------------------------------------------------------------------------ Segmentation violation detected at Mon Jul 17 09:47:08 2006 ------------------------------------------------------------------------
Configuration: MATLAB Version: 7.0.0.19920 (R14) Operating System: Microsoft Windows XP Window System: Version 5.1 (Build 2600: Service Pack 2) Processor ID: x86 Family 15 Model 2 Stepping 9, GenuineIntel Virtual Machine: Java 1.4.2 with Sun Microsystems Inc. Java HotSpot(TM) Client VM (mixed mode) Default Charset: ibm-1386_P100-2002
Register State: EAX = 14d9f320 EBX = 00000001 ECX = 00000000 EDX = 14bdc520 ESI = 14d9f320 EDI = 00000000 EBP = 00cdb434 ESP = 00cdaecc EIP = 02f31139 FLG = 00010246
Stack Trace: [0] maplec.dll:0x02f31139(2, 0x00cdc050, 1, 0x00cdc0e0) [1] libmex.dll:_mexRunMexFile(2, 0x00cdc050, 1, 0x00cdc0e0) + 71 bytes [2] libmex.dll:public: virtual void __thiscall Mfh_mex::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(2, 0x00cdc050, 1, 0x00cdc0e0) + 157 bytes [3] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(2, 0x00cdc050, 1, 0x00cdc0e0) + 273 bytes [4] m_interpreter.dll:public: void __thiscall ResolverFunctionDesc::CallFunction(int,struct mxArray_tag * * const,int,struct mxArray_tag * * const)(2, 0x00cdc050, 1, 0x00cdc0e0) + 246 bytes [5] m_interpreter.dll:public: bool __thiscall Resolver::CallMFunction(int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *)(2, 2, 0x01512110, 0) + 840 bytes [6] m_interpreter.dll:bool __cdecl inResolveMFunctionCall(struct _m_function_desc *,int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *,enum inMarshalType *,unsigned int,int,unsigned int *,int)(0x0f5a94e0, 2, 2, 0x01512110) + 148 bytes [7] m_interpreter.dll:bool __cdecl accelMFunctionCall(struct _accelOp *,struct _accelOp * *,struct _accelBytecode *,int *,enum inMarshalType *)(0x0f6ca3f0, 0x00cdc6f4, 0x0130e600, 0x00cdc6ec) + 108 bytes [8] m_interpreter.dll:int __cdecl accelExec(struct _accelBytecode *,enum inMarshalType *)(0x0130e600, 0x00cdc76c, 0, 0) + 18462 bytes [9] m_interpreter.dll:_inExecuteHotSegment(0x00cdc7a0, 0x00cdc870, 0x00cdc820, 0) + 1542 bytes [10] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *)(1, 2260, 104, 0) + 365 bytes [11] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *)(1, 2260, 40, 0) + 272 bytes [12] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x0f285d20, 0, 1, 0) + 773 bytes [13] m_interpreter.dll:_inWordsj(2, 0x00cdd2c0, 1, 0x00cdd350) + 441 bytes
| |