<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access violation in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146727#M92498</link>
    <description>Thanks for your answers! Problem caused by c-program and pointer to pointers pointing on ... god nows what...&lt;BR /&gt;&lt;BR /&gt;MERRY CHRISTMAS&lt;BR /&gt;Klaes-Göran&lt;BR /&gt;</description>
    <pubDate>Wed, 17 Dec 2008 11:55:57 GMT</pubDate>
    <dc:creator>Klaes-Göran Carlsson</dc:creator>
    <dc:date>2008-12-17T11:55:57Z</dc:date>
    <item>
      <title>access violation</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146724#M92495</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Any hints from someone where I should start looking for reason for below access violation?&lt;BR /&gt;It is a new program. Does it require some more quota or. What is most common reason for "access violation"?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;%SYSTEM-F-ACCVIO, access violation, reason mask=04, virtual address=0000000000110000, PC=FF&lt;BR /&gt;&lt;BR /&gt;FFFFFF84260D11, PS=0000001B&lt;BR /&gt;&lt;BR /&gt;%TRACE-F-TRACEBACK, symbolic stack dump follows&lt;BR /&gt;&lt;BR /&gt;image     module    routine               line      rel PC           abs PC      &lt;BR /&gt;&lt;BR /&gt;LIBOTS                                       0 0000000000012D11 FFFFFFFF84260D11&lt;BR /&gt;&lt;BR /&gt;libclntsh  ttcx2y  ttcc2u               427560 0000000000002110 000000000135D230&lt;BR /&gt;&lt;BR /&gt;libclntsh  ttcx2y  ttcs2c               429560 000000000000ED20 0000000001369E40&lt;BR /&gt;&lt;BR /&gt;libclntsh  ttcacs  ttcacr               415042 0000000000005DD0 00000000013587F0&lt;BR /&gt;&lt;BR /&gt;libclntsh  ttcdrv  ttcdrv              1433700 0000000000002BC0 000000000139B080&lt;BR /&gt;&lt;BR /&gt;libclntsh  nioqwa  nioqwa               162140 00000000000000C0 0000000000A62420&lt;BR /&gt;&lt;BR /&gt;libclntsh  upiprv  upirtrc              418061 0000000000002300 000000000069C200&lt;BR /&gt;&lt;BR /&gt;libclntsh  kpurc  kpurcsc               396905 00000000000001B0 00000000005A84F0&lt;BR /&gt;&lt;BR /&gt;libclntsh  kpuex  kpuexecv8            1056507 0000000000009030 00000000004F9920&lt;BR /&gt;&lt;BR /&gt;libclntsh  kpuex  kpuexec              1057935 000000000000FD50 0000000000500640&lt;BR /&gt;&lt;BR /&gt;libclntsh  oci8  OCIStmtExecute          #1182 00000000000020F0 0000000000238A50&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 000000000008FC70 000000000008FC70&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 0000000000071D80 0000000000071D80&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 00000000000507F0 00000000000507F0&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 0000000000051AB0 0000000000051AB0&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 0000000000052A30 0000000000052A30&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 0000000000053E20 0000000000053E20&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 0000000000053F50 0000000000053F50&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 00000000000BDD00 00000000000BDD00&lt;BR /&gt;&lt;BR /&gt;FBFSSND                                      0 00000000000CA3B0 00000000000CA3B0&lt;BR /&gt;&lt;BR /&gt;PTHREAD$RTL  THD_THREAD  thdBase        243309 0000000000005BF0 FFFFFFFF84541440&lt;BR /&gt;&lt;BR /&gt;PTHREAD$RTL  THD_INIT  pthread_main     243137 00000000000006C0 FFFFFFFF844F86C0&lt;BR /&gt;&lt;BR /&gt;                                             0 FFFFFFFF80B65120 FFFFFFFF80B65120&lt;BR /&gt;&lt;BR /&gt;DCL                                          0 000000000006BA90 000000007AE0BA90&lt;BR /&gt;&lt;BR /&gt;%TRACE-I-LINENUMBER, Leading '#' specifies a source file record number.&lt;BR /&gt;&lt;BR /&gt;%TRACE-I-END, end of TRACE stack dump&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Dec 2008 10:03:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146724#M92495</guid>
      <dc:creator>Klaes-Göran Carlsson</dc:creator>
      <dc:date>2008-12-17T10:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: access violation</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146725#M92496</link>
      <description>An access violation is the memory management system stopping you doing something.&lt;BR /&gt;&lt;BR /&gt;reason mask=04 : attempt to write readonly memory.&lt;BR /&gt;&lt;BR /&gt;PC=FFFFFFFF84260D11 : you were in a system library at the time.&lt;BR /&gt;&lt;BR /&gt;virtual address=0000000000110000, somewhere in your program. A suspiciously round number, suggesting you might have wandered across a page boundary. &lt;BR /&gt;&lt;BR /&gt;So, fire up a debugger, or put debug prints in your code. Work from the top of the call stack, and double check what parameters you are passing to the system library.</description>
      <pubDate>Wed, 17 Dec 2008 11:12:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146725#M92496</guid>
      <dc:creator>Richard Brodie_1</dc:creator>
      <dc:date>2008-12-17T11:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: access violation</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146726#M92497</link>
      <description>Klaes-GÃ¶ran,&lt;BR /&gt;&lt;BR /&gt;the ACCVIO itself happens in LIBOTS, a system library, after being called from a routine in an ORACLE library (libclntsh). If your code is in image FBFSSND, use a linker map and the source and machine-code listings to find out about the call with return address 8FC70.&lt;BR /&gt;&lt;BR /&gt;You can also use $ SET PROC/DUMP before running this image to obtain a process dump in case of an improperly handled condition. You can then analyze the process dump with $ ANAL/PROC.&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Wed, 17 Dec 2008 11:29:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146726#M92497</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2008-12-17T11:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: access violation</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146727#M92498</link>
      <description>Thanks for your answers! Problem caused by c-program and pointer to pointers pointing on ... god nows what...&lt;BR /&gt;&lt;BR /&gt;MERRY CHRISTMAS&lt;BR /&gt;Klaes-Göran&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Dec 2008 11:55:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/access-violation/m-p/5146727#M92498</guid>
      <dc:creator>Klaes-Göran Carlsson</dc:creator>
      <dc:date>2008-12-17T11:55:57Z</dc:date>
    </item>
  </channel>
</rss>

