Name | RNM_zeta6_central_0_18_87_31_1 |
Workunit | 24678464 |
Created | 21 Aug 2024, 8:11:00 UTC |
Sent | 21 Aug 2024, 13:15:53 UTC |
Report deadline | 26 Aug 2024, 13:15:52 UTC |
Received | 1 Sep 2024, 4:22:43 UTC |
Server state | Over |
Outcome | Computation error |
Client state | Compute error |
Exit status | -1073741819 (0xC0000005) STATUS_ACCESS_VIOLATION |
Computer ID | 12512 |
Run time | 1 min 38 sec |
CPU time | 1 min 33 sec |
Validate state | Invalid |
Credit | 0.00 |
Device peak FLOPS | 2.60 GFLOPS |
Application version | Ramanujan Machine New Key v1.11 windows_x86_64 |
Peak working set size | 88.19 MB |
Peak swap size | 172.73 MB |
Peak disk usage | 93.39 MB |
<core_client_version>8.0.2</core_client_version> <![CDATA[ <message> (unknown error) (317) - exit code 3221225477 (0xc0000005)</message> <stderr_txt> 14:57:23 (6628): wrapper (7.7.26016): starting 14:57:24 (6628): wrapper: running RamanujanMachine.exe (0001.json) Matplotlib is building the font cache; this may take a moment. Unhandled Exception Detected... - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00007FF7F3E0D750 read attempt to address 0x01AE1018 Engaging BOINC Windows Runtime Debugger... ******************** BOINC Windows Runtime Debugger Version 7.7.0 Dump Timestamp : 09/01/24 09:49:06 Install Directory : D:\Program Files\BOINC\ Data Directory : D:\ProgramData\BOINC Project Symstore : LoadLibraryA( D:\Program Files\BOINC\\dbghelp.dll ): GetLastError = 126 Loaded Library : dbghelp.dll LoadLibraryA( D:\Program Files\BOINC\\symsrv.dll ): GetLastError = 126 LoadLibraryA( symsrv.dll ): GetLastError = 126 LoadLibraryA( D:\Program Files\BOINC\\srcsrv.dll ): GetLastError = 126 LoadLibraryA( srcsrv.dll ): GetLastError = 126 LoadLibraryA( D:\Program Files\BOINC\\version.dll ): GetLastError = 126 Loaded Library : version.dll Debugger Engine : 4.0.5.0 Symbol Search Path: D:\ProgramData\BOINC\slots\0;D:\ProgramData\BOINC\projects\rnma.xyz_boinc ModLoad: 00000000f3dd0000 00000000001b0000 D:\ProgramData\BOINC\projects\rnma.xyz_boinc\wrapper_26016_windows_x86_64.exe (7.7.26016.0) (-nosymbols- Symbols Loaded) Linked PDB Filename : C:\Src\BOINC\boinc\win_build\Build\x64\Release\wrapper_26016_windows_x86_64.pdb File Version : 7.7.26016 Company Name : Space Sciences Laboratory Product Name : BOINC Wrapper Product Version : 7.7.26016 ModLoad: 0000000068e30000 00000000001f8000 C:\Windows\SYSTEM32\ntdll.dll (6.2.19041.4522) (-exported- Symbols Loaded) Linked PDB Filename : ntdll.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 000000003cbc0000 000000000001a000 D:\Program Files\Avast Software\Avast\aswhook.dll (24.7.9311.0) (-nosymbols- Symbols Loaded) Linked PDB Filename : C:\BUILD\work\e0dd96435fde7cb0\COMPILEIDP\Release_Unicode_NTDLL-x64-nxqpvvy\bin\Release_Unicode_NTDLL_vs143\x64\aswhook.pdb File Version : 24.7.9311.0 Company Name : AVAST Software Product Name : Avast Product Version : 24.7.9311.0 ModLoad: 0000000067e80000 00000000000c1000 C:\Windows\System32\KERNEL32.DLL (6.2.19041.4717) (-exported- Symbols Loaded) Linked PDB Filename : kernel32.pdb File Version : 10.0.19041.4717 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.4717 ModLoad: 00000000668b0000 00000000002fd000 C:\Windows\System32\KERNELBASE.dll (6.2.19041.4717) (-exported- Symbols Loaded) Linked PDB Filename : kernelbase.pdb File Version : 10.0.19041.4717 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.4717 ModLoad: 0000000067560000 000000000019d000 C:\Windows\System32\USER32.dll (6.2.19041.4717) (-exported- Symbols Loaded) Linked PDB Filename : user32.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 0000000066c80000 0000000000022000 C:\Windows\System32\win32u.dll (6.2.19041.4717) (-exported- Symbols Loaded) Linked PDB Filename : win32u.pdb File Version : 10.0.19041.4717 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.4717 ModLoad: 0000000067f50000 000000000002b000 C:\Windows\System32\GDI32.dll (6.2.19041.4474) (-exported- Symbols Loaded) Linked PDB Filename : gdi32.pdb File Version : 10.0.19041.4474 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.4474 ModLoad: 00000000664e0000 0000000000117000 C:\Windows\System32\gdi32full.dll (6.2.19041.4717) (-exported- Symbols Loaded) Linked PDB Filename : gdi32full.pdb File Version : 10.0.19041.4717 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.4717 ModLoad: 0000000066be0000 000000000009d000 C:\Windows\System32\msvcp_win.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : msvcp_win.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000066d60000 0000000000100000 C:\Windows\System32\ucrtbase.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : ucrtbase.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000068ad0000 00000000000b0000 C:\Windows\System32\ADVAPI32.dll (6.2.19041.4597) (-exported- Symbols Loaded) Linked PDB Filename : advapi32.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 00000000687e0000 000000000009e000 C:\Windows\System32\msvcrt.dll (7.0.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : msvcrt.pdb File Version : 7.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 7.0.19041.3636 ModLoad: 0000000068bb0000 00000000000a0000 C:\Windows\System32\sechost.dll (6.2.19041.4597) (-exported- Symbols Loaded) Linked PDB Filename : sechost.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 00000000688f0000 0000000000123000 C:\Windows\System32\RPCRT4.dll (6.2.19041.4597) (-exported- Symbols Loaded) Linked PDB Filename : rpcrt4.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000066bb0000 0000000000027000 C:\Windows\System32\bcrypt.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : bcrypt.pdb File Version : 10.0.19041.1 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.1 ModLoad: 0000000067700000 000000000076f000 C:\Windows\System32\SHELL32.dll (6.2.19041.4780) (-exported- Symbols Loaded) Linked PDB Filename : shell32.pdb File Version : 10.0.19041.4123 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.4123 ModLoad: 000000005e5f0000 00000000001e4000 C:\Windows\SYSTEM32\dbghelp.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : dbghelp.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 0000000055cd0000 000000000000a000 C:\Windows\SYSTEM32\version.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : version.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 ModLoad: 00000000666c0000 0000000000082000 C:\Windows\System32\bcryptPrimitives.dll (6.2.19041.3636) (-exported- Symbols Loaded) Linked PDB Filename : bcryptprimitives.pdb File Version : 10.0.19041.3636 (WinBuild.160101.0800) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 10.0.19041.3636 *** Dump of the Process Statistics: *** - I/O Operations Counters - Read: 4908, Write: 2047, Other 32374 - I/O Transfers Counters - Read: 39968895, Write: 97917153, Other 225918 - Paged Pool Usage - QuotaPagedPoolUsage: 67560, QuotaPeakPagedPoolUsage: 69400 QuotaNonPagedPoolUsage: 7744, QuotaPeakNonPagedPoolUsage: 8424 - Virtual Memory Usage - VirtualSize: 2953216, PeakVirtualSize: 78483456 - Pagefile Usage - PagefileUsage: 2953216, PeakPagefileUsage: 5255168 - Working Set Size - WorkingSetSize: 6803456, PeakWorkingSetSize: 8982528, PageFaultCount: 591639 *** Dump of thread ID 10528 (state: Initialized): *** - Information - Status: Base Priority: Normal, Priority: Normal, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 0.000000 - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00007FF7F3E0D750 read attempt to address 0x01AE1018 - Registers - rax=0000000000000000 rbx=0000000001ae1018 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000003fbf r8=0000000000000005 r9=0000000000000000 r10=0000000000000000 r11=0000000000000246 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 rip=00000000f3e0d750 rsp=0000000001fdfc30 rbp=0000000000000000 cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010212 - Callstack - ChildEBP RetAddr Args to Child 01fdfc50 f3e1531f f3e15260 00000015 00000000 00000000 wrapper_26016_windows_x86_64!+0x0 01fdfc80 f3e3d1b7 f3e15260 00000000 f3e15260 00000015 wrapper_26016_windows_x86_64!+0x0 01fdfcb0 66943c63 00000006 80000006 00000000 00000000 wrapper_26016_windows_x86_64!+0x0 01fdfda0 67e97374 00000000 00000000 00000000 00000000 KERNELBASE!CtrlRoutine+0x0 01fdfdd0 68e7cc91 00000000 00000000 00000000 00000000 KERNEL32!BaseThreadInitThunk+0x0 01fdfe50 00000000 00000000 00000000 00000000 00000000 ntdll!RtlUserThreadStart+0x0 *** Dump of thread ID 32764 (state: Initialized): *** - Information - Status: Base Priority: Normal, Priority: Unknown, , Kernel Time: 4.000000, User Time: 0.000000, Wait Time: 3548512512.000000 - Registers - rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000 cs=0000 ss=0000 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000 - Callstack - ChildEBP RetAddr Args to Child (-nosymbols- PC == 0) 00000000 00000000 00000000 00000000 00000000 00000000 !+0x0 *** Dump of thread ID 31128614 (state: Unknown): *** - Information - Status: Base Priority: Normal, Priority: Unknown, , Kernel Time: 34359738368.000000, User Time: 21474846720.000000, Wait Time: 156250.000000 - Registers - rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000 cs=0000 ss=0000 ds=0000 es=0000 fs=0000 gs=0000 efl=00000000 - Callstack - ChildEBP RetAddr Args to Child (-nosymbols- PC == 0) 00000000 00000000 00000000 00000000 00000000 00000000 !+0x0 *** Debug Message Dump **** *** Foreground Window Data *** Window Name : Window Class : Window Process ID: 0 Window Thread ID : 0 Exiting... </stderr_txt> ]]>
©2024 The Ramanujan Machine Project Team