Bill Pedersen
Regular Advisor

Re: %TIE-W-PSIG_WRONG and %TIE-W-PSIG_ADDR errors

Tim,

Thanks for getting back to me.  This is, as I mentioned, on 8.4U1100...  Not likely to get to VSI version for a while.

Full error message is:

%TIE-W-PSIG_WRONG, Wrong PSIG [000000007B2CC540] for SECURESHRP_AV[12]
%TIE-W-PSIG_ADDR, PSIG invalid address : 000000007B2CC540

Analyze/Image of SECURESHRP.EXE...

Analyze Image                                27-FEB-2018 19:05:56.44                                                   Page 1

SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1

ANALYZ I01-55

This is an OpenVMS IA64 (Elf format) shareable image file

Image Identification Information, in section 8.

    Image name:                                 "SECURESHRP"

    Global Symbol Table name:                   "SECURESHRP"

    Image file identification:                  "X-9"

    Image build identification:                 "0100000081"

    Link identification:                        "Linker I02-37"

    Link Date/Time:                             27-JUL-2012 12:31:08.05

Image Transfer Information, in segment 8.

    Main Transfer

        Entry Address:                          000000000004FF80 (segment 2.)

        GP Value:                               00000000002F0000

Image Activation Information, in segment 9.

    Match Control

        Algorithm:                              LESS/EQUAL

        Major ID:                               1.

        Minor ID:                               4.

    Global Pointer:                             00000000002F0000

    Whole program FP-mode:                      VAX FLOAT

    Symbol Vector in segment 8.

    Link flags

        Call SYS$IMGSTA

        Image has main transfer

        Traceback records in image file

        TIE Signatures present

    Shareable Image List

        SYS$BASE_IMAGE

        SYS$PUBLIC_VECTORS

    Component List, Image / Current System Version

        SYS$K_VERSION_BASE_IMAGE                (3.0 / 3.0)

        SYS$K_VERSION_MEMORY_MANAGEMENT         (3.0 / 3.0)

        SYS$K_VERSION_PROCESS_SCHED             (2.0 / 2.0)

        SYS$K_VERSION_SYSGEN                    (1.64 / 1.64)

        SYS$K_VERSION_LOGICAL_NAMES             (1.0 / 1.0)

        SYS$K_VERSION_SECURITY                  (2.32 / 2.32)

        SYS$K_VERSION_IMAGE_ACTIVATOR           (1.64 / 1.64)

        SYS$K_VERSION_STABLE                    (1.64 / 1.64)

        SYS$K_VERSION_MISC                      (1.64 / 1.64)

        SYS$K_VERSION_VOLATILE                  (1.64 / 1.64)

        SYS$K_VERSION_SHELL                     (1.64 / 1.64)

        SYS$K_VERSION_MULTI_PROCESSING          (2.16 / 2.16)

Analyze Image                                27-FEB-2018 19:05:56.44                                                   Page 2

SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1

ANALYZ I01-55

Elf Header Information, at file address 0.

    Class:                                      ELF-64

    Data:                                       Little-endian byte order

    Elf Header Version:                         1.

    OS ABI:                                     OpenVMS

    OS ABI Version:                             2.

    Type:                                       Shareable

    Machine Architecture:                       IA_64

    Elf File Version:                           1.

    VMS Completion Code:                        SUCCESS

Analyze Image                                27-FEB-2018 19:05:56.44                                                   Page 3

SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1

ANALYZ I01-55

PROGRAM SEGMENT SUMMARY      Table at file address 00000048, 10. segments, 56. bytes each, 560. total bytes

Number  Type                 Virtual Address  Memory Size      File Address     File Size         Flags

  1. LOAD                 0000000000010000 00000000000019B0 0000000000000400  = Memory Size    -WR------------Pro------------
  2. LOAD                 0000000000020000 0000000000000070 0000000000000000 0000000000000000  -WR------------Pro------------
  3. LOAD                 0000000000030000 000000000005B1D0 0000000000001E00  = Memory Size    X-R------------Pro------Shr---
  4. LOAD                 00000000000B0000 0000000000002CD0 000000000005D000  = Memory Size    --RNwr---------Pro------------
  5. LOAD                 00000000000C0000 0000000000000510 000000000005FE00  = Memory Size    --RNwr---------Pro------Shr---
  6. LOAD                 00000000000D0000 000000000000002C 0000000000060400  = Memory Size    --RNwr------VecPro------------
  7. LOAD                 00000000000E0000 0000000000003748 0000000000060600  = Memory Size    --R------------Pro------------
  8. LOAD                 00000000000F0000 0000000000000054 0000000000063E00  = Memory Size    -WR------------Pro---Sho------
  9. LOAD                 0000000000100000 00000000000022F8 0000000000064000  = Memory Size    --RNwr---------ProNwfSho------
  10. DYNAMIC              0000000080000000 000000000000A170 0000000000066400  = Memory Size    --R---------------------------

Key for Flags: X (Execute), W (Write), R (Read), Nwr (No write but relocations), Ini (Initialization code), Res (Resident),

               Vec (Vector), Pro (Protected), Nwf (No write but fixups), Sho (Short data), Shr (Shared), Nrc (No recovery code)

SECTION SUMMARY              Table at file address 0007CE00, 13. sections, 64. bytes each, 832. total bytes

Number  Type                 Name                              File Address     File Size         Flags

  1. NULL                                                   0000000000000000 0000000000000000  ------------------------------
  2. STRTAB               .shstrtab                         000000000007CC00 0000000000000095  ------------------------------
  3. STRTAB               .strtab                           000000000007CA00 0000000000000115  ------------------------------
  4. VMS_TRACE            .debug_line                       0000000000070600 0000000000009C34  ------------------------------
  5. VMS_TRACE            .trace_abbrev                     000000000007A400 0000000000000357  ------------------------------
  6. VMS_TRACE            .trace_info                       000000000007A800 00000000000014C9  ------------------------------
  7. VMS_TRACE            .trace_aranges                    000000000007BE00 0000000000000560  ------------------------------
  8. PROGBITS             .comment                          000000000007C400 000000000000004A  ------------------------------
  9. NOTE                 .note                             000000000007C600 0000000000000190  ------------------------------
  10. NULL                 $LINKER RELOCATABLE_SYMBOL        0000000000000000 0000000000000000  ------------------------------
  11. STRTAB               .dynstr                           0000000000066670 0000000000000023  -A----------------------------
  12. SYMTAB               .symtab                           000000000007C800 00000000000001B0  ------------------------------
  13. VMS_SYMBOL_VECTOR    .vms_symbol_vector                0000000000064000 0000000000000098  -A----------------------------

Key for Flags: W (Write), A (Alloc), E (Execute), S (Strings), I (Info link), L (Link order), O (OS-specific processing),

               G (Group), Sho (Short), Nrc (No recovery code), Gbl (Global), Ovr (Overlaid), Shr (Shared), Vec (Vector),

               64b (Allocate 64bit address), Pro (Protected)

Analyze Image                                27-FEB-2018 19:05:56.45                                                   Page 4

SYS$COMMON:[SYSLIB]SECURESHRP.EXE;1

ANALYZ I01-55

The analysis uncovered NO errors.

**bleep**/IMAGE sys$library:secureshrp.exe

===================================

Thanks,

Bill.

Bill Pedersen
CCSS - Computer Consulting System Services, LLC