Solved

ASE 12.5 cannot start with more than 4.1 GB memory

Posted on 2004-04-14
6
530 Views
Last Modified: 2013-12-05
This is ASE 12.5.0.2 on HP Tru64 (former Digital UNIX). We have 8 GB physical memory and 16 GB swap space. shm_max was configured as 6GB and now it is 7GB. But it didn't make any difference and ASE doesn't start with more than 2176000 (2K) page memory.

OS version is OSF1 V5.1 1885 alpha

Error message in errorlog is: os_create_region: shmat(8196): Not enough space
0
Comment
Question by:alpmoon
  • 3
6 Comments
 
LVL 10

Expert Comment

by:bret
Comment Utility
What actual value do you have for shm-max in the /etc/sysconfigtab file?

Basic question, I know, but has the OS been rebooted since
it was changed?

-bret
0
 
LVL 13

Author Comment

by:alpmoon
Comment Utility
Hi Bret,

It became more confusing after trying something else. Sybase starts with 7 GB memory when default data cache size is relatively small like 3GB. But let's say it doesn't start with 5 GB max mem and 3.5 GB default data cache giving the same message like shm_max is not big enough.
0
 
LVL 13

Author Comment

by:alpmoon
Comment Utility
Hi,

Ignore my previous comment, because I forgot that ASE 12.5 behaves in a different way by default. The actual memory allocated is still less than 4GB (not 4.1 GB) and that system has 7516192768 bytes of shm_max configured in /etc/sysconfigtab (and also according to /sbin/sysconfig output).
0
 
LVL 13

Author Comment

by:alpmoon
Comment Utility
Hi,

HP tech support suggested to apply a patch and add two new parameters in /etc/sysconfigtab:

proc:
        per_proc_address_space = 0x40000000000
        max_per_proc_address_space = 0x4000000000

Now it is fixed. Maybe I should have sent the question on UNIX section. I didn't realize that it was OS rather than Sybase.
0
 
LVL 5

Accepted Solution

by:
Netminder earned 0 total points
Comment Utility
User resolved; closed, 250 points refunded.

Netminder
Site Admin
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now