Occasional segfaults in IdentifySecondary

cellprofiler

#1

Hello. I’m running into a pretty obnoxious crash issue wherein CellProfiler sometimes decides to segfault in the middle of the IdentifySecondary module. It happens at least mostly with empty fields where IdentifyPrimary has failed to find anything, and it does not happen consistently. It’s not very clearly deterministic – it took me three tries to get CP to crash on the sample set I’m attaching (i.e. it successfully finished the pipeline the first two times), but it got there eventually. It’s throwing a java.lang.OutOfMemoryError exception to the console; the error message is attached.

I haven’t done a lot of work to isolate the crash yet. One potentially wacky thing is that I’m calling IdentifySecondary on the output of the Subtract module (setting negative values to zero); I haven’t tried setting manual stops on the threshold.

Sample data to “reproduce” the crash, eventually, maybe:
dl.getdropbox.com/u/3720/DefaultOUT.zip

I’d appreciate any light you could shed on this – whether there’s something I can do about it short of manually pulling out empty images before starting a CP run, or if this is a real bug that other people have experienced, or really pretty much anything.

Thanks,
tim

java.lang.OutOfMemoryError


   Segmentation violation detected at Thu Aug 07 14:36:59 2008

Configuration:
MATLAB Version: 7.4.0.287 (R2007a)
MATLAB License: unknown
Operating System: Microsoft Windows XP
Window System: Version 5.1 (Build 2600: Service Pack 3)
Processor ID: x86 Family 6 Model 15 Stepping 2, GenuineIntel
Virtual Machine: Java 1.5.0_07 with Sun Microsystems Inc. Java HotSpot™ Cl
ient VM mixed mode
Default Charset: windows-1252

Register State:
EAX = 00000000 EBX = 02bec264
ECX = 00000006 EDX = 00000018
ESI = 3b0e0038 EDI = 00000018
EBP = 02bec194 ESP = 02bec18c
EIP = 13581c64 FLG = 00010206

Stack Trace:
[0] IdentifySecPropagateSubfunction.dll:0x13581c64(24, 0x3b0e0038, 656, 0x02be
c264)
[1] IdentifySecPropagateSubfunction.dll:0x13581a32(24, 0x02bec1d8, 656, 0x296d
14b0)
[2] IdentifySecPropagateSubfunction.dll:0x13581616(0x02bec264, 0, 0, 0x297d003
0)
[3] IdentifySecPropagateSubfunction.dll:0x135812dc(0x2acf0030, 0x297d0030, 0x1
61d0030, 0x25870030)
[4] IdentifySecPropagateSubfunction.dll:0x135811ee(1, 0x02beca4c, 0x110a5120,
0x25870030)
[5] libmex.dll:_mexRunMexFile(1, 0x02beca4c, 4, 0x02becadc) + 139 bytes
[6] libmex.dll:private: void __thiscall Mfh_mex::runMexFileWithSignalProtectio
n(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x02beca4c, 4, 0x02b
ecadc) + 86 bytes
[7] libmex.dll:public: virtual void __thiscall Mfh_mex::dispatch_file(int,stru
ct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x02beca4c, 4, 0x02becadc) + 2
63 bytes
[8] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(int
,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x02beca4c, 4, 0x02becadc
) + 203 bytes
[9] m_interpreter.dll:void __cdecl mdCallFunction(int,struct mxArray_tag * *,i
nt,struct mxArray_tag * *,class Mfh_MATLAB_fn *)(1, 0x02beca4c, 4, 0x02becadc) +
56 bytes
[10] m_interpreter.dll:public: void __thiscall ResolverFunctionDesc::CallFunct
ion(int,struct mxArray_tag * * const,int,struct mxArray_tag * * const)(1, 0x02be
ca4c, 4, 0x02becadc) + 93 bytes
[11] m_interpreter.dll:public: bool __thiscall Resolver::CallMFunction(int,int
,class _m_operand * const,union m_operand_storage *,int,class _m_operand * const
,union m_operand_storage *,int *)(1, 1, 0x110a42e0, 0) + 1274 bytes
[12] m_interpreter.dll:bool __cdecl inResolveMFunctionCall(struct m_function
desc *,int,int,class _m_operand * const,union m_operand_storage *,int,class _m_o
perand * const,union m_operand_storage *,int *,enum inMarshalType *,int,class mp
sTypeSequenceNlhs const *)(0x0f2172b8, 1, 1, 0x110a42e0) + 179 bytes
[13] m_interpreter.dll:bool __cdecl accelMFunctionCall(struct _accelOp *,struc
t _accelOp * *,int *,enum inMarshalType *,void *)(0x0f28e020, 0x02bed0d4, 0x02be
d0d8, 0x02bed19c) + 161 bytes
[14] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelImpl::Exec(
void)(0xe28e6677, 0x13498210, 0x02bed19c, 0x02bed190) + 222 bytes
[15] m_interpreter.dll:public: enum jitReturnFlags __thiscall accelCode::Call(
enum inMarshalType *,int *)const (0x02bed19c, 0x02bed190, 0x02bed1b0, 0x787ef28a
) + 116 bytes
[16] m_interpreter.dll:int __cdecl inAccel(class accelCode *,enum inMarshalTyp
e *,int *)(0x10cc1da0, 0x02bed19c, 0x02bed190, 0x02bed40c) + 19 bytes
[17] m_interpreter.dll:bool __cdecl inExecuteHotSegment(struct _inJitAccelInfo
*,enum opcodes *,int *,int *)(0x02bed244, 0x02bed300, 0x02bed2b0, 0x02bed40c) +
1690 bytes
[18] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opc
odes,struct inPcodeNest_tag volatile *,int *)(1, 5790, 331, 0) + 341 bytes
[19] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,in
t,enum opcodes,struct inPcodeNest_tag *,int *)(1, 5790, 161, 0) + 87 bytes
[20] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,en
um opcodes,struct inPcodeNest_tag *,int *)(1, 5790, 161, 0) + 302 bytes
[21] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,b
ool)(0x0ec08a60, 0, 1, 0x02bed838) + 734 bytes
[22] m_interpreter.dll:_inWordsj(1, 0x02bed7d4, 1, 0x02bed838) + 351 bytes
[23] m_interpreter.dll:public: void __thiscall Mfh_mp::inRunMP(int,struct mxAr
ray_tag * *,int,struct mxArray_tag * *,struct inWorkSpace_tag *)(1, 0x02bed7d4,
1, 0x02bed838) + 194 bytes
[24] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(s
truct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag *
*)(0, 1, 0x02bed7d4, 1) + 28 bytes
[25] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(i
nt,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x02bed7d4, 1, 0x02bed8
38) + 28 bytes
[26] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(in
t,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x02bed7d4, 1, 0x02bed83
8) + 203 bytes
[27] m_interpreter.dll:_inCallFcn(1, 0x02bed7d4, 1, 0x02bed838) + 134 bytes
[28] m_interpreter.dll:_inFullFevalFcn(1, 0x02bed7d4, 2, 0x02bed834) + 223 byt
es
[29] m_dispatcher.dll:public: virtual void __thiscall Mfh_builtin::dispatch_mf
(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x02bed7d4, 2, 0x02be
d834) + 57 bytes
[30] m_dispatcher.dll:public: virtual void _thiscall Mfh_MATLAB_fn::dispatch
fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(1, 0x02bed7d4, 2, 0x02
bed834) + 163 bytes
[31] m_interpreter.dll:_inDispatchWithDebug(268, 1, 0x02bed7d4, 2) + 192 bytes

[32] m_interpreter.dll:_inDispatchFromStack(268, 0x0ed03938 “feval”, 1, 2) + 8
77 bytes
[33] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,in
t,int,int *,int *)(0x0ed03938 “feval”, 268, 1, 2) + 156 bytes
[34] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opc
odes,struct inPcodeNest_tag volatile *,int *)(1, 7391, 9409, 0) + 2620 bytes
[35] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,in
t,enum opcodes,struct inPcodeNest_tag *,int *)(1, 7391, 9017, 0) + 87 bytes
[36] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,en
um opcodes,struct inPcodeNest_tag *,int *)(1, 7391, 9017, 0) + 302 bytes
[37] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,b
ool)(0x0ecb88a0, 0, 3, 0x02bedf8c) + 734 bytes
[38] m_interpreter.dll:_inWordsj(0, 0x02bedf28, 3, 0x02bedf8c) + 351 bytes
[39] m_interpreter.dll:public: void __thiscall Mfh_mp::inRunMP(int,struct mxAr
ray_tag * *,int,struct mxArray_tag * *,struct inWorkSpace_tag *)(0, 0x02bedf28,
3, 0x02bedf8c) + 194 bytes
[40] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(s
truct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag *
*)(0, 0, 0x02bedf28, 3) + 28 bytes
[41] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(i
nt,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02bedf28, 3, 0x02bedf
8c) + 28 bytes
[42] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(in
t,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02bedf28, 3, 0x02bedf8
c) + 203 bytes
[43] m_dispatcher.dll:_mdCallViamdMxarrayFunctionHandle(0x0f9b19a0, 0, 0x02bed
f28, 3) + 29 bytes
[44] libmx.dll:_mxFevalFunctionHandle(0, 0x02bedf28, 4, 0x02bedf88) + 38 bytes

[45] m_interpreter.dll:_inFullFevalFcn(0, 0x02bedf28, 4, 0x02bedf88) + 152 byt
es
[46] m_dispatcher.dll:public: virtual void __thiscall Mfh_builtin::dispatch_mf
(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02bedf28, 4, 0x02be
df88) + 57 bytes
[47] m_dispatcher.dll:public: virtual void _thiscall Mfh_MATLAB_fn::dispatch
fh(int,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02bedf28, 4, 0x02
bedf88) + 163 bytes
[48] m_interpreter.dll:_inDispatchWithDebug(268, 0, 0x02bedf28, 4) + 192 bytes

[49] m_interpreter.dll:_inDispatchFromStack(268, 0x0ed03938 “feval”, 0, 0xffff
fffc) + 877 bytes
[50] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,in
t,int,int *,int *)(0x0ed03938 “feval”, 268, 0, 0xfffffffc) + 156 bytes
[51] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opc
odes,struct inPcodeNest_tag volatile *,int *)(1, 2582, 11138, 0) + 2620 bytes
[52] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,in
t,enum opcodes,struct inPcodeNest_tag *,int *)(1, 2582, 11100, 0) + 87 bytes
[53] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,en
um opcodes,struct inPcodeNest_tag *,int *)(1, 2582, 11100, 0) + 302 bytes
[54] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,b
ool)(0x0ecb5ea0, 0, 5, 0x02bee620) + 734 bytes
[55] m_interpreter.dll:_inWordsj(0, 0x02bee5c0, 5, 0x02bee620) + 351 bytes
[56] m_interpreter.dll:public: void __thiscall Mfh_mp::inRunMP(int,struct mxAr
ray_tag * *,int,struct mxArray_tag * *,struct inWorkSpace_tag *)(0, 0x02bee5c0,
5, 0x02bee620) + 194 bytes
[57] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(s
truct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag *
*)(0, 0, 0x02bee5c0, 5) + 28 bytes
[58] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(i
nt,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02bee5c0, 5, 0x02bee6
20) + 28 bytes
[59] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(in
t,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02bee5c0, 5, 0x02bee62
0) + 203 bytes
[60] m_interpreter.dll:_inDispatchWithDebug(756, 0, 0x02bee5c0, 5) + 192 bytes

[61] m_interpreter.dll:_inDispatchFromStack(756, 0x0ed03a8c “gui_mainfcn”, 0,
0xfffffffb) + 877 bytes
[62] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,in
t,int,int *,int *)(0x0ed03a8c “gui_mainfcn”, 756, 0, 0xfffffffb) + 156 bytes
[63] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opc
odes,struct inPcodeNest_tag volatile *,int *)(1, 389, 55, 0) + 2620 bytes
[64] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,in
t,enum opcodes,struct inPcodeNest_tag *,int *)(1, 389, 30, 0) + 87 bytes
[65] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,en
um opcodes,struct inPcodeNest_tag *,int *)(1, 389, 30, 0) + 302 bytes
[66] m_interpreter.dll:int __cdecl inExecuteMFunctionOrScript(class Mfh_mp *,b
ool)(0x0eb2d5a0, 0, 4, 0x02beecb8) + 734 bytes
[67] m_interpreter.dll:_inWordsj(0, 0x02beec58, 4, 0x02beecb8) + 351 bytes
[68] m_interpreter.dll:public: void __thiscall Mfh_mp::inRunMP(int,struct mxAr
ray_tag * *,int,struct mxArray_tag * *,struct inWorkSpace_tag *)(0, 0x02beec58,
4, 0x02beecb8) + 194 bytes
[69] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(s
truct _mdUnknown_workspace *,int,struct mxArray_tag * *,int,struct mxArray_tag *
*)(0, 0, 0x02beec58, 4) + 28 bytes
[70] m_interpreter.dll:public: virtual void __thiscall Mfh_mp::dispatch_file(i
nt,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02beec58, 4, 0x02beec
b8) + 28 bytes
[71] m_dispatcher.dll:public: virtual void __thiscall Mfh_file::dispatch_fh(in
t,struct mxArray_tag * *,int,struct mxArray_tag * *)(0, 0x02beec58, 4, 0x02beecb
8) + 203 bytes
[72] m_interpreter.dll:_inDispatchWithDebug(543, 0, 0x02beec58, 4) + 192 bytes

[73] m_interpreter.dll:_inDispatchFromStack(543, 0x10981070 “CellProfiler”, 0,
4) + 877 bytes
[74] m_interpreter.dll:enum opcodes __cdecl inDispatchCall(char const *,int,in
t,int,int *,int *)(0x10981070 “CellProfiler”, 543, 0, 4) + 156 bytes
[75] m_interpreter.dll:int __cdecl inInterp(enum inDebugCheck,int,int,enum opc
odes,struct inPcodeNest_tag volatile *,int *)(0, 0, 0, 0) + 2745 bytes
[76] m_interpreter.dll:int __cdecl protected_inInterp(enum inDebugCheck,int,in
t,enum opcodes,struct inPcodeNest_tag *,int *)(0, 0, 0, 0) + 87 bytes
[77] m_interpreter.dll:int __cdecl inInterPcodeSJ(enum inDebugCheck,int,int,en
um opcodes,struct inPcodeNest_tag *,int *)(0, 0, 0, 0) + 302 bytes
[78] m_interpreter.dll:_inInterPcode(0, 0xe28e5973, 0, 0x78503444) + 84 bytes
[79] m_interpreter.dll:enum inExecutionStatus __cdecl in_local_call_eval_funct
ion(int *,struct _pcodeheader *,int *,struct mxArray_tag * * const,enum inDebugC
heck)(0x02bef954, 0x02bef9c4, 0x02befaa8, 0) + 152 bytes
[80] m_interpreter.dll:__catch$?inEvalStringWithIsVarFcn@@YA?AW4inExecutionSta
tus@@PAU_memory_context@@PBDW4EvalType@@HQAPAUmxArray_tag@@W4inDebugCheck@@PAU_p
codeheader@@PAHP6A_NPAX1@Z7@Z$0(0x78503444, 0x01d539f0 “CellProfiler('AnalyzeIma
gesButto…”, 0, 0) + 219 bytes
[81] m_interpreter.dll:_inEvalString(0x78503444, 0x01d539f0 “CellProfiler('Ana
lyzeImagesButto…”, 0, 0) + 45 bytes
[82] m_interpreter.dll:_inEvalExpInWS(0x01d539f0 “CellProfiler('AnalyzeImagesB
utto…”, 0, 0, 0x02befaa8) + 99 bytes
[83] libmwgui.dll:private: bool __thiscall MCallback::execute(struct mxArray
tag *,struct mxArray_tag *,int,struct mxArray_tag * *)const (0x0ec75de0, 0x0d9df
e60, 0, 0) + 209 bytes
[84] libmwgui.dll:public: bool __thiscall MCallback::execute(struct mxArray_ta
g *,struct mxArray_tag *)const (0x0ec75de0, 0x0d9dfe60, 0x02befb7c, 0x79410341)

  • 463 bytes
    [85] libmwgui.dll:bool __cdecl ExecuteMCallback(class MCallback const *,struct
    mxArray_tag *,struct mxArray_tag *)(0x0f683fa0, 0x0ec75de0, 0x0d9dfe60, 1) + 19
    bytes
    [86] hg.dll:enum inExecutionStatus _cdecl goCallEventCallback(struct GObject
    tag *,class MCallback *,char const ,void (__cdecl)(struct GObject_tag *,void *
    ),void ,void (__cdecl)(struct GObject_tag *,void *),struct mxArray_tag *)(0x0f
    8b5ea0, 0x794591b0 “Callback”, 0x015be098, 0) + 385 bytes
    [87] hg.dll:_goCallCallback(0x0f8b5ea0, 0x0f683fa0, 0x794591b0 “Callback”, 0x7
    93e4d40) + 157 bytes
    [88] hg.dll:_uicontrolEventHandler(0x0f8b5ea0, 0x0d9dfe60, 0, 0x8342e3eb) + 37
    4 bytes
    [89] hg.dll:public: virtual void __thiscall UIControlJavaDisplayManager::Activ
    ated(class UDInterface *,class DisplayManager *,void *)(0x0f99f260 “∞GpxΣGpx”, 0
    x0dd1d6c0, 0x0d3741f8, 0x02befc70) + 111 bytes
    [90] hg.dll:public: virtual void __thiscall DefaultJavaViewContainer::JavaView
    ActionCallback(class UDInterface *,class JavaViewContainer *,void *)(0x0f99f260
    "∞GpxΣGpx", 0x0dd1d6e8, 0x0d3741f8, 0x02befc94) + 47 bytes
    [91] hg.dll:public: static void __cdecl DefaultJavaViewContainer::JavaViewActi
    onCallbackDispatch(class UDInterface *,class JavaViewContainer *,void *,bool)(0x
    0f99f260 “∞GpxΣGpx”, 0x0dd1d6e8, 0x0d3741f8, 0x786c6700) + 22 bytes
    [92] hg.dll:public: virtual bool __thiscall JavaEventListener::execute(class U
    DEvent *)(0x02befd20, 0x0dd1c260, 0x0f99f260 “∞GpxΣGpx”, 0x02befd20) + 69 bytes
    [93] udd.dll:public: bool __thiscall UDListenerList::execute(class UDEvent *)(
    0x02befd20, 0x02befce4, 0x786edebf, 0x0dbd0e90) + 89 bytes
    [94] udd.dll:public: virtual void __thiscall UDListenerManagerHost::notifyEven
    t(class UDDatabaseClient *,class UDEventSource const *,class UDEventInfo const *
    ,class UDEvent *)(0x0dbd0e90, 0x0f99f264 “ΣGpx”, 0x0dd1c260, 0x02befd20) + 54 by
    tes
    [95] udd.dll:public: virtual void __thiscall UDEventInfo::send(class UDDatabas
    eClient *,class UDInterface *,class UDEvent *)(0x0dbd0e90, 0x0f99f260 “∞GpxΣGpx”
    , 0x02befd20, 0x0dd21c40) + 63 bytes
    [96] udd.dll:public: void __thiscall UDInterface::send(class UDDatabaseClient
    *,class UDEventInfo *,class UDEvent *)(0x0dbd0e90, 0x0dd1c260, 0x02befd20, 0x822
    62b09) + 86 bytes
    [97] udd_mi.dll:_ProcessBeanUDDEvent(407, 0x81888c51, 0, 196608) + 588 bytes
    [98] uiw.dll:bool __cdecl UIW_DispatchUserMessage(int,int)(9235, 407, 0x02befe
    94, 0) + 77 bytes
    [99] uiw.dll:_HandleUserMsgHook@12(0, 1, 0x02befe94, 0x792445f0) + 86 bytes
    [100] USER32.DLL:0x7e431923(196608, 1, 0x02befe94, 0x791f1ab0)
    [101] USER32.DLL:0x7e42b317(0x02befe84, 0x02befe94, 0x02befeb0, 0)
    [102] USER32.DLL:0x7e4278d0(0x02befe84, 48, 196608, 1)
    [103] ntdll.dll:0x7c90e453(0x02beff00, 0, 0, 0)
    [104] uiw.dll:void __cdecl UIW_GetAndDispatchMessage(struct tagMSG *)(0x02beff
    00, 0, 0x0012f0e4 " ", 0x02beff50) + 20 bytes
    [105] uiw.dll:void __cdecl UIW_GetAndDispatchMessage(void)(0x7956f914, 0, 0x00
    12f0e4 " ", 0) + 15 bytes
    [106] uiw.dll:void __cdecl ws_ProcessPendingEventsMainLoop(int,bool)(1, 0, 0x0
    2beff98, 0x7955b0b2) + 341 bytes
    [107] uiw.dll:void __cdecl ws_ProcessPendingEvents(int,int)(1, 0xffffffff, 0x8
    341a273, 0x00b355c0) + 80 bytes
    [108] mcr.dll:void __cdecl mcr_process_events(void)(0x8341a25f, 0x7956f914, 0x
    02beffdc, 0x795600a0) + 322 bytes
    [109] mcr.dll:unsigned long __cdecl run_init_and_handle_events(void *)(0x0012f
    0e4 " ", 0x00b355c0, 1, 0x0012f0e4 " ") + 144 bytes
    [110] kernel32.dll:0x7c80b713(0x7955b100, 0x0012f0e4 " ", 0, 131328)

This error was detected while a MEX-file was running. If the MEX-file
is not an official MathWorks function, please examine its source code
for errors. Please consult the External Interfaces Guide for information
on debugging MEX-files.

If it is an official MathWorks function, please
follow these steps to report this problem to The MathWorks so we
have the best chance of correcting it:

The next time MATLAB is launched under typical usage, a dialog box will
open to help you send the error log to The MathWorks. Alternatively, you
can send an e-mail to segv@mathworks.com with the following file attached:
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\matlab_crash_dump.592

If the problem is reproducible, please submit a Service Request via:
mathworks.com/support/contac … est_1.html

A technical support engineer might contact you with further information.

Thank you for your help. Save your workspace and restart MATLAB.

Error in ==> CellProfiler>AnalyzeImagesButton_Callback at 9409

Error in ==> CellProfiler>gui_mainfcn at 11138

Error in ==> CellProfiler at 55

??? Error using ==> CellProfiler(‘AnalyzeImagesButton_Callback’,gcbo,],guidata(
gcbo))
Reference to non-existent field ‘CropMaskRescaledDAPI’.

??? Error while evaluating uicontrol Callback


#2

Hi Tim,

Not sure, but you may need to increase your JVM (Java Virtual Machine) heap size. This solution may help: mathworks.com/support/soluti … 18I2C.html

David