1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
| Stack Trace:
[0] 0x00905a4d(1, 0x00cee620, 1, 0x00cee680)
[1] libmex.dll:_mexRunMexFile(1, 0x00cee620, 1, 0x00cee680) + 139 bytes
[2] libmex.dll:private: void __thiscall Mfh_mex::runMexFileWithSignalProtection(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cee620, 1, 0x00cee680) + 86 bytes
[3] libmex.dll:public: virtual void __thiscall Mfh_mex::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cee620, 1, 0x00cee680) + 263 bytes
[4] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cee620, 1, 0x00cee680) + 203 bytes
[5] m_interpreter.dll:_inDispatchWithDebug(705, 1, 0x00cee620, 1) + 192 bytes
[6] m_interpreter.dll:_inDispatchFromStack(705, 0x0f5751d8 "jpeg_read", 1, 1) + 877 bytes
[7] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x0f5751d8 "jpeg_read", 705, 1, 1) + 156 bytes
[8] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(2, 0, 0, 0) + 2745 bytes
[9] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 87 bytes
[10] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 302 bytes
[11] m_interpreter.dll:_inInterPcode(2, 0x95698f34, 0, 0x78503444) + 84 bytes
[12] m_interpreter.dll:enum inExecutionStatus __cdecl in_local_call_eval_function(int *,struct _pcodeheader *,int *,struct mxArray_tag * * const,enum inDebugCheck)(0x00cef31c, 0x00cef38c, 0x00cef3a8, 2) + 152 bytes
[13] m_interpreter.dll:__catch$?inEvalStringWithIsVarFcn@@YA?AW4inExecutionStatus@@PAU_memory_context@@PBDW4EvalType@@HQAPAUmxArray_tag@@W4inDebugCheck@@PAU_pcodeheader@@PAHP6A_NPAX1@Z7@Z$0(0x78503444, 0x01674420 "jpegobj = jpeg_read('C:\Document..", 0, 0) + 219 bytes
[14] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalCmdWithLocalReturnandtype(char const *,int *,enum inDebugCheck)(0x01674420 "jpegobj = jpeg_read('C:\Document..", 0, 2, 0x00cef3f8) + 69 bytes
[15] m_interpreter.dll:_inEvalCmdNoEnd(0x01674420 "jpegobj = jpeg_read('C:\Document..", 0xc37b9f89, 0x7848c6b0, 0x00ed57c0) + 16 bytes
[16] bridge.dll:enum inExecutionStatus __cdecl ThrowSignal(char const *)(0x01674420 "jpegobj = jpeg_read('C:\Document..", 0xc37b98f5, 0x017f15a8, 0x017f1548) + 75 bytes
[17] bridge.dll:__catch$_mnParser$0(0xcf85975b, 0x017f1548, 0x017f1548, 0) + 328 bytes
[18] mcr.dll:public: void __thiscall mcrInstance::mnParser(void)(0xce7dad96, 0x004074a4, 402237, 0) + 62 bytes
[19] MATLAB.exe:0x004021b8(4194304, 0, 402237, 10)
[20] MATLAB.exe:0x00403bd2(1109972, 0, 0x7ffde000, 0x8054a6ed)
[21] kernel32.dll:0x7c816fd7(0x00403daf, 0, 0x78746341, 32) |
Partager