HPE GreenLake Administration
- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Access Violation
Operating System - OpenVMS
1828000
Members
3163
Online
109973
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-17-2004 02:00 AM
11-17-2004 02:00 AM
Access Violation
Hi All,
Can anybody help on what the below error can
mean ?
Executing RMU for DEC Rdb V5.1-1
%SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=42441430, PC=00030A1C, PS=0000001B
%TRACE-F-TRACEBACK, symbolic stack dump follows
Image Name Module Name Routine Name Line Number rel PC abs PC
DAS_D11 DAS_D11_3_PRO_B d11_3_pro_BEIS_ 8062 0000017C 00030A1C
DAS_D11 DAS_D11_1_MAIN main 4701 00000194 00030194
DAS_D11 DAS_D11_1_MAIN __main 0 00000098 00030098
0 A273E170 A273E170
DAS job terminated at
Thanx
Can anybody help on what the below error can
mean ?
Executing RMU for DEC Rdb V5.1-1
%SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=42441430, PC=00030A1C, PS=0000001B
%TRACE-F-TRACEBACK, symbolic stack dump follows
Image Name Module Name Routine Name Line Number rel PC abs PC
DAS_D11 DAS_D11_3_PRO_B d11_3_pro_BEIS_ 8062 0000017C 00030A1C
DAS_D11 DAS_D11_1_MAIN main 4701 00000194 00030194
DAS_D11 DAS_D11_1_MAIN __main 0 00000098 00030098
0 A273E170 A273E170
DAS job terminated at
Thanx
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-17-2004 02:17 AM
11-17-2004 02:17 AM
Re: Access Violation
It meand that the program managed to move (ascii) data into a location where an address was expected:
$ x="abcd"
$ x[0,32]=%x42441430
$ show symb x
X = "0.DB"
Maybe you recognize that short piece of string? The $x14 in the middle is 'control-t' or could be a byte count of 20 perhaps?
With help of the program source for the reported line number you should be able to drill down.
If you can reproduce, then maybe you can run with the debugger. First step would be a breakpoint on the offending line and look around. Next step might be a SET WATCH on the location holding the addres (stack variable or static variable?)?
An other debug technique might be to "SET BREA/EXCEP" to trap it when it breaks and use the debugger to brute-force look for the rest of the string.
Good luck!
Hein.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-17-2004 05:14 AM
11-17-2004 05:14 AM
Re: Access Violation
In addition to Hein's explanations and suggestions, you could also do s SET PROC/DUMP before running that failing image. This would create a process-dump (image-name.DMP in the current default directory) and you can then analyse that dump:
$ ANAL/PROC/IMAGE= image-name.DMP
this will get you into the debugger on the 'static' contents of the process virtual memory at the time of the ACCVIO.
Start with:
DBG> EXA/INS @PC
and then look around, where the 'bad value' or bad adress was coming from.
Volker.
$ ANAL/PROC/IMAGE=
this will get you into the debugger on the 'static' contents of the process virtual memory at the time of the ACCVIO.
Start with:
DBG> EXA/INS @PC
and then look around, where the 'bad value' or bad adress was coming from.
Volker.
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Support
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP