February 4, 2011 at 3:23 am
=====================================================================
BugCheck Dump
=====================================================================
This file is generated by Microsoft SQL Server
version 9.00.4230.00
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.
Computer type is AT/AT COMPATIBLE.
Current time is 15:06:29 02/03/11.
16 Unknown CPU 9., 2267 Mhz processor (s).
Windows NT 5.2 Build 3790 CSD Service Pack 2.
Memory
MemoryLoad = 96%
Total Physical = 32757 MB
Available Physical = 1221 MB
Total Page File = 99020 MB
Available Page File = 67746 MB
Total Virtual = 8388607 MB
Available Virtual = 8354973 MB
***Stack Dump being sent to F:\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\SQLDump0191.txt
SqlDumpExceptionHandler: Process 17 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is
terminating this process.
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 02/03/11 15:06:29 spid 17
*
*
* Exception Address = 0000000001C5C664 Module(sqlservr+0000000000C5C664)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred writing address 0000000000000020
*
*
* MODULE BASE END SIZE
* sqlservr 0000000001000000 0000000003661FFF 02662000
* ntdll 0000000077EC0000 0000000077FF8FFF 00139000
* kernel32 0000000077D40000 0000000077EB2FFF 00173000
* MSVCR80 0000000078130000 00000000781F8FFF 000c9000
* msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000
* MSVCP80 000000007C420000 000000007C528FFF 00109000
* ADVAPI32 000007FF7FEE0000 000007FF7FFE4FFF 00105000
* RPCRT4 000007FF7FD30000 000007FF7FECFFFF 001a0000
* Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000
* sqlos 00000000344D0000 00000000344D6FFF 00007000
* USERENV 000007FF7C680000 000007FF7C789FFF 0010a000
* USER32 0000000077C20000 0000000077D2BFFF 0010c000
* GDI32 000007FF7FC90000 000007FF7FD2AFFF 0009b000
* WINMM 000007FF7E240000 000007FF7E28FFFF 00050000
* opends60 00000000333E0000 00000000333E7FFF 00008000
* NETAPI32 000007FF77370000 000007FF77408FFF 00099000
* psapi 000007FF7E380000 000007FF7E38FFFF 00010000
* instapi 0000000048060000 000000004806CFFF 0000d000
* CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000
* ole32 000007FF57140000 000007FF573C4FFF 00285000
* OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000
* RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000
* sqlevn70 000000004F610000 000000004F7B8FFF 001a9000
* rsaenh 0000000068000000 000000006804BFFF 0004c000
* AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000
* MSCOREE 000006427EE60000 000006427EED3FFF 00074000
* msv1_0 000007FF7E500000 000007FF7E543FFF 00044000
* WS2_32 000007FF77310000 000007FF7733FFFF 00030000
* WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000
* iphlpapi 000007FF57040000 000007FF57070FFF 00031000
* kerberos 000007FF77410000 000007FF774C3FFF 000b4000
* cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000
* MSASN1 000007FF7D340000 000007FF7D369FFF 0002a000
* schannel 000007FF7DD50000 000007FF7DD90FFF 00041000
* CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000
* COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000
* XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000
* MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000
* msvcp60 000000001B180000 000000001B269FFF 000ea000
* MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000
* VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000
* WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000
* mswsock 000007FF771B0000 000007FF7722CFFF 0007d000
* DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000
* winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000
* WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000
* rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000
* hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000
* wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000
* security 000007FF77530000 000007FF77534FFF 00005000
* msfte 0000000049980000 0000000049D30FFF 003b1000
* dbghelp 000000001DE40000 000000001DF9CFFF 0015d000
* WINTRUST 000007FF7E3E0000 000007FF7E42DFFF 0004e000
* imagehlp 000007FF7E470000 000007FF7E482FFF 00013000
* dssenh 0000000068100000 000000006813EFFF 0003f000
* NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000
* SAMLIB 000007FF77150000 000007FF77165FFF 00016000
* ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000
* xpsp2res 00000000207E0000 0000000020AA6FFF 002c7000
* CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000
* sqlncli 00000000337A0000 0000000033A63FFF 002c4000
* COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000
* comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000
* SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000
* SHELL32 000007FF7F190000 000007FF7FB99FFF 00a0a000
* comctl32 000007FF7F000000 000007FF7F186FFF 00187000
* SQLNCLIR 0000000035000000 0000000035032FFF 00033000
* msftepxy 00000000039E0000 0000000003A00FFF 00021000
* xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000
* xpstar90 0000000053C30000 0000000053CB7FFF 00088000
* SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000
* ODBC32 000007FF63F00000 000007FF63F66FFF 00067000
* BatchParser90 00000000520C0000 00000000520ECFFF 0002d000
* ATL80 000000007C630000 000000007C64EFFF 0001f000
* odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000
* xpstar90 0000000029F70000 0000000029F95FFF 00026000
* xplog70 0000000034730000 000000003473FFFF 00010000
* xplog70 000000002A000000 000000002A002FFF 00003000
* odsole70 0000000033380000 0000000033397FFF 00018000
* wbemprox 000007FF7B070000 000007FF7B07CFFF 0000d000
* wbemcomn 000007FF7B7E0000 000007FF7B864FFF 00085000
* SXS 000007FF7CC60000 000007FF7CE46FFF 001e7000
* wmiutils 000007FF7B400000 000007FF7B42EFFF 0002f000
* wbemsvc 000007FF7B050000 000007FF7B061FFF 00012000
* fastprox 000007FF7C030000 000007FF7C10BFFF 000dc000
* scrrun 000007FF79170000 000007FF791B4FFF 00045000
* MFC42 000007FF796F0000 000007FF79859FFF 0016a000
* xpweb90 0000000053E30000 0000000053E4AFFF 0001b000
* WININET 000007FF7D200000 000007FF7D32AFFF 0012b000
* xpweb90 0000000003690000 0000000003695FFF 00006000
* mlang 000007FF7A4C0000 000007FF7A56EFFF 000af000
* mpr 000007FF772D0000 000007FF772F0FFF 00021000
* msxmlsql 0000000078800000 0000000078967FFF 00168000
* msxml3 000007FF56D40000 000007FF56F57FFF 00218000
*
* P1Home: FFFFFADD40389D90:
* P2Home: 0000000027D5DB90: FFFFFADD40389D90 0000000027D5DB90 0000000000000000 000000065D29AB40 00000000
00000002 FFFFFADD40389D90
* P3Home: 0000000000000000:
* P4Home: 000000065D29AB40: 000000000163F950 000000043A6635E0 000000043A663590 00000003644C4800 00000006
5D29AB90 000000065D29ABB0
* P5Home: 0000000000000002:
* P6Home: FFFFFADD40389D90:
* ContextFlags: 000000000010001F:
* MxCsr: 0000000000001FB0:
* SegCs: 0000000000000033:
* SegDs: 000000000000002B:
* SegEs: 000000000000002B:
* SegFs: 0000000000000053:
* SegGs: 000000000000002B:
* SegSs: 000000000000002B:
* EFlags: 0000000000010206: 0045004400000065 0047004F004C0046 003D005200490044 0044005C003A0043 006D0075
0063006F 00730074006E0065
* Rax: 0000000000000000:
* Rcx: 00000000802D22B0: 00000000802D2080 0000128500262AA3 0000129700001295 0000128800001293 00000000
802D2350 000000FF00000100
* Rdx: 0000000000000000:
* Rbx: 0000000000000000:
* Rsp: 0000000027D5E130: 0000000100004CE8 0000000000040EC6 00000000802D22B0 00000000802D22B0 00000000
00000000 000000000212EC87
* Rbp: 000000065D29AB40: 000000000163F950 000000043A6635E0 000000043A663590 00000003644C4800 00000006
5D29AB90 000000065D29ABB0
* Rsi: 00000000802D22B0: 00000000802D2080 0000128500262AA3 0000129700001295 0000128800001293 00000000
802D2350 000000FF00000100
* Rdi: 00000000802D22B0: 00000000802D2080 0000128500262AA3 0000129700001295 0000128800001293 00000000
802D2350 000000FF00000100
* R8: 0000000027D5E188: 00000000802D3700 4887506900000002 0000000100004CE8 000000065D292AD8 00000000
00000000 0000000027D5E230
* R9: 0000000000000000:
* R10: 0000000000000000:
* R11: 00000000000000D2:
* R12: 0000000027D5E4A0: 0000000000102B00 0000000000000002 2121212121210000 00000003644C5290 00000000
00100000 0000000048875069
* R13: 0000000001000000: 0000000300905A4D 0000FFFF00000004 00000000000000B8 0000000000000040 00000000
00000000 0000000000000000
* R14: 0000000001635650: 10498B4C38EC8348 247C894820418B48 498B450C418B4558 148B4E207A8D4818 A0988B4C
028B49C0 FD9E058D48000000
* R15: 0000000001635180: 10498B4C38EC8348 247C894820418B48 498B450C418B4558 C0148B4EFA8B4818 00A0988B
4C028B49 00026F058D480000
* Rip: 0000000001C5C664: D28B44FF20418341 C98B493775C18B4C 74C085FFEF6347E8 08518B49018B492B 49028948
08508948 49000000000841C7
* *******************************************************************************
* -------------------------------------------------------------------------------
* Short Stack Dump
0000000001C5C664 Module(sqlservr+0000000000C5C664)
000000000212EC87 Module(sqlservr+000000000112EC87)
000000000213E88A Module(sqlservr+000000000113E88A)
0000000002145106 Module(sqlservr+0000000001145106)
00000000021D1888 Module(sqlservr+00000000011D1888)
0000000002316B32 Module(sqlservr+0000000001316B32)
00000000023174C3 Module(sqlservr+00000000013174C3)
000000000163C723 Module(sqlservr+000000000063C723)
000000000163FFD4 Module(sqlservr+000000000063FFD4)
000000000162B791 Module(sqlservr+000000000062B791)
000000000161E5FC Module(sqlservr+000000000061E5FC)
0000000001663899 Module(sqlservr+0000000000663899)
0000000001669E8D Module(sqlservr+0000000000669E8D)
0000000001AFFAD6 Module(sqlservr+0000000000AFFAD6)
0000000001742ACA Module(sqlservr+0000000000742ACA)
000000000171C7D5 Module(sqlservr+000000000071C7D5)
00000000016DA8A5 Module(sqlservr+00000000006DA8A5)
00000000016B0BCE Module(sqlservr+00000000006B0BCE)
00000000016FC574 Module(sqlservr+00000000006FC574)
000000000167139E Module(sqlservr+000000000067139E)
0000000001670B89 Module(sqlservr+0000000000670B89)
0000000001676CA4 Module(sqlservr+0000000000676CA4)
00000000017AFCB7 Module(sqlservr+00000000007AFCB7)
00000000014C5A79 Module(sqlservr+00000000004C5A79)
00000000017B02C0 Module(sqlservr+00000000007B02C0)
00000000017F9B88 Module(sqlservr+00000000007F9B88)
00000000781337D7 Module(MSVCR80+00000000000037D7)
0000000078133894 Module(MSVCR80+0000000000003894)
0000000077D6B6DA Module(kernel32+000000000002B6DA)
PSS @0x00000003B1A3EB60
-----------------------
CSession @0x00000003B1A3E2B0
----------------------------
m_spid = 17 m_cRef = 5 m_rgcRefType[0] = 1
m_rgcRefType[1] = 0 m_rgcRefType[2] = 2 m_rgcRefType[3] = 1
m_rgcRefType[4] = 0 m_rgcRefType[5] = 1 m_pmo = 0x00000003B1A3E080
m_pstackBhfPool = 0x0000000000000000 m_dwLoginFlags = 0x0000 m_fBackground = -1
m_fClientRequestConnReset = 0 m_fUserProc = 0 m_fConnReset = 0
m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 0
m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0
m_ulLoginStamp = 38625 m_eclClient = 5 m_protType = 0
m_hHttpToken = FFFFFFFFFFFFFFFF
m_pV7LoginRec
---------------------
0000000000000000: 00000000 00000000 00000000 00000000 00000000 †....................
0000000000000014: 00000000 00000000 00000000 00000000 00000000 †....................
0000000000000028: 00000000 00000000 00000000 00000000 00000000 †....................
000000000000003C: 00000000 00000000 00000000 00000000 00000000 †....................
0000000000000050: 00000000 00000000 00000000 0000†††††††††††††††..............
CBatch @0x00000003B1A3F1E0
--------------------------
m_pSess = 0x00000003B1A3E2B0 m_pConn = 0x00000003B1A3EA50 m_cRef = 2
m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 0
m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x0000000003C45048
EXCEPT (null) @0x0000000027D5B058
---------------------------------
exc_number = 0 exc_severity = 0 exc_func = 0x0000000001B13010
Task @0x0000000003C45048
------------------------
CPU Ticks used (ms) = 53 Task State = 2
WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0
WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0xe
ThreadId = 0x1078 m_state = 0 m_eAbortSev = 0
EC @0x00000003B1A3EB70
----------------------
spid = 17 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x0 ec_atomic = 0x0 __fSubProc = 1
ec_dbccContext = 0x0000000000000000 __pSETLS = 0x00000003B1A3EAC0 __pSEParams = 0x0000000027D5F620
__pDbLocks = 0x0000000000000000
SEInternalTLS @0x00000003B1A3EAC0
---------------------------------
m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x0000000003C45048
m_activeHeapDatasetList = 0x00000003B1A3EAC0
m_activeIndexDatasetList = 0x00000003B1A3EAD0
SEParams @0x0000000027D5F620
----------------------------
m_lockTimeout = -1 m_isoLevel = 4096 m_logDontReplicate = 1
m_neverReplicate = 1 m_XactWorkspace = 0x00000006060C3090
m_pSessionLocks = 0x0000000027D5F720 m_pDbLocks = 0x0000000027D5FA20
m_execStats = 0x00000000804783F0 m_pAllocFileLimit = 0x0000000000000000
May 4, 2011 at 12:02 pm
What are you doing when this error occurs?
Could you please provide additional information?
For better, quicker answers on T-SQL questions, click on the following...
http://www.sqlservercentral.com/articles/Best+Practices/61537/
For better answers on performance questions, click on the following...
http://www.sqlservercentral.com/articles/SQLServerCentral/66909/
May 4, 2011 at 12:14 pm
Call customer support and open a case. They have the tools to investigate stack dumps, we don't.
Gail Shaw
Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)
SQL In The Wild: Discussions on DB performance with occasional diversions into recoverability
May 7, 2011 at 12:10 pm
i cant tell you its just gets generated any time.
May 7, 2011 at 12:12 pm
can you help me regarding this how to post this on microsoft site
May 7, 2011 at 12:21 pm
Not post. Call customer support. Unless it's a new bug they will charge you for the call.
http://support.microsoft.com/kb/295539
Gail Shaw
Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)
SQL In The Wild: Discussions on DB performance with occasional diversions into recoverability
Viewing 6 posts - 1 through 5 (of 5 total)
You must be logged in to reply to this topic. Login to reply