Showing posts with label 153245copyright. Show all posts
Showing posts with label 153245copyright. Show all posts

Monday, March 19, 2012

Fatal exception caught and SQL abort

We're running Microsoft SQL Server 2000 - 8.00.818 (Intel IA-64)
Jun 1 2003 15:32:45
Copyright (c) 1988-2003 Microsoft Corporation
Enterprise Edition (64-bit) on Windows NT 5.2 (Build 3790: ).
The SQL Server was fatally aborted with the following error. Can anyone help?
SqlDumpExceptionHandler: Process 222 generated fatal exception c0000005
EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..
*
************************************************** *****************************
*
* BEGIN STACK DUMP:
* 02/21/05 21:30:03 spid 222
*
* Exception Address = 0000000000489D00 (SendOdsDone + 0000000000000070
Line 0+0000000000000000)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 000000000000029C
* Input Buffer 164 bytes -
* EXECUTE msdb.dbo.sp_sqlagent_has_server_access @.login_name = N'hxdom0\ms
* sql_admin'
*
*
* MODULE BASE END SIZE
* sqlservr 0000000000400000 0000000001BA5FFF 017a6000
* ntdll 0000000077E70000 0000000077FF3FFF 00184000
* kernel32 0000000077C90000 0000000077E5FFFF 001d0000
* ADVAPI32 000006FB7FE80000 000006FB7FFDFFFF 00160000
* RPCRT4 000006FB7FC60000 000006FB7FE75FFF 00216000
* USER32 0000000077B30000 0000000077C89FFF 0015a000
* GDI32 000006FB7FB90000 000006FB7FC5DFFF 000ce000
* ole32 000006FB7E7B0000 000006FB7EB23FFF 00374000
* msvcrt 000006FB7FAA0000 000006FB7FB85FFF 000e6000
* OLEAUT32 000006FB7E410000 000006FB7E7A9FFF 0039a000
* VERSION 000006FB7FA80000 000006FB7FA97FFF 00018000
* opends60 0000000004D00000 0000000004D15FFF 00016000
* sqlsort 0000000004000000 00000000040A3FFF 000a4000
* MSVCIRT 000006FB5BDC0000 000006FB5BDF3FFF 00034000
* IMM32 000006FB7C5F0000 000006FB7C647FFF 00058000
* LPK 000006FB608C0000 000006FB608DBFFF 0001c000
* USP10 000006FB76450000 000006FB7650FFFF 000c0000
* sqlevn70 0000000010000000 0000000010007FFF 00008000
* Secur32 000006FB7E170000 000006FB7E1A5FFF 00036000
* NETAPI32 000006FB73BF0000 000006FB73CC9FFF 000da000
* COMRES 000006FB7E340000 000006FB7E40BFFF 000cc000
* XOLEHLP 000006FBEF110000 000006FBEF11FFFF 00010000
* MSDTCPRX 000006FB5D910000 000006FB5DA5BFFF 0014c000
* MSVCP60 00000000780C0000 00000000781B7FFF 000f8000
* MTXCLU 000006FB79BF0000 000006FB79C2DFFF 0003e000
* WSOCK32 000006FB73AC0000 000006FB73ACFFFF 00010000
* WS2_32 000006FB73B60000 000006FB73BA3FFF 00044000
* WS2HELP 000006FB73B40000 000006FB73B59FFF 0001a000
* CLUSAPI 000006FB79950000 000006FB79985FFF 00036000
* RESUTILS 000006FB79B50000 000006FB79B81FFF 00032000
* USERENV 000006FB7B3F0000 000006FB7B56FFFF 00180000
* MFC42u 000006FB75490000 000006FB757F5FFF 00366000
* mswsock 000006FB73970000 000006FB73A21FFF 000b2000
* DNSAPI 000006FB7E050000 000006FB7E0BFFFF 00070000
* winrnr 000006FB7E1B0000 000006FB7E1C5FFF 00016000
* WLDAP32 000006FB7E0F0000 000006FB7E165FFF 00076000
* rasadhlp 000006FB7E1D0000 000006FB7E1E1FFF 00012000
* NTMARTA 000006FB7DA80000 000006FB7DAE1FFF 00062000
* SAMLIB 000006FBFF470000 000006FBFF497FFF 00028000
* SSNETLIB 000006FBFF3F0000 000006FBFF43BFFF 0004c000
* security 000006FB740D0000 000006FB740DBFFF 0000c000
* wshtcpip 000006FB73900000 000006FB73915FFF 00016000
* SSmsLPCn 000006FBFF0B0000 000006FBFF0CBFFF 0001c000
* SSnmPN70 000006FBE8CC0000 000006FBE8CD3FFF 00014000
* ntdsapi 000006FB7CF00000 000006FB7CF39FFF 0003a000
* kerberos 000006FB73CD0000 000006FB73DB1FFF 000e2000
* cryptdll 000006FB7CEE0000 000006FB7CEFBFFF 0001c000
* MSASN1 000006FB7C3C0000 000006FB7C3F1FFF 00032000
* SQLFTQRY 0000000041020000 0000000041093FFF 00074000
* CLBCatQ 000006FB7E1F0000 000006FB7E337FFF 00148000
* sqloledb 000006FBE9F70000 000006FBEA0D1FFF 00162000
* MSDART 000006FB79070000 000006FB790DFFFF 00070000
* COMCTL32 000006FB725B0000 000006FB72745FFF 00196000
* comdlg32 000006FB7C650000 000006FB7C70BFFF 000bc000
* SHLWAPI 000006FB7EB30000 000006FB7EBEBFFF 000bc000
* SHELL32 000006FB7ED90000 000006FB7FA09FFF 00c7a000
* MSDATL3 000006FB5DAB0000 000006FB5DAEFFFF 00040000
* comctl32 000006FB72370000 000006FB725A7FFF 00238000
* oledb32 000006FBE8F90000 000006FBE90E5FFF 00156000
* OLEDB32R 000006FBFECA0000 000006FBFECB3FFF 00014000
* xpstar 000006FBE9A90000 000006FBE9B65FFF 000d6000
* SQLRESLD 000000001C000000 000000001C015FFF 00016000
* SQLSVC 000006FBE9A30000 000006FBE9A8BFFF 0005c000
* ODBC32 000006FBE9980000 000006FBE9A21FFF 000a2000
* odbcbcp 000006FBE9960000 000006FBE9973FFF 00014000
* W95SCM 000000001C500000 000000001C52FFFF 00030000
* SHFOLDER 000006FB7CEC0000 000006FB7CED5FFF 00016000
* odbcint 000006FBE97C0000 000006FBE97D7FFF 00018000
* SQLSVC 000006FBFED50000 000006FBFED53FFF 00004000
* xpstar 000006FBE97B0000 000006FBE97B9FFF 0000a000
* msv1_0 000006FB7DAF0000 000006FB7DB4DFFF 0005e000
* rsaenh 000000000FF90000 000000000FFF5FFF 00066000
* PSAPI 000006FB7D8B0000 000006FB7D8CDFFF 0001e000
* xpsqlbot 000006FBE4C30000 000006FBE4C41FFF 00012000
* xplog70 000006FBE43C0000 000006FBE43FBFFF 0003c000
* xplog70 000006FBE43B0000 000006FBE43B5FFF 00006000
* sqlvdi 000006FBE1E10000 000006FBE1E39FFF 0002a000
* sqlmap70 000006FBEF290000 000006FBEF2A1FFF 00012000
* NETRAP 000006FBEBCA0000 000006FBEBCB5FFF 00016000
* dbghelp 000006FB6C510000 000006FB6C737FFF 00228000
*
* DbI0: 0000000000000000:
* DbI1: 0000000000000000:
* DbI2: 0000000483048F01:
* DbI3: E00000008345B0D0:
* DbI4: 000006FB0008000B: 0820000000000000 081F58000006FB00
000001000006FB00 CCE0000000000000 66E000000006FB57 080178000006F965
* DbI5: 000006FB29552208: 0000000001637B90 00000009FFFFFFE0
00000000000A0000 0000000000000000 0000000001637B90 0000000AFFFFFFE0
* DbI6: 000006FB29552160: 0000000000000000 000000000162C790
00000004FFFFFFE0 0000000000000000 0000000000000000 000000000162C790
* DbI7: 000006FB29552608: 000000000162CFE8 0000000100000020
0000000000000052 0000000000000000 000000000162C960 00000021FFFFFFE0
* DbD0: 000006FB29552758: 0000000000000000 0000000000000000
000000000162C730 00000026FFFFFFE0 0000000000000000 0000000000000000
* DbD1: 000006FB295526B0: 0000000000000020 0000000000000000
0000000000000000 000000000162C960 00000023FFFFFFE0 0000000000000000
* DbD2: 000006FB29552410: 00000016FFFFFFE0 0000000000000000
0000000000000000 0000000001635510 0000000000000020 0000000000130001
* DbD3: 000006FB29552560: 0000000000000000 000000000162C820
0000000600000000 000000000000002E 0000000000000000 000000000162C970
* DbD4: 000006FB295524B8: 0000000000000000 0000000000000000
000000000162C960 0000001BFFFFFFE0 0000000000000000 0000000000000000
* DbD5: 000006FB29552A08: 000000000162C730 0000002FFFFFFFE0
0000000000000000 0000000000000000 000000000162CFF8 0000000000000000
* DbD6: 000006FB29552B58: 0000000000000000 0000000000000000
0000000001637B90 00000038FFFFFFE0 0000000000160000 0000000000000000
* DbD7: 000006FB29552AB0: 00000032FFFFFFE0 0000000000140000
0000000000000000 0000000001637B90 00000033FFFFFFE0 0000000000150000
* StFPSR: 000998489E744232:
* IntGp: 0000000001CE2000:
* IntT0: 000006FBD9CC2070: 000006FBEE9FD520 000006FBD9CBA37C
0000000000400000 0000000001822298 000006FBD9CBBB28 000006FBD9CBA300
* IntT1: FFFFFFFFFFFFFFFE:
* IntS0: 0000000077CB1130: 0000000077CB8960 0000000077FE2000
0000000077CB89C0 0000000077FE2000 0000000077CB8A60 0000000077FE2000
* IntS1: 000000000168FED0: 00000000007E4850 0000000001CE2000
00000000009246D0 0000000001CE2000 000000000064AE90 0000000001CE2000
* IntS2: 000006FBEE9E1170: 000006FBEE9F9DD0 000006FBEE9F3530
2E522E412E532067 000000003035392E 011801A30010000D 0000000000000000
* IntS3: 0000000000000000:
* IntV0: 0000000000000000:
* IntT2: 0000000000000040:
* IntT3: 0000000000000202:
* IntT4: 0000000000000000:
* IntSp: 000006FBD9CBF5E0: FFFFFFFFFFFFFFFE 0000000000000000
0000000000000000 0000000000788B60 0000000200000002 000006F9F50992C8
* IntTeb: 000006FBFF9EE000: 0000000000000000 000006FBCE810000
000006FBCE808000 0000000000000000 000006FBD7992010 0000000000000000
* IntT5: 0000000000000000:
* IntT6: 0000000000000000:
* IntT7: 0000000000000048:
* IntT8: 0000000000000001:
* IntT9: 0000000000000000:
* IntT10: 0000000000000000:
* IntT11: 0000000000000000:
* IntT12: 0000000000000000:
* IntT13: 0000000000000000:
* IntT14: 0000000000000000:
* IntT15: 0000000000000000:
* IntT16: 000006FBFFFDE000: 0000000000000000 FFFFFFFFFFFFFFFF
0000000000400000 0000000077FBC360 000006FBFFF80000 0000000000000000
* IntT17: 0000000000000000:
* IntT18: 000006FBD9CBF9D0: 000006F9FCEFC0E8 000006F965100C40
000006F965100C40 0000000100000001 000006FBEEA12CB0 000006F9FCEFC568
* IntT19: 000006FBD9CBF618: 000006FA00000001 000006F9F50996C8
00000000016280E0 0000000000000000 0000000000000000 000006FB12000000
* IntT20: 0000000000000000:
* IntT21: 0000000000000288:
* IntT22: 000006FBFFB03D68: 0000000000000000 000006FBEE9CF7B0
000006FBFB2B6AC0 0010016D00040004 0000002000000001 0000000000000000
* IntNats: 0000000000000000:
* Preds: 00000000000085C1:
* BrRp: 00000000004DD3D0: 000021061921E011 454E9D0007F11EAC
0000101878012819 2000000000000200 43A021001B61C801 8400648700480000
* BrS0: 0000000000000000:
* BrS1: 0000000000000000:
* BrS2: 0000000000000000:
* BrS3: 0000000000000000:
* BrS4: 0000000000000000:
* BrT0: 000006FBFFB5CFA0: 0010014F00020015 0000000100000000
000006FBFFAE1530 0010000099DEAD99 1E80C4E500000001 0000000000000000
* BrT1: 0000000000000001:
* ApUNAT: 0000000000000000:
* ApLC: 0000000000000000:
* ApEC: 0000000000000000:
* ApCCV: 00000000FFFFFFFF:
* ApDCR: 0000000000007E05:
* RsPFS: C000000000000B9D:
* RsBSP: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
* RsBSPSTORE: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
* RsRSC: 000000000000000F:
* RsRNAT: 0000000000000000:
* StIPSR: 00001013082A6018:
* StIIP: 0000000000489D00: 01C010105400E808 84152144C02020A4
01B02105484D380A 537CF9D34020E0B0 019010183C01180A 8038E1A5002060AC
* StIFS: 8000000000000B1A:
* StFCR: 0000000000000040:
* Eflag: 0000000000000202:
* SegCSD: 0000000000000000:
* SegSSD: CF3FFFFF00000000:
* Cflag: 0000060100000111:
* StFSR: 0000000000000000:
* StFIR: 0000000000000000:
* StFDR: 0000000000000000:
*
************************************************** *****************************
*
* Short Stack Dump
* 0000000000489D00 Module(sqlservr+0000000000089D00)
(SendOdsDone+0000000000000070)
* 00000000004DD3D0 Module(sqlservr+00000000000DD3D0)
(language_exec+0000000000000B20)
* 00000000004DD690 Module(sqlservr+00000000000DD690)
(process_commands+00000000000003A0)
* 00000000004058B0 Module(sqlservr+00000000000058B0)
(ProcessWorkRequests+0000000000000A00)
* 00000000007E4960 Module(sqlservr+00000000003E4960)
(FiberStartRoutine+0000000000000110)
* 0000000077D24400 Module(kernel32+0000000000094400)
(GetDateFormatW+0000000000070070)
* 0000000077CB8990 Module(kernel32+0000000000028990)
(GetDateFormatW+0000000000004600)
* 0000000077CB8950 Module(kernel32+0000000000028950)
(GetDateFormatW+00000000000045C0)
*
Please contact Microsoft Product Support Services
GertD@.SQLDev.Net
Please reply only to the newsgroups.
This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use.
Copyright SQLDev.Net 1991-2005 All rights reserved.
"wc chan" <wcchan@.discussions.microsoft.com> wrote in message
news:1626D38A-2AFB-4099-8999-13F76C324438@.microsoft.com...
> We're running Microsoft SQL Server 2000 - 8.00.818 (Intel IA-64)
> Jun 1 2003 15:32:45
> Copyright (c) 1988-2003 Microsoft Corporation
> Enterprise Edition (64-bit) on Windows NT 5.2 (Build 3790: ).
> The SQL Server was fatally aborted with the following error. Can anyone
> help?
> SqlDumpExceptionHandler: Process 222 generated fatal exception c0000005
> EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..
> *
> ************************************************** *****************************
> *
> * BEGIN STACK DUMP:
> * 02/21/05 21:30:03 spid 222
> *
> * Exception Address = 0000000000489D00 (SendOdsDone + 0000000000000070
> Line 0+0000000000000000)
> * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
> * Access Violation occurred reading address 000000000000029C
> * Input Buffer 164 bytes -
> * EXECUTE msdb.dbo.sp_sqlagent_has_server_access @.login_name =
> N'hxdom0\ms
> * sql_admin'
> *
> *
> * MODULE BASE END SIZE
> * sqlservr 0000000000400000 0000000001BA5FFF
> 017a6000
> * ntdll 0000000077E70000 0000000077FF3FFF
> 00184000
> * kernel32 0000000077C90000 0000000077E5FFFF
> 001d0000
> * ADVAPI32 000006FB7FE80000 000006FB7FFDFFFF
> 00160000
> * RPCRT4 000006FB7FC60000 000006FB7FE75FFF
> 00216000
> * USER32 0000000077B30000 0000000077C89FFF
> 0015a000
> * GDI32 000006FB7FB90000 000006FB7FC5DFFF
> 000ce000
> * ole32 000006FB7E7B0000 000006FB7EB23FFF
> 00374000
> * msvcrt 000006FB7FAA0000 000006FB7FB85FFF
> 000e6000
> * OLEAUT32 000006FB7E410000 000006FB7E7A9FFF
> 0039a000
> * VERSION 000006FB7FA80000 000006FB7FA97FFF
> 00018000
> * opends60 0000000004D00000 0000000004D15FFF
> 00016000
> * sqlsort 0000000004000000 00000000040A3FFF
> 000a4000
> * MSVCIRT 000006FB5BDC0000 000006FB5BDF3FFF
> 00034000
> * IMM32 000006FB7C5F0000 000006FB7C647FFF
> 00058000
> * LPK 000006FB608C0000 000006FB608DBFFF
> 0001c000
> * USP10 000006FB76450000 000006FB7650FFFF
> 000c0000
> * sqlevn70 0000000010000000 0000000010007FFF
> 00008000
> * Secur32 000006FB7E170000 000006FB7E1A5FFF
> 00036000
> * NETAPI32 000006FB73BF0000 000006FB73CC9FFF
> 000da000
> * COMRES 000006FB7E340000 000006FB7E40BFFF
> 000cc000
> * XOLEHLP 000006FBEF110000 000006FBEF11FFFF
> 00010000
> * MSDTCPRX 000006FB5D910000 000006FB5DA5BFFF
> 0014c000
> * MSVCP60 00000000780C0000 00000000781B7FFF
> 000f8000
> * MTXCLU 000006FB79BF0000 000006FB79C2DFFF
> 0003e000
> * WSOCK32 000006FB73AC0000 000006FB73ACFFFF
> 00010000
> * WS2_32 000006FB73B60000 000006FB73BA3FFF
> 00044000
> * WS2HELP 000006FB73B40000 000006FB73B59FFF
> 0001a000
> * CLUSAPI 000006FB79950000 000006FB79985FFF
> 00036000
> * RESUTILS 000006FB79B50000 000006FB79B81FFF
> 00032000
> * USERENV 000006FB7B3F0000 000006FB7B56FFFF
> 00180000
> * MFC42u 000006FB75490000 000006FB757F5FFF
> 00366000
> * mswsock 000006FB73970000 000006FB73A21FFF
> 000b2000
> * DNSAPI 000006FB7E050000 000006FB7E0BFFFF
> 00070000
> * winrnr 000006FB7E1B0000 000006FB7E1C5FFF
> 00016000
> * WLDAP32 000006FB7E0F0000 000006FB7E165FFF
> 00076000
> * rasadhlp 000006FB7E1D0000 000006FB7E1E1FFF
> 00012000
> * NTMARTA 000006FB7DA80000 000006FB7DAE1FFF
> 00062000
> * SAMLIB 000006FBFF470000 000006FBFF497FFF
> 00028000
> * SSNETLIB 000006FBFF3F0000 000006FBFF43BFFF
> 0004c000
> * security 000006FB740D0000 000006FB740DBFFF
> 0000c000
> * wshtcpip 000006FB73900000 000006FB73915FFF
> 00016000
> * SSmsLPCn 000006FBFF0B0000 000006FBFF0CBFFF
> 0001c000
> * SSnmPN70 000006FBE8CC0000 000006FBE8CD3FFF
> 00014000
> * ntdsapi 000006FB7CF00000 000006FB7CF39FFF
> 0003a000
> * kerberos 000006FB73CD0000 000006FB73DB1FFF
> 000e2000
> * cryptdll 000006FB7CEE0000 000006FB7CEFBFFF
> 0001c000
> * MSASN1 000006FB7C3C0000 000006FB7C3F1FFF
> 00032000
> * SQLFTQRY 0000000041020000 0000000041093FFF
> 00074000
> * CLBCatQ 000006FB7E1F0000 000006FB7E337FFF
> 00148000
> * sqloledb 000006FBE9F70000 000006FBEA0D1FFF
> 00162000
> * MSDART 000006FB79070000 000006FB790DFFFF
> 00070000
> * COMCTL32 000006FB725B0000 000006FB72745FFF
> 00196000
> * comdlg32 000006FB7C650000 000006FB7C70BFFF
> 000bc000
> * SHLWAPI 000006FB7EB30000 000006FB7EBEBFFF
> 000bc000
> * SHELL32 000006FB7ED90000 000006FB7FA09FFF
> 00c7a000
> * MSDATL3 000006FB5DAB0000 000006FB5DAEFFFF
> 00040000
> * comctl32 000006FB72370000 000006FB725A7FFF
> 00238000
> * oledb32 000006FBE8F90000 000006FBE90E5FFF
> 00156000
> * OLEDB32R 000006FBFECA0000 000006FBFECB3FFF
> 00014000
> * xpstar 000006FBE9A90000 000006FBE9B65FFF
> 000d6000
> * SQLRESLD 000000001C000000 000000001C015FFF
> 00016000
> * SQLSVC 000006FBE9A30000 000006FBE9A8BFFF
> 0005c000
> * ODBC32 000006FBE9980000 000006FBE9A21FFF
> 000a2000
> * odbcbcp 000006FBE9960000 000006FBE9973FFF
> 00014000
> * W95SCM 000000001C500000 000000001C52FFFF
> 00030000
> * SHFOLDER 000006FB7CEC0000 000006FB7CED5FFF
> 00016000
> * odbcint 000006FBE97C0000 000006FBE97D7FFF
> 00018000
> * SQLSVC 000006FBFED50000 000006FBFED53FFF
> 00004000
> * xpstar 000006FBE97B0000 000006FBE97B9FFF
> 0000a000
> * msv1_0 000006FB7DAF0000 000006FB7DB4DFFF
> 0005e000
> * rsaenh 000000000FF90000 000000000FFF5FFF
> 00066000
> * PSAPI 000006FB7D8B0000 000006FB7D8CDFFF
> 0001e000
> * xpsqlbot 000006FBE4C30000 000006FBE4C41FFF
> 00012000
> * xplog70 000006FBE43C0000 000006FBE43FBFFF
> 0003c000
> * xplog70 000006FBE43B0000 000006FBE43B5FFF
> 00006000
> * sqlvdi 000006FBE1E10000 000006FBE1E39FFF
> 0002a000
> * sqlmap70 000006FBEF290000 000006FBEF2A1FFF
> 00012000
> * NETRAP 000006FBEBCA0000 000006FBEBCB5FFF
> 00016000
> * dbghelp 000006FB6C510000 000006FB6C737FFF
> 00228000
> *
> * DbI0: 0000000000000000:
> * DbI1: 0000000000000000:
> * DbI2: 0000000483048F01:
> * DbI3: E00000008345B0D0:
> * DbI4: 000006FB0008000B: 0820000000000000 081F58000006FB00
> 000001000006FB00 CCE0000000000000 66E000000006FB57 080178000006F965
> * DbI5: 000006FB29552208: 0000000001637B90 00000009FFFFFFE0
> 00000000000A0000 0000000000000000 0000000001637B90 0000000AFFFFFFE0
> * DbI6: 000006FB29552160: 0000000000000000 000000000162C790
> 00000004FFFFFFE0 0000000000000000 0000000000000000 000000000162C790
> * DbI7: 000006FB29552608: 000000000162CFE8 0000000100000020
> 0000000000000052 0000000000000000 000000000162C960 00000021FFFFFFE0
> * DbD0: 000006FB29552758: 0000000000000000 0000000000000000
> 000000000162C730 00000026FFFFFFE0 0000000000000000 0000000000000000
> * DbD1: 000006FB295526B0: 0000000000000020 0000000000000000
> 0000000000000000 000000000162C960 00000023FFFFFFE0 0000000000000000
> * DbD2: 000006FB29552410: 00000016FFFFFFE0 0000000000000000
> 0000000000000000 0000000001635510 0000000000000020 0000000000130001
> * DbD3: 000006FB29552560: 0000000000000000 000000000162C820
> 0000000600000000 000000000000002E 0000000000000000 000000000162C970
> * DbD4: 000006FB295524B8: 0000000000000000 0000000000000000
> 000000000162C960 0000001BFFFFFFE0 0000000000000000 0000000000000000
> * DbD5: 000006FB29552A08: 000000000162C730 0000002FFFFFFFE0
> 0000000000000000 0000000000000000 000000000162CFF8 0000000000000000
> * DbD6: 000006FB29552B58: 0000000000000000 0000000000000000
> 0000000001637B90 00000038FFFFFFE0 0000000000160000 0000000000000000
> * DbD7: 000006FB29552AB0: 00000032FFFFFFE0 0000000000140000
> 0000000000000000 0000000001637B90 00000033FFFFFFE0 0000000000150000
> * StFPSR: 000998489E744232:
> * IntGp: 0000000001CE2000:
> * IntT0: 000006FBD9CC2070: 000006FBEE9FD520 000006FBD9CBA37C
> 0000000000400000 0000000001822298 000006FBD9CBBB28 000006FBD9CBA300
> * IntT1: FFFFFFFFFFFFFFFE:
> * IntS0: 0000000077CB1130: 0000000077CB8960 0000000077FE2000
> 0000000077CB89C0 0000000077FE2000 0000000077CB8A60 0000000077FE2000
> * IntS1: 000000000168FED0: 00000000007E4850 0000000001CE2000
> 00000000009246D0 0000000001CE2000 000000000064AE90 0000000001CE2000
> * IntS2: 000006FBEE9E1170: 000006FBEE9F9DD0 000006FBEE9F3530
> 2E522E412E532067 000000003035392E 011801A30010000D 0000000000000000
> * IntS3: 0000000000000000:
> * IntV0: 0000000000000000:
> * IntT2: 0000000000000040:
> * IntT3: 0000000000000202:
> * IntT4: 0000000000000000:
> * IntSp: 000006FBD9CBF5E0: FFFFFFFFFFFFFFFE 0000000000000000
> 0000000000000000 0000000000788B60 0000000200000002 000006F9F50992C8
> * IntTeb: 000006FBFF9EE000: 0000000000000000 000006FBCE810000
> 000006FBCE808000 0000000000000000 000006FBD7992010 0000000000000000
> * IntT5: 0000000000000000:
> * IntT6: 0000000000000000:
> * IntT7: 0000000000000048:
> * IntT8: 0000000000000001:
> * IntT9: 0000000000000000:
> * IntT10: 0000000000000000:
> * IntT11: 0000000000000000:
> * IntT12: 0000000000000000:
> * IntT13: 0000000000000000:
> * IntT14: 0000000000000000:
> * IntT15: 0000000000000000:
> * IntT16: 000006FBFFFDE000: 0000000000000000 FFFFFFFFFFFFFFFF
> 0000000000400000 0000000077FBC360 000006FBFFF80000 0000000000000000
> * IntT17: 0000000000000000:
> * IntT18: 000006FBD9CBF9D0: 000006F9FCEFC0E8 000006F965100C40
> 000006F965100C40 0000000100000001 000006FBEEA12CB0 000006F9FCEFC568
> * IntT19: 000006FBD9CBF618: 000006FA00000001 000006F9F50996C8
> 00000000016280E0 0000000000000000 0000000000000000 000006FB12000000
> * IntT20: 0000000000000000:
> * IntT21: 0000000000000288:
> * IntT22: 000006FBFFB03D68: 0000000000000000 000006FBEE9CF7B0
> 000006FBFB2B6AC0 0010016D00040004 0000002000000001 0000000000000000
> * IntNats: 0000000000000000:
> * Preds: 00000000000085C1:
> * BrRp: 00000000004DD3D0: 000021061921E011 454E9D0007F11EAC
> 0000101878012819 2000000000000200 43A021001B61C801 8400648700480000
> * BrS0: 0000000000000000:
> * BrS1: 0000000000000000:
> * BrS2: 0000000000000000:
> * BrS3: 0000000000000000:
> * BrS4: 0000000000000000:
> * BrT0: 000006FBFFB5CFA0: 0010014F00020015 0000000100000000
> 000006FBFFAE1530 0010000099DEAD99 1E80C4E500000001 0000000000000000
> * BrT1: 0000000000000001:
> * ApUNAT: 0000000000000000:
> * ApLC: 0000000000000000:
> * ApEC: 0000000000000000:
> * ApCCV: 00000000FFFFFFFF:
> * ApDCR: 0000000000007E05:
> * RsPFS: C000000000000B9D:
> * RsBSP: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
> 0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
> * RsBSPSTORE: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
> 0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
> * RsRSC: 000000000000000F:
> * RsRNAT: 0000000000000000:
> * StIPSR: 00001013082A6018:
> * StIIP: 0000000000489D00: 01C010105400E808 84152144C02020A4
> 01B02105484D380A 537CF9D34020E0B0 019010183C01180A 8038E1A5002060AC
> * StIFS: 8000000000000B1A:
> * StFCR: 0000000000000040:
> * Eflag: 0000000000000202:
> * SegCSD: 0000000000000000:
> * SegSSD: CF3FFFFF00000000:
> * Cflag: 0000060100000111:
> * StFSR: 0000000000000000:
> * StFIR: 0000000000000000:
> * StFDR: 0000000000000000:
> *
> ************************************************** *****************************
> *
> ----
> * Short Stack Dump
> * 0000000000489D00 Module(sqlservr+0000000000089D00)
> (SendOdsDone+0000000000000070)
> * 00000000004DD3D0 Module(sqlservr+00000000000DD3D0)
> (language_exec+0000000000000B20)
> * 00000000004DD690 Module(sqlservr+00000000000DD690)
> (process_commands+00000000000003A0)
> * 00000000004058B0 Module(sqlservr+00000000000058B0)
> (ProcessWorkRequests+0000000000000A00)
> * 00000000007E4960 Module(sqlservr+00000000003E4960)
> (FiberStartRoutine+0000000000000110)
> * 0000000077D24400 Module(kernel32+0000000000094400)
> (GetDateFormatW+0000000000070070)
> * 0000000077CB8990 Module(kernel32+0000000000028990)
> (GetDateFormatW+0000000000004600)
> * 0000000077CB8950 Module(kernel32+0000000000028950)
> (GetDateFormatW+00000000000045C0)
> *
> ----

Fatal exception caught and SQL abort

We're running Microsoft SQL Server 2000 - 8.00.818 (Intel IA-64)
Jun 1 2003 15:32:45
Copyright (c) 1988-2003 Microsoft Corporation
Enterprise Edition (64-bit) on Windows NT 5.2 (Build 3790: ).
The SQL Server was fatally aborted with the following error. Can anyone help
?
SqlDumpExceptionHandler: Process 222 generated fatal exception c0000005
EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..
*
****************************************
************************************
***
*
* BEGIN STACK DUMP:
* 02/21/05 21:30:03 spid 222
*
* Exception Address = 0000000000489D00 (SendOdsDone + 0000000000000070
Line 0+0000000000000000)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 000000000000029C
* Input Buffer 164 bytes -
* EXECUTE msdb.dbo.sp_sqlagent_has_server_access @.login_name = N'hxdom0\ms
* sql_admin'
*
*
* MODULE BASE END SIZE
* sqlservr 0000000000400000 0000000001BA5FFF 017a600
0
* ntdll 0000000077E70000 0000000077FF3FFF 0018400
0
* kernel32 0000000077C90000 0000000077E5FFFF 001d000
0
* ADVAPI32 000006FB7FE80000 000006FB7FFDFFFF 0016000
0
* RPCRT4 000006FB7FC60000 000006FB7FE75FFF 0021600
0
* USER32 0000000077B30000 0000000077C89FFF 0015a00
0
* GDI32 000006FB7FB90000 000006FB7FC5DFFF 000ce00
0
* ole32 000006FB7E7B0000 000006FB7EB23FFF 0037400
0
* msvcrt 000006FB7FAA0000 000006FB7FB85FFF 000e600
0
* OLEAUT32 000006FB7E410000 000006FB7E7A9FFF 0039a00
0
* VERSION 000006FB7FA80000 000006FB7FA97FFF 0001800
0
* opends60 0000000004D00000 0000000004D15FFF 0001600
0
* sqlsort 0000000004000000 00000000040A3FFF 000a400
0
* MSVCIRT 000006FB5BDC0000 000006FB5BDF3FFF 0003400
0
* IMM32 000006FB7C5F0000 000006FB7C647FFF 0005800
0
* LPK 000006FB608C0000 000006FB608DBFFF 0001c00
0
* USP10 000006FB76450000 000006FB7650FFFF 000c000
0
* sqlevn70 0000000010000000 0000000010007FFF 0000800
0
* Secur32 000006FB7E170000 000006FB7E1A5FFF 0003600
0
* NETAPI32 000006FB73BF0000 000006FB73CC9FFF 000da00
0
* COMRES 000006FB7E340000 000006FB7E40BFFF 000cc00
0
* XOLEHLP 000006FBEF110000 000006FBEF11FFFF 0001000
0
* MSDTCPRX 000006FB5D910000 000006FB5DA5BFFF 0014c00
0
* MSVCP60 00000000780C0000 00000000781B7FFF 000f800
0
* MTXCLU 000006FB79BF0000 000006FB79C2DFFF 0003e00
0
* WSOCK32 000006FB73AC0000 000006FB73ACFFFF 0001000
0
* WS2_32 000006FB73B60000 000006FB73BA3FFF 0004400
0
* WS2HELP 000006FB73B40000 000006FB73B59FFF 0001a00
0
* CLUSAPI 000006FB79950000 000006FB79985FFF 0003600
0
* RESUTILS 000006FB79B50000 000006FB79B81FFF 0003200
0
* USERENV 000006FB7B3F0000 000006FB7B56FFFF 0018000
0
* MFC42u 000006FB75490000 000006FB757F5FFF 0036600
0
* mswsock 000006FB73970000 000006FB73A21FFF 000b200
0
* DNSAPI 000006FB7E050000 000006FB7E0BFFFF 0007000
0
* winrnr 000006FB7E1B0000 000006FB7E1C5FFF 0001600
0
* WLDAP32 000006FB7E0F0000 000006FB7E165FFF 0007600
0
* rasadhlp 000006FB7E1D0000 000006FB7E1E1FFF 0001200
0
* NTMARTA 000006FB7DA80000 000006FB7DAE1FFF 0006200
0
* SAMLIB 000006FBFF470000 000006FBFF497FFF 0002800
0
* SSNETLIB 000006FBFF3F0000 000006FBFF43BFFF 0004c00
0
* security 000006FB740D0000 000006FB740DBFFF 0000c00
0
* wshtcpip 000006FB73900000 000006FB73915FFF 0001600
0
* SSmsLPCn 000006FBFF0B0000 000006FBFF0CBFFF 0001c00
0
* SSnmPN70 000006FBE8CC0000 000006FBE8CD3FFF 0001400
0
* ntdsapi 000006FB7CF00000 000006FB7CF39FFF 0003a00
0
* kerberos 000006FB73CD0000 000006FB73DB1FFF 000e200
0
* cryptdll 000006FB7CEE0000 000006FB7CEFBFFF 0001c00
0
* MSASN1 000006FB7C3C0000 000006FB7C3F1FFF 0003200
0
* SQLFTQRY 0000000041020000 0000000041093FFF 0007400
0
* CLBCatQ 000006FB7E1F0000 000006FB7E337FFF 0014800
0
* sqloledb 000006FBE9F70000 000006FBEA0D1FFF 0016200
0
* MSDART 000006FB79070000 000006FB790DFFFF 0007000
0
* COMCTL32 000006FB725B0000 000006FB72745FFF 0019600
0
* comdlg32 000006FB7C650000 000006FB7C70BFFF 000bc00
0
* SHLWAPI 000006FB7EB30000 000006FB7EBEBFFF 000bc00
0
* SHELL32 000006FB7ED90000 000006FB7FA09FFF 00c7a00
0
* MSDATL3 000006FB5DAB0000 000006FB5DAEFFFF 0004000
0
* comctl32 000006FB72370000 000006FB725A7FFF 0023800
0
* oledb32 000006FBE8F90000 000006FBE90E5FFF 0015600
0
* OLEDB32R 000006FBFECA0000 000006FBFECB3FFF 0001400
0
* xpstar 000006FBE9A90000 000006FBE9B65FFF 000d600
0
* SQLRESLD 000000001C000000 000000001C015FFF 0001600
0
* SQLSVC 000006FBE9A30000 000006FBE9A8BFFF 0005c00
0
* ODBC32 000006FBE9980000 000006FBE9A21FFF 000a200
0
* odbcbcp 000006FBE9960000 000006FBE9973FFF 0001400
0
* W95SCM 000000001C500000 000000001C52FFFF 0003000
0
* SHFOLDER 000006FB7CEC0000 000006FB7CED5FFF 0001600
0
* odbcint 000006FBE97C0000 000006FBE97D7FFF 0001800
0
* SQLSVC 000006FBFED50000 000006FBFED53FFF 0000400
0
* xpstar 000006FBE97B0000 000006FBE97B9FFF 0000a00
0
* msv1_0 000006FB7DAF0000 000006FB7DB4DFFF 0005e00
0
* rsaenh 000000000FF90000 000000000FFF5FFF 0006600
0
* PSAPI 000006FB7D8B0000 000006FB7D8CDFFF 0001e00
0
* xpsqlbot 000006FBE4C30000 000006FBE4C41FFF 0001200
0
* xplog70 000006FBE43C0000 000006FBE43FBFFF 0003c00
0
* xplog70 000006FBE43B0000 000006FBE43B5FFF 0000600
0
* sqlvdi 000006FBE1E10000 000006FBE1E39FFF 0002a00
0
* sqlmap70 000006FBEF290000 000006FBEF2A1FFF 0001200
0
* NETRAP 000006FBEBCA0000 000006FBEBCB5FFF 0001600
0
* dbghelp 000006FB6C510000 000006FB6C737FFF 0022800
0
*
* DbI0: 0000000000000000:
* DbI1: 0000000000000000:
* DbI2: 0000000483048F01:
* DbI3: E00000008345B0D0:
* DbI4: 000006FB0008000B: 0820000000000000 081F58000006FB00
000001000006FB00 CCE0000000000000 66E000000006FB57 080178000006F965
* DbI5: 000006FB29552208: 0000000001637B90 00000009FFFFFFE0
00000000000A0000 0000000000000000 0000000001637B90 0000000AFFFFFFE0
* DbI6: 000006FB29552160: 0000000000000000 000000000162C790
00000004FFFFFFE0 0000000000000000 0000000000000000 000000000162C790
* DbI7: 000006FB29552608: 000000000162CFE8 0000000100000020
0000000000000052 0000000000000000 000000000162C960 00000021FFFFFFE0
* DbD0: 000006FB29552758: 0000000000000000 0000000000000000
000000000162C730 00000026FFFFFFE0 0000000000000000 0000000000000000
* DbD1: 000006FB295526B0: 0000000000000020 0000000000000000
0000000000000000 000000000162C960 00000023FFFFFFE0 0000000000000000
* DbD2: 000006FB29552410: 00000016FFFFFFE0 0000000000000000
0000000000000000 0000000001635510 0000000000000020 0000000000130001
* DbD3: 000006FB29552560: 0000000000000000 000000000162C820
0000000600000000 000000000000002E 0000000000000000 000000000162C970
* DbD4: 000006FB295524B8: 0000000000000000 0000000000000000
000000000162C960 0000001BFFFFFFE0 0000000000000000 0000000000000000
* DbD5: 000006FB29552A08: 000000000162C730 0000002FFFFFFFE0
0000000000000000 0000000000000000 000000000162CFF8 0000000000000000
* DbD6: 000006FB29552B58: 0000000000000000 0000000000000000
0000000001637B90 00000038FFFFFFE0 0000000000160000 0000000000000000
* DbD7: 000006FB29552AB0: 00000032FFFFFFE0 0000000000140000
0000000000000000 0000000001637B90 00000033FFFFFFE0 0000000000150000
* StFPSR: 000998489E744232:
* IntGp: 0000000001CE2000:
* IntT0: 000006FBD9CC2070: 000006FBEE9FD520 000006FBD9CBA37C
0000000000400000 0000000001822298 000006FBD9CBBB28 000006FBD9CBA300
* IntT1: FFFFFFFFFFFFFFFE:
* IntS0: 0000000077CB1130: 0000000077CB8960 0000000077FE2000
0000000077CB89C0 0000000077FE2000 0000000077CB8A60 0000000077FE2000
* IntS1: 000000000168FED0: 00000000007E4850 0000000001CE2000
00000000009246D0 0000000001CE2000 000000000064AE90 0000000001CE2000
* IntS2: 000006FBEE9E1170: 000006FBEE9F9DD0 000006FBEE9F3530
2E522E412E532067 000000003035392E 011801A30010000D 0000000000000000
* IntS3: 0000000000000000:
* IntV0: 0000000000000000:
* IntT2: 0000000000000040:
* IntT3: 0000000000000202:
* IntT4: 0000000000000000:
* IntSp: 000006FBD9CBF5E0: FFFFFFFFFFFFFFFE 0000000000000000
0000000000000000 0000000000788B60 0000000200000002 000006F9F50992C8
* IntTeb: 000006FBFF9EE000: 0000000000000000 000006FBCE810000
000006FBCE808000 0000000000000000 000006FBD7992010 0000000000000000
* IntT5: 0000000000000000:
* IntT6: 0000000000000000:
* IntT7: 0000000000000048:
* IntT8: 0000000000000001:
* IntT9: 0000000000000000:
* IntT10: 0000000000000000:
* IntT11: 0000000000000000:
* IntT12: 0000000000000000:
* IntT13: 0000000000000000:
* IntT14: 0000000000000000:
* IntT15: 0000000000000000:
* IntT16: 000006FBFFFDE000: 0000000000000000 FFFFFFFFFFFFFFFF
0000000000400000 0000000077FBC360 000006FBFFF80000 0000000000000000
* IntT17: 0000000000000000:
* IntT18: 000006FBD9CBF9D0: 000006F9FCEFC0E8 000006F965100C40
000006F965100C40 0000000100000001 000006FBEEA12CB0 000006F9FCEFC568
* IntT19: 000006FBD9CBF618: 000006FA00000001 000006F9F50996C8
00000000016280E0 0000000000000000 0000000000000000 000006FB12000000
* IntT20: 0000000000000000:
* IntT21: 0000000000000288:
* IntT22: 000006FBFFB03D68: 0000000000000000 000006FBEE9CF7B0
000006FBFB2B6AC0 0010016D00040004 0000002000000001 0000000000000000
* IntNats: 0000000000000000:
* Preds: 00000000000085C1:
* BrRp: 00000000004DD3D0: 000021061921E011 454E9D0007F11EAC
0000101878012819 2000000000000200 43A021001B61C801 8400648700480000
* BrS0: 0000000000000000:
* BrS1: 0000000000000000:
* BrS2: 0000000000000000:
* BrS3: 0000000000000000:
* BrS4: 0000000000000000:
* BrT0: 000006FBFFB5CFA0: 0010014F00020015 0000000100000000
000006FBFFAE1530 0010000099DEAD99 1E80C4E500000001 0000000000000000
* BrT1: 0000000000000001:
* ApUNAT: 0000000000000000:
* ApLC: 0000000000000000:
* ApEC: 0000000000000000:
* ApCCV: 00000000FFFFFFFF:
* ApDCR: 0000000000007E05:
* RsPFS: C000000000000B9D:
* RsBSP: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
* RsBSPSTORE: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
* RsRSC: 000000000000000F:
* RsRNAT: 0000000000000000:
* StIPSR: 00001013082A6018:
* StIIP: 0000000000489D00: 01C010105400E808 84152144C02020A4
01B02105484D380A 537CF9D34020E0B0 019010183C01180A 8038E1A5002060AC
* StIFS: 8000000000000B1A:
* StFCR: 0000000000000040:
* Eflag: 0000000000000202:
* SegCSD: 0000000000000000:
* SegSSD: CF3FFFFF00000000:
* Cflag: 0000060100000111:
* StFSR: 0000000000000000:
* StFIR: 0000000000000000:
* StFDR: 0000000000000000:
*
****************************************
************************************
***
*
----
--
* Short Stack Dump
* 0000000000489D00 Module(sqlservr+0000000000089D00)
(SendOdsDone+0000000000000070)
* 00000000004DD3D0 Module(sqlservr+00000000000DD3D0)
(language_exec+0000000000000B20)
* 00000000004DD690 Module(sqlservr+00000000000DD690)
(process_commands+00000000000003A0)
* 00000000004058B0 Module(sqlservr+00000000000058B0)
(ProcessWorkRequests+0000000000000A00)
* 00000000007E4960 Module(sqlservr+00000000003E4960)
(FiberStartRoutine+0000000000000110)
* 0000000077D24400 Module(kernel32+0000000000094400)
(GetDateFormatW+0000000000070070)
* 0000000077CB8990 Module(kernel32+0000000000028990)
(GetDateFormatW+0000000000004600)
* 0000000077CB8950 Module(kernel32+0000000000028950)
(GetDateFormatW+00000000000045C0)
*
----
--Please contact Microsoft Product Support Services
GertD@.SQLDev.Net
Please reply only to the newsgroups.
This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use.
Copyright SQLDev.Net 1991-2005 All rights reserved.
"wc chan" <wcchan@.discussions.microsoft.com> wrote in message
news:1626D38A-2AFB-4099-8999-13F76C324438@.microsoft.com...[vbcol=seagreen]
> We're running Microsoft SQL Server 2000 - 8.00.818 (Intel IA-64)
> Jun 1 2003 15:32:45
> Copyright (c) 1988-2003 Microsoft Corporation
> Enterprise Edition (64-bit) on Windows NT 5.2 (Build 3790: ).
> The SQL Server was fatally aborted with the following error. Can anyone
> help?
> SqlDumpExceptionHandler: Process 222 generated fatal exception c0000005
> EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process..
> *
> ****************************************
**********************************
*****
> *
> * BEGIN STACK DUMP:
> * 02/21/05 21:30:03 spid 222
> *
> * Exception Address = 0000000000489D00 (SendOdsDone + 0000000000000070
> Line 0+0000000000000000)
> * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
> * Access Violation occurred reading address 000000000000029C
> * Input Buffer 164 bytes -
> * EXECUTE msdb.dbo.sp_sqlagent_has_server_access @.login_name =
> N'hxdom0\ms
> * sql_admin'
> *
> *
> * MODULE BASE END SIZE
> * sqlservr 0000000000400000 0000000001BA5FFF
> 017a6000
> * ntdll 0000000077E70000 0000000077FF3FFF
> 00184000
> * kernel32 0000000077C90000 0000000077E5FFFF
> 001d0000
> * ADVAPI32 000006FB7FE80000 000006FB7FFDFFFF
> 00160000
> * RPCRT4 000006FB7FC60000 000006FB7FE75FFF
> 00216000
> * USER32 0000000077B30000 0000000077C89FFF
> 0015a000
> * GDI32 000006FB7FB90000 000006FB7FC5DFFF
> 000ce000
> * ole32 000006FB7E7B0000 000006FB7EB23FFF
> 00374000
> * msvcrt 000006FB7FAA0000 000006FB7FB85FFF
> 000e6000
> * OLEAUT32 000006FB7E410000 000006FB7E7A9FFF
> 0039a000
> * VERSION 000006FB7FA80000 000006FB7FA97FFF
> 00018000
> * opends60 0000000004D00000 0000000004D15FFF
> 00016000
> * sqlsort 0000000004000000 00000000040A3FFF
> 000a4000
> * MSVCIRT 000006FB5BDC0000 000006FB5BDF3FFF
> 00034000
> * IMM32 000006FB7C5F0000 000006FB7C647FFF
> 00058000
> * LPK 000006FB608C0000 000006FB608DBFFF
> 0001c000
> * USP10 000006FB76450000 000006FB7650FFFF
> 000c0000
> * sqlevn70 0000000010000000 0000000010007FFF
> 00008000
> * Secur32 000006FB7E170000 000006FB7E1A5FFF
> 00036000
> * NETAPI32 000006FB73BF0000 000006FB73CC9FFF
> 000da000
> * COMRES 000006FB7E340000 000006FB7E40BFFF
> 000cc000
> * XOLEHLP 000006FBEF110000 000006FBEF11FFFF
> 00010000
> * MSDTCPRX 000006FB5D910000 000006FB5DA5BFFF
> 0014c000
> * MSVCP60 00000000780C0000 00000000781B7FFF
> 000f8000
> * MTXCLU 000006FB79BF0000 000006FB79C2DFFF
> 0003e000
> * WSOCK32 000006FB73AC0000 000006FB73ACFFFF
> 00010000
> * WS2_32 000006FB73B60000 000006FB73BA3FFF
> 00044000
> * WS2HELP 000006FB73B40000 000006FB73B59FFF
> 0001a000
> * CLUSAPI 000006FB79950000 000006FB79985FFF
> 00036000
> * RESUTILS 000006FB79B50000 000006FB79B81FFF
> 00032000
> * USERENV 000006FB7B3F0000 000006FB7B56FFFF
> 00180000
> * MFC42u 000006FB75490000 000006FB757F5FFF
> 00366000
> * mswsock 000006FB73970000 000006FB73A21FFF
> 000b2000
> * DNSAPI 000006FB7E050000 000006FB7E0BFFFF
> 00070000
> * winrnr 000006FB7E1B0000 000006FB7E1C5FFF
> 00016000
> * WLDAP32 000006FB7E0F0000 000006FB7E165FFF
> 00076000
> * rasadhlp 000006FB7E1D0000 000006FB7E1E1FFF
> 00012000
> * NTMARTA 000006FB7DA80000 000006FB7DAE1FFF
> 00062000
> * SAMLIB 000006FBFF470000 000006FBFF497FFF
> 00028000
> * SSNETLIB 000006FBFF3F0000 000006FBFF43BFFF
> 0004c000
> * security 000006FB740D0000 000006FB740DBFFF
> 0000c000
> * wshtcpip 000006FB73900000 000006FB73915FFF
> 00016000
> * SSmsLPCn 000006FBFF0B0000 000006FBFF0CBFFF
> 0001c000
> * SSnmPN70 000006FBE8CC0000 000006FBE8CD3FFF
> 00014000
> * ntdsapi 000006FB7CF00000 000006FB7CF39FFF
> 0003a000
> * kerberos 000006FB73CD0000 000006FB73DB1FFF
> 000e2000
> * cryptdll 000006FB7CEE0000 000006FB7CEFBFFF
> 0001c000
> * MSASN1 000006FB7C3C0000 000006FB7C3F1FFF
> 00032000
> * SQLFTQRY 0000000041020000 0000000041093FFF
> 00074000
> * CLBCatQ 000006FB7E1F0000 000006FB7E337FFF
> 00148000
> * sqloledb 000006FBE9F70000 000006FBEA0D1FFF
> 00162000
> * MSDART 000006FB79070000 000006FB790DFFFF
> 00070000
> * COMCTL32 000006FB725B0000 000006FB72745FFF
> 00196000
> * comdlg32 000006FB7C650000 000006FB7C70BFFF
> 000bc000
> * SHLWAPI 000006FB7EB30000 000006FB7EBEBFFF
> 000bc000
> * SHELL32 000006FB7ED90000 000006FB7FA09FFF
> 00c7a000
> * MSDATL3 000006FB5DAB0000 000006FB5DAEFFFF
> 00040000
> * comctl32 000006FB72370000 000006FB725A7FFF
> 00238000
> * oledb32 000006FBE8F90000 000006FBE90E5FFF
> 00156000
> * OLEDB32R 000006FBFECA0000 000006FBFECB3FFF
> 00014000
> * xpstar 000006FBE9A90000 000006FBE9B65FFF
> 000d6000
> * SQLRESLD 000000001C000000 000000001C015FFF
> 00016000
> * SQLSVC 000006FBE9A30000 000006FBE9A8BFFF
> 0005c000
> * ODBC32 000006FBE9980000 000006FBE9A21FFF
> 000a2000
> * odbcbcp 000006FBE9960000 000006FBE9973FFF
> 00014000
> * W95SCM 000000001C500000 000000001C52FFFF
> 00030000
> * SHFOLDER 000006FB7CEC0000 000006FB7CED5FFF
> 00016000
> * odbcint 000006FBE97C0000 000006FBE97D7FFF
> 00018000
> * SQLSVC 000006FBFED50000 000006FBFED53FFF
> 00004000
> * xpstar 000006FBE97B0000 000006FBE97B9FFF
> 0000a000
> * msv1_0 000006FB7DAF0000 000006FB7DB4DFFF
> 0005e000
> * rsaenh 000000000FF90000 000000000FFF5FFF
> 00066000
> * PSAPI 000006FB7D8B0000 000006FB7D8CDFFF
> 0001e000
> * xpsqlbot 000006FBE4C30000 000006FBE4C41FFF
> 00012000
> * xplog70 000006FBE43C0000 000006FBE43FBFFF
> 0003c000
> * xplog70 000006FBE43B0000 000006FBE43B5FFF
> 00006000
> * sqlvdi 000006FBE1E10000 000006FBE1E39FFF
> 0002a000
> * sqlmap70 000006FBEF290000 000006FBEF2A1FFF
> 00012000
> * NETRAP 000006FBEBCA0000 000006FBEBCB5FFF
> 00016000
> * dbghelp 000006FB6C510000 000006FB6C737FFF
> 00228000
> *
> * DbI0: 0000000000000000:
> * DbI1: 0000000000000000:
> * DbI2: 0000000483048F01:
> * DbI3: E00000008345B0D0:
> * DbI4: 000006FB0008000B: 0820000000000000 081F58000006FB00
> 000001000006FB00 CCE0000000000000 66E000000006FB57 080178000006F965
> * DbI5: 000006FB29552208: 0000000001637B90 00000009FFFFFFE0
> 00000000000A0000 0000000000000000 0000000001637B90 0000000AFFFFFFE0
> * DbI6: 000006FB29552160: 0000000000000000 000000000162C790
> 00000004FFFFFFE0 0000000000000000 0000000000000000 000000000162C790
> * DbI7: 000006FB29552608: 000000000162CFE8 0000000100000020
> 0000000000000052 0000000000000000 000000000162C960 00000021FFFFFFE0
> * DbD0: 000006FB29552758: 0000000000000000 0000000000000000
> 000000000162C730 00000026FFFFFFE0 0000000000000000 0000000000000000
> * DbD1: 000006FB295526B0: 0000000000000020 0000000000000000
> 0000000000000000 000000000162C960 00000023FFFFFFE0 0000000000000000
> * DbD2: 000006FB29552410: 00000016FFFFFFE0 0000000000000000
> 0000000000000000 0000000001635510 0000000000000020 0000000000130001
> * DbD3: 000006FB29552560: 0000000000000000 000000000162C820
> 0000000600000000 000000000000002E 0000000000000000 000000000162C970
> * DbD4: 000006FB295524B8: 0000000000000000 0000000000000000
> 000000000162C960 0000001BFFFFFFE0 0000000000000000 0000000000000000
> * DbD5: 000006FB29552A08: 000000000162C730 0000002FFFFFFFE0
> 0000000000000000 0000000000000000 000000000162CFF8 0000000000000000
> * DbD6: 000006FB29552B58: 0000000000000000 0000000000000000
> 0000000001637B90 00000038FFFFFFE0 0000000000160000 0000000000000000
> * DbD7: 000006FB29552AB0: 00000032FFFFFFE0 0000000000140000
> 0000000000000000 0000000001637B90 00000033FFFFFFE0 0000000000150000
> * StFPSR: 000998489E744232:
> * IntGp: 0000000001CE2000:
> * IntT0: 000006FBD9CC2070: 000006FBEE9FD520 000006FBD9CBA37C
> 0000000000400000 0000000001822298 000006FBD9CBBB28 000006FBD9CBA300
> * IntT1: FFFFFFFFFFFFFFFE:
> * IntS0: 0000000077CB1130: 0000000077CB8960 0000000077FE2000
> 0000000077CB89C0 0000000077FE2000 0000000077CB8A60 0000000077FE2000
> * IntS1: 000000000168FED0: 00000000007E4850 0000000001CE2000
> 00000000009246D0 0000000001CE2000 000000000064AE90 0000000001CE2000
> * IntS2: 000006FBEE9E1170: 000006FBEE9F9DD0 000006FBEE9F3530
> 2E522E412E532067 000000003035392E 011801A30010000D 0000000000000000
> * IntS3: 0000000000000000:
> * IntV0: 0000000000000000:
> * IntT2: 0000000000000040:
> * IntT3: 0000000000000202:
> * IntT4: 0000000000000000:
> * IntSp: 000006FBD9CBF5E0: FFFFFFFFFFFFFFFE 0000000000000000
> 0000000000000000 0000000000788B60 0000000200000002 000006F9F50992C8
> * IntTeb: 000006FBFF9EE000: 0000000000000000 000006FBCE810000
> 000006FBCE808000 0000000000000000 000006FBD7992010 0000000000000000
> * IntT5: 0000000000000000:
> * IntT6: 0000000000000000:
> * IntT7: 0000000000000048:
> * IntT8: 0000000000000001:
> * IntT9: 0000000000000000:
> * IntT10: 0000000000000000:
> * IntT11: 0000000000000000:
> * IntT12: 0000000000000000:
> * IntT13: 0000000000000000:
> * IntT14: 0000000000000000:
> * IntT15: 0000000000000000:
> * IntT16: 000006FBFFFDE000: 0000000000000000 FFFFFFFFFFFFFFFF
> 0000000000400000 0000000077FBC360 000006FBFFF80000 0000000000000000
> * IntT17: 0000000000000000:
> * IntT18: 000006FBD9CBF9D0: 000006F9FCEFC0E8 000006F965100C40
> 000006F965100C40 0000000100000001 000006FBEEA12CB0 000006F9FCEFC568
> * IntT19: 000006FBD9CBF618: 000006FA00000001 000006F9F50996C8
> 00000000016280E0 0000000000000000 0000000000000000 000006FB12000000
> * IntT20: 0000000000000000:
> * IntT21: 0000000000000288:
> * IntT22: 000006FBFFB03D68: 0000000000000000 000006FBEE9CF7B0
> 000006FBFB2B6AC0 0010016D00040004 0000002000000001 0000000000000000
> * IntNats: 0000000000000000:
> * Preds: 00000000000085C1:
> * BrRp: 00000000004DD3D0: 000021061921E011 454E9D0007F11EAC
> 0000101878012819 2000000000000200 43A021001B61C801 8400648700480000
> * BrS0: 0000000000000000:
> * BrS1: 0000000000000000:
> * BrS2: 0000000000000000:
> * BrS3: 0000000000000000:
> * BrS4: 0000000000000000:
> * BrT0: 000006FBFFB5CFA0: 0010014F00020015 0000000100000000
> 000006FBFFAE1530 0010000099DEAD99 1E80C4E500000001 0000000000000000
> * BrT1: 0000000000000001:
> * ApUNAT: 0000000000000000:
> * ApLC: 0000000000000000:
> * ApEC: 0000000000000000:
> * ApCCV: 00000000FFFFFFFF:
> * ApDCR: 0000000000007E05:
> * RsPFS: C000000000000B9D:
> * RsBSP: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
> 0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
> * RsBSPSTORE: 000006FBD9CC0250: FFFFFFFFFFFFFFFD 0000000000000001
> 0000000000000001 0000000001AF9CD8 0000000000000000 0000000000000000
> * RsRSC: 000000000000000F:
> * RsRNAT: 0000000000000000:
> * StIPSR: 00001013082A6018:
> * StIIP: 0000000000489D00: 01C010105400E808 84152144C02020A4
> 01B02105484D380A 537CF9D34020E0B0 019010183C01180A 8038E1A5002060AC
> * StIFS: 8000000000000B1A:
> * StFCR: 0000000000000040:
> * Eflag: 0000000000000202:
> * SegCSD: 0000000000000000:
> * SegSSD: CF3FFFFF00000000:
> * Cflag: 0000060100000111:
> * StFSR: 0000000000000000:
> * StFIR: 0000000000000000:
> * StFDR: 0000000000000000:
> *
> ****************************************
**********************************
*****
> *
> ----
--
> * Short Stack Dump
> * 0000000000489D00 Module(sqlservr+0000000000089D00)
> (SendOdsDone+0000000000000070)
> * 00000000004DD3D0 Module(sqlservr+00000000000DD3D0)
> (language_exec+0000000000000B20)
> * 00000000004DD690 Module(sqlservr+00000000000DD690)
> (process_commands+00000000000003A0)
> * 00000000004058B0 Module(sqlservr+00000000000058B0)
> (ProcessWorkRequests+0000000000000A00)
> * 00000000007E4960 Module(sqlservr+00000000003E4960)
> (FiberStartRoutine+0000000000000110)
> * 0000000077D24400 Module(kernel32+0000000000094400)
> (GetDateFormatW+0000000000070070)
> * 0000000077CB8990 Module(kernel32+0000000000028990)
> (GetDateFormatW+0000000000004600)
> * 0000000077CB8950 Module(kernel32+0000000000028950)
> (GetDateFormatW+00000000000045C0)
> *
> ----[/v
bcol]