on 04-07-2010 10:17 PM
Hi gurus,
I'm working with GRC Access Control 5.3
We were configurating CC and when we tried to run a Risk Analysis, RAR began to generate Data base files and the Hard Disk where the DB is installed run out of space.
After re-assigning the space (we work with virtual servers and storage locations) the DB never got online again.
My DB is MAX DB 7.7.04.28
I'am attaching the content of the file "dbmsrv_LINCE.err" which might help you in the way to help me.
Any help will be very appreciated
Thanks very much.
PID 2480: EXCEPTION caught, PID: 2480, thread: KernelEventProvider, code 0xc0000005 (Access violation) at IP 0x00000000006DFF77, read of address 0x00000000035C003C, time: 2010-01-20 15:17:42 GMT
PID 2480: -
> Emergency stack backtrace <----
PID 2480: Using 'StackWalk64' for stack tracing
PID 2480: Using dbghlp version 4.0 rev 5
PID 2480: Symbol search path:
PID 2480: F:\sapdb\GRP\db;F:\sapdb\GRP\db\pgm;F:\sapdb\GRP\db\symbols;F:\sapdb\GRP\db\sap;C:\WINDOWS
PID 2480: (0):0x00000000006dff77 [F0x000000000269f640](0x0,0x269f7e0,0x269f6e0,0x0)
PID 2480: (1):0x00000000006aa7b9 [F0x000000000269f6b0](0x269f848,0x269fac0,0x120,0x0)
PID 2480: (2):0x00000000006ab4e8 [F0x000000000269f710](0x3d0000,0x38,0x900d18,0x77d6e38c)
PID 2480: (3):0x00000000004c0e87 [F0x000000000269f890](0x269fac0,0x269fb50,0x120,0x22c8f40)
PID 2480: (4):0x00000000004c3c10 [F0x000000000269f9d0](0x224bae0,0x269fe70,0x2254cc0,0x269fdd0)
PID 2480: (5):0x00000000004aec50 [F0x000000000269fc70](0x18,0x18,0x18,0x2294dd0)
PID 2480: (6):0x00000000004249af [F0x000000000269fe40](0x22b0e30,0x269ff20,0x1,0x6c22e0)
PID 2480: (7):0x00000000004244a0 [F0x000000000269fed0](0x6c22e0,0x0,0x22b0e30,0x6c22e0)
PID 2480: (8):0x000000000067cfe5 [F0x000000000269ff30](0x0,0x3f7a30,0x3f7a30,0x6c22e0)
PID 2480: (9):0x00000000006c23c2 [F0x000000000269ff70](0x77d6b6a0,0x3f7a30,0x0,0x6c22e0)
PID 2480: (10):0x0000000077d6b6da [F0x000000000269ffa0](0x0,0x0,0x0,0x0)
PID 2480: -
> Dump of exception info <----
PID 2480: code: 0xc0000005 (Access violation)
PID 2480: flags: 0x00000000
PID 2480: operation: read of address 0x00000000035C003C
PID 2480: param[0]: 0x0000000000000000
PID 2480: param[1]: 0x00000000035c003c
PID 2480: program IP: 0x00000000006DFF77
PID 2480: -
> Register Dump <----
PID 2480: rax: 0x0000000000000000 rbx: 0x00000000003f7ec0
PID 2480: rcx: 0x0000000077ef0a2a rdx: 0x0000000000000000
PID 2480: rsi: 0x00000000035c0000 rdi: 0x0000000000000000
PID 2480: r08: 0x000000000269f508 r09: 0x000000000001d4c0
PID 2480: r10: 0x0000000000000000 r11: 0x0000000000000287
PID 2480: r12: 0x000000000269f6e0 r13: 0x000000000269f6a0
PID 2480: r14: 0x000000000269f7e0 r15: 0x00000000ffffffff
PID 2480: rsp: 0x000000000269f5f0 rbp: 0x000000000001d4c0
PID 2480: rip: 0x00000000006dff77 eflg: 0x00010246
PID 2480: cs: 0x00000033 ss: 0x0000002b
PID 2480: ds: 0x0000002b es: 0x0000002b
PID 2480: fs: 0x00000053 gs: 0x0000002b
PID 2480: dr0: 0x0000000000000000 dr1: 0x0000000000000000
PID 2480: dr2: 0x0000000000000000 dr3: 0x0000000000000000
PID 2480: dr6: 0x0000000000000000 dr7: 0x0000000000000000
PID 2480: -
> Floating-point/MMX register dump <----
PID 2480: header[0]: 0x0000000000000000 000000000000027f
PID 2480: header[1]: 0x0000000000001f80 0000000000000000
PID 2480: legacy[0]: 0x0000000000000000 0000000000000000
PID 2480: legacy[1]: 0x0000000000000000 0000000000000000
PID 2480: legacy[2]: 0x0000000000000000 0000000000000000
PID 2480: legacy[3]: 0x0000000000000000 0000000000000000
PID 2480: legacy[4]: 0x0000000000000000 0000000000000000
PID 2480: legacy[5]: 0x0000000000000000 0000000000000000
PID 2480: legacy[6]: 0x0000000000000000 0000000000000000
PID 2480: legacy[7]: 0x0000000000000000 0000000000000000
PID 2480: xmm[00]: 0x0000000000000000 0000000000000000
PID 2480: xmm[01]: 0x0000000000000000 0000000000000000
PID 2480: xmm[02]: 0x0000000000000000 0000000000000000
PID 2480: xmm[03]: 0x0000000000000000 0000000000000000
PID 2480: xmm[04]: 0x0000000000000000 0000000000000000
PID 2480: xmm[05]: 0x0000000000000000 0000000000000000
PID 2480: xmm[06]: 0x0000000000000000 0000000000000000
PID 2480: xmm[07]: 0x0000000000000000 0000000000000000
PID 2480: xmm[08]: 0x0000000000000000 0000000000000000
PID 2480: xmm[09]: 0x0000000000000000 0000000000000000
PID 2480: xmm[10]: 0x0000000000000000 0000000000000000
PID 2480: xmm[11]: 0x0000000000000000 0000000000000000
PID 2480: xmm[12]: 0x0000000000000000 0000000000000000
PID 2480: xmm[13]: 0x0000000000000000 0000000000000000
PID 2480: xmm[14]: 0x0000000000000000 0000000000000000
PID 2480: xmm[15]: 0x0000000000000000 0000000000000000
PID 2480: -
> Module List <----
PID 2480: |.text Start |.text End | Module File Name
PID 2480: |0x0000000000400000|0x0000000000a70000| F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: |0x0000000077c20000|0x0000000077d2c000| C:\WINDOWS\system32\USER32.dll
PID 2480: |0x0000000077d40000|0x0000000077eb3000| C:\WINDOWS\system32\kernel32.dll
PID 2480: |0x0000000077ec0000|0x0000000077ff9000| C:\WINDOWS\system32\ntdll.dll
PID 2480: |0x00000000724e0000|0x000000007261e000| C:\WINDOWS\system32\dbghelp.dll
PID 2480: |0x0000000077140000|0x000000007714c000| C:\WINDOWS\system32\WS2HELP.dll
PID 2480: |0x0000000077310000|0x0000000077340000| C:\WINDOWS\system32\WS2_32.dll
PID 2480: |0x0000000077370000|0x0000000077408000| C:\WINDOWS\system32\NETAPI32.dll
PID 2480: |0x000000007e380000|0x000000007e390000| C:\WINDOWS\system32\PSAPI.DLL
PID 2480: |0x000000007e9c0000|0x000000007e9e2000| C:\WINDOWS\system32\Secur32.dll
PID 2480: |0x000000007ef60000|0x000000007effb000| C:\WINDOWS\system32\SHLWAPI.dll
PID 2480: |0x000000007f000000|0x000000007f187000| C:\WINDOWS\WinSxS\amd64_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.3959_x-ww_0A7B2435\comctl32.dll
PID 2480: |0x000000007f190000|0x000000007fb9a000| C:\WINDOWS\system32\SHELL32.dll
PID 2480: |0x000000007fbf0000|0x000000007fbfb000| C:\WINDOWS\system32\VERSION.dll
PID 2480: |0x000000007fc00000|0x000000007fc86000| C:\WINDOWS\system32\msvcrt.dll
PID 2480: |0x000000007fc90000|0x000000007fd2b000| C:\WINDOWS\system32\GDI32.dll
PID 2480: |0x000000007fd30000|0x000000007fec9000| C:\WINDOWS\system32\RPCRT4.dll
PID 2480: |0x000000007fee0000|0x000000007ffe5000| C:\WINDOWS\system32\ADVAPI32.dll
PID 2480: -
> Symbolic stack backtrace <----
PID 2480: 0: sql33c_receive + 0x137
PID 2480: SFrame: IP: 0x00000000006dff77 (0x00000000006dfe40+0x137) FP: 0x000000000269f640 SP: 0x000000000269f5f0 RP: 0x00000000006aa7b9
PID 2480: Params: 0x0, 0x269f7e0, 0x269f6e0, 0x0
PID 2480: Source: vos33-u.cpp:873
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 1: sql03u_receive + 0x169
PID 2480: SFrame: IP: 0x00000000006aa7b9 (0x00000000006aa650+0x169) FP: 0x000000000269f6b0 SP: 0x000000000269f650 RP: 0x00000000006ab4e8
PID 2480: Params: 0x269f848, 0x269fac0, 0x120, 0x0
PID 2480: Source: vos03u.cpp:1514
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 2: sqlareceive + 0x38
PID 2480: SFrame: IP: 0x00000000006ab4e8 (0x00000000006ab4b0+0x38) FP: 0x000000000269f710 SP: 0x000000000269f6c0 RP: 0x00000000004c0e87
PID 2480: Params: 0x3d0000, 0x38, 0x900d18, 0x77d6e38c
PID 2480: Source: vos03u.cpp:619
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 3: DBMSrvKnl_Session::Receive + 0x247
PID 2480: SFrame: IP: 0x00000000004c0e87 (0x00000000004c0c40+0x247) FP: 0x000000000269f890 SP: 0x000000000269f720 RP: 0x00000000004c3c10
PID 2480: Params: 0x269fac0, 0x269fb50, 0x120, 0x22c8f40
PID 2480: Source: dbmsrvknl_session.cpp:1223
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 4: DBMSrvKnl_Session::EventReceive + 0x130
PID 2480: SFrame: IP: 0x00000000004c3c10 (0x00000000004c3ae0+0x130) FP: 0x000000000269f9d0 SP: 0x000000000269f8a0 RP: 0x00000000004aec50
PID 2480: Params: 0x224bae0, 0x269fe70, 0x2254cc0, 0x269fdd0
PID 2480: Source: dbmsrvknl_session.cpp:508
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 5: DBMSrvKnl_EventSession::receiveEvent + 0x60
PID 2480: SFrame: IP: 0x00000000004aec50 (0x00000000004aebf0+0x60) FP: 0x000000000269fc70 SP: 0x000000000269f9e0 RP: 0x00000000004249af
PID 2480: Params: 0x18, 0x18, 0x18, 0x2294dd0
PID 2480: Source: dbmsrvknl_eventsession.cpp:176
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 6: DBMSrvDBE_KernelEventProvider::run + 0xef
PID 2480: SFrame: IP: 0x00000000004249af (0x00000000004248c0+0xef) FP: 0x000000000269fe40 SP: 0x000000000269fc80 RP: 0x00000000004244a0
PID 2480: Params: 0x22b0e30, 0x269ff20, 0x1, 0x6c22e0
PID 2480: Source: dbmsrvdbe_kerneleventprovider.cpp:60
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 7: DBMSrvThread_ForgetableThread::DBMSrvThreadMain + 0x30
PID 2480: SFrame: IP: 0x00000000004244a0 (0x0000000000424470+0x30) FP: 0x000000000269fed0 SP: 0x000000000269fe50 RP: 0x000000000067cfe5
PID 2480: Params: 0x6c22e0, 0x0, 0x22b0e30, 0x6c22e0
PID 2480: Source: dbmsrvthread_forgetablethread.cpp:33
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 8: RTEThread_Thread::CThreadMain + 0x95
PID 2480: SFrame: IP: 0x000000000067cfe5 (0x000000000067cf50+0x95) FP: 0x000000000269ff30 SP: 0x000000000269fee0 RP: 0x00000000006c23c2
PID 2480: Params: 0x0, 0x3f7a30, 0x3f7a30, 0x6c22e0
PID 2480: Source: rtethread_thread.cpp:350
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 9: eo07_Win32threadEntry + 0xe2
PID 2480: SFrame: IP: 0x00000000006c23c2 (0x00000000006c22e0+0xe2) FP: 0x000000000269ff70 SP: 0x000000000269ff40 RP: 0x0000000077d6b6da
PID 2480: Params: 0x77d6b6a0, 0x3f7a30, 0x0, 0x6c22e0
PID 2480: Source: veo07-u.cpp:1979
PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2480: -
PID 2480: 10: BaseThreadStart + 0x3a
PID 2480: SFrame: IP: 0x0000000077d6b6da (0x0000000077d6b6a0+0x3a) FP: 0x000000000269ffa0 SP: 0x000000000269ff80
PID 2480: Params: 0x0, 0x0, 0x0, 0x0
PID 2480: Module: C:\WINDOWS\system32\kernel32.dll
This is the las PID
PID 2516: EXCEPTION caught, PID: 2516, thread: DBMSrv_MainThread, code 0xc0000005 (Access violation) at IP 0x000000000070D3D4, read of address 0x00000000024FA000, time: 2010-04-07 19:41:13 GMT
PID 2516: -
> Emergency stack backtrace <----
PID 2516: Using 'StackWalk64' for stack tracing
PID 2516: Using dbghlp version 4.0 rev 5
PID 2516: Symbol search path:
PID 2516: C:\Documents and Settings\grpadm;F:\sapdb\GRP\db\pgm;F:\sapdb\GRP\db\symbols;F:\sapdb\GRP\db\sap;C:\WINDOWS
PID 2516: (0):0x000000000070d3d4 [F0x000000000008e000](0x300,0x77d46719,0x2229ff8,0x1d)
PID 2516: (1):0x00000000004a5f19 [F0x000000000008e0b0](0x24e00af,0x0,0x1,0xffffff16)
PID 2516: (2):0x00000000004a8c5d [F0x000000000008e280](0x4dec0e9,0x750798,0x8e480,0x222ea80)
PID 2516: (3):0x00000000004a9675 [F0x000000000008e6e0](0x823b58,0x0,0x8ee80,0x222e814)
PID 2516: (4):0x000000000041c705 [F0x000000000008e880](0x222ea20,0x222ea20,0x0,0x8ee80)
PID 2516: (5):0x000000000041d0c4 [F0x000000000008ebe0](0x7508a0,0x750778,0x750798,0x75bef8)
PID 2516: (6):0x0000000000412c75 [F0x000000000008f4f0](0x8f801,0x2291080,0x0,0x0)
PID 2516: (7):0x00000000004035d8 [F0x000000000008f830](0x8fc30,0x8f880,0xffffffff,0x8fc30)
PID 2516: (8):0x000000000067cfe5 [F0x000000000008f890](0x2001e,0x8fb10,0x8fb10,0x8fc30)
PID 2516: (9):0x000000000067d2d4 [F0x000000000008f9c0](0xd3d2d1d0,0x2228d10,0x0,0x0)
PID 2516: (10):0x00000000004013e0 [F0x000000000008ff30](0x0,0x0,0x0,0x0)
PID 2516: (11):0x000000000070d1d8 [F0x000000000008ff70](0x0,0x0,0x0,0x0)
PID 2516: (12):0x0000000077d5964c [F0x000000000008ffa0](0x70cfa0,0x0,0x0,0x0)
PID 2516: -
> Dump of exception info <----
PID 2516: code: 0xc0000005 (Access violation)
PID 2516: flags: 0x00000000
PID 2516: operation: read of address 0x00000000024FA000
PID 2516: param[0]: 0x0000000000000000
PID 2516: param[1]: 0x00000000024fa000
PID 2516: program IP: 0x000000000070D3D4
PID 2516: -
> Register Dump <----
PID 2516: rax: 0x0000000000000000 rbx: 0x00000000000000ea
PID 2516: rcx: 0x00000000024f9f08 rdx: 0x00000000000000ea
PID 2516: rsi: 0x00000000024e0208 rdi: 0x0000000002229fd0
PID 2516: r08: 0x00000000ffffffc0 r09: 0x00000000fffff316
PID 2516: r10: 0x0000000000000000 r11: 0x00000000024e0208
PID 2516: r12: 0x0000000000000159 r13: 0x0000000000000159
PID 2516: r14: 0x0000000000000000 r15: 0x000000000008e180
PID 2516: rsp: 0x000000000008e008 rbp: 0x0000000000750798
PID 2516: rip: 0x000000000070d3d4 eflg: 0x00010202
PID 2516: cs: 0x00000033 ss: 0x0000002b
PID 2516: ds: 0x0000002b es: 0x0000002b
PID 2516: fs: 0x00000053 gs: 0x0000002b
PID 2516: dr0: 0x0000000000000000 dr1: 0x0000000000000000
PID 2516: dr2: 0x0000000000000000 dr3: 0x0000000000000000
PID 2516: dr6: 0x0000000000000000 dr7: 0x0000000000000000
PID 2516: -
> Floating-point/MMX register dump <----
PID 2516: header[0]: 0x0000000000000000 000000000000027f
PID 2516: header[1]: 0x0000000000001f80 0000000000000000
PID 2516: legacy[0]: 0x0000000000000000 0000000000000000
PID 2516: legacy[1]: 0x0000000000000000 0000000000000000
PID 2516: legacy[2]: 0x0000000000000000 0000000000000000
PID 2516: legacy[3]: 0x0000000000000000 0000000000000000
PID 2516: legacy[4]: 0x0000000000000000 0000000000000000
PID 2516: legacy[5]: 0x0000000000000000 0000000000000000
PID 2516: legacy[6]: 0x0000000000000000 0000000000000000
PID 2516: legacy[7]: 0x0000000000000000 0000000000000000
PID 2516: xmm[00]: 0x0000000000000000 0000000000000000
PID 2516: xmm[01]: 0x0000000000000000 0000000000000000
PID 2516: xmm[02]: 0x0000000000000000 0000000000000000
PID 2516: xmm[03]: 0x0000000000000000 0000000000000000
PID 2516: xmm[04]: 0x0000000000000000 0000000000000000
PID 2516: xmm[05]: 0x0000000000000000 0000000000000000
PID 2516: xmm[06]: 0x0000000000000000 0000000000000000
PID 2516: xmm[07]: 0x0000000000000000 0000000000000000
PID 2516: xmm[08]: 0x0000000000000000 0000000000000000
PID 2516: xmm[09]: 0x0000000000000000 0000000000000000
PID 2516: xmm[10]: 0x0000000000000000 0000000000000000
PID 2516: xmm[11]: 0x0000000000000000 0000000000000000
PID 2516: xmm[12]: 0x0000000000000000 0000000000000000
PID 2516: xmm[13]: 0x0000000000000000 0000000000000000
PID 2516: xmm[14]: 0x0000000000000000 0000000000000000
PID 2516: xmm[15]: 0x0000000000000000 0000000000000000
PID 2516: -
> Module List <----
PID 2516: |.text Start |.text End | Module File Name
PID 2516: |0x0000000000400000|0x0000000000a70000| F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: |0x0000000077c20000|0x0000000077d2c000| C:\WINDOWS\system32\USER32.dll
PID 2516: |0x0000000077d40000|0x0000000077eb3000| C:\WINDOWS\system32\kernel32.dll
PID 2516: |0x0000000077ec0000|0x0000000077ff9000| C:\WINDOWS\system32\ntdll.dll
PID 2516: |0x00000000724e0000|0x000000007261e000| C:\WINDOWS\system32\dbghelp.dll
PID 2516: |0x0000000077140000|0x000000007714c000| C:\WINDOWS\system32\WS2HELP.dll
PID 2516: |0x0000000077310000|0x0000000077340000| C:\WINDOWS\system32\WS2_32.dll
PID 2516: |0x0000000077370000|0x0000000077408000| C:\WINDOWS\system32\NETAPI32.dll
PID 2516: |0x000000007e380000|0x000000007e390000| C:\WINDOWS\system32\PSAPI.DLL
PID 2516: |0x000000007e9c0000|0x000000007e9e2000| C:\WINDOWS\system32\Secur32.dll
PID 2516: |0x000000007ef60000|0x000000007effb000| C:\WINDOWS\system32\SHLWAPI.dll
PID 2516: |0x000000007f000000|0x000000007f187000| C:\WINDOWS\WinSxS\amd64_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.3959_x-ww_0A7B2435\comctl32.dll
PID 2516: |0x000000007f190000|0x000000007fb9a000| C:\WINDOWS\system32\SHELL32.dll
PID 2516: |0x000000007fbf0000|0x000000007fbfb000| C:\WINDOWS\system32\VERSION.dll
PID 2516: |0x000000007fc00000|0x000000007fc86000| C:\WINDOWS\system32\msvcrt.dll
PID 2516: |0x000000007fc90000|0x000000007fd2b000| C:\WINDOWS\system32\GDI32.dll
PID 2516: |0x000000007fd30000|0x000000007fec9000| C:\WINDOWS\system32\RPCRT4.dll
PID 2516: |0x000000007fee0000|0x000000007ffe5000| C:\WINDOWS\system32\ADVAPI32.dll
PID 2516: -
> Symbolic stack backtrace <----
PID 2516: 0: memcpy + 0xb4
PID 2516: SFrame: IP: 0x000000000070d3d4 (0x000000000070d320+0xb4) FP: 0x000000000008e000 SP: 0x000000000008e008 RP: 0x00000000004a5f19
PID 2516: Params: 0x300, 0x77d46719, 0x2229ff8, 0x1d
PID 2516: Source: memcpy.asm:196
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 1: DBMSrvShM_Base::extendMemory + 0x219
PID 2516: SFrame: IP: 0x00000000004a5f19 (0x00000000004a5d00+0x219) FP: 0x000000000008e0b0 SP: 0x000000000008e010 RP: 0x00000000004a8c5d
PID 2516: Params: 0x24e00af, 0x0, 0x1, 0xffffff16
PID 2516: Source: dbmsrvshm_base.cpp:707
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 2: DBMSrvShM_Base::removeZombieLines + 0x12d
PID 2516: SFrame: IP: 0x00000000004a8c5d (0x00000000004a8b30+0x12d) FP: 0x000000000008e280 SP: 0x000000000008e0c0 RP: 0x00000000004a9675
PID 2516: Params: 0x4dec0e9, 0x750798, 0x8e480, 0x222ea80
PID 2516: Source: dbmsrvshm_base.cpp:523
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 3: DBMSrvShM_Base::DBMSrvShM_Base + 0x6e5
PID 2516: SFrame: IP: 0x00000000004a9675 (0x00000000004a8f90+0x6e5) FP: 0x000000000008e6e0 SP: 0x000000000008e290 RP: 0x000000000041c705
PID 2516: Params: 0x823b58, 0x0, 0x8ee80, 0x222e814
PID 2516: Source: dbmsrvshm_base.cpp:446
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 4: DBMSrvShM_ShmAdmin::getBase + 0x55
PID 2516: SFrame: IP: 0x000000000041c705 (0x000000000041c6b0+0x55) FP: 0x000000000008e880 SP: 0x000000000008e6f0 RP: 0x000000000041d0c4
PID 2516: Params: 0x222ea20, 0x222ea20, 0x0, 0x8ee80
PID 2516: Source: dbmsrvshm_shmadmin.cpp:72
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 5: DBMSrvShM_ShmAdmin::joinShMGame + 0x334
PID 2516: SFrame: IP: 0x000000000041d0c4 (0x000000000041cd90+0x334) FP: 0x000000000008ebe0 SP: 0x000000000008e890 RP: 0x0000000000412c75
PID 2516: Params: 0x7508a0, 0x750778, 0x750798, 0x75bef8
PID 2516: Source: dbmsrvshm_shmadmin.cpp:134
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 6: ctrlservopen + 0x605
PID 2516: SFrame: IP: 0x0000000000412c75 (0x0000000000412670+0x605) FP: 0x000000000008f4f0 SP: 0x000000000008ebf0 RP: 0x00000000004035d8
PID 2516: Params: 0x8f801, 0x2291080, 0x0, 0x0
PID 2516: Source: vcn10.cpp:1989
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 7: DBMSrvThread_MainThread::DBMSrvThreadMain + 0x258
PID 2516: SFrame: IP: 0x00000000004035d8 (0x0000000000403380+0x258) FP: 0x000000000008f830 SP: 0x000000000008f500 RP: 0x000000000067cfe5
PID 2516: Params: 0x8fc30, 0x8f880, 0xffffffff, 0x8fc30
PID 2516: Source: dbmsrvthread_mainthread.cpp:279
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 8: RTEThread_Thread::CThreadMain + 0x95
PID 2516: SFrame: IP: 0x000000000067cfe5 (0x000000000067cf50+0x95) FP: 0x000000000008f890 SP: 0x000000000008f840 RP: 0x000000000067d2d4
PID 2516: Params: 0x2001e, 0x8fb10, 0x8fb10, 0x8fc30
PID 2516: Source: rtethread_thread.cpp:350
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 9: RTEThread_Thread::AppointMainThreadToThreadObject + 0x2a4
PID 2516: SFrame: IP: 0x000000000067d2d4 (0x000000000067d030+0x2a4) FP: 0x000000000008f9c0 SP: 0x000000000008f8a0 RP: 0x00000000004013e0
PID 2516: Params: 0xd3d2d1d0, 0x2228d10, 0x0, 0x0
PID 2516: Source: rtethread_thread.cpp:212
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 10: main + 0x80
PID 2516: SFrame: IP: 0x00000000004013e0 (0x0000000000401360+0x80) FP: 0x000000000008ff30 SP: 0x000000000008f9d0 RP: 0x000000000070d1d8
PID 2516: Params: 0x0, 0x0, 0x0, 0x0
PID 2516: Source: dbmsrv_main.cpp:42
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 11: mainCRTStartup + 0x238
PID 2516: SFrame: IP: 0x000000000070d1d8 (0x000000000070cfa0+0x238) FP: 0x000000000008ff70 SP: 0x000000000008ff40 RP: 0x0000000077d5964c
PID 2516: Params: 0x0, 0x0, 0x0, 0x0
PID 2516: Source: crt0.c:523
PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 2516: -
PID 2516: 12: BaseProcessStart + 0x2c
PID 2516: SFrame: IP: 0x0000000077d5964c (0x0000000077d59620+0x2c) FP: 0x000000000008ffa0 SP: 0x000000000008ff80
PID 2516: Params: 0x70cfa0, 0x0, 0x0, 0x0
PID 2516: Module: C:\WINDOWS\system32\kernel32.dll
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Dear Mr. Enzo Delorso,
1) If you are SAP customer, I recommend to create the SAP message on this issue.
2) You posted two different dbmsrv crash back stacks:
A) First two are looking different as the last posted dbmsrv crash.
Did you see the dbmsrv processes using 100% CPU time on the database server?
B) The last one contains the method DBMSrvShM_Base::removeZombieLines < 2. > in dbmsrv*.err file.
DBM Server crashes during cleanup of shared memory left from dbmsrv zombie process, which was killed, may be.
-> Could you please run the command on the database server:
xinstinfo GRP
F:\sapdb\GRP\db\pgm\dbmshm CHECK <indepDataPath> GRP
And post the results.
-> Please check that you have no DBMSRV processes running on the database server!
Stop the application, stop the x_server, close the dbmcli, DBMGUI and DB studio.
Then check if you still have dbmsrv zombie processes running. Kill them.
After that, rename in <indepDataPath>/wrk the files:
GRP.dbm.shi -> GRP.dbm.shi_old
GRP.dbm.shm -> GRP.dbm.shm_old
Try to connect to database as control user after that & post the results:
Dbmcli u2013d GRP u2013u <control>,<pwd>
<enter>
Dbmcli on GRP>db_state
u2026
Dbmcli on GRP>exit
3) Also you have old database version u201C7.7.04.28u201D.
I recommend to update it, when the problem with restart database will be solved.
Thank you and best regards, Natalia Khlopina
Dear Natalia,
I have to thank you very much for your excellent and precise instructions.
I did exactly as you said in the thread and my database got online again and so did my GRC instances.
I was very worried and starting to consider a database re-installation.
Once again thanks very much and congratulations for your technical knowledge.
Regards,
The file continues
PID 3052: EXCEPTION caught, PID: 3052, thread: KernelEventProvider, code 0xc0000005 (Access violation) at IP 0x00000000006DFF77, read of address 0x00000000027B003C, time: 2010-03-11 14:45:11 GMT
PID 3052: -
> Emergency stack backtrace <----
PID 3052: Using 'StackWalk64' for stack tracing
PID 3052: Using dbghlp version 4.0 rev 5
PID 3052: Symbol search path:
PID 3052: F:\sapdb\GRP\db;F:\sapdb\GRP\db\pgm;F:\sapdb\GRP\db\symbols;F:\sapdb\GRP\db\sap;C:\WINDOWS
PID 3052: (0):0x00000000006dff77 [F0x000000000269f640](0x0,0x269f7e0,0x269f6e0,0x0)
PID 3052: (1):0x00000000006aa7b9 [F0x000000000269f6b0](0x269f848,0x269fac0,0x120,0x0)
PID 3052: (2):0x00000000006ab4e8 [F0x000000000269f710](0x3d0000,0x38,0x900d18,0x77d6e38c)
PID 3052: (3):0x00000000004c0e87 [F0x000000000269f890](0x269fac0,0x269fb50,0x120,0x22c8f40)
PID 3052: (4):0x00000000004c3c10 [F0x000000000269f9d0](0x224bae0,0x269fe70,0x2254cc0,0x269fdd0)
PID 3052: (5):0x00000000004aec50 [F0x000000000269fc70](0x18,0x18,0x18,0x2294dd0)
PID 3052: (6):0x00000000004249af [F0x000000000269fe40](0x22b0e30,0x269ff20,0x1,0x6c22e0)
PID 3052: (7):0x00000000004244a0 [F0x000000000269fed0](0x6c22e0,0x0,0x22b0e30,0x6c22e0)
PID 3052: (8):0x000000000067cfe5 [F0x000000000269ff30](0x0,0x3f7a30,0x3f7a30,0x6c22e0)
PID 3052: (9):0x00000000006c23c2 [F0x000000000269ff70](0x77d6b6a0,0x3f7a30,0x0,0x6c22e0)
PID 3052: (10):0x0000000077d6b6da [F0x000000000269ffa0](0x0,0x0,0x0,0x0)
PID 3052: -
> Dump of exception info <----
PID 3052: code: 0xc0000005 (Access violation)
PID 3052: flags: 0x00000000
PID 3052: operation: read of address 0x00000000027B003C
PID 3052: param[0]: 0x0000000000000000
PID 3052: param[1]: 0x00000000027b003c
PID 3052: program IP: 0x00000000006DFF77
PID 3052: -
> Register Dump <----
PID 3052: rax: 0x0000000000000000 rbx: 0x00000000003f7ec0
PID 3052: rcx: 0x0000000077ef0a2a rdx: 0x0000000000000000
PID 3052: rsi: 0x00000000027b0000 rdi: 0x0000000000000000
PID 3052: r08: 0x000000000269f508 r09: 0x000000000001d4c0
PID 3052: r10: 0x0000000000000000 r11: 0x0000000000000287
PID 3052: r12: 0x000000000269f6e0 r13: 0x000000000269f6a0
PID 3052: r14: 0x000000000269f7e0 r15: 0x00000000ffffffff
PID 3052: rsp: 0x000000000269f5f0 rbp: 0x000000000001d4c0
PID 3052: rip: 0x00000000006dff77 eflg: 0x00010246
PID 3052: cs: 0x00000033 ss: 0x0000002b
PID 3052: ds: 0x0000002b es: 0x0000002b
PID 3052: fs: 0x00000053 gs: 0x0000002b
PID 3052: dr0: 0x0000000000000000 dr1: 0x0000000000000000
PID 3052: dr2: 0x0000000000000000 dr3: 0x0000000000000000
PID 3052: dr6: 0x0000000000000000 dr7: 0x0000000000000000
PID 3052: -
> Floating-point/MMX register dump <----
PID 3052: header[0]: 0x0000000000000000 000000000000027f
PID 3052: header[1]: 0x0000000000001f80 0000000000000000
PID 3052: legacy[0]: 0x0000000000000000 0000000000000000
PID 3052: legacy[1]: 0x0000000000000000 0000000000000000
PID 3052: legacy[2]: 0x0000000000000000 0000000000000000
PID 3052: legacy[3]: 0x0000000000000000 0000000000000000
PID 3052: legacy[4]: 0x0000000000000000 0000000000000000
PID 3052: legacy[5]: 0x0000000000000000 0000000000000000
PID 3052: legacy[6]: 0x0000000000000000 0000000000000000
PID 3052: legacy[7]: 0x0000000000000000 0000000000000000
PID 3052: xmm[00]: 0x0000000000000000 0000000000000000
PID 3052: xmm[01]: 0x0000000000000000 0000000000000000
PID 3052: xmm[02]: 0x0000000000000000 0000000000000000
PID 3052: xmm[03]: 0x0000000000000000 0000000000000000
PID 3052: xmm[04]: 0x0000000000000000 0000000000000000
PID 3052: xmm[05]: 0x0000000000000000 0000000000000000
PID 3052: xmm[06]: 0x0000000000000000 0000000000000000
PID 3052: xmm[07]: 0x0000000000000000 0000000000000000
PID 3052: xmm[08]: 0x0000000000000000 0000000000000000
PID 3052: xmm[09]: 0x0000000000000000 0000000000000000
PID 3052: xmm[10]: 0x0000000000000000 0000000000000000
PID 3052: xmm[11]: 0x0000000000000000 0000000000000000
PID 3052: xmm[12]: 0x0000000000000000 0000000000000000
PID 3052: xmm[13]: 0x0000000000000000 0000000000000000
PID 3052: xmm[14]: 0x0000000000000000 0000000000000000
PID 3052: xmm[15]: 0x0000000000000000 0000000000000000
PID 3052: -
> Module List <----
PID 3052: |.text Start |.text End | Module File Name
PID 3052: |0x0000000000400000|0x0000000000a70000| F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: |0x0000000077c20000|0x0000000077d2c000| C:\WINDOWS\system32\USER32.dll
PID 3052: |0x0000000077d40000|0x0000000077eb3000| C:\WINDOWS\system32\kernel32.dll
PID 3052: |0x0000000077ec0000|0x0000000077ff9000| C:\WINDOWS\system32\ntdll.dll
PID 3052: |0x00000000724e0000|0x000000007261e000| C:\WINDOWS\system32\dbghelp.dll
PID 3052: |0x0000000077140000|0x000000007714c000| C:\WINDOWS\system32\WS2HELP.dll
PID 3052: |0x0000000077310000|0x0000000077340000| C:\WINDOWS\system32\WS2_32.dll
PID 3052: |0x0000000077370000|0x0000000077408000| C:\WINDOWS\system32\NETAPI32.dll
PID 3052: |0x000000007e380000|0x000000007e390000| C:\WINDOWS\system32\PSAPI.DLL
PID 3052: |0x000000007e9c0000|0x000000007e9e2000| C:\WINDOWS\system32\Secur32.dll
PID 3052: |0x000000007ef60000|0x000000007effb000| C:\WINDOWS\system32\SHLWAPI.dll
PID 3052: |0x000000007f000000|0x000000007f187000| C:\WINDOWS\WinSxS\amd64_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.3959_x-ww_0A7B2435\comctl32.dll
PID 3052: |0x000000007f190000|0x000000007fb9a000| C:\WINDOWS\system32\SHELL32.dll
PID 3052: |0x000000007fbf0000|0x000000007fbfb000| C:\WINDOWS\system32\VERSION.dll
PID 3052: |0x000000007fc00000|0x000000007fc86000| C:\WINDOWS\system32\msvcrt.dll
PID 3052: |0x000000007fc90000|0x000000007fd2b000| C:\WINDOWS\system32\GDI32.dll
PID 3052: |0x000000007fd30000|0x000000007fec9000| C:\WINDOWS\system32\RPCRT4.dll
PID 3052: |0x000000007fee0000|0x000000007ffe5000| C:\WINDOWS\system32\ADVAPI32.dll
PID 3052: -
> Symbolic stack backtrace <----
PID 3052: 0: sql33c_receive + 0x137
PID 3052: SFrame: IP: 0x00000000006dff77 (0x00000000006dfe40+0x137) FP: 0x000000000269f640 SP: 0x000000000269f5f0 RP: 0x00000000006aa7b9
PID 3052: Params: 0x0, 0x269f7e0, 0x269f6e0, 0x0
PID 3052: Source: vos33-u.cpp:873
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 1: sql03u_receive + 0x169
PID 3052: SFrame: IP: 0x00000000006aa7b9 (0x00000000006aa650+0x169) FP: 0x000000000269f6b0 SP: 0x000000000269f650 RP: 0x00000000006ab4e8
PID 3052: Params: 0x269f848, 0x269fac0, 0x120, 0x0
PID 3052: Source: vos03u.cpp:1514
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 2: sqlareceive + 0x38
PID 3052: SFrame: IP: 0x00000000006ab4e8 (0x00000000006ab4b0+0x38) FP: 0x000000000269f710 SP: 0x000000000269f6c0 RP: 0x00000000004c0e87
PID 3052: Params: 0x3d0000, 0x38, 0x900d18, 0x77d6e38c
PID 3052: Source: vos03u.cpp:619
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 3: DBMSrvKnl_Session::Receive + 0x247
PID 3052: SFrame: IP: 0x00000000004c0e87 (0x00000000004c0c40+0x247) FP: 0x000000000269f890 SP: 0x000000000269f720 RP: 0x00000000004c3c10
PID 3052: Params: 0x269fac0, 0x269fb50, 0x120, 0x22c8f40
PID 3052: Source: dbmsrvknl_session.cpp:1223
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 4: DBMSrvKnl_Session::EventReceive + 0x130
PID 3052: SFrame: IP: 0x00000000004c3c10 (0x00000000004c3ae0+0x130) FP: 0x000000000269f9d0 SP: 0x000000000269f8a0 RP: 0x00000000004aec50
PID 3052: Params: 0x224bae0, 0x269fe70, 0x2254cc0, 0x269fdd0
PID 3052: Source: dbmsrvknl_session.cpp:508
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 5: DBMSrvKnl_EventSession::receiveEvent + 0x60
PID 3052: SFrame: IP: 0x00000000004aec50 (0x00000000004aebf0+0x60) FP: 0x000000000269fc70 SP: 0x000000000269f9e0 RP: 0x00000000004249af
PID 3052: Params: 0x18, 0x18, 0x18, 0x2294dd0
PID 3052: Source: dbmsrvknl_eventsession.cpp:176
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 6: DBMSrvDBE_KernelEventProvider::run + 0xef
PID 3052: SFrame: IP: 0x00000000004249af (0x00000000004248c0+0xef) FP: 0x000000000269fe40 SP: 0x000000000269fc80 RP: 0x00000000004244a0
PID 3052: Params: 0x22b0e30, 0x269ff20, 0x1, 0x6c22e0
PID 3052: Source: dbmsrvdbe_kerneleventprovider.cpp:60
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 7: DBMSrvThread_ForgetableThread::DBMSrvThreadMain + 0x30
PID 3052: SFrame: IP: 0x00000000004244a0 (0x0000000000424470+0x30) FP: 0x000000000269fed0 SP: 0x000000000269fe50 RP: 0x000000000067cfe5
PID 3052: Params: 0x6c22e0, 0x0, 0x22b0e30, 0x6c22e0
PID 3052: Source: dbmsrvthread_forgetablethread.cpp:33
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 8: RTEThread_Thread::CThreadMain + 0x95
PID 3052: SFrame: IP: 0x000000000067cfe5 (0x000000000067cf50+0x95) FP: 0x000000000269ff30 SP: 0x000000000269fee0 RP: 0x00000000006c23c2
PID 3052: Params: 0x0, 0x3f7a30, 0x3f7a30, 0x6c22e0
PID 3052: Source: rtethread_thread.cpp:350
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 9: eo07_Win32threadEntry + 0xe2
PID 3052: SFrame: IP: 0x00000000006c23c2 (0x00000000006c22e0+0xe2) FP: 0x000000000269ff70 SP: 0x000000000269ff40 RP: 0x0000000077d6b6da
PID 3052: Params: 0x77d6b6a0, 0x3f7a30, 0x0, 0x6c22e0
PID 3052: Source: veo07-u.cpp:1979
PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe
PID 3052: -
PID 3052: 10: BaseThreadStart + 0x3a
PID 3052: SFrame: IP: 0x0000000077d6b6da (0x0000000077d6b6a0+0x3a) FP: 0x000000000269ffa0 SP: 0x000000000269ff80
PID 3052: Params: 0x0, 0x0, 0x0, 0x0
PID 3052: Module: C:\WINDOWS\system32\kernel32.dll
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
93 | |
10 | |
10 | |
9 | |
9 | |
7 | |
6 | |
5 | |
5 | |
4 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.