⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vish_stacktrace.vstf

📁 能算出CRC32 Data width 32 bit 的HDL
💻 VSTF
字号:
# Current time Wed Dec 24 18:38:07 2008
# ModelSim Stack Trace
# Program = vish
# Id = "5.6"
# Version = "2002.03"
# Date = "Mar 15 2002"
# Platform = win32

Exception c0000005 has occurred at address 006ab1ac. Traceback:
# 0    0x006ab1ac: 'TclpAlloc + 0x9c'
# 1    0x006af6ae: 'Tcl_Alloc + 0xe'
# 2    0x006c7d4c: 'TclSetCmdNameObj + 0x13c'
# 3    0x006c7b8d: 'Tcl_GetCommandFromObj + 0x1d'
# 4    0x006dcaa4: 'Tcl_EvalObjv + 0x194'
# 5    0x006dd19a: 'Tcl_EvalEx + 0x11a'
# 6    0x006dd436: 'Tcl_Eval + 0x16'
# 7    0x006adf0c: 'Tcl_GlobalEval + 0x1c'
# 8    0x005d0d70: 'Tk_BindEvent + 0x99c'
# 9    0x005f3635: 'TkBindEventProc + 0x18f'
# 10   0x005fd2e2: 'Tk_HandleEvent + 0x5eb'
# 11   0x0064cfe7: 'Tk_DestroyWindow + 0x204'
# 12   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 13   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 14   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 15   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 16   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 17   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 18   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 19   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 20   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 21   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 22   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 23   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 24   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 25   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 26   0x0064cf1a: 'Tk_DestroyWindow + 0x137'
# 27   0x0064e2e1: 'Tk_GetNumMainWindows + 0x70'
# 28   0x006c2f8d: 'Tcl_Finalize + 0x4d'
# 29   0x006b060e: 'Tcl_ExitObjCmd + 0x3e'
# 30   0x006c38e4: 'TclExecuteByteCode + 0x5b4'
# 31   0x006acb12: 'Tcl_EvalObjEx + 0x1f2'
# 32   0x006e27ff: 'TclObjInterpProc + 0x26f'
# 33   0x006c38e4: 'TclExecuteByteCode + 0x5b4'
# 34   0x006acb12: 'Tcl_EvalObjEx + 0x1f2'
# 35   0x006e27ff: 'TclObjInterpProc + 0x26f'
# 36   0x006c38e4: 'TclExecuteByteCode + 0x5b4'
# 37   0x006acb12: 'Tcl_EvalObjEx + 0x1f2'
# 38   0x006e27ff: 'TclObjInterpProc + 0x26f'
# 39   0x006c38e4: 'TclExecuteByteCode + 0x5b4'
# 40   0x006acb12: 'Tcl_EvalObjEx + 0x1f2'
# 41   0x006e27ff: 'TclObjInterpProc + 0x26f'
# 42   0x006dcce6: 'Tcl_EvalObjv + 0x3d6'
# 43   0x006dd19a: 'Tcl_EvalEx + 0x11a'
# 44   0x006dd436: 'Tcl_Eval + 0x16'
# 45   0x006adf0c: 'Tcl_GlobalEval + 0x1c'
# 46   0x005cac15: 'TkWmProtocolEventProc + 0x9c'
# 47   0x005fd1b1: 'Tk_HandleEvent + 0x4ba'
# 48   0x005fd6d2: 'TkQueueEventForAllChildren + 0xcf'
# 49   0x006daf30: 'Tcl_ServiceEvent + 0x60'
# 50   0x006db1a1: 'Tcl_DoOneEvent + 0x111'
# 51   0x005fd73c: 'Tk_MainLoop + 0x14'
# 52   0x0061ce38: 'Tk_MainEx + 0x438'
# 53   0x00428f24: '<unknown (@0x428f24)>'
# 54   0x004293cf: '<unknown (@0x4293cf)>'
# 55   0x004beb85: '<unknown (@0x4beb85)>'
# 56   0x7c817067: '<unknown (@0x7c817067)>'
StackWalk failed 487
# End of Stack Trace

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -