Ibm-Domino
Lotus Domino Server 6.5 經常崩潰
我們在一台 VM 機器上執行 Lotus domino server 6.5。此伺服器中託管的 Web 應用程序執行了過去 10 年,沒有任何問題。但突然在過去的幾個月裡,伺服器經常崩潰。我使用 LND 分析了崩潰細節,所有崩潰都有類似的崩潰堆棧。
以下連結包含 LND Analyzer 提供的所有詳細資訊的螢幕截圖。任何幫助深表感謝。
此外,只有 30 到 80 個使用者將使用這些應用程序,我認為伺服器沒有負載。
致命堆棧:
### FATAL THREAD 43/72 [ nHTTP:125c: 5332] ### FP=0x0d2dfe3c, PC=0x002a18af, SP=0x0d2dfe38, stksize=4 ### EAX=0x00000001, EBX=0x00000000, ECX=0x00010000, EDX=0x0e219b34 ### ESI=0x00000000, EDI=0x000000c8, CS=0x0000001b, SS=0x00000023 ### DS=0x00000023, ES=0x00000023, FS=0x0000003b, GS=0x00000000 Flags=0x00010202 Exception code: c0000005 (ACCESS_VIOLATION) ############################################################ @[ 1] 0x002a18af nservlet._Remove+15 (0,3,d2dfe78,2a127a) @[ 2] 0x002a1992 nservlet._ListMgr_RemoveNode+34 (3,a335430,55559ec,9b3c534) @[ 3] 0x002a127a nservlet._ServletProcessRequest+106 (d2dfe90,40eb6c2c,0,3) [ 4] 0x100254ab nhttpstack (40eb6c2c,40eb6ac8,0,3) [ 5] 0x1000fea9 nhttpstack (2,4272ef40,1baa6760,0) [ 6] 0x1001cd31 nhttpstack (0,4aa0a00,0,d2dff24) [ 7] 0x10021246 nhttpstack (4aa0a0c,4aa0a00,0,60091b21) [ 8] 0x1002a51d nhttpstack (3,4aa0a00,10027650,1002767a) [ 9] 0x1002a3a7 nhttpstack (4aa0a00,0,0,0) @[10] 0x60114924 nnotes._ThreadWrapper@4+212 (0,0,0,0) [11] 0x77e6482f KERNEL32
執行緒詳細資訊。
.Mapped To: PThread [ nHTTP:125c: 5332] .. SOBJ: addr=0x1b604ddc, h=0xf010440e t=cf02 (BLK_FT_STATIC) .. SOBJ: addr=0x1b801414, h=0xf0104412 t=c820 (BLK_CLIENT_OPENSESSION_TIME) .. SOBJ: addr=0x0e9c04bc, h=0xf010427e t=c30a (BLK_LOOKUP_THREAD) .. SOBJ: addr=0x420a0114, h=0xf01044cf t=ca35 (BLK_TRACECONNECTION) .. SOBJ: addr=0x0112cfb0, h=0xf010418c t=c130 (BLK_TLA) .. SOBJ: addr=0x0113e3f4, h=0xf010429b t=c436 (BLK_LSITLS) .. SOBJ: addr=0x0e9709fc, h=0xf0104295 t=c275 (BLK_NSFT) .. Database: D:\Lotus\Domino\Data\ew\archives\ew-2012q3.nsf .... DBH: 383, By: Pradeep Rajan ...... doc: HDB=383, ID=8650, H=7343, class=0001, flags=0300 ...... doc: HDB=383, ID=25686, H=7225, class=0001, flags=0300 ...... doc: HDB=383, ID=8650, H=7298, class=0001, flags=0300 ...... doc: HDB=383, ID=8650, H=7196, class=0001, flags=0300
今天又撞車了。請幫忙。
致命堆棧
############################################################ ### FATAL THREAD 32/66 [ nHTTP:0568: 5700] ### FP=0x0bddfe3c, PC=0x002a18af, SP=0x0bddfe38, stksize=4 ### EAX=0x00000001, EBX=0x00000000, ECX=0x00010000, EDX=0x0d90c694 ### ESI=0x00000000, EDI=0x000000c8, CS=0x0000001b, SS=0x00000023 ### DS=0x00000023, ES=0x00000023, FS=0x0000003b, GS=0x00000000 Flags=0x00010202 Exception code: c0000005 (ACCESS_VIOLATION) ############################################################ @[ 1] 0x002a18af nservlet._Remove+15 (0,4,bddfe78,2a127a) @[ 2] 0x002a1992 nservlet._ListMgr_RemoveNode+34 (4,a302eb8,48b58cc,8e98b3c) @[ 3] 0x002a127a nservlet._ServletProcessRequest+106 (bddfe90,43277dec,0,3) [ 4] 0x100254ab nhttpstack (43277dec,43277c88,0,3) [ 5] 0x1000fea9 nhttpstack (2,42cf2a64,3784145c,0) [ 6] 0x1001cd31 nhttpstack (0,a67a4be,0,bddff24) [ 7] 0x10021246 nhttpstack (a67a4ca,a67a4be,0,60091b21) [ 8] 0x1002a51d nhttpstack (3,a67a4be,10027650,1002767a) [ 9] 0x1002a3a7 nhttpstack (a67a4be,0,0,0) @[10] 0x60114924 nnotes._ThreadWrapper@4+212 (0,0,0,0) [11] 0x77e6482f KERNEL32
通行證2
############################################################ ### PASS 2 : FATAL THREAD with STACK FRAMES 32/66 [ nHTTP:0568: 5700] ### FP=0bddfe3c, PC=002a18af, SP=0bddfe38, stksize=4 Exception code: c0000005 (ACCESS_VIOLATION) ############################################################ # ---------- Top of the Stack ---------- # 0bddfe38 00000000 0bddfe4c 002a1992 00000000 |....L.....*.....| @[ 1] 0x002a18af nservlet._Remove+15 (0,4,bddfe78,2a127a) # 0bddfe3c 0bddfe4c 002a1992 00000000 00000004 |L.....*.........| @[ 2] 0x002a1992 nservlet._ListMgr_RemoveNode+34 (4,a302eb8,48b58cc,8e98b3c) # 0bddfe4c 0bddfe78 002a127a 00000004 0a302eb8 |x...z.*.......0.| # 0bddfe5c 048b58cc 08e98b3c 00000004 0bddfe90 |.X..<...........| # 0bddfe6c 43277e84 4327840c 0a302eb8 0bddfeac |.~'C..'C..0.....| @[ 3] 0x002a127a nservlet._ServletProcessRequest+106 (bddfe90,43277dec,0,3) # 0bddfe78 0bddfeac 100254ab 0bddfe90 43277dec |.....T.......}'C| # 0bddfe88 00000000 00000003 43277e84 10025530 |.........~'C0U..| # 0bddfe98 10025850 100255c0 10025580 10025680 |PX...U...U...V..| # 0bddfea8 10025780 0bddfec4 1000fea9 43277dec |.W...........}'C| [ 4] 0x100254ab nhttpstack (43277dec,43277c88,0,3) # 0bddfeac 0bddfec4 1000fea9 43277dec 43277c88 |.........}'C.|'C| # 0bddfebc 00000000 00000003 0bddfef4 1001cd31 |............1...| [ 5] 0x1000fea9 nhttpstack (2,42cf2a64,3784145c,0) # 0bddfec4 0bddfef4 1001cd31 00000002 42cf2a64 |....1.......d*.B| # 0bddfed4 3784145c 00000000 1002a75c 43277c88 |\..7....\....|'C| # 0bddfee4 00000000 0bddff24 10033dec ffffffff |....$....=......| [ 6] 0x1001cd31 nhttpstack (0,a67a4be,0,bddff24) # 0bddfef4 0bddff30 10021246 00000000 0a67a4be |0...F.........g.| # 0bddff04 00000000 0bddff24 1000adc9 000007b7 |....$...........| # 0bddff14 3784145c 00000001 00000002 0bddfefc |\..7............| # 0bddff24 0bddff70 100340a0 00000000 0bddff7c |p....@......|...| [ 7] 0x10021246 nhttpstack (a67a4ca,a67a4be,0,60091b21) # 0bddff30 0bddff7c 1002a51d 0a67a4ca 0a67a4be ||.........g...g.| # 0bddff40 00000000 60091b21 0a67a730 00000001 |....!..`0.g.....| # 0bddff50 00000000 0a67a4be 0a67a738 00000003 |......g.8.g.....| # 0bddff60 00000002 0000f6b1 00000000 0bddff38 |............8...| # 0bddff70 0bddffdc 100344b0 00000000 0bddff98 |.....D..........| [ 8] 0x1002a51d nhttpstack (3,a67a4be,10027650,1002767a) # 0bddff7c 0bddff98 1002a3a7 00000003 0a67a4be |..............g.| # 0bddff8c 10027650 1002767a 00000000 0bddffb8 |Pv..zv..........| [ 9] 0x1002a3a7 nhttpstack (a67a4be,0,0,0) # 0bddff98 0bddffb8 60114924 0a67a4be 00000000 |....$I.`..g.....| # 0bddffa8 00000000 00000000 00000000 0a67a4be |..............g.| @[10] 0x60114924 nnotes._ThreadWrapper@4+212 (0,0,0,0) # 0bddffb8 0bddffec 77e6482f 00000000 00000000 |..../H.w........| # 0bddffc8 00000000 00000000 c0000005 0bddffc4 |................| # 0bddffd8 0bddfa64 ffffffff 77e61a60 77e64838 |d.......`..w8H.w| # 0bddffe8 00000000 00000000 00000000 60114850 |............PH.`|
映射執行緒
.Mapped To: PThread [ nHTTP:0568: 5700] .. SOBJ: addr=0x334d00f8, h=0xf01040e2 t=ca35 (BLK_TRACECONNECTION) .. SOBJ: addr=0x3e00029c, h=0xf01043f7 t=c820 (BLK_CLIENT_OPENSESSION_TIME) .. SOBJ: addr=0x0112c3a4, h=0xf010416b t=c130 (BLK_TLA) .. SOBJ: addr=0x0113df28, h=0xf01042fe t=c436 (BLK_LSITLS) .. SOBJ: addr=0x438f0174, h=0xf0104461 t=cf02 (BLK_FT_STATIC) .. SOBJ: addr=0x04663820, h=0xf01042e4 t=c30a (BLK_LOOKUP_THREAD) .. SOBJ: addr=0x0114dfe0, h=0xf01042e1 t=c275 (BLK_NSFT)
我可以為該堆棧找到的唯一問題是 SPR MIAS5S7F39。伺服器在 servlet 管理器的重負載下會崩潰的地方。
在最新版本的 R6 碼流中標記為已修復。但是,如果問題仍然存在,那麼您需要升級到更新的版本,因為 R6 已經過時多年了。