ERR Enum (CHKSGFILES)

The ERR enum is returned by many functions of the CCheckSGFiles class. This enum indicates the results of the called function.

Important

Storage Groups are not available in Exchange Server 2010. For backwards compatibility with pre-Exchange 2010 databases and storage groups, the CHKSGFILES API includes the capability to specify storage groups. When running CHKSGFILES against Exchange 2010 databases, parameters that specify a storage group identifier should be set to an empty string.

Enum ERR 
{
        errSuccess = 0,
        errTaskDropped = -106,
        errRequiredLogFilesMissing = -543,
        errInvalidParameter = -1003,
        errOutOfMemory = -1011,
        errReadVerifyFailure = -1018,
        errTooManyActiveUsers = -1059,
        errDatabaseCorrupted = -1206
}

Values

  • errSuccess
    0. The function completed without any errors.

  • errTaskDropped
    -106. Returned by ErrTerm() to indicate that not all database pages and transaction log files were checked, or that errors were encountered during the verification.

  • errRequiredLogFilesMissing
    -543. One or more log files that are required to bring the database to a clean-shutdown state was not found in the log file path, or did not have the specified three-letter base name.

  • errInvalidParameter
    -1003. One or more parameters that were passed to the function were invalid.

  • errOutOfMemory
    -1011. Insufficient memory was available to complete the requested operation.

  • errReadVerifyFailure
    -1018. The checksum that is stored on a database page does not match its expected checksum.

  • errTooManyActiveUsers
    -1059. The ErrTerm() function was called while the object was still being used. This can occur if ErrTerm() is called before ErrCheckDbPages() or ErrCheckLogFiles() has returned.

  • errDatabaseCorrupted
    -1206. Some form of corruption was detected in the database.

Requirements

Exchange Server 2010 only includes a 64-bit version of CHKSGFILES.

The account that the application is running under must have read access permissions to the database and log files that are to be checked.