Name | wah2_sam25_s4l9_199612_13_742_011577015_0 |
Workunit | 11577015 |
Created | 1 Aug 2018, 4:28:14 UTC |
Sent | 1 Aug 2018, 13:52:41 UTC |
Report deadline | 14 Jul 2019, 19:12:41 UTC |
Received | 27 Aug 2018, 6:35:11 UTC |
Server state | Over |
Outcome | Computation error |
Client state | Compute error |
Exit status | -1073741819 (0xC0000005) STATUS_ACCESS_VIOLATION |
Computer ID | 1452734 |
Run time | 51 min |
CPU time | 48 min 16 sec |
Validate state | Invalid |
Credit | 0.00 |
Device peak FLOPS | 3.20 GFLOPS |
Application version | Weather At Home 2 (wah2) v8.24 windows_intelx86 |
Peak working set size | 417.57 MB |
Peak swap size | 382.89 MB |
Peak disk usage | 0.03 MB |
Stderr | <core_client_version>7.12.1</core_client_version> <![CDATA[ <message> (unknown error) - exit code -1073741819 (0xc0000005)</message> <stderr_txt> Suspended CPDN Monitor - Suspend request from BOINC... Unhandled Exception Detected... - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00463007 read attempt to address 0x012703AC Engaging BOINC Windows Runtime Debugger... ******************** BOINC Windows Runtime Debugger Version 7.7.0 Dump Timestamp : 08/01/18 18:30:30 Install Directory : Data Directory : C:\ProgramData\BOINC Project Symstore : LoadLibraryA( C:\ProgramData\BOINC\dbghelp.dll ): GetLastError = 126 Loaded Library : dbghelp.dll LoadLibraryA( C:\ProgramData\BOINC\symsrv.dll ): GetLastError = 126 LoadLibraryA( symsrv.dll ): GetLastError = 126 LoadLibraryA( C:\ProgramData\BOINC\srcsrv.dll ): GetLastError = 126 LoadLibraryA( srcsrv.dll ): GetLastError = 126 LoadLibraryA( C:\ProgramData\BOINC\version.dll ): GetLastError = 126 Loaded Library : version.dll Debugger Engine : 4.0.5.0 Symbol Search Path: C:\ProgramData\BOINC\projects\climateprediction.net;C:\ProgramData\BOINC\projects\climateprediction.net ModLoad: 0000000000400000 0000000000152000 C:\ProgramData\BOINC\projects\climateprediction.net\wah2_8.24_windows_intelx86.exe (-nosymbols- Symbols Loaded) Linked PDB Filename : ModLoad: 0000000077430000 0000000000180000 C:\Windows\SysWOW64\ntdll.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wntdll.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 00000000767f0000 0000000000110000 C:\Windows\syswow64\kernel32.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wkernel32.pdb File Version : 6.1.7601.18015 (win7sp1_gdr.121129-1432) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.18015 ModLoad: 0000000066640000 000000000002f000 C:\Program Files (x86)\AVG\Antivirus\aswhookx.dll (18.5.4.134) (-nosymbols- Symbols Loaded) Linked PDB Filename : D:\BUILD\work\00\5df1e3f518627a3c\build\avgast\RU_NTDLL-lH-Y2A!Win32_vs140\bin\Release_Unicode_NTDLL_vs140\Win32\aswhookx.pdb File Version : 18.5.4.134 Company Name : AVG Technologies CZ, s.r.o. Product Name : AVG Product Version : 18.5.4.134 ModLoad: 00000000764d0000 0000000000047000 C:\Windows\syswow64\KERNELBASE.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wkernelbase.pdb File Version : 6.1.7601.18015 (win7sp1_gdr.121129-1432) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.18015 ModLoad: 0000000076210000 0000000000100000 C:\Windows\syswow64\USER32.dll (6.1.7601.23594) (-exported- Symbols Loaded) Linked PDB Filename : wuser32.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.17514 ModLoad: 0000000074d50000 0000000000090000 C:\Windows\syswow64\GDI32.dll (6.1.7601.23914) (-exported- Symbols Loaded) Linked PDB Filename : wgdi32.pdb File Version : 6.1.7601.23914 (win7sp1_ldr.170908-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.23914 ModLoad: 0000000076610000 000000000000a000 C:\Windows\syswow64\LPK.dll (6.1.7601.24082) (-exported- Symbols Loaded) Linked PDB Filename : wlpk.pdb File Version : 6.1.7601.24082 (win7sp1_ldr.180309-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.24082 ModLoad: 0000000076540000 000000000009d000 C:\Windows\syswow64\USP10.dll (1.626.7601.23894) (-exported- Symbols Loaded) Linked PDB Filename : usp10.pdb File Version : 1.0626.7601.23894 (win7sp1_ldr.170816-0600) Company Name : Microsoft Corporation Product Name : Microsoft(R) Uniscribe Unicode script processor Product Version : 1.0626.7601.23894 ModLoad: 0000000076420000 00000000000ac000 C:\Windows\syswow64\msvcrt.dll (7.0.7601.17744) (-exported- Symbols Loaded) Linked PDB Filename : msvcrt.pdb File Version : 7.0.7601.17744 (win7sp1_gdr.111215-1535) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 7.0.7601.17744 ModLoad: 0000000076b70000 00000000000a1000 C:\Windows\syswow64\ADVAPI32.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : advapi32.pdb File Version : 6.1.7601.24168 (win7sp1_ldr.180608-0600) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.24168 ModLoad: 0000000076ac0000 0000000000019000 C:\Windows\SysWOW64\sechost.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : sechost.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 0000000076700000 00000000000f0000 C:\Windows\syswow64\RPCRT4.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wrpcrt4.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 0000000074ce0000 0000000000060000 C:\Windows\syswow64\SspiCli.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wsspicli.pdb File Version : 6.1.7601.24168 (win7sp1_ldr.180608-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.24168 ModLoad: 0000000074cd0000 000000000000c000 C:\Windows\syswow64\CRYPTBASE.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : cryptbase.pdb File Version : 6.1.7601.24168 (win7sp1_ldr.180608-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.24168 ModLoad: 0000000076650000 0000000000060000 C:\Windows\system32\IMM32.DLL (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : wimm32.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.17514 ModLoad: 0000000076310000 00000000000cd000 C:\Windows\syswow64\MSCTF.dll (6.1.7601.23915) (-exported- Symbols Loaded) Linked PDB Filename : msctf.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 0000000072b30000 00000000000eb000 C:\Windows\system32\dbghelp.dll (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : dbghelp.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.17514 ModLoad: 0000000072cb0000 0000000000009000 C:\Windows\system32\version.dll (6.1.7600.16385) (-exported- Symbols Loaded) Linked PDB Filename : version.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 *** Dump of the Process Statistics: *** - I/O Operations Counters - Read: 5539, Write: 0, Other 31500 - I/O Transfers Counters - Read: 0, Write: 2156, Other 0 - Paged Pool Usage - QuotaPagedPoolUsage: 51200, QuotaPeakPagedPoolUsage: 51200 QuotaNonPagedPoolUsage: 7568, QuotaPeakNonPagedPoolUsage: 7888 - Virtual Memory Usage - VirtualSize: 32509952, PeakVirtualSize: 32509952 - Pagefile Usage - PagefileUsage: 2383872, PeakPagefileUsage: 2957312 - Working Set Size - WorkingSetSize: 4759552, PeakWorkingSetSize: 5279744, PageFaultCount: 1661 *** Dump of thread ID 3184 (state: Waiting): *** - Information - Status: Wait Reason: UserRequest, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 2272642.000000 - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00463007 read attempt to address 0x012703AC - Registers - eax=00000015 ebx=80000000 ecx=00000000 edx=0095e8b8 esi=011a0020 edi=00000000 eip=00463007 esp=0129fe90 ebp=0129fe94 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010216 - Callstack - ChildEBP RetAddr Args to Child 0129fe94 0044826f 011a0020 00000000 011a0020 80000000 wah2_8.24_windows_intelx86!+0x0 0129feac 0044fa68 011a0020 00000000 0051d6b0 0129fefc wah2_8.24_windows_intelx86!+0x0 0129fec0 004856fc 00000015 b0d8a45f 00000001 00000006 wah2_8.24_windows_intelx86!+0x0 0129fefc 768a7651 00000006 b0d8ee34 00000000 00000000 wah2_8.24_windows_intelx86!+0x0 0129ff88 7680343d 00000006 0129ffd4 77469832 80000006 kernel32!CtrlRoutine+0x0 0129ff94 77469832 80000006 747b08d8 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 0129ffd4 77469805 768a749c 80000006 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 0129ffec 00000000 768a749c 80000006 00000000 13762643 ntdll!RtlInitializeExceptionChain+0x0 *** Dump of thread ID 6608 (state: Waiting): *** - Information - Status: Wait Reason: ExecutionDelay, , Kernel Time: 4524029.000000, User Time: 12948083.000000, Wait Time: 2272641.000000 - Registers - eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=0018e5c0 edi=00000000 eip=7744fdc1 esp=0018e57c ebp=0018e5e4 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 - Callstack - ChildEBP RetAddr Args to Child 0018e5e4 764e460c 000000c8 00000000 0018e608 00468ec1 ntdll!NtDelayExecution+0x0 0018e5f4 00468ec1 000000c8 000000c8 00000000 0018e654 KERNELBASE!Sleep+0x0 0018e608 0040761d a0000000 027f9999 00000400 00000000 wah2_8.24_windows_intelx86!+0x0 0018e654 00407888 00000000 004cf020 00916f10 004d0b28 wah2_8.24_windows_intelx86!+0x0 0018eab8 0040433a 0018eae8 004d0920 00000001 004d0b28 wah2_8.24_windows_intelx86!+0x0 0018edf8 00408257 00916ea0 00916ed8 004d0920 b1e9a7eb wah2_8.24_windows_intelx86!+0x0 0018fd48 004094b7 0018fef8 00409535 004d1370 0018fd68 wah2_8.24_windows_intelx86!+0x0 0018fd50 00409535 004d1370 0018fd68 009a3468 0018fd68 wah2_8.24_windows_intelx86!+0x0 0018fef8 00485c7b 00400000 00000000 009a34a6 0000000a wah2_8.24_windows_intelx86!+0x0 0018ff88 7680343d 7efde000 0018ffd4 77469832 7efde000 wah2_8.24_windows_intelx86!+0x0 0018ff94 77469832 7efde000 754a08d8 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 0018ffd4 77469805 00485cce 7efde000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 0018ffec 00000000 00485cce 7efde000 00000000 78746341 ntdll!RtlInitializeExceptionChain+0x0 *** Dump of thread ID 6296 (state: Waiting): *** - Information - Status: Wait Reason: ExecutionDelay, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 2272639.000000 - Registers - eax=c0000022 ebx=00000000 ecx=00000000 edx=00000000 esi=0119fd24 edi=00000000 eip=7744fdc1 esp=0119fce0 ebp=0119fd48 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 - Callstack - ChildEBP RetAddr Args to Child 0119fd48 764e460c 00000064 00000000 0119ff88 00478b44 ntdll!NtDelayExecution+0x0 0119fd58 00478b44 00000064 00000000 00000000 00000000 KERNELBASE!Sleep+0x0 0119ff88 7680343d 00000000 0119ffd4 77469832 00000000 wah2_8.24_windows_intelx86!+0x0 0119ff94 77469832 00000000 744b08d8 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 0119ffd4 77469805 00478b20 00000000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 0119ffec 00000000 00478b20 00000000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 *** Debug Message Dump **** *** Foreground Window Data *** Window Name : Window Class : Window Process ID: 0 Window Thread ID : 0 Exiting... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Unhandled Exception Detected... - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x7794E0A4 read attempt to address 0x3472FFFF Engaging BOINC Windows Runtime Debugger... ******************** BOINC Windows Runtime Debugger Version 7.7.0 Dump Timestamp : 08/11/18 15:03:39 Install Directory : Data Directory : C:\ProgramData\BOINC Project Symstore : LoadLibraryA( C:\ProgramData\BOINC\dbghelp.dll ): GetLastError = 126 Loaded Library : dbghelp.dll LoadLibraryA( C:\ProgramData\BOINC\symsrv.dll ): GetLastError = 126 LoadLibraryA( symsrv.dll ): GetLastError = 126 LoadLibraryA( C:\ProgramData\BOINC\srcsrv.dll ): GetLastError = 126 LoadLibraryA( srcsrv.dll ): GetLastError = 126 LoadLibraryA( C:\ProgramData\BOINC\version.dll ): GetLastError = 126 Loaded Library : version.dll Debugger Engine : 4.0.5.0 Symbol Search Path: C:\ProgramData\BOINC\slots\5;C:\ProgramData\BOINC\projects\climateprediction.net ModLoad: 0000000000400000 0000000000152000 C:\ProgramData\BOINC\projects\climateprediction.net\wah2_8.24_windows_intelx86.exe (-nosymbols- Symbols Loaded) Linked PDB Filename : ModLoad: 0000000077920000 0000000000180000 C:\Windows\SysWOW64\ntdll.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wntdll.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 0000000077430000 0000000000110000 C:\Windows\syswow64\kernel32.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wkernel32.pdb File Version : 6.1.7601.18015 (win7sp1_gdr.121129-1432) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.18015 ModLoad: 0000000074f50000 000000000002f000 C:\Program Files (x86)\AVG\Antivirus\aswhookx.dll (18.5.4.134) (-nosymbols- Symbols Loaded) Linked PDB Filename : D:\BUILD\work\00\5df1e3f518627a3c\build\avgast\RU_NTDLL-lH-Y2A!Win32_vs140\bin\Release_Unicode_NTDLL_vs140\Win32\aswhookx.pdb File Version : 18.5.4.134 Company Name : AVG Technologies CZ, s.r.o. Product Name : AVG Product Version : 18.5.4.134 ModLoad: 0000000075930000 0000000000047000 C:\Windows\syswow64\KERNELBASE.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wkernelbase.pdb File Version : 6.1.7601.18015 (win7sp1_gdr.121129-1432) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.18015 ModLoad: 0000000076f10000 0000000000100000 C:\Windows\syswow64\USER32.dll (6.1.7601.23594) (-exported- Symbols Loaded) Linked PDB Filename : wuser32.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.17514 ModLoad: 00000000773a0000 0000000000090000 C:\Windows\syswow64\GDI32.dll (6.1.7601.23914) (-exported- Symbols Loaded) Linked PDB Filename : wgdi32.pdb File Version : 6.1.7601.23914 (win7sp1_ldr.170908-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.23914 ModLoad: 0000000077040000 000000000000a000 C:\Windows\syswow64\LPK.dll (6.1.7601.24082) (-exported- Symbols Loaded) Linked PDB Filename : wlpk.pdb File Version : 6.1.7601.24082 (win7sp1_ldr.180309-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.24082 ModLoad: 00000000766a0000 000000000009d000 C:\Windows\syswow64\USP10.dll (1.626.7601.23894) (-exported- Symbols Loaded) Linked PDB Filename : usp10.pdb File Version : 1.0626.7601.23894 (win7sp1_ldr.170816-0600) Company Name : Microsoft Corporation Product Name : Microsoft(R) Uniscribe Unicode script processor Product Version : 1.0626.7601.23894 ModLoad: 00000000765d0000 00000000000ac000 C:\Windows\syswow64\msvcrt.dll (7.0.7601.17744) (-exported- Symbols Loaded) Linked PDB Filename : msvcrt.pdb File Version : 7.0.7601.17744 (win7sp1_gdr.111215-1535) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 7.0.7601.17744 ModLoad: 00000000767c0000 00000000000a1000 C:\Windows\syswow64\ADVAPI32.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : advapi32.pdb File Version : 6.1.7601.24168 (win7sp1_ldr.180608-0600) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7601.24168 ModLoad: 0000000076e80000 0000000000019000 C:\Windows\SysWOW64\sechost.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : sechost.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 0000000075650000 00000000000f0000 C:\Windows\syswow64\RPCRT4.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wrpcrt4.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 00000000751d0000 0000000000060000 C:\Windows\syswow64\SspiCli.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : wsspicli.pdb File Version : 6.1.7601.24168 (win7sp1_ldr.180608-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.24168 ModLoad: 00000000751c0000 000000000000c000 C:\Windows\syswow64\CRYPTBASE.dll (6.1.7601.24168) (-exported- Symbols Loaded) Linked PDB Filename : cryptbase.pdb File Version : 6.1.7601.24168 (win7sp1_ldr.180608-0600) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.24168 ModLoad: 0000000076c10000 0000000000060000 C:\Windows\system32\IMM32.DLL (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : wimm32.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.17514 ModLoad: 0000000075250000 00000000000cd000 C:\Windows\syswow64\MSCTF.dll (6.1.7601.23915) (-exported- Symbols Loaded) Linked PDB Filename : msctf.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 000000006f220000 0000000000021000 C:\Windows\system32\ntmarta.dll (6.1.7600.16385) (-exported- Symbols Loaded) Linked PDB Filename : ntmarta.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 0000000075600000 0000000000045000 C:\Windows\syswow64\WLDAP32.dll (6.1.7601.23889) (-exported- Symbols Loaded) Linked PDB Filename : wldap32.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 0000000074ba0000 000000000004c000 C:\Windows\system32\apphelp.dll (6.1.7601.19050) (-exported- Symbols Loaded) Linked PDB Filename : apphelp.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Sistema operativo Microsoft® Windows® Product Version : 6.1.7600.16385 ModLoad: 0000000073020000 00000000000eb000 C:\Windows\system32\dbghelp.dll (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : dbghelp.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.17514 ModLoad: 00000000731a0000 0000000000009000 C:\Windows\system32\version.dll (6.1.7600.16385) (-exported- Symbols Loaded) Linked PDB Filename : version.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 *** Dump of the Process Statistics: *** - I/O Operations Counters - Read: 17593, Write: 0, Other 61763 - I/O Transfers Counters - Read: 0, Write: 1514, Other 0 - Paged Pool Usage - QuotaPagedPoolUsage: 195752, QuotaPeakPagedPoolUsage: 195752 QuotaNonPagedPoolUsage: 8048, QuotaPeakNonPagedPoolUsage: 8128 - Virtual Memory Usage - VirtualSize: 106520576, PeakVirtualSize: 106520576 - Pagefile Usage - PagefileUsage: 2641920, PeakPagefileUsage: 3465216 - Working Set Size - WorkingSetSize: 78553088, PeakWorkingSetSize: 79216640, PageFaultCount: 20161 *** Dump of thread ID 4184 (state: Waiting): *** - Information - Status: Wait Reason: UserRequest, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 701012.000000 - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x7794E0A4 read attempt to address 0x3472FFFF - Registers - eax=3472fff8 ebx=34730000 ecx=d0e83b3a edx=003fe8b8 esi=00bc0000 edi=00000000 eip=7794e0a4 esp=058bfe5c ebp=058bfe6c cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 - Callstack - ChildEBP RetAddr Args to Child 058bfe6c 774414ad 00bc0000 00000000 34730000 058bfe94 ntdll!RtlFreeHeap+0x0 058bfe80 00482c3b 00bc0000 00000000 34730000 058bfeac kernel32!HeapFree+0x0 058bfe94 00448311 34730000 00000000 011d0020 80000000 wah2_8.24_windows_intelx86!+0x0 058bfeac 0044fa68 011d0020 00000000 0051d6b0 058bfefc wah2_8.24_windows_intelx86!+0x0 058bfec0 004856fc 00000015 d563c5c6 00000001 00000006 wah2_8.24_windows_intelx86!+0x0 058bfefc 774e7651 00000006 d565d595 00000000 00000000 wah2_8.24_windows_intelx86!+0x0 058bff88 7744343d 00000006 058bffd4 77959832 80000006 kernel32!CtrlRoutine+0x0 058bff94 77959832 80000006 725dd3f3 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 058bffd4 77959805 774e749c 80000006 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 058bffec 00000000 774e749c 80000006 00000000 53363477 ntdll!RtlInitializeExceptionChain+0x0 *** Dump of thread ID 5736 (state: Waiting): *** - Information - Status: Wait Reason: ExecutionDelay, , Kernel Time: 24804160.000000, User Time: 63492408.000000, Wait Time: 701000.000000 - Registers - eax=00000000 ebx=00000050 ecx=00000000 edx=00000000 esi=0018ed80 edi=00000000 eip=7793fdc1 esp=0018ed3c ebp=0018eda4 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 - Callstack - ChildEBP RetAddr Args to Child 0018eda4 7594460c 000000c8 00000000 0018edc8 00468ec1 ntdll!NtDelayExecution+0x0 0018edb4 00468ec1 000000c8 000000c8 00000000 0018ee00 KERNELBASE!Sleep+0x0 0018edc8 00407a89 a0000000 027f9999 00000000 004d0c50 wah2_8.24_windows_intelx86!+0x0 0018ee00 004092c5 00000000 d0f0c672 00000000 00000000 wah2_8.24_windows_intelx86!+0x0 0018fd48 004094b7 0018fef8 00409535 004d1370 0018fd68 wah2_8.24_windows_intelx86!+0x0 0018fd50 00409535 004d1370 0018fd68 00653468 0018fd68 wah2_8.24_windows_intelx86!+0x0 0018fef8 00485c7b 00400000 00000000 006534a6 0000000a wah2_8.24_windows_intelx86!+0x0 0018ff88 7744343d 7efde000 0018ffd4 77959832 7efde000 wah2_8.24_windows_intelx86!+0x0 0018ff94 77959832 7efde000 77ced3f3 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 0018ffd4 77959805 00485cce 7efde000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 0018ffec 00000000 00485cce 7efde000 00000000 78746341 ntdll!RtlInitializeExceptionChain+0x0 *** Dump of thread ID 6268 (state: Waiting): *** - Information - Status: Wait Reason: ExecutionDelay, , Kernel Time: 0.000000, User Time: 156001.000000, Wait Time: 701007.000000 - Registers - eax=c0000022 ebx=00000000 ecx=00000000 edx=00000000 esi=011cfd24 edi=00000000 eip=7793fdc1 esp=011cfce0 ebp=011cfd48 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 - Callstack - ChildEBP RetAddr Args to Child 011cfd48 7594460c 00000064 00000000 011cff88 00478b44 ntdll!NtDelayExecution+0x0 011cfd58 00478b44 00000064 00000000 00000000 00000000 KERNELBASE!Sleep+0x0 011cff88 7744343d 00000000 011cffd4 77959832 00000000 wah2_8.24_windows_intelx86!+0x0 011cff94 77959832 00000000 76cad3f3 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 011cffd4 77959805 00478b20 00000000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 011cffec 00000000 00478b20 00000000 00000000 32686177 ntdll!RtlInitializeExceptionChain+0x0 *** Debug Message Dump **** *** Foreground Window Data *** Window Name : Window Class : Window Process ID: 0 Window Thread ID : 0 Exiting... Global Worker:: CPDN process is not running, exiting, bRetVal = 1, checkPID=4468, selfPID=4468, iMonCtr=1 No Process Handle Regional Worker:: CPDN process is not running, exiting, bRetVal = 1, checkPID=4468, selfPID=4908, iMonCtr=1 </stderr_txt> ]]> |
No trickles! |
---|
©2024 cpdn.org