WARP Project Forums - Wireless Open-Access Research Platform

You are not logged in.

#1 2019-Oct-05 10:33:31

Surya
Member
Registered: 2015-Feb-02
Posts: 3

MEX file execution failed

Hi I'm trying to run the Matlab code from C:\WARP_Repository\ResearchApps\PHY\WARPLAB\WARPLab_v05_2\M_Code_Examples\warplab_siso_example_TxRx.m

I initialized it to only single node and used one radio(2) for Tx and other radio (3) for Rx. When i run the code I'm getting the following error. I'm using WARP V1 and following the WARPLAB6 guidance. 

Not only the above code even if i configure both the nodes and run any code from the given list it is throwing the same below error. Please do suggest me if I'm missing something.

The ARP entry addition failed: The requested operation requires elevation.


nodes =

     1


IPAddrs =

   167772161

Saving minidump to file C:\Users\Accounts\AppData\Local\Temp\matlab_crash_dump.1456.13.dmp

------------------------------------------------------------------------
       Segmentation violation detected at Sat Oct 05 20:44:05 2019
------------------------------------------------------------------------

Configuration:
  MATLAB Version:   7.5.0.342 (R2007b)
  MATLAB License:   161052
  Operating System: Microsoft Windows Vista
  Window System:    Version 6.1 (Build 7601: Service Pack 1)
  Processor ID:     x86 Family 6 Model 15 Stepping 2, GenuineIntel
  Virtual Machine:  Java 1.6.0 with Sun Microsystems Inc. Java HotSpot(TM) Client VM mixed mode
  Default Charset:  windows-1252

Register State:
  EAX = 00f24208  EBX = 00000001
  ECX = 00000003  EDX = 00000074
  ESI = 1456a880  EDI = 00002710
  EBP = 00cebb30  ESP = 00cebb00
  EIP = 07750000  FLG = 00210202

Stack Trace:
  [0] 0x07750000(10000, 1, 0x00cec564, 0x1456a880)
  [1] pnet.mexw32:0x17753bff(1, 0x00cec564, 2, 0x00cec5f4)
  [2] libmex.dll:_mexRunMexFile(1, 0x00cec564, 2, 0x00cec5f4) + 139 bytes
  [3] libmex.dll:private: void __thiscall Mfh_mex::runMexFileWithSignalProtection(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cec564, 2, 0x00cec5f4) + 86 bytes
  [4] libmex.dll:public: virtual void __thiscall Mfh_mex::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cec564, 2, 0x00cec5f4) + 261 bytes
  [5] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00cec564, 2, 0x00cec5f4) + 203 bytes
  [6] m_interpreter.dll:void __cdecl mdCallFunction(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_MATLAB_fn *)(1, 0x00cec564, 2, 0x00cec5f4) + 56 bytes
  [7] m_interpreter.dll:public: void __thiscall ResolverFunctionDesc::CallFunction(int,struct mxArray_tag * * const,int,struct mxArray_tag * * const)(1, 0x00cec564, 2, 0x00cec5f4) + 93 bytes
  [8] m_interpreter.dll:public: bool __thiscall Resolver::CallMFunction(int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *)(1, 1, 0x1469f3e0, 0) + 1388 bytes
  [9] m_interpreter.dll:bool __cdecl inResolveMFunctionCall(struct _m_function_desc *,int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *,enum inMarshalType *,int,class mpsTypeSequenceNlhs const *,struct mxArray_tag * (__cdecl*)(int))(0x1597d0d8, 1, 1, 0x1469f3e0) + 195 bytes
  [10] m_interpreter.dll:private: bool __thiscall accelImpl::MFunctionCall(struct _accelOp * *)(0x00cecc00, 0xa1e4395f, 0x17746fb0, 0x16de09d0) + 179 bytes
  [11] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelImpl::Exec(void)(0xa1e43ef7, 0x17746fb0, 1, 0x00cecd64) + 205 bytes
  [12] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelCode::Call(enum inMarshalType *,int *)const (0x00cecd04, 0x00ceccdc, 0xa1e43f8b, 0x2112b2a0) + 128 bytes
  [13] m_interpreter.dll:public: static bool __cdecl inJit::ExecuteHotSegment(struct _inJitAccelInfo *,enum opcodes *,int *,int *)(0x00cecd54, 0x00cecd7c, 0x00cecd60 "", 0x00cecd64) + 1898 bytes
  [14] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x1659dae0, 0x00cecf00, 0xa1e43db3, 0xffffffff) + 594 bytes
  [15] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(1, 0x00ced1c4, 3, 0x00ced254) + 673 bytes
  [16] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 1, 0x00ced1c4, 3) + 29 bytes
  [17] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00ced1c4, 3, 0x00ced254) + 28 bytes
  [18] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x00ced1c4, 3, 0x00ced254) + 203 bytes
  [19] m_interpreter.dll:void __cdecl mdCallFunction(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_MATLAB_fn *)(1, 0x00ced1c4, 3, 0x00ced254) + 56 bytes
  [20] m_interpreter.dll:public: void __thiscall ResolverFunctionDesc::CallFunction(int,struct mxArray_tag * * const,int,struct mxArray_tag * * const)(1, 0x00ced1c4, 3, 0x00ced254) + 93 bytes
  [21] m_interpreter.dll:public: bool __thiscall Resolver::CallMFunction(int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *)(1, 1, 0x193968e0, 0) + 1388 bytes
  [22] m_interpreter.dll:bool __cdecl inResolveMFunctionCall(struct _m_function_desc *,int,int,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const,union m_operand_storage *,int *,enum inMarshalType *,int,class mpsTypeSequenceNlhs const *,struct mxArray_tag * (__cdecl*)(int))(0x1dc83100, 1, 1, 0x193968e0) + 195 bytes
  [23] m_interpreter.dll:private: bool __thiscall accelImpl::MFunctionCall(struct _accelOp * *)(0x00ced860, 0xa1e42abf, 0x17744c40, 0x5f06abb0) + 179 bytes
  [24] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelImpl::Exec(void)(0xa1e42a57, 0x17744c40, 1, 0x00cedc14) + 205 bytes
  [25] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelCode::Call(enum inMarshalType *,int *)const (0x00ced964, 0x00ced93c, 0xa1e42beb, 0) + 128 bytes
  [26] m_interpreter.dll:public: static bool __cdecl inJit::ExecuteHotSegment(struct _inJitAccelInfo *,enum opcodes *,int *,int *)(0x00ceda0c, 0x00cedac0, 0x00ceda70, 0x00cedc14) + 1898 bytes
  [27] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(1, 260, 7, 0) + 338 bytes
  [28] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 260, 4, 0) + 87 bytes
  [29] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 260, 4, 0) + 274 bytes
  [30] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x1659b9a0, 0x14563100, 0xa1e42f43, 0xffffffff) + 916 bytes
  [31] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(2, 0x00cede8c, 1, 0x00cedeec) + 673 bytes
  [32] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 2, 0x00cede8c, 1) + 29 bytes
  [33] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(2, 0x00cede8c, 1, 0x00cedeec) + 28 bytes
  [34] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(2, 0x00cede8c, 1, 0x00cedeec) + 203 bytes
  [35] m_interpreter.dll:__catch$?inDispatchFromStack@@YAHHPBDHH@Z$0(719, 0x030a3f9e "warplab_initialize", 2, 1) + 744 bytes
  [36] m_interpreter.dll:_inCallFcnFromReference(0xa1e4123f, 0xffffffff, 0x02fa89d4, 0) + 166 bytes
  [37] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(1, 0, 28, 0) + 4760 bytes
  [38] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 0, 25, 0) + 87 bytes
  [39] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(1, 0, 25, 0) + 274 bytes
  [40] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,bool)(0x03cba120, 0x1932d301 "]y{_\n", 0xa1e41143, 0xffffffff) + 916 bytes
  [41] m_interpreter.dll:void __cdecl inRunMfile(int,struct mxArray_tag * *,int,struct mxArray_tag * *,class Mfh_mp *,struct inWorkSpace_tag *)(0, 0x00cee48c, 0, 0x00cee4ec) + 673 bytes
  [42] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(struct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0, 0x00cee48c, 0) + 29 bytes
  [43] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cee48c, 0, 0x00cee4ec) + 28 bytes
  [44] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x00cee48c, 0, 0x00cee4ec) + 203 bytes
  [45] m_interpreter.dll:__catch$?inDispatchFromStack@@YAHHPBDHH@Z$0(1297, 0x033c9c74 "new", 0, 0) + 744 bytes
  [46] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,int,int,int *,int *)(0x033c9c74 "new", 1297, 0, 0) + 156 bytes
  [47] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag volatile *,int *)(2, 0, 0, 0) + 2739 bytes
  [48] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 87 bytes
  [49] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,enum opcodes,struct inPcodeNest_tag *,int *)(2, 0, 0, 0) + 274 bytes
  [50] m_interpreter.dll:_inInterPcode(2, 0xa1e41a2b, 0, 0x00e14420 "new\n") + 162 bytes
  [51] m_interpreter.dll:enum inExecutionStatus __cdecl in_local_call_eval_function(int *,struct _pcodeheader *,int *,struct mxArray_tag * * const,enum inDebugCheck,bool)(0x00cef284, 0x00cef2f4, 0x00cef320, 2) + 152 bytes
  [52] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalStringWithIsVarFcn(struct _memory_context *,char const *,enum EvalType,int,struct mxArray_tag * * const,enum inDebugCheck,struct _pcodeheader *,int *,bool (__cdecl*)(void *,char const *),void *,bool)(0x7ac2177c, 0x00e14420 "new\n", 0, 0) + 2454 bytes
  [53] m_interpreter.dll:enum inExecutionStatus __cdecl inEvalCmdWithLocalReturnandtype(char const *,int *,enum inDebugCheck,bool)(0x00e14420 "new\n", 0, 2, 0) + 107 bytes
  [54] m_interpreter.dll:_inEvalCmdNoEnd(0x00e14420 "new\n", 0, 0xa1e401fc, 0x7ab9e7f0) + 20 bytes
  [55] bridge.dll:enum inExecutionStatus __cdecl ThrowSignal(char const *)(0x00e14420 "new\n", 0xa1e40620, 0x01040548, 0x01040a10) + 77 bytes
  [56] bridge.dll:__catch$_mnParser$0(0xa1e404db, 0x01040a10, 0x01040a10, 0) + 292 bytes
  [57] mcr.dll:public: void __thiscall mcrInstance::mnParser(void)(0xa1d03501, 0x004043f0, 1320198, 0) + 62 bytes
  [58] MATLAB.exe:0x00401414(4194304, 0, 1320198, 10)
  [59] MATLAB.exe:0x00401733(0x7ffde000, 0x00ceffd4 "", 0x771f3618, 0x7ffde000)
  [60] kernel32.dll:0x7528ef3c(0x7ffde000, 0x7726dd84, 0, 0)
  [61] ntdll.dll:0x771f3618(0x00401910, 0x7ffde000, 0, 0)
  [62] ntdll.dll:0x771f35eb(0x00401910, 0x7ffde000, 0, 0x78746341)

This error was detected while a MEX-file was running. If the MEX-file
is not an official MathWorks function, please examine its source code
for errors. Please consult the External Interfaces Guide for information
on debugging MEX-files.

If it is an official MathWorks function, please
follow these steps to report this problem to The MathWorks so we
have the best chance of correcting it:

The next time MATLAB is launched under typical usage, a dialog box will
open to help you send the error log to The MathWorks. Alternatively, you
can send an e-mail to segv@mathworks.com with the following file attached:
    C:\Users\Accounts\AppData\Local\Temp\matlab_crash_dump.1456

If the problem is reproducible, please submit a Service Request via:
    http://www.mathworks.com/support/contac … est_1.html

A technical support engineer might contact you with further information.

Thank you for your help. Save your workspace and restart MATLAB.

Please do help me with this I need to finish this asap

Thank you
Surya

Offline

 

#2 2019-Oct-05 10:38:07

Surya
Member
Registered: 2015-Feb-02
Posts: 3

Re: MEX file execution failed

This is another error while i was running the different example codes. I could see that it is again due to pnet execution but please give clarity how exactly it works and are there any preceding steps i need to follow in order to eliminate that problem


The ARP entry addition failed: The requested operation requires elevation.


nodes =

     1


IPAddrs =

   167772161

??? Error using ==> pnet
No valid handler! already closed?

Error in ==> warplab_sendSync at 4
pnet(udp_Sync, 'write', int32(pktDataTx));

Error in ==> new at 251
warplab_sendSync(udp_Sync);

Last edited by Surya (2019-Oct-05 10:40:19)

Offline

 

#3 2019-Oct-05 11:30:25

murphpo
Administrator
From: Mango Communications
Registered: 2006-Jul-03
Posts: 5159

Re: MEX file execution failed

WARPLab v5.02 is *very* old, posted nearly 10 years ago. It appears you're trying to run this on Windows Vista. We have never tested this combination and cannot provide any real support.

Why are you using such an old WARPLab release? You should use the latest WARPLab release for your hardware (currently 7.7.1 for WARP v3, WARPLab 7.5.1 for WARP v2, abd WARPLab 6.3 for WARP v1).

The ARP entry addition failed: The requested operation requires elevation.

This appears to be the underlying error; perhaps you need to run the MATLAB session as an admin user.

Offline

 

Board footer