Name | hadam3p_pnw_pzfl_2013_1_010005005_0 |
Workunit | 10004410 |
Created | 6 Jul 2015, 23:39:10 UTC |
Sent | 7 Jul 2015, 6:13:04 UTC |
Report deadline | 18 Jun 2016, 11:33:04 UTC |
Received | 8 Jul 2015, 15:03:20 UTC |
Server state | Over |
Outcome | Computation error |
Client state | Compute error |
Exit status | 9 (0x00000009) Unknown error code |
Computer ID | 1368224 |
Run time | 16 hours 25 min 28 sec |
CPU time | 14 hours 35 min 54 sec |
Validate state | Invalid |
Credit | 256.81 |
Device peak FLOPS | 2.96 GFLOPS |
Application version | UK Met Office HadAM3P-HadRM3P Pacific North West v7.27 windows_intelx86 |
Stderr | <core_client_version>7.4.42</core_client_version> <![CDATA[ <message> The storage control block address is invalid. (0x9) - exit code 9 (0x9) </message> <stderr_txt> Suspended CPDN Monitor - Suspend request from BOINC... Unhandled Exception Detected... - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00462B87 read attempt to address 0x014903AC Engaging BOINC Windows Runtime Debugger... ******************** BOINC Windows Runtime Debugger Version 7.5.1 Dump Timestamp : 07/07/15 01:02:30 Install Directory : Data Directory : C:\ProgramData\BOINC Project Symstore : LoadLibraryA( C:\ProgramData\BOINC\dbghelp.dll ): GetLastError = 126 Loaded Library : dbghelp.dll LoadLibraryA( C:\ProgramData\BOINC\symsrv.dll ): GetLastError = 126 LoadLibraryA( symsrv.dll ): GetLastError = 126 LoadLibraryA( C:\ProgramData\BOINC\srcsrv.dll ): GetLastError = 126 LoadLibraryA( srcsrv.dll ): GetLastError = 126 LoadLibraryA( C:\ProgramData\BOINC\version.dll ): GetLastError = 126 Loaded Library : version.dll Debugger Engine : 4.0.5.0 Symbol Search Path: C:\ProgramData\BOINC\slots\0;C:\ProgramData\BOINC\projects\climateprediction.net ModLoad: 0000000000400000 000000000018e000 C:\ProgramData\BOINC\projects\climateprediction.net\hadam3p_pnw_7.27_windows_intelx86.exe (-nosymbols- Symbols Loaded) Linked PDB Filename : ModLoad: 0000000077e60000 0000000000180000 C:\Windows\SysWOW64\ntdll.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : wntdll.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 00000000763f0000 0000000000110000 C:\Windows\syswow64\kernel32.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : wkernel32.pdb File Version : 6.1.7601.18015 (win7sp1_gdr.121129-1432) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.18015 ModLoad: 0000000076180000 0000000000047000 C:\Windows\syswow64\KERNELBASE.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : wkernelbase.pdb File Version : 6.1.7601.18015 (win7sp1_gdr.121129-1432) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.18015 ModLoad: 0000000073ff0000 000000000006d000 C:\Windows\SysWOW64\SYSFER.DLL (12.1.3001.165) (-exported- Symbols Loaded) Linked PDB Filename : c:\bld_area\SEP_12.1\Output\SEPClientProtection\Bin.iru\sysfer.pdb File Version : 12.1.3001.165 Company Name : Symantec Corporation Product Name : Symantec CMC Firewall Product Version : 12.1.3001.165 ModLoad: 0000000075530000 000000000003e000 C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.3001.165.105\Data\Definitions\BASHDefs\20150625.011\UMEngx86.dll (9.2.1.8) (-exported- Symbols Loaded) Linked PDB Filename : C:\bld_area\BehaviorBlocking\BB9.2\Src\9.2.1\Bin\Win32\Release\UMEngx86.pdb File Version : 9.2.1.8 Company Name : Symantec Corporation Product Name : BASH Product Version : 9.2.1.8 ModLoad: 0000000077580000 0000000000100000 C:\Windows\syswow64\USER32.dll (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : wuser32.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.17514 ModLoad: 0000000075e80000 0000000000090000 C:\Windows\syswow64\GDI32.dll (6.1.7601.18778) (-exported- Symbols Loaded) Linked PDB Filename : wgdi32.pdb File Version : 6.1.7601.18778 (win7sp1_gdr.150304-1507) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.18778 ModLoad: 0000000076500000 000000000000a000 C:\Windows\syswow64\LPK.dll (6.1.7601.18768) (-exported- Symbols Loaded) Linked PDB Filename : wlpk.pdb File Version : 6.1.7601.18768 (win7sp1_gdr.150219-1512) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.18768 ModLoad: 00000000772b0000 000000000009d000 C:\Windows\syswow64\USP10.dll (1.626.7601.18454) (-exported- Symbols Loaded) Linked PDB Filename : usp10.pdb File Version : 1.0626.7601.18454 (win7sp1_gdr.140424-1533) Company Name : Microsoft Corporation Product Name : Microsoft(R) Uniscribe Unicode script processor Product Version : 1.0626.7601.18454 ModLoad: 0000000077440000 00000000000ac000 C:\Windows\syswow64\msvcrt.dll (7.0.7601.17744) (-exported- Symbols Loaded) Linked PDB Filename : msvcrt.pdb File Version : 7.0.7601.17744 (win7sp1_gdr.111215-1535) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 7.0.7601.17744 ModLoad: 0000000077910000 00000000000a1000 C:\Windows\syswow64\ADVAPI32.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : advapi32.pdb File Version : 6.1.7601.18869 (win7sp1_gdr.150525-0603) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.18869 ModLoad: 0000000077a40000 0000000000019000 C:\Windows\SysWOW64\sechost.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : sechost.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 0000000077680000 00000000000f0000 C:\Windows\syswow64\RPCRT4.dll (6.1.7601.18532) (-exported- Symbols Loaded) Linked PDB Filename : wrpcrt4.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 00000000757d0000 0000000000060000 C:\Windows\syswow64\SspiCli.dll (6.1.7601.18869) (-exported- Symbols Loaded) Linked PDB Filename : wsspicli.pdb File Version : 6.1.7601.18869 (win7sp1_gdr.150525-0603) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.18869 ModLoad: 00000000757c0000 000000000000c000 C:\Windows\syswow64\CRYPTBASE.dll (6.1.7600.16385) (-exported- Symbols Loaded) Linked PDB Filename : cryptbase.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 0000000075c70000 0000000000060000 C:\Windows\system32\IMM32.DLL (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : wimm32.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.17514 ModLoad: 00000000761e0000 00000000000cc000 C:\Windows\syswow64\MSCTF.dll (6.1.7601.18731) (-exported- Symbols Loaded) Linked PDB Filename : msctf.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 00000000709c0000 0000000000021000 C:\Windows\system32\ntmarta.dll (6.1.7600.16385) (-exported- Symbols Loaded) Linked PDB Filename : ntmarta.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 0000000077260000 0000000000045000 C:\Windows\syswow64\WLDAP32.dll (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : wldap32.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 000000006cdd0000 000000000004c000 C:\Windows\system32\apphelp.dll (6.1.7601.18777) (-exported- Symbols Loaded) Linked PDB Filename : apphelp.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 ModLoad: 000000006c690000 00000000000eb000 C:\Windows\system32\dbghelp.dll (6.1.7601.17514) (-exported- Symbols Loaded) Linked PDB Filename : dbghelp.pdb File Version : 6.1.7601.17514 (win7sp1_rtm.101119-1850) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7601.17514 ModLoad: 00000000728e0000 0000000000009000 C:\Windows\system32\version.dll (6.1.7600.16385) (-exported- Symbols Loaded) Linked PDB Filename : version.pdb File Version : 6.1.7600.16385 (win7_rtm.090713-1255) Company Name : Microsoft Corporation Product Name : Microsoft® Windows® Operating System Product Version : 6.1.7600.16385 *** Dump of the Process Statistics: *** - I/O Operations Counters - Read: 19144, Write: 0, Other 67385 - I/O Transfers Counters - Read: 0, Write: 4146, Other 0 - Paged Pool Usage - QuotaPagedPoolUsage: 100096, QuotaPeakPagedPoolUsage: 126392 QuotaNonPagedPoolUsage: 9968, QuotaPeakNonPagedPoolUsage: 10048 - Virtual Memory Usage - VirtualSize: 59990016, PeakVirtualSize: 72142848 - Pagefile Usage - PagefileUsage: 3403776, PeakPagefileUsage: 8269824 - Working Set Size - WorkingSetSize: 30359552, PeakWorkingSetSize: 31956992, PageFaultCount: 9836 *** Dump of thread ID 6816 (state: Waiting): *** - Information - Status: Wait Reason: UserRequest, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 222594.000000 - Unhandled Exception Record - Reason: Access Violation (0xc0000005) at address 0x00462B87 read attempt to address 0x014903AC - Registers - eax=00000015 ebx=80000000 ecx=00000000 edx=00e9e8b8 esi=013c0020 edi=00000000 eip=00462b87 esp=02e2fe90 ebp=02e2fe94 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010216 - Callstack - ChildEBP RetAddr Args to Child 02e2fe94 00447d6f 013c0020 00000000 013c0020 80000000 hadam3p_pnw_7.27_windows_intelx!+0x0 02e2feac 0044f568 013c0020 00000000 005597a4 02e2fefc hadam3p_pnw_7.27_windows_intelx!+0x0 02e2fec0 0048374c 00000015 eb12fcd0 00000001 00000006 hadam3p_pnw_7.27_windows_intelx!+0x0 02e2fefc 764a7441 00000006 eb1c338b 00000000 00000000 hadam3p_pnw_7.27_windows_intelx!+0x0 02e2ff88 7640337a 00000006 02e2ffd4 77e992e2 80000006 kernel32!CtrlRoutine+0x0 02e2ff94 77e992e2 80000006 751ff9ee 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 02e2ffd4 77e992b5 764a728c 80000006 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 02e2ffec 00000000 764a728c 80000006 00000000 16787b7d ntdll!RtlInitializeExceptionChain+0x0 *** Dump of thread ID 6788 (state: Waiting): *** - Information - Status: Wait Reason: ExecutionDelay, , Kernel Time: 19500124.000000, User Time: 51792332.000000, Wait Time: 222592.000000 - Registers - eax=00000000 ebx=004cf850 ecx=00000000 edx=00000000 esi=0018f9d8 edi=00000000 eip=77e7fddd esp=0018f994 ebp=0018f9fc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 - Callstack - ChildEBP RetAddr Args to Child 0018f9fc 761944ab 000000c8 00000000 0018fa20 004689c1 ntdll!NtDelayExecution+0x0 0018fa0c 004689c1 000000c8 000000c8 00000000 0018fa58 KERNELBASE!Sleep+0x0 0018fa20 00403ddc a0000000 027f9999 004cf858 004cfb88 hadam3p_pnw_7.27_windows_intelx!+0x0 0018fa58 00404d76 00000000 e9e8ff64 00000000 00000000 hadam3p_pnw_7.27_windows_intelx!+0x0 0018fd48 00404f67 0018fef8 00404fe5 004d02a8 0018fd68 hadam3p_pnw_7.27_windows_intelx!+0x0 0018fd50 00404fe5 004d02a8 0018fd68 006b25d0 0018fd68 hadam3p_pnw_7.27_windows_intelx!+0x0 0018fef8 00484e1b 00400000 00000000 006b2615 0000000a hadam3p_pnw_7.27_windows_intelx!+0x0 0018ff88 7640337a 7efde000 0018ffd4 77e992e2 7efde000 hadam3p_pnw_7.27_windows_intelx!+0x0 0018ff94 77e992e2 7efde000 77e5f9ee 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 0018ffd4 77e992b5 00484e6e 7efde000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 0018ffec 00000000 00484e6e 7efde000 00000000 00905a4d ntdll!RtlInitializeExceptionChain+0x0 *** Dump of thread ID 6804 (state: Waiting): *** - Information - Status: Wait Reason: UserRequest, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 222583.000000 - Registers - eax=00000000 ebx=00030000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000 eip=001d03a3 esp=009bff54 ebp=009bff88 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 - Callstack - ChildEBP RetAddr Args to Child 009bff88 7640337a 00030000 009bffd4 77e992e2 00030000 !+0x0 SymFromAddr(): GetLastError = '126' SymGetModuleInfo(): GetLastError = '126' Address = '001d03a3' 009bff94 77e992e2 00030000 7766f9ee 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 SymFromAddr(): GetLastError = '126' SymGetModuleInfo(): GetLastError = '126' Address = '7640337a' 009bffd4 77e992b5 00030064 00030000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 SymFromAddr(): GetLastError = '126' SymGetModuleInfo(): GetLastError = '126' Address = '77e992e2' 009bffec 00000000 00030064 00030000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 SymFromAddr(): GetLastError = '126' SymGetModuleInfo(): GetLastError = '126' Address = '77e992b5' *** Dump of thread ID 6828 (state: Waiting): *** - Information - Status: Wait Reason: ExecutionDelay, , Kernel Time: 0.000000, User Time: 0.000000, Wait Time: 222588.000000 - Registers - eax=c0000022 ebx=00000000 ecx=00000000 edx=00000000 esi=013bfd24 edi=00000000 eip=77e7fddd esp=013bfce0 ebp=013bfd48 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 - Callstack - ChildEBP RetAddr Args to Child 013bfd48 761944ab 00000064 00000000 013bff88 00477e94 ntdll!NtDelayExecution+0x0 013bfd58 00477e94 00000064 00000000 00000000 00000000 KERNELBASE!Sleep+0x0 013bff88 7640337a 00000000 013bffd4 77e992e2 00000000 hadam3p_pnw_7.27_windows_intelx!+0x0 013bff94 77e992e2 00000000 76c6f9ee 00000000 00000000 kernel32!BaseThreadInitThunk+0x0 013bffd4 77e992b5 00477e70 00000000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 013bffec 00000000 00477e70 00000000 00000000 00000000 ntdll!RtlInitializeExceptionChain+0x0 *** Debug Message Dump **** *** Foreground Window Data *** Window Name : Window Class : Window Process ID: 0 Window Thread ID : 0 Exiting... Global Worker:: CPDN process is not running, exiting, bRetVal = 1, checkPID=6860, selfPID=6860, iMonCtr=1 Regional Worker:: CPDN process is not running, exiting, bRetVal = 1, checkPID=6860, selfPID=6932, iMonCtr=1 Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Suspended CPDN Monitor - Suspend request from BOINC... Global Worker:: CPDN process is not running, exiting, bRetVal = 1, checkPID=2676, selfPID=2676, iMonCtr=1 </stderr_txt> ]]> |
Latest Trickles Received | ||||||
---|---|---|---|---|---|---|
Time Sent (UTC) | Host ID | Result ID | Result Name | Timestep | CPU Time (sec) | Average (sec/TS) |
08 Jul 2015 02:14:25 | 1368224 | 18672176 | hadam3p_pnw_pzfl_2013_1_010005005_0 | 11,819 | 36,706 | 3.1057 |
©2024 cpdn.org