⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vish_stacktrace.vstf

📁 用Verilog实现国内第一个商用密码算法SMS4的加密和解密。
💻 VSTF
字号:
# ModelSim Stack Trace
# Program = vish
# Id = "5.5e"
# Version = "2001.10"
# Date = "Oct  2 2001"
# Platform = win32

Exception c0000005 has occurred at address 005b28d1. Traceback:
# 0    0x005b28d1: 'TclpAlloc + 0x71'
# 1    0x005b697e: 'Tcl_Alloc + 0xe'
# 2    0x005dea86: 'Tcl_ListObjReplace + 0x3e6'
# 3    0x005de67a: 'Tcl_ListObjLength + 0x1a'
# 4    0x004312ff: '<unknown (@0x4312ff)>'
# 5    0x004311e3: '<unknown (@0x4311e3)>'
# 6    0x004310a1: '<unknown (@0x4310a1)>'
# 7    0x0043102d: '<unknown (@0x43102d)>'
# 8    0x0042fdee: '<unknown (@0x42fdee)>'
# 9    0x005b39c7: 'TclInvokeStringCommand + 0x67'
# 10   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 11   0x005b4256: 'Tcl_EvalObj + 0x186'
# 12   0x003da53c: 'Itcl_EvalMemberCode + 0x2da'
# 13   0x10006e4f: 'Itk_ConfigClassOption + 0x4a'
# 14   0x10004c97: 'Itk_UsualCmd + 0x1dd9'
# 15   0x1000479a: 'Itk_UsualCmd + 0x18dc'
# 16   0x003da468: 'Itcl_EvalMemberCode + 0x206'
# 17   0x003db060: 'Itcl_ExecMethod + 0x177'
# 18   0x003e297e: 'Itcl_EvalArgs + 0x109'
# 19   0x003dcf2d: 'Itcl_HandleInstance + 0x1dc'
# 20   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 21   0x005b4256: 'Tcl_EvalObj + 0x186'
# 22   0x005e7e05: 'TclObjInterpProc + 0x275'
# 23   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 24   0x005b4256: 'Tcl_EvalObj + 0x186'
# 25   0x005b7516: 'Tcl_EvalObjCmd + 0x46'
# 26   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 27   0x005b4256: 'Tcl_EvalObj + 0x186'
# 28   0x003da53c: 'Itcl_EvalMemberCode + 0x2da'
# 29   0x003db060: 'Itcl_ExecMethod + 0x177'
# 30   0x003e297e: 'Itcl_EvalArgs + 0x109'
# 31   0x003dcf2d: 'Itcl_HandleInstance + 0x1dc'
# 32   0x003e297e: 'Itcl_EvalArgs + 0x109'
# 33   0x100042ec: 'Itk_UsualCmd + 0x142e'
# 34   0x003da468: 'Itcl_EvalMemberCode + 0x206'
# 35   0x003db060: 'Itcl_ExecMethod + 0x177'
# 36   0x003e297e: 'Itcl_EvalArgs + 0x109'
# 37   0x003dcf2d: 'Itcl_HandleInstance + 0x1dc'
# 38   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 39   0x005b4256: 'Tcl_EvalObj + 0x186'
# 40   0x005e1f63: 'Tcl_NamespaceObjCmd + 0xbf3'
# 41   0x005e1489: 'Tcl_NamespaceObjCmd + 0x119'
# 42   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 43   0x005b4256: 'Tcl_EvalObj + 0x186'
# 44   0x005b7516: 'Tcl_EvalObjCmd + 0x46'
# 45   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 46   0x005b4256: 'Tcl_EvalObj + 0x186'
# 47   0x003da53c: 'Itcl_EvalMemberCode + 0x2da'
# 48   0x003db060: 'Itcl_ExecMethod + 0x177'
# 49   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 50   0x005b4256: 'Tcl_EvalObj + 0x186'
# 51   0x003da53c: 'Itcl_EvalMemberCode + 0x2da'
# 52   0x003db060: 'Itcl_ExecMethod + 0x177'
# 53   0x003e297e: 'Itcl_EvalArgs + 0x109'
# 54   0x003dcf2d: 'Itcl_HandleInstance + 0x1dc'
# 55   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 56   0x005b4256: 'Tcl_EvalObj + 0x186'
# 57   0x005e1eeb: 'Tcl_NamespaceObjCmd + 0xb7b'
# 58   0x005e1489: 'Tcl_NamespaceObjCmd + 0x119'
# 59   0x005cbb09: 'TclExecuteByteCode + 0x789'
# 60   0x005b4256: 'Tcl_EvalObj + 0x186'
# 61   0x005b404f: 'Tcl_Eval + 0x8f'
# 62   0x005b54ec: 'Tcl_GlobalEval + 0x1c'
# 63   0x0062aaec: 'Tk_BindEvent + 0x97d'
# 64   0x00641707: 'Tk_GetItemTypes + 0x16f0'
# 65   0x00641047: 'Tk_GetItemTypes + 0x1030'
# 66   0x0064aa80: 'Tk_HandleEvent + 0x37b'
# 67   0x0064ae50: 'TkQueueEventForAllChildren + 0xbb'
# 68   0x005e281f: 'Tcl_ServiceEvent + 0x5f'
# 69   0x005e2ac3: 'Tcl_DoOneEvent + 0x123'
# 70   0x0064aeba: 'Tk_MainLoop + 0x14'
# 71   0x00664f80: 'Tk_Main + 0x2e0'
# 72   0x00426ebf: '<unknown (@0x426ebf)>'
# 73   0x004273b0: '<unknown (@0x4273b0)>'
# 74   0x004b7f5f: '<unknown (@0x4b7f5f)>'
# 75   0x7c816fd7: 'RegisterWaitForInputIdle + 0x49'
StackWalk failed 0
# End of Stack Trace

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -