Stack Dump Issues

  • So started getting a whole lot of failed jobs in the last 24 hours. Like most of us, I start checking the error logs to see what is going on. SUPRISE! I can't access the error logs through SSMS. I actually get a stack dump every time I try. In reviewing the jobs, they try to read the error logs, so I am currently making the assumption that is why they are failing.

    So I come to you, as I have never dealt with a Stack Dump before (lucky me). Below is a copy of what the dump says when I open a copy of the Error Log in good old Notepad.

    This is the stack dump I recieve when I try to access the error logs via SSMS.

    2010-06-21 08:25:06.76 spid138 Using 'dbghelp.dll' version '4.0.5'

    2010-06-21 08:25:06.76 spid138 ***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\SQLDump0112.txt

    2010-06-21 08:25:06.76 spid138 SqlDumpExceptionHandler: Process 138 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.

    2010-06-21 08:25:06.76 spid138 * *******************************************************************************

    2010-06-21 08:25:06.76 spid138 *

    2010-06-21 08:25:06.76 spid138 * BEGIN STACK DUMP:

    2010-06-21 08:25:06.76 spid138 * 06/21/10 08:25:06 spid 138

    2010-06-21 08:25:06.76 spid138 *

    2010-06-21 08:25:06.76 spid138 *

    2010-06-21 08:25:06.76 spid138 * Exception Address = 000007FF7FC51D71 Module(msvcrt+0000000000051D71)

    2010-06-21 08:25:06.76 spid138 * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION

    2010-06-21 08:25:06.76 spid138 * Access Violation occurred reading address 0000000000000000

    2010-06-21 08:25:06.76 spid138 * Input Buffer 68 bytes -

    2010-06-21 08:25:06.76 spid138 * exec Util_CycleErrorLog

    2010-06-21 08:25:06.76 spid138 *

    2010-06-21 08:25:06.76 spid138 *

    2010-06-21 08:25:06.76 spid138 * MODULE BASE END SIZE

    2010-06-21 08:25:06.76 spid138 * sqlservr 0000000001000000 0000000003651FFF 02652000

    2010-06-21 08:25:06.76 spid138 * ntdll 0000000077EC0000 0000000077FFAFFF 0013b000

    2010-06-21 08:25:06.76 spid138 * kernel32 0000000077D40000 0000000077EB2FFF 00173000

    2010-06-21 08:25:06.76 spid138 * MSVCR80 0000000078130000 00000000781F8FFF 000c9000

    2010-06-21 08:25:06.76 spid138 * msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000

    2010-06-21 08:25:06.76 spid138 * MSVCP80 000000007C420000 000000007C528FFF 00109000

    2010-06-21 08:25:06.76 spid138 * ADVAPI32 000007FF7FEE0000 000007FF7FFE5FFF 00106000

    2010-06-21 08:25:06.76 spid138 * RPCRT4 000007FF7FD30000 000007FF7FEC8FFF 00199000

    2010-06-21 08:25:06.76 spid138 * Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000

    2010-06-21 08:25:06.76 spid138 * sqlos 00000000344D0000 00000000344D6FFF 00007000

    2010-06-21 08:25:06.76 spid138 * USERENV 000007FF7C680000 000007FF7C789FFF 0010a000

    2010-06-21 08:25:06.76 spid138 * USER32 0000000077C20000 0000000077D2BFFF 0010c000

    2010-06-21 08:25:06.76 spid138 * GDI32 000007FF7FC90000 000007FF7FD2BFFF 0009c000

    2010-06-21 08:25:06.76 spid138 * WINMM 000007FF7E240000 000007FF7E28FFFF 00050000

    2010-06-21 08:25:06.76 spid138 * opends60 00000000333E0000 00000000333E7FFF 00008000

    2010-06-21 08:25:06.76 spid138 * NETAPI32 000007FF77370000 000007FF77408FFF 00099000

    2010-06-21 08:25:06.76 spid138 * rdpsnd 000007FF77100000 000007FF7710AFFF 0000b000

    2010-06-21 08:25:06.76 spid138 * WINSTA 000007FF7D4D0000 000007FF7D4E9FFF 0001a000

    2010-06-21 08:25:06.76 spid138 * PSAPI 000007FF7E380000 000007FF7E38FFFF 00010000

    2010-06-21 08:25:06.76 spid138 * instapi 0000000048060000 000000004806CFFF 0000d000

    2010-06-21 08:25:06.76 spid138 * sqlevn70 000000004F610000 000000004F7B8FFF 001a9000

    2010-06-21 08:25:06.76 spid138 * rsaenh 0000000068000000 000000006804BFFF 0004c000

    2010-06-21 08:25:06.76 spid138 * AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000

    2010-06-21 08:25:06.76 spid138 * MSCOREE 000006427EE50000 000006427EEB5FFF 00066000

    2010-06-21 08:25:06.76 spid138 * ole32 000007FF57140000 000007FF573C4FFF 00285000

    2010-06-21 08:25:06.76 spid138 * msv1_0 000007FF7E500000 000007FF7E544FFF 00045000

    2010-06-21 08:25:06.76 spid138 * cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000

    2010-06-21 08:25:06.76 spid138 * WS2_32 000007FF77310000 000007FF7733FFFF 00030000

    2010-06-21 08:25:06.76 spid138 * WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000

    2010-06-21 08:25:06.76 spid138 * iphlpapi 000007FF57040000 000007FF57070FFF 00031000

    2010-06-21 08:25:06.76 spid138 * kerberos 000007FF77410000 000007FF774C4FFF 000b5000

    2010-06-21 08:25:06.76 spid138 * MSASN1 000007FF7D340000 000007FF7D36BFFF 0002c000

    2010-06-21 08:25:06.76 spid138 * schannel 000007FF7DD50000 000007FF7DD91FFF 00042000

    2010-06-21 08:25:06.76 spid138 * CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000

    2010-06-21 08:25:06.76 spid138 * COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000

    2010-06-21 08:25:06.76 spid138 * XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000

    2010-06-21 08:25:06.76 spid138 * MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000

    2010-06-21 08:25:06.76 spid138 * OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000

    2010-06-21 08:25:06.76 spid138 * msvcp60 000000001E270000 000000001E359FFF 000ea000

    2010-06-21 08:25:06.76 spid138 * MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000

    2010-06-21 08:25:06.76 spid138 * VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000

    2010-06-21 08:25:06.76 spid138 * WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000

    2010-06-21 08:25:06.76 spid138 * CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000

    2010-06-21 08:25:06.76 spid138 * RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000

    2010-06-21 08:25:06.76 spid138 * mswsock 000007FF771B0000 000007FF7722CFFF 0007d000

    2010-06-21 08:25:06.76 spid138 * DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000

    2010-06-21 08:25:06.76 spid138 * winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000

    2010-06-21 08:25:06.76 spid138 * WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000

    2010-06-21 08:25:06.76 spid138 * rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000

    2010-06-21 08:25:06.76 spid138 * security 000007FF77530000 000007FF77534FFF 00005000

    2010-06-21 08:25:06.76 spid138 * msfte 0000000049980000 0000000049D2DFFF 003ae000

    2010-06-21 08:25:06.76 spid138 * dbghelp 0000000020610000 000000002076CFFF 0015d000

    2010-06-21 08:25:06.76 spid138 * WINTRUST 000007FF7E3E0000 000007FF7E42DFFF 0004e000

    2010-06-21 08:25:06.76 spid138 * imagehlp 000007FF7E470000 000007FF7E482FFF 00013000

    2010-06-21 08:25:06.76 spid138 * dssenh 0000000068100000 000000006813EFFF 0003f000

    2010-06-21 08:25:06.76 spid138 * hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000

    2010-06-21 08:25:06.76 spid138 * wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000

    2010-06-21 08:25:06.76 spid138 * NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000

    2010-06-21 08:25:06.76 spid138 * SAMLIB 000007FF77150000 000007FF77165FFF 00016000

    2010-06-21 08:25:06.76 spid138 * ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000

    2010-06-21 08:25:06.76 spid138 * xpsp2res 0000000020E80000 0000000021146FFF 002c7000

    2010-06-21 08:25:06.76 spid138 * CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000

    2010-06-21 08:25:06.76 spid138 * sqlncli 00000000337A0000 0000000033A63FFF 002c4000

    2010-06-21 08:25:06.76 spid138 * COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000

    2010-06-21 08:25:06.76 spid138 * comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000

    2010-06-21 08:25:06.76 spid138 * SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000

    2010-06-21 08:25:06.76 spid138 * SHELL32 000007FF7F190000 000007FF7FB9AFFF 00a0b000

    2010-06-21 08:25:06.76 spid138 * comctl32 000007FF7F000000 000007FF7F186FFF 00187000

    2010-06-21 08:25:06.76 spid138 * SQLNCLIR 0000000035000000 0000000035032FFF 00033000

    2010-06-21 08:25:06.76 spid138 * msftepxy 00000000037D0000 00000000037F0FFF 00021000

    2010-06-21 08:25:06.76 spid138 * xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000

    2010-06-21 08:25:06.76 spid138 * xpstar90 0000000053C30000 0000000053CB7FFF 00088000

    2010-06-21 08:25:06.76 spid138 * SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000

    2010-06-21 08:25:06.76 spid138 * ODBC32 000007FF63F00000 000007FF63F66FFF 00067000

    2010-06-21 08:25:06.76 spid138 * BatchParser90 00000000520C0000 00000000520ECFFF 0002d000

    2010-06-21 08:25:06.76 spid138 * ATL80 000000007C630000 000000007C64FFFF 00020000

    2010-06-21 08:25:06.76 spid138 * odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000

    2010-06-21 08:25:06.76 spid138 * xpstar90 000000002ADF0000 000000002AE15FFF 00026000

    2010-06-21 08:25:06.76 spid138 * xplog70 0000000034730000 000000003473FFFF 00010000

    2010-06-21 08:25:06.76 spid138 * xplog70 000000002AE30000 000000002AE32FFF 00003000

    2010-06-21 08:25:06.76 spid138 * mscorwks 000006427F330000 000006427FCE0FFF 009b1000

    2010-06-21 08:25:06.76 spid138 * mscorlib.ni 0000064278000000 0000064278ED8FFF 00ed9000

    2010-06-21 08:25:06.76 spid138 * mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000

    2010-06-21 08:25:06.76 spid138 * cryptnet 000007FF79690000 000007FF796AEFFF 0001f000

    2010-06-21 08:25:06.76 spid138 * SensApi 000007FF77C90000 000007FF77C96FFF 00007000

    2010-06-21 08:25:06.76 spid138 * SqlAccess 000000002FC00000 000000002FC57FFF 00058000

    2010-06-21 08:25:06.76 spid138 * mscorjit 000006427EED0000 000006427F053FFF 00184000

    2010-06-21 08:25:06.76 spid138 * System.Data 0000000030000000 00000000302E9FFF 002ea000

    2010-06-21 08:25:06.76 spid138 * System.ni 0000064274880000 0000064275283FFF 00a04000

    2010-06-21 08:25:06.76 spid138 * System.Transactions 0000000030960000 00000000309A8FFF 00049000

    2010-06-21 08:25:06.76 spid138 * System.Security.ni 000006424F240000 000006424F324FFF 000e5000

    2010-06-21 08:25:06.76 spid138 * System 000000007A440000 000000007A743FFF 00304000

    2010-06-21 08:25:06.76 spid138 * System.Security 0000000067920000 0000000067961FFF 00042000

    2010-06-21 08:25:06.76 spid138 * System.Xml 00000000637A0000 0000000063997FFF 001f8000

    2010-06-21 08:25:06.76 spid138 * sqlvdi 0000000034510000 000000003453BFFF 0002c000

    2010-06-21 08:25:06.76 spid138 * System.Configuration 0000000064890000 00000000648FBFFF 0006c000

    2010-06-21 08:25:06.76 spid138 * rasapi32 000007FF7E880000 000007FF7E8EAFFF 0006b000

    2010-06-21 08:25:06.77 spid138 * rasman 000007FF7E800000 000007FF7E81BFFF 0001c000

    2010-06-21 08:25:06.77 spid138 * TAPI32 000007FF7E820000 000007FF7E876FFF 00057000

    2010-06-21 08:25:06.77 spid138 * rtutils 000007FF7E610000 000007FF7E624FFF 00015000

    2010-06-21 08:25:06.77 spid138 * msxmlsql 0000000078800000 0000000078967FFF 00168000

    2010-06-21 08:25:06.77 spid138 * msxml3 000007FF56D40000 000007FF56F53FFF 00214000

    2010-06-21 08:25:06.77 spid138 * oledb32 000007FF5A9E0000 000007FF5AAA0FFF 000c1000

    2010-06-21 08:25:06.77 spid138 * MSDART 000007FF7ADB0000 000007FF7ADD7FFF 00028000

    2010-06-21 08:25:06.77 spid138 * OLEDB32R 000007FF63AB0000 000007FF63AC0FFF 00011000

    2010-06-21 08:25:06.77 spid138 * msadce 000007FF67870000 000007FF67906FFF 00097000

    2010-06-21 08:25:06.77 spid138 * msadcer 000007FF67810000 000007FF67815FFF 00006000

    2010-06-21 08:25:06.77 spid138 * SQLDMO 0000000048B70000 00000000491A4FFF 00635000

    2010-06-21 08:25:06.77 spid138 * odbcbcp 000007FF63EE0000 000007FF63EE7FFF 00008000

    2010-06-21 08:25:06.77 spid138 * SQLDMO 00000000462B0000 000000004633DFFF 0008e000

    2010-06-21 08:25:06.77 spid138 * comsvcs 000007FF57C40000 000007FF57E6AFFF 0022b000

    2010-06-21 08:25:06.77 spid138 * ATL 000007FF7E220000 000007FF7E23BFFF 0001c000

    2010-06-21 08:25:06.77 spid138 * sqloledb 000007FF5FE20000 000007FF5FEF6FFF 000d7000

    2010-06-21 08:25:06.77 spid138 * MSDATL3 00000000237C0000 00000000237DFFFF 00020000

    2010-06-21 08:25:06.77 spid138 * DBNETLIB 000007FF72490000 000007FF724B2FFF 00023000

    2010-06-21 08:25:06.77 spid138 * SQLOLEDB 0000000023540000 000000002354FFFF 00010000

    2010-06-21 08:25:06.77 spid138 * peverify 00000642FFC10000 00000642FFC44FFF 00035000

    2010-06-21 08:25:06.77 spid138 * xpSLS 000000003ED00000 000000003EE36FFF 00137000

    2010-06-21 08:25:06.77 spid138 * System.Web.Services 0000000042970000 0000000042A3FFFF 000d0000

    2010-06-21 08:25:06.77 spid138 *

    2010-06-21 08:25:06.77 spid138 * P1Home: FFFFFA80030AB4D0:

    2010-06-21 08:25:06.77 spid138 * P2Home: 00000000425B6D80: FFFFFA80030AB4D0 00000000425B6D80 000000002A8766B0 000007FF7FC78990 FFFFFA8000000000 FFFFFA8000000000

    2010-06-21 08:25:06.77 spid138 * P3Home: 000000002A8766B0: 00000009FA2A00A0 00000009FA2A00A0 0000000000000000 0000000000000008 0000000000000001 0000000000000000

    2010-06-21 08:25:06.77 spid138 * P4Home: 000007FF7FC78990: 000000000000003F 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001

    2010-06-21 08:25:06.77 spid138 * P5Home: FFFFFA8000000000:

    2010-06-21 08:25:06.77 spid138 * P6Home: FFFFFA8000000000:

    2010-06-21 08:25:06.77 spid138 * ContextFlags: 000000000010001F:

    2010-06-21 08:25:06.77 spid138 * MxCsr: 0000000000001FA0:

    2010-06-21 08:25:06.77 spid138 * SegCs: 0000000000000033:

    2010-06-21 08:25:06.77 spid138 * SegDs: 000000000000002B:

    2010-06-21 08:25:06.77 spid138 * SegEs: 000000000000002B:

    2010-06-21 08:25:06.77 spid138 * SegFs: 0000000000000053:

    2010-06-21 08:25:06.77 spid138 * SegGs: 000000000000002B:

    2010-06-21 08:25:06.77 spid138 * SegSs: 000000000000002B:

    2010-06-21 08:25:06.77 spid138 * EFlags: 0000000000010246: 006F006D006D006F 006900460020006E 000000730065006C 0050004D004F0043 005F00530055004C 003D00410044004D

    2010-06-21 08:25:06.77 spid138 * Rax: 0000000000518990: 0000000000001090 FFFFFFFFFFFFFFFF 0000000000000000 0000000100000000 0000000000000000 0000000000000000

    2010-06-21 08:25:06.77 spid138 * Rcx: 0000000000000000:

    2010-06-21 08:25:06.77 spid138 * Rdx: 000000003AA8B010: 0000000034046E20 00000000002EDCE0 0000000000000000 0000000000518990 000000000061E040 000000001DA9C350

    2010-06-21 08:25:06.77 spid138 * Rbx: 000000002A8766B0: 00000009FA2A00A0 00000009FA2A00A0 0000000000000000 0000000000000008 0000000000000001 0000000000000000

    2010-06-21 08:25:06.77 spid138 * Rsp: 00000000425B7320: 0000000000000000 0000000002410FA3 000000002A8766B0 0000000000000000 FFFFFFFFFFFFFFFE 000007FF63F266BE

    2010-06-21 08:25:06.77 spid138 * Rbp: 000007FF7FC78990: 000000000000003F 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001

    2010-06-21 08:25:06.77 spid138 * Rsi: 00000000425B88F0: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000000000074 00000002030A79B2

    2010-06-21 08:25:06.77 spid138 * Rdi: 0000000000000000:

    2010-06-21 08:25:06.77 spid138 * R8: 000007FFFFF70000: 0000000000000000 00000000425C0000 000000004259D000 0000000000000000 0000000000001E00 0000000000000000

    2010-06-21 08:25:06.77 spid138 * R9: 00000000425B7ED0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000

    2010-06-21 08:25:06.77 spid138 * R10: 0000000000000000:

    2010-06-21 08:25:06.77 spid138 * R11: 00000000425B7E78: 000007FF63F27335 000000000000008F 0000000000000000 0000000000000012 000000002A8702C8 0000000000000105

    2010-06-21 08:25:06.77 spid138 * R12: 0000000000000001:

    2010-06-21 08:25:06.77 spid138 * R13: 0000000000000001:

    2010-06-21 08:25:06.77 spid138 * R14: 0000000000000000:

    2010-06-21 08:25:06.77 spid138 * R15: 00000000425B88F0: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000000000074 00000002030A79B2

    2010-06-21 08:25:06.77 spid138 * Rip: 000007FF7FC51D71: 7241FB83661FB70F 6604775AFB83660A 3D6606B70F20C383 005A3D660A720041 8348002005660477 856602C6834802C7

    2010-06-21 08:25:06.77 spid138 * *******************************************************************************

    2010-06-21 08:25:06.77 spid138 * -------------------------------------------------------------------------------

    2010-06-21 08:25:06.77 spid138 * Short Stack Dump

    2010-06-21 08:25:06.77 spid138 000007FF7FC51D71 Module(msvcrt+0000000000051D71)

    2010-06-21 08:25:06.77 spid138 000007FF63F266BE Module(ODBC32+00000000000266BE)

    2010-06-21 08:25:06.77 spid138 000007FF63F27335 Module(ODBC32+0000000000027335)

    2010-06-21 08:25:06.77 spid138 000007FF63F1A451 Module(ODBC32+000000000001A451)

    2010-06-21 08:25:06.77 spid138 0000000053C50494 Module(xpstar90+0000000000020494)

    2010-06-21 08:25:06.77 spid138 0000000053C3D1AB Module(xpstar90+000000000000D1AB)

    2010-06-21 08:25:06.77 spid138 0000000053C3FC27 Module(xpstar90+000000000000FC27)

    2010-06-21 08:25:06.77 spid138 0000000001CC9C41 Module(sqlservr+0000000000CC9C41)

    2010-06-21 08:25:06.77 spid138 0000000001E5D45C Module(sqlservr+0000000000E5D45C)

    2010-06-21 08:25:06.77 spid138 000000000243BA3A Module(sqlservr+000000000143BA3A)

    2010-06-21 08:25:06.77 spid138 000000000243CC95 Module(sqlservr+000000000143CC95)

    2010-06-21 08:25:06.77 spid138 00000000026115CB Module(sqlservr+00000000016115CB)

    2010-06-21 08:25:06.77 spid138 0000000001AE0D8F Module(sqlservr+0000000000AE0D8F)

    2010-06-21 08:25:06.77 spid138 0000000001839DF5 Module(sqlservr+0000000000839DF5)

    2010-06-21 08:25:06.77 spid138 0000000001839FE2 Module(sqlservr+0000000000839FE2)

    2010-06-21 08:25:06.77 spid138 00000000018583A0 Module(sqlservr+00000000008583A0)

    2010-06-21 08:25:06.77 spid138 00000000029A8C12 Module(sqlservr+00000000019A8C12)

    2010-06-21 08:25:06.77 spid138 00000000029CA4CB Module(sqlservr+00000000019CA4CB)

    2010-06-21 08:25:06.77 spid138 00000000018589C3 Module(sqlservr+00000000008589C3)

    2010-06-21 08:25:06.77 spid138 0000000002614E35 Module(sqlservr+0000000001614E35)

    2010-06-21 08:25:06.77 spid138 0000000001AE0650 Module(sqlservr+0000000000AE0650)

    2010-06-21 08:25:06.77 spid138 000000000170B9C5 Module(sqlservr+000000000070B9C5)

    2010-06-21 08:25:06.77 spid138 0000000001839DF5 Module(sqlservr+0000000000839DF5)

    2010-06-21 08:25:06.77 spid138 0000000001839FE2 Module(sqlservr+0000000000839FE2)

    2010-06-21 08:25:06.77 spid138 00000000018583A0 Module(sqlservr+00000000008583A0)

    2010-06-21 08:25:06.77 spid138 00000000018589C3 Module(sqlservr+00000000008589C3)

    2010-06-21 08:25:06.77 spid138 0000000002614E35 Module(sqlservr+0000000001614E35)

    2010-06-21 08:25:06.77 spid138 0000000001AE0650 Module(sqlservr+0000000000AE0650)

    2010-06-21 08:25:06.77 spid138 000000000170B9C5 Module(sqlservr+000000000070B9C5)

    2010-06-21 08:25:06.77 spid138 00000000017053E2 Module(sqlservr+00000000007053E2)

    2010-06-21 08:25:06.77 spid138 000000000170A59D Module(sqlservr+000000000070A59D)

    2010-06-21 08:25:06.77 spid138 00000000016BC32E Module(sqlservr+00000000006BC32E)

    2010-06-21 08:25:06.77 spid138 00000000016BC5C9 Module(sqlservr+00000000006BC5C9)

    2010-06-21 08:25:06.77 spid138 00000000016B5CC4 Module(sqlservr+00000000006B5CC4)

    2010-06-21 08:25:06.77 spid138 000000000155E837 Module(sqlservr+000000000055E837)

    2010-06-21 08:25:06.77 spid138 0000000001522F59 Module(sqlservr+0000000000522F59)

    2010-06-21 08:25:06.78 spid138 00000000015372B0 Module(sqlservr+00000000005372B0)

    2010-06-21 08:25:06.78 spid138 00000000014F72F8 Module(sqlservr+00000000004F72F8)

    2010-06-21 08:25:06.78 spid138 00000000781337D7 Module(MSVCR80+00000000000037D7)

    2010-06-21 08:25:06.78 spid138 0000000078133894 Module(MSVCR80+0000000000003894)

    2010-06-21 08:25:06.78 spid138 0000000077D6B71A Module(kernel32+000000000002B71A)

    2010-06-21 08:25:06.78 spid138 Stack Signature for the dump is 0x00000001DA9A7B44

    2010-06-21 08:25:10.79 spid138 External dump process return code 0x20000001.

    External dump process returned no errors. 2010-06-21 08:25:10.79 spid138 Error: 18002, Severity: 20, State: 1.

    2010-06-21 08:25:10.79 spid138 Exception happened when running extended stored procedure 'xp_enumerrorlogs' in the library 'xpstar90.dll'. SQL Server is terminating process 138. Exception type: Win32 exception; Exception code: 0xc0000005.

    Here is the stack dump from the failed jobs.

    2010-06-21 08:29:37.53 spid126 AppDomain 205 (Akea.dbo[runtime].204) created.

    2010-06-21 08:29:37.55 spid126 Unsafe assembly 'timezoneconversion, version=0.0.0.0, culture=neutral, publickeytoken=null, processorarchitecture=msil' loaded into appdomain 205 (Akea.dbo[runtime].204).

    2010-06-21 08:30:01.02 spid132 Using 'dbghelp.dll' version '4.0.5'

    2010-06-21 08:30:01.03 spid132 ***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\SQLDump0113.txt

    2010-06-21 08:30:01.03 spid132 SqlDumpExceptionHandler: Process 132 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.

    2010-06-21 08:30:01.03 spid132 * *******************************************************************************

    2010-06-21 08:30:01.03 spid132 *

    2010-06-21 08:30:01.03 spid132 * BEGIN STACK DUMP:

    2010-06-21 08:30:01.03 spid132 * 06/21/10 08:30:01 spid 132

    2010-06-21 08:30:01.03 spid132 *

    2010-06-21 08:30:01.03 spid132 *

    2010-06-21 08:30:01.03 spid132 * Exception Address = 000007FF7FC51D71 Module(msvcrt+0000000000051D71)

    2010-06-21 08:30:01.03 spid132 * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION

    2010-06-21 08:30:01.03 spid132 * Access Violation occurred reading address 0000000000000000

    2010-06-21 08:30:01.03 spid132 * Input Buffer 510 bytes -

    2010-06-21 08:30:01.03 spid132 * CREATE TABLE #temp (LogDate DATETIME , SPID NVARCHAR(100)

    2010-06-21 08:30:01.03 spid132 * , TEXT NVARCHAR(MAX) ) INSERT INTO #temp EXEC xp_readerrorlog 0, 1

    2010-06-21 08:30:01.03 spid132 * , 'The current transaction cannot be committed and cannot support operat

    2010-06-21 08:30:01.03 spid132 * ions that write to the log file. Roll back the transaction' IF EXIS

    2010-06-21 08:30:01.03 spid132 * TS (SELECT * FROM #TEMP) begin declare @message nvarchar(max), @Subje

    2010-06-21 08:30:01.03 spid132 * ctpart nvarchar(100) set @message = 'The Service broker queue may have

    2010-06-21 08:30:01.03 spid132 * been hung up on ' + @@ServerName + ' and is filling the error log.

    2010-06-21 08:30:01.03 spid132 *

    Please review the error log to find out the SPID that is causing

    2010-06-21 08:30:01.03 spid132 * the issue and kill it' set @subjectpart = @@ServerName + ' --

    2010-06-21 08:30:01.03 spid132 * Possible Service Broker Issue -- Filling Error Log' exec msdb.dbo.s

    2010-06-21 08:30:01.03 spid132 * p_send_dbmail @Profile_name = Administrator , @recipients = 'dba@company.com, @body = @message , @body_fo

    2010-06-21 08:30:01.03 spid132 * rmat = 'HTML' , @subject = @Subjectpart , @Importance = 'high' en

    2010-06-21 08:30:01.03 spid132 * d DROP TABLE #TEMP

    2010-06-21 08:30:01.03 spid132 *

    2010-06-21 08:30:01.03 spid132 *

    2010-06-21 08:30:01.03 spid132 * MODULE BASE END SIZE

    2010-06-21 08:30:01.03 spid132 * sqlservr 0000000001000000 0000000003651FFF 02652000

    2010-06-21 08:30:01.03 spid132 * ntdll 0000000077EC0000 0000000077FFAFFF 0013b000

    2010-06-21 08:30:01.03 spid132 * kernel32 0000000077D40000 0000000077EB2FFF 00173000

    2010-06-21 08:30:01.03 spid132 * MSVCR80 0000000078130000 00000000781F8FFF 000c9000

    2010-06-21 08:30:01.03 spid132 * msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000

    2010-06-21 08:30:01.03 spid132 * MSVCP80 000000007C420000 000000007C528FFF 00109000

    2010-06-21 08:30:01.03 spid132 * ADVAPI32 000007FF7FEE0000 000007FF7FFE5FFF 00106000

    2010-06-21 08:30:01.03 spid132 * RPCRT4 000007FF7FD30000 000007FF7FEC8FFF 00199000

    2010-06-21 08:30:01.03 spid132 * Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000

    2010-06-21 08:30:01.03 spid132 * sqlos 00000000344D0000 00000000344D6FFF 00007000

    2010-06-21 08:30:01.03 spid132 * USERENV 000007FF7C680000 000007FF7C789FFF 0010a000

    2010-06-21 08:30:01.03 spid132 * USER32 0000000077C20000 0000000077D2BFFF 0010c000

    2010-06-21 08:30:01.03 spid132 * GDI32 000007FF7FC90000 000007FF7FD2BFFF 0009c000

    2010-06-21 08:30:01.03 spid132 * WINMM 000007FF7E240000 000007FF7E28FFFF 00050000

    2010-06-21 08:30:01.03 spid132 * opends60 00000000333E0000 00000000333E7FFF 00008000

    2010-06-21 08:30:01.03 spid132 * NETAPI32 000007FF77370000 000007FF77408FFF 00099000

    2010-06-21 08:30:01.03 spid132 * rdpsnd 000007FF77100000 000007FF7710AFFF 0000b000

    2010-06-21 08:30:01.03 spid132 * WINSTA 000007FF7D4D0000 000007FF7D4E9FFF 0001a000

    2010-06-21 08:30:01.03 spid132 * PSAPI 000007FF7E380000 000007FF7E38FFFF 00010000

    2010-06-21 08:30:01.03 spid132 * instapi 0000000048060000 000000004806CFFF 0000d000

    2010-06-21 08:30:01.03 spid132 * sqlevn70 000000004F610000 000000004F7B8FFF 001a9000

    2010-06-21 08:30:01.03 spid132 * rsaenh 0000000068000000 000000006804BFFF 0004c000

    2010-06-21 08:30:01.03 spid132 * AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000

    2010-06-21 08:30:01.03 spid132 * MSCOREE 000006427EE50000 000006427EEB5FFF 00066000

    2010-06-21 08:30:01.03 spid132 * ole32 000007FF57140000 000007FF573C4FFF 00285000

    2010-06-21 08:30:01.03 spid132 * msv1_0 000007FF7E500000 000007FF7E544FFF 00045000

    2010-06-21 08:30:01.03 spid132 * cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000

    2010-06-21 08:30:01.03 spid132 * WS2_32 000007FF77310000 000007FF7733FFFF 00030000

    2010-06-21 08:30:01.03 spid132 * WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000

    2010-06-21 08:30:01.03 spid132 * iphlpapi 000007FF57040000 000007FF57070FFF 00031000

    2010-06-21 08:30:01.03 spid132 * kerberos 000007FF77410000 000007FF774C4FFF 000b5000

    2010-06-21 08:30:01.03 spid132 * MSASN1 000007FF7D340000 000007FF7D36BFFF 0002c000

    2010-06-21 08:30:01.03 spid132 * schannel 000007FF7DD50000 000007FF7DD91FFF 00042000

    2010-06-21 08:30:01.03 spid132 * CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000

    2010-06-21 08:30:01.03 spid132 * COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000

    2010-06-21 08:30:01.03 spid132 * XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000

    2010-06-21 08:30:01.03 spid132 * MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000

    2010-06-21 08:30:01.03 spid132 * OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000

    2010-06-21 08:30:01.03 spid132 * msvcp60 000000001E270000 000000001E359FFF 000ea000

    2010-06-21 08:30:01.03 spid132 * MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000

    2010-06-21 08:30:01.03 spid132 * VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000

    2010-06-21 08:30:01.03 spid132 * WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000

    2010-06-21 08:30:01.03 spid132 * CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000

    2010-06-21 08:30:01.03 spid132 * RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000

    2010-06-21 08:30:01.03 spid132 * mswsock 000007FF771B0000 000007FF7722CFFF 0007d000

    2010-06-21 08:30:01.03 spid132 * DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000

    2010-06-21 08:30:01.03 spid132 * winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000

    2010-06-21 08:30:01.03 spid132 * WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000

    2010-06-21 08:30:01.03 spid132 * rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000

    2010-06-21 08:30:01.03 spid132 * security 000007FF77530000 000007FF77534FFF 00005000

    2010-06-21 08:30:01.03 spid132 * msfte 0000000049980000 0000000049D2DFFF 003ae000

    2010-06-21 08:30:01.03 spid132 * dbghelp 0000000020610000 000000002076CFFF 0015d000

    2010-06-21 08:30:01.03 spid132 * WINTRUST 000007FF7E3E0000 000007FF7E42DFFF 0004e000

    2010-06-21 08:30:01.03 spid132 * imagehlp 000007FF7E470000 000007FF7E482FFF 00013000

    2010-06-21 08:30:01.03 spid132 * dssenh 0000000068100000 000000006813EFFF 0003f000

    2010-06-21 08:30:01.03 spid132 * hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000

    2010-06-21 08:30:01.03 spid132 * wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000

    2010-06-21 08:30:01.03 spid132 * NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000

    2010-06-21 08:30:01.03 spid132 * SAMLIB 000007FF77150000 000007FF77165FFF 00016000

    2010-06-21 08:30:01.03 spid132 * ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000

    2010-06-21 08:30:01.03 spid132 * xpsp2res 0000000020E80000 0000000021146FFF 002c7000

    2010-06-21 08:30:01.03 spid132 * CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000

    2010-06-21 08:30:01.03 spid132 * sqlncli 00000000337A0000 0000000033A63FFF 002c4000

    2010-06-21 08:30:01.03 spid132 * COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000

    2010-06-21 08:30:01.03 spid132 * comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000

    2010-06-21 08:30:01.03 spid132 * SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000

    2010-06-21 08:30:01.03 spid132 * SHELL32 000007FF7F190000 000007FF7FB9AFFF 00a0b000

    2010-06-21 08:30:01.03 spid132 * comctl32 000007FF7F000000 000007FF7F186FFF 00187000

    2010-06-21 08:30:01.03 spid132 * SQLNCLIR 0000000035000000 0000000035032FFF 00033000

    2010-06-21 08:30:01.03 spid132 * msftepxy 00000000037D0000 00000000037F0FFF 00021000

    2010-06-21 08:30:01.03 spid132 * xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000

    2010-06-21 08:30:01.03 spid132 * xpstar90 0000000053C30000 0000000053CB7FFF 00088000

    2010-06-21 08:30:01.03 spid132 * SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000

    2010-06-21 08:30:01.03 spid132 * ODBC32 000007FF63F00000 000007FF63F66FFF 00067000

    2010-06-21 08:30:01.03 spid132 * BatchParser90 00000000520C0000 00000000520ECFFF 0002d000

    2010-06-21 08:30:01.03 spid132 * ATL80 000000007C630000 000000007C64FFFF 00020000

    2010-06-21 08:30:01.03 spid132 * odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000

    2010-06-21 08:30:01.03 spid132 * xpstar90 000000002ADF0000 000000002AE15FFF 00026000

    2010-06-21 08:30:01.03 spid132 * xplog70 0000000034730000 000000003473FFFF 00010000

    2010-06-21 08:30:01.03 spid132 * xplog70 000000002AE30000 000000002AE32FFF 00003000

    2010-06-21 08:30:01.03 spid132 * mscorwks 000006427F330000 000006427FCE0FFF 009b1000

    2010-06-21 08:30:01.03 spid132 * mscorlib.ni 0000064278000000 0000064278ED8FFF 00ed9000

    2010-06-21 08:30:01.03 spid132 * mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000

    2010-06-21 08:30:01.03 spid132 * cryptnet 000007FF79690000 000007FF796AEFFF 0001f000

    2010-06-21 08:30:01.03 spid132 * SensApi 000007FF77C90000 000007FF77C96FFF 00007000

    2010-06-21 08:30:01.03 spid132 * SqlAccess 000000002FC00000 000000002FC57FFF 00058000

    2010-06-21 08:30:01.03 spid132 * mscorjit 000006427EED0000 000006427F053FFF 00184000

    2010-06-21 08:30:01.03 spid132 * System.Data 0000000030000000 00000000302E9FFF 002ea000

    2010-06-21 08:30:01.03 spid132 * System.ni 0000064274880000 0000064275283FFF 00a04000

    2010-06-21 08:30:01.03 spid132 * System.Transactions 0000000030960000 00000000309A8FFF 00049000

    2010-06-21 08:30:01.03 spid132 * System.Security.ni 000006424F240000 000006424F324FFF 000e5000

    2010-06-21 08:30:01.03 spid132 * System 000000007A440000 000000007A743FFF 00304000

    2010-06-21 08:30:01.03 spid132 * System.Security 0000000067920000 0000000067961FFF 00042000

    2010-06-21 08:30:01.03 spid132 * System.Xml 00000000637A0000 0000000063997FFF 001f8000

    2010-06-21 08:30:01.03 spid132 * sqlvdi 0000000034510000 000000003453BFFF 0002c000

    2010-06-21 08:30:01.03 spid132 * System.Configuration 0000000064890000 00000000648FBFFF 0006c000

    2010-06-21 08:30:01.03 spid132 * rasapi32 000007FF7E880000 000007FF7E8EAFFF 0006b000

    2010-06-21 08:30:01.03 spid132 * rasman 000007FF7E800000 000007FF7E81BFFF 0001c000

    2010-06-21 08:30:01.03 spid132 * TAPI32 000007FF7E820000 000007FF7E876FFF 00057000

    2010-06-21 08:30:01.03 spid132 * rtutils 000007FF7E610000 000007FF7E624FFF 00015000

    2010-06-21 08:30:01.03 spid132 * msxmlsql 0000000078800000 0000000078967FFF 00168000

    2010-06-21 08:30:01.03 spid132 * msxml3 000007FF56D40000 000007FF56F53FFF 00214000

    2010-06-21 08:30:01.03 spid132 * oledb32 000007FF5A9E0000 000007FF5AAA0FFF 000c1000

    2010-06-21 08:30:01.03 spid132 * MSDART 000007FF7ADB0000 000007FF7ADD7FFF 00028000

    2010-06-21 08:30:01.03 spid132 * OLEDB32R 000007FF63AB0000 000007FF63AC0FFF 00011000

    2010-06-21 08:30:01.03 spid132 * msadce 000007FF67870000 000007FF67906FFF 00097000

    2010-06-21 08:30:01.03 spid132 * msadcer 000007FF67810000 000007FF67815FFF 00006000

    2010-06-21 08:30:01.03 spid132 * SQLDMO 0000000048B70000 00000000491A4FFF 00635000

    2010-06-21 08:30:01.03 spid132 * odbcbcp 000007FF63EE0000 000007FF63EE7FFF 00008000

    2010-06-21 08:30:01.03 spid132 * SQLDMO 00000000462B0000 000000004633DFFF 0008e000

    2010-06-21 08:30:01.03 spid132 * comsvcs 000007FF57C40000 000007FF57E6AFFF 0022b000

    2010-06-21 08:30:01.03 spid132 * ATL 000007FF7E220000 000007FF7E23BFFF 0001c000

    2010-06-21 08:30:01.03 spid132 * sqloledb 000007FF5FE20000 000007FF5FEF6FFF 000d7000

    2010-06-21 08:30:01.03 spid132 * MSDATL3 00000000237C0000 00000000237DFFFF 00020000

    2010-06-21 08:30:01.03 spid132 * DBNETLIB 000007FF72490000 000007FF724B2FFF 00023000

    2010-06-21 08:30:01.03 spid132 * SQLOLEDB 0000000023540000 000000002354FFFF 00010000

    2010-06-21 08:30:01.03 spid132 * peverify 00000642FFC10000 00000642FFC44FFF 00035000

    2010-06-21 08:30:01.03 spid132 * xpSLS 000000003ED00000 000000003EE36FFF 00137000

    2010-06-21 08:30:01.03 spid132 * System.Web.Services 0000000042970000 0000000042A3FFFF 000d0000

    2010-06-21 08:30:01.03 spid132 *

    2010-06-21 08:30:01.03 spid132 * P1Home: FFFFFA8002E221C0:

    2010-06-21 08:30:01.03 spid132 * P2Home: 0000000041F07EA0: FFFFFA8002E221C0 0000000041F07EA0 000000002A8766B0 000007FF7FC78990 FFFFFA8000000000 FFFFFA8000000000

    2010-06-21 08:30:01.03 spid132 * P3Home: 000000002A8766B0: 00000009FA2A00A0 00000009FA2A00A0 0000000000000000 0000000000000008 0000000000000001 0000000000000000

    2010-06-21 08:30:01.03 spid132 * P4Home: 000007FF7FC78990: 000000000000003F 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001

    2010-06-21 08:30:01.03 spid132 * P5Home: FFFFFA8000000000:

    2010-06-21 08:30:01.03 spid132 * P6Home: FFFFFA8000000000:

    2010-06-21 08:30:01.03 spid132 * ContextFlags: 000000000010001F:

    2010-06-21 08:30:01.03 spid132 * MxCsr: 0000000000001FA0:

    2010-06-21 08:30:01.03 spid132 * SegCs: 0000000000000033:

    2010-06-21 08:30:01.03 spid132 * SegDs: 000000000000002B:

    2010-06-21 08:30:01.03 spid132 * SegEs: 000000000000002B:

    2010-06-21 08:30:01.03 spid132 * SegFs: 0000000000000053:

    2010-06-21 08:30:01.03 spid132 * SegGs: 000000000000002B:

    2010-06-21 08:30:01.03 spid132 * SegSs: 000000000000002B:

    2010-06-21 08:30:01.03 spid132 * EFlags: 0000000000010246: 006F006D006D006F 006900460020006E 000000730065006C 0050004D004F0043 005F00530055004C 003D00410044004D

    2010-06-21 08:30:01.03 spid132 * Rax: 00000000004D4E40: 0000000000000AF0 FFFFFFFFFFFFFFFF 0000000000000000 0000000100000000 0000000000000000 0000000000000000

    2010-06-21 08:30:01.03 spid132 * Rcx: 0000000000000000:

    2010-06-21 08:30:01.03 spid132 * Rdx: 00000000341B5250: 00000000341A4A70 00000000340CE010 0000000000000000 00000000004D4E40 000000003BBF34E0 000000001DAB0750

    2010-06-21 08:30:01.03 spid132 * Rbx: 000000002A8766B0: 00000009FA2A00A0 00000009FA2A00A0 0000000000000000 0000000000000008 0000000000000001 0000000000000000

    2010-06-21 08:30:01.03 spid132 * Rsp: 0000000041F08440: 0000000041F084F8 00000000016FC3FC 000000002A8766B0 0000000000000000 0000000000000000 000007FF63F266BE

    2010-06-21 08:30:01.03 spid132 * Rbp: 000007FF7FC78990: 000000000000003F 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001

    2010-06-21 08:30:01.03 spid132 * Rsi: 0000000041F09A10: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000000000074 0000000000000000

    2010-06-21 08:30:01.03 spid132 * Rdi: 0000000000000000:

    2010-06-21 08:30:01.03 spid132 * R8: 000007FFFFF76000: 0000000000000000 0000000041F10000 0000000041EED000 0000000000000000 0000000000001E00 0000000000000000

    2010-06-21 08:30:01.03 spid132 * R9: 0000000041F08FF0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000

    2010-06-21 08:30:01.03 spid132 * R10: 0000000000000000:

    2010-06-21 08:30:01.03 spid132 * R11: 0000000041F08F98: 000007FF63F27335 0000000000000014 0000000A2A983AF0 0000000000000012 0000000000000000 0000000000000105

    2010-06-21 08:30:01.03 spid132 * R12: 0000000000000001:

    2010-06-21 08:30:01.03 spid132 * R13: 0000000000000001:

    2010-06-21 08:30:01.03 spid132 * R14: 0000000000000000:

    2010-06-21 08:30:01.03 spid132 * R15: 0000000041F09A10: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000000000074 0000000000000000

    2010-06-21 08:30:01.03 spid132 * Rip: 000007FF7FC51D71: 7241FB83661FB70F 6604775AFB83660A 3D6606B70F20C383 005A3D660A720041 8348002005660477 856602C6834802C7

    2010-06-21 08:30:01.03 spid132 * *******************************************************************************

    2010-06-21 08:30:01.03 spid132 * -------------------------------------------------------------------------------

    2010-06-21 08:30:01.03 spid132 * Short Stack Dump

    2010-06-21 08:30:01.04 spid132 000007FF7FC51D71 Module(msvcrt+0000000000051D71)

    2010-06-21 08:30:01.04 spid132 000007FF63F266BE Module(ODBC32+00000000000266BE)

    2010-06-21 08:30:01.04 spid132 000007FF63F27335 Module(ODBC32+0000000000027335)

    2010-06-21 08:30:01.04 spid132 000007FF63F1A451 Module(ODBC32+000000000001A451)

    2010-06-21 08:30:01.04 spid132 0000000053C50494 Module(xpstar90+0000000000020494)

    2010-06-21 08:30:01.04 spid132 0000000053C3D1AB Module(xpstar90+000000000000D1AB)

    2010-06-21 08:30:01.04 spid132 0000000053C3E799 Module(xpstar90+000000000000E799)

    2010-06-21 08:30:01.04 spid132 0000000053C40913 Module(xpstar90+0000000000010913)

    2010-06-21 08:30:01.04 spid132 0000000053C40ED1 Module(xpstar90+0000000000010ED1)

    2010-06-21 08:30:01.04 spid132 0000000001CC9C41 Module(sqlservr+0000000000CC9C41)

    2010-06-21 08:30:01.04 spid132 0000000001E5D45C Module(sqlservr+0000000000E5D45C)

    2010-06-21 08:30:01.04 spid132 000000000243BA3A Module(sqlservr+000000000143BA3A)

    2010-06-21 08:30:01.04 spid132 000000000243CC95 Module(sqlservr+000000000143CC95)

    2010-06-21 08:30:01.04 spid132 00000000026115CB Module(sqlservr+00000000016115CB)

    2010-06-21 08:30:01.04 spid132 0000000001AE0D8F Module(sqlservr+0000000000AE0D8F)

    2010-06-21 08:30:01.04 spid132 0000000001839DF5 Module(sqlservr+0000000000839DF5)

    2010-06-21 08:30:01.04 spid132 0000000001839FE2 Module(sqlservr+0000000000839FE2)

    2010-06-21 08:30:01.04 spid132 00000000018583A0 Module(sqlservr+00000000008583A0)

    2010-06-21 08:30:01.04 spid132 00000000029A8C12 Module(sqlservr+00000000019A8C12)

    2010-06-21 08:30:01.04 spid132 00000000029CA4CB Module(sqlservr+00000000019CA4CB)

    2010-06-21 08:30:01.04 spid132 00000000018589C3 Module(sqlservr+00000000008589C3)

    2010-06-21 08:30:01.04 spid132 0000000002614E35 Module(sqlservr+0000000001614E35)

    2010-06-21 08:30:01.04 spid132 0000000001AE0650 Module(sqlservr+0000000000AE0650)

    2010-06-21 08:30:01.04 spid132 000000000170B9C5 Module(sqlservr+000000000070B9C5)

    2010-06-21 08:30:01.04 spid132 00000000017053E2 Module(sqlservr+00000000007053E2)

    2010-06-21 08:30:01.04 spid132 000000000170A59D Module(sqlservr+000000000070A59D)

    2010-06-21 08:30:01.04 spid132 00000000016BC32E Module(sqlservr+00000000006BC32E)

    2010-06-21 08:30:01.04 spid132 00000000016BC5C9 Module(sqlservr+00000000006BC5C9)

    2010-06-21 08:30:01.04 spid132 00000000016B5CC4 Module(sqlservr+00000000006B5CC4)

    2010-06-21 08:30:01.04 spid132 000000000155E837 Module(sqlservr+000000000055E837)

    2010-06-21 08:30:01.04 spid132 0000000001522F59 Module(sqlservr+0000000000522F59)

    2010-06-21 08:30:01.04 spid132 00000000015372B0 Module(sqlservr+00000000005372B0)

    2010-06-21 08:30:01.05 spid132 00000000014F72F8 Module(sqlservr+00000000004F72F8)

    2010-06-21 08:30:01.05 spid132 00000000781337D7 Module(MSVCR80+00000000000037D7)

    2010-06-21 08:30:01.05 spid132 0000000078133894 Module(MSVCR80+0000000000003894)

    2010-06-21 08:30:01.05 spid132 0000000077D6B71A Module(kernel32+000000000002B71A)

    2010-06-21 08:30:01.05 spid132 Stack Signature for the dump is 0x00000000FDAFE7FD

    2010-06-21 08:30:06.22 spid132 External dump process return code 0x20000001.

    External dump process returned no errors. 2010-06-21 08:30:06.22 spid132 Error: 18002, Severity: 20, State: 1.

    2010-06-21 08:30:06.22 spid132 Exception happened when running extended stored procedure 'xp_readerrorlog' in the library 'xpstar90.dll'. SQL Server is terminating process 132. Exception type: Win32 exception; Exception code: 0xc0000005.

    2010-06-21 08:30:06.33 spid132 Using 'dbghelp.dll' version '4.0.5'

    2010-06-21 08:30:06.33 spid132 ***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\SQLDump0114.txt

    2010-06-21 08:30:06.33 spid132 SqlDumpExceptionHandler: Process 132 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.

    2010-06-21 08:30:06.33 spid132 * *******************************************************************************

    2010-06-21 08:30:06.33 spid132 *

    2010-06-21 08:30:06.33 spid132 * BEGIN STACK DUMP:

    2010-06-21 08:30:06.33 spid132 * 06/21/10 08:30:06 spid 132

    2010-06-21 08:30:06.33 spid132 *

    2010-06-21 08:30:06.33 spid132 *

    2010-06-21 08:30:06.33 spid132 * Exception Address = 000007FF7FC51D71 Module(msvcrt+0000000000051D71)

    2010-06-21 08:30:06.33 spid132 * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION

    2010-06-21 08:30:06.33 spid132 * Access Violation occurred reading address 0000000000000000

    2010-06-21 08:30:06.33 spid132 * Input Buffer 510 bytes -

    2010-06-21 08:30:06.33 spid132 * CREATE TABLE #temp (LogDate DATETIME , SPID NVARCHAR(100)

    2010-06-21 08:30:06.33 spid132 * , TEXT NVARCHAR(MAX) ) INSERT INTO #temp EXEC xp_readerrorlog 0, 1

    2010-06-21 08:30:06.33 spid132 * , 'The current transaction cannot be committed and cannot support operat

    2010-06-21 08:30:06.33 spid132 * ions that write to the log file. Roll back the transaction' IF EXIS

    2010-06-21 08:30:06.33 spid132 * TS (SELECT * FROM #TEMP) begin declare @message nvarchar(max), @Subje

    2010-06-21 08:30:06.33 spid132 * ctpart nvarchar(100) set @message = 'The Service broker queue may have

    2010-06-21 08:30:06.33 spid132 * been hung up on ' + @@ServerName + ' and is filling the error log.

    2010-06-21 08:30:06.33 spid132 *

    Please review the error log to find out the SPID that is causing

    2010-06-21 08:30:06.33 spid132 * the issue and kill it' set @subjectpart = @@ServerName + ' --

    2010-06-21 08:30:06.33 spid132 * Possible Service Broker Issue -- Filling Error Log' exec msdb.dbo.s

    2010-06-21 08:30:06.33 spid132 * p_send_dbmail @Profile_name = Administrator , @recipients = 'dba@company.com

    2010-06-21 08:30:06.33 spid132 * , @body = @message , @body_fo

    2010-06-21 08:30:06.33 spid132 * rmat = 'HTML' , @subject = @Subjectpart , @Importance = 'high' en

    2010-06-21 08:30:06.33 spid132 * d DROP TABLE #TEMP

    2010-06-21 08:30:06.33 spid132 *

    2010-06-21 08:30:06.33 spid132 *

    2010-06-21 08:30:06.33 spid132 * MODULE BASE END SIZE

    2010-06-21 08:30:06.33 spid132 * sqlservr 0000000001000000 0000000003651FFF 02652000

    2010-06-21 08:30:06.33 spid132 * ntdll 0000000077EC0000 0000000077FFAFFF 0013b000

    2010-06-21 08:30:06.33 spid132 * kernel32 0000000077D40000 0000000077EB2FFF 00173000

    2010-06-21 08:30:06.33 spid132 * MSVCR80 0000000078130000 00000000781F8FFF 000c9000

    2010-06-21 08:30:06.33 spid132 * msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000

    2010-06-21 08:30:06.33 spid132 * MSVCP80 000000007C420000 000000007C528FFF 00109000

    2010-06-21 08:30:06.33 spid132 * ADVAPI32 000007FF7FEE0000 000007FF7FFE5FFF 00106000

    2010-06-21 08:30:06.33 spid132 * RPCRT4 000007FF7FD30000 000007FF7FEC8FFF 00199000

    2010-06-21 08:30:06.33 spid132 * Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000

    2010-06-21 08:30:06.33 spid132 * sqlos 00000000344D0000 00000000344D6FFF 00007000

    2010-06-21 08:30:06.33 spid132 * USERENV 000007FF7C680000 000007FF7C789FFF 0010a000

    2010-06-21 08:30:06.33 spid132 * USER32 0000000077C20000 0000000077D2BFFF 0010c000

    2010-06-21 08:30:06.33 spid132 * GDI32 000007FF7FC90000 000007FF7FD2BFFF 0009c000

    2010-06-21 08:30:06.33 spid132 * WINMM 000007FF7E240000 000007FF7E28FFFF 00050000

    2010-06-21 08:30:06.33 spid132 * opends60 00000000333E0000 00000000333E7FFF 00008000

    2010-06-21 08:30:06.33 spid132 * NETAPI32 000007FF77370000 000007FF77408FFF 00099000

    2010-06-21 08:30:06.33 spid132 * rdpsnd 000007FF77100000 000007FF7710AFFF 0000b000

    2010-06-21 08:30:06.33 spid132 * WINSTA 000007FF7D4D0000 000007FF7D4E9FFF 0001a000

    2010-06-21 08:30:06.33 spid132 * PSAPI 000007FF7E380000 000007FF7E38FFFF 00010000

    2010-06-21 08:30:06.33 spid132 * instapi 0000000048060000 000000004806CFFF 0000d000

    2010-06-21 08:30:06.33 spid132 * sqlevn70 000000004F610000 000000004F7B8FFF 001a9000

    2010-06-21 08:30:06.33 spid132 * rsaenh 0000000068000000 000000006804BFFF 0004c000

    2010-06-21 08:30:06.33 spid132 * AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000

    2010-06-21 08:30:06.33 spid132 * MSCOREE 000006427EE50000 000006427EEB5FFF 00066000

    2010-06-21 08:30:06.33 spid132 * ole32 000007FF57140000 000007FF573C4FFF 00285000

    2010-06-21 08:30:06.33 spid132 * msv1_0 000007FF7E500000 000007FF7E544FFF 00045000

    2010-06-21 08:30:06.33 spid132 * cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000

    2010-06-21 08:30:06.33 spid132 * WS2_32 000007FF77310000 000007FF7733FFFF 00030000

    2010-06-21 08:30:06.33 spid132 * WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000

    2010-06-21 08:30:06.33 spid132 * iphlpapi 000007FF57040000 000007FF57070FFF 00031000

    2010-06-21 08:30:06.33 spid132 * kerberos 000007FF77410000 000007FF774C4FFF 000b5000

    2010-06-21 08:30:06.33 spid132 * MSASN1 000007FF7D340000 000007FF7D36BFFF 0002c000

    2010-06-21 08:30:06.33 spid132 * schannel 000007FF7DD50000 000007FF7DD91FFF 00042000

    2010-06-21 08:30:06.33 spid132 * CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000

    2010-06-21 08:30:06.33 spid132 * COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000

    2010-06-21 08:30:06.33 spid132 * XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000

    2010-06-21 08:30:06.33 spid132 * MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000

    2010-06-21 08:30:06.33 spid132 * OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000

    2010-06-21 08:30:06.33 spid132 * msvcp60 000000001E270000 000000001E359FFF 000ea000

    2010-06-21 08:30:06.33 spid132 * MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000

    2010-06-21 08:30:06.33 spid132 * VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000

    2010-06-21 08:30:06.33 spid132 * WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000

    2010-06-21 08:30:06.33 spid132 * CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000

    2010-06-21 08:30:06.33 spid132 * RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000

    2010-06-21 08:30:06.33 spid132 * mswsock 000007FF771B0000 000007FF7722CFFF 0007d000

    2010-06-21 08:30:06.33 spid132 * DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000

    2010-06-21 08:30:06.33 spid132 * winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000

    2010-06-21 08:30:06.33 spid132 * WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000

    2010-06-21 08:30:06.33 spid132 * rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000

    2010-06-21 08:30:06.33 spid132 * security 000007FF77530000 000007FF77534FFF 00005000

    2010-06-21 08:30:06.33 spid132 * msfte 0000000049980000 0000000049D2DFFF 003ae000

    2010-06-21 08:30:06.33 spid132 * dbghelp 0000000020610000 000000002076CFFF 0015d000

    2010-06-21 08:30:06.33 spid132 * WINTRUST 000007FF7E3E0000 000007FF7E42DFFF 0004e000

    2010-06-21 08:30:06.33 spid132 * imagehlp 000007FF7E470000 000007FF7E482FFF 00013000

    2010-06-21 08:30:06.33 spid132 * dssenh 0000000068100000 000000006813EFFF 0003f000

    2010-06-21 08:30:06.33 spid132 * hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000

    2010-06-21 08:30:06.33 spid132 * wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000

    2010-06-21 08:30:06.33 spid132 * NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000

    2010-06-21 08:30:06.33 spid132 * SAMLIB 000007FF77150000 000007FF77165FFF 00016000

    2010-06-21 08:30:06.33 spid132 * ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000

    2010-06-21 08:30:06.33 spid132 * xpsp2res 0000000020E80000 0000000021146FFF 002c7000

    2010-06-21 08:30:06.33 spid132 * CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000

    2010-06-21 08:30:06.33 spid132 * sqlncli 00000000337A0000 0000000033A63FFF 002c4000

    2010-06-21 08:30:06.33 spid132 * COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000

    2010-06-21 08:30:06.33 spid132 * comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000

    2010-06-21 08:30:06.33 spid132 * SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000

    2010-06-21 08:30:06.33 spid132 * SHELL32 000007FF7F190000 000007FF7FB9AFFF 00a0b000

    2010-06-21 08:30:06.33 spid132 * comctl32 000007FF7F000000 000007FF7F186FFF 00187000

    2010-06-21 08:30:06.33 spid132 * SQLNCLIR 0000000035000000 0000000035032FFF 00033000

    2010-06-21 08:30:06.33 spid132 * msftepxy 00000000037D0000 00000000037F0FFF 00021000

    2010-06-21 08:30:06.33 spid132 * xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000

    2010-06-21 08:30:06.33 spid132 * xpstar90 0000000053C30000 0000000053CB7FFF 00088000

    2010-06-21 08:30:06.33 spid132 * SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000

    2010-06-21 08:30:06.33 spid132 * ODBC32 000007FF63F00000 000007FF63F66FFF 00067000

    2010-06-21 08:30:06.33 spid132 * BatchParser90 00000000520C0000 00000000520ECFFF 0002d000

    2010-06-21 08:30:06.33 spid132 * ATL80 000000007C630000 000000007C64FFFF 00020000

    2010-06-21 08:30:06.33 spid132 * odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000

    2010-06-21 08:30:06.33 spid132 * xpstar90 000000002ADF0000 000000002AE15FFF 00026000

    2010-06-21 08:30:06.33 spid132 * xplog70 0000000034730000 000000003473FFFF 00010000

    2010-06-21 08:30:06.33 spid132 * xplog70 000000002AE30000 000000002AE32FFF 00003000

    2010-06-21 08:30:06.33 spid132 * mscorwks 000006427F330000 000006427FCE0FFF 009b1000

    2010-06-21 08:30:06.33 spid132 * mscorlib.ni 0000064278000000 0000064278ED8FFF 00ed9000

    2010-06-21 08:30:06.33 spid132 * mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000

    2010-06-21 08:30:06.33 spid132 * cryptnet 000007FF79690000 000007FF796AEFFF 0001f000

    2010-06-21 08:30:06.33 spid132 * SensApi 000007FF77C90000 000007FF77C96FFF 00007000

    2010-06-21 08:30:06.33 spid132 * SqlAccess 000000002FC00000 000000002FC57FFF 00058000

    2010-06-21 08:30:06.33 spid132 * mscorjit 000006427EED0000 000006427F053FFF 00184000

    2010-06-21 08:30:06.33 spid132 * System.Data 0000000030000000 00000000302E9FFF 002ea000

    2010-06-21 08:30:06.33 spid132 * System.ni 0000064274880000 0000064275283FFF 00a04000

    2010-06-21 08:30:06.33 spid132 * System.Transactions 0000000030960000 00000000309A8FFF 00049000

    2010-06-21 08:30:06.33 spid132 * System.Security.ni 000006424F240000 000006424F324FFF 000e5000

    2010-06-21 08:30:06.33 spid132 * System 000000007A440000 000000007A743FFF 00304000

    2010-06-21 08:30:06.33 spid132 * System.Security 0000000067920000 0000000067961FFF 00042000

    2010-06-21 08:30:06.33 spid132 * System.Xml 00000000637A0000 0000000063997FFF 001f8000

    2010-06-21 08:30:06.33 spid132 * sqlvdi 0000000034510000 000000003453BFFF 0002c000

    2010-06-21 08:30:06.33 spid132 * System.Configuration 0000000064890000 00000000648FBFFF 0006c000

    2010-06-21 08:30:06.33 spid132 * rasapi32 000007FF7E880000 000007FF7E8EAFFF 0006b000

    2010-06-21 08:30:06.33 spid132 * rasman 000007FF7E800000 000007FF7E81BFFF 0001c000

    2010-06-21 08:30:06.33 spid132 * TAPI32 000007FF7E820000 000007FF7E876FFF 00057000

    2010-06-21 08:30:06.33 spid132 * rtutils 000007FF7E610000 000007FF7E624FFF 00015000

    2010-06-21 08:30:06.33 spid132 * msxmlsql 0000000078800000 0000000078967FFF 00168000

    2010-06-21 08:30:06.33 spid132 * msxml3 000007FF56D40000 000007FF56F53FFF 00214000

    2010-06-21 08:30:06.33 spid132 * oledb32 000007FF5A9E0000 000007FF5AAA0FFF 000c1000

    2010-06-21 08:30:06.33 spid132 * MSDART 000007FF7ADB0000 000007FF7ADD7FFF 00028000

    2010-06-21 08:30:06.33 spid132 * OLEDB32R 000007FF63AB0000 000007FF63AC0FFF 00011000

    2010-06-21 08:30:06.33 spid132 * msadce 000007FF67870000 000007FF67906FFF 00097000

    2010-06-21 08:30:06.33 spid132 * msadcer 000007FF67810000 000007FF67815FFF 00006000

    2010-06-21 08:30:06.33 spid132 * SQLDMO 0000000048B70000 00000000491A4FFF 00635000

    2010-06-21 08:30:06.33 spid132 * odbcbcp 000007FF63EE0000 000007FF63EE7FFF 00008000

    2010-06-21 08:30:06.33 spid132 * SQLDMO 00000000462B0000 000000004633DFFF 0008e000

    2010-06-21 08:30:06.33 spid132 * comsvcs 000007FF57C40000 000007FF57E6AFFF 0022b000

    2010-06-21 08:30:06.33 spid132 * ATL 000007FF7E220000 000007FF7E23BFFF 0001c000

    2010-06-21 08:30:06.33 spid132 * sqloledb 000007FF5FE20000 000007FF5FEF6FFF 000d7000

    2010-06-21 08:30:06.33 spid132 * MSDATL3 00000000237C0000 00000000237DFFFF 00020000

    2010-06-21 08:30:06.33 spid132 * DBNETLIB 000007FF72490000 000007FF724B2FFF 00023000

    2010-06-21 08:30:06.33 spid132 * SQLOLEDB 0000000023540000 000000002354FFFF 00010000

    2010-06-21 08:30:06.33 spid132 * peverify 00000642FFC10000 00000642FFC44FFF 00035000

    2010-06-21 08:30:06.33 spid132 * xpSLS 000000003ED00000 000000003EE36FFF 00137000

    2010-06-21 08:30:06.33 spid132 * System.Web.Services 0000000042970000 0000000042A3FFFF 000d0000

    2010-06-21 08:30:06.33 spid132 *

    2010-06-21 08:30:06.33 spid132 * P1Home: FFFFFA8003542B60:

    2010-06-21 08:30:06.33 spid132 * P2Home: 0000000041F07EA0: FFFFFA8003542B60 0000000041F07EA0 000000002A8766B0 000007FF7FC78990 FFFFFA8000000000 FFFFFA8000000000

    2010-06-21 08:30:06.33 spid132 * P3Home: 000000002A8766B0: 00000009FA2A00A0 00000009FA2A00A0 0000000000000000 0000000000000008 0000000000000001 0000000000000000

    2010-06-21 08:30:06.33 spid132 * P4Home: 000007FF7FC78990: 000000000000003F 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001

    2010-06-21 08:30:06.33 spid132 * P5Home: FFFFFA8000000000:

    2010-06-21 08:30:06.33 spid132 * P6Home: FFFFFA8000000000:

    2010-06-21 08:30:06.33 spid132 * ContextFlags: 000000000010001F:

    2010-06-21 08:30:06.33 spid132 * MxCsr: 0000000000001FA0:

    2010-06-21 08:30:06.33 spid132 * SegCs: 0000000000000033:

    2010-06-21 08:30:06.33 spid132 * SegDs: 000000000000002B:

    2010-06-21 08:30:06.33 spid132 * SegEs: 000000000000002B:

    2010-06-21 08:30:06.33 spid132 * SegFs: 0000000000000053:

    2010-06-21 08:30:06.33 spid132 * SegGs: 000000000000002B:

    2010-06-21 08:30:06.33 spid132 * SegSs: 000000000000002B:

    2010-06-21 08:30:06.33 spid132 * EFlags: 0000000000010246: 006F006D006D006F 006900460020006E 000000730065006C 0050004D004F0043 005F00530055004C 003D00410044004D

    2010-06-21 08:30:06.33 spid132 * Rax: 00000000004D4E40: 0000000000000AF0 FFFFFFFFFFFFFFFF 0000000000000000 0000000100000000 0000000000000000 0000000000000000

    2010-06-21 08:30:06.33 spid132 * Rcx: 0000000000000000:

    2010-06-21 08:30:06.33 spid132 * Rdx: 00000000341B5250: 00000000341A4A70 00000000340CE010 0000000000000000 00000000004D4E40 000000003BBF34E0 000000001DAB0750

    2010-06-21 08:30:06.33 spid132 * Rbx: 000000002A8766B0: 00000009FA2A00A0 00000009FA2A00A0 0000000000000000 0000000000000008 0000000000000001 0000000000000000

    2010-06-21 08:30:06.33 spid132 * Rsp: 0000000041F08440: 0000000041F084F8 00000000016FC3FC 000000002A8766B0 0000000000000000 0000000000000000 000007FF63F266BE

    2010-06-21 08:30:06.33 spid132 * Rbp: 000007FF7FC78990: 000000000000003F 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001

    2010-06-21 08:30:06.33 spid132 * Rsi: 0000000041F09A10: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000000000074 0000000000000000

    2010-06-21 08:30:06.33 spid132 * Rdi: 0000000000000000:

    2010-06-21 08:30:06.33 spid132 * R8: 000007FFFFF76000: 0000000000000000 0000000041F10000 0000000041EF5000 0000000000000000 0000000000001E00 0000000000000000

    2010-06-21 08:30:06.33 spid132 * R9: 0000000041F08FF0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000

    2010-06-21 08:30:06.33 spid132 * R10: 0000000000000000:

    2010-06-21 08:30:06.33 spid132 * R11: 0000000041F08F98: 000007FF63F27335 0000000000000099 0000000A2A983AF0 0000000000000012 000000002A8702C8 0000000000000105

    2010-06-21 08:30:06.33 spid132 * R12: 0000000000000001:

    2010-06-21 08:30:06.33 spid132 * R13: 0000000000000001:

    2010-06-21 08:30:06.33 spid132 * R14: 0000000000000000:

    2010-06-21 08:30:06.33 spid132 * R15: 0000000041F09A10: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000000000074 0000000000000000

    2010-06-21 08:30:06.33 spid132 * Rip: 000007FF7FC51D71: 7241FB83661FB70F 6604775AFB83660A 3D6606B70F20C383 005A3D660A720041 8348002005660477 856602C6834802C7

    2010-06-21 08:30:06.33 spid132 * *******************************************************************************

    2010-06-21 08:30:06.33 spid132 * -------------------------------------------------------------------------------

    2010-06-21 08:30:06.33 spid132 * Short Stack Dump

    2010-06-21 08:30:06.34 spid132 000007FF7FC51D71 Module(msvcrt+0000000000051D71)

    2010-06-21 08:30:06.34 spid132 000007FF63F266BE Module(ODBC32+00000000000266BE)

    2010-06-21 08:30:06.34 spid132 000007FF63F27335 Module(ODBC32+0000000000027335)

    2010-06-21 08:30:06.34 spid132 000007FF63F1A451 Module(ODBC32+000000000001A451)

    2010-06-21 08:30:06.34 spid132 0000000053C50494 Module(xpstar90+0000000000020494)

    2010-06-21 08:30:06.34 spid132 0000000053C3D1AB Module(xpstar90+000000000000D1AB)

    2010-06-21 08:30:06.34 spid132 0000000053C3E799 Module(xpstar90+000000000000E799)

    2010-06-21 08:30:06.34 spid132 0000000053C40913 Module(xpstar90+0000000000010913)

    2010-06-21 08:30:06.34 spid132 0000000053C40ED1 Module(xpstar90+0000000000010ED1)

    2010-06-21 08:30:06.34 spid132 0000000001CC9C41 Module(sqlservr+0000000000CC9C41)

    2010-06-21 08:30:06.34 spid132 0000000001E5D45C Module(sqlservr+0000000000E5D45C)

    2010-06-21 08:30:06.34 spid132 000000000243BA3A Module(sqlservr+000000000143BA3A)

    2010-06-21 08:30:06.34 spid132 000000000243CC95 Module(sqlservr+000000000143CC95)

    2010-06-21 08:30:06.34 spid132 00000000026115CB Module(sqlservr+00000000016115CB)

    2010-06-21 08:30:06.34 spid132 0000000001AE0D8F Module(sqlservr+0000000000AE0D8F)

    2010-06-21 08:30:06.34 spid132 0000000001839DF5 Module(sqlservr+0000000000839DF5)

    2010-06-21 08:30:06.34 spid132 0000000001839FE2 Module(sqlservr+0000000000839FE2)

    2010-06-21 08:30:06.34 spid132 00000000018583A0 Module(sqlservr+00000000008583A0)

    2010-06-21 08:30:06.34 spid132 00000000029A8C12 Module(sqlservr+00000000019A8C12)

    2010-06-21 08:30:06.34 spid132 00000000029CA4CB Module(sqlservr+00000000019CA4CB)

    2010-06-21 08:30:06.34 spid132 00000000018589C3 Module(sqlservr+00000000008589C3)

    2010-06-21 08:30:06.34 spid132 0000000002614E35 Module(sqlservr+0000000001614E35)

    2010-06-21 08:30:06.34 spid132 0000000001AE0650 Module(sqlservr+0000000000AE0650)

    2010-06-21 08:30:06.34 spid132 000000000170B9C5 Module(sqlservr+000000000070B9C5)

    2010-06-21 08:30:06.34 spid132 00000000017053E2 Module(sqlservr+00000000007053E2)

    2010-06-21 08:30:06.34 spid132 000000000170A59D Module(sqlservr+000000000070A59D)

    2010-06-21 08:30:06.34 spid132 00000000016BC32E Module(sqlservr+00000000006BC32E)

    2010-06-21 08:30:06.34 spid132 00000000016BC5C9 Module(sqlservr+00000000006BC5C9)

    2010-06-21 08:30:06.34 spid132 00000000016B5CC4 Module(sqlservr+00000000006B5CC4)

    2010-06-21 08:30:06.34 spid132 000000000155E837 Module(sqlservr+000000000055E837)

    2010-06-21 08:30:06.34 spid132 0000000001522F59 Module(sqlservr+0000000000522F59)

    2010-06-21 08:30:06.34 spid132 00000000015372B0 Module(sqlservr+00000000005372B0)

    2010-06-21 08:30:06.35 spid132 00000000014F72F8 Module(sqlservr+00000000004F72F8)

    2010-06-21 08:30:06.35 spid132 00000000781337D7 Module(MSVCR80+00000000000037D7)

    2010-06-21 08:30:06.35 spid132 0000000078133894 Module(MSVCR80+0000000000003894)

    2010-06-21 08:30:06.35 spid132 0000000077D6B71A Module(kernel32+000000000002B71A)

    2010-06-21 08:30:06.35 spid132 Stack Signature for the dump is 0x00000000FDAFE7FD

    2010-06-21 08:30:12.46 spid132 External dump process return code 0x20000001.

    External dump process returned no errors. 2010-06-21 08:30:12.46 spid132 Error: 18002, Severity: 20, State: 1.

    2010-06-21 08:30:12.46 spid132 Exception happened when running extended stored procedure 'xp_readerrorlog' in the library 'xpstar90.dll'. SQL Server is terminating process 132. Exception type: Win32 exception; Exception code: 0xc0000005.

    Note, that other than my error logs not opening in SSMS, everything else APPEARS to be running fine. So I don't really want to restart unless there is a need.

    Thanks for the help everyone.

    Nathan

  • Contact Microsoft's customer support people. They have tools to interogate stack dumps.

    Gail Shaw
    Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)
    SQL In The Wild: Discussions on DB performance with occasional diversions into recoverability

    We walk in the dark places no others will enter
    We stand on the bridge and no one may pass
  • Yea, trying to avoid it as my manager doesn't really want to spend the money and will probably ask why bother if I can still read the error log in Notepad.

    Also, I want to learn how just for the fun of it.

    Fraggle

  • What's in the error log is just the short stack dump. Got the .mdmp file? That's the full stack dump that you would open in a debugger (assuming that you know assembler programming)

    If it's a bug in SQL, CSS won't charge. Make sure that you're up to the latest patch levels first.

    Gail Shaw
    Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)
    SQL In The Wild: Discussions on DB performance with occasional diversions into recoverability

    We walk in the dark places no others will enter
    We stand on the bridge and no one may pass
  • GilaMonster (6/21/2010)


    What's in the error log is just the short stack dump. Got the .mdmp file? That's the full stack dump that you would open in a debugger (assuming that you know assembler programming)

    If it's a bug in SQL, CSS won't charge. Make sure that you're up to the latest patch levels first.

    Gila,

    Just did an upgrade to SP3 about 2 months ago on all servers (hopefully, this isn't related to that). The .mdmp file was attached in my first post for anyone who wanted to read it. I personally don't know assembly, however, I have a couple of guys at the shop who do. What do I need to open the file with? Visual Studio? Something else altogether?

    Thanks,

    Fraggle

  • I think this is what you need. Not 100% sure. Long time since I tried to debug these things myself. You'll also need the public symbols for SQL, tool should download those automatically

    http://www.microsoft.com/whdc/devtools/debugging/installx86.mspx#b

    Try a restart of SQL if you can, make sure that nothing's scribbled on memory.

    Gail Shaw
    Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)
    SQL In The Wild: Discussions on DB performance with occasional diversions into recoverability

    We walk in the dark places no others will enter
    We stand on the bridge and no one may pass

Viewing 6 posts - 1 through 5 (of 5 total)

You must be logged in to reply to this topic. Login to reply