0000000081befed0 RBP:0x0000000000000000 RSI:0x000000014121f984
RDI:0x0000000000000000
R8:0x00000002847edf54 R9:0x00000002834fe9cf R10:0x0000003f0008b600
R11:0x0000000000000202
R12:0x0000000000000000 R13:0x0000000000000000 R14:0x00000000000000f8
R15:0x0000000000000000
ES:0x002b CS:0x0033 SS:0x002b DS:0x002b FS:0x0043 GS:0x0053
RSP-0x20:0x0000001f43c3bcda RSP-0x18:0x0000000000989680 RSP-0x10:0x0000000000000000
RSP-0x08:0x000000014121fa0a
RSP+0x00:0x0000000000000000 RSP+0x08:0x0000000000000000 RSP+0x10:0x0000000000000000
RSP+0x18:0x0000000000000000 x64opcode=C7 04 25 00 00 00 00 00 (opcode=b900005f)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy