Crash of Matlab running chili() function
Posted: Sun Sep 10, 2017 11:23 pm
Running example scripts from slowmotion folder (like nitroxide_basic.m) Matlab R2012b closes sometimes withowt any error messages. The error is irreproducible and may occurs at second of fird start of the script.
Running the same script on Matlab R2007b returns the follow messages:
Running the same script on Matlab R2007b returns the follow messages:
Code: Select all
------------------------------------------------------------------------
Segmentation violation detected at Mon Sep 11 09:12:27 2017
------------------------------------------------------------------------
Configuration:
MATLAB Version: 7.5.0.342 (R2007b)
MATLAB License: 161052
Operating System: Microsoft Windows XP
Window System: Version 5.1 (Build 2600: Service Pack 3)
Processor ID: x86 Family 6 Model 7 Stepping 6, GenuineIntel
Virtual Machine: Java 1.6.0 with Sun Microsystems Inc. Java HotSpot(TM) Client VM mixed mode
Default Charset: windows-1251
Register State:
EAX = 00000004 EBX = 12357870
ECX = 14476a04 EDX = 00ced244
ESI = 00ced2a4 EDI = 14470000
EBP = 00cecbfc ESP = 00cecb98
EIP = 14476a60 FLG = 00210246
Stack Trace:
[0] chili_lm.mexw32:0x14476a60(4, 0x00ced244, 4, 0x00ced2a4)
[1] libmex.dll:_mexRunMexFile(4, 0x00ced244, 4, 0x00ced2a4) + 139 bytes
[2] libmex.dll:private: void __thiscall Mfh_mex::runMexFileWithSignalProtection(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(4, 0x00ced244, 4, 0x00ced2a4) + 86 bytes
[3] libmex.dll:public: virtual void __thiscall Mfh_mex::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(4, 0x00ced244, 4, 0x00ced2a4) + 261 bytes
[4] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(4, 0x00ced244, 4, 0x00ced2a4) + 203 bytes
[5] m_interpreter.dll:__catch$?inDispatchFromStack@@YAHHPBDHH@Z$0(735, 0x13fd6734 "chili_lm", 4, 4) + 744 bytes
[6] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x13fd6734 "chili_lm", 735, 4, 0xfffffffc) + 156 bytes
[7] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(1, 18040, 885, 0) + 2614 bytes
[8] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 18040, 60, 0) + 87 bytes
[9] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 18040, 60, 0) + 274 bytes
[10] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x14017720, 0x12a7d600, 0x85113f33, 0xffffffff) + 916 bytes
[11] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(2, 0x00ced884, 3, 0x00ced8e4) + 673 bytes
[12] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 2, 0x00ced884, 3) + 29 bytes
[13] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(2, 0x00ced884, 3, 0x00ced8e4) + 28 bytes
[14] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(2, 0x00ced884, 3, 0x00ced8e4) + 203 bytes
[15] m_interpreter.dll:__catch$?inDispatchFromStack@@YAHHPBDHH@Z$0(698, 0x13fd66bc "chili", 2, 3) + 744 bytes
[16] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x13fd66bc "chili", 698, 2, 3) + 156 bytes
[17] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(1, 18040, 122, 0) + 2614 bytes
[18] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 18040, 60, 0) + 87 bytes
[19] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 18040, 60, 0) + 274 bytes
[20] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x14017720, 0x12a7d600, 0x851136f3, 0xffffffff) + 916 bytes
[21] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(0, 0x00cedec4, 2, 0x00cedf24) + 673 bytes
[22] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0, 0x00cedec4, 2) + 29 bytes
[23] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cedec4, 2, 0x00cedf24) + 28 bytes
[24] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cedec4, 2, 0x00cedf24) + 203 bytes
[25] m_interpreter.dll:__catch$?inDispatchFromStack@@YAHHPBDHH@Z$0(698, 0x0155bdd3 "chili", 0, 2) + 744 bytes
[26] m_interpreter.dll:_inCallFcnFromReference(0x8511081f, 0xffffffff, 0x0150283c, 0) + 166 bytes
[27] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(1, 0, 22, 0) + 4760 bytes
[28] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 0, 3, 0) + 87 bytes
[29] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 0, 3, 0) + 274 bytes
[30] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x12a4bee0, 0x129f6301, 0x85110cf3, 0xffffffff) + 916 bytes
[31] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(0, 0x00cee4c4, 0, 0x00cee524) + 673 bytes
[32] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0, 0x00cee4c4, 0) + 29 bytes
[33] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cee4c4, 0, 0x00cee524) + 28 bytes
[34] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cee4c4, 0, 0x00cee524) + 203 bytes
[35] m_interpreter.dll:__catch$?inDispatchFromStack@@YAHHPBDHH@Z$0(680, 0x015d7804 "nitroxide_basic", 0, 0) + 744 bytes
[36] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x015d7804 "nitroxide_basic", 680, 0, 0) + 156 bytes
[37] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(2, 0, 0, 0) + 2739 bytes
[38] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 87 bytes
[39] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 274 bytes
[40] m_interpreter.dll:_inInterPcode(2, 0x8511000b, 0, 0x015edd20 "nitroxide_basic\n") + 162 bytes
[41] m_interpreter.dll:enum inExecutionStatus __cdecl in_local_call_eval_function(int *,struct _pcodeheader *,int *,struct mxArray_tag * * const,enum inDebugCheck,bool)(0x00cef2bc, 0x00cef32c, 0x00cef358, 2) + 152 bytes
[42] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalStringWithIsVarFcn(struct _memory_context *,char const *,enum EvalType,int,struct mxArray_tag * * const,enum inDebugCheck,struct _pcodeheader *,int *,bool (__cdecl*)(void *,char const *),void *,bool)(0x7ac2177c, 0x015edd20 "nitroxide_basic\n", 0, 0) + 2454 bytes
[43] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalCmdWithLocalReturnandtype(char const *,int *,enum inDebugCheck,bool)(0x015edd20 "nitroxide_basic\n", 0, 2, 0) + 107 bytes
[44] m_interpreter.dll:_inEvalCmdNoEnd(0x015edd20 "nitroxide_basic\n", 0, 0x7d177eec, 0x7ab9e7f0) + 20 bytes
[45] bridge.dll:enum inExecutionStatus __cdecl ThrowSignal(char const *)(0x015edd20 "nitroxide_basic\n", 0x7d1779a0, 0x014d4398, 0x014d4338) + 77 bytes
[46] bridge.dll:__catch$_mnParser$0(0x2bd8eb15, 0x014d4338, 0x014d4338, 0) + 292 bytes
[47] mcr.dll:public: void __thiscall mcrInstance::mnParser(void)(0x35c86445, 0x004043f0, 336710, 0) + 62 bytes
[48] MATLAB.exe:0x00401414(4194304, 0, 336710, 10)
[49] MATLAB.exe:0x00401733(0, 0, 0x7ffdb000, 0x8054b6ed)
[50] kernel32.dll:0x7c817077(0x00401910, 0, 0x78746341, 32)
This error was detected while a MEX-file was running. If the MEX-file
is not an official MathWorks function, please examine its source code
for errors. Please consult the External Interfaces Guide for information
on debugging MEX-files.