External Exception C0000006 on Windows 2000 Metaframe.

Posted on 2001-07-25
Last Modified: 2010-02-16
I am reposting this question, because I didn't get much response the first time it was posted.

We have been experiencing these errors for months now.  We can go weeks even months without getting one, then all of a sudden, bam, one of our delphi apps raises this error.  Then all delphi apps on that Win2000 Metaframe begin getting that error.  It is frustrating.  The only way to temporarily fix it, is to get everyone out of the app at the same time and then back in.  It will go away.  It is almost like memory is getting corrupt and cannot be read.  It gives me the feeling that Delphi 5 isn't compatible with Citrix Metaframe.

Anyone have any ideas?  We are using Delphi 5, all apps use DevExpress MemTables, ACE 400 and we use Report Builder as the reporting tool.

Thanks in advance.

Iowa Glass Depot.

P.S.  Hey Epsylon, it is ok if you try to answer this by pointing me somewhere else... lol..  Congrats on the 300k barrier.
Question by:rwhitaker
LVL 20

Expert Comment

ID: 6318246
$C0000006 is defined in winNT.h like this:

#define STATUS_IN_PAGE_ERROR             ((DWORD   )0xC0000006L)    

So it is a "in page error". On this page:

this error is mapped to ERROR_SWAPERROR. This error again occurs on this site:

where it sais: "Error accessing paging file.".

On this page:

ERROR_SWAPERROR is translated as "Error performing inpage operation.".

Does that help a bit? I guess not...  :-(

Regards, Madshi.
LVL 27

Expert Comment

ID: 6318320
did i have a deja vu,
i would bet i have seen this q already

Author Comment

ID: 6318927

Author Comment

ID: 6319027
you are correct sir.... lol

Author Comment

ID: 6319047
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.


Expert Comment

ID: 6319358
Hey, that is as far as I got with the first post of this question. Hey Madshi, I thought you'd have nailed this by now, lol.

Suddenly, as I see Madshi without an answer I feel so small and vulnerable in a big scary world....

Author Comment

ID: 6319386
Yeah I thought Madshi or Epsylon would have laughed at this one.  lol
LVL 20

Expert Comment

ID: 6319598
Hah, guys...  :-))

Expert Comment

ID: 6908078
ADMINISTRATION WILL BE CONTACTING YOU SHORTLY.  Moderators Computer101 or Netminder will return to finalize these if still open in seven days.  Please post closing recommendations before that time.

Question(s) below appears to have been abandoned. Your options are:
1. Accept a Comment As Answer (use the button next to the Expert's name).
2. Close the question if the information was not useful to you, but may help others. You must tell the participants why you wish to do this, and allow for Expert response.  This choice will include a refund to you, and will move this question to our PAQ (Previously Asked Question) database.  If you found information outside this question thread, please add it.
3. Ask Community Support to help split points between participating experts, or just comment here with details and we'll respond with the process.
4. Delete the question (if it has no potential value for others).
   --> Post comments for expert of your intention to delete and why
   --> You cannot delete a question with comments, special handling by a Moderator is required.

For special handling needs, please post a zero point question in the link below and include the URL (question QID/link) that it regards with details.
Please click the Help Desk link on the left for Member Guidelines, Member Agreement and the Question/Answer process for further information, if needed.

Click you Member Profile to view your question history and keep them all current with updates as the collaboration effort continues, to track all your open and locked questions at this site.  If you are an EE Pro user, use the Power Search option to find them.  Anytime you have questions which are LOCKED with a Proposed Answer but does not serve your needs, please reject it and add comments as to why.  In addition, when you do grade the question, if the grade is less than an A, please add a comment as to why.  This helps all involved, as well as future persons who may access this item in the future to seek help.

To view your open questions, please click the following link(s) and keep them all current with updates.

------------>  EXPERTS:  Please leave any comments regarding your closing recommendations if this item remains inactive another seven (7) days.  Also, if you are interested in the cleanup effort, please click this link

Moderators will finalize this question if still open in 7 days, by either moving this to the PAQ (Previously Asked Questions) at zero points, deleting it or awarding expert(s) when recommendations are made, or an independent determination can be made.  Expert input is always appreciated to determine the fair outcome.
Thank you everyone.
Moderator @ Experts Exchange
LVL 26

Expert Comment

by:Russell Libby
ID: 8733733
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

To be PAQ/Refund

Please leave any comments here within the next seven days.
Thank you,

EE Cleanup Volunteer

Accepted Solution

RotaredoM earned 0 total points
ID: 8822493
Finalized as recommended.

Question PAQed and 300 points refunded.

CS Mod @ EE

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Internet Business Fax to Email Made Easy - With  eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now