SQL Stack dump error- Help me debugging this

  • Hi All,

    Please help me in finding the offending SQL code causing the following SQL Stack dump

    ===============================================================

    BugCheck Dump

    ===============================================================

    This file is generated by Microsoft SQL Server 1792.961

    upon detection of fatal unexpected error. Please return this file,

    the query or program that produced the bugcheck, the database and

    the error log, and any other pertinent information with a Service Request.

    Computer type is AT/AT COMPATIBLE.

    Current local time is Wed Mar 30 02:19:15 2005

    2 Intel x86 level 6, 902 Mhz processor(s).

    Windows NT 5.0 Build 2195 CSD Service Pack 4.

    NULL

    Memory

    ------

    MemoryLoad = 54% TotalPhys = 3711 MB AvailPhys = 1682 MB

    TotalPageFile = 4095 MB

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:15 spid 0

    *

    * Exception Address = 4106A75E (net_completionroutine + 70)

    * Exception Code = c0000005 E

    * Access Violation occurred writing address 00000001

    *

    * MODULE BASE END SIZE

    * sqlservr 00400000 008cffff 004d0000

    * ntdll 77f80000 77ffcfff 0007d000

    * KERNEL32 7c570000 7c627fff 000b8000

    * ADVAPI32 7c2d0000 7c331fff 00062000

    * RPCRT4 77d30000 77da0fff 00071000

    * USER32 77e10000 77e74fff 00065000

    * GDI32 77f40000 77f7dfff 0003e000

    * ole32 77a50000 77b3efff 000ef000

    * OLEAUT32 779b0000 77a4afff 0009b000

    * VERSION 77820000 77826fff 00007000

    * LZ32 759b0000 759b5fff 00006000

    * opends60 41060000 41085fff 00026000

    * ums 41090000 4109cfff 0000d000

    * MSVCRT 78000000 78044fff 00045000

    * sqlsort 04000000 0408efff 0008f000

    * MSVCIRT 780a0000 780b1fff 00012000

    * sqlevn70 410a0000 410a6fff 00007000

    * COMNEVNT 410b0000 410fefff 0004f000

    * ODBC32 1f7c0000 1f7f3fff 00034000

    * comdlg32 76b30000 76b6dfff 0003e000

    * SHLWAPI 63180000 631cbfff 0004c000

    * COMCTL32 716f0000 71779fff 0008a000

    * SHELL32 782f0000 78537fff 00248000

    * SQLWOA 41100000 4110bfff 0000c000

    * odbcint 00fe0000 00ff5fff 00016000

    * NDDEAPI 769a0000 769a6fff 00007000

    * WINSPOOL 77800000 7781dfff 0001e000

    * MPR 76620000 7662ffff 00010000

    * SQLTrace 41130000 4117dfff 0004e000

    * NETAPI32 75170000 751befff 0004f000

    * SECUR32 7c340000 7c34efff 0000f000

    * NETRAP 751c0000 751c5fff 00006000

    * SAMLIB 75150000 7515efff 0000f000

    * WS2_32 75030000 75043fff 00014000

    * WS2HELP 75020000 75027fff 00008000

    * WLDAP32 77950000 77979fff 0002a000

    * DNSAPI 77980000 779a3fff 00024000

    * WSOCK32 75050000 75057fff 00008000

    * SSNMPN70 41190000 41195fff 00006000

    * SSMSSO70 411a0000 411aafff 0000b000

    * SSMSRP70 411b0000 411b7fff 00008000

    * XOLEHLP 048e0000 048e7fff 00008000

    * MSDTCPRX 048f0000 049a6fff 000b7000

    * MTXCLU 049b0000 049bffff 00010000

    * CLUSAPI 049c0000 049cffff 00010000

    * RESUTILS 049d0000 049dcfff 0000d000

    * USERENV 049e0000 04a40fff 00061000

    * rnr20 04a50000 04a5bfff 0000c000

    * iphlpapi 04aa0000 04ab2fff 00013000

    * ICMP 04ac0000 04ac4fff 00005000

    * MPRAPI 04ad0000 04ae6fff 00017000

    * ACTIVEDS 04af0000 04b1efff 0002f000

    * ADSLDPC 04b20000 04b42fff 00023000

    * RTUTILS 04b50000 04b5dfff 0000e000

    * SETUPAPI 04b60000 04bedfff 0008e000

    * RASAPI32 04bf0000 04c22fff 00033000

    * RASMAN 04c30000 04c40fff 00011000

    * TAPI32 04c50000 04c71fff 00022000

    * DHCPCSVC 04c80000 04c98fff 00019000

    * winrnr 04d30000 04d37fff 00008000

    * rasadhlp 04d40000 04d44fff 00005000

    * msafd 05400000 0541dfff 0001e000

    * wshtcpip 05460000 05466fff 00007000

    * mswsock 05570000 05581fff 00012000

    * SQLRGSTR 05c50000 05c54fff 00005000

    * sqlmap70 05ce0000 05cf5fff 00016000

    * ntwdblib 05d00000 05d43fff 00044000

    * MAPI32 05de0000 05e00fff 00021000

    * msoe 05e10000 05f2dfff 0011e000

    * MSOERT2 05f30000 05f48fff 00019000

    * MSOEACCT 05f50000 05f7ffff 00030000

    * INETCOMM 05f80000 0600efff 0008f000

    * acctres 06090000 060a0fff 00011000

    * inetres 060b0000 060bdfff 0000e000

    * msoeres 060c0000 061a0fff 000e1000

    * SHDOCVW 061b0000 062cbfff 0011c000

    * WININET 062d0000 06348fff 00079000

    * CLBCATQ 06380000 0640ffff 00090000

    * msident 06520000 0652cfff 0000d000

    * msidntld 06530000 06535fff 00006000

    * directdb 06540000 06550fff 00011000

    * PSTOREC 06560000 0656bfff 0000c000

    * ATL 06570000 06584fff 00015000

    * mlang 06790000 06817fff 00088000

    * xpsqlbot 07480000 07485fff 00006000

    * sqlboot 07490000 07497fff 00008000

    * xpstar 074a0000 074d1fff 00032000

    * SQLWID 074e0000 074e5fff 00006000

    * SQLSVC 074f0000 07508fff 00019000

    * odbcbcp 07510000 07515fff 00006000

    * SQLRESLD 07520000 07525fff 00006000

    * W95SCM 07530000 07537fff 00008000

    * SQLSVC 07540000 07545fff 00006000

    * xpsql70 07600000 07609fff 0000a000

    * sqloledb 07c60000 07ce3fff 00084000

    * oledb32 07eb0000 07f25fff 00076000

    * MSDART32 07f30000 07f35fff 00006000

    * OLEDB32R 08080000 0808ffff 00010000

    * security 08120000 08123fff 00004000

    * msv1_0 08130000 08150fff 00021000

    * CRYPT32 08160000 081e6fff 00087000

    * MSASN1 081f0000 081fffff 00010000

    * imagehlp 09270000 09292fff 00023000

    * DBGHELP 093e0000 0940cfff 0002d000

    * sqlimage 0a1e0000 0a20cfff 0002d000

    *

    * Edi: 000100A7: 41004300 5f004900 41004300 00006800 00000001 3ad2e700

    * Esi: 3AD2E3F0: 00000000 3b105400 302e6c78 706b626d 322e726f 77703234

    * Eax: 00000001:

    * Ebx: 3AD2E45C: 3ad2e1a0 020100a7 00000000 00000001 007a1764 00000001

    * Ecx: 3AD2E700: 00000009 3ad2e2f0 000100a7 00000000 00000001 007a1764

    * Edx: 00000001:

    * Eip: 4106A75E: 0cc25d5b 5e5f0000 0001b800 03c6c5eb 00000314 be893889

    * Ebp: 056CFF10: 77f82ad0 3ad2e424 00000000 3ad2e3f0 41065db0 056cff7c

    * SegCs: 0000001B:

    * EFlags: 00010212: 006f0064 006e0069 0057003d 0053004f 00000032 003d0053

    * Esp: 056CFF04: 3ad2e3f0 41065db0 056cff7c 41091d73 302e6c78 3ad2e3f0

    * SegSs: 00000023:

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x4106a75e Module(opends60+a75e) (net_completionroutine+70)

    0x41065db0 Module(opends60+5db0) (net_readdata+121)

    0x78008454 Module(MSVCRT+8454) (endthread+c1)

    0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    -------------------------------------------------------------------------------

    Location : 0x4106a75e Module(opends60+a75e) (net_completionroutine+70)

    Return Addr: 0x41065db0 Module(opends60+5db0) (net_readdata+121)

    Frame : 056cff10

    Parameters:

    [1] 3AD2E3F0: 00000000 3b105400 302e6c78 706b626d 322e726f 77703234

    [2] 00000000:

    [3] 3AD2E424: 3f800000 00000009 3ad2e180 000100a7 00000000 00000000

    [4] 77F82AD0: c22ecd04 24548d00 000047b8 77fb778d 77fb7789 ffffffff

    160 bytes of stack data from 056cfe70 to 056cff10

    056cfe70: 00d80178 00000000 00000003 04dd0000 [x...............]

    056cfe80: 7c5d3028 00000409 00000000 7c5d6a28 [(0]|........(j]|]

    056cfe90: 00101420 00000058 00000000 00007fd8 [ ...X...........]

    056cfea0: 00007fd8 0537f294 77f81f55 77f82518 [......7.U..w.%.w]

    056cfeb0: ffffffff 0537f2a4 7c57374e 000b01b8 [......7.N7W|....]

    056cfec0: 000b01b8 00000001 00000001 000b01b8 [................]

    056cfed0: 00101418 00101420 000b0188 000b0188 [.... ...........]

    056cfee0: 00d80178 00d80178 00d80178 00d80178 [x...x...x...x...]

    056cfef0: 00000000 00000010 000b0198 00000010 [................]

    056cff00: 000b01d8 3ad2e3f0 302e6c78 41091d73 [.......:xl.0s..A]

    -------------------------------------------------------------------------------

    Location : 0x41065db0 Module(opends60+5db0) (net_readdata+121)

    Return Addr: 0x78008454 Module(MSVCRT+8454) (endthread+c1)

    Frame : 056cff7c

    Parameters:

    [1] 00109A98: 00109ae8 00108fe0 00080100 00020002 00000000 41099000

    [2] 77F82AD0: c22ecd04 24548d00 000047b8 77fb778d 77fb7789 ffffffff

    [3] FFFFFFFF:

    [4] 04DD5F38: 00000001 00000000 00000000 00000009 000005c0 00001368

    108 bytes of stack data from 056cff10 to 056cff7c

    056cff10: 056cff7c 41065db0 3ad2e3f0 00000000 [|.l..].A...:....]

    056cff20: 3ad2e424 77f82ad0 04dd5f38 04dd5f38 [$..:.*.w8_..8_..]

    056cff30: 00d88220 00d88220 0000006d 3ad2e3f0 [ ... ...m......:]

    056cff40: 88618020 886181b0 302e6c78 88618020 [ .a...a.xl.0 .a.]

    056cff50: 3ad2e424 000d9550 00000000 3ad2e3f0 [$............:]

    056cff60: 000b7338 056cff24 056cfb50 056cffa4 [8s..$.l.P.l...l.]

    056cff70: 4107d722 4107e230 00000000 ["..A0..A....]

    -------------------------------------------------------------------------------

    Location : 0x78008454 Module(MSVCRT+8454) (endthread+c1)

    Return Addr: 0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Frame : 056cffb4

    Parameters:

    [1] 04DD5F38: 00000001 00000000 00000000 00000009 000005c0 00001368

    [2] 77F82AD0: c22ecd04 24548d00 000047b8 77fb778d 77fb7789 ffffffff

    [3] FFFFFFFF:

    [4] 04DD5F38: 00000001 00000000 00000000 00000009 000005c0 00001368

    56 bytes of stack data from 056cff7c to 056cffb4

    056cff7c: 056cffb4 78008454 00109a98 77f82ad0 [..l.T..x.....*.w]

    056cff8c: ffffffff 04dd5f38 8042fb1b 888e0200 [....8_....B.....]

    056cff9c: 056cff88 ffffffff 056cffdc 7800bd6a [..l.......l.j..x]

    056cffac: 78032f10 00000000 [./.x....]

    -------------------------------------------------------------------------------

    Location : 0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Return Addr: 0x00000000 Module(sqlservr+ffc00000)

    Frame : 056cffec

    Parameters:

    [1] 00000000:

    [2] 00000000:

    [3] 00000000:

    [4] 00000000:

    -------------------------------------------------------------------------------

    Dump thread - spid = 1, PSS = 0x411da084, EC = 0x411da234

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:16 spid 1

    *

    *

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x77f82870 Module(ntdll+2870) (NtWaitForSingleObject+b)

    0x41092bd7 Module(ums+2bd7) (UmsThreadScheduler::Switch+59)

    0x41091796 Module(ums+1796) (UmsScheduler::Suspend+b2)

    0x41091614 Module(ums+1614) (UmsEvent::Wait+85)

    0x004a6091 Module(sqlservr+a6091) (SignalProc+be)

    0x004a65eb Module(sqlservr+a65eb) (init_routine+49f)

    0x41092a15 Module(ums+2a15) (ProcessWorkRequests+ed)

    0x410932cb Module(ums+32cb) (ThreadStartRoutine+139)

    0x78008454 Module(MSVCRT+8454) (endthread+c1)

    0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Dump thread - spid = 2, PSS = 0x4122c084, EC = 0x4122c234

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:16 spid 2

    *

    *

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x77f82870 Module(ntdll+2870) (NtWaitForSingleObject+b)

    0x41092bd7 Module(ums+2bd7) (UmsThreadScheduler::Switch+59)

    0x41091723 Module(ums+1723) (UmsScheduler::Suspend+e3)

    0x41091614 Module(ums+1614) (UmsEvent::Wait+85)

    0x00401479 Module(sqlservr+1479) (ExecutionContext::WaitForSignal+192)

    0x00401738 Module(sqlservr+1738) (ResQueueBase::Wait+36)

    0x00401650 Module(sqlservr+1650) (ResQueueBase:equeue+6d)

    0x004a7e2e Module(sqlservr+a7e2e) (lockMonitor+e8)

    0x004a7bf4 Module(sqlservr+a7bf4) (lockMonitorThread+a7)

    0x41092a15 Module(ums+2a15) (ProcessWorkRequests+ed)

    0x410932cb Module(ums+32cb) (ThreadStartRoutine+139)

    0x78008454 Module(MSVCRT+8454) (endthread+c1)

    0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Dump thread - spid = 3, PSS = 0x4122e084, EC = 0x4122e234

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:17 spid 3

    *

    *

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x77f82870 Module(ntdll+2870) (NtWaitForSingleObject+b)

    0x41092bd7 Module(ums+2bd7) (UmsThreadScheduler::Switch+59)

    0x41091723 Module(ums+1723) (UmsScheduler::Suspend+e3)

    0x41091614 Module(ums+1614) (UmsEvent::Wait+85)

    0x00401479 Module(sqlservr+1479) (ExecutionContext::WaitForSignal+192)

    0x00401738 Module(sqlservr+1738) (ResQueueBase::Wait+36)

    0x00401650 Module(sqlservr+1650) (ResQueueBase:equeue+6d)

    0x004ab0db Module(sqlservr+ab0db) (LogMgr::LogWriter+8a)

    0x41092a15 Module(ums+2a15) (ProcessWorkRequests+ed)

    0x410932cb Module(ums+32cb) (ThreadStartRoutine+139)

    0x78008454 Module(MSVCRT+8454) (endthread+c1)

    0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Dump thread - spid = 4, PSS = 0x4125c084, EC = 0x4125c234

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:17 spid 4

    *

    *

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x77f82870 Module(ntdll+2870) (NtWaitForSingleObject+b)

    0x41092bd7 Module(ums+2bd7) (UmsThreadScheduler::Switch+59)

    0x41091796 Module(ums+1796) (UmsScheduler::Suspend+b2)

    0x41091614 Module(ums+1614) (UmsEvent::Wait+85)

    0x00401479 Module(sqlservr+1479) (ExecutionContext::WaitForSignal+192)

    0x004ab69d Module(sqlservr+ab69d) (BPool::LazyWriter+dd)

    0x004ab60d Module(sqlservr+ab60d) (lazywriter+f5)

    0x41092a15 Module(ums+2a15) (ProcessWorkRequests+ed)

    0x410932cb Module(ums+32cb) (ThreadStartRoutine+139)

    0x78008454 Module(MSVCRT+8454) (endthread+c1)

    0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Dump thread - spid = 6, PSS = 0x4127e084, EC = 0x4127e234

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:18 spid 6

    *

    *

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x77f82870 Module(ntdll+2870) (NtWaitForSingleObject+b)

    0x41092bd7 Module(ums+2bd7) (UmsThreadScheduler::Switch+59)

    0x41091723 Module(ums+1723) (UmsScheduler::Suspend+e3)

    0x41091614 Module(ums+1614) (UmsEvent::Wait+85)

    0x00401479 Module(sqlservr+1479) (ExecutionContext::WaitForSignal+192)

    0x00401738 Module(sqlservr+1738) (ResQueueBase::Wait+36)

    0x00401650 Module(sqlservr+1650) (ResQueueBase:equeue+6d)

    0x004afca6 Module(sqlservr+afca6) (ckptproc+f0)

    0x41092a15 Module(ums+2a15) (ProcessWorkRequests+ed)

    0x410932cb Module(ums+32cb) (ThreadStartRoutine+139)

    0x78008454 Module(MSVCRT+8454) (endthread+c1)

    0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Dump thread - spid = 7, PSS = 0x412f6084, EC = 0x412f6234

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:18 spid 7

    *

    *

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x77f82870 Module(ntdll+2870) (NtWaitForSingleObject+b)

    0x41092bd7 Module(ums+2bd7) (UmsThreadScheduler::Switch+59)

    0x41091796 Module(ums+1796) (UmsScheduler::Suspend+b2)

    0x004a5f97 Module(sqlservr+a5f97) (GlobalTskMgrProc+14a)

    0x41092a15 Module(ums+2a15) (ProcessWorkRequests+ed)

    0x410932cb Module(ums+32cb) (ThreadStartRoutine+139)

    0x78008454 Module(MSVCRT+8454) (endthread+c1)

    0x7c57438b Module(KERNEL32+438b) (TlsSetValue+f0)

    Unable to get thread context for spid 8

    Dump thread - spid = 9, PSS = 0x3d917168, EC = 0x3d917318

    Stack Dump being sent to e:\MSSQL7\log\SQL00016.dmp

    *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 03/30/05 02:19:18 spid 9

    *

    * Input Buffer 170 bytes -

    * x p _ c m d s h e l l ' c o p y e : \ S Q L D u m p s \ A R I B A \

    * a r i b a _ d i f f e r e n t i a l . b a k e : \ S Q L D u m p s \ A

    * R I B A \ A r i b a \ . '

    *

    *******************************************************************************

    -------------------------------------------------------------------------------

    Short Stack Dump

    0x77f82926 Module(ntdll+2926) (NtReadFile+b)

    0x07601c18 Module(xpsql70+1c18) (xp_cmdshell+b9c)

    0x006145a4 Module(sqlservr+2145a4) (FCallRpcDLL+2a5)

    0x00601e7f Module(sqlservr+201e7f) (CXProc::Execute+12f)

    0x005349d8 Module(sqlservr+1349d8) (CSQLSource::Execute+2ab)

    0x0046225f Module(sqlservr+6225f) (CStmtExec::XretLocalExec+127)

    0x0046211e Module(sqlservr+6211e) (CStmtExec::XretExecute+253)

    0x0040f487 Module(sqlservr+f487) (CMsqlExecContext::ExecuteStmts+11b)

    0x0040ef35 Module(sqlservr+ef35) (CMsqlExecContext::Execute+16b)

    Unable to get thread context for spid 10

    Unable to get thread context for spid 11

    Unable to get thread context for spid 12

    Unable to get thread context for spid 13

    Unable to get thread context for spid 14

    Unable to get thread context for spid 15

    Unable to get thread context for spid 16

    Unable to get thread context for spid 17

    Unable to get thread context for spid 18

    Unable to get thread context for spid 19

    Unable to get thread context for spid 20

    Unable to get thread context for spid 21

    Unable to get thread context for spid 22

    Unable to get thread context for spid 23

    Unable to get thread context for spid 24

    Unable to get thread context for spid 25

    Unable to get thread context for spid 26

    Unable to get thread context for spid 27

    Unable to get thread context for spid 28

    Any help would be greatly appreciated

    Regards,

    Phani

  • Per the top of the bug check, you aren't expected to find the source of the error.  This is a SQL Server crash, and Microsoft is requesting that you send it to them for debugging -

    "This file is generated by Microsoft SQL Server 1792.961

    upon detection of fatal unexpected error. Please return this file,

    the query or program that produced the bugcheck, the database and

    the error log, and any other pertinent information with a Service Request. "

    Steve

  • Do you know if there is a way to make SQL not create these dump files?

    Some of the ones it creates are 0.5GB+ and they take up a lot of disk space.

    The Redneck DBA

  • did you ever solve that issue, i am having the same error

Viewing 4 posts - 1 through 3 (of 3 total)

You must be logged in to reply to this topic. Login to reply