DB2 - Problem description
| Problem IC95740 | Status: Closed |
DB2 INSTANCE MIGHT TRAP IN SQMAGENTRTNSTACK::GETRTNCTXFORSND() WHILE CONSTRUCTING THE ROUTINE CONTEXT INFORMATION. | |
| product: | |
DB2 FOR LUW / DB2FORLUW / A10 - DB2 | |
| Problem description: | |
If the MON_HEAP_SZ database level configuration parameter is
configured to a low value OR if the memory available in monitor
heap is not sufficient, routine monitoring infrastructure may
fail to allocate memory for statement nodes used for tracking
the statements executed by the routine. As a result, an agent
can trap inside getRtnCtxForSnd function while accessing the
statement nodes.
Callstack of trapping EDU might look like :
ossDumpStackTraceInternal
ossDumpStackTraceV98
OSSTrapFile::dumpEx
sqlo_trce
sqloEDUCodeTrapHandler
__invoke_dynamic_linker__
sqmAgentRtnStack::getRtnCtxForSnd
sqlkdDispatchRequest
sqlricrt
sqlriSectInvoke
sqlrr_process_fetch_request
sqlrr_open
sqluOpenCursor
sqluCrossInit
sqluvload
call_sqluvload
sqluLoadPartition
sqlu_register_table_load
sqluvtld_route_in
sqlesrvr
sqleMappingFnServer
sqlerKnownProcedure
sqlerCallDL
sqljs_ddm_excsqlstt
sqljsParseRdbAccessed
sqljsParse
sqljsSqlam
sqljsDrdaAsSPDriver
sqlerInvokeFencedRoutine
sqlriInvokeInvoker
sqlricall
sqlriSectInvoke
sqlrr_process_execute_request
sqlrr_execute
PVM::run
pvm_entry
sqloInvokeFnArgs
sqlriInvokerTrusted
sqlriInvokeInvoker
sqlricall
sqlriSectInvoke
sqlrr_process_execute_request
sqlrr_execute
PVM::run
pvm_entry
sqloInvokeFnArgs
sqlriInvokerTrusted
sqlriInvokeInvoker
sqlricall
sqlriSectInvoke
sqlrr_process_execute_request
sqlrr_execute
sqljs_ddm_excsqlstt
sqljsParseRdbAccessed
sqljsParse
sqljsSqlam
sqljsDriveRequests
sqljsDrdaAsInnerDriver
sqljsDrdaAsDriver
sqeAgent::RunEDU
sqzEDUObj::EDUDriver
sqlzRunEDU
sqloEDUEntry
pthread_detach
clone | |
| Problem Summary: | |
If the MON_HEAP_SZ database level configuration parameter is
configured to a low value OR if the memory available in monitor
heap is not sufficient, routine monitoring infrastructure may
fail to allocate memory for statement nodes used for tracking
the statements executed by the routine. As a result, an agent
can trap inside getRtnCtxForSnd function while accessing the
statement nodes.
Callstack of trapping EDU might look like :
ossDumpStackTraceInternal
ossDumpStackTraceV98
OSSTrapFile::dumpEx
sqlo_trce
sqloEDUCodeTrapHandler
__invoke_dynamic_linker__
sqmAgentRtnStack::getRtnCtxForSnd
sqlkdDispatchRequest
sqlricrt
sqlriSectInvoke
sqlrr_process_fetch_request
sqlrr_open
sqluOpenCursor
sqluCrossInit
sqluvload
call_sqluvload
sqluLoadPartition
sqlu_register_table_load
sqluvtld_route_in
sqlesrvr
sqleMappingFnServer
sqlerKnownProcedure
sqlerCallDL
sqljs_ddm_excsqlstt
sqljsParseRdbAccessed
sqljsParse
sqljsSqlam
sqljsDrdaAsSPDriver
sqlerInvokeFencedRoutine
sqlriInvokeInvoker
sqlricall
sqlriSectInvoke
sqlrr_process_execute_request
sqlrr_execute
PVM::run
pvm_entry
sqloInvokeFnArgs
sqlriInvokerTrusted
sqlriInvokeInvoker
sqlricall
sqlriSectInvoke
sqlrr_process_execute_request
sqlrr_execute
PVM::run
pvm_entry
sqloInvokeFnArgs
sqlriInvokerTrusted
sqlriInvokeInvoker
sqlricall
sqlriSectInvoke
sqlrr_process_execute_request
sqlrr_execute
sqljs_ddm_excsqlstt
sqljsParseRdbAccessed
sqljsParse
sqljsSqlam
sqljsDriveRequests
sqljsDrdaAsInnerDriver
sqljsDrdaAsDriver
sqeAgent::RunEDU
sqzEDUObj::EDUDriver
sqlzRunEDU
sqloEDUEntry
pthread_detach
clone | |
| Local Fix: | |
Turn off routine metrics collection by setting MON_RTN_DATA db cfg to NONE. | |
| available fix packs: | |
DB2 Version 10.1 Fix Pack 4 for Linux, UNIX, and Windows | |
| Solution | |
First fixed in DB2 Version 10.1 Fix Pack 4 | |
| Workaround | |
Turn off routine metrics collection by setting MON_RTN_DATA db cfg to NONE. | |
| BUG-Tracking | |
forerunner : APAR is sysrouted TO one or more of the following: IC95822 follow-up : | |
| Timestamps | |
Date - problem reported : Date - problem closed : Date - last modified : | 05.09.2013 22.07.2014 22.07.2014 |
| Problem solved at the following versions (IBM BugInfos) | |
| Problem solved according to the fixlist(s) of the following version(s) | |
| 10.1.0.4 |
|