| Name | RosettaVS_SAVE_ALL_OUT_NOJRAN_betaTrCP_frame_4774_fulldb_IGNORE_THE_REST_eqEvHd_11_1731_3022891_1_0 |
| Workunit | 1445845978 |
| Created | 22 Dec 2025, 5:52:44 UTC |
| Sent | 22 Dec 2025, 6:27:27 UTC |
| Report deadline | 25 Dec 2025, 6:27:27 UTC |
| Received | 22 Dec 2025, 6:32:10 UTC |
| Server state | Over |
| Outcome | Computation error |
| Client state | Compute error |
| Exit status | -1073741819 (0xC0000005) STATUS_ACCESS_VIOLATION |
| Computer ID | 6007507 |
| Run time | 1 min 2 sec |
| CPU time | 38 sec |
| Validate state | Invalid |
| Credit | 0.00 |
| Device peak FLOPS | 2.28 GFLOPS |
| Application version | Rosetta Beta v6.06 windows_x86_64 |
<core_client_version>7.0.80</core_client_version>
<![CDATA[
<message>
(unknown error) - exit code -1073741819 (0xc0000005)
</message>
<stderr_txt>
command: projects/boinc.bakerlab.org_rosetta/rosetta_beta_6.06_windows_x86_64.exe @betaTrCP_frame_4774_fulldb_eqEvHd_11_1731.flags -nstruct 10000 -cpu_run_time 28800 -boinc:max_nstruct 20000 -checkpoint_interval 120 -mute all -database minirosetta_database -in::file::zip minirosetta_database.zip -boinc::watchdog -boinc::cpu_run_timeout 36000 -run::rng mt19937
Using database: database_f5ae1de8e1\database
Starting watchdog...
Watchdog active.
Unhandled Exception Detected...
- Unhandled Exception Record -
Reason: Access Violation (0xc0000005) at address 0x0000000000000000
Engaging BOINC Windows Runtime Debugger...
********************
BOINC Windows Runtime Debugger Version 7.9.0
Dump Timestamp : 12/22/25 06:28:54
Install Directory :
Data Directory : C:\ProgramData\BOINC
Project Symstore : https://boinc.bakerlab.org/rosetta/symstore
LoadLibraryA( C:\ProgramData\BOINC\dbghelp.dll ): GetLastError = 126
Loaded Library : dbghelp.dll
LoadLibraryA( C:\ProgramData\BOINC\symsrv.dll ): GetLastError = 126
LoadLibraryA( symsrv.dll ): GetLastError = 126
LoadLibraryA( C:\ProgramData\BOINC\srcsrv.dll ): GetLastError = 126
LoadLibraryA( srcsrv.dll ): GetLastError = 126
LoadLibraryA( C:\ProgramData\BOINC\version.dll ): GetLastError = 126
LoadLibraryA( version.dll ): GetLastError = 1455
Debugger Engine : 4.0.5.0
Symbol Search Path: C:\ProgramData\BOINC\slots\1;C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta;srv*C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta\symbols*http://msdl.microsoft.com/download/symbols;srv*C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta\symbols*https://boinc.bakerlab.org/rosetta/symstore
ModLoad: 0000000052370000 00000000062b2000 C:\ProgramData\BOINC\projects\boinc.bakerlab.org_rosetta\rosetta_beta_6.06_windows_x86_64.exe (-exported- Symbols Loaded)
ModLoad: 0000000005bb0000 00000000001f8000 C:\WINDOWS\SYSTEM32\ntdll.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000003bd0000 00000000000c2000 C:\WINDOWS\System32\KERNEL32.DLL (-nosymbols- Symbols Loaded)
ModLoad: 00000000033a0000 00000000002f6000 C:\WINDOWS\System32\KERNELBASE.dll (-exported- Symbols Loaded)
ModLoad: 00000000036a0000 0000000000100000 C:\WINDOWS\System32\ucrtbase.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000004580000 00000000000b1000 C:\WINDOWS\System32\ADVAPI32.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000052b0000 000000000009e000 C:\WINDOWS\System32\msvcrt.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000044e0000 000000000009f000 C:\WINDOWS\System32\sechost.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000004820000 0000000000120000 C:\WINDOWS\System32\RPCRT4.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000003ba0000 0000000000027000 C:\WINDOWS\System32\bcrypt.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000004aa0000 000000000006b000 C:\WINDOWS\System32\WS2_32.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000003d60000 0000000000770000 C:\WINDOWS\System32\SHELL32.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000039e0000 000000000009d000 C:\WINDOWS\System32\msvcp_win.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000004640000 00000000001a1000 C:\WINDOWS\System32\USER32.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000032c0000 0000000000022000 C:\WINDOWS\System32\win32u.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000005140000 000000000002b000 C:\WINDOWS\System32\GDI32.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000003a80000 0000000000119000 C:\WINDOWS\System32\gdi32full.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000fe8f0000 000000000002c000 C:\WINDOWS\SYSTEM32\GLU32.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000f7a00000 0000000000128000 C:\WINDOWS\SYSTEM32\OPENGL32.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000055e0000 0000000000354000 C:\WINDOWS\System32\combase.dll (-nosymbols- Symbols Loaded)
ModLoad: 0000000002b70000 000000000000c000 C:\WINDOWS\SYSTEM32\CRYPTBASE.DLL (-nosymbols- Symbols Loaded)
ModLoad: 00000000047f0000 000000000002f000 C:\WINDOWS\System32\IMM32.DLL (-nosymbols- Symbols Loaded)
ModLoad: 0000000003900000 0000000000082000 C:\WINDOWS\System32\bcryptPrimitives.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000010d0000 0000000000012000 C:\WINDOWS\SYSTEM32\kernel.appcore.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000024d0000 0000000000033000 C:\WINDOWS\SYSTEM32\ntmarta.dll (-nosymbols- Symbols Loaded)
ModLoad: 00000000efc80000 0000000000201000 C:\WINDOWS\SYSTEM32\dbghelp.dll (-nosymbols- Symbols Loaded)
*** Dump of the Process Statistics: ***
- I/O Operations Counters -
Read: 5610, Write: 206, Other 19164
- I/O Transfers Counters -
Read: 12523144, Write: 733143, Other 163362
- Paged Pool Usage -
QuotaPagedPoolUsage: 11688, QuotaPeakPagedPoolUsage: 367048
QuotaNonPagedPoolUsage: 279912448, QuotaPeakNonPagedPoolUsage: 11552
- Virtual Memory Usage -
VirtualSize: 94254, PeakVirtualSize: 509087744
- Pagefile Usage -
PagefileUsage: 279912448, PeakPagefileUsage: 279912448
- Working Set Size -
WorkingSetSize: 367360, PeakWorkingSetSize: 307343360, PageFaultCount: 307347456
*** Dump of thread ID 9132 (state: Waiting): ***
- Information -
Status: Wait Reason: UserRequest, , Kernel Time: 18906250.000000, User Time: 366406240.000000, Wait Time: 26563316.000000
- Unhandled Exception Record -
Reason: Access Violation (0xc0000005) at address 0x0000000000000000
- Registers -
rax=000000000000003a rbx=0000000000000000 rcx=0000000016cfd2e0 rdx=0000000016ddd418 rsi=0000000016cfd2e0 rdi=0000000016ddd418
r8=000000000000003a r9=0000000000000421 r10=000000005716faab r11=0000000016ddd43a r12=0000000052370000 r13=00000000721cf7e0
r14=0000000000001366 r15=00000000721b8100 rip=0000000000000000 rsp=00000000721b7a48 rbp=00000000721b8770
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
- Callstack -
ChildEBP RetAddr Args to Child
(-nosymbols- PC == 0)
721b7a40 53d9565e 5770d4ec 00000000 5716faab 53d955f0 !¾rý+0x0
721b7a80 5266775b 5770d4ec ffffffff 721b7b00 721b7b48 rosetta_beta_6.06_windows_x86_6!_ZN5cppdb14version_numberEv+0x0
721b7ac0 036e0e10 58383030 52370000 721b7bb0 05be0e7b rosetta_beta_6.06_windows_x86_6!+0x0
721b7b30 05c5296f 00000000 721b80b0 721b8770 00000000 ucrtbase!+0x0
721b7b60 05c02554 00000000 721b80b0 721b8770 00000000 ntdll!+0x0
721b8270 05c5147e 00000302 13400150 1b7acab0 26500000 ntdll!+0x0
721b8990 533f81ee 721b8a60 1b5227d0 0011c860 0000013c ntdll!+0x0
721b89e0 5360f886 1b5227d0 2688c7f0 2688c7e0 26a4e300 rosetta_beta_6.06_windows_x86_6!_ZN5cppdb14version_numberEv+0x0
721b8a20 52b1b41f 00000000 52618919 1b522908 5282e6be rosetta_beta_6.06_windows_x86_6!_ZN5cppdb14version_numberEv+0x0
721b8b40 52b1bfa1 1b0478a0 00000000 00000000 5280d5e9 rosetta_beta_6.06_windows_x86_6!+0x0
721b8be0 52584d4a 1aab7d70 53695760 00000000 1b9068f0 rosetta_beta_6.06_windows_x86_6!+0x0
721b8c20 527b7db7 00000000 00000018 721b8d30 036afde6 rosetta_beta_6.06_windows_x86_6!+0x0
721b8ca0 55d781b0 1ab477e0 05bdb86b 00120000 000000fa rosetta_beta_6.06_windows_x86_6!+0x0
721b9380 548479cd 721ba998 00000000 133e0000 05bd47b1 rosetta_beta_6.06_windows_x86_6!xmlUTF8Strsub+0x0
721ba750 52834f17 721ba7f0 036afde6 00000000 00000030 rosetta_beta_6.06_windows_x86_6!_ZN5cppdb14version_numberEv+0x0
721ba810 5282f98e 00000030 153553a0 15355360 14fcbcf8 rosetta_beta_6.06_windows_x86_6!+0x0
721ba950 5244861a c223e1ae 00000000 04fb5670 9ef1329b rosetta_beta_6.06_windows_x86_6!+0x0
721bac50 52445ca3 22347074 00000000 2b6109bf 05c01910 rosetta_beta_6.06_windows_x86_6!+0x0
721bad60 557626f2 721cf480 1516fe30 721bae08 1516fe30 rosetta_beta_6.06_windows_x86_6!+0x0
721badb0 53c9889d 00000000 00000018 721cf278 56e00000 rosetta_beta_6.06_windows_x86_6!xmlDOMWrapAdoptNode+0x0
721bae60 523752d4 00000015 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!_ZN5cppdb14version_numberEv+0x0
721cf780 52371315 00000015 58229110 58229108 00000000 rosetta_beta_6.06_windows_x86_6!+0x0
721cf7d0 52371366 00000000 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0
721cf800 03be7374 00000000 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0
721cf830 05bfcc91 00000000 00000000 00000000 00000000 KERNEL32!+0x0
721cf8b0 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0
*** Dump of thread ID 3000 (state: Waiting): ***
- Information -
Status: Wait Reason: ExecutionDelay, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 26563314.000000
- Registers -
rax=0000000000000034 rbx=0000000000000000 rcx=0000000000000000 rdx=00000000728fe220 rsi=0000000000000000 rdi=0000000000000064
r8=00000000728fe1f8 r9=00000000728fe2e1 r10=0000000000000000 r11=0000000000000246 r12=0000000003beb0e0 r13=00000000728fe318
r14=00000000728fe34a r15=00000000728fe340 rip=0000000005c4dc24 rsp=00000000728fe1f8 rbp=00000000728fe2e1
cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 efl=00000246
- Callstack -
ChildEBP RetAddr Args to Child
728fe1f0 033e62ce 728fe2b8 5261000d 00000000 728fe34a ntdll!+0x0
728fe290 5260c0f8 728fea40 00000000 c00000bb 00000000 KERNELBASE!SleepEx+0x0
728ffac0 03be7374 00000000 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0
728ffaf0 05bfcc91 00000000 00000000 00000000 00000000 KERNEL32!+0x0
728ffb70 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0
*** Dump of thread ID 19056 (state: Waiting): ***
- Information -
Status: Wait Reason: ExecutionDelay, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 26563202.000000
- Registers -
rax=0000000000000034 rbx=0000000000000000 rcx=0000000000000000 rdx=00000000729ff5e0 rsi=0000000000000000 rdi=00000000000007d0
r8=00000000729ff5b8 r9=00000000729ff6e0 r10=0000000000000000 r11=0000000000000246 r12=00000000729ff7b8 r13=0000000056e0c978
r14=0000000000000114 r15=0000000003beb0e0 rip=0000000005c4dc24 rsp=00000000729ff5b8 rbp=00000000729ff6e0
cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 efl=00000246
- Callstack -
ChildEBP RetAddr Args to Child
729ff5b0 033e62ce 729ff678 00000000 00000000 16c548c0 ntdll!+0x0
729ff650 52f278ff 00000000 00000000 c00000bb 00000000 KERNELBASE!SleepEx+0x0
729ff810 52f2766f 00000000 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0
729ff840 036c1bb2 15343500 00000000 00000000 00000000 rosetta_beta_6.06_windows_x86_6!+0x0
729ff870 03be7374 00000000 00000000 00000000 00000000 ucrtbase!+0x0
729ff8a0 05bfcc91 00000000 00000000 00000000 00000000 KERNEL32!+0x0
729ff920 00000000 00000000 00000000 00000000 00000000 ntdll!+0x0
*** Debug Message Dump ****
*** Foreground Window Data ***
Window Name :
Window Class :
Window Process ID: 0
Window Thread ID : 0
Exiting...
</stderr_txt>
]]>
©2025 University of Washington
https://www.bakerlab.org