Title: | SQL/Services Forum |
Notice: | kits(3) ft info(7) QAR access (8) SPR access (10) |
Moderator: | SQLSRV::MAVRIS |
Created: | Thu Oct 13 1988 |
Last Modified: | Fri Jun 06 1997 |
Last Successful Update: | Fri Jun 06 1997 |
Number of topics: | 2214 |
Total number of notes: | 8586 |
[sqs 6.1-02; rdb 6.1-04; vms v6.2-1h2 alpha] Customer experiencing SQLSRV$.EXE bugchecks. The RDSBUGCHKs look like this: Saved PC = 80A443AC : S0 address Saved PC = 80A28B94 : S0 address Saved PC = 8079D084 : S0 address Saved PC = 80007164 : S0 address Saved PC = D66242BC : S1 address ***** Exception at 80761190 : S0 address Saved PC = 80007164 : S0 address Saved PC = D66242BC : S1 address ***** Exception at 808DEEB4 : S0 address Saved PC = 808DE3DC : S0 address Saved PC = 80761328 : S0 address ... ... and the process dumps of SQLSRV$EXE.DMP look like this: ... Condition signalled to take dump: %SYSTEM-W-NOSUCHDEV, no such device available -SYSTEM-S-NORMAL, normal successful completion -CLI-W-VARITH, vector arithmetic fault, summary=00000001, mask=00000002, PC=0000 0908, PS=00000000 ... At times they said they've also experience quota problems and 3146 errors out of Visual Basic. I noticed that all of their MAX settings were very small over all and had them raise them. This app. is using a USERname associated with the classin use. I also have dial-in access. Any ideas ? Regards, rcs
T.R | Title | User | Personal Name | Date | Lines |
---|---|---|---|---|---|
2171.1 | What kind of dump is this ? | NOMAHS::SECRIST | Rdb WWS; [email protected] | Wed Mar 19 1997 14:35 | 76 |
The complete list of saved PCs gives no hint about what was going on here. Is this thing lost in the weeds ? This was generated by $ sea/match=or rds*.dmp* "exception","saved pc" Saved PC = 80A443AC : S0 address Saved PC = 80A28B94 : S0 address Saved PC = 8079D084 : S0 address Saved PC = 80007164 : S0 address Saved PC = D66242BC : S1 address ***** Exception at 80761190 : S0 address Saved PC = 80007164 : S0 address Saved PC = D66242BC : S1 address ***** Exception at 808DEEB4 : S0 address Saved PC = 808DE3DC : S0 address Saved PC = 80761328 : S0 address Saved PC = 807610F0 : S0 address Saved PC = 807602A8 : S0 address Saved PC = 8075FF70 : S0 address Saved PC = 8076099C : S0 address Saved PC = 80760298 : S0 address Saved PC = 8075FF70 : S0 address Saved PC = 8076099C : S0 address Saved PC = 80760298 : S0 address Saved PC = 8075FF70 : S0 address Saved PC = 80760298 : S0 address Saved PC = 8075FF70 : S0 address Saved PC = 8076099C : S0 address Saved PC = 8076054C : S0 address Saved PC = 8076054C : S0 address Saved PC = 807610DC : S0 address Saved PC = 06DE1E40 : symbol not found Saved PC = 8076F414 : S0 address Saved PC = 80A640BC : S0 address Saved PC = 8092B8B8 : S0 address Saved PC = 8092B5FC : S0 address Saved PC = 8092B438 : S0 address Saved PC = 8092C73C : S0 address Saved PC = 8092C860 : S0 address Saved PC = 800945A4 : S0 address Saved PC = 80095DAC : S0 address Saved PC = 806869C4 : S0 address Saved PC = 80685B5C : S0 address Saved PC = 008074C0 : Image RDB$SHARE + 0014B4C0 Saved PC = 00797F94 : Image RDB$SHARE + 000DBF94 Saved PC = 007EFE64 : Image RDB$SHARE + 00133E64 Saved PC = 007E6EB0 : Image RDB$SHARE + 0012AEB0 Saved PC = 007E661C : Image RDB$SHARE + 0012A61C Saved PC = 007E64FC : Image RDB$SHARE + 0012A4FC Saved PC = 007C0D80 : Image RDB$SHARE + 00104D80 Saved PC = 80A77F6C : S0 address Saved PC = 00284F18 : Image RDBSHR + 00072F18 Saved PC = 00274A88 : Image RDBSHR + 00062A88 Saved PC = 80A6CBB8 : S0 address Saved PC = 003F68D0 : Image SQL$SHR + 000708D0 Saved PC = 003F3110 : Image SQL$SHR + 0006D110 Saved PC = 00461194 : Image SQL$SHR + 000DB194 Saved PC = 003F4AFC : Image SQL$SHR + 0006EAFC Saved PC = 003F3364 : Image SQL$SHR + 0006D364 Saved PC = 0046105C : Image SQL$SHR + 000DB05C Saved PC = 00460CAC : Image SQL$SHR + 000DACAC Saved PC = 003E5098 : Image SQL$SHR + 0005F098 Saved PC = 001B8BDC : Image SQLSRV$MOD + 00048BDC Saved PC = 0004B554 : Image SQLSRV$EXE + 0003B554 Saved PC = 00036E04 : Image SQLSRV$EXE + 00026E04 Saved PC = 00034FB4 : Image SQLSRV$EXE + 00024FB4 Saved PC = 00030D34 : Image SQLSRV$EXE + 00020D34 Saved PC = 00030588 : Image SQLSRV$EXE + 00020588 Saved PC = 00030080 : Image SQLSRV$EXE + 00020080 Saved PC = 7EECE160 : P1 address Regards, rcs | |||||
2171.2 | Come out, come out wherever you are... | BOUVS::OAKEY | I'll take Clueless for $500, Alex | Wed Mar 19 1997 15:10 | 13 |
>> <<< Note 2171.1 by NOMAHS::SECRIST "Rdb WWS; [email protected]" >>> >> -< What kind of dump is this ? >- These are from the RDS bugcheck, right? What was the exception and PC? A real WAG is that it isn't lost in the weeds but in the generated code (remember from internals?). Can you search the dump looking for these saved PCs and see if they show up in the gen'd code? | |||||
2171.3 | HOTRDB::PMEAD | Paul, [email protected], 719-577-8032 | Wed Mar 19 1997 15:55 | 7 | |
My belief, (as is Norm's in the RDB_70 conference) is that RDMSHRP.EXE was installed /RESIDENT. When an image is installed /RESIDENT the executable portions of the image reside in system address space. The Rdb dumper used to always dump those address as "S0 address" rather than looking up the symbol. This has been corrected (I hope) in Rdb7. Rdb will no longer try to be clever and display "S0 address" (or whatever) but instead will either dump the symbol address, the image offset, or simply "Symbol not found". | |||||
2171.4 | Roger /resident + quota problem too... | NOMAHS::SECRIST | Rdb WWS; [email protected] | Thu Mar 20 1997 13:41 | 138 |
Guilty as charged ! The customer modified the "ADDX" symbol in both RMONSTART.COM and SQL$STARTUP.COM to install *everything* "/resident". I will have them put it back so things are maybe a little more readable. Would having everything resident make it any more likely to trash memory in user mode ? There are two types of dumps, the smaller ~98 block one where it looks like memory got slammed (which has been copied to HOTRDB"":: and NOMAHS"":: as SMALL.DMP), and big, ~13K blocks dumps. Although the stack signatures are the same in all of them I hadn't really taken time to go over the big ones yesterday. When I did in the "Contents of TROOT" underneath the header dump I found: %COSI-F-EXQUOTA, exceeded quota -SYSTEM-F-EXQUOTA, process quota exceeded Bugcheck retry count is 0, depth is 8 Sure enough in the $GETJPI portion of the dump PAGFILCNT = 0 in *all* of the dumps, including the "small one". I will go back and use an updated version of Steve's SHOW_PROCESS quota watching program from RDB_60 note 8.17 to see if I can catch anything in the act. Further info that Norm asked about and the $GETJPI portions follow: This occurred on a clustered Alpha 2100 4/275 running VMS V6.2-1H2 (plus all patches from latest V6.2 bulletin but ALPRMS0162, which has been ordered), Rdb V6.1-04, and SQS V6.1-02. ***** Exception at 80761190 : S0 address %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=00000014, PC=80761190, PS=0000000B ***** Exception at 808DEEB4 : S0 address %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=00000014, PC=80761190, PS=0000000B [RDSBUGCHK.DMP_SAV2_SMW;1] ... ================================================================================ Process Activated Images ================================================================================ Start End Image Name Major ID,Minor ID -------- -------- ---------------------------------------------------- 00010000 000705FF SQLSRV$EXE 0,0 00072000 000F4138 SQLSRV$PRVSHR 1,0 8DA909A0 8DA9E4D0 SYS$BASE_IMAGE 69,8197348 7F37C000 7F3DDFFF DECC$SHR 1,1 7F0EC000 7F24DFFF DPML$SHR 1,0 7F0AC000 7F0DDFFF CMA$TIS_SHR 1,1 7F00C000 7F05DFFF LIBRTL 1,1 7F06C000 7F09DFFF LIBOTS 1,3 8DA82AF8 8DA840E8 SYS$PUBLIC_VECTORS 69,8183133 00170000 002105FF SQLSRV$MOD 0,0 00314000 003845FF SQL$INT 0,71 00212000 00313DFF RDBSHR 3,2 00386000 005FCFFF SQL$SHR 0,0 0063A000 006AA3FF NCSSHR 16,7637828 7F4AC000 7F4EDFFF LBRSHR 2,9 005FE000 006380D0 DTI$SHARE 1,2 006BC000 008BE1FF RDB$SHARE 0,0 008C0000 00952068 RDB$COSIP 3,2 7F45C000 7F49DFFF SECURESHR 1,3 7F3EC000 7F44DFFF SECURESHRP 1,3 00984000 00A045FF RDMSHR 0,0 00ADA000 0106F2B0 RDMSHRP 0,70 00A06000 00AD85B0 EPC$SHR 0,0 01070000 010769FF SHRIMGMSG 0,0 01078000 010793FF DECC$MSG 0,0 0107A000 0107E5FF SQLSRV$MSG 0,0 01080000 010AB5FF SQL$MSG 0,0 010AC000 010B1DFF COSI$MSG 0,0 010B2000 010B4BFF RDBMSGS 0,0 010B6000 010B71FF CXXL$MSG_SHR 0,0 010B8000 010CA9FF RDMSMSG 0,0 Total images = 31 Pageletes Allocated = 39592 ... ================================================================================ GETJPI Information (JPI$_) ================================================================================ ACCOUNT = " " APTCNT = 0. ASTACT = 0. ASTCNT = 5833. ASTEN = 15. ASTLM = 5835. AUTHPRI = 4. AUTHPRIV = 00000000:00108000 AUTHPRIV = (NETMBX,TMPMBX,) BIOCNT = 7000. BIOLM = 7000. BUFIO = 7238. BYTCNT = 517762. BYTLM = 517762. CLINAME = "DCL" CPULIM = 0. CPUTIM = 15712. CREPRC_FLAGS = 00000240 CURPRIV = 00000000:00108000 CURPRIV = (NETMBX,TMPMBX,) DFPFC = 64. DFWSCNT = 5440. DIOCNT = 7000. DIOLM = 7000. DIRIO = 15602. EFCS = F1000080 EFCU = 80000000 EFWM = FDFFFFFF ENQCNT = 17227. ENQLM = 18000. EXCVEC = 7FFF0048 FILCNT = 1927. FILLM = 2000. FINALEXC = 7FFF0158 FREP0VA = 06E8E000 FREP1VA = 7ED82000 FREPTECNT = 3930032. GPGCNT = 4656. GRP = 000600 IMAGECOUNT = 22. IMAGNAME = "$1$DIA0:[SYS0.SYSCOMMON.][SYSEXE]SQLSRV$EXE.EXE" IMAGPRIV = 00000000:00000000 IMAGPRIV = () JOBPRCCNT = 0. JOBTYPE = 0. LOGINTIM = 13-MAR-1997 01:15:15.97 MASTER_PID = 2020340A MAXDETACH = 0. MAXJOBS = 0. MEM = 132526 MODE = 0. MSGMASK = 0000000F OWNER = 0. PAGEFLTS = 13319. PAGFILCNT = 0. PAGFILLOC = 03000000 <== 0 ! PGFLQUOTA = 200000. PHDFLAGS = 00000084 PID = 2020340A PPGCNT = 198208. PRCCNT = 0. PRCLM = 10. PRCNAM = "SS_SOC_REA_000F" PRI = 4. PRIB = 4. PROC_INDEX = 1247. PROCPRIV = 00000000:00108000 PROCPRIV = (NETMBX,TMPMBX,) SHRFILLM = 0. SITESPEC = 00000000 STATE = 0000000E STS = 00140001 (LOGIN,PHDRES,RES,) SWPFILLOC = 00000000 TABLENAME = "$1$DIA0:[SYS0.][SYSLIB]DCLTABLES" TERMINAL = "MBA2916:" TMBU = 2884. TQCNT = 599. TQLM = 600. UAF_FLAGS = 00000000 UIC = [600,132526] USERNAME = "ACS_SRV " VIRTPEAK = 264272. VOLUMES = 0. WSAUTH = 10880. WSAUTHEXT = 1048576. WSEXTENT = 1048576. WSPEAK = 202864. WSQUOTA = 10880. WSSIZE = 1048576. Thanks y'all ! rcs |