[Info-vax] calloc fails with access violation

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Tue Aug 25 18:33:14 EDT 2009


In article <a42em6-202.ln1 at SendSpamHere.ORG>, Jim Duff <spam.this at 127.0.0.1> writes:
>Jose Cuevas wrote:
>> On Aug 24, 1:45 pm, VAXman-  @SendSpamHere.ORG wrote:
>>> In article <aecec9c9-3fe0-4b76-b37a-c5cd9ebf5... at a13g2000yqc.googlegroups.com>, Jose Cuevas <jcue... at mac.com> writes:
>>>
>>>
>>>
>>>
>>>
>>>> 1. We have a problem with a fairly simple library written in C that
>>>> gets called from Cobol.
>>>> The C library is used to PUSH data generated by the Cobol application
>>>> over HTTP POST using sockets.
>>>> We are getting an access violation (a crash) on calls to calloc() of
>>>> insignificant size. While at first we thought it was on a particular
>>>> record we then found that it is a far more inconsistent.
>>>> The C code runs fine when tested on a unix machine.
>>>> 2. Unrelated question: if we send a variable from a record structure
>>>> to a C function we get an access violation. So far the only workaround
>>>> we found is to move variables to one defined at the working-storage.
>>>> Any ideas on how to use record variables as parameters for C
>>>> functions?
>>> Don't post a snippet of the code which you are questioning -- hint,
>>> hint.  
>
>Perhaps you should be a little more explicit, Brian.  Perhaps asking for
>a snippet of code that *actually demonstrates the problem* (unlike the
>code that's posted below) would be a good idea ;-)

Well, I suppose I need to be little less terse at times. ;)

He's been asked to supply the stack dump too.  Maybe that request was
too terse as well.

How's life back down-under?

-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

  http://www.quirkfactory.com/popart/asskey/eqn2.png
  
  "Well my son, life is like a beanstalk, isn't it?"



More information about the Info-vax mailing list