January 13, 2006 at 6:41 am
Hi All,
I have a SQL Server 2000 with Sp3 installed. Yesterday I got this error in SQL Error logs :
Stack Dump being sent to D:\MSSQL\log\SQLDump0008.txt
=====================================================================
BugCheck Dump
=====================================================================
This file is generated by Microsoft SQL Server 8.00.818
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.
Computer type is AT/AT COMPATIBLE.
Current time is 03:51:56 01/11/06.
4 Intel x86 level 15, 2788 Mhz processor(s).
Windows NT 5.0 Build 2195 CSD Service Pack 4.
Memory
MemoryLoad = 98%
Total Physical = 2047 MB
Available Physical = 32 MB
Total Page File = 3941 MB
Available Page File = 2034 MB
Total Virtual = 2047 MB
Available Virtual = 265 MB
*Stack Dump being sent to D:\MSSQL\log\SQLDump0008.txt
* *****************************************************************************
**
*
* BEGIN STACK DUMP:
* 01/11/06 03:51:56 spid 76
*
* Exception Address = 15346B78 (Ordinal9 + 00002FEA Line 0+00000000)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 4106F008
* u s p _ G e t S 0f 00 75 00 73 00 70 00 5f 00 47 00 65 00 74 00 53 00
* e c u r i t y @ 65 00 63 00 75 00 72 00 69 00 74 00 79 00 00 00 09 40
* S c r e e n I d 00 53 00 63 00 72 00 65 00 65 00 6e 00 49 00 64 00 00
* & ; @ C a p l 26 04 04 3b 00 00 00 0e 40 00 43 00 61 00 70 00 6c 00
* i b i l i t y I d 69 00 62 00 69 00 6c 00 69 00 74 00 79 00 49 00 64 00
* & @ R e d i r e 01 26 04 00 0d 40 00 52 00 65 00 64 00 69 00 72 00 65
* c t F i l e §2 00 63 00 74 00 46 00 69 00 6c 00 65 00 01 a7 32 00 09
* 04 f0 00 00 ff ff
*
*
* MODULE BASE END SIZE
* sqlservr 00400000 00B32FFF 00733000
* ntdll 77F80000 77FFCFFF 0007d000
* KERNEL32 7C570000 7C627FFF 000b8000
* ADVAPI32 7C2D0000 7C331FFF 00062000
* RPCRT4 77D30000 77DA0FFF 00071000
* USER32 77E10000 77E74FFF 00065000
* GDI32 77F40000 77F7DFFF 0003e000
* OPENDS60 41060000 41065FFF 00006000
* MSVCRT 78000000 78044FFF 00045000
* UMS 41070000 4107BFFF 0000c000
* SQLSORT 42AE0000 42B6FFFF 00090000
* MSVCIRT 780A0000 780B1FFF 00012000
* sqlevn70 10000000 10006FFF 00007000
* NETAPI32 10C70000 10CBEFFF 0004f000
* SECUR32 10CC0000 10CCEFFF 0000f000
* NETRAP 10CD0000 10CD5FFF 00006000
* SAMLIB 10CE0000 10CEEFFF 0000f000
* WS2_32 10CF0000 10D03FFF 00014000
* WS2HELP 10D10000 10D17FFF 00008000
* WLDAP32 10D20000 10D49FFF 0002a000
* DNSAPI 10D50000 10D73FFF 00024000
* WSOCK32 10D80000 10D87FFF 00008000
* ole32 11170000 1125EFFF 000ef000
* XOLEHLP 112E0000 112E7FFF 00008000
* MSDTCPRX 112F0000 113A6FFF 000b7000
* MTXCLU 113B0000 113BFFFF 00010000
* VERSION 113C0000 113C6FFF 00007000
* LZ32 113D0000 113D5FFF 00006000
* CLUSAPI 113E0000 113EFFFF 00010000
* RESUTILS 113F0000 113FCFFF 0000d000
* USERENV 11400000 11460FFF 00061000
* rnr20 11470000 1147BFFF 0000c000
* iphlpapi 114C0000 114D2FFF 00013000
* ICMP 114E0000 114E4FFF 00005000
* MPRAPI 114F0000 11506FFF 00017000
* OLEAUT32 11510000 115AAFFF 0009b000
* ACTIVEDS 115B0000 115DEFFF 0002f000
* ADSLDPC 115E0000 11602FFF 00023000
* RTUTILS 11610000 1161DFFF 0000e000
* SETUPAPI 11620000 116ADFFF 0008e000
* RASAPI32 118B0000 118E2FFF 00033000
* RASMAN 118F0000 11900FFF 00011000
* TAPI32 11910000 11931FFF 00022000
* COMCTL32 11940000 119C8FFF 00089000
* SHLWAPI 119D0000 11A19FFF 0004a000
* DHCPCSVC 11A20000 11A38FFF 00019000
* winrnr 11EE0000 11EE7FFF 00008000
* rasadhlp 11EF0000 11EF4FFF 00005000
* SSNETLIB 126C0000 126D4FFF 00015000
* NTMARTA 12710000 1272CFFF 0001d000
* WINSPOOL 12730000 1274DFFF 0001e000
* MPR 12770000 1277FFFF 00010000
* NTDSAPI 12780000 12790FFF 00011000
* security 12E00000 12E03FFF 00004000
* msafd 12E10000 12E2DFFF 0001e000
* wshtcpip 12E70000 12E76FFF 00007000
* SSmsLPCn 12F00000 12F07FFF 00008000
* SSnmPN70 12F40000 12F45FFF 00006000
* mswsock 13050000 13061FFF 00012000
* kerberos 130C0000 130F5FFF 00036000
* CRYPTDLL 13100000 1310DFFF 0000e000
* MSASN1 13110000 1311FFFF 00010000
* msv1_0 134A0000 134C0FFF 00021000
* CRYPT32 134D0000 13556FFF 00087000
* SQLFTQRY 13BA0000 13BD1FFF 00032000
* CLBCATQ 13BF0000 13C7FFFF 00090000
* sqloledb 13C90000 13D02FFF 00073000
* MSDART 1F660000 1F67EFFF 0001f000
* comdlg32 13D10000 13D4DFFF 0003e000
* SHELL32 13D50000 13F97FFF 00248000
This is just some extract from the dump file. The SQl Server was hung and I had to restart the Server. The Server is working fine now.
However how do I ensure that this wont rehappen again and this being a Production box, I cannot afford to reatart the box everytime.
Thanks -- Kishore
January 13, 2006 at 12:00 pm
You can open a support ticket with MS, submit the dump file, etc....
It looks like the problem is usp_GetSecurityScreenID. Take a look at the procedure and any tables it touches, run a trace and kick off whatever app/process calls this. You could always keep a filtered trace running (I know, overhead on a production server).
We were getting SQLDumps off and on for a couple of months, unfortunately MS support wasn't much help. We tracked it down to a .NET issue with SQLVariant datatype.
Good Luck.
January 15, 2006 at 8:42 pm
If you haven't already, run dbcc checkdb on all the databases on that server. I would do this before opening a ticket with MS because it'll be one of the first things they look for.
Viewing 3 posts - 1 through 2 (of 2 total)
You must be logged in to reply to this topic. Login to reply