カテゴリ 重要度 ステータス 解決状況 登録日時 最終更新
クラッシュ/フリーズ重要 (本体)解決済み修正済み2008-07-18 12:082008-08-09 12:31
 
テスターTafoid担当者R. Belmontソースsaturn.cpp
バージョン0.126u1発生バージョン0.126修正バージョン0.126u5
フラグ
セット cottonbm
セット詳細
cottonbm - コットンブーメラン (JUET 980709 V1.000)
 
概 要ACCESS VIOLATIONエラーでクラッシュする。
詳 細As soon as you select all 3 characters and the screen clears + game is about to start - MAME crashes out.

-----------------------------------------------------
Exception at EIP=0106B477: ACCESS VIOLATION
While attempting to read memory at 5001403D
-----------------------------------------------------
EAX=5001403D EBX=4F224009 ECX=4722400B EDX=00000000
ESI=0793D508 EDI=4F22400B EBP=0022F7E8 ESP=0022F7D8
再現手順 
追加情報stv.c merged into saturn.c in 0.142u2

Backtrace:

Program received signal SIGSEGV, Segmentation fault.
0x0114649d in sh2_describe (param=0xdfc0000, desc=0xb700af0, prev=0x0)
at src/emu/cpu/sh2/sh2fe.c:40
40 UINT16 opcode = *desc->opptr.w;
(gdb) bt full
#0 0x0114649d in sh2_describe (param=0xdfc0000, desc=0xb700af0, prev=0x0)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 34
context = (SH2 *) 0x10da78a
#1 0x0114649d in sh2_describe (param=0xb4c6078, desc=0x4f22400b, prev=0x0)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 37
context = (SH2 *) 0x0
#2 0x0114649d in sh2_describe (param=0xb4c6078, desc=0x4f22400b,
prev=0xffca0) at src/emu/cpu/sh2/sh2fe.c:40
opcode = 34
context = (SH2 *) 0x0
#3 0x0114649d in sh2_describe (param=0xffbfed0, desc=0x0, prev=0x4f22400b)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 34
context = (SH2 *) 0x10d53af
#4 0x0114649d in sh2_describe (param=0x113, desc=0x0, prev=0x0)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 652
context = (SH2 *) 0x39a0dc6b
#5 0x0114649d in sh2_describe (param=0x1, desc=0x113, prev=0x1c)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 0
context = (SH2 *) 0x8c4
#6 0x0114649d in sh2_describe (param=0x701e460, desc=0x0, prev=0x0)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 0
context = (SH2 *) 0x6f53ef0
#7 0x0114649d in sh2_describe (param=0x6f53c08, desc=0x6f53af8,
prev=0x1cfbf40) at src/emu/cpu/sh2/sh2fe.c:40
opcode = 0
context = (SH2 *) 0xa
#8 0x0114649d in sh2_describe (param=0x3, desc=0x6f52558, prev=0x21b7240)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 1781
context = (SH2 *) 0x1cfbf40
#9 0x0114649d in sh2_describe (param=0x3, desc=0x6f52558, prev=0x22ff80)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 30720
context = (SH2 *) 0x22fef0
#10 0x0114649d in sh2_describe (param=0x7ffdf000, desc=0x0, prev=0x22ffb0)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 1781
context = (SH2 *) 0x6f52500
#11 0x0114649d in sh2_describe (param=0x1, desc=0x9, prev=0x22fff0)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 0
context = (SH2 *) 0x6f52a88
#12 0x0114649d in sh2_describe (param=0x0, desc=0x0, prev=0x7ffdf000)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 34
context = (SH2 *) 0x401298
#13 0x0114649d in sh2_describe (param=0x401280, desc=0x0, prev=0xc8)
at src/emu/cpu/sh2/sh2fe.c:40
opcode = 65535
context = (SH2 *) 0x7c5c2160
#14 0x0114649d in sh2_describe (param=Cannot access memory at address 0x8
) at src/emu/cpu/sh2/sh2fe.c:40
opcode = Cannot access memory at address 0xfffffff2
 
添付ファイル