Lotus Domino Server 6.5 频繁崩溃

Lotus Domino Server 6.5 频繁崩溃

我们在一台虚拟机上运行 Lotus Domino Server 6.5。托管在此服务器上的 Web 应用程序在过去 10 年中一直运行良好,没有任何问题。但在过去几个月中,服务器突然频繁崩溃。我使用 LND 分析了崩溃详细信息,发现所有崩溃都有类似的崩溃堆栈。

以下链接包含 LND Analyzer 提供的所有详细信息的屏幕截图。任何帮助都非常感谢。

此外,只有 30 到 80 个用户将使用这些应用程序,而且我认为服务器不会承受负载。

NSD 日志文件

崩溃截图

致命堆栈:

#
### FATAL THREAD 43/72 [   nHTTP:125c: 5332]
### FP=0x0d2dfe3c, PC=0x002a18af, SP=0x0d2dfe38, stksize=4
### EAX=0x00000001, EBX=0x00000000, ECX=0x00010000, EDX=0x0e219b34
### ESI=0x00000000, EDI=0x000000c8, CS=0x0000001b, SS=0x00000023
### DS=0x00000023, ES=0x00000023, FS=0x0000003b, GS=0x00000000 Flags=0x00010202
Exception code: c0000005 (ACCESS_VIOLATION)
############################################################
@[ 1] 0x002a18af nservlet._Remove+15 (0,3,d2dfe78,2a127a)
@[ 2] 0x002a1992 nservlet._ListMgr_RemoveNode+34 (3,a335430,55559ec,9b3c534)
@[ 3] 0x002a127a nservlet._ServletProcessRequest+106 (d2dfe90,40eb6c2c,0,3)
 [ 4] 0x100254ab nhttpstack (40eb6c2c,40eb6ac8,0,3)
 [ 5] 0x1000fea9 nhttpstack (2,4272ef40,1baa6760,0)
 [ 6] 0x1001cd31 nhttpstack (0,4aa0a00,0,d2dff24)
 [ 7] 0x10021246 nhttpstack (4aa0a0c,4aa0a00,0,60091b21)
 [ 8] 0x1002a51d nhttpstack (3,4aa0a00,10027650,1002767a)
 [ 9] 0x1002a3a7 nhttpstack (4aa0a00,0,0,0)
@[10] 0x60114924 nnotes._ThreadWrapper@4+212 (0,0,0,0)
 [11] 0x77e6482f KERNEL32

編輯 細節。

.Mapped To: PThread [   nHTTP:125c: 5332]
..      SOBJ: addr=0x1b604ddc, h=0xf010440e t=cf02 (BLK_FT_STATIC)
..      SOBJ: addr=0x1b801414, h=0xf0104412 t=c820 (BLK_CLIENT_OPENSESSION_TIME)
..      SOBJ: addr=0x0e9c04bc, h=0xf010427e t=c30a (BLK_LOOKUP_THREAD)
..      SOBJ: addr=0x420a0114, h=0xf01044cf t=ca35 (BLK_TRACECONNECTION)
..      SOBJ: addr=0x0112cfb0, h=0xf010418c t=c130 (BLK_TLA)
..      SOBJ: addr=0x0113e3f4, h=0xf010429b t=c436 (BLK_LSITLS)
..      SOBJ: addr=0x0e9709fc, h=0xf0104295 t=c275 (BLK_NSFT)
..  Database: D:\Lotus\Domino\Data\ew\archives\ew-2012q3.nsf
....       DBH:    383, By: Pradeep Rajan
......       doc: HDB=383, ID=8650, H=7343, class=0001, flags=0300
......       doc: HDB=383, ID=25686, H=7225, class=0001, flags=0300
......       doc: HDB=383, ID=8650, H=7298, class=0001, flags=0300
......       doc: HDB=383, ID=8650, H=7196, class=0001, flags=0300 

今天又发生一次崩溃。请帮忙。

致命堆栈

############################################################
### FATAL THREAD 32/66 [   nHTTP:0568: 5700]
### FP=0x0bddfe3c, PC=0x002a18af, SP=0x0bddfe38, stksize=4
### EAX=0x00000001, EBX=0x00000000, ECX=0x00010000, EDX=0x0d90c694
### ESI=0x00000000, EDI=0x000000c8, CS=0x0000001b, SS=0x00000023
### DS=0x00000023, ES=0x00000023, FS=0x0000003b, GS=0x00000000 Flags=0x00010202
Exception code: c0000005 (ACCESS_VIOLATION)
############################################################
@[ 1] 0x002a18af nservlet._Remove+15 (0,4,bddfe78,2a127a)
@[ 2] 0x002a1992 nservlet._ListMgr_RemoveNode+34 (4,a302eb8,48b58cc,8e98b3c)
@[ 3] 0x002a127a nservlet._ServletProcessRequest+106 (bddfe90,43277dec,0,3)
 [ 4] 0x100254ab nhttpstack (43277dec,43277c88,0,3)
 [ 5] 0x1000fea9 nhttpstack (2,42cf2a64,3784145c,0)
 [ 6] 0x1001cd31 nhttpstack (0,a67a4be,0,bddff24)
 [ 7] 0x10021246 nhttpstack (a67a4ca,a67a4be,0,60091b21)
 [ 8] 0x1002a51d nhttpstack (3,a67a4be,10027650,1002767a)
 [ 9] 0x1002a3a7 nhttpstack (a67a4be,0,0,0)
@[10] 0x60114924 nnotes._ThreadWrapper@4+212 (0,0,0,0)
 [11] 0x77e6482f KERNEL32

第2次

############################################################
### PASS 2 : FATAL THREAD with STACK FRAMES 32/66 [   nHTTP:0568: 5700]
### FP=0bddfe3c, PC=002a18af, SP=0bddfe38, stksize=4
Exception code: c0000005 (ACCESS_VIOLATION)
############################################################
# ---------- Top of the Stack ----------
       # 0bddfe38  00000000 0bddfe4c 002a1992 00000000  |....L.....*.....|

@[ 1] 0x002a18af nservlet._Remove+15 (0,4,bddfe78,2a127a)

       # 0bddfe3c  0bddfe4c 002a1992 00000000 00000004  |L.....*.........|


@[ 2] 0x002a1992 nservlet._ListMgr_RemoveNode+34 (4,a302eb8,48b58cc,8e98b3c)

       # 0bddfe4c  0bddfe78 002a127a 00000004 0a302eb8  |x...z.*.......0.|
       # 0bddfe5c  048b58cc 08e98b3c 00000004 0bddfe90  |.X..<...........|
       # 0bddfe6c  43277e84 4327840c 0a302eb8 0bddfeac  |.~'C..'C..0.....|


@[ 3] 0x002a127a nservlet._ServletProcessRequest+106 (bddfe90,43277dec,0,3)

       # 0bddfe78  0bddfeac 100254ab 0bddfe90 43277dec  |.....T.......}'C|
       # 0bddfe88  00000000 00000003 43277e84 10025530  |.........~'C0U..|
       # 0bddfe98  10025850 100255c0 10025580 10025680  |PX...U...U...V..|
       # 0bddfea8  10025780 0bddfec4 1000fea9 43277dec  |.W...........}'C|


 [ 4] 0x100254ab nhttpstack (43277dec,43277c88,0,3)

       # 0bddfeac  0bddfec4 1000fea9 43277dec 43277c88  |.........}'C.|'C|
       # 0bddfebc  00000000 00000003 0bddfef4 1001cd31  |............1...|


 [ 5] 0x1000fea9 nhttpstack (2,42cf2a64,3784145c,0)

       # 0bddfec4  0bddfef4 1001cd31 00000002 42cf2a64  |....1.......d*.B|
       # 0bddfed4  3784145c 00000000 1002a75c 43277c88  |\..7....\....|'C|
       # 0bddfee4  00000000 0bddff24 10033dec ffffffff  |....$....=......|


 [ 6] 0x1001cd31 nhttpstack (0,a67a4be,0,bddff24)

       # 0bddfef4  0bddff30 10021246 00000000 0a67a4be  |0...F.........g.|
       # 0bddff04  00000000 0bddff24 1000adc9 000007b7  |....$...........|
       # 0bddff14  3784145c 00000001 00000002 0bddfefc  |\..7............|
       # 0bddff24  0bddff70 100340a0 00000000 0bddff7c  |p....@......|...|


 [ 7] 0x10021246 nhttpstack (a67a4ca,a67a4be,0,60091b21)

       # 0bddff30  0bddff7c 1002a51d 0a67a4ca 0a67a4be  ||.........g...g.|
       # 0bddff40  00000000 60091b21 0a67a730 00000001  |....!..`0.g.....|
       # 0bddff50  00000000 0a67a4be 0a67a738 00000003  |......g.8.g.....|
       # 0bddff60  00000002 0000f6b1 00000000 0bddff38  |............8...|
       # 0bddff70  0bddffdc 100344b0 00000000 0bddff98  |.....D..........|


 [ 8] 0x1002a51d nhttpstack (3,a67a4be,10027650,1002767a)

       # 0bddff7c  0bddff98 1002a3a7 00000003 0a67a4be  |..............g.|
       # 0bddff8c  10027650 1002767a 00000000 0bddffb8  |Pv..zv..........|


 [ 9] 0x1002a3a7 nhttpstack (a67a4be,0,0,0)

       # 0bddff98  0bddffb8 60114924 0a67a4be 00000000  |....$I.`..g.....|
       # 0bddffa8  00000000 00000000 00000000 0a67a4be  |..............g.|


@[10] 0x60114924 nnotes._ThreadWrapper@4+212 (0,0,0,0)

       # 0bddffb8  0bddffec 77e6482f 00000000 00000000  |..../H.w........|
       # 0bddffc8  00000000 00000000 c0000005 0bddffc4  |................|
       # 0bddffd8  0bddfa64 ffffffff 77e61a60 77e64838  |d.......`..w8H.w|
       # 0bddffe8  00000000 00000000 00000000 60114850  |............PH.`|

映射线程

.Mapped To: PThread [   nHTTP:0568: 5700]
..      SOBJ: addr=0x334d00f8, h=0xf01040e2 t=ca35 (BLK_TRACECONNECTION)
..      SOBJ: addr=0x3e00029c, h=0xf01043f7 t=c820 (BLK_CLIENT_OPENSESSION_TIME)
..      SOBJ: addr=0x0112c3a4, h=0xf010416b t=c130 (BLK_TLA)
..      SOBJ: addr=0x0113df28, h=0xf01042fe t=c436 (BLK_LSITLS)
..      SOBJ: addr=0x438f0174, h=0xf0104461 t=cf02 (BLK_FT_STATIC)
..      SOBJ: addr=0x04663820, h=0xf01042e4 t=c30a (BLK_LOOKUP_THREAD)
..      SOBJ: addr=0x0114dfe0, h=0xf01042e1 t=c275 (BLK_NSFT)

答案1

我发现该堆栈的唯一问题是 SPR MIAS5S7F39。服务器会在 servlet 管理器负载过重的情况下崩溃。

在 R6 代码流的最新版本中,该问题被标记为已修复。但是,如果问题仍然存在,则需要升级到较新的版本,因为 R6 已经过时多年了。

相关内容