Skip to Content
avatar image
Former Member

Connection broken error

Hi gurus,

I'm working with GRC Access Control 5.3

We were configurating CC and when we tried to run a Risk Analysis, RAR began to generate Data base files and the Hard Disk where the DB is installed run out of space.

After re-assigning the space (we work with virtual servers and storage locations) the DB never got online again.

My DB is MAX DB 7.7.04.28

I'am attaching the content of the file "dbmsrv_LINCE.err" which might help you in the way to help me.

Any help will be very appreciated

Thanks very much.

PID 2480: EXCEPTION caught, PID: 2480, thread: KernelEventProvider, code 0xc0000005 (Access violation) at IP 0x00000000006DFF77, read of address 0x00000000035C003C, time: 2010-01-20 15:17:42 GMT

PID 2480: -


> Emergency stack backtrace <----

PID 2480: Using 'StackWalk64' for stack tracing

PID 2480: Using dbghlp version 4.0 rev 5

PID 2480: Symbol search path:

PID 2480: F:\sapdb\GRP\db;F:\sapdb\GRP\db\pgm;F:\sapdb\GRP\db\symbols;F:\sapdb\GRP\db\sap;C:\WINDOWS

PID 2480: (0):0x00000000006dff77 [F0x000000000269f640](0x0,0x269f7e0,0x269f6e0,0x0)

PID 2480: (1):0x00000000006aa7b9 [F0x000000000269f6b0](0x269f848,0x269fac0,0x120,0x0)

PID 2480: (2):0x00000000006ab4e8 [F0x000000000269f710](0x3d0000,0x38,0x900d18,0x77d6e38c)

PID 2480: (3):0x00000000004c0e87 [F0x000000000269f890](0x269fac0,0x269fb50,0x120,0x22c8f40)

PID 2480: (4):0x00000000004c3c10 [F0x000000000269f9d0](0x224bae0,0x269fe70,0x2254cc0,0x269fdd0)

PID 2480: (5):0x00000000004aec50 [F0x000000000269fc70](0x18,0x18,0x18,0x2294dd0)

PID 2480: (6):0x00000000004249af [F0x000000000269fe40](0x22b0e30,0x269ff20,0x1,0x6c22e0)

PID 2480: (7):0x00000000004244a0 [F0x000000000269fed0](0x6c22e0,0x0,0x22b0e30,0x6c22e0)

PID 2480: (8):0x000000000067cfe5 [F0x000000000269ff30](0x0,0x3f7a30,0x3f7a30,0x6c22e0)

PID 2480: (9):0x00000000006c23c2 [F0x000000000269ff70](0x77d6b6a0,0x3f7a30,0x0,0x6c22e0)

PID 2480: (10):0x0000000077d6b6da [F0x000000000269ffa0](0x0,0x0,0x0,0x0)

PID 2480: -


> Dump of exception info <----

PID 2480: code: 0xc0000005 (Access violation)

PID 2480: flags: 0x00000000

PID 2480: operation: read of address 0x00000000035C003C

PID 2480: param[0]: 0x0000000000000000

PID 2480: param[1]: 0x00000000035c003c

PID 2480: program IP: 0x00000000006DFF77

PID 2480: -


> Register Dump <----

PID 2480: rax: 0x0000000000000000 rbx: 0x00000000003f7ec0

PID 2480: rcx: 0x0000000077ef0a2a rdx: 0x0000000000000000

PID 2480: rsi: 0x00000000035c0000 rdi: 0x0000000000000000

PID 2480: r08: 0x000000000269f508 r09: 0x000000000001d4c0

PID 2480: r10: 0x0000000000000000 r11: 0x0000000000000287

PID 2480: r12: 0x000000000269f6e0 r13: 0x000000000269f6a0

PID 2480: r14: 0x000000000269f7e0 r15: 0x00000000ffffffff

PID 2480: rsp: 0x000000000269f5f0 rbp: 0x000000000001d4c0

PID 2480: rip: 0x00000000006dff77 eflg: 0x00010246

PID 2480: cs: 0x00000033 ss: 0x0000002b

PID 2480: ds: 0x0000002b es: 0x0000002b

PID 2480: fs: 0x00000053 gs: 0x0000002b

PID 2480: dr0: 0x0000000000000000 dr1: 0x0000000000000000

PID 2480: dr2: 0x0000000000000000 dr3: 0x0000000000000000

PID 2480: dr6: 0x0000000000000000 dr7: 0x0000000000000000

PID 2480: -


> Floating-point/MMX register dump <----

PID 2480: header[0]: 0x0000000000000000 000000000000027f

PID 2480: header[1]: 0x0000000000001f80 0000000000000000

PID 2480: legacy[0]: 0x0000000000000000 0000000000000000

PID 2480: legacy[1]: 0x0000000000000000 0000000000000000

PID 2480: legacy[2]: 0x0000000000000000 0000000000000000

PID 2480: legacy[3]: 0x0000000000000000 0000000000000000

PID 2480: legacy[4]: 0x0000000000000000 0000000000000000

PID 2480: legacy[5]: 0x0000000000000000 0000000000000000

PID 2480: legacy[6]: 0x0000000000000000 0000000000000000

PID 2480: legacy[7]: 0x0000000000000000 0000000000000000

PID 2480: xmm[00]: 0x0000000000000000 0000000000000000

PID 2480: xmm[01]: 0x0000000000000000 0000000000000000

PID 2480: xmm[02]: 0x0000000000000000 0000000000000000

PID 2480: xmm[03]: 0x0000000000000000 0000000000000000

PID 2480: xmm[04]: 0x0000000000000000 0000000000000000

PID 2480: xmm[05]: 0x0000000000000000 0000000000000000

PID 2480: xmm[06]: 0x0000000000000000 0000000000000000

PID 2480: xmm[07]: 0x0000000000000000 0000000000000000

PID 2480: xmm[08]: 0x0000000000000000 0000000000000000

PID 2480: xmm[09]: 0x0000000000000000 0000000000000000

PID 2480: xmm[10]: 0x0000000000000000 0000000000000000

PID 2480: xmm[11]: 0x0000000000000000 0000000000000000

PID 2480: xmm[12]: 0x0000000000000000 0000000000000000

PID 2480: xmm[13]: 0x0000000000000000 0000000000000000

PID 2480: xmm[14]: 0x0000000000000000 0000000000000000

PID 2480: xmm[15]: 0x0000000000000000 0000000000000000

PID 2480: -


> Module List <----

PID 2480: |.text Start |.text End | Module File Name

PID 2480: |0x0000000000400000|0x0000000000a70000| F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: |0x0000000077c20000|0x0000000077d2c000| C:\WINDOWS\system32\USER32.dll

PID 2480: |0x0000000077d40000|0x0000000077eb3000| C:\WINDOWS\system32\kernel32.dll

PID 2480: |0x0000000077ec0000|0x0000000077ff9000| C:\WINDOWS\system32\ntdll.dll

PID 2480: |0x00000000724e0000|0x000000007261e000| C:\WINDOWS\system32\dbghelp.dll

PID 2480: |0x0000000077140000|0x000000007714c000| C:\WINDOWS\system32\WS2HELP.dll

PID 2480: |0x0000000077310000|0x0000000077340000| C:\WINDOWS\system32\WS2_32.dll

PID 2480: |0x0000000077370000|0x0000000077408000| C:\WINDOWS\system32\NETAPI32.dll

PID 2480: |0x000000007e380000|0x000000007e390000| C:\WINDOWS\system32\PSAPI.DLL

PID 2480: |0x000000007e9c0000|0x000000007e9e2000| C:\WINDOWS\system32\Secur32.dll

PID 2480: |0x000000007ef60000|0x000000007effb000| C:\WINDOWS\system32\SHLWAPI.dll

PID 2480: |0x000000007f000000|0x000000007f187000| C:\WINDOWS\WinSxS\amd64_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.3959_x-ww_0A7B2435\comctl32.dll

PID 2480: |0x000000007f190000|0x000000007fb9a000| C:\WINDOWS\system32\SHELL32.dll

PID 2480: |0x000000007fbf0000|0x000000007fbfb000| C:\WINDOWS\system32\VERSION.dll

PID 2480: |0x000000007fc00000|0x000000007fc86000| C:\WINDOWS\system32\msvcrt.dll

PID 2480: |0x000000007fc90000|0x000000007fd2b000| C:\WINDOWS\system32\GDI32.dll

PID 2480: |0x000000007fd30000|0x000000007fec9000| C:\WINDOWS\system32\RPCRT4.dll

PID 2480: |0x000000007fee0000|0x000000007ffe5000| C:\WINDOWS\system32\ADVAPI32.dll

PID 2480: -


> Symbolic stack backtrace <----

PID 2480: 0: sql33c_receive + 0x137

PID 2480: SFrame: IP: 0x00000000006dff77 (0x00000000006dfe40+0x137) FP: 0x000000000269f640 SP: 0x000000000269f5f0 RP: 0x00000000006aa7b9

PID 2480: Params: 0x0, 0x269f7e0, 0x269f6e0, 0x0

PID 2480: Source: vos33-u.cpp:873

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 1: sql03u_receive + 0x169

PID 2480: SFrame: IP: 0x00000000006aa7b9 (0x00000000006aa650+0x169) FP: 0x000000000269f6b0 SP: 0x000000000269f650 RP: 0x00000000006ab4e8

PID 2480: Params: 0x269f848, 0x269fac0, 0x120, 0x0

PID 2480: Source: vos03u.cpp:1514

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 2: sqlareceive + 0x38

PID 2480: SFrame: IP: 0x00000000006ab4e8 (0x00000000006ab4b0+0x38) FP: 0x000000000269f710 SP: 0x000000000269f6c0 RP: 0x00000000004c0e87

PID 2480: Params: 0x3d0000, 0x38, 0x900d18, 0x77d6e38c

PID 2480: Source: vos03u.cpp:619

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 3: DBMSrvKnl_Session::Receive + 0x247

PID 2480: SFrame: IP: 0x00000000004c0e87 (0x00000000004c0c40+0x247) FP: 0x000000000269f890 SP: 0x000000000269f720 RP: 0x00000000004c3c10

PID 2480: Params: 0x269fac0, 0x269fb50, 0x120, 0x22c8f40

PID 2480: Source: dbmsrvknl_session.cpp:1223

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 4: DBMSrvKnl_Session::EventReceive + 0x130

PID 2480: SFrame: IP: 0x00000000004c3c10 (0x00000000004c3ae0+0x130) FP: 0x000000000269f9d0 SP: 0x000000000269f8a0 RP: 0x00000000004aec50

PID 2480: Params: 0x224bae0, 0x269fe70, 0x2254cc0, 0x269fdd0

PID 2480: Source: dbmsrvknl_session.cpp:508

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 5: DBMSrvKnl_EventSession::receiveEvent + 0x60

PID 2480: SFrame: IP: 0x00000000004aec50 (0x00000000004aebf0+0x60) FP: 0x000000000269fc70 SP: 0x000000000269f9e0 RP: 0x00000000004249af

PID 2480: Params: 0x18, 0x18, 0x18, 0x2294dd0

PID 2480: Source: dbmsrvknl_eventsession.cpp:176

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 6: DBMSrvDBE_KernelEventProvider::run + 0xef

PID 2480: SFrame: IP: 0x00000000004249af (0x00000000004248c0+0xef) FP: 0x000000000269fe40 SP: 0x000000000269fc80 RP: 0x00000000004244a0

PID 2480: Params: 0x22b0e30, 0x269ff20, 0x1, 0x6c22e0

PID 2480: Source: dbmsrvdbe_kerneleventprovider.cpp:60

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 7: DBMSrvThread_ForgetableThread::DBMSrvThreadMain + 0x30

PID 2480: SFrame: IP: 0x00000000004244a0 (0x0000000000424470+0x30) FP: 0x000000000269fed0 SP: 0x000000000269fe50 RP: 0x000000000067cfe5

PID 2480: Params: 0x6c22e0, 0x0, 0x22b0e30, 0x6c22e0

PID 2480: Source: dbmsrvthread_forgetablethread.cpp:33

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 8: RTEThread_Thread::CThreadMain + 0x95

PID 2480: SFrame: IP: 0x000000000067cfe5 (0x000000000067cf50+0x95) FP: 0x000000000269ff30 SP: 0x000000000269fee0 RP: 0x00000000006c23c2

PID 2480: Params: 0x0, 0x3f7a30, 0x3f7a30, 0x6c22e0

PID 2480: Source: rtethread_thread.cpp:350

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 9: eo07_Win32threadEntry + 0xe2

PID 2480: SFrame: IP: 0x00000000006c23c2 (0x00000000006c22e0+0xe2) FP: 0x000000000269ff70 SP: 0x000000000269ff40 RP: 0x0000000077d6b6da

PID 2480: Params: 0x77d6b6a0, 0x3f7a30, 0x0, 0x6c22e0

PID 2480: Source: veo07-u.cpp:1979

PID 2480: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

PID 2480: -


PID 2480: 10: BaseThreadStart + 0x3a

PID 2480: SFrame: IP: 0x0000000077d6b6da (0x0000000077d6b6a0+0x3a) FP: 0x000000000269ffa0 SP: 0x000000000269ff80

PID 2480: Params: 0x0, 0x0, 0x0, 0x0

PID 2480: Module: C:\WINDOWS\system32\kernel32.dll

Add comment
10|10000 characters needed characters exceeded

  • Follow
  • Get RSS Feed

2 Answers

  • Best Answer
    avatar image
    Former Member
    Apr 07, 2010 at 09:20 PM

    This is the las PID

    PID 2516: EXCEPTION caught, PID: 2516, thread: DBMSrv_MainThread, code 0xc0000005 (Access violation) at IP 0x000000000070D3D4, read of address 0x00000000024FA000, time: 2010-04-07 19:41:13 GMT

    PID 2516: -


    > Emergency stack backtrace <----

    PID 2516: Using 'StackWalk64' for stack tracing

    PID 2516: Using dbghlp version 4.0 rev 5

    PID 2516: Symbol search path:

    PID 2516: C:\Documents and Settings\grpadm;F:\sapdb\GRP\db\pgm;F:\sapdb\GRP\db\symbols;F:\sapdb\GRP\db\sap;C:\WINDOWS

    PID 2516: (0):0x000000000070d3d4 [F0x000000000008e000](0x300,0x77d46719,0x2229ff8,0x1d)

    PID 2516: (1):0x00000000004a5f19 [F0x000000000008e0b0](0x24e00af,0x0,0x1,0xffffff16)

    PID 2516: (2):0x00000000004a8c5d [F0x000000000008e280](0x4dec0e9,0x750798,0x8e480,0x222ea80)

    PID 2516: (3):0x00000000004a9675 [F0x000000000008e6e0](0x823b58,0x0,0x8ee80,0x222e814)

    PID 2516: (4):0x000000000041c705 [F0x000000000008e880](0x222ea20,0x222ea20,0x0,0x8ee80)

    PID 2516: (5):0x000000000041d0c4 [F0x000000000008ebe0](0x7508a0,0x750778,0x750798,0x75bef8)

    PID 2516: (6):0x0000000000412c75 [F0x000000000008f4f0](0x8f801,0x2291080,0x0,0x0)

    PID 2516: (7):0x00000000004035d8 [F0x000000000008f830](0x8fc30,0x8f880,0xffffffff,0x8fc30)

    PID 2516: (8):0x000000000067cfe5 [F0x000000000008f890](0x2001e,0x8fb10,0x8fb10,0x8fc30)

    PID 2516: (9):0x000000000067d2d4 [F0x000000000008f9c0](0xd3d2d1d0,0x2228d10,0x0,0x0)

    PID 2516: (10):0x00000000004013e0 [F0x000000000008ff30](0x0,0x0,0x0,0x0)

    PID 2516: (11):0x000000000070d1d8 [F0x000000000008ff70](0x0,0x0,0x0,0x0)

    PID 2516: (12):0x0000000077d5964c [F0x000000000008ffa0](0x70cfa0,0x0,0x0,0x0)

    PID 2516: -


    > Dump of exception info <----

    PID 2516: code: 0xc0000005 (Access violation)

    PID 2516: flags: 0x00000000

    PID 2516: operation: read of address 0x00000000024FA000

    PID 2516: param[0]: 0x0000000000000000

    PID 2516: param[1]: 0x00000000024fa000

    PID 2516: program IP: 0x000000000070D3D4

    PID 2516: -


    > Register Dump <----

    PID 2516: rax: 0x0000000000000000 rbx: 0x00000000000000ea

    PID 2516: rcx: 0x00000000024f9f08 rdx: 0x00000000000000ea

    PID 2516: rsi: 0x00000000024e0208 rdi: 0x0000000002229fd0

    PID 2516: r08: 0x00000000ffffffc0 r09: 0x00000000fffff316

    PID 2516: r10: 0x0000000000000000 r11: 0x00000000024e0208

    PID 2516: r12: 0x0000000000000159 r13: 0x0000000000000159

    PID 2516: r14: 0x0000000000000000 r15: 0x000000000008e180

    PID 2516: rsp: 0x000000000008e008 rbp: 0x0000000000750798

    PID 2516: rip: 0x000000000070d3d4 eflg: 0x00010202

    PID 2516: cs: 0x00000033 ss: 0x0000002b

    PID 2516: ds: 0x0000002b es: 0x0000002b

    PID 2516: fs: 0x00000053 gs: 0x0000002b

    PID 2516: dr0: 0x0000000000000000 dr1: 0x0000000000000000

    PID 2516: dr2: 0x0000000000000000 dr3: 0x0000000000000000

    PID 2516: dr6: 0x0000000000000000 dr7: 0x0000000000000000

    PID 2516: -


    > Floating-point/MMX register dump <----

    PID 2516: header[0]: 0x0000000000000000 000000000000027f

    PID 2516: header[1]: 0x0000000000001f80 0000000000000000

    PID 2516: legacy[0]: 0x0000000000000000 0000000000000000

    PID 2516: legacy[1]: 0x0000000000000000 0000000000000000

    PID 2516: legacy[2]: 0x0000000000000000 0000000000000000

    PID 2516: legacy[3]: 0x0000000000000000 0000000000000000

    PID 2516: legacy[4]: 0x0000000000000000 0000000000000000

    PID 2516: legacy[5]: 0x0000000000000000 0000000000000000

    PID 2516: legacy[6]: 0x0000000000000000 0000000000000000

    PID 2516: legacy[7]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[00]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[01]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[02]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[03]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[04]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[05]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[06]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[07]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[08]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[09]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[10]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[11]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[12]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[13]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[14]: 0x0000000000000000 0000000000000000

    PID 2516: xmm[15]: 0x0000000000000000 0000000000000000

    PID 2516: -


    > Module List <----

    PID 2516: |.text Start |.text End | Module File Name

    PID 2516: |0x0000000000400000|0x0000000000a70000| F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: |0x0000000077c20000|0x0000000077d2c000| C:\WINDOWS\system32\USER32.dll

    PID 2516: |0x0000000077d40000|0x0000000077eb3000| C:\WINDOWS\system32\kernel32.dll

    PID 2516: |0x0000000077ec0000|0x0000000077ff9000| C:\WINDOWS\system32\ntdll.dll

    PID 2516: |0x00000000724e0000|0x000000007261e000| C:\WINDOWS\system32\dbghelp.dll

    PID 2516: |0x0000000077140000|0x000000007714c000| C:\WINDOWS\system32\WS2HELP.dll

    PID 2516: |0x0000000077310000|0x0000000077340000| C:\WINDOWS\system32\WS2_32.dll

    PID 2516: |0x0000000077370000|0x0000000077408000| C:\WINDOWS\system32\NETAPI32.dll

    PID 2516: |0x000000007e380000|0x000000007e390000| C:\WINDOWS\system32\PSAPI.DLL

    PID 2516: |0x000000007e9c0000|0x000000007e9e2000| C:\WINDOWS\system32\Secur32.dll

    PID 2516: |0x000000007ef60000|0x000000007effb000| C:\WINDOWS\system32\SHLWAPI.dll

    PID 2516: |0x000000007f000000|0x000000007f187000| C:\WINDOWS\WinSxS\amd64_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.3959_x-ww_0A7B2435\comctl32.dll

    PID 2516: |0x000000007f190000|0x000000007fb9a000| C:\WINDOWS\system32\SHELL32.dll

    PID 2516: |0x000000007fbf0000|0x000000007fbfb000| C:\WINDOWS\system32\VERSION.dll

    PID 2516: |0x000000007fc00000|0x000000007fc86000| C:\WINDOWS\system32\msvcrt.dll

    PID 2516: |0x000000007fc90000|0x000000007fd2b000| C:\WINDOWS\system32\GDI32.dll

    PID 2516: |0x000000007fd30000|0x000000007fec9000| C:\WINDOWS\system32\RPCRT4.dll

    PID 2516: |0x000000007fee0000|0x000000007ffe5000| C:\WINDOWS\system32\ADVAPI32.dll

    PID 2516: -


    > Symbolic stack backtrace <----

    PID 2516: 0: memcpy + 0xb4

    PID 2516: SFrame: IP: 0x000000000070d3d4 (0x000000000070d320+0xb4) FP: 0x000000000008e000 SP: 0x000000000008e008 RP: 0x00000000004a5f19

    PID 2516: Params: 0x300, 0x77d46719, 0x2229ff8, 0x1d

    PID 2516: Source: memcpy.asm:196

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 1: DBMSrvShM_Base::extendMemory + 0x219

    PID 2516: SFrame: IP: 0x00000000004a5f19 (0x00000000004a5d00+0x219) FP: 0x000000000008e0b0 SP: 0x000000000008e010 RP: 0x00000000004a8c5d

    PID 2516: Params: 0x24e00af, 0x0, 0x1, 0xffffff16

    PID 2516: Source: dbmsrvshm_base.cpp:707

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 2: DBMSrvShM_Base::removeZombieLines + 0x12d

    PID 2516: SFrame: IP: 0x00000000004a8c5d (0x00000000004a8b30+0x12d) FP: 0x000000000008e280 SP: 0x000000000008e0c0 RP: 0x00000000004a9675

    PID 2516: Params: 0x4dec0e9, 0x750798, 0x8e480, 0x222ea80

    PID 2516: Source: dbmsrvshm_base.cpp:523

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 3: DBMSrvShM_Base::DBMSrvShM_Base + 0x6e5

    PID 2516: SFrame: IP: 0x00000000004a9675 (0x00000000004a8f90+0x6e5) FP: 0x000000000008e6e0 SP: 0x000000000008e290 RP: 0x000000000041c705

    PID 2516: Params: 0x823b58, 0x0, 0x8ee80, 0x222e814

    PID 2516: Source: dbmsrvshm_base.cpp:446

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 4: DBMSrvShM_ShmAdmin::getBase + 0x55

    PID 2516: SFrame: IP: 0x000000000041c705 (0x000000000041c6b0+0x55) FP: 0x000000000008e880 SP: 0x000000000008e6f0 RP: 0x000000000041d0c4

    PID 2516: Params: 0x222ea20, 0x222ea20, 0x0, 0x8ee80

    PID 2516: Source: dbmsrvshm_shmadmin.cpp:72

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 5: DBMSrvShM_ShmAdmin::joinShMGame + 0x334

    PID 2516: SFrame: IP: 0x000000000041d0c4 (0x000000000041cd90+0x334) FP: 0x000000000008ebe0 SP: 0x000000000008e890 RP: 0x0000000000412c75

    PID 2516: Params: 0x7508a0, 0x750778, 0x750798, 0x75bef8

    PID 2516: Source: dbmsrvshm_shmadmin.cpp:134

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 6: ctrlservopen + 0x605

    PID 2516: SFrame: IP: 0x0000000000412c75 (0x0000000000412670+0x605) FP: 0x000000000008f4f0 SP: 0x000000000008ebf0 RP: 0x00000000004035d8

    PID 2516: Params: 0x8f801, 0x2291080, 0x0, 0x0

    PID 2516: Source: vcn10.cpp:1989

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 7: DBMSrvThread_MainThread::DBMSrvThreadMain + 0x258

    PID 2516: SFrame: IP: 0x00000000004035d8 (0x0000000000403380+0x258) FP: 0x000000000008f830 SP: 0x000000000008f500 RP: 0x000000000067cfe5

    PID 2516: Params: 0x8fc30, 0x8f880, 0xffffffff, 0x8fc30

    PID 2516: Source: dbmsrvthread_mainthread.cpp:279

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 8: RTEThread_Thread::CThreadMain + 0x95

    PID 2516: SFrame: IP: 0x000000000067cfe5 (0x000000000067cf50+0x95) FP: 0x000000000008f890 SP: 0x000000000008f840 RP: 0x000000000067d2d4

    PID 2516: Params: 0x2001e, 0x8fb10, 0x8fb10, 0x8fc30

    PID 2516: Source: rtethread_thread.cpp:350

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 9: RTEThread_Thread::AppointMainThreadToThreadObject + 0x2a4

    PID 2516: SFrame: IP: 0x000000000067d2d4 (0x000000000067d030+0x2a4) FP: 0x000000000008f9c0 SP: 0x000000000008f8a0 RP: 0x00000000004013e0

    PID 2516: Params: 0xd3d2d1d0, 0x2228d10, 0x0, 0x0

    PID 2516: Source: rtethread_thread.cpp:212

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 10: main + 0x80

    PID 2516: SFrame: IP: 0x00000000004013e0 (0x0000000000401360+0x80) FP: 0x000000000008ff30 SP: 0x000000000008f9d0 RP: 0x000000000070d1d8

    PID 2516: Params: 0x0, 0x0, 0x0, 0x0

    PID 2516: Source: dbmsrv_main.cpp:42

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 11: mainCRTStartup + 0x238

    PID 2516: SFrame: IP: 0x000000000070d1d8 (0x000000000070cfa0+0x238) FP: 0x000000000008ff70 SP: 0x000000000008ff40 RP: 0x0000000077d5964c

    PID 2516: Params: 0x0, 0x0, 0x0, 0x0

    PID 2516: Source: crt0.c:523

    PID 2516: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 2516: -


    PID 2516: 12: BaseProcessStart + 0x2c

    PID 2516: SFrame: IP: 0x0000000077d5964c (0x0000000077d59620+0x2c) FP: 0x000000000008ffa0 SP: 0x000000000008ff80

    PID 2516: Params: 0x70cfa0, 0x0, 0x0, 0x0

    PID 2516: Module: C:\WINDOWS\system32\kernel32.dll

    Add comment
    10|10000 characters needed characters exceeded

    • Former Member Former Member

      Dear Natalia,

      I have to thank you very much for your excellent and precise instructions.

      I did exactly as you said in the thread and my database got online again and so did my GRC instances.

      I was very worried and starting to consider a database re-installation.

      Once again thanks very much and congratulations for your technical knowledge.

      Regards,

  • avatar image
    Former Member
    Apr 07, 2010 at 09:19 PM

    The file continues

    PID 3052: EXCEPTION caught, PID: 3052, thread: KernelEventProvider, code 0xc0000005 (Access violation) at IP 0x00000000006DFF77, read of address 0x00000000027B003C, time: 2010-03-11 14:45:11 GMT

    PID 3052: -


    > Emergency stack backtrace <----

    PID 3052: Using 'StackWalk64' for stack tracing

    PID 3052: Using dbghlp version 4.0 rev 5

    PID 3052: Symbol search path:

    PID 3052: F:\sapdb\GRP\db;F:\sapdb\GRP\db\pgm;F:\sapdb\GRP\db\symbols;F:\sapdb\GRP\db\sap;C:\WINDOWS

    PID 3052: (0):0x00000000006dff77 [F0x000000000269f640](0x0,0x269f7e0,0x269f6e0,0x0)

    PID 3052: (1):0x00000000006aa7b9 [F0x000000000269f6b0](0x269f848,0x269fac0,0x120,0x0)

    PID 3052: (2):0x00000000006ab4e8 [F0x000000000269f710](0x3d0000,0x38,0x900d18,0x77d6e38c)

    PID 3052: (3):0x00000000004c0e87 [F0x000000000269f890](0x269fac0,0x269fb50,0x120,0x22c8f40)

    PID 3052: (4):0x00000000004c3c10 [F0x000000000269f9d0](0x224bae0,0x269fe70,0x2254cc0,0x269fdd0)

    PID 3052: (5):0x00000000004aec50 [F0x000000000269fc70](0x18,0x18,0x18,0x2294dd0)

    PID 3052: (6):0x00000000004249af [F0x000000000269fe40](0x22b0e30,0x269ff20,0x1,0x6c22e0)

    PID 3052: (7):0x00000000004244a0 [F0x000000000269fed0](0x6c22e0,0x0,0x22b0e30,0x6c22e0)

    PID 3052: (8):0x000000000067cfe5 [F0x000000000269ff30](0x0,0x3f7a30,0x3f7a30,0x6c22e0)

    PID 3052: (9):0x00000000006c23c2 [F0x000000000269ff70](0x77d6b6a0,0x3f7a30,0x0,0x6c22e0)

    PID 3052: (10):0x0000000077d6b6da [F0x000000000269ffa0](0x0,0x0,0x0,0x0)

    PID 3052: -


    > Dump of exception info <----

    PID 3052: code: 0xc0000005 (Access violation)

    PID 3052: flags: 0x00000000

    PID 3052: operation: read of address 0x00000000027B003C

    PID 3052: param[0]: 0x0000000000000000

    PID 3052: param[1]: 0x00000000027b003c

    PID 3052: program IP: 0x00000000006DFF77

    PID 3052: -


    > Register Dump <----

    PID 3052: rax: 0x0000000000000000 rbx: 0x00000000003f7ec0

    PID 3052: rcx: 0x0000000077ef0a2a rdx: 0x0000000000000000

    PID 3052: rsi: 0x00000000027b0000 rdi: 0x0000000000000000

    PID 3052: r08: 0x000000000269f508 r09: 0x000000000001d4c0

    PID 3052: r10: 0x0000000000000000 r11: 0x0000000000000287

    PID 3052: r12: 0x000000000269f6e0 r13: 0x000000000269f6a0

    PID 3052: r14: 0x000000000269f7e0 r15: 0x00000000ffffffff

    PID 3052: rsp: 0x000000000269f5f0 rbp: 0x000000000001d4c0

    PID 3052: rip: 0x00000000006dff77 eflg: 0x00010246

    PID 3052: cs: 0x00000033 ss: 0x0000002b

    PID 3052: ds: 0x0000002b es: 0x0000002b

    PID 3052: fs: 0x00000053 gs: 0x0000002b

    PID 3052: dr0: 0x0000000000000000 dr1: 0x0000000000000000

    PID 3052: dr2: 0x0000000000000000 dr3: 0x0000000000000000

    PID 3052: dr6: 0x0000000000000000 dr7: 0x0000000000000000

    PID 3052: -


    > Floating-point/MMX register dump <----

    PID 3052: header[0]: 0x0000000000000000 000000000000027f

    PID 3052: header[1]: 0x0000000000001f80 0000000000000000

    PID 3052: legacy[0]: 0x0000000000000000 0000000000000000

    PID 3052: legacy[1]: 0x0000000000000000 0000000000000000

    PID 3052: legacy[2]: 0x0000000000000000 0000000000000000

    PID 3052: legacy[3]: 0x0000000000000000 0000000000000000

    PID 3052: legacy[4]: 0x0000000000000000 0000000000000000

    PID 3052: legacy[5]: 0x0000000000000000 0000000000000000

    PID 3052: legacy[6]: 0x0000000000000000 0000000000000000

    PID 3052: legacy[7]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[00]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[01]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[02]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[03]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[04]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[05]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[06]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[07]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[08]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[09]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[10]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[11]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[12]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[13]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[14]: 0x0000000000000000 0000000000000000

    PID 3052: xmm[15]: 0x0000000000000000 0000000000000000

    PID 3052: -


    > Module List <----

    PID 3052: |.text Start |.text End | Module File Name

    PID 3052: |0x0000000000400000|0x0000000000a70000| F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: |0x0000000077c20000|0x0000000077d2c000| C:\WINDOWS\system32\USER32.dll

    PID 3052: |0x0000000077d40000|0x0000000077eb3000| C:\WINDOWS\system32\kernel32.dll

    PID 3052: |0x0000000077ec0000|0x0000000077ff9000| C:\WINDOWS\system32\ntdll.dll

    PID 3052: |0x00000000724e0000|0x000000007261e000| C:\WINDOWS\system32\dbghelp.dll

    PID 3052: |0x0000000077140000|0x000000007714c000| C:\WINDOWS\system32\WS2HELP.dll

    PID 3052: |0x0000000077310000|0x0000000077340000| C:\WINDOWS\system32\WS2_32.dll

    PID 3052: |0x0000000077370000|0x0000000077408000| C:\WINDOWS\system32\NETAPI32.dll

    PID 3052: |0x000000007e380000|0x000000007e390000| C:\WINDOWS\system32\PSAPI.DLL

    PID 3052: |0x000000007e9c0000|0x000000007e9e2000| C:\WINDOWS\system32\Secur32.dll

    PID 3052: |0x000000007ef60000|0x000000007effb000| C:\WINDOWS\system32\SHLWAPI.dll

    PID 3052: |0x000000007f000000|0x000000007f187000| C:\WINDOWS\WinSxS\amd64_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.3959_x-ww_0A7B2435\comctl32.dll

    PID 3052: |0x000000007f190000|0x000000007fb9a000| C:\WINDOWS\system32\SHELL32.dll

    PID 3052: |0x000000007fbf0000|0x000000007fbfb000| C:\WINDOWS\system32\VERSION.dll

    PID 3052: |0x000000007fc00000|0x000000007fc86000| C:\WINDOWS\system32\msvcrt.dll

    PID 3052: |0x000000007fc90000|0x000000007fd2b000| C:\WINDOWS\system32\GDI32.dll

    PID 3052: |0x000000007fd30000|0x000000007fec9000| C:\WINDOWS\system32\RPCRT4.dll

    PID 3052: |0x000000007fee0000|0x000000007ffe5000| C:\WINDOWS\system32\ADVAPI32.dll

    PID 3052: -


    > Symbolic stack backtrace <----

    PID 3052: 0: sql33c_receive + 0x137

    PID 3052: SFrame: IP: 0x00000000006dff77 (0x00000000006dfe40+0x137) FP: 0x000000000269f640 SP: 0x000000000269f5f0 RP: 0x00000000006aa7b9

    PID 3052: Params: 0x0, 0x269f7e0, 0x269f6e0, 0x0

    PID 3052: Source: vos33-u.cpp:873

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 1: sql03u_receive + 0x169

    PID 3052: SFrame: IP: 0x00000000006aa7b9 (0x00000000006aa650+0x169) FP: 0x000000000269f6b0 SP: 0x000000000269f650 RP: 0x00000000006ab4e8

    PID 3052: Params: 0x269f848, 0x269fac0, 0x120, 0x0

    PID 3052: Source: vos03u.cpp:1514

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 2: sqlareceive + 0x38

    PID 3052: SFrame: IP: 0x00000000006ab4e8 (0x00000000006ab4b0+0x38) FP: 0x000000000269f710 SP: 0x000000000269f6c0 RP: 0x00000000004c0e87

    PID 3052: Params: 0x3d0000, 0x38, 0x900d18, 0x77d6e38c

    PID 3052: Source: vos03u.cpp:619

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 3: DBMSrvKnl_Session::Receive + 0x247

    PID 3052: SFrame: IP: 0x00000000004c0e87 (0x00000000004c0c40+0x247) FP: 0x000000000269f890 SP: 0x000000000269f720 RP: 0x00000000004c3c10

    PID 3052: Params: 0x269fac0, 0x269fb50, 0x120, 0x22c8f40

    PID 3052: Source: dbmsrvknl_session.cpp:1223

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 4: DBMSrvKnl_Session::EventReceive + 0x130

    PID 3052: SFrame: IP: 0x00000000004c3c10 (0x00000000004c3ae0+0x130) FP: 0x000000000269f9d0 SP: 0x000000000269f8a0 RP: 0x00000000004aec50

    PID 3052: Params: 0x224bae0, 0x269fe70, 0x2254cc0, 0x269fdd0

    PID 3052: Source: dbmsrvknl_session.cpp:508

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 5: DBMSrvKnl_EventSession::receiveEvent + 0x60

    PID 3052: SFrame: IP: 0x00000000004aec50 (0x00000000004aebf0+0x60) FP: 0x000000000269fc70 SP: 0x000000000269f9e0 RP: 0x00000000004249af

    PID 3052: Params: 0x18, 0x18, 0x18, 0x2294dd0

    PID 3052: Source: dbmsrvknl_eventsession.cpp:176

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 6: DBMSrvDBE_KernelEventProvider::run + 0xef

    PID 3052: SFrame: IP: 0x00000000004249af (0x00000000004248c0+0xef) FP: 0x000000000269fe40 SP: 0x000000000269fc80 RP: 0x00000000004244a0

    PID 3052: Params: 0x22b0e30, 0x269ff20, 0x1, 0x6c22e0

    PID 3052: Source: dbmsrvdbe_kerneleventprovider.cpp:60

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 7: DBMSrvThread_ForgetableThread::DBMSrvThreadMain + 0x30

    PID 3052: SFrame: IP: 0x00000000004244a0 (0x0000000000424470+0x30) FP: 0x000000000269fed0 SP: 0x000000000269fe50 RP: 0x000000000067cfe5

    PID 3052: Params: 0x6c22e0, 0x0, 0x22b0e30, 0x6c22e0

    PID 3052: Source: dbmsrvthread_forgetablethread.cpp:33

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 8: RTEThread_Thread::CThreadMain + 0x95

    PID 3052: SFrame: IP: 0x000000000067cfe5 (0x000000000067cf50+0x95) FP: 0x000000000269ff30 SP: 0x000000000269fee0 RP: 0x00000000006c23c2

    PID 3052: Params: 0x0, 0x3f7a30, 0x3f7a30, 0x6c22e0

    PID 3052: Source: rtethread_thread.cpp:350

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 9: eo07_Win32threadEntry + 0xe2

    PID 3052: SFrame: IP: 0x00000000006c23c2 (0x00000000006c22e0+0xe2) FP: 0x000000000269ff70 SP: 0x000000000269ff40 RP: 0x0000000077d6b6da

    PID 3052: Params: 0x77d6b6a0, 0x3f7a30, 0x0, 0x6c22e0

    PID 3052: Source: veo07-u.cpp:1979

    PID 3052: Module: F:\sapdb\GRP\db\pgm\dbmsrv.exe

    PID 3052: -


    PID 3052: 10: BaseThreadStart + 0x3a

    PID 3052: SFrame: IP: 0x0000000077d6b6da (0x0000000077d6b6a0+0x3a) FP: 0x000000000269ffa0 SP: 0x000000000269ff80

    PID 3052: Params: 0x0, 0x0, 0x0, 0x0

    PID 3052: Module: C:\WINDOWS\system32\kernel32.dll

    Add comment
    10|10000 characters needed characters exceeded