⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vish_stacktrace.vstf

📁 16*16有符号乘法器的 &#61548 编码方式:Booth编码
💻 VSTF
字号:
# Current time Thu Dec 20 17:47:01 2007
# ModelSim Stack Trace
# Program = vish
# Id = "6.1"
# Version = "2005.06"
# Date = "Jun  6 2005"
# Platform = win32

Exception c0000005 has occurred at address 6609bb3f. Traceback:
# 0    0x6609bb3f: 'TkWinGetDrawableDC + 0xf'
# 1    0x6609bc97: 'XCopyArea + 0x20'
# 2    0x66117bdb: 'Tk_PanedWindowObjCmd + 0x1f9b'
# 3    0x6605734a: 'TclServiceIdle + 0x4a'
# 4    0x6604ab34: 'Tcl_DoOneEvent + 0x124'
# 5    0x660e93a0: 'Tk_MainLoop + 0x19'
# 6    0x6610d849: 'Tk_MainEx + 0x519'
# 7    0x004467e4: '<unknown (@0x4467e4)>'
# 8    0x004473fc: '<unknown (@0x4473fc)>'
# 9    0x00537065: '<unknown (@0x537065)>'
# 10   0x7c816fd7: '<unknown (@0x7c816fd7)>'
StackWalk failed 487
# End of Stack Trace

# Current time Thu Dec 20 19:10:05 2007
# ModelSim Stack Trace
# Program = vish
# Id = "6.1"
# Version = "2005.06"
# Date = "Jun  6 2005"
# Platform = win32

Exception c0000005 has occurred at address 6609bb3f. Traceback:
# 0    0x6609bb3f: 'TkWinGetDrawableDC + 0xf'
# 1    0x6609bc97: 'XCopyArea + 0x20'
# 2    0x66117bdb: 'Tk_PanedWindowObjCmd + 0x1f9b'
# 3    0x6605734a: 'TclServiceIdle + 0x4a'
# 4    0x6604ab34: 'Tcl_DoOneEvent + 0x124'
# 5    0x660dc603: 'Tk_UpdateObjCmd + 0x9a'
# 6    0x6600d4e0: 'TclEvalObjvInternal + 0x230'
# 7    0x6600dc6e: 'Tcl_EvalEx + 0x17e'
# 8    0x6600e1ad: 'Tcl_EvalObjEx + 0x11d'
# 9    0x66011c4c: 'Tcl_EvalObjCmd + 0x6c'
# 10   0x6600d4e0: 'TclEvalObjvInternal + 0x230'
# 11   0x6602c568: 'TclCompEvalObj + 0x638'
# 12   0x6602c02a: 'TclCompEvalObj + 0xfa'
# 13   0x660529c8: 'TclObjInterpProc + 0x258'
# 14   0x6600d4e0: 'TclEvalObjvInternal + 0x230'
# 15   0x6602c568: 'TclCompEvalObj + 0x638'
# 16   0x6602c02a: 'TclCompEvalObj + 0xfa'
# 17   0x660529c8: 'TclObjInterpProc + 0x258'
# 18   0x6600d4e0: 'TclEvalObjvInternal + 0x230'
# 19   0x6602c568: 'TclCompEvalObj + 0x638'
# 20   0x6602c02a: 'TclCompEvalObj + 0xfa'
# 21   0x660529c8: 'TclObjInterpProc + 0x258'
# 22   0x6600d4e0: 'TclEvalObjvInternal + 0x230'
# 23   0x6602c568: 'TclCompEvalObj + 0x638'
# 24   0x6602c02a: 'TclCompEvalObj + 0xfa'
# 25   0x6600e0ea: 'Tcl_EvalObjEx + 0x5a'
# 26   0x660140c4: 'Tcl_IfObjCmd + 0x194'
# 27   0x6600d4e0: 'TclEvalObjvInternal + 0x230'
# 28   0x6600dc6e: 'Tcl_EvalEx + 0x17e'
# 29   0x660578f4: 'Tcl_AfterObjCmd + 0x564'
# 30   0x6605734a: 'TclServiceIdle + 0x4a'
# 31   0x6604ab34: 'Tcl_DoOneEvent + 0x124'
# 32   0x6602b7e8: 'Tcl_VwaitObjCmd + 0x78'
# 33   0x6600d4e0: 'TclEvalObjvInternal + 0x230'
# 34   0x6602c568: 'TclCompEvalObj + 0x638'
# 35   0x6602c02a: 'TclCompEvalObj + 0xfa'
# 36   0x6600e0ea: 'Tcl_EvalObjEx + 0x5a'
# 37   0x661b9390: 'Itcl_EvalMemberCode + 0x210'
# 38   0x01e7dc30: '<unknown (@0x1e7dc30)>'
StackWalk failed 126
# End of Stack Trace

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -