Segmentation violation detected at Fri Jul 22 17:03:56 2011
------------------------------------------------------------------------
Configuration:
MATLAB Version: 7.0.0.19920 (R14)
Operating System: Microsoft Windows XP
Window System: Version 5.1 (Build 2600: Service Pack 3)
Processor ID: x86 Family 6 Model 7 Stepping 6, GenuineIntel
Virtual Machine: Java 1.4.2 with Sun Microsystems Inc. Java HotSpot(TM) Client VM
(mixed mode)
Default Charset: ibm-1386_P100-2002
Register State:
EAX = 4a470ff4 EBX = ffffffff
ECX = 4a470ff0 EDX = 00000047
ESI = 11e48039 EDI = 00000009
EBP = 00ca459c ESP = 00ca458c
EIP = 78c58d05 FLG = 00010246
Stack Trace:
[0] m_parser.dll:_mps_process_compiler_pragmas0(0x01574e18 "仳vx�, 0x00ca45ac, 41, 0) + 293 bytes
[1] m_parser.dll:_mps_process_pragma_comments(0x01574e18 "仳vx�, 0x11e48039 "% myeigs is a version of Matlab ..", 71, 75) + 56 bytes
[2] m_parser.dll:_mps_get_next_M_token(0x01574df0, 0x015748a4 "仳vx更vx1", 0x013dbbd0, 0x11e48010 "function varargout = myeigs(var..") + 989 bytes
[3] m_parser.dll:_mps_parse(0x013dbbd0, 0, 0x11e48010 "function varargout = myeigs(var..", 0x78c58532) + 191 bytes
[4] m_parser.dll:_mps_M_yacc_parse(0x00cdbaa7 "x��P磐", 0x0157489c "仳vx更vx仳vx更vx1", 0x013dbbd0, 0x013dbbd0) + 36 bytes
[5] m_parser.dll:_mps_text_to_IR(0x00cdbaa7 "x��P磐", 0x00cdba04, 0x00cdba10, 0x00cdba14) + 164 bytes
[6] m_parser.dll:_mps_M_to_IR(0x00cdbaa7 "x��P磐", 0x00cdba04, 0x00cdba10, 0x00cdba14) + 116 bytes
[7] m_interpreter.dll:public: void __thiscall Mfh_mp::inCompileMfile(char const *)(0x00cdb8e8, 1, 0x11c80180, 2) + 937 bytes
[8] m_interpreter.dll:$L102414(1, 0x11c80180, 0x11d9b010, 0x00cdccdc) + 519 bytes
[9] m_dispatcher.dll:public: virtual void __thiscall Mlm_file::load_mf(void)(0x11c80180, 0x11d9b010, 2, 0x11c80180) + 137 bytes
[10] m_dispatcher.dll:public: void __thiscall Mlm_MATLAB_fn::try_load(void)(0x00cdc80c, 0x00cdc86c, 2, 589) + 104 bytes
[11] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cdc80c, 2, 0x00cdc86c) + 54 bytes
[12] m_interpreter.dll:_inDispatchFromStack(589, 0x012f6d34 "myeigs", 1, 2) + 891 bytes
[13] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x012f6d34 "myeigs", 589, 1, 2) + 111 bytes
[14] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *)(1, 191, 27, 0) + 2282 bytes
[15] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *)(1, 191, 24, 0) + 272 bytes
[16] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x11d39690, 0, 2, 2) + 773 bytes
[17] m_interpreter.dll:_inWordsj(1, 0x00cdd460, 2, 0x00cdd4f0) + 441 bytes
[18] m_interpreter.dll:public: void __thiscall Mfh_mp::inRunMP(int,struct mxArray_tag * *,int,struct mxArray_tag * *,struct inWorkSpace_tag *)(1, 0x00cdd460, 2, 0x00cdd4f0) + 158 bytes
[19] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 1, 0x00cdd460, 2) + 28 bytes
[20] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cdd460, 2, 0x00cdd4f0) + 26 bytes
[21] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cdd460, 2, 0x00cdd4f0) + 273 bytes
[22] m_interpreter.dll:public: void __thiscall ResolverFunctionDesc::CallFunction(int,struct mxArray_tag * * const,int,struct mxArray_tag * * const)(1, 0x00cdd460, 2, 0x00cdd4f0) + 246 bytes
[23] m_interpreter.dll:public: bool __thiscall Resolver::CallMFunction(int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *)(1, 1, 0x013d2e10, 0) + 840 bytes
[24] m_interpreter.dll:bool __cdecl inResolveMFunctionCall(struct _m_function_desc *,int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *,enum inMarshalType *,unsigned int,int,unsigned int *,int)(0x11c7f690, 1, 1, 0x013d2e10) + 148 bytes
[25] m_interpreter.dll:bool __cdecl accelMFunctionCall(struct _accelOp *,struct _accelOp * *,struct _accelBytecode *,int *,enum inMarshalType *)(0x11d1cf40, 0x00cddb04, 0x0120e660, 0x00cddafc) + 108 bytes
[26] m_interpreter.dll:int __cdecl accelExec(struct _accelBytecode *,enum inMarshalType *)(0x0120e660, 0x00cddb7c, 0, 62) + 18462 bytes
[27] m_interpreter.dll:_inExecuteHotSegment(0x00cddbb0, 0x00cddc0c, 0x00cddbfc "����]\n", 0x00cde09c) + 1542 bytes
[28] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x1198ac60, 0, 17, 3) + 610 bytes
[29] m_interpreter.dll:_inWordsj(1, 0x00cde03c, 17, 0x00cde09c) + 441 bytes
[30] m_interpreter.dll:public: void __thiscall Mfh_mp::inRunMP(int,struct mxArray_tag * *,int,struct mxArray_tag * *,struct inWorkSpace_tag *)(1, 0x00cde03c, 17, 0x00cde09c) + 158 bytes
[31] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 1, 0x00cde03c, 17) + 28 bytes
[32] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cde03c, 17, 0x00cde09c) + 26 bytes
[33] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cde03c, 17, 0x00cde09c) + 273 bytes
[34] m_interpreter.dll:_inDispatchFromStack(585, 0x11c08ab2 "generate_esn", 1, 17) + 891 bytes
[35] m_interpreter.dll:_inCallFcnFromReference(0, 0x11cadb50, 0x789b59c0, 0xcccccccd) + 176 bytes
[36] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *)(1, 0, 35, 0) + 4115 bytes
[37] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *)(1, 0, 9, 0) + 272 bytes
[38] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x1ac62060, 1, 0, 0x1ac62060) + 773 bytes
[39] m_interpreter.dll:_inExecCompScript(0, 0x00cde71c, 0x1ac62060, 0xffffffff) + 321 bytes
[40] m_interpreter.dll:public: void __thiscall Mfh_mp::inRunMP(int,struct mxArray_tag * *,int,struct mxArray_tag * *,struct inWorkSpace_tag *)(0, 0x00cde71c, 0, 0x00cde77c) + 122 bytes
[41] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0, 0x00cde71c, 0) + 28 bytes
[42] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cde71c, 0, 0x00cde77c) + 26 bytes
[43] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cde71c, 0, 0x00cde77c) + 273 bytes
[44] m_interpreter.dll:_inDispatchFromStack(582, 0x012f3424 "demoScript", 0, 0) + 891 bytes
[45] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x012f3424 "demoScript", 582, 0, 0) + 111 bytes
[46] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *)(2, 0, 0, 0) + 2411 bytes
[47] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *)(2, 0, 0, 0) + 272 bytes
[48] m_interpreter.dll:_inInterPcode(2, 0x7876f2d8, 0, 0) + 69 bytes
[49] m_interpreter.dll:enum inExecutionStatus __cdecl in_local_call_eval_function(int *,struct _pcodeheader *,int *,struct mxArray_tag * * const,enum inDebugCheck)(0x00cdf2c8, 0x00cdf3bc, 2, 0x119747a0 "demoScript\n") + 162 bytes
[50] m_interpreter.dll:$L72592(0x7876f2d8, 0x119747a0 "demoScript\n", 11, 0) + 196 bytes
[51] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalCmdWithLocalReturnandtype(char const *,int *,enum inDebugCheck)(0, 2, 1, 0x00cdf44c "趑�) + 86 bytes
[52] m_interpreter.dll:_inEvalCmdNoEnd(0x119747a0 "demoScript\n", 0x00cdf4e4, 0x00cdf4a0, 0x014c2040) + 16 bytes
[53] bridge.dll:_mnParser(0x7c80b741, 0x014c2040, 0, 0) + 431 bytes
[54] mcr.dll:public: void __thiscall mcrInstance::mnParser(void)(271242, 0x4d5c3a43, 0x414c5441, 0x625c3742) + 87 bytes
[55] MATLAB.exe:0x00401d2f(4194304, 0, 271242, 0x014c2040)
[56] MATLAB.exe:0x00403e45(0x7c930041, 594808, 0x7ffd6000, 0x8054c6ed)
[57] kernel32.dll:0x7c817077(0x00403cc0 "jth(U@", 0, 0, 0)