Advertisement
Guest User

Call Stack

a guest
May 10th, 2012
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.30 KB | None | 0 0
  1. > ryzom_client_d.exe!CLuaIHM::luaValueFromReflectedProperty(CLuaState & ls={...}, CReflectable & reflectedObject={...}, const CReflectedProperty & property={...}) Line 671 + 0x21 bytes C++
  2. ryzom_client_d.exe!CLuaIHM::luaUIIndex(CLuaState & ls={...}) Line 758 + 0x11 bytes C++
  3. ryzom_client_d.exe!`CLuaState::push'::`2'::CForwarder::callFunc(lua_State * ls=0x1ffe88c8) Line 517 + 0x9 bytes C++
  4. ryzom_client_d.exe!_luaD_precall() + 0x2e4 bytes C
  5. ryzom_client_d.exe!_luaD_call() + 0x72 bytes C
  6. ryzom_client_d.exe!_luaV_gettable() + 0x23c bytes C
  7. ryzom_client_d.exe!_luaV_gettable() + 0x131 bytes C
  8. ryzom_client_d.exe!_luaV_execute() + 0x2ed bytes C
  9. ryzom_client_d.exe!_luaD_call() + 0x84 bytes C
  10. ryzom_client_d.exe!_lua_pcall() + 0xd0 bytes C
  11. ryzom_client_d.exe!_luaD_rawrunprotected() + 0x3c bytes C
  12. ryzom_client_d.exe!_luaD_pcall() + 0x4c bytes C
  13. ryzom_client_d.exe!_lua_pcall() + 0x6e bytes C
  14. ryzom_client_d.exe!CLuaState::executeScriptInternal(const stlpx_std::basic_string<char,stlpx_std::char_traits<char>,stlpx_std::allocator<char> > & code={...}, const stlpx_std::basic_string<char,stlpx_std::char_traits<char>,stlpx_std::allocator<char> > & dbgSrc={...}, int numRet=0) Line 355 + 0x14 bytes C++
  15. ryzom_client_d.exe!CLuaState::executeFile(const stlpx_std::basic_string<char,stlpx_std::char_traits<char>,stlpx_std::allocator<char> > & pathName={...}) Line 423 + 0xb1 bytes C++
  16. ryzom_client_d.exe!R2::CEditor::doLuaScript(const char * filename=0x03b9ff9c, const char * fileDescText=0x03b9ff74) Line 4410 + 0x13 bytes C++
  17. ryzom_client_d.exe!R2::CEditor::init(R2::CEditor::TMode initialMode=EditionMode, R2::CEditor::TAccessMode accessMode=AccessEditor) Line 2660 C++
  18. ryzom_client_d.exe!R2::CEditor::autoConfigInit(bool serverIsRingSession=true) Line 364 C++
  19. ryzom_client_d.exe!mainLoop() Line 1497 C++
  20. ryzom_client_d.exe!WinMain(HINSTANCE__ * hInstance=0x01330000, HINSTANCE__ * __formal=0x00000000, char * cmdline=0x00ed5acc, HINSTANCE__ * __formal=0x00000000) Line 615 + 0x5 bytes C++
  21. ryzom_client_d.exe!__tmainCRTStartup() Line 574 + 0x35 bytes C
  22. ryzom_client_d.exe!WinMainCRTStartup() Line 399 C
  23. kernel32.dll!7567339a()
  24. [Frames below may be incorrect and/or missing, no symbols loaded for kernel32.dll]
  25. ntdll.dll!77729ef2()
  26. ntdll.dll!77729ec5()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement