Task 1583752236

Name srhallu__10_hallucinated_189_49.cyclic_predicted.r1_SAVE_ALL_OUT_2980416_875_0
Workunit 1409152937
Created 21 Sep 2024, 20:28:42 UTC
Sent 21 Sep 2024, 20:49:08 UTC
Report deadline 24 Sep 2024, 20:49:08 UTC
Received 21 Sep 2024, 20:51:24 UTC
Server state Over
Outcome Computation error
Client state Compute error
Exit status -1073741819 (0xC0000005) STATUS_ACCESS_VIOLATION
Computer ID 6300800
Run time 7 sec
CPU time
Validate state Invalid
Credit 0.00
Device peak FLOPS 4.12 GFLOPS
Application version Rosetta Beta v6.06
windows_x86_64
Peak working set size 45.51 MB
Peak swap size 12.39 MB
Peak disk usage 0.01 MB

Stderr output

<core_client_version>7.20.2</core_client_version>
<![CDATA[
<message>
(unknown error) - exit code 3221225477 (0xc0000005)</message>
<stderr_txt>
command: projects/boinc.bakerlab.org_rosetta/rosetta_beta_6.06_windows_x86_64.exe @srhallu__10_hallucinated_189_49.cyclic_predicted.r1.flags -nstruct 10000 -cpu_run_time 28800 -boinc:max_nstruct 20000 -checkpoint_interval 120 -mute all -database minirosetta_database -in::file::zip minirosetta_database.zip -boinc::watchdog -boinc::cpu_run_timeout 36000 -run::rng mt19937 -constant_seed -jran 2650183
Using database: database_f5ae1de8e1\database


Unhandled Exception Detected...

- Unhandled Exception Record -
Reason: Access Violation (0xc0000005) at address 0x0000000000000000 

Engaging BOINC Windows Runtime Debugger...



********************


BOINC Windows Runtime Debugger Version 7.9.0


Dump Timestamp    : 09/21/24 16:49:22
Install Directory : C:\Program Files\BOINC\
Data Directory    : C:\ProgramData\BOINC
Project Symstore  : https://boinc.bakerlab.org/rosetta/symstore
LoadLibraryA( C:\ProgramData\BOINC\dbghelp.dll ): GetLastError = 126
Loaded Library    : dbghelp.dll
LoadLibraryA( C:\ProgramData\BOINC\symsrv.dll ): GetLastError = 126
LoadLibraryA( symsrv.dll ): GetLastError = 126
LoadLibraryA( C:\ProgramData\BOINC\srcsrv.dll ): GetLastError = 126
LoadLibraryA( srcsrv.dll ): GetLastError = 126
LoadLibraryA( C:\ProgramData\BOINC\version.dll ): GetLastError = 126
LoadLibraryA( version.dll ): GetLastError = 1455
Debugger Engine   : 4.0.5.0
Symbol Search Path: C:\ProgramData\BOINC\slots\0;C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta;srv*C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta\symbols*http://msdl.microsoft.com/download/symbols;srv*C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta\symbols*https://boinc.bakerlab.org/rosetta/symstore


ModLoad: 0000000090ba0000 00000000062b2000 C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta\rosetta_beta_6.06_windows_x86_64.exe (-nosymbols- Symbols Loaded)

ModLoad: 0000000088070000 00000000001f7000 C:\Windows\SYSTEM32\ntdll.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000086ad0000 00000000000bd000 C:\Windows\System32\KERNEL32.DLL (-nosymbols- Symbols Loaded)

ModLoad: 0000000085990000 00000000002f6000 C:\Windows\System32\KERNELBASE.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000085de0000 0000000000100000 C:\Windows\System32\ucrtbase.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000086260000 00000000000ae000 C:\Windows\System32\ADVAPI32.dll (-exported- Symbols Loaded)

ModLoad: 0000000086bd0000 000000000009e000 C:\Windows\System32\msvcrt.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000087350000 000000000009c000 C:\Windows\System32\sechost.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000086d20000 0000000000126000 C:\Windows\System32\RPCRT4.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000086a60000 000000000006b000 C:\Windows\System32\WS2_32.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000087810000 0000000000744000 C:\Windows\System32\SHELL32.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000085c90000 000000000009d000 C:\Windows\System32\msvcp_win.dll (-exported- Symbols Loaded)

ModLoad: 00000000868c0000 000000000019e000 C:\Windows\System32\USER32.dll (-nosymbols- Symbols Loaded)

ModLoad: 00000000858f0000 0000000000022000 C:\Windows\System32\win32u.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000086810000 000000000002c000 C:\Windows\System32\GDI32.dll (-nosymbols- Symbols Loaded)

ModLoad: 00000000857d0000 000000000011a000 C:\Windows\System32\gdi32full.dll (-nosymbols- Symbols Loaded)

ModLoad: 000000006bfc0000 0000000000125000 C:\Windows\SYSTEM32\OPENGL32.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000086ec0000 0000000000354000 C:\Windows\System32\combase.dll (-nosymbols- Symbols Loaded)

ModLoad: 000000006bf80000 000000000002c000 C:\Windows\SYSTEM32\GLU32.dll (-nosymbols- Symbols Loaded)

ModLoad: 0000000085070000 000000000000c000 C:\Windows\SYSTEM32\CRYPTBASE.DLL (-nosymbols- Symbols Loaded)

ModLoad: 0000000086ba0000 0000000000030000 C:\Windows\System32\IMM32.DLL (-nosymbols- Symbols Loaded)



*** Dump of the Process Statistics: ***

- I/O Operations Counters -
Read: 3877, Write: 151, Other 15347

- I/O Transfers Counters -
Read: 6463825, Write: 8670, Other 120420

- Paged Pool Usage -
QuotaPagedPoolUsage: 9120, QuotaPeakPagedPoolUsage: 366280
QuotaNonPagedPoolUsage: 66236416, QuotaPeakNonPagedPoolUsage: 8968

- Virtual Memory Usage -
VirtualSize: 24913, PeakVirtualSize: 292954112

- Pagefile Usage -
PagefileUsage: 66236416, PeakPagefileUsage: 66236416

- Working Set Size -
WorkingSetSize: 366600, PeakWorkingSetSize: 100028416, PageFaultCount: 100032512

*** Dump of thread ID 20604 (state: Waiting): ***

- Information -
Status: Wait Reason: UserRequest, , Kernel Time: 5468750.000000, User Time: 6718750.000000, Wait Time: 29634968.000000

- Unhandled Exception Record -
Reason: Access Violation (0xc0000005) at address 0x0000000000000000 

- Registers -
rax=000000000000003a rbx=0000000000000000 rcx=0000000021942c20 rdx=0000000021a22d58 rsi=0000000021942c20 rdi=0000000021a22d58
r8=000000000000003a r9=0000000000000421 r10=000000009599faab r11=0000000021a22d7a r12=0000000090ba0000 r13=00000000ebcffb20
r14=0000000000001366 r15=00000000ebce9b80 rip=0000000000000000 rsp=00000000ebce94c8 rbp=00000000ebcea1f0
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202

- Callstack -
ChildEBP RetAddr  Args to Child
(-nosymbols- PC == 0)
ebce94c0 925c565e 95f3d4ec 00000000 9599faab 925c55f0 !&#225;&#193;&#236;S+0x0 
ebce9500 90e9775b 95f3d4ec ffffffff ebce9580 ebce95c8 rosetta_beta_6.06_windows_x86_6!+0x0 
ebce9540 85e20e10 96bb3030 90ba0000 ebce9630 880a0e7b rosetta_beta_6.06_windows_x86_6!+0x0 
ebce95b0 881123af 00000000 ebce9b30 ebcea1f0 00000000 ucrtbase!+0x0 
ebce95e0 880c14b4 00000000 ebce9b30 ebcea1f0 00000000 ntdll!+0x0 
ebce9cf0 88110ebe 00fd0000 00021000 ebcea578 00004840 ntdll!+0x0 
ebcea4a0 91c281fa 246162f0 00000000 247db2c0 90e48919 ntdll!+0x0 
ebcea4f0 91921b11 ebcea710 5a432008 24753ad0 248eaca8 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcea610 90f9e6e8 00000000 00000000 778c4934 6b18fb69 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcea830 90f94d19 2458b870 00000103 2493e5b0 2473c030 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcea940 90fa18eb 2493e5b0 880947b1 00000001 1e090000 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcea9a0 91cd8fee 23d0feb0 ebceab78 ebceaa00 91934b12 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceaa30 91e69410 00010000 00000000 00001002 00000006 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceac30 91e60f5b 1bf50469 00000000 00000005 ebceaec0 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcead20 9103c1bb 00000005 00000000 96baeee8 00000028 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceadb0 9103bbd9 00000018 00000004 1e090000 ebceae99 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceae90 9103bb10 85ed1270 91321f90 00000002 90e9a612 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceaef0 91303786 1fe50000 90dbaff9 65736162 ebceb120 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceaf60 90db5547 ebceafb0 917c6362 00000001 00000001 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceafa0 90d8bd00 ebceafe0 00000001 ebceb1d8 ebceb068 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceb030 90d8ac74 1f9f2980 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0 
ebceb1a0 90ba4832 00000018 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcffac0 90ba1315 00000018 96a59110 96a59108 00000000 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcffb10 90ba1366 00000000 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcffb40 86ae7344 00000000 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0 
ebcffb70 880c26b1 00000000 00000000 00000000 00000000 KERNEL32!+0x0 
ebcffbf0 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0 

*** Dump of thread ID 15864 (state: Waiting): ***

- Information -
Status: Wait Reason: EventPairLow, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 29634484.000000

- Registers -
rax=00000000000001d5 rbx=000000001e099310 rcx=0000000000000084 rdx=000000001e098f90 rsi=000000001e0949f0 rdi=000000001e099310
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=000000001e090150 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000 rip=0000000088110a74 rsp=00000000ebdff988 rbp=0000000000000000
cs=0033  ss=002b  ds=0000  es=0000  fs=0000  gs=0000             efl=00000246

- Callstack -
ChildEBP RetAddr  Args to Child
ebdff980 880c2e27 00000000 00000000 1e0949f0 00000000 ntdll!+0x0 
ebdffc80 86ae7344 00000000 00000000 00000000 00000000 ntdll!+0x0 
ebdffcb0 880c26b1 00000000 00000000 00000000 00000000 KERNEL32!+0x0 
ebdffd30 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0 

*** Dump of thread ID 4984 (state: Waiting): ***

- Information -
Status: Wait Reason: EventPairLow, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 29634484.000000

- Registers -
rax=00000000000001d5 rbx=000000001e09e010 rcx=0000000000000084 rdx=000000001e09dc90 rsi=000000001e0949f0 rdi=000000001e09e010
r8=00000000000000cf r9=00000000000000cf r10=0000000000000000 r11=000000000000016f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000 rip=0000000088110a74 rsp=00000000ebeff938 rbp=0000000000000000
cs=0033  ss=002b  ds=0000  es=0000  fs=0000  gs=0000             efl=00000246

- Callstack -
ChildEBP RetAddr  Args to Child
ebeff930 880c2e27 00010003 00000001 00000001 1e09e010 ntdll!+0x0 
ebeffc30 86ae7344 00000000 00000000 00000000 00000000 ntdll!+0x0 
ebeffc60 880c26b1 00000000 00000000 00000000 00000000 KERNEL32!+0x0 
ebeffce0 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0 

*** Dump of thread ID 20764 (state: Waiting): ***

- Information -
Status: Wait Reason: EventPairLow, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 29634484.000000

- Registers -
rax=00000000000001d5 rbx=000000001e09e440 rcx=0000000000000084 rdx=000000001e09e0c0 rsi=000000001e0949f0 rdi=000000001e09e440
r8=000000000000041a r9=0000000086b690a8 r10=000000000000041a r11=0000000086b76fd8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000 rip=0000000088110a74 rsp=00000000ebfffb28 rbp=0000000000000000
cs=0033  ss=002b  ds=0000  es=0000  fs=0000  gs=0000             efl=00000246

- Callstack -
ChildEBP RetAddr  Args to Child
ebfffb20 880c2e27 00000000 00000000 1e0949f0 1e09e440 ntdll!+0x0 
ebfffe20 86ae7344 00000000 00000000 00000000 00000000 ntdll!+0x0 
ebfffe50 880c26b1 00000000 00000000 00000000 00000000 KERNEL32!+0x0 
ebfffed0 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0 

*** Dump of thread ID 984 (state: Waiting): ***

- Information -
Status: Wait Reason: ExecutionDelay, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 29634968.000000

- Registers -
rax=0000000000000034 rbx=0000000000000000 rcx=0000000000000000 rdx=00000000ec1fe140 rsi=0000000000000000 rdi=0000000000000064
r8=00000000000007ff r9=0000000085e9e3f0 r10=00000000ffff8000 r11=0000000000001000 r12=0000000086aeb0b0 r13=00000000ec1fe238
r14=00000000ec1fe26a r15=00000000ec1fe260 rip=000000008810d664 rsp=00000000ec1fe118 rbp=00000000ec1fe201
cs=0033  ss=002b  ds=0000  es=0000  fs=0000  gs=0000             efl=00000246

- Callstack -
ChildEBP RetAddr  Args to Child
ec1fe110 859db4ee ec1fe1d8 859e0e7b 00000000 ec1fe26a ntdll!+0x0 
ec1fe1b0 90e3c0f8 ec1fe960 00000000 c00000bb 00000000 KERNELBASE!+0x0 
ec1ff9e0 86ae7344 00000000 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0 
ec1ffa10 880c26b1 00000000 00000000 00000000 00000000 KERNEL32!+0x0 
ec1ffa90 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0 


*** Debug Message Dump ****


*** Foreground Window Data ***
    Window Name      : 
    Window Class     : 
    Window Process ID: 0
    Window Thread ID : 0

Exiting...

</stderr_txt>
]]>




©2024 University of Washington
https://www.bakerlab.org