1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
| ------------------------------------------------------------------------
Segmentation violation detected at Mon Oct 20 09:38:59 2008
------------------------------------------------------------------------
Configuration:
MATLAB Version: 7.5.0.342 (R2007b)
MATLAB License: XXXXXX
Operating System: Microsoft Windows XP
Window System: Version 5.1 (Build 2600: Service Pack 3)
Processor ID: x86 Family 6 Model 15 Stepping 6, GenuineIntel
Virtual Machine: Java 1.6.0 with Sun Microsystems Inc. Java HotSpot(TM) Client VM mixed mode
Default Charset: windows-1252
Register State:
EAX = 00000005 EBX = 0a800d88
ECX = fffffffe EDX = fffffffe
ESI = 0a6cc928 EDI = 00000240
EBP = 00cec36c ESP = 00cec33c
EIP = 095a112c FLG = 00210207
Stack Trace:
[0] patch_match.dll:0x095a112c(0x0ae9dca0, 0x00cecb9c, 0x0a800d88, 159)
[1] libmex.dll:_mexRunMexFile(1, 0x00cecb9c, 8, 0x00cecc2c) + 139 bytes
[2] libmex.dll:private: void __thiscall Mfh_mex::runMexFileWithSignalProtection(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cecb9c, 8, 0x00cecc2c) + 86 bytes
[3] libmex.dll:public: virtual void __thiscall Mfh_mex::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cecb9c, 8, 0x00cecc2c) + 261 bytes
[4] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cecb9c, 8, 0x00cecc2c) + 203 bytes
[5] m_interpreter.dll:void __cdecl mdCallFunction(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_MATLAB_fn *)(1, 0x00cecb9c, 8, 0x00cecc2c) + 56 bytes
[6] m_interpreter.dll:public: void __thiscall ResolverFunctionDesc::CallFunction(int,struct mxArray_tag * * const,int,struct mxArray_tag * * const)(1, 0x00cecb9c, 8, 0x00cecc2c) + 93 bytes
[7] m_interpreter.dll:public: bool __thiscall Resolver::CallMFunction(int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *)(1, 1, 0x09a0f3e0, 0) + 1388 bytes
[8] m_interpreter.dll:bool __cdecl inResolveMFunctionCall(struct _m_function_desc *,int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *,enum inMarshalType *,int,class mpsTypeSequenceNlhs const *,struct mxArray_tag * (__cdecl*)(int))(0x0a4f7e48, 1, 1, 0x09a0f3e0) + 195 bytes
[9] m_interpreter.dll:private: bool __thiscall accelImpl::MFunctionCall(struct _accelOp * *)(0x00ced238 "°Ë@\n", 0xec3902bd, 0x0b072780, 0x0b20bb00) + 179 bytes
[10] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelImpl::Exec(void)(0xec390225, 0x0b072780, 1, 0x00ced39c) + 205 bytes
[11] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelCode::Call(enum inMarshalType *,int *)const (0x00ced33c, 0x00ced314, 0xec3903e9, 0x0332cbd0) + 128 bytes
[12] m_interpreter.dll:public: static bool __cdecl inJit::ExecuteHotSegment(struct _inJitAccelInfo *,enum opcodes *,int *,int *)(0x00ced38c, 0x00ced3b4, 0x00ced398 "ÿÿÿÿ", 0x00ced39c) + 1898 bytes
[13] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x0add16e0 "D#ùyPe", 0x79588700, 0xec3905e1, 0xffffffff) + 594 bytes
[14] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(3, 0x00ced7fc, 6, 0x00ced88c) + 673 bytes
[15] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 3, 0x00ced7fc, 6) + 29 bytes
[16] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(3, 0x00ced7fc, 6, 0x00ced88c) + 28 bytes
[17] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(3, 0x00ced7fc, 6, 0x00ced88c) + 203 bytes
[18] m_interpreter.dll:void __cdecl mdCallFunction(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_MATLAB_fn *)(3, 0x00ced7fc, 6, 0x00ced88c) + 56 bytes
[19] m_interpreter.dll:public: void __thiscall ResolverFunctionDesc::CallFunction(int,struct mxArray_tag * * const,int,struct mxArray_tag * * const)(3, 0x00ced7fc, 6, 0x00ced88c) + 93 bytes
[20] m_interpreter.dll:public: bool __thiscall Resolver::CallMFunction(int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *)(3, 3, 0x0b5513a0, 0) + 1388 bytes
[21] m_interpreter.dll:bool __cdecl inResolveMFunctionCall(struct _m_function_desc *,int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *,enum inMarshalType *,int,class mpsTypeSequenceNlhs const *,struct mxArray_tag * (__cdecl*)(int))(0x0a3e5a70, 3, 3, 0x0b5513a0) + 195 bytes
[22] m_interpreter.dll:private: bool __thiscall accelImpl::MFunctionCall(struct _accelOp * *)(0x00cede98, 0xec390edd, 0x0969cce0, 0x02b9b8d0) + 179 bytes
[23] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelImpl::Exec(void)(0xec390e45, 0x0969cce0, 1, 0x00cee24c) + 205 bytes
[24] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelCode::Call(enum inMarshalType *,int *)const (0x00cedf9c, 0x00cedf74, 0xec390f09, 0) + 128 bytes
[25] m_interpreter.dll:public: static bool __cdecl inJit::ExecuteHotSegment(struct _inJitAccelInfo *,enum opcodes *,int *,int *)(0x00cee044, 0x00cee0f8, 0x00cee0a8, 0x00cee24c) + 1898 bytes
[26] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(1, 0, 70, 0) + 338 bytes
[27] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 0, 16, 0) + 87 bytes
[28] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 0, 16, 0) + 274 bytes
[29] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x031542a0 "D#ùy9e", 0x030fcd01, 0xec3934b1, 0xffffffff) + 916 bytes
[30] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(0, 0x00cee4c4, 0, 0x00cee524) + 673 bytes
[31] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0, 0x00cee4c4, 0) + 29 bytes
[32] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cee4c4, 0, 0x00cee524) + 28 bytes
[33] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cee4c4, 0, 0x00cee524) + 203 bytes
[34] m_interpreter.dll:__catch$?inDispatchFromStack@@YAHHPBDHH@Z$0(649, 0x015e3634 "main_corner_video", 0, 0) + 744 bytes
[35] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x015e3634 "main_corner_video", 649, 0, 0) + 156 bytes
[36] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(2, 0, 0, 0) + 2739 bytes
[37] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 87 bytes
[38] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 274 bytes
[39] m_interpreter.dll:_inInterPcode(2, 0xec393849, 0, 0x015fcc20 "main_corner_video\n") + 162 bytes
[40] m_interpreter.dll:enum inExecutionStatus __cdecl in_local_call_eval_function(int *,struct _pcodeheader *,int *,struct mxArray_tag * * const,enum inDebugCheck,bool)(0x00cef2bc, 0x00cef32c, 0x00cef358, 2) + 152 bytes
[41] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalStringWithIsVarFcn(struct _memory_context *,char const *,enum EvalType,int,struct mxArray_tag * * const,enum inDebugCheck,struct _pcodeheader *,int *,bool (__cdecl*)(void *,char const *),void *,bool)(0x7ac2177c, 0x015fcc20 "main_corner_video\n", 0, 0) + 2454 bytes
[42] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalCmdWithLocalReturnandtype(char const *,int *,enum inDebugCheck,bool)(0x015fcc20 "main_corner_video\n", 0, 2, 0) + 107 bytes
[43] m_interpreter.dll:_inEvalCmdNoEnd(0x015fcc20 "main_corner_video\n", 0, 0xec016be8, 0x7ab9e7f0) + 20 bytes
[44] bridge.dll:enum inExecutionStatus __cdecl ThrowSignal(char const *)(0x015fcc20 "main_corner_video\n", 0xec016ca4, 0x014e3f98, 0x014e3f38) + 77 bytes
[45] bridge.dll:__catch$_mnParser$0(0xec00e2cb, 0x014e3f38, 0x014e3f38, 0) + 292 bytes
[46] mcr.dll:public: void __thiscall mcrInstance::mnParser(void)(0xec00e877, 0x004043f0, 336710, 0) + 62 bytes
[47] MATLAB.exe:0x00401414(4194304, 0, 336710, 10)
[48] MATLAB.exe:0x00401733(0, 0, 0x7ffd6000, 0x8054b6ed)
[49] kernel32.dll:0x7c817067(0x00401910, 0, 0x78746341, 32)
This error was detected while a MEX-file was running. If the MEX-file
is not an official MathWorks function, please examine its source code
for errors. Please consult the External Interfaces Guide for information
on debugging MEX-files.
If it is an official MathWorks function, please
follow these steps to report this problem to The MathWorks so we
have the best chance of correcting it: |
Partager