[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference orarep::nomahs::rdb_60

Title:Oracle Rdb - Still a strategic database for DEC on Alpha AXP!
Notice:RDB_60 is archived, please use RDB_70..
Moderator:NOVA::SMITHISON
Created:Fri Mar 18 1994
Last Modified:Fri May 30 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:5118
Total number of notes:28246

5095.0. "Bugcheck @ RDMS$$EXE_OPEN" by M5::LSMITH () Mon Mar 03 1997 13:11

Rdb V6.0-15 OpenVMS VAX V6.2 (clustered with 5 other nodes - 4 VAX and 1 Alpha)

Customer would like to know what Rdb was doing at the time of the bugcheck, and
if the VAX crashing is related to the Rdb problem.

Two exceptions:
1st in bugcheck output file = Exception at 0288CFEE : RDMS$$EXE_CLOSE + 0000002E
%COSI-F-BUGCHECK, internal consistency failure

2nd in bugcheck output file = Exception at 0288DED3 : RDMS$$EXE_OPEN + 00000077
%COSI-F-BUGCHECK, internal consistency failure

Background:
Customer stated that due to some type of a hardware problem, about 100 
offices lost connectivity to the VAX.  About 30 minutes later, the VAX 
crashed.  THE SYSTEM MANAGER STATED THAT THE VAX CRASH DUMP INDICATED THAT 
THE RDB PROCESSES WERE UNABLE TO RESOLVE THEIR LOCKS (not yelling, just 
highlighting).  Before the VAX crashed, several rdsbugchk.dmp files were
generated.  Unfortunately, all of the .dmp files were deleted except the first.
The DBA was monitoring the cluster, and to the best of her knowledge, no DBRs
were started until after the VAX crashed.  I can have her check the monitor log
files if needed. The customer is not sure how the users connect to the
database.  She believes a frontend product called CORVISION is used. 

This is the same customer that is seeing periodic bugcheck dumps with two 
exceptions:  RDMS$$EXE_CLOSE + 5C and COSI_MEM_GET_VM + A7C.  This is 
referenced in NOTE# 5048.

For this bugcheck, I know it is the RDMS$$EXE_OPEN exception that is the 
"root" of the problem.  From the bugcheck output it looks like the exception 
occurred while in RDMSHRP60.  The RDMS$$EXE_OPEN symbol is defined by 
RDMS$EXE and is referenced by RDMS$CONSTR & RDMS$DDLPREEXE.  The only other
image of concern might be SQL$SHR.

From the info in STARS, it looks like increasing LOCKIDTBL might help?

Thanks,
Lisa

================================================================================
          Bugcheck dump $1$DUA103:[BUGCHECK]RDSBUGCHK.DMP;1
================================================================================
Unknown VAX, SID=17000201

Current time is 27-FEB-1997 10:57:13.27

22-JUL-1996 10:51:52.05: Linked RDMSHRP60 (RDBVMS_BUILD) RDMS$VAX_V06015:[SOURC
11-JUL-1996 11:29:44.09: Compiled KOD$LIBRARY (KODA) KOD$VAX_V06015:[CODE]

================================================================================
          Stack Dump
================================================================================

-----------------------------------------------------------------------------

R0  = 029EBE08: 00000000 00010000 00000000 00000CC0 00010001 00000000 00185003
R1  = 80FAE000: 80FAE000 00000000 80FAFE00 1B000200 026A0364 0018F400 90B5F440
R2  = 00000001
R3  = 02BD9AFC: 45484347 55425B3A 33303141 55442431 24203A6B 63656863 6775423F
R4  = 02A26DE4: 2FFC0000 0288E63E 00000000 00000005 02D4D028 031E16E8 00002710
R5  = 02832E00: 00000000 00000000 00000000 00000000 00000000 00000000 000049C8
R6  = 00000001
R7  = 031C89D0: 00000000 00000000 00000000 00000000 00000000 00000000 026C4141
R8  = 031E1758: 48010045 009B0825 6A248B5E 00020000 01480001 00000000 00000017
R9  = 02A11DB0: 00000000 00000000 00000000 00000000 00000000 00000414 00000001
R10 = 02A26A04: 02A26A70 02A26A90 00000000 00000000 02A2791C 02A27920 00000000
R11 = 00000000
AP  = 02A263F4: 00000001 029CCDDE 02A26680 02A266A8 203C0000 00000000 00000000
SP  = 02A263C4: 00000000 00000000 029D953A 02A263F8 02A2641C 20000000 00000000
FP  = 02A263E0: 00000000 00000000 029D953A 02A263F8 02A2641C 20000000 00000000

ARG# Argument [data...] -----------------------------------------------------
   1 02A26A4C: 000001FD 02DB1E18 02A7CA00 01400008 0288CFEE 00000414 00000003
        Handler = 029CD308, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 02A269F4, Saved FP = 02A269B8, PC Opcode = FB
SR2 = 00000000
SR3 = 031E1758: 48010045 009B0825 6A248B5E 00020000 01480001 00000000 00000017
SR4 = 02A26DE4: 2FFC0000 0288E63E 00000000 00000005 02D4D028 031E16E8 00002710
SR5 = 00000000
SR6 = 00000000
        784 bytes of stack data from 02A266A8 to 02A269B8:
.
.
.

***** Exception at 0288CFEE : RDMS$$EXE_CLOSE + 0000002E
%COSI-F-BUGCHECK, internal consistency failure

        Handler = 00000000, PSW = 0000, CALLS = 0, STACKOFFS = 0
        Saved AP = 02A26A90, Saved FP = 02A26A70, PC Opcode = 05
        76 bytes of stack data from 02A26A24 to 02A26A70:
.
.
.

***** Exception at 0288DED3 : RDMS$$EXE_OPEN + 00000077
%COSI-F-BUGCHECK, internal consistency failure

        Handler = 00000000, PSW = 0000, CALLS = 0, STACKOFFS = 0
        Saved AP = 02A26C90, Saved FP = 02A26C54, PC Opcode = 05
        316 bytes of stack data from 02A26B18 to 02A26C54:

Saved PC = 80000014 : S0 address
ARG# Argument [data...] -----------------------------------------------------
   1 031E1758: 48010045 009B0825 6A248B5E 00020000 01480001 00000000 00000017
        Handler = 00000000, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 02A26DD8, Saved FP = 02A26D9C, PC Opcode = 31

Saved PC = 0288DF8F : RDMS$$EXE_OPEN + 00000133
ARG# Argument [data...] -----------------------------------------------------
   1 031E1748: 01480001 00000000 00000017 00000000 80BD8348 031E1758 000C9191
        Handler = 00000000, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 02A26E34, Saved FP = 02A26DF8, PC Opcode = 88

Saved PC = 0288E579 : RDMS$$EXE_OPEN + 0000071D
ARG# Argument [data...] -----------------------------------------------------
   1 031E16E8: 031E1BD8 031E1748 00000000 03253828 03253828 00000000 003E9B9B
        Handler = 0288E63E, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 02A26F7C, Saved FP = 02A26F40, PC Opcode = D0

Saved PC = 0288E444 : RDMS$$EXE_OPEN + 000005E8
ARG# Argument [data...] -----------------------------------------------------
   1 031E16E8: 031E1BD8 031E1748 00000000 03253828 03253828 00000000 003E9B9B
        Handler = 00000000, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 02A270C4, Saved FP = 02A27088, PC Opcode = 31

Saved PC = 0288DF8F : RDMS$$EXE_OPEN + 00000133
ARG# Argument [data...] -----------------------------------------------------
   1 031E16B8: 02E910A0 00000000 00000000 031E1B78 031E16E8 031E1BE8 00309494
        Handler = 00000000, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 02A2720C, Saved FP = 02A271D0, PC Opcode = 31

Saved PC = 0288DF8F : RDMS$$EXE_OPEN + 00000133
ARG# Argument [data...] -----------------------------------------------------
   1 031E1728: 00000000 00000000 00000000 00000000 00000000 031E16B8 001C9A9A
        Handler = 00000000, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 02A27570, Saved FP = 02A27534, PC Opcode = 31

Saved PC = 031E1916 : symbol not found
ARG# Argument [data...] -----------------------------------------------------

Saved PC = 0288CB7E : RDMS$$EXE_ACTION + 00001322
ARG# Argument [data...] -----------------------------------------------------
   1 031D65F8: 00000000 02E910A0 031D6430 03228870 03227020 0321CB38 00686262
        Handler = 00000000, PSW = 0000, CALLS = 1, STACKOFFS = 0
        Saved AP = 7FE6E01C, Saved FP = 02A27924, PC Opcode = DD

Saved PC = 0322C37E : symbol not found
ARG# Argument [data...] -----------------------------------------------------

Saved PC = 0292CA22 : KOD$SETSTK_AND_CONTINUE + 0000009C
ARG# Argument [data...] -----------------------------------------------------

.
.
.

================================================================================
          GETJPI Information (JPI$_)
================================================================================

ACCOUNT = "        "      APTCNT = 0.               ASTACT = 0.
ASTCNT = 196.             ASTEN = 15.               ASTLM = 200.
AUTHPRI = 4.              AUTHPRIV = 00000000:60108000
AUTHPRIV = (BYPASS,NETMBX,SYSLCK,TMPMBX,)           BIOCNT = 100.
BIOLM = 100.              BUFIO = 8002.             BYTCNT = 161728.
BYTLM = 161728.           CLINAME = "DCL"           CPULIM = 0.
CPUTIM = 3446.            CREPRC_FLAGS = 00000400   CURPRIV = 00000004:40508000
CURPRIV = (GRPPRV,NETMBX,PHY_IO,SYSLCK,TMPMBX,)     DFPFC = 64.
DFWSCNT = 6144.           DIOCNT = 100.             DIOLM = 100.
DIRIO = 10931.            EFCS = F1000080           EFCU = C2000000
EFWM = FDFFFFFF           ENQCNT = 9330.            ENQLM = 10000.
EXCVEC = 7FFEFE34         FILCNT = 845.             FILLM = 1000.
FINALEXC = 7FFEFF28       FREP0VA = 032FB200        FREP1VA = 7FE6BE00
FREPTECNT = 124671.       GPGCNT = 7094.            GRP = 000312
IMAGECOUNT = 26.          IMAGNAME = "DSA5:[CTX_DISK.TL_SYSEXE]MAIN.EDO"
IMAGPRIV = 00000000:00000000                        IMAGPRIV = ()
JOBPRCCNT = 0.            JOBTYPE = 3.
LOGINTIM = 27-FEB-1997 08:04:16.83                  MASTER_PID = 20E039BE
MAXDETACH = 0.            MAXJOBS = 0.              MEM = 000613
MODE = 3.                 MSGMASK = 0000000F        OWNER = 0.
PAGEFLTS = 52553.         PAGFILCNT = 87194.        PAGFILLOC = 08000000
PGFLQUOTA = 150000.       PHDFLAGS = 00000084       PID = 20E039BE
PPGCNT = 7753.            PRCCNT = 0.               PRCLM = 8.
PRCNAM = "LLD-CBUFFALO   "                          PRI = 4.
PRIB = 4.                 PROC_INDEX = 354.         PROCPRIV = 00000004:40508000
PROCPRIV = (GRPPRV,NETMBX,PHY_IO,SYSLCK,TMPMBX,)    SHRFILLM = 0.
SITESPEC = 00000000       STATE = 0000000E
STS = 02040001 (INTER,PHDRES,RES,)                  SWPFILLOC = 00000000
TABLENAME = "DSA67:[SYS4.SYSCOMMON.][SYSLIB]DCLTABLES"
TERMINAL = "VTA1490:"     TMBU = 0.                 TQCNT = 30.
TQLM = 30.                UAF_FLAGS = 00001022      UIC = [312,613]
USERNAME = "DINUNZIOL   " VIRTPEAK = 107617.        VOLUMES = 0.
WSAUTH = 8192.            WSAUTHEXT = 14848.        WSEXTENT = 14848.
WSPEAK = 14848.           WSQUOTA = 8192.           WSSIZE = 14848.
================================================================================
          Process Activated Images
================================================================================

  Start     End                  Image Name  Major ID,Minor ID
--------  --------  ----------------------------------------------------
00000200  00030DFF  MAIN                                     0,0
0126CC00  0127EDFF  BLDLBR0                                  0,0
0126C600  0126CBFF  BLDLBR1                                  0,0
011CCC00  0126C5FF  BLDLBR2                                  0,0
01026600  010FA3FF  BLDLBR3                                  0,0
011CC800  011CCBFF  CORORALIB                                0,0
011CC000  011CC7FF  CORSYBLIB                                0,0
011CBC00  011CBFFF  CORXRMSLIB                               0,0
011CB800  011CBBFF  CORDBMSLIB                               0,0
011CB400  011CB7FF  CORDSMLIB                                0,0
011CB000  011CB3FF  CORGTMLIB                                0,0
011CAC00  011CAFFF  CORINGLIB                                0,0
011C8A00  011CABFF  ACLEDTSHR                                1,1
011C3400  011C89FF  CONVSHR                                  1,0
011C1A00  011C33FF  DCXSHR                                   1,1
011BE600  011C19FF  DTKSHR                                   1,100
011AA000  011BE5FF  EDTSHR                                   0,0
011A2600  011A9FFF  FDLSHR                                   1,0
011A1A00  011A25FF  CRFSHR                                   1,101
01190600  011A19FF  MAILSHR                                  1,0
0117E000  011905FF  MAILSHRP                                 1,0
01174600  0117DFFF  PPLRTL                                   1,1
01166A00  011745FF  SMBSRVSHR                                1,0
0114DC00  011669FF  BASRTL                                   1,12
01140C00  0114DBFF  SORTSHR                                  2,27
0112B000  011337FF  SECURESHR                                1,1
01133800  01140BFF  SECURESHRP                               1,1
01126A00  0112AFFF  DISMNTSHR                                1,1
010FA400  011269FF  MOUNTSHR                                 1,1
00E11800  00E62DFF  BLDLBR4                                  0,0
01003400  010265FF  SQLSRV$API                               0,70
00FEEA00  010033FF  EPC$SHR                                  0,0
00FA6E00  00FEE9FF  TPUSHR                                   2,6
00EA2400  00FA6DFF  SQL$SHR                                  0,71
00EA0A00  00EA23FF  NCSSHR                                   16,7637828
00E98000  00EA09FF  LBRSHR                                   2,9
00E80000  00E97FFF  VAXCRTL                                  4,3
00E62E00  00E7FFFF  SMGSHR                                   1,102
00D9AA00  00E117FF  ACCRUN                                   0,0
00D91800  00D9A9FF  RDBSHR                                   3,2
00D5B000  00D90FFF  COBRTL                                   1,10
00D91000  00D917FF  CMA$TIS_SHR                              1,1
00D52000  00D5AFFF  FORRTL                                   1,100
00D49C00  00D51FFF  LIBRTL2                                  1,12
00CFF600  00D299FF  MTHRTL                                   129,32780
00D29A00  00D49BFF  LIBRTL                                   1,14
012E3A00  012E4BFF  SMGMOD                                   0,0
027F1C00  028261FF  RDB$SHARE60                              0,0
0282E200  02832FFF  RDMSHR60                                 0,0
02833000  02A119FF  RDMSHRP60                                0,70
0326F000  032701FF  VAXCMSG                                  0,0
03270200  032729FF  RDBMSGS                                  0,0
03272A00  032761FF  COSI$MSG                                 0,0
03276200  0327E3FF  SHRIMGMSG                                0,0
0327E400  032A77FF  SQL$MSG                                  0,0
032A7800  032B99FF  RDMSMSG60                                0,0
032B9A00  032CBBFF  TPUMSG                                   0,0
032CBC00  032DC1FF  EPC$MSG                                  0,0
032DC200  032E07FF  SQLSRV$MSG                               0,0
032E0800  032EDFFF  SYSMGTMSG                                0,0
032EE000  032EF7FF  SORTMSG                                  0,0
032EF800  032FA3FF  CLIUTLMSG                                0,0
032FA400  032FB1FF  PPLMSG                                   0,0

Total images = 63      Pages allocated = 17067


T.RTitleUserPersonal
Name
DateLines
5095.1HOTRDB::PMEADPaul, [email protected], 719-577-8032Mon Mar 03 1997 15:359
    The bugcheck indicates that the RSS block being opened contained junk. 
    Without a complete bugcheck I don't think much more can be said.  In
    general something like that is caused by memory corruption.
    
    With so many problems happening at the same time I would say that their
    system was probably sick and causing all kinds of bizarre things to
    occur.  I would say fix whatever caused the systems to crash (Rdb is
    not likely to cause their system to crash) and then monitor to see if
    they see similar problems in the future.
5095.2ThanksM5::LSMITHMon Mar 03 1997 16:342
    
    Thanks Paul!