Wednesday, March 21, 2012

Fatal Exception Error

Hello,
This morning, my SQL Server 2000 was not responding and upon investigation
in the logs, I noticed that one process had brought the services down (2
services were shut off: SQL Server and SQL Server Agent).
I restarted the services and everything went fine.....however, if it
hapenned once, I'm sure it will come back to haunt me again.
Below is a dump of SQL Server Log in the last moments of going down: -
========================================
===============================
2005-04-18 06:59:04.31 spid55 SQL Server is aborting. Fatal exception 0
caught..
2005-04-18 06:59:04.31 spid55 Error: 0, Severity: 21, State: 0
2005-04-18 06:59:04.31 spid55 Stack Signature for the dump is 0xBF697704
2005-04-18 06:59:03.41 spid55 Using 'dbghelp.dll' version '4.0.5'...
2005-04-18 06:59:03.41 spid55 Error: 3624, Severity: 20, State: 1.
2005-04-18 06:59:03.40 spid55 SQL Server Assertion: File: <p:\sql\ntdbms\
cursors\src\ccursor.cpp>, line=850 .
2005-04-18 06:59:03.40 spid55 Stack Signature for the dump is 0x4191A817
2005-04-18 06:59:02.18 spid55 Using 'dbghelp.dll' version '4.0.5'...
2005-04-18 06:59:02.15 spid55 Stack Signature for the dump is 0x92504269
2005-04-18 06:58:59.59 spid55 SqlDumpExceptionHandler: Process 55
generated fatal exception c0000005 EXCEPTIO
2005-04-18 06:58:59.59 spid55 Error: 0, Severity: 19, State: 0
2005-04-18 06:58:59.31 spid55 Using 'dbghelp.dll' version '4.0.5'...
========================================
===============================
Can anyone please guide me with the diagnosis and possible prevention
methods.
Thanks,
Sameer.
Message posted via http://www.droptable.comThis is likely to be a SQL bug... Make sure you are service packed up...
and it's probably time to call PSS... but if you post enough information
here, it would be good if someone can reproduce it...
Wayne Snyder MCDBA, SQL Server MVP
Mariner, Charlotte, NC
(Please respond only to the newsgroup.)
I support the Professional Association for SQL Server ( PASS) and it's
community of SQL Professionals.
"Sameer Premji via droptable.com" <forum@.nospam.droptable.com> wrote in
message news:5f2af30e65464083a8bd1523a3753302@.SQ
droptable.com...
> Hello,
> This morning, my SQL Server 2000 was not responding and upon investigation
> in the logs, I noticed that one process had brought the services down (2
> services were shut off: SQL Server and SQL Server Agent).
> I restarted the services and everything went fine.....however, if it
> hapenned once, I'm sure it will come back to haunt me again.
> Below is a dump of SQL Server Log in the last moments of going down: -
> ========================================
===============================
> 2005-04-18 06:59:04.31 spid55 SQL Server is aborting. Fatal exception 0
> caught..
> 2005-04-18 06:59:04.31 spid55 Error: 0, Severity: 21, State: 0
> 2005-04-18 06:59:04.31 spid55 Stack Signature for the dump is 0xBF697704
> 2005-04-18 06:59:03.41 spid55 Using 'dbghelp.dll' version '4.0.5'...
> 2005-04-18 06:59:03.41 spid55 Error: 3624, Severity: 20, State: 1.
> 2005-04-18 06:59:03.40 spid55 SQL Server Assertion: File: <p:\sql\ntdbms\
> cursors\src\ccursor.cpp>, line=850 .
> 2005-04-18 06:59:03.40 spid55 Stack Signature for the dump is 0x4191A817
> 2005-04-18 06:59:02.18 spid55 Using 'dbghelp.dll' version '4.0.5'...
> 2005-04-18 06:59:02.15 spid55 Stack Signature for the dump is 0x92504269
> 2005-04-18 06:58:59.59 spid55 SqlDumpExceptionHandler: Process 55
> generated fatal exception c0000005 EXCEPTIO
> 2005-04-18 06:58:59.59 spid55 Error: 0, Severity: 19, State: 0
> 2005-04-18 06:58:59.31 spid55 Using 'dbghelp.dll' version '4.0.5'...
> ========================================
===============================
> Can anyone please guide me with the diagnosis and possible prevention
> methods.
> Thanks,
> Sameer.
> --
> Message posted via http://www.droptable.com|||My SQL Server has SP3a.
I checked the MS Knowledge Base and it says that it fixes in SP3 but I
guess it didn't.
More info on the logs: -
2005-04-18 06:59:03.41
--
Using 'dbghelp.dll' version '4.0.5'
*Dump thread - spid = 55, PSS = 0x6719d1c0, EC = 0x6719d4e8
*Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL\log\
SQLDump0213.txt
* ****************************************
**********************************
*****
*
* BEGIN STACK DUMP:
* 04/18/05 06:59:03 spid 55
*
* ex_terminator - Last chance exception handling
*
*** Unable to print input buffer - buffer changing location or not found ***
*
* MODULE BASE END SIZE
* sqlservr 00400000 00B2CFFF 0072d000
* ntdll 77F80000 77FFCFFF 0007d000
* KERNEL32 7C570000 7C622FFF 000b3000
* ADVAPI32 7C2D0000 7C331FFF 00062000
* RPCRT4 77D30000 77DA0FFF 00071000
* USER32 77E10000 77E6EFFF 0005f000
* GDI32 77F40000 77F7AFFF 0003b000
* OPENDS60 41060000 41065FFF 00006000
* MSVCRT 78000000 78044FFF 00045000
* UMS 41070000 4107CFFF 0000d000
* SQLSORT 42AE0000 42B6FFFF 00090000
* MSVCIRT 780A0000 780B1FFF 00012000
* sqlevn70 41080000 41086FFF 00007000
* NETAPI32 24350000 2439EFFF 0004f000
* Secur32 7C340000 7C34EFFF 0000f000
* NTDSAPI 243A0000 243B0FFF 00011000
* DNSAPI 243C0000 243E3FFF 00024000
* WSOCK32 243F0000 243F7FFF 00008000
* WS2_32 24400000 24413FFF 00014000
* WS2HELP 24420000 24427FFF 00008000
* WLDAP32 24430000 24459FFF 0002a000
* NETRAP 24460000 24465FFF 00006000
* SAMLIB 24470000 2447EFFF 0000f000
* ole32 245A0000 2468EFFF 000ef000
* XOLEHLP 24790000 24797FFF 00008000
* MSDTCPRX 247A0000 24856FFF 000b7000
* MTXCLU 24860000 2486FFFF 00010000
* VERSION 24870000 24876FFF 00007000
* LZ32 24880000 24885FFF 00006000
* CLUSAPI 24890000 2489FFFF 00010000
* RESUTILS 248A0000 248ACFFF 0000d000
* USERENV 7C0F0000 7C150FFF 00061000
* rnr20 782C0000 782CBFFF 0000c000
* iphlpapi 248B0000 248C2FFF 00013000
* ICMP 248D0000 248D4FFF 00005000
* MPRAPI 248E0000 248F6FFF 00017000
* OLEAUT32 24900000 2499AFFF 0009b000
* ACTIVEDS 249A0000 249CEFFF 0002f000
* ADSLDPC 249D0000 249F2FFF 00023000
* RTUTILS 24A00000 24A0DFFF 0000e000
* SETUPAPI 24A10000 24A9DFFF 0008e000
* RASAPI32 24AA0000 24AD2FFF 00033000
* RASMAN 24AE0000 24AF0FFF 00011000
* TAPI32 24B00000 24B21FFF 00022000
* COMCTL32 24B30000 24BB3FFF 00084000
* SHLWAPI 24BC0000 24C25FFF 00066000
* DHCPCSVC 24C30000 24C48FFF 00019000
* winrnr 250F0000 250F7FFF 00008000
* rasadhlp 25100000 25104FFF 00005000
* SSNETLIB 258C0000 258D4FFF 00015000
* SSNMPN70 410D0000 410D5FFF 00006000
* security 25C20000 25C23FFF 00004000
* msafd 25E30000 25E4DFFF 0001e000
* wshtcpip 25E50000 25E56FFF 00007000
* SSmsLPCn 25EE0000 25EE6FFF 00007000
* SQLFTQRY 41020000 41051FFF 00032000
* CLBCATQ 26770000 267FFFFF 00090000
* sqloledb 26810000 26882FFF 00073000
* MSDART 26890000 268AEFFF 0001f000
* comdlg32 268B0000 268EDFFF 0003e000
* SHELL32 782F0000 78534FFF 00245000
* MSDATL3 268F0000 26904FFF 00015000
* oledb32 26C10000 26C75FFF 00066000
* OLEDB32R 26C80000 26C8FFFF 00010000
* msv1_0 26D30000 26D50FFF 00021000
* CRYPT32 7C740000 7C7C6FFF 00087000
* MSASN1 26D60000 26D6FFFF 00010000
* xpsqlbot 26D80000 26D85FFF 00006000
* xpstar 410F0000 41136FFF 00047000
* SQLRESLD 42AC0000 42AC6FFF 00007000
* SQLSVC 26DB0000 26DC6FFF 00017000
* ODBC32 26DD0000 26E01FFF 00032000
* odbcbcp 26E10000 26E15FFF 00006000
* W95SCM 41140000 4114BFFF 0000c000
* SQLUNIRL 10000000 1002CFFF 0002d000
* WINSPOOL 10030000 1004DFFF 0001e000
* MPR 10050000 1005FFFF 00010000
* SHFOLDER 10060000 10067FFF 00008000
* odbcint 10170000 10185FFF 00016000
* NDDEAPI 10190000 10196FFF 00007000
* SQLSVC 101A0000 101A5FFF 00006000
* xpstar 101B0000 101B8FFF 00009000
* rsabase 7CA00000 7CA22FFF 00023000
* msdasql 02FB0000 02FF9FFF 0004a000
* MSDASQLR 03000000 03003FFF 00004000
* COMSVCS 78740000 788AEFFF 0016f000
* TxfAux 03090000 030F3FFF 00064000
* w3odbcci 03280000 032C8FFF 00049000
* CTL3D32 032D0000 032E0FFF 00011000
* pscore 032F0000 0332EFFF 0003f000
* W3CLNRES 03340000 03348FFF 00009000
* W3CLNRSX 03350000 03358FFF 00009000
* odbccp32 033E0000 033F8FFF 00019000
* W3CSM100 03400000 03411FFF 00012000
* pscl 03420000 034A6FFF 00087000
* MSVCP60 780C0000 78120FFF 00061000
* w3scmv7 034C0000 034D0FFF 00011000
* W3AIF10C 034F0000 03515FFF 00026000
* W3NSL244 11400000 1142CFFF 0002d000
* W3ENC107 03540000 03718FFF 001d9000
* clientrb 03830000 0383EFFF 0000f000
* MSWSOCK 03840000 03851FFF 00012000
* w3csp100 03960000 0396FFFF 00010000
* msadce 03A70000 03ABAFFF 0004b000
* mswstr10 03AC0000 03B54FFF 00095000
* msadcer 03F70000 03F74FFF 00005000
* xplog70 03F80000 03F91FFF 00012000
* xplog70 03FA0000 03FA3FFF 00004000
* kerberos 78280000 782B5FFF 00036000
* CRYPTDLL 08090000 0809DFFF 0000e000
* DBNETLIB 0D520000 0D52EFFF 0000f000
* SQLOLEDB 0D570000 0D57EFFF 0000f000
* dbghelp 01890000 01944FFF 000b5000
*
* Edi: 6719D4E8: 6719D1C0 6719D4EC 6719D4EC 56489C38 661CD5F8
66816030
* Esi: 00000000:
* Eax: 00000000:
* Ebx: 6719D1C0: 00060037 00000000 0071D9B7 0000963A 00000000
00000000
* Ecx: 01BDB200: 00000000 0001003F 00000000 00000000 00000000
00000000
* Edx: FFFFFFFF:
* Eip: 0087A90E: 4D830088 75FFFFFC 0875FF0C E8E04D8B 0000002D
64F04D8B
* Ebp: 01BDB1E4: 01BDBA04 0087C41F 6719D1C0 00AD8624 78032B18
00000000
* SegCs: 0000001B:
* EFlags: 00010246: 00740061 003D0068 003A0043 0050005C 00530056
005C0057
* Esp: 01BDB1B8: 6719D4E8 00000000 6719D1C0 01BDB200 6719D000
01BDB1B8
* SegSs: 00000023:
* ****************************************
**********************************
*****
* ----
--
* Short Stack Dump
* 0087A90E Module(sqlservr+0047A90E)
(CStackDump::GetContextAndDump+0000002E)
* 0087C41F Module(sqlservr+0047C41F) (stackTrace+00000223)
* 009318AF Module(sqlservr+005318AF) (ex_terminator+00000035)
* 78006942 Module(MSVCRT+00006942) (terminate+00000043)
* 7800686A Module(MSVCRT+0000686A) (_unDNameEx+000006FE)
* 7800699E Module(MSVCRT+0000699E) (abort+00000050)
* 780071B7 Module(MSVCRT+000071B7) (_CxxFrameHandler+00000026)
* 77F96BA7 Module(ntdll+00016BA7) (ZwSetIoCompletion+00000182)
* 77F96D67 Module(ntdll+00016D67) (RtlUnwind+000000DC)
* 7800716A Module(MSVCRT+0000716A) (CxxThrowException+00000096)
* 78006C3C Module(MSVCRT+00006C3C) (abort+000002EE)
* 78006B7C Module(MSVCRT+00006B7C) (abort+0000022E)
* 780069FB Module(MSVCRT+000069FB) (abort+000000AD)
* 7800735D Module(MSVCRT+0000735D) (_CxxLongjmpUnwind+00000196)
* 77F96BA7 Module(ntdll+00016BA7) (ZwSetIoCompletion+00000182)
* 77F96C42 Module(ntdll+00016C42) (ZwSetIoCompletion+0000021D)
* 77F9FF6E Module(ntdll+0001FF6E) (KiUserExceptionDispatcher+0000000E)
* 78007108 Module(MSVCRT+00007108) (CxxThrowException+00000034)
* 00488749 Module(sqlservr+00088749) (SetEcFlagAndThrow+00000026)
* 004886C2 Module(sqlservr+000886C2) (ex_raise2+00000396)
* 00931CD9 Module(sqlservr+00531CD9) (ex_raisecontrol+00000080)
* 0093141A Module(sqlservr+0053141A) (ex_trans_cexcept+000001FE)
* 780072DC Module(MSVCRT+000072DC) (_CxxLongjmpUnwind+00000115)
* 78006FCA Module(MSVCRT+00006FCA) (abort+0000067C)
* 78006BA7 Module(MSVCRT+00006BA7) (abort+00000259)
* 780069FB Module(MSVCRT+000069FB) (abort+000000AD)
* 780071B7 Module(MSVCRT+000071B7) (_CxxFrameHandler+00000026)
* 77F96BA7 Module(ntdll+00016BA7) (ZwSetIoCompletion+00000182)
* 77F96C42 Module(ntdll+00016C42) (ZwSetIoCompletion+0000021D)
* 77F9FF6E Module(ntdll+0001FF6E) (KiUserExceptionDispatcher+0000000E)
* 0057E8A9 Module(sqlservr+0017E8A9)
(CCursorDeclareStmt::XretExecute+0000055
5)
* 0041B442 Module(sqlservr+0001B442)
(CMsqlExecContext::ExecuteStmts+000003B9
)
* 0041AA88 Module(sqlservr+0001AA88) (CMsqlExecContext::Execute+000001B6)
* 0041B9B6 Module(sqlservr+0001B9B6) (CSQLSource::Execute+00000357)
* 005EFFC0 Module(sqlservr+001EFFC0) (SpPrepExec+00000313)
* 00591A0A Module(sqlservr+00191A0A) (SPCursor::CursorExecPrepExec+0000005D)
* 00591C3D Module(sqlservr+00191C3D) (SPCursor::PrepExec+0000002D)
* 005F142F Module(sqlservr+001F142F) (CSpecProc::ExecuteSpecial+000000B3)
* 005F1988 Module(sqlservr+001F1988) (CSpecProc::Execute+000000B6)
* 0061353F Module(sqlservr+0021353F) (execrpc+000004A6)
* 0043816D Module(sqlservr+0003816D) (execute_rpc+00000019)
* 00427001 Module(sqlservr+00027001) (process_commands+00000232)
* 41075002 Module(UMS+00005002) (ProcessWorkRequests+00000272)
* 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
* 78008454 Module(MSVCRT+00008454) (endthread+000000C1)
* 7C57B388 Module(KERNEL32+0000B388) (lstrcmpiW+000000B7)
* ---
2005-04-18 06:59:03.40
--
SQL Server Assertion: File: <p:\sql\ntdbms\cursors\src\ccursor.cpp>,
line=850
Failed Assertion = 'fFalse'.
2005-04-18 06:58:59.59
--
SqlDumpExceptionHandler: Process 55 generated fatal exception c0000005
EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..
* ****************************************
**********************************
*****
*
* BEGIN STACK DUMP:
* 04/18/05 06:58:59 spid 55
*
* Exception Address = 327B0080
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 327B0080
*** Unable to print input buffer - buffer changing location or not found ***
*
* MODULE BASE END SIZE
* sqlservr 00400000 00B2CFFF 0072d000
* ntdll 77F80000 77FFCFFF 0007d000
* KERNEL32 7C570000 7C622FFF 000b3000
* ADVAPI32 7C2D0000 7C331FFF 00062000
* RPCRT4 77D30000 77DA0FFF 00071000
* USER32 77E10000 77E6EFFF 0005f000
* GDI32 77F40000 77F7AFFF 0003b000
* OPENDS60 41060000 41065FFF 00006000
* MSVCRT 78000000 78044FFF 00045000
* UMS 41070000 4107CFFF 0000d000
* SQLSORT 42AE0000 42B6FFFF 00090000
* MSVCIRT 780A0000 780B1FFF 00012000
* sqlevn70 41080000 41086FFF 00007000
* NETAPI32 24350000 2439EFFF 0004f000
* Secur32 7C340000 7C34EFFF 0000f000
* NTDSAPI 243A0000 243B0FFF 00011000
* DNSAPI 243C0000 243E3FFF 00024000
* WSOCK32 243F0000 243F7FFF 00008000
* WS2_32 24400000 24413FFF 00014000
* WS2HELP 24420000 24427FFF 00008000
* WLDAP32 24430000 24459FFF 0002a000
* NETRAP 24460000 24465FFF 00006000
* SAMLIB 24470000 2447EFFF 0000f000
* ole32 245A0000 2468EFFF 000ef000
* XOLEHLP 24790000 24797FFF 00008000
* MSDTCPRX 247A0000 24856FFF 000b7000
* MTXCLU 24860000 2486FFFF 00010000
* VERSION 24870000 24876FFF 00007000
* LZ32 24880000 24885FFF 00006000
* CLUSAPI 24890000 2489FFFF 00010000
* RESUTILS 248A0000 248ACFFF 0000d000
* USERENV 7C0F0000 7C150FFF 00061000
* rnr20 782C0000 782CBFFF 0000c000
* iphlpapi 248B0000 248C2FFF 00013000
* ICMP 248D0000 248D4FFF 00005000
* MPRAPI 248E0000 248F6FFF 00017000
* OLEAUT32 24900000 2499AFFF 0009b000
* ACTIVEDS 249A0000 249CEFFF 0002f000
* ADSLDPC 249D0000 249F2FFF 00023000
* RTUTILS 24A00000 24A0DFFF 0000e000
* SETUPAPI 24A10000 24A9DFFF 0008e000
* RASAPI32 24AA0000 24AD2FFF 00033000
* RASMAN 24AE0000 24AF0FFF 00011000
* TAPI32 24B00000 24B21FFF 00022000
* COMCTL32 24B30000 24BB3FFF 00084000
* SHLWAPI 24BC0000 24C25FFF 00066000
* DHCPCSVC 24C30000 24C48FFF 00019000
* winrnr 250F0000 250F7FFF 00008000
* rasadhlp 25100000 25104FFF 00005000
* SSNETLIB 258C0000 258D4FFF 00015000
* SSNMPN70 410D0000 410D5FFF 00006000
* security 25C20000 25C23FFF 00004000
* msafd 25E30000 25E4DFFF 0001e000
* wshtcpip 25E50000 25E56FFF 00007000
* SSmsLPCn 25EE0000 25EE6FFF 00007000
* SQLFTQRY 41020000 41051FFF 00032000
* CLBCATQ 26770000 267FFFFF 00090000
* sqloledb 26810000 26882FFF 00073000
* MSDART 26890000 268AEFFF 0001f000
* comdlg32 268B0000 268EDFFF 0003e000
* SHELL32 782F0000 78534FFF 00245000
* MSDATL3 268F0000 26904FFF 00015000
* oledb32 26C10000 26C75FFF 00066000
* OLEDB32R 26C80000 26C8FFFF 00010000
* msv1_0 26D30000 26D50FFF 00021000
* CRYPT32 7C740000 7C7C6FFF 00087000
* MSASN1 26D60000 26D6FFFF 00010000
* xpsqlbot 26D80000 26D85FFF 00006000
* xpstar 410F0000 41136FFF 00047000
* SQLRESLD 42AC0000 42AC6FFF 00007000
* SQLSVC 26DB0000 26DC6FFF 00017000
* ODBC32 26DD0000 26E01FFF 00032000
* odbcbcp 26E10000 26E15FFF 00006000
* W95SCM 41140000 4114BFFF 0000c000
* SQLUNIRL 10000000 1002CFFF 0002d000
* WINSPOOL 10030000 1004DFFF 0001e000
* MPR 10050000 1005FFFF 00010000
* SHFOLDER 10060000 10067FFF 00008000
* odbcint 10170000 10185FFF 00016000
* NDDEAPI 10190000 10196FFF 00007000
* SQLSVC 101A0000 101A5FFF 00006000
* xpstar 101B0000 101B8FFF 00009000
* rsabase 7CA00000 7CA22FFF 00023000
* msdasql 02FB0000 02FF9FFF 0004a000
* MSDASQLR 03000000 03003FFF 00004000
* COMSVCS 78740000 788AEFFF 0016f000
* TxfAux 03090000 030F3FFF 00064000
* w3odbcci 03280000 032C8FFF 00049000
* CTL3D32 032D0000 032E0FFF 00011000
* pscore 032F0000 0332EFFF 0003f000
* W3CLNRES 03340000 03348FFF 00009000
* W3CLNRSX 03350000 03358FFF 00009000
* odbccp32 033E0000 033F8FFF 00019000
* W3CSM100 03400000 03411FFF 00012000
* pscl 03420000 034A6FFF 00087000
* MSVCP60 780C0000 78120FFF 00061000
* w3scmv7 034C0000 034D0FFF 00011000
* W3AIF10C 034F0000 03515FFF 00026000
* W3NSL244 11400000 1142CFFF 0002d000
* W3ENC107 03540000 03718FFF 001d9000
* clientrb 03830000 0383EFFF 0000f000
* MSWSOCK 03840000 03851FFF 00012000
* w3csp100 03960000 0396FFFF 00010000
* msadce 03A70000 03ABAFFF 0004b000
* mswstr10 03AC0000 03B54FFF 00095000
* msadcer 03F70000 03F74FFF 00005000
* xplog70 03F80000 03F91FFF 00012000
* xplog70 03FA0000 03FA3FFF 00004000
* kerberos 78280000 782B5FFF 00036000
* CRYPTDLL 08090000 0809DFFF 0000e000
* DBNETLIB 0D520000 0D52EFFF 0000f000
* SQLOLEDB 0D570000 0D57EFFF 0000f000
* dbghelp 00BF0000 00CA4FFF 000b5000
*
* Edi: 00000000:
* Esi: 604F8670: 604F86F2 00000000 00000000 00000000 604F8020
604F8ED8
* Eax: 604F8EF0: 00992A72 00992A60 00992A50 00992A38 00992A24
00992A04
* Ebx: 00000000:
* Ecx: 00992A72: 28C60080 65380042 64BA0042 64E70080 327B0080
E8300080
* Edx: 00000000:
* Eip: 327B0080:
* Ebp: 01BDEDFC: 01BDEFD8 0057E8A9 604FC068 009AA108 00000000
00000000
* SegCs: 0000001B:
* EFlags: 00010246: 00740061 003D0068 003A0043 0050005C 00530056
005C0057
* Esp: 01BDED84: 005819E1 604F8EF0 00000000 00000000 00000001
604F8068
* SegSs: 00000023:
* ****************************************
**********************************
*****
* ----
--
* Short Stack Dump
* 327B0080 Module(UNKNOWN+00000000)
* 005819E1 Module(sqlservr+001819E1) (CCursorTableScan::WakeUp+00000018)
* 00581FC4 Module(sqlservr+00181FC4) (CCursor::InitFromCache+0000015A)
* 00581E64 Module(sqlservr+00181E64) (CCursor::InitFromCache+0000000A)
* ---
Message posted via http://www.droptable.com|||It looks like it might be this:
FIX: A Cursor with a Large Object Parameter May Cause an Access Violation on
CStmtCond::XretExecute
http://support.microsoft.com/defaul...kb;en-us;824027
I would definitely call PSS and open a support call. You will need to open
a call anyway to obtain the hotfix associated with this KB article.
Geoff N. Hiten
Microsoft SQL Server MVP
"Sameer Premji via droptable.com" <forum@.droptable.com> wrote in message
news:d53b94836e8543e8ae8f5237f22fe978@.SQ
droptable.com...
> My SQL Server has SP3a.
> I checked the MS Knowledge Base and it says that it fixes in SP3 but I
> guess it didn't.
> More info on the logs: -
>
> 2005-04-18 06:59:03.41
> --
> Using 'dbghelp.dll' version '4.0.5'
> *Dump thread - spid = 55, PSS = 0x6719d1c0, EC = 0x6719d4e8
> *Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL\log\
> SQLDump0213.txt
> *
> ****************************************
**********************************
*****
> *
> * BEGIN STACK DUMP:
> * 04/18/05 06:59:03 spid 55
> *
> * ex_terminator - Last chance exception handling
> *
> *** Unable to print input buffer - buffer changing location or not found
> ***
> *
> * MODULE BASE END SIZE
> * sqlservr 00400000 00B2CFFF 0072d000
> * ntdll 77F80000 77FFCFFF 0007d000
> * KERNEL32 7C570000 7C622FFF 000b3000
> * ADVAPI32 7C2D0000 7C331FFF 00062000
> * RPCRT4 77D30000 77DA0FFF 00071000
> * USER32 77E10000 77E6EFFF 0005f000
> * GDI32 77F40000 77F7AFFF 0003b000
> * OPENDS60 41060000 41065FFF 00006000
> * MSVCRT 78000000 78044FFF 00045000
> * UMS 41070000 4107CFFF 0000d000
> * SQLSORT 42AE0000 42B6FFFF 00090000
> * MSVCIRT 780A0000 780B1FFF 00012000
> * sqlevn70 41080000 41086FFF 00007000
> * NETAPI32 24350000 2439EFFF 0004f000
> * Secur32 7C340000 7C34EFFF 0000f000
> * NTDSAPI 243A0000 243B0FFF 00011000
> * DNSAPI 243C0000 243E3FFF 00024000
> * WSOCK32 243F0000 243F7FFF 00008000
> * WS2_32 24400000 24413FFF 00014000
> * WS2HELP 24420000 24427FFF 00008000
> * WLDAP32 24430000 24459FFF 0002a000
> * NETRAP 24460000 24465FFF 00006000
> * SAMLIB 24470000 2447EFFF 0000f000
> * ole32 245A0000 2468EFFF 000ef000
> * XOLEHLP 24790000 24797FFF 00008000
> * MSDTCPRX 247A0000 24856FFF 000b7000
> * MTXCLU 24860000 2486FFFF 00010000
> * VERSION 24870000 24876FFF 00007000
> * LZ32 24880000 24885FFF 00006000
> * CLUSAPI 24890000 2489FFFF 00010000
> * RESUTILS 248A0000 248ACFFF 0000d000
> * USERENV 7C0F0000 7C150FFF 00061000
> * rnr20 782C0000 782CBFFF 0000c000
> * iphlpapi 248B0000 248C2FFF 00013000
> * ICMP 248D0000 248D4FFF 00005000
> * MPRAPI 248E0000 248F6FFF 00017000
> * OLEAUT32 24900000 2499AFFF 0009b000
> * ACTIVEDS 249A0000 249CEFFF 0002f000
> * ADSLDPC 249D0000 249F2FFF 00023000
> * RTUTILS 24A00000 24A0DFFF 0000e000
> * SETUPAPI 24A10000 24A9DFFF 0008e000
> * RASAPI32 24AA0000 24AD2FFF 00033000
> * RASMAN 24AE0000 24AF0FFF 00011000
> * TAPI32 24B00000 24B21FFF 00022000
> * COMCTL32 24B30000 24BB3FFF 00084000
> * SHLWAPI 24BC0000 24C25FFF 00066000
> * DHCPCSVC 24C30000 24C48FFF 00019000
> * winrnr 250F0000 250F7FFF 00008000
> * rasadhlp 25100000 25104FFF 00005000
> * SSNETLIB 258C0000 258D4FFF 00015000
> * SSNMPN70 410D0000 410D5FFF 00006000
> * security 25C20000 25C23FFF 00004000
> * msafd 25E30000 25E4DFFF 0001e000
> * wshtcpip 25E50000 25E56FFF 00007000
> * SSmsLPCn 25EE0000 25EE6FFF 00007000
> * SQLFTQRY 41020000 41051FFF 00032000
> * CLBCATQ 26770000 267FFFFF 00090000
> * sqloledb 26810000 26882FFF 00073000
> * MSDART 26890000 268AEFFF 0001f000
> * comdlg32 268B0000 268EDFFF 0003e000
> * SHELL32 782F0000 78534FFF 00245000
> * MSDATL3 268F0000 26904FFF 00015000
> * oledb32 26C10000 26C75FFF 00066000
> * OLEDB32R 26C80000 26C8FFFF 00010000
> * msv1_0 26D30000 26D50FFF 00021000
> * CRYPT32 7C740000 7C7C6FFF 00087000
> * MSASN1 26D60000 26D6FFFF 00010000
> * xpsqlbot 26D80000 26D85FFF 00006000
> * xpstar 410F0000 41136FFF 00047000
> * SQLRESLD 42AC0000 42AC6FFF 00007000
> * SQLSVC 26DB0000 26DC6FFF 00017000
> * ODBC32 26DD0000 26E01FFF 00032000
> * odbcbcp 26E10000 26E15FFF 00006000
> * W95SCM 41140000 4114BFFF 0000c000
> * SQLUNIRL 10000000 1002CFFF 0002d000
> * WINSPOOL 10030000 1004DFFF 0001e000
> * MPR 10050000 1005FFFF 00010000
> * SHFOLDER 10060000 10067FFF 00008000
> * odbcint 10170000 10185FFF 00016000
> * NDDEAPI 10190000 10196FFF 00007000
> * SQLSVC 101A0000 101A5FFF 00006000
> * xpstar 101B0000 101B8FFF 00009000
> * rsabase 7CA00000 7CA22FFF 00023000
> * msdasql 02FB0000 02FF9FFF 0004a000
> * MSDASQLR 03000000 03003FFF 00004000
> * COMSVCS 78740000 788AEFFF 0016f000
> * TxfAux 03090000 030F3FFF 00064000
> * w3odbcci 03280000 032C8FFF 00049000
> * CTL3D32 032D0000 032E0FFF 00011000
> * pscore 032F0000 0332EFFF 0003f000
> * W3CLNRES 03340000 03348FFF 00009000
> * W3CLNRSX 03350000 03358FFF 00009000
> * odbccp32 033E0000 033F8FFF 00019000
> * W3CSM100 03400000 03411FFF 00012000
> * pscl 03420000 034A6FFF 00087000
> * MSVCP60 780C0000 78120FFF 00061000
> * w3scmv7 034C0000 034D0FFF 00011000
> * W3AIF10C 034F0000 03515FFF 00026000
> * W3NSL244 11400000 1142CFFF 0002d000
> * W3ENC107 03540000 03718FFF 001d9000
> * clientrb 03830000 0383EFFF 0000f000
> * MSWSOCK 03840000 03851FFF 00012000
> * w3csp100 03960000 0396FFFF 00010000
> * msadce 03A70000 03ABAFFF 0004b000
> * mswstr10 03AC0000 03B54FFF 00095000
> * msadcer 03F70000 03F74FFF 00005000
> * xplog70 03F80000 03F91FFF 00012000
> * xplog70 03FA0000 03FA3FFF 00004000
> * kerberos 78280000 782B5FFF 00036000
> * CRYPTDLL 08090000 0809DFFF 0000e000
> * DBNETLIB 0D520000 0D52EFFF 0000f000
> * SQLOLEDB 0D570000 0D57EFFF 0000f000
> * dbghelp 01890000 01944FFF 000b5000
> *
> * Edi: 6719D4E8: 6719D1C0 6719D4EC 6719D4EC 56489C38 661CD5F8
> 66816030
> * Esi: 00000000:
> * Eax: 00000000:
> * Ebx: 6719D1C0: 00060037 00000000 0071D9B7 0000963A 00000000
> 00000000
> * Ecx: 01BDB200: 00000000 0001003F 00000000 00000000 00000000
> 00000000
> * Edx: FFFFFFFF:
> * Eip: 0087A90E: 4D830088 75FFFFFC 0875FF0C E8E04D8B 0000002D
> 64F04D8B
> * Ebp: 01BDB1E4: 01BDBA04 0087C41F 6719D1C0 00AD8624 78032B18
> 00000000
> * SegCs: 0000001B:
> * EFlags: 00010246: 00740061 003D0068 003A0043 0050005C 00530056
> 005C0057
> * Esp: 01BDB1B8: 6719D4E8 00000000 6719D1C0 01BDB200 6719D000
> 01BDB1B8
> * SegSs: 00000023:
> *
> ****************************************
**********************************
*****
> * ---
--
> --
> * Short Stack Dump
> * 0087A90E Module(sqlservr+0047A90E)
> (CStackDump::GetContextAndDump+0000002E)
> * 0087C41F Module(sqlservr+0047C41F) (stackTrace+00000223)
> * 009318AF Module(sqlservr+005318AF) (ex_terminator+00000035)
> * 78006942 Module(MSVCRT+00006942) (terminate+00000043)
> * 7800686A Module(MSVCRT+0000686A) (_unDNameEx+000006FE)
> * 7800699E Module(MSVCRT+0000699E) (abort+00000050)
> * 780071B7 Module(MSVCRT+000071B7) (_CxxFrameHandler+00000026)
> * 77F96BA7 Module(ntdll+00016BA7) (ZwSetIoCompletion+00000182)
> * 77F96D67 Module(ntdll+00016D67) (RtlUnwind+000000DC)
> * 7800716A Module(MSVCRT+0000716A) (CxxThrowException+00000096)
> * 78006C3C Module(MSVCRT+00006C3C) (abort+000002EE)
> * 78006B7C Module(MSVCRT+00006B7C) (abort+0000022E)
> * 780069FB Module(MSVCRT+000069FB) (abort+000000AD)
> * 7800735D Module(MSVCRT+0000735D) (_CxxLongjmpUnwind+00000196)
> * 77F96BA7 Module(ntdll+00016BA7) (ZwSetIoCompletion+00000182)
> * 77F96C42 Module(ntdll+00016C42) (ZwSetIoCompletion+0000021D)
> * 77F9FF6E Module(ntdll+0001FF6E) (KiUserExceptionDispatcher+0000000E)
> * 78007108 Module(MSVCRT+00007108) (CxxThrowException+00000034)
> * 00488749 Module(sqlservr+00088749) (SetEcFlagAndThrow+00000026)
> * 004886C2 Module(sqlservr+000886C2) (ex_raise2+00000396)
> * 00931CD9 Module(sqlservr+00531CD9) (ex_raisecontrol+00000080)
> * 0093141A Module(sqlservr+0053141A) (ex_trans_cexcept+000001FE)
> * 780072DC Module(MSVCRT+000072DC) (_CxxLongjmpUnwind+00000115)
> * 78006FCA Module(MSVCRT+00006FCA) (abort+0000067C)
> * 78006BA7 Module(MSVCRT+00006BA7) (abort+00000259)
> * 780069FB Module(MSVCRT+000069FB) (abort+000000AD)
> * 780071B7 Module(MSVCRT+000071B7) (_CxxFrameHandler+00000026)
> * 77F96BA7 Module(ntdll+00016BA7) (ZwSetIoCompletion+00000182)
> * 77F96C42 Module(ntdll+00016C42) (ZwSetIoCompletion+0000021D)
> * 77F9FF6E Module(ntdll+0001FF6E) (KiUserExceptionDispatcher+0000000E)
> * 0057E8A9 Module(sqlservr+0017E8A9)
> (CCursorDeclareStmt::XretExecute+0000055
5)
> * 0041B442 Module(sqlservr+0001B442)
> (CMsqlExecContext::ExecuteStmts+000003B9
)
> * 0041AA88 Module(sqlservr+0001AA88) (CMsqlExecContext::Execute+000001B6)
> * 0041B9B6 Module(sqlservr+0001B9B6) (CSQLSource::Execute+00000357)
> * 005EFFC0 Module(sqlservr+001EFFC0) (SpPrepExec+00000313)
> * 00591A0A Module(sqlservr+00191A0A)
> (SPCursor::CursorExecPrepExec+0000005D)
> * 00591C3D Module(sqlservr+00191C3D) (SPCursor::PrepExec+0000002D)
> * 005F142F Module(sqlservr+001F142F) (CSpecProc::ExecuteSpecial+000000B3)
> * 005F1988 Module(sqlservr+001F1988) (CSpecProc::Execute+000000B6)
> * 0061353F Module(sqlservr+0021353F) (execrpc+000004A6)
> * 0043816D Module(sqlservr+0003816D) (execute_rpc+00000019)
> * 00427001 Module(sqlservr+00027001) (process_commands+00000232)
> * 41075002 Module(UMS+00005002) (ProcessWorkRequests+00000272)
> * 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
> * 78008454 Module(MSVCRT+00008454) (endthread+000000C1)
> * 7C57B388 Module(KERNEL32+0000B388) (lstrcmpiW+000000B7)
> * ---
>
>
> 2005-04-18 06:59:03.40
> --
> SQL Server Assertion: File: <p:\sql\ntdbms\cursors\src\ccursor.cpp>,
> line=850
> Failed Assertion = 'fFalse'.
>
> 2005-04-18 06:58:59.59
> --
> SqlDumpExceptionHandler: Process 55 generated fatal exception c0000005
> EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..
> *
> ****************************************
**********************************
*****
> *
> * BEGIN STACK DUMP:
> * 04/18/05 06:58:59 spid 55
> *
> * Exception Address = 327B0080
> * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
> * Access Violation occurred reading address 327B0080
> *** Unable to print input buffer - buffer changing location or not found
> ***
> *
> * MODULE BASE END SIZE
> * sqlservr 00400000 00B2CFFF 0072d000
> * ntdll 77F80000 77FFCFFF 0007d000
> * KERNEL32 7C570000 7C622FFF 000b3000
> * ADVAPI32 7C2D0000 7C331FFF 00062000
> * RPCRT4 77D30000 77DA0FFF 00071000
> * USER32 77E10000 77E6EFFF 0005f000
> * GDI32 77F40000 77F7AFFF 0003b000
> * OPENDS60 41060000 41065FFF 00006000
> * MSVCRT 78000000 78044FFF 00045000
> * UMS 41070000 4107CFFF 0000d000
> * SQLSORT 42AE0000 42B6FFFF 00090000
> * MSVCIRT 780A0000 780B1FFF 00012000
> * sqlevn70 41080000 41086FFF 00007000
> * NETAPI32 24350000 2439EFFF 0004f000
> * Secur32 7C340000 7C34EFFF 0000f000
> * NTDSAPI 243A0000 243B0FFF 00011000
> * DNSAPI 243C0000 243E3FFF 00024000
> * WSOCK32 243F0000 243F7FFF 00008000
> * WS2_32 24400000 24413FFF 00014000
> * WS2HELP 24420000 24427FFF 00008000
> * WLDAP32 24430000 24459FFF 0002a000
> * NETRAP 24460000 24465FFF 00006000
> * SAMLIB 24470000 2447EFFF 0000f000
> * ole32 245A0000 2468EFFF 000ef000
> * XOLEHLP 24790000 24797FFF 00008000
> * MSDTCPRX 247A0000 24856FFF 000b7000
> * MTXCLU 24860000 2486FFFF 00010000
> * VERSION 24870000 24876FFF 00007000
> * LZ32 24880000 24885FFF 00006000
> * CLUSAPI 24890000 2489FFFF 00010000
> * RESUTILS 248A0000 248ACFFF 0000d000
> * USERENV 7C0F0000 7C150FFF 00061000
> * rnr20 782C0000 782CBFFF 0000c000
> * iphlpapi 248B0000 248C2FFF 00013000
> * ICMP 248D0000 248D4FFF 00005000
> * MPRAPI 248E0000 248F6FFF 00017000
> * OLEAUT32 24900000 2499AFFF 0009b000
> * ACTIVEDS 249A0000 249CEFFF 0002f000
> * ADSLDPC 249D0000 249F2FFF 00023000
> * RTUTILS 24A00000 24A0DFFF 0000e000
> * SETUPAPI 24A10000 24A9DFFF 0008e000
> * RASAPI32 24AA0000 24AD2FFF 00033000
> * RASMAN 24AE0000 24AF0FFF 00011000
> * TAPI32 24B00000 24B21FFF 00022000
> * COMCTL32 24B30000 24BB3FFF 00084000
> * SHLWAPI 24BC0000 24C25FFF 00066000
> * DHCPCSVC 24C30000 24C48FFF 00019000
> * winrnr 250F0000 250F7FFF 00008000
> * rasadhlp 25100000 25104FFF 00005000
> * SSNETLIB 258C0000 258D4FFF 00015000
> * SSNMPN70 410D0000 410D5FFF 00006000
> * security 25C20000 25C23FFF 00004000
> * msafd 25E30000 25E4DFFF 0001e000
> * wshtcpip 25E50000 25E56FFF 00007000
> * SSmsLPCn 25EE0000 25EE6FFF 00007000
> * SQLFTQRY 41020000 41051FFF 00032000
> * CLBCATQ 26770000 267FFFFF 00090000
> * sqloledb 26810000 26882FFF 00073000
> * MSDART 26890000 268AEFFF 0001f000
> * comdlg32 268B0000 268EDFFF 0003e000
> * SHELL32 782F0000 78534FFF 00245000
> * MSDATL3 268F0000 26904FFF 00015000
> * oledb32 26C10000 26C75FFF 00066000
> * OLEDB32R 26C80000 26C8FFFF 00010000
> * msv1_0 26D30000 26D50FFF 00021000
> * CRYPT32 7C740000 7C7C6FFF 00087000
> * MSASN1 26D60000 26D6FFFF 00010000
> * xpsqlbot 26D80000 26D85FFF 00006000
> * xpstar 410F0000 41136FFF 00047000
> * SQLRESLD 42AC0000 42AC6FFF 00007000
> * SQLSVC 26DB0000 26DC6FFF 00017000
> * ODBC32 26DD0000 26E01FFF 00032000
> * odbcbcp 26E10000 26E15FFF 00006000
> * W95SCM 41140000 4114BFFF 0000c000
> * SQLUNIRL 10000000 1002CFFF 0002d000
> * WINSPOOL 10030000 1004DFFF 0001e000
> * MPR 10050000 1005FFFF 00010000
> * SHFOLDER 10060000 10067FFF 00008000
> * odbcint 10170000 10185FFF 00016000
> * NDDEAPI 10190000 10196FFF 00007000
> * SQLSVC 101A0000 101A5FFF 00006000
> * xpstar 101B0000 101B8FFF 00009000
> * rsabase 7CA00000 7CA22FFF 00023000
> * msdasql 02FB0000 02FF9FFF 0004a000
> * MSDASQLR 03000000 03003FFF 00004000
> * COMSVCS 78740000 788AEFFF 0016f000
> * TxfAux 03090000 030F3FFF 00064000
> * w3odbcci 03280000 032C8FFF 00049000
> * CTL3D32 032D0000 032E0FFF 00011000
> * pscore 032F0000 0332EFFF 0003f000
> * W3CLNRES 03340000 03348FFF 00009000
> * W3CLNRSX 03350000 03358FFF 00009000
> * odbccp32 033E0000 033F8FFF 00019000
> * W3CSM100 03400000 03411FFF 00012000
> * pscl 03420000 034A6FFF 00087000
> * MSVCP60 780C0000 78120FFF 00061000
> * w3scmv7 034C0000 034D0FFF 00011000
> * W3AIF10C 034F0000 03515FFF 00026000
> * W3NSL244 11400000 1142CFFF 0002d000
> * W3ENC107 03540000 03718FFF 001d9000
> * clientrb 03830000 0383EFFF 0000f000
> * MSWSOCK 03840000 03851FFF 00012000
> * w3csp100 03960000 0396FFFF 00010000
> * msadce 03A70000 03ABAFFF 0004b000
> * mswstr10 03AC0000 03B54FFF 00095000
> * msadcer 03F70000 03F74FFF 00005000
> * xplog70 03F80000 03F91FFF 00012000
> * xplog70 03FA0000 03FA3FFF 00004000
> * kerberos 78280000 782B5FFF 00036000
> * CRYPTDLL 08090000 0809DFFF 0000e000
> * DBNETLIB 0D520000 0D52EFFF 0000f000
> * SQLOLEDB 0D570000 0D57EFFF 0000f000
> * dbghelp 00BF0000 00CA4FFF 000b5000
> *
> * Edi: 00000000:
> * Esi: 604F8670: 604F86F2 00000000 00000000 00000000 604F8020
> 604F8ED8
> * Eax: 604F8EF0: 00992A72 00992A60 00992A50 00992A38 00992A24
> 00992A04
> * Ebx: 00000000:
> * Ecx: 00992A72: 28C60080 65380042 64BA0042 64E70080 327B0080
> E8300080
> * Edx: 00000000:
> * Eip: 327B0080:
> * Ebp: 01BDEDFC: 01BDEFD8 0057E8A9 604FC068 009AA108 00000000
> 00000000
> * SegCs: 0000001B:
> * EFlags: 00010246: 00740061 003D0068 003A0043 0050005C 00530056
> 005C0057
> * Esp: 01BDED84: 005819E1 604F8EF0 00000000 00000000 00000001
> 604F8068
> * SegSs: 00000023:
> *
> ****************************************
**********************************
*****
> * ---
--
> --
> * Short Stack Dump
> * 327B0080 Module(UNKNOWN+00000000)
> * 005819E1 Module(sqlservr+001819E1) (CCursorTableScan::WakeUp+00000018)
> * 00581FC4 Module(sqlservr+00181FC4) (CCursor::InitFromCache+0000015A)
> * 00581E64 Module(sqlservr+00181E64) (CCursor::InitFromCache+0000000A)
> * ---
> --
> Message posted via http://www.droptable.com|||Thank you so much for your guidance.
Pardon my ignorance but what is PSS and what is their phone number in
Canada ?
Thanks,
Sameer.
Message posted via http://www.droptable.com|||No problems. We all start out ignorant. You seem determined to change.
PSS is shorthand for Product Support Services, Microsoft's customer support
organization. They offer several methods for support, including a
pay-per-incident telephone option that may be what you need.
Go to http://support.microsoft.com/ and select Assisted support. Follow the
menus (Canada is there with both French and English) until you get to the
options and price page which also has the phone numbers. Under certain
conditions, you may get a refund but be prepared to pay for the support call
regardless.
Geoff N. Hiten
Microsoft SQL Server MVP
Senior Database Administrator
"Sameer Premji via droptable.com" <forum@.droptable.com> wrote in message
news:78d1d1471af54229982b414c3b6bd247@.SQ
droptable.com...
> Thank you so much for your guidance.
> Pardon my ignorance but what is PSS and what is their phone number in
> Canada ?
> Thanks,
> Sameer.
> --
> Message posted via http://www.droptable.com

No comments:

Post a Comment