[Info-vax] %SYSTEM-F-ACCVIO in LIBOTS after several hours

Arne Vajhøj arne at vajhoej.dk
Tue Mar 8 19:57:08 EST 2022


On 3/8/2022 4:55 PM, Mark Daniel wrote:
> Reproducible after several hours of continuous execution.
> 
>> %SYSTEM-F-ACCVIO, access violation, reason mask=04, virtual 
>> address=0000000000039B00, PC=FFFFFFFF842341D0, PS=0000001B
>> %TRACE-F-TRACEBACK, symbolic stack dump follows
>> image     module    routine               line      rel PC           
>> abs PC
>> LIBOTS                                       0 00000000000121D0 
>> FFFFFFFF842341D0
>> DECC$SHR  C$TXDOPRINT  putbuf            43567 000000000000CA82 
>> FFFFFFFF84BC4FA2
>> DECC$SHR  C$TXDOPRINT  decc$$txdoprint   43658 000000000000CD62 
>> FFFFFFFF84BC5282
>> DECC$SHR  C$TXDOPRINT  sprintf           44192 0000000000012492 
>> FFFFFFFF84BCA9B2
>> HTTPDMON  HTTPDMON  TcpIpLookup          60709 00000000000109A2 
>> 00000000000409A2
>> HTTPDMON  HTTPDMON  AddRequest           60536 0000000000009A62 
>> 0000000000039A62
>> HTTPDMON  HTTPDMON  MonitorHttpd         58867 0000000000001392 
>> 0000000000031392
>> HTTPDMON  HTTPDMON  main                 58751 0000000000000962 
>> 0000000000030962

> Line 60790 is
> 
>>       3   60709             sprintf (ares[aCacheIdx], "[%s]", 
>> strerror(errno));

> The ACCVIO is related to the target, ares[aCacheIdx], or to the 
> argument, strerror(errno)), or...?

The access violation is trying to write to 39B00, so it has to be
ares[aCacheIdx].

And if ares is a valid array of char arrays, then every indication
is that aCacheIdx has a bad value.

Arne





More information about the Info-vax mailing list