For about 1 hour today, I received many (50+) Event ID 17052 errors.
During this time, I had the profiler open because of disconnect errors
the users were reporting. Is this related to me having the profiler
open?
SqlDumpExceptionHandler: Process 269 generated fatal exception
c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this
process..
*
***************************************************************************Â****
*
* BEGIN STACK DUMP:
* 07/24/07 09:43:31 spid 269
*
* Exception Address = 00000000
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 00000000
* & Zß¼ & ff ff 07 00 02 00 00 00 26 04 04 5a df bc 0a 00
00 26
* & & 04 04 10 00 00 00 00 00 26 04 04 01 00 00 00 00
00 26
* 04 04 01 00 00 00
*
*
* MODULE BASE END SIZE
* sqlservr 00400000 00B32FFF 00733000
* ntdll 7C800000 7C8BFFFF 000c0000
* kernel32 77E40000 77F41FFF 00102000
* ADVAPI32 77F50000 77FEBFFF 0009c000
* RPCRT4 77C50000 77CEEFFF 0009f000
* USER32 77380000 77411FFF 00092000
* GDI32 77C00000 77C47FFF 00048000
* OPENDS60 41060000 41065FFF 00006000
* MSVCRT 77BA0000 77BF9FFF 0005a000
* UMS 41070000 4107BFFF 0000c000
* SQLSORT 42AE0000 42B6FFFF 00090000
* MSVCIRT 60020000 6002FFFF 00010000
* sqlevn70 10000000 10006FFF 00007000
* Secur32 76F50000 76F62FFF 00013000
* NETAPI32 10FE0000 11037FFF 00058000
* ole32 11450000 11583FFF 00134000
* XOLEHLP 11590000 11595FFF 00006000
* MSDTCPRX 115A0000 11617FFF 00078000
* msvcp60 11620000 11680FFF 00061000
* MTXCLU 11690000 116A8FFF 00019000
* VERSION 116B0000 116B7FFF 00008000
* WSOCK32 116C0000 116C8FFF 00009000
* WS2_32 116D0000 116E6FFF 00017000
* WS2HELP 116F0000 116F7FFF 00008000
* OLEAUT32 11700000 1178BFFF 0008c000
* CLUSAPI 117D0000 117E1FFF 00012000
* RESUTILS 117F0000 11802FFF 00013000
* USERENV 11810000 118D3FFF 000c4000
* mswsock 118F0000 11930FFF 00041000
* DNSAPI 11940000 1196EFFF 0002f000
* winrnr 119B0000 119B6FFF 00007000
* WLDAP32 119C0000 119EDFFF 0002e000
* rasadhlp 11A10000 11A17FFF 00008000
* SSNETLIB 00C70000 00C84FFF 00015000
* NTMARTA 00CA0000 00CC1FFF 00022000
* SAMLIB 00CD0000 00CDEFFF 0000f000
* security 12500000 12503FFF 00004000
* hnetcfg 12620000 12678FFF 00059000
* wshtcpip 12550000 12557FFF 00008000
* SSmsLPCn 12560000 12567FFF 00008000
* SSnmPN70 12570000 12575FFF 00006000
* ntdsapi 127A0000 127B4FFF 00015000
* SQLFTQRY 12C20000 12C51FFF 00032000
* xpsp2res 12CE0000 12FA4FFF 002c5000
* CLBCatQ 12FB0000 13032FFF 00083000
* COMRes 13040000 13105FFF 000c6000
* sqloledb 13120000 131A0FFF 00081000
* MSDART 131B0000 131C9FFF 0001a000
* MSDATL3 131D0000 131E4FFF 00015000
* oledb32 13570000 135E8FFF 00079000
* OLEDB32R 135F0000 13600FFF 00011000
* rsaenh 136A0000 136CEFFF 0002f000
* PSAPI 136D0000 136DAFFF 0000b000
* msv1_0 13700000 13726FFF 00027000
* iphlpapi 13730000 13749FFF 0001a000
* xpsqlbot 136F0000 136F5FFF 00006000
* xpstar 13870000 138B6FFF 00047000
* SQLRESLD 138C0000 138C6FFF 00007000
* SQLSVC 138D0000 138E6FFF 00017000
* ODBC32 138F0000 1392CFFF 0003d000
* COMCTL32 13930000 139C6FFF 00097000
* comdlg32 139D0000 13A19FFF 0004a000
* SHELL32 13A20000 14223FFF 00804000
* SHLWAPI 14230000 14281FFF 00052000
* odbcbcp 14290000 14295FFF 00006000
* W95SCM 142A0000 142ABFFF 0000c000
* SQLUNIRL 142B0000 142DCFFF 0002d000
* WINSPOOL 142E0000 14306FFF 00027000
* SHFOLDER 14310000 14318FFF 00009000
* comctl32 14330000 14432FFF 00103000
* odbcint 14620000 14636FFF 00017000
* NDDEAPI 14740000 14746FFF 00007000
* SQLSVC 14750000 14755FFF 00006000
* xpstar 14760000 14768FFF 00009000
* xplog70 147F0000 14801FFF 00012000
* xplog70 127C0000 127C3FFF 00004000
* DBNETLIB 14B90000 14BABFFF 0001c000
* crypt32 14BB0000 14C42FFF 00093000
* MSASN1 14C50000 14C61FFF 00012000
* SQLOLEDB 14DB0000 14DBEFFF 0000f000
* dbghelp 155A0000 15654FFF 000b5000
*
* Edi: 0042CA92: 5256C18B 8B10488B 508B0C70 08498B14
CE0C8B52 56FF318B
* Esi: 009AF08C: 0041A533 00419F9A 00419F9A 00470A2B
00419F9A 004B2617
* Eax: 5A002000: 5A38C030 00000001 00D90001 00000000
5A010000 5A384000
* Ebx: 3E566250: 3B3B7AA8 00000000 3E566270 3E5662C8
3B3B7D88 3E4F4388
* Ecx: 6EC26698: 5A002000 30373233 56353738 0086DB70
00009948 0003B2D4
* Edx: 3E4E10D0: 009AEEFC 3E4E0020 3E4F4440 3E4E01B8
00000000 00000000
* Eip: 00000000:
* Ebp: 15F6F070: 15F6F0F4 0042CAAB 3E4F4388 15F6F094
15F6F094 0041CA56
* SegCs: 0000001B:
* EFlags: 00010203: 3A004300 50005C00 6F007200 72006700
6D006100 46002000
* Esp: 15F6F064: 00590EAA 3E4F4388 15F6F094 15F6F0F4
0042CAAB 3E4F4388
* SegSs: 00000023:
*
***************************************************************************Â****
*
----Â--
* Short Stack Dump
* 00000000 Module(sqlservr+FFC00000)
* 00590EAA Module(sqlservr+00190EAA) (CValCursorDelegate::GetDataX
+00000020)
* 0042CAAB Module(sqlservr+0002CAAB) (GetData+00000019)
* 0041CA56 Module(sqlservr+0001CA56) (CEs::GeneralEval4+0000003D)
* 0059CD48 Module(sqlservr+0019CD48) (CFetchKeyset::Fetch+0000059E)
* 00585714 Module(sqlservr+00185714) (CCursor::Fetch+00000249)
* 005938CB Module(sqlservr+001938CB) (SPCursor::Fetch+00000546)
* 005F40A5 Module(sqlservr+001F40A5) (CSpecProc::ExecuteSpecial
+000000D5)
* 005F45E2 Module(sqlservr+001F45E2) (CSpecProc::Execute+000000B6)
* 00616154 Module(sqlservr+00216154) (execrpc+000004A6)
* 00437128 Module(sqlservr+00037128) (execute_rpc+00000019)
* 0042921A Module(sqlservr+0002921A) (process_commands+00000232)
* 41072838 Module(UMS+00002838) (ProcessWorkRequests+00000272)
* 410725B3 Module(UMS+000025B3) (ThreadStartRoutine+00000098)
* 77BCB3CA Module(MSVCRT+0002B3CA) (endthread+000000AB)
* 77E6608B Module(kernel32+0002608B) (GetModuleFileNameA+000000EB)
* --Hi Bill,
Microsoft has not released the symbols for SQL Server 2005 to the
public. You should therefore open a case with MS PSS and send them this
SQL dump. They should be able to analyze it for you and hopefully get
to the bottom of your problem.
Jonathan
Bill wrote:
> For about 1 hour today, I received many (50+) Event ID 17052 errors.
> During this time, I had the profiler open because of disconnect errors
> the users were reporting. Is this related to me having the profiler
> open?
> SqlDumpExceptionHandler: Process 269 generated fatal exception
> c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this
> process..
> *
> ***************************************************************************Â****
> *
> * BEGIN STACK DUMP:
> * 07/24/07 09:43:31 spid 269
> *
> * Exception Address = 00000000
> * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
> * Access Violation occurred reading address 00000000
> * & Zß¼ & ff ff 07 00 02 00 00 00 26 04 04 5a df bc 0a 00
> 00 26
> * & & 04 04 10 00 00 00 00 00 26 04 04 01 00 00 00 00
> 00 26
> * 04 04 01 00 00 00
> *
> *
> * MODULE BASE END SIZE
> * sqlservr 00400000 00B32FFF 00733000
> * ntdll 7C800000 7C8BFFFF 000c0000
> * kernel32 77E40000 77F41FFF 00102000
> * ADVAPI32 77F50000 77FEBFFF 0009c000
> * RPCRT4 77C50000 77CEEFFF 0009f000
> * USER32 77380000 77411FFF 00092000
> * GDI32 77C00000 77C47FFF 00048000
> * OPENDS60 41060000 41065FFF 00006000
> * MSVCRT 77BA0000 77BF9FFF 0005a000
> * UMS 41070000 4107BFFF 0000c000
> * SQLSORT 42AE0000 42B6FFFF 00090000
> * MSVCIRT 60020000 6002FFFF 00010000
> * sqlevn70 10000000 10006FFF 00007000
> * Secur32 76F50000 76F62FFF 00013000
> * NETAPI32 10FE0000 11037FFF 00058000
> * ole32 11450000 11583FFF 00134000
> * XOLEHLP 11590000 11595FFF 00006000
> * MSDTCPRX 115A0000 11617FFF 00078000
> * msvcp60 11620000 11680FFF 00061000
> * MTXCLU 11690000 116A8FFF 00019000
> * VERSION 116B0000 116B7FFF 00008000
> * WSOCK32 116C0000 116C8FFF 00009000
> * WS2_32 116D0000 116E6FFF 00017000
> * WS2HELP 116F0000 116F7FFF 00008000
> * OLEAUT32 11700000 1178BFFF 0008c000
> * CLUSAPI 117D0000 117E1FFF 00012000
> * RESUTILS 117F0000 11802FFF 00013000
> * USERENV 11810000 118D3FFF 000c4000
> * mswsock 118F0000 11930FFF 00041000
> * DNSAPI 11940000 1196EFFF 0002f000
> * winrnr 119B0000 119B6FFF 00007000
> * WLDAP32 119C0000 119EDFFF 0002e000
> * rasadhlp 11A10000 11A17FFF 00008000
> * SSNETLIB 00C70000 00C84FFF 00015000
> * NTMARTA 00CA0000 00CC1FFF 00022000
> * SAMLIB 00CD0000 00CDEFFF 0000f000
> * security 12500000 12503FFF 00004000
> * hnetcfg 12620000 12678FFF 00059000
> * wshtcpip 12550000 12557FFF 00008000
> * SSmsLPCn 12560000 12567FFF 00008000
> * SSnmPN70 12570000 12575FFF 00006000
> * ntdsapi 127A0000 127B4FFF 00015000
> * SQLFTQRY 12C20000 12C51FFF 00032000
> * xpsp2res 12CE0000 12FA4FFF 002c5000
> * CLBCatQ 12FB0000 13032FFF 00083000
> * COMRes 13040000 13105FFF 000c6000
> * sqloledb 13120000 131A0FFF 00081000
> * MSDART 131B0000 131C9FFF 0001a000
> * MSDATL3 131D0000 131E4FFF 00015000
> * oledb32 13570000 135E8FFF 00079000
> * OLEDB32R 135F0000 13600FFF 00011000
> * rsaenh 136A0000 136CEFFF 0002f000
> * PSAPI 136D0000 136DAFFF 0000b000
> * msv1_0 13700000 13726FFF 00027000
> * iphlpapi 13730000 13749FFF 0001a000
> * xpsqlbot 136F0000 136F5FFF 00006000
> * xpstar 13870000 138B6FFF 00047000
> * SQLRESLD 138C0000 138C6FFF 00007000
> * SQLSVC 138D0000 138E6FFF 00017000
> * ODBC32 138F0000 1392CFFF 0003d000
> * COMCTL32 13930000 139C6FFF 00097000
> * comdlg32 139D0000 13A19FFF 0004a000
> * SHELL32 13A20000 14223FFF 00804000
> * SHLWAPI 14230000 14281FFF 00052000
> * odbcbcp 14290000 14295FFF 00006000
> * W95SCM 142A0000 142ABFFF 0000c000
> * SQLUNIRL 142B0000 142DCFFF 0002d000
> * WINSPOOL 142E0000 14306FFF 00027000
> * SHFOLDER 14310000 14318FFF 00009000
> * comctl32 14330000 14432FFF 00103000
> * odbcint 14620000 14636FFF 00017000
> * NDDEAPI 14740000 14746FFF 00007000
> * SQLSVC 14750000 14755FFF 00006000
> * xpstar 14760000 14768FFF 00009000
> * xplog70 147F0000 14801FFF 00012000
> * xplog70 127C0000 127C3FFF 00004000
> * DBNETLIB 14B90000 14BABFFF 0001c000
> * crypt32 14BB0000 14C42FFF 00093000
> * MSASN1 14C50000 14C61FFF 00012000
> * SQLOLEDB 14DB0000 14DBEFFF 0000f000
> * dbghelp 155A0000 15654FFF 000b5000
> *
> * Edi: 0042CA92: 5256C18B 8B10488B 508B0C70 08498B14
> CE0C8B52 56FF318B
> * Esi: 009AF08C: 0041A533 00419F9A 00419F9A 00470A2B
> 00419F9A 004B2617
> * Eax: 5A002000: 5A38C030 00000001 00D90001 00000000
> 5A010000 5A384000
> * Ebx: 3E566250: 3B3B7AA8 00000000 3E566270 3E5662C8
> 3B3B7D88 3E4F4388
> * Ecx: 6EC26698: 5A002000 30373233 56353738 0086DB70
> 00009948 0003B2D4
> * Edx: 3E4E10D0: 009AEEFC 3E4E0020 3E4F4440 3E4E01B8
> 00000000 00000000
> * Eip: 00000000:
> * Ebp: 15F6F070: 15F6F0F4 0042CAAB 3E4F4388 15F6F094
> 15F6F094 0041CA56
> * SegCs: 0000001B:
> * EFlags: 00010203: 3A004300 50005C00 6F007200 72006700
> 6D006100 46002000
> * Esp: 15F6F064: 00590EAA 3E4F4388 15F6F094 15F6F0F4
> 0042CAAB 3E4F4388
> * SegSs: 00000023:
> *
> ***************************************************************************Â****
> *
> ----Â--
> * Short Stack Dump
> * 00000000 Module(sqlservr+FFC00000)
> * 00590EAA Module(sqlservr+00190EAA) (CValCursorDelegate::GetDataX
> +00000020)
> * 0042CAAB Module(sqlservr+0002CAAB) (GetData+00000019)
> * 0041CA56 Module(sqlservr+0001CA56) (CEs::GeneralEval4+0000003D)
> * 0059CD48 Module(sqlservr+0019CD48) (CFetchKeyset::Fetch+0000059E)
> * 00585714 Module(sqlservr+00185714) (CCursor::Fetch+00000249)
> * 005938CB Module(sqlservr+001938CB) (SPCursor::Fetch+00000546)
> * 005F40A5 Module(sqlservr+001F40A5) (CSpecProc::ExecuteSpecial
> +000000D5)
> * 005F45E2 Module(sqlservr+001F45E2) (CSpecProc::Execute+000000B6)
> * 00616154 Module(sqlservr+00216154) (execrpc+000004A6)
> * 00437128 Module(sqlservr+00037128) (execute_rpc+00000019)
> * 0042921A Module(sqlservr+0002921A) (process_commands+00000232)
> * 41072838 Module(UMS+00002838) (ProcessWorkRequests+00000272)
> * 410725B3 Module(UMS+000025B3) (ThreadStartRoutine+00000098)
> * 77BCB3CA Module(MSVCRT+0002B3CA) (endthread+000000AB)
> * 77E6608B Module(kernel32+0002608B) (GetModuleFileNameA+000000EB)
> * --
No comments:
Post a Comment