we are having the problem on our production, replication and test
servers but not on our mock production servers
differences are the operating systems - all are advanced server and SQL
Server 2000 SP4
Production - W2k sp2 -- Reason it is so low is our old Storage Works
Replication - WS2k3 sp1
Test - W2K sp3
Mock Prod - this works - W2K sp4
This started showing up in the SQL Server log on Production and can be
replicated:
2005-07-25 08:40:06.36 spid151 Using 'dbghelp.dll' version '4.0.5'
*Stack Dump being sent to S:\Program Files\Microsoft SQL
Server\MSSQL\log\SQLDump0007.txt
2005-07-25 08:40:06.58 spid151 Error: 0, Severity: 19, State: 0
2005-07-25 08:40:06.58 spid151 SqlDumpExceptionHandler: Process 151
generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL
Server is terminating this process..
*
*******************************************************************************
*
* BEGIN STACK DUMP:
* 07/25/05 08:40:06 spid 151
*
* Exception Address = 0064B92B (SQLExit + 000E3E34 Line 0+00000000)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 00000000
* Input Buffer 874 bytes -
* Set NoCount On SET TRANSACTION ISOLATION LEVEL READ COMMITTED EXEC
SAS_C
* LAX_Export
'S',N'289944,335349,297284,285502,282321,296469,286041,280734
*
,286176,241856,286419,301228,281021,284350,290937,287195,287389,281516,3
*
38093,288616,290585,291640,335061','1','9','8','0506FRESHPLUSAPP20050725
* 00','Personal
Computer','','2005072500.sis','Y','N','Y',2,2,2,3,0x16c9db
*
2c3b7ded42bc1a94319f43e971,0xaeb7e671d65e6a42bc6c498addde1f8c,0,'N',NULL
* ,NULL
*
*
* MODULE BASE END SIZE
* sqlservr 00400000 00CBAFFF 008bb000
* ntdll 77F80000 77FFCFFF 0007d000
* ADVAPI32 7C2D0000 7C331FFF 00062000
* KERNEL32 7C570000 7C627FFF 000b8000
* RPCRT4 77D30000 77DA0FFF 00071000
* MSVCP71 7C3A0000 7C41AFFF 0007b000
* MSVCR71 7C340000 7C395FFF 00056000
* opends60 41060000 41065FFF 00006000
* SHELL32 782F0000 78534FFF 00245000
* GDI32 77F40000 77F7DFFF 0003e000
* USER32 77E10000 77E74FFF 00065000
* SHLWAPI 70A70000 70AD8FFF 00069000
* msvcrt 78000000 78045FFF 00046000
* COMCTL32 71710000 71793FFF 00084000
* sqlsort 42AE0000 42B6FFFF 00090000
* ums 41070000 4107DFFF 0000e000
* sqlevn70 41080000 4108AFFF 0000b000
* CLUSAPI 73930000 7393FFFF 00010000
* RESUTILS 689D0000 689DCFFF 0000d000
* USERENV 7C0F0000 7C150FFF 00061000
* NETAPI32 02BF0000 02C3EFFF 0004f000
* Secur32 02C40000 02C4EFFF 0000f000
* NTDSAPI 02C50000 02C60FFF 00011000
* DNSAPI 02C70000 02C93FFF 00024000
* WSOCK32 02CA0000 02CA7FFF 00008000
* WS2_32 02CB0000 02CC2FFF 00013000
* WS2HELP 02CD0000 02CD7FFF 00008000
* WLDAP32 02CE0000 02D07FFF 00028000
* NETRAP 02D10000 02D15FFF 00006000
* SAMLIB 02D20000 02D2EFFF 0000f000
* ole32 03390000 0347EFFF 000ef000
* XOLEHLP 03480000 03487FFF 00008000
* MSDTCPRX 03490000 03546FFF 000b7000
* MTXCLU 03550000 0355FFFF 00010000
* VERSION 03560000 03566FFF 00007000
* LZ32 03570000 03575FFF 00006000
* mswsock 03580000 03591FFF 00012000
* msafd 035E0000 035FEFFF 0001f000
* wshtcpip 03640000 03646FFF 00007000
* rnr20 03650000 0365BFFF 0000c000
* iphlpapi 036A0000 036B2FFF 00013000
* ICMP 036C0000 036C4FFF 00005000
* MPRAPI 036D0000 036E6FFF 00017000
* OLEAUT32 036F0000 0378AFFF 0009b000
* ACTIVEDS 03790000 037BDFFF 0002e000
* ADSLDPC 037C0000 037E1FFF 00022000
* RTUTILS 037F0000 037FDFFF 0000e000
* SETUPAPI 03800000 0388CFFF 0008d000
* RASAPI32 03890000 038C1FFF 00032000
* RASMAN 038D0000 038E0FFF 00011000
* TAPI32 038F0000 03911FFF 00022000
* DHCPCSVC 03920000 03938FFF 00019000
* CLBCATQ 03D50000 03DDFFFF 00090000
* winrnr 03E80000 03E87FFF 00008000
* msv1_0 03F10000 03F30FFF 00021000
* CRYPT32 03F40000 03FC6FFF 00087000
* MSASN1 03FD0000 03FDFFFF 00010000
* rasadhlp 03FE0000 03FE4FFF 00005000
* NTMARTA 047B0000 047CCFFF 0001d000
* WINSPOOL 047D0000 047ECFFF 0001d000
* SSNETLIB 047F0000 04805FFF 00016000
* security 04B40000 04B43FFF 00004000
* SSmsLPCn 04F10000 04F17FFF 00008000
* SSnmPN70 04F20000 04F26FFF 00007000
* kerberos 05010000 05045FFF 00036000
* CRYPTDLL 05050000 0505DFFF 0000e000
* SQLFTQRY 058B0000 058D5FFF 00026000
* sqloledb 058E0000 0595CFFF 0007d000
* MSDART 05960000 05983FFF 00024000
* comdlg32 05990000 059CDFFF 0003e000
* MSDATL3 059D0000 059E4FFF 00015000
* oledb32 06070000 060DFFFF 00070000
* OLEDB32R 060E0000 060F0FFF 00011000
* xpsqlbot 06190000 06195FFF 00006000
* xpstar 062E0000 0632CFFF 0004d000
* SQLRESLD 06330000 0633BFFF 0000c000
* SQLSVC 06340000 0635AFFF 0001b000
* ODBC32 06360000 06399FFF 0003a000
* odbcbcp 063A0000 063A5FFF 00006000
* W95SCM 063B0000 063BCFFF 0000d000
* SQLUNIRL 063C0000 063ECFFF 0002d000
* SHFOLDER 063F0000 063F7FFF 00008000
* odbcint 066C0000 066D6FFF 00017000
* NDDEAPI 066E0000 066E6FFF 00007000
* SQLSVC 066F0000 066F5FFF 00006000
* xpstar 06700000 06708FFF 00009000
* rsabase 067A0000 067C1FFF 00022000
* xplog70 067D0000 067DEFFF 0000f000
* xplog70 067E0000 067E4FFF 00005000
* msxmlsql 09810000 098E1FFF 000d2000
* msxml2 098F0000 0999DFFF 000ae000
* msxml3 099A0000 09AA3FFF 00104000
* dbghelp 16F60000 1705FFFF 00100000
*
* Edi: 00000040:
* Esi: 00000000:
* Eax: 00000018:
* Ebx: 1BE1CB88: 00B40780 00006303 00000000 00000000
FFFF0000 00000040
* Ecx: 00000001:
* Edx: 00000063:
* Eip: 0064B92B: FF560E8B 5E5F0451 0008C25D 468D178B
89C88B04 04578B11
* Ebp: 12A7D9CC: 12A7DA18 0084E9F1 00000000 12A7D9E8
1BE1C8C0 1BE08098
* SegCs: 0000001B:
* EFlags: 00010202: 0069004C 00500062 00740061 003D0068
003A0043 0057005C
* Esp: 12A7D9C4: 1BE08288 1BE08098 12A7DA18 0084E9F1
00000000 12A7D9E8
* SegSs: 00000023:
*
*******************************************************************************
*
----
* Short Stack Dump
* 0064B92B Module(sqlservr+0024B92B) (SQLExit+000E3E34)
* 0084E9F1 Module(sqlservr+0044E9F1) (GetIMallocForMsxml+00059E71)
* 0087E887 Module(sqlservr+0047E887) (GetIMallocForMsxml+00089D07)
* 0087EA3C Module(sqlservr+0047EA3C) (GetIMallocForMsxml+00089EBC)
* 0041D3EE Module(sqlservr+0001D3EE)
* 00874D80 Module(sqlservr+00474D80) (GetIMallocForMsxml+00080200)
* 0087533B Module(sqlservr+0047533B) (GetIMallocForMsxml+000807BB)
* 0041D396 Module(sqlservr+0001D396)
* 0041D396 Module(sqlservr+0001D396)
* 0048FFA4 Module(sqlservr+0008FFA4)
* 004194B9 Module(sqlservr+000194B9)
* 004193E4 Module(sqlservr+000193E4)
* 004168CF Module(sqlservr+000168CF)
* 00415D04 Module(sqlservr+00015D04)
* 00416214 Module(sqlservr+00016214)
* 00415F28 Module(sqlservr+00015F28)
* 0050BCEF Module(sqlservr+0010BCEF)
* 0050BB13 Module(sqlservr+0010BB13)
* 00415D04 Module(sqlservr+00015D04)
* 00416214 Module(sqlservr+00016214)
* 00415F28 Module(sqlservr+00015F28)
* 0050BCEF Module(sqlservr+0010BCEF)
* 0050BB13 Module(sqlservr+0010BB13)
* 00415D04 Module(sqlservr+00015D04)
* 00416214 Module(sqlservr+00016214)
* 00415F28 Module(sqlservr+00015F28)
* 0049C32E Module(sqlservr+0009C32E)
* 0049C46A Module(sqlservr+0009C46A)
* 41075309 Module(ums+00005309) (ProcessWorkRequests+000002D9 Line
456+00000000)
* 41074978 Module(ums+00004978) (ThreadStartRoutine+00000098 Line
263+00000007)
* 7C34940F Module(MSVCR71+0000940F) (endthread+000000AA)
* 7C57438B Module(KERNEL32+0000438B) (TlsSetValue+000000F0)
*
----
2005-07-25 08:40:12.00 spid151 Stack Signature for the dump is
0x024AEFDB
2005-07-25 08:40:12.12 spid151 Error: 0, Severity: 19, State: 0
2005-07-25 08:40:12.12 spid151 language_exec: Process 151 generated
an access violation. SQL Server is terminating this process..
Can anyone help? Resolutions? I have spent most of the morning
research on Google groups along with the Microsoft site with no
results.we solved this by turning off paralllelism and everything works now.
anyone that can shed some light to this situation would be grateful!|||Hi
The problem is that w2k SP2 is no longer supported, so you might be
experiencing compatibility issues.
Open a ticket with Microsoft PSS and see if they can help.
Regards
--
Mike Epprecht, Microsoft SQL Server MVP
Zurich, Switzerland
IM: mike@.epprecht.net
MVP Program: http://www.microsoft.com/mvp
Blog: http://www.msmvps.com/epprecht/
<azgoddess1@.yahoo.com> wrote in message
news:1122314125.933789.148730@.g47g2000cwa.googlegroups.com...
> we are having the problem on our production, replication and test
> servers but not on our mock production servers
> differences are the operating systems - all are advanced server and SQL
> Server 2000 SP4
> Production - W2k sp2 -- Reason it is so low is our old Storage Works
> Replication - WS2k3 sp1
> Test - W2K sp3
>
> Mock Prod - this works - W2K sp4
> This started showing up in the SQL Server log on Production and can be
> replicated:
>
> 2005-07-25 08:40:06.36 spid151 Using 'dbghelp.dll' version '4.0.5'
> *Stack Dump being sent to S:\Program Files\Microsoft SQL
> Server\MSSQL\log\SQLDump0007.txt
> 2005-07-25 08:40:06.58 spid151 Error: 0, Severity: 19, State: 0
> 2005-07-25 08:40:06.58 spid151 SqlDumpExceptionHandler: Process 151
> generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL
> Server is terminating this process..
> *
> *******************************************************************************
> *
> * BEGIN STACK DUMP:
> * 07/25/05 08:40:06 spid 151
> *
> * Exception Address = 0064B92B (SQLExit + 000E3E34 Line 0+00000000)
> * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
> * Access Violation occurred reading address 00000000
> * Input Buffer 874 bytes -
> * Set NoCount On SET TRANSACTION ISOLATION LEVEL READ COMMITTED EXEC
> SAS_C
> * LAX_Export
> 'S',N'289944,335349,297284,285502,282321,296469,286041,280734
> *
> ,286176,241856,286419,301228,281021,284350,290937,287195,287389,281516,3
> *
> 38093,288616,290585,291640,335061','1','9','8','0506FRESHPLUSAPP20050725
> * 00','Personal
> Computer','','2005072500.sis','Y','N','Y',2,2,2,3,0x16c9db
> *
> 2c3b7ded42bc1a94319f43e971,0xaeb7e671d65e6a42bc6c498addde1f8c,0,'N',NULL
> * ,NULL
> *
> *
> * MODULE BASE END SIZE
> * sqlservr 00400000 00CBAFFF 008bb000
> * ntdll 77F80000 77FFCFFF 0007d000
> * ADVAPI32 7C2D0000 7C331FFF 00062000
> * KERNEL32 7C570000 7C627FFF 000b8000
> * RPCRT4 77D30000 77DA0FFF 00071000
> * MSVCP71 7C3A0000 7C41AFFF 0007b000
> * MSVCR71 7C340000 7C395FFF 00056000
> * opends60 41060000 41065FFF 00006000
> * SHELL32 782F0000 78534FFF 00245000
> * GDI32 77F40000 77F7DFFF 0003e000
> * USER32 77E10000 77E74FFF 00065000
> * SHLWAPI 70A70000 70AD8FFF 00069000
> * msvcrt 78000000 78045FFF 00046000
> * COMCTL32 71710000 71793FFF 00084000
> * sqlsort 42AE0000 42B6FFFF 00090000
> * ums 41070000 4107DFFF 0000e000
> * sqlevn70 41080000 4108AFFF 0000b000
> * CLUSAPI 73930000 7393FFFF 00010000
> * RESUTILS 689D0000 689DCFFF 0000d000
> * USERENV 7C0F0000 7C150FFF 00061000
> * NETAPI32 02BF0000 02C3EFFF 0004f000
> * Secur32 02C40000 02C4EFFF 0000f000
> * NTDSAPI 02C50000 02C60FFF 00011000
> * DNSAPI 02C70000 02C93FFF 00024000
> * WSOCK32 02CA0000 02CA7FFF 00008000
> * WS2_32 02CB0000 02CC2FFF 00013000
> * WS2HELP 02CD0000 02CD7FFF 00008000
> * WLDAP32 02CE0000 02D07FFF 00028000
> * NETRAP 02D10000 02D15FFF 00006000
> * SAMLIB 02D20000 02D2EFFF 0000f000
> * ole32 03390000 0347EFFF 000ef000
> * XOLEHLP 03480000 03487FFF 00008000
> * MSDTCPRX 03490000 03546FFF 000b7000
> * MTXCLU 03550000 0355FFFF 00010000
> * VERSION 03560000 03566FFF 00007000
> * LZ32 03570000 03575FFF 00006000
> * mswsock 03580000 03591FFF 00012000
> * msafd 035E0000 035FEFFF 0001f000
> * wshtcpip 03640000 03646FFF 00007000
> * rnr20 03650000 0365BFFF 0000c000
> * iphlpapi 036A0000 036B2FFF 00013000
> * ICMP 036C0000 036C4FFF 00005000
> * MPRAPI 036D0000 036E6FFF 00017000
> * OLEAUT32 036F0000 0378AFFF 0009b000
> * ACTIVEDS 03790000 037BDFFF 0002e000
> * ADSLDPC 037C0000 037E1FFF 00022000
> * RTUTILS 037F0000 037FDFFF 0000e000
> * SETUPAPI 03800000 0388CFFF 0008d000
> * RASAPI32 03890000 038C1FFF 00032000
> * RASMAN 038D0000 038E0FFF 00011000
> * TAPI32 038F0000 03911FFF 00022000
> * DHCPCSVC 03920000 03938FFF 00019000
> * CLBCATQ 03D50000 03DDFFFF 00090000
> * winrnr 03E80000 03E87FFF 00008000
> * msv1_0 03F10000 03F30FFF 00021000
> * CRYPT32 03F40000 03FC6FFF 00087000
> * MSASN1 03FD0000 03FDFFFF 00010000
> * rasadhlp 03FE0000 03FE4FFF 00005000
> * NTMARTA 047B0000 047CCFFF 0001d000
> * WINSPOOL 047D0000 047ECFFF 0001d000
> * SSNETLIB 047F0000 04805FFF 00016000
> * security 04B40000 04B43FFF 00004000
> * SSmsLPCn 04F10000 04F17FFF 00008000
> * SSnmPN70 04F20000 04F26FFF 00007000
> * kerberos 05010000 05045FFF 00036000
> * CRYPTDLL 05050000 0505DFFF 0000e000
> * SQLFTQRY 058B0000 058D5FFF 00026000
> * sqloledb 058E0000 0595CFFF 0007d000
> * MSDART 05960000 05983FFF 00024000
> * comdlg32 05990000 059CDFFF 0003e000
> * MSDATL3 059D0000 059E4FFF 00015000
> * oledb32 06070000 060DFFFF 00070000
> * OLEDB32R 060E0000 060F0FFF 00011000
> * xpsqlbot 06190000 06195FFF 00006000
> * xpstar 062E0000 0632CFFF 0004d000
> * SQLRESLD 06330000 0633BFFF 0000c000
> * SQLSVC 06340000 0635AFFF 0001b000
> * ODBC32 06360000 06399FFF 0003a000
> * odbcbcp 063A0000 063A5FFF 00006000
> * W95SCM 063B0000 063BCFFF 0000d000
> * SQLUNIRL 063C0000 063ECFFF 0002d000
> * SHFOLDER 063F0000 063F7FFF 00008000
> * odbcint 066C0000 066D6FFF 00017000
> * NDDEAPI 066E0000 066E6FFF 00007000
> * SQLSVC 066F0000 066F5FFF 00006000
> * xpstar 06700000 06708FFF 00009000
> * rsabase 067A0000 067C1FFF 00022000
> * xplog70 067D0000 067DEFFF 0000f000
> * xplog70 067E0000 067E4FFF 00005000
> * msxmlsql 09810000 098E1FFF 000d2000
> * msxml2 098F0000 0999DFFF 000ae000
> * msxml3 099A0000 09AA3FFF 00104000
> * dbghelp 16F60000 1705FFFF 00100000
> *
> * Edi: 00000040:
> * Esi: 00000000:
> * Eax: 00000018:
> * Ebx: 1BE1CB88: 00B40780 00006303 00000000 00000000
> FFFF0000 00000040
> * Ecx: 00000001:
> * Edx: 00000063:
> * Eip: 0064B92B: FF560E8B 5E5F0451 0008C25D 468D178B
> 89C88B04 04578B11
> * Ebp: 12A7D9CC: 12A7DA18 0084E9F1 00000000 12A7D9E8
> 1BE1C8C0 1BE08098
> * SegCs: 0000001B:
> * EFlags: 00010202: 0069004C 00500062 00740061 003D0068
> 003A0043 0057005C
> * Esp: 12A7D9C4: 1BE08288 1BE08098 12A7DA18 0084E9F1
> 00000000 12A7D9E8
> * SegSs: 00000023:
> *
> *******************************************************************************
> *
> ----
> * Short Stack Dump
> * 0064B92B Module(sqlservr+0024B92B) (SQLExit+000E3E34)
> * 0084E9F1 Module(sqlservr+0044E9F1) (GetIMallocForMsxml+00059E71)
> * 0087E887 Module(sqlservr+0047E887) (GetIMallocForMsxml+00089D07)
> * 0087EA3C Module(sqlservr+0047EA3C) (GetIMallocForMsxml+00089EBC)
> * 0041D3EE Module(sqlservr+0001D3EE)
> * 00874D80 Module(sqlservr+00474D80) (GetIMallocForMsxml+00080200)
> * 0087533B Module(sqlservr+0047533B) (GetIMallocForMsxml+000807BB)
> * 0041D396 Module(sqlservr+0001D396)
> * 0041D396 Module(sqlservr+0001D396)
> * 0048FFA4 Module(sqlservr+0008FFA4)
> * 004194B9 Module(sqlservr+000194B9)
> * 004193E4 Module(sqlservr+000193E4)
> * 004168CF Module(sqlservr+000168CF)
> * 00415D04 Module(sqlservr+00015D04)
> * 00416214 Module(sqlservr+00016214)
> * 00415F28 Module(sqlservr+00015F28)
> * 0050BCEF Module(sqlservr+0010BCEF)
> * 0050BB13 Module(sqlservr+0010BB13)
> * 00415D04 Module(sqlservr+00015D04)
> * 00416214 Module(sqlservr+00016214)
> * 00415F28 Module(sqlservr+00015F28)
> * 0050BCEF Module(sqlservr+0010BCEF)
> * 0050BB13 Module(sqlservr+0010BB13)
> * 00415D04 Module(sqlservr+00015D04)
> * 00416214 Module(sqlservr+00016214)
> * 00415F28 Module(sqlservr+00015F28)
> * 0049C32E Module(sqlservr+0009C32E)
> * 0049C46A Module(sqlservr+0009C46A)
> * 41075309 Module(ums+00005309) (ProcessWorkRequests+000002D9 Line
> 456+00000000)
> * 41074978 Module(ums+00004978) (ThreadStartRoutine+00000098 Line
> 263+00000007)
> * 7C34940F Module(MSVCR71+0000940F) (endthread+000000AA)
> * 7C57438B Module(KERNEL32+0000438B) (TlsSetValue+000000F0)
> *
> ----
> 2005-07-25 08:40:12.00 spid151 Stack Signature for the dump is
> 0x024AEFDB
> 2005-07-25 08:40:12.12 spid151 Error: 0, Severity: 19, State: 0
> 2005-07-25 08:40:12.12 spid151 language_exec: Process 151 generated
> an access violation. SQL Server is terminating this process..
> Can anyone help? Resolutions? I have spent most of the morning
> research on Google groups along with the Microsoft site with no
> results.
>|||thanks for the reply
what about the other two sql servers:
Replication - WS2k3 sp1
Test - W2K sp3
the only one that seemed to work was the one operating system with all
the sp
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment