[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference orarep::nomahs::sql_services

Title:SQL/Services Forum
Notice:kits(3) ft info(7) QAR access (8) SPR access (10)
Moderator:SQLSRV::MAVRIS
Created:Thu Oct 13 1988
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:2214
Total number of notes:8586

2171.0. "SQLSRV$.EXE bugchecks, Exception at 80761190 : S0 address" by NOMAHS::SECRIST (Rdb WWS; [email protected]) Wed Mar 19 1997 12:33

    
    	[sqs 6.1-02; rdb 6.1-04; vms v6.2-1h2 alpha]
    
    	Customer experiencing SQLSRV$.EXE bugchecks.  The RDSBUGCHKs
    	look like this:
    
    Saved PC = 80A443AC : S0 address
    Saved PC = 80A28B94 : S0 address
    Saved PC = 8079D084 : S0 address
    Saved PC = 80007164 : S0 address
    Saved PC = D66242BC : S1 address
    ***** Exception at 80761190 : S0 address
    Saved PC = 80007164 : S0 address
    Saved PC = D66242BC : S1 address
    ***** Exception at 808DEEB4 : S0 address
    Saved PC = 808DE3DC : S0 address
    Saved PC = 80761328 : S0 address
    ...
    ...
    
    	and the process dumps of SQLSRV$EXE.DMP look like this:
    
    ...
    Condition signalled to take dump:
    
    %SYSTEM-W-NOSUCHDEV, no such device available
    -SYSTEM-S-NORMAL, normal successful completion
    -CLI-W-VARITH, vector arithmetic fault, summary=00000001,
    mask=00000002, PC=0000
    0908, PS=00000000
    ...
    
    At times they said they've also experience quota problems and
    3146 errors out of Visual Basic.  I noticed that all of their
    MAX settings were very small over all and had them raise them.
    This app. is using a USERname associated with the classin
    use.  I also have dial-in access.  Any ideas ?
    
    Regards,
    rcs
    
T.RTitleUserPersonal
Name
DateLines
2171.1What kind of dump is this ?NOMAHS::SECRISTRdb WWS; [email protected]Wed Mar 19 1997 14:3576
    
    	The complete list of saved PCs gives no hint about what was
    	going on here.  Is this thing lost in the weeds ?  This was
    	generated by $ sea/match=or rds*.dmp* "exception","saved pc"
    
    Saved PC = 80A443AC : S0 address
    Saved PC = 80A28B94 : S0 address
    Saved PC = 8079D084 : S0 address
    Saved PC = 80007164 : S0 address
    Saved PC = D66242BC : S1 address
    ***** Exception at 80761190 : S0 address
    Saved PC = 80007164 : S0 address
    Saved PC = D66242BC : S1 address
    ***** Exception at 808DEEB4 : S0 address
    Saved PC = 808DE3DC : S0 address
    Saved PC = 80761328 : S0 address
    Saved PC = 807610F0 : S0 address
    Saved PC = 807602A8 : S0 address
    Saved PC = 8075FF70 : S0 address
    Saved PC = 8076099C : S0 address
    Saved PC = 80760298 : S0 address
    Saved PC = 8075FF70 : S0 address
    Saved PC = 8076099C : S0 address
    Saved PC = 80760298 : S0 address
    Saved PC = 8075FF70 : S0 address
    Saved PC = 80760298 : S0 address
    Saved PC = 8075FF70 : S0 address
    Saved PC = 8076099C : S0 address
    Saved PC = 8076054C : S0 address
    Saved PC = 8076054C : S0 address
    Saved PC = 807610DC : S0 address
    Saved PC = 06DE1E40 : symbol not found
    Saved PC = 8076F414 : S0 address
    Saved PC = 80A640BC : S0 address
    Saved PC = 8092B8B8 : S0 address
    Saved PC = 8092B5FC : S0 address
    Saved PC = 8092B438 : S0 address
    Saved PC = 8092C73C : S0 address
    Saved PC = 8092C860 : S0 address
    Saved PC = 800945A4 : S0 address
    Saved PC = 80095DAC : S0 address
    Saved PC = 806869C4 : S0 address
    Saved PC = 80685B5C : S0 address
    Saved PC = 008074C0 : Image RDB$SHARE + 0014B4C0
    Saved PC = 00797F94 : Image RDB$SHARE + 000DBF94
    Saved PC = 007EFE64 : Image RDB$SHARE + 00133E64
    Saved PC = 007E6EB0 : Image RDB$SHARE + 0012AEB0
    Saved PC = 007E661C : Image RDB$SHARE + 0012A61C
    Saved PC = 007E64FC : Image RDB$SHARE + 0012A4FC
    Saved PC = 007C0D80 : Image RDB$SHARE + 00104D80
    Saved PC = 80A77F6C : S0 address
    Saved PC = 00284F18 : Image RDBSHR + 00072F18
    Saved PC = 00274A88 : Image RDBSHR + 00062A88
    Saved PC = 80A6CBB8 : S0 address
    Saved PC = 003F68D0 : Image SQL$SHR + 000708D0
    Saved PC = 003F3110 : Image SQL$SHR + 0006D110
    Saved PC = 00461194 : Image SQL$SHR + 000DB194
    Saved PC = 003F4AFC : Image SQL$SHR + 0006EAFC
    Saved PC = 003F3364 : Image SQL$SHR + 0006D364
    Saved PC = 0046105C : Image SQL$SHR + 000DB05C
    Saved PC = 00460CAC : Image SQL$SHR + 000DACAC
    Saved PC = 003E5098 : Image SQL$SHR + 0005F098
    Saved PC = 001B8BDC : Image SQLSRV$MOD + 00048BDC
    Saved PC = 0004B554 : Image SQLSRV$EXE + 0003B554
    Saved PC = 00036E04 : Image SQLSRV$EXE + 00026E04
    Saved PC = 00034FB4 : Image SQLSRV$EXE + 00024FB4
    Saved PC = 00030D34 : Image SQLSRV$EXE + 00020D34
    Saved PC = 00030588 : Image SQLSRV$EXE + 00020588
    Saved PC = 00030080 : Image SQLSRV$EXE + 00020080
    Saved PC = 7EECE160 : P1 address
    
    
    
    	Regards,
    	rcs
    
2171.2Come out, come out wherever you are...BOUVS::OAKEYI'll take Clueless for $500, AlexWed Mar 19 1997 15:1013
>>    <<< Note 2171.1 by NOMAHS::SECRIST "Rdb WWS; [email protected]" >>>
>>                        -< What kind of dump is this ? >-

These are from the RDS bugcheck, right?

What was the exception and PC?

A real WAG is that it isn't lost in the weeds but in the generated code 
(remember from internals?).

Can you search the dump looking for these saved PCs and see if they show up 
in the gen'd code?
    
2171.3HOTRDB::PMEADPaul, [email protected], 719-577-8032Wed Mar 19 1997 15:557
My belief, (as is Norm's in the RDB_70 conference) is that RDMSHRP.EXE was
installed /RESIDENT.  When an image is installed /RESIDENT the executable
portions of the image reside in system address space.  The Rdb dumper used
to always dump those address as "S0 address" rather than looking up the
symbol.  This has been corrected (I hope) in Rdb7.  Rdb will no longer try
to be clever and display "S0 address" (or whatever) but instead will either
dump the symbol address, the image offset, or simply "Symbol not found".
2171.4Roger /resident + quota problem too...NOMAHS::SECRISTRdb WWS; [email protected]Thu Mar 20 1997 13:41138
    
    Guilty as charged !  The customer modified the "ADDX" 
    symbol in both RMONSTART.COM and SQL$STARTUP.COM to 
    install *everything* "/resident".  I will have them 
    put it back so things are maybe a little more readable.
    Would having everything resident make it any more likely
    to trash memory in user mode ?
    
    There are two types of dumps, the smaller ~98 block 
    one where it looks like memory got slammed (which
    has been copied to HOTRDB"":: and NOMAHS"":: as
    SMALL.DMP), and big, ~13K blocks dumps.  Although the 
    stack signatures are the same in all of them I hadn't
    really taken time to go over the big ones yesterday. 
    When I did in the "Contents of TROOT" underneath the 
    header dump I found:
    
    	%COSI-F-EXQUOTA, exceeded quota
    	-SYSTEM-F-EXQUOTA, process quota exceeded
    	Bugcheck retry count is 0, depth is 8
    
    Sure enough in the $GETJPI portion of the dump 
    PAGFILCNT = 0 in *all* of the dumps, including the 
    "small one".  I will go back and use an updated
    version of Steve's SHOW_PROCESS quota watching
    program from RDB_60 note 8.17 to see if I can
    catch anything in the act.
    
    Further info that Norm asked about and the $GETJPI
    portions follow:
    
    This occurred on a clustered Alpha 2100 4/275 running 
    VMS V6.2-1H2 (plus all patches from latest V6.2 
    bulletin but ALPRMS0162, which has been ordered), 
    Rdb V6.1-04, and SQS V6.1-02. 
    
    ***** Exception at 80761190 : S0 address
    %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual 
    address=00000014,  PC=80761190, PS=0000000B
    
    ***** Exception at 808DEEB4 : S0 address
    %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual
    address=00000014, PC=80761190, PS=0000000B
    
    
    [RDSBUGCHK.DMP_SAV2_SMW;1]
    ...
    ================================================================================
              Process Activated Images
    ================================================================================
    
      Start     End                  Image Name  Major ID,Minor ID
    --------  -------- 
    ----------------------------------------------------
    00010000  000705FF  SQLSRV$EXE                               0,0
    00072000  000F4138  SQLSRV$PRVSHR                            1,0
    8DA909A0  8DA9E4D0  SYS$BASE_IMAGE                           69,8197348
    7F37C000  7F3DDFFF  DECC$SHR                                 1,1
    7F0EC000  7F24DFFF  DPML$SHR                                 1,0
    7F0AC000  7F0DDFFF  CMA$TIS_SHR                              1,1
    7F00C000  7F05DFFF  LIBRTL                                   1,1
    7F06C000  7F09DFFF  LIBOTS                                   1,3
    8DA82AF8  8DA840E8  SYS$PUBLIC_VECTORS                       69,8183133
    00170000  002105FF  SQLSRV$MOD                               0,0
    00314000  003845FF  SQL$INT                                  0,71
    00212000  00313DFF  RDBSHR                                   3,2
    00386000  005FCFFF  SQL$SHR                                  0,0
    0063A000  006AA3FF  NCSSHR                                   16,7637828
    7F4AC000  7F4EDFFF  LBRSHR                                   2,9
    005FE000  006380D0  DTI$SHARE                                1,2
    006BC000  008BE1FF  RDB$SHARE                                0,0
    008C0000  00952068  RDB$COSIP                                3,2
    7F45C000  7F49DFFF  SECURESHR                                1,3
    7F3EC000  7F44DFFF  SECURESHRP                               1,3
    00984000  00A045FF  RDMSHR                                   0,0
    00ADA000  0106F2B0  RDMSHRP                                  0,70
    00A06000  00AD85B0  EPC$SHR                                  0,0
    01070000  010769FF  SHRIMGMSG                                0,0
    01078000  010793FF  DECC$MSG                                 0,0
    0107A000  0107E5FF  SQLSRV$MSG                               0,0
    01080000  010AB5FF  SQL$MSG                                  0,0
    010AC000  010B1DFF  COSI$MSG                                 0,0
    010B2000  010B4BFF  RDBMSGS                                  0,0
    010B6000  010B71FF  CXXL$MSG_SHR                             0,0
    010B8000  010CA9FF  RDMSMSG                                  0,0
    
    Total images = 31      Pageletes Allocated = 39592
    ...
    ================================================================================
              GETJPI Information (JPI$_)
    ================================================================================
    
    ACCOUNT = "        "      APTCNT = 0.               ASTACT = 0.
    ASTCNT = 5833.            ASTEN = 15.               ASTLM = 5835.
    AUTHPRI = 4.              AUTHPRIV = 00000000:00108000
    AUTHPRIV = (NETMBX,TMPMBX,)                         BIOCNT = 7000.
    BIOLM = 7000.             BUFIO = 7238.             BYTCNT = 517762.
    BYTLM = 517762.           CLINAME = "DCL"           CPULIM = 0.
    CPUTIM = 15712.           CREPRC_FLAGS = 00000240   CURPRIV =
    00000000:00108000
    CURPRIV = (NETMBX,TMPMBX,)                          DFPFC = 64.
    DFWSCNT = 5440.           DIOCNT = 7000.            DIOLM = 7000.
    DIRIO = 15602.            EFCS = F1000080           EFCU = 80000000
    EFWM = FDFFFFFF           ENQCNT = 17227.           ENQLM = 18000.
    EXCVEC = 7FFF0048         FILCNT = 1927.            FILLM = 2000.
    FINALEXC = 7FFF0158       FREP0VA = 06E8E000        FREP1VA = 7ED82000
    FREPTECNT = 3930032.      GPGCNT = 4656.            GRP = 000600
    IMAGECOUNT = 22.
    IMAGNAME = "$1$DIA0:[SYS0.SYSCOMMON.][SYSEXE]SQLSRV$EXE.EXE"
    IMAGPRIV = 00000000:00000000                        IMAGPRIV = ()
    JOBPRCCNT = 0.            JOBTYPE = 0.
    LOGINTIM = 13-MAR-1997 01:15:15.97                  MASTER_PID =
    2020340A
    MAXDETACH = 0.            MAXJOBS = 0.              MEM = 132526
    MODE = 0.                 MSGMASK = 0000000F        OWNER = 0.
    PAGEFLTS = 13319.         PAGFILCNT = 0.            PAGFILLOC =
    03000000           <== 0 !
    PGFLQUOTA = 200000.       PHDFLAGS = 00000084       PID = 2020340A
    PPGCNT = 198208.          PRCCNT = 0.               PRCLM = 10.
    PRCNAM = "SS_SOC_REA_000F"                          PRI = 4.
    PRIB = 4.                 PROC_INDEX = 1247.        PROCPRIV =
    00000000:00108000
    PROCPRIV = (NETMBX,TMPMBX,)                         SHRFILLM = 0.
    SITESPEC = 00000000       STATE = 0000000E
    STS = 00140001 (LOGIN,PHDRES,RES,)                  SWPFILLOC =
    00000000
    TABLENAME = "$1$DIA0:[SYS0.][SYSLIB]DCLTABLES"      TERMINAL =
    "MBA2916:"
    TMBU = 2884.              TQCNT = 599.              TQLM = 600.
    UAF_FLAGS = 00000000      UIC = [600,132526]        USERNAME = "ACS_SRV    
    "
    VIRTPEAK = 264272.        VOLUMES = 0.              WSAUTH = 10880.
    WSAUTHEXT = 1048576.      WSEXTENT = 1048576.       WSPEAK = 202864.
    WSQUOTA = 10880.          WSSIZE = 1048576.
    
    Thanks y'all !
    rcs