Task 451959519
Name | ps_240302_input_42065_22_0 |
Workunit | 200258938 |
Created | 3 Mar 2024, 8:00:26 UTC |
Sent | 6 Mar 2024, 20:13:32 UTC |
Report deadline | 17 Mar 2024, 8:13:32 UTC |
Received | 6 Mar 2024, 20:24:34 UTC |
Server state | Over |
Outcome | Computation error |
Client state | Compute error |
Exit status | -1073741819 (0xC0000005) STATUS_ACCESS_VIOLATION |
Computer ID | 766751 |
Run time | 4 sec |
CPU time | |
Validate state | Invalid |
Credit | 0.00 |
Device peak FLOPS | 1.00 GFLOPS |
Application version | Period Search Application v102.14 (sse2_win10) windows_x86_64 |
Peak working set size | 9.67 MB |
Peak swap size | 14.20 MB |
Peak disk usage | 0.01 MB |
Stderr output
<core_client_version>7.24.1</core_client_version> <![CDATA[ <message> (unknown error) (317) - exit code 3221225477 (0xc0000005)</message> <stderr_txt> Unhandled Exception Detected... - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00007FF693582375 read attempt to address 0x00000000 Engaging BOINC Windows Runtime Debugger... ******************** BOINC Windows Runtime Debugger Version 7.21.0 Dump Timestamp : 03/07/24 07:15:12 Install Directory : C:\Program Files\BOINC\ Data Directory : Project Symstore : Loaded Library : dbghelp.dll LoadLibraryA( symsrv.dll ): GetLastError = 126 LoadLibraryA( symsrv.dll ): GetLastError = 126 LoadLibraryA( srcsrv.dll ): GetLastError = 126 LoadLibraryA( srcsrv.dll ): GetLastError = 126 Loaded Library : version.dll Debugger Engine : 4.0.5.0 Symbol Search Path: D:\TB26_BOINC\slots\12;D:\TB26_BOINC\projects\asteroidsathome.net_boinc ModLoad: 0000000093570000 00000000008a2000 D:\TB26_BOINC\projects\asteroidsathome.net_boinc\period_search_10214_windows_x86_64__sse2_win10.exe (102.14.0.0) (-nosymbols- Symbols Loaded) Linked PDB Filename : File Version : 102.14.0.0 Company Name : Astronomical Institute at Charles University in Prague Product Name : Asteroids@home for BOINC Product Version : 102.14.0.0 ModLoad: 00000000753f0000 00000000001f8000 C:\Windows\SYSTEM32\ntdll.dll (6.2.19041.3996) (-exported- Symbols Loaded) Linked PDB Filename : ntdll.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 00000000745b0000 00000000000bd000 C:\Windows\System32\KERNEL32.DLL (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : kernel32.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000072f30000 00000000002f6000 C:\Windows\System32\KERNELBASE.dll (6.2.19041.3996) (-exported- Symbols Loaded) Linked PDB Filename : kernelbase.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 000000005db10000 000000000006e000 C:\Program Files (x86)\Common Files\IObit\IObit Malware Fighter\imfph64.dll (9.0.0.2) (-exported- Symbols Loaded) Linked PDB Filename : D:\svncode\IObitSvn\trunk\technical support\imf9\No_File_Attack\obcallback\x64\Release\imfph.pdb File Version : 9.0.0.2 Company Name : IObit Product Name : IObit Malware Fighter Product Version : 9.0.0.0 ModLoad: 0000000075210000 000000000019e000 C:\Windows\System32\USER32.dll (6.2.19041.3996) (-exported- Symbols Loaded) Linked PDB Filename : user32.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 00000000732a0000 0000000000022000 C:\Windows\System32\win32u.dll (6.2.19041.4123) (-exported- Symbols Loaded) Linked PDB Filename : win32u.pdb File Version : 10.0.19041.4123 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.4123 ModLoad: 0000000073770000 000000000002b000 C:\Windows\System32\GDI32.dll (6.2.19041.3996) (-exported- Symbols Loaded) Linked PDB Filename : gdi32.pdb File Version : 10.0.19041.3996 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3996 ModLoad: 0000000072d00000 0000000000117000 C:\Windows\System32\gdi32full.dll (6.2.19041.3996) (-exported- Symbols Loaded) Linked PDB Filename : gdi32full.pdb File Version : 10.0.19041.3996 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3996 ModLoad: 0000000073380000 000000000009d000 C:\Windows\System32\msvcp_win.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : msvcp_win.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000072c00000 0000000000100000 C:\Windows\System32\ucrtbase.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : ucrtbase.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000073850000 0000000000055000 C:\Windows\System32\SHLWAPI.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : shlwapi.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 0000000074510000 000000000009e000 C:\Windows\System32\msvcrt.dll (7.0.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : msvcrt.pdb File Version : 7.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 7.0.19041.3636 ModLoad: 00000000740c0000 00000000000b0000 C:\Windows\System32\ADVAPI32.dll (6.2.19041.4123) (-exported- Symbols Loaded) Linked PDB Filename : advapi32.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 00000000737a0000 000000000009f000 C:\Windows\System32\sechost.dll (6.2.19041.3930) (-exported- Symbols Loaded) Linked PDB Filename : sechost.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 000000006a760000 000000000000a000 C:\Windows\SYSTEM32\VERSION.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : version.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000073ef0000 0000000000125000 C:\Windows\System32\RPCRT4.dll (6.2.19041.4123) (-exported- Symbols Loaded) Linked PDB Filename : rpcrt4.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000072e70000 0000000000027000 C:\Windows\System32\bcrypt.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : bcrypt.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 0000000074080000 0000000000032000 C:\Windows\System32\IMM32.DLL (6.2.19041.3996) (-exported- Symbols Loaded) Linked PDB Filename : imm32.pdb File Version : 10.0.19041.3996 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3996 ModLoad: 0000000070970000 0000000000012000 C:\Windows\SYSTEM32\kernel.appcore.dll (6.2.19041.3758) (-exported- Symbols Loaded) Linked PDB Filename : Kernel.Appcore.pdb File Version : 10.0.19041.3758 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3758 ModLoad: 00000000645f0000 00000000001e4000 C:\Windows\SYSTEM32\dbghelp.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : dbghelp.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 00000000592d0000 0000000000082000 C:\Windows\System32\bcryptPrimitives.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : bcryptprimitives.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 *** Dump of the Process Statistics: *** - I/O Operations Counters - Read: 0, Write: 214, Other 41 - I/O Transfers Counters - Read: 0, Write: 223, Other 5770 - Paged Pool Usage - QuotaPagedPoolUsage: 106632, QuotaPeakPagedPoolUsage: 106776 QuotaNonPagedPoolUsage: 8152, QuotaPeakNonPagedPoolUsage: 8288 - Virtual Memory Usage - VirtualSize: 15650816, PeakVirtualSize: 200486912 - Pagefile Usage - PagefileUsage: 15650816, PeakPagefileUsage: 15650816 - Working Set Size - WorkingSetSize: 10919936, PeakWorkingSetSize: 10924032, PageFaultCount: 12870 *** Dump of thread ID 13136 (state: Waiting): *** - Information - Status: Wait Reason: UserRequest, , Kernel Time: 156250.000000, User Time: 156250.000000, Wait Time: 10050492.000000 - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00007FF693582375 read attempt to address 0x00000000 - Registers - rax=0000000000000000 rbx=00000000935cf900 rcx=00000000f75052d0 rdx=00000000f75041f0 rsi=00000000f75041f0 rdi=00000000f7505300 r8=0000000000001000 r9=0000000000000000 r10=0000000000008000 r11=00000000f75061b0 r12=000000005744b620 r13=00000000590a09b0 r14=0000000000000000 r15=0000000000000000 rip=0000000093582375 rsp=00000000f7504188 rbp=0000000000001000 cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 - Callstack - ChildEBP RetAddr Args to Child f7504180 935855cc 00000000 00000000 00000000 00000000 period_search_10214_windows_x86!+0x0 f75041b0 9358426d 935cf900 f7504250 00000000 00000000 period_search_10214_windows_x86!+0x0 f7504210 93584c26 935cf900 f7505370 00000100 00000000 period_search_10214_windows_x86!+0x0 f7505260 93582c12 00000005 00000004 00000000 00000000 period_search_10214_windows_x86!+0x0 f7506350 9358c508 00000004 00000100 00000004 0000092a period_search_10214_windows_x86!+0x0 f75067b0 9358de3e 00000004 f7506a20 00000000 58ffe000 period_search_10214_windows_x86!+0x0 f7506910 93577e12 00000004 f7506a20 00000000 5744b620 period_search_10214_windows_x86!+0x0 f751fa30 9357b118 0000000a 00000000 00000000 00000000 period_search_10214_windows_x86!+0x0 f751fd90 9359057a 0000000a 00000000 00000000 00000000 period_search_10214_windows_x86!+0x0 f751fdd0 745c7344 00000000 00000000 00000000 00000000 period_search_10214_windows_x86!+0x0 f751fe00 754426b1 00000000 00000000 00000000 00000000 KERNEL32!BaseThreadInitThunk+0x0 f751fe80 00000000 00000000 00000000 00000000 00000000 ntdll!RtlUserThreadStart+0x0 *** Dump of thread ID 6636 (state: Waiting): *** - Information - Status: Wait Reason: EventPairLow, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 10050155.000000 - Registers - rax=00000000000001d5 rbx=0000000057449670 rcx=000000000000006c rdx=00000000574492f0 rsi=00000000574449d0 rdi=0000000057449670 r8=000000000000016b r9=000000000000016b r10=0000000000000000 r11=000000000000022b r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 rip=0000000075490a74 rsp=00000000f883fb38 rbp=0000000000000000 cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 efl=00000246 - Callstack - ChildEBP RetAddr Args to Child f883fb30 75442e27 00000000 00000000 574449d0 57449670 ntdll!ZwWaitForWorkViaWorkerFactory+0x0 f883fe30 745c7344 00000000 00000000 00000000 00000000 ntdll!TpReleaseCleanupGroupMembers+0x0 f883fe60 754426b1 00000000 00000000 00000000 00000000 KERNEL32!BaseThreadInitThunk+0x0 f883fee0 00000000 00000000 00000000 00000000 00000000 ntdll!RtlUserThreadStart+0x0 *** Dump of thread ID 11152 (state: Waiting): *** - Information - Status: Wait Reason: EventPairLow, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 10050155.000000 - Registers - rax=00000000000001d5 rbx=000000005744ac50 rcx=000000000000006c rdx=000000005744a8d0 rsi=00000000574449d0 rdi=000000005744ac50 r8=0000000000000008 r9=0000000000000049 r10=0000000000000000 r11=0000000057440150 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 rip=0000000075490a74 rsp=00000000f9b5f618 rbp=0000000000000000 cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 efl=00000246 - Callstack - ChildEBP RetAddr Args to Child f9b5f610 75442e27 00000000 00000000 574449d0 5744ac50 ntdll!ZwWaitForWorkViaWorkerFactory+0x0 f9b5f910 745c7344 00000000 00000000 00000000 00000000 ntdll!TpReleaseCleanupGroupMembers+0x0 f9b5f940 754426b1 00000000 00000000 00000000 00000000 KERNEL32!BaseThreadInitThunk+0x0 f9b5f9c0 00000000 00000000 00000000 00000000 00000000 ntdll!RtlUserThreadStart+0x0 *** Dump of thread ID 4632 (state: Waiting): *** - Information - Status: Wait Reason: EventPairLow, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 10050155.000000 - Registers - rax=00000000000001d5 rbx=000000005744b080 rcx=000000000000006c rdx=000000005744ad00 rsi=00000000574449d0 rdi=000000005744b080 r8=0000000000000777 r9=0000000000000004 r10=000000005744c100 r11=00000000731e04c4 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 rip=0000000075490a74 rsp=00000000fae7f788 rbp=0000000000000000 cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 efl=00000246 - Callstack - ChildEBP RetAddr Args to Child fae7f780 75442e27 00000000 00000000 574449d0 5744b080 ntdll!ZwWaitForWorkViaWorkerFactory+0x0 fae7fa80 745c7344 00000000 00000000 00000000 00000000 ntdll!TpReleaseCleanupGroupMembers+0x0 fae7fab0 754426b1 00000000 00000000 00000000 00000000 KERNEL32!BaseThreadInitThunk+0x0 fae7fb30 00000000 00000000 00000000 00000000 00000000 ntdll!RtlUserThreadStart+0x0 *** Debug Message Dump **** *** Foreground Window Data *** Window Name : Window Class : Window Process ID: 0 Window Thread ID : 0 Exiting... </stderr_txt> ]]>