- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2018 05:15 PM
02-27-2018 05:15 PM
Re: %TIE-W-PSIG_WRONG and %TIE-W-PSIG_ADDR errors
Tim,
Thanks for getting back to me. This is, as I mentioned, on 8.4U1100... Not likely to get to VSI version for a while.
Full error message is:
%TIE-W-PSIG_WRONG, Wrong PSIG [000000007B2CC540] for SECURESHRP_AV[12]
%TIE-W-PSIG_ADDR, PSIG invalid address : 000000007B2CC540
Analyze/Image of SECURESHRP.EXE...
Analyze Image 27-FEB-2018 19:05:56.44 Page 1
SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1
ANALYZ I01-55
This is an OpenVMS IA64 (Elf format) shareable image file
Image Identification Information, in section 8.
Image name: "SECURESHRP"
Global Symbol Table name: "SECURESHRP"
Image file identification: "X-9"
Image build identification: "0100000081"
Link identification: "Linker I02-37"
Link Date/Time: 27-JUL-2012 12:31:08.05
Image Transfer Information, in segment 8.
Main Transfer
Entry Address: 000000000004FF80 (segment 2.)
GP Value: 00000000002F0000
Image Activation Information, in segment 9.
Match Control
Algorithm: LESS/EQUAL
Major ID: 1.
Minor ID: 4.
Global Pointer: 00000000002F0000
Whole program FP-mode: VAX FLOAT
Symbol Vector in segment 8.
Link flags
Call SYS$IMGSTA
Image has main transfer
Traceback records in image file
TIE Signatures present
Shareable Image List
SYS$BASE_IMAGE
SYS$PUBLIC_VECTORS
Component List, Image / Current System Version
SYS$K_VERSION_BASE_IMAGE (3.0 / 3.0)
SYS$K_VERSION_MEMORY_MANAGEMENT (3.0 / 3.0)
SYS$K_VERSION_PROCESS_SCHED (2.0 / 2.0)
SYS$K_VERSION_SYSGEN (1.64 / 1.64)
SYS$K_VERSION_LOGICAL_NAMES (1.0 / 1.0)
SYS$K_VERSION_SECURITY (2.32 / 2.32)
SYS$K_VERSION_IMAGE_ACTIVATOR (1.64 / 1.64)
SYS$K_VERSION_STABLE (1.64 / 1.64)
SYS$K_VERSION_MISC (1.64 / 1.64)
SYS$K_VERSION_VOLATILE (1.64 / 1.64)
SYS$K_VERSION_SHELL (1.64 / 1.64)
SYS$K_VERSION_MULTI_PROCESSING (2.16 / 2.16)
Analyze Image 27-FEB-2018 19:05:56.44 Page 2
SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1
ANALYZ I01-55
Elf Header Information, at file address 0.
Class: ELF-64
Data: Little-endian byte order
Elf Header Version: 1.
OS ABI: OpenVMS
OS ABI Version: 2.
Type: Shareable
Machine Architecture: IA_64
Elf File Version: 1.
VMS Completion Code: SUCCESS
Analyze Image 27-FEB-2018 19:05:56.44 Page 3
SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1
ANALYZ I01-55
PROGRAM SEGMENT SUMMARY Table at file address 00000048, 10. segments, 56. bytes each, 560. total bytes
Number Type Virtual Address Memory Size File Address File Size Flags
- LOAD 0000000000010000 00000000000019B0 0000000000000400 = Memory Size -WR------------Pro------------
- LOAD 0000000000020000 0000000000000070 0000000000000000 0000000000000000 -WR------------Pro------------
- LOAD 0000000000030000 000000000005B1D0 0000000000001E00 = Memory Size X-R------------Pro------Shr---
- LOAD 00000000000B0000 0000000000002CD0 000000000005D000 = Memory Size --RNwr---------Pro------------
- LOAD 00000000000C0000 0000000000000510 000000000005FE00 = Memory Size --RNwr---------Pro------Shr---
- LOAD 00000000000D0000 000000000000002C 0000000000060400 = Memory Size --RNwr------VecPro------------
- LOAD 00000000000E0000 0000000000003748 0000000000060600 = Memory Size --R------------Pro------------
- LOAD 00000000000F0000 0000000000000054 0000000000063E00 = Memory Size -WR------------Pro---Sho------
- LOAD 0000000000100000 00000000000022F8 0000000000064000 = Memory Size --RNwr---------ProNwfSho------
- DYNAMIC 0000000080000000 000000000000A170 0000000000066400 = Memory Size --R---------------------------
Key for Flags: X (Execute), W (Write), R (Read), Nwr (No write but relocations), Ini (Initialization code), Res (Resident),
Vec (Vector), Pro (Protected), Nwf (No write but fixups), Sho (Short data), Shr (Shared), Nrc (No recovery code)
SECTION SUMMARY Table at file address 0007CE00, 13. sections, 64. bytes each, 832. total bytes
Number Type Name File Address File Size Flags
- NULL 0000000000000000 0000000000000000 ------------------------------
- STRTAB .shstrtab 000000000007CC00 0000000000000095 ------------------------------
- STRTAB .strtab 000000000007CA00 0000000000000115 ------------------------------
- VMS_TRACE .debug_line 0000000000070600 0000000000009C34 ------------------------------
- VMS_TRACE .trace_abbrev 000000000007A400 0000000000000357 ------------------------------
- VMS_TRACE .trace_info 000000000007A800 00000000000014C9 ------------------------------
- VMS_TRACE .trace_aranges 000000000007BE00 0000000000000560 ------------------------------
- PROGBITS .comment 000000000007C400 000000000000004A ------------------------------
- NOTE .note 000000000007C600 0000000000000190 ------------------------------
- NULL $LINKER RELOCATABLE_SYMBOL 0000000000000000 0000000000000000 ------------------------------
- STRTAB .dynstr 0000000000066670 0000000000000023 -A----------------------------
- SYMTAB .symtab 000000000007C800 00000000000001B0 ------------------------------
- VMS_SYMBOL_VECTOR .vms_symbol_vector 0000000000064000 0000000000000098 -A----------------------------
Key for Flags: W (Write), A (Alloc), E (Execute), S (Strings), I (Info link), L (Link order), O (OS-specific processing),
G (Group), Sho (Short), Nrc (No recovery code), Gbl (Global), Ovr (Overlaid), Shr (Shared), Vec (Vector),
64b (Allocate 64bit address), Pro (Protected)
Analyze Image 27-FEB-2018 19:05:56.45 Page 4
SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1
ANALYZ I01-55
The analysis uncovered NO errors.
**bleep**/IMAGE sys$library:secureshrp.exe
===================================
Thanks,
Bill.
CCSS - Computer Consulting System Services, LLC