Please start any new threads on our new
site at https://forums.sqlteam.com. We've got lots of great SQL Server
experts to answer whatever question you can come up with.
Author |
Topic |
viatorg
Starting Member
3 Posts |
Posted - 2007-10-09 : 08:53:20
|
Hi all,SQL Server went down twice yesterday. I've included part of thesecond Stack Dump Error log file. Can anyone help me on this?thanksgv===================================================================== BugCheck Dump ===================================================================== This file is generated by Microsoft SQL Server 8.00.2039 upon detection of fatal unexpected error. Please return this file, the query or program that produced the bugcheck, the database and the error log, and any other pertinent information with a Service Request. Computer type is AT/AT COMPATIBLE. Bios Version is A M I - 3000507 SE7520JR23 Production BIOS Version 07.20, Build 0074 Current time is 16:04:18 10/08/07. 4 Intel x86 level 15, 2992 Mhz processor(s). Windows NT 5.2 Build 3790 CSD Service Pack 2. Memory MemoryLoad = 65% Total Physical = 4095 MB Available Physical = 1411 MB Total Page File = 5975 MB Available Page File = 3633 MB Total Virtual = 2047 MB Available Virtual = 299 MB *Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL\log\SQLDump0002.txt * ******************************************************************************* * * BEGIN STACK DUMP: * 10/08/07 16:04:18 spid 0 * * Exception Address = 04997C6F * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION * Access Violation occurred reading address 00000000 * * MODULE BASE END SIZE * sqlservr 00400000 00CBAFFF 008bb000 * ntdll 7C800000 7C8BFFFF 000c0000 * kernel32 77E40000 77F41FFF 00102000 * ADVAPI32 77F50000 77FEAFFF 0009b000 * RPCRT4 77C50000 77CEEFFF 0009f000 * Secur32 76F50000 76F62FFF 00013000 * MSVCP71 7C3A0000 7C41AFFF 0007b000 * MSVCR71 7C340000 7C395FFF 00056000 * opends60 41060000 41065FFF 00006000 * SHELL32 7C8D0000 7D0CDFFF 007fe000 * msvcrt 77BA0000 77BF9FFF 0005a000 * GDI32 77C00000 77C47FFF 00048000 * USER32 77380000 77410FFF 00091000 * SHLWAPI 77DA0000 77DF1FFF 00052000 * sqlsort 42AE0000 42B6FFFF 00090000 * ums 41070000 4107DFFF 0000e000 * comctl32 77420000 77522FFF 00103000 * sqlevn70 41080000 4108AFFF 0000b000 * NETAPI32 02CA0000 02CF6FFF 00057000 * AUTHZ 02D00000 02D13FFF 00014000 * COMRES 030B0000 03175FFF 000c6000 * ole32 03200000 03338FFF 00139000 * XOLEHLP 03340000 03345FFF 00006000 * MSDTCPRX 03350000 033C8FFF 00079000 * OLEAUT32 033D0000 0345AFFF 0008b000 * msvcp60 03460000 034C4FFF 00065000 * MTXCLU 034D0000 034E8FFF 00019000 * VERSION 034F0000 034F7FFF 00008000 * WSOCK32 03500000 03508FFF 00009000 * WS2_32 03510000 03526FFF 00017000 * WS2HELP 03530000 03537FFF 00008000 * CLUSAPI 03580000 03591FFF 00012000 * RESUTILS 035A0000 035B2FFF 00013000 * USERENV 035C0000 03681FFF 000c2000 * mswsock 036A0000 036E0FFF 00041000 * DNSAPI 036F0000 03719FFF 0002a000 * winrnr 03760000 03766FFF 00007000 * WLDAP32 03770000 0379DFFF 0002e000 * rasadhlp 037C0000 037C4FFF 00005000 * NTMARTA 00E50000 00E70FFF 00021000 * SAMLIB 00E80000 00E8EFFF 0000f000 * SSNETLIB 00EA0000 00EB5FFF 00016000 * security 00EC0000 00EC3FFF 00004000 * hnetcfg 042C0000 04319FFF 0005a000 * wshtcpip 04D20000 04D27FFF 00008000 * SSmsLPCn 04DB0000 04DB7FFF 00008000 * SSnmPN70 04DF0000 04DF6FFF 00007000 * ntdsapi 04EA0000 04EB3FFF 00014000 * kerberos 04EE0000 04F37FFF 00058000 * cryptdll 04F60000 04F6BFFF 0000c000 * MSASN1 04F80000 04F91FFF 00012000 * msv1_0 053B0000 053D6FFF 00027000 * iphlpapi 05420000 05439FFF 0001a000 * PSAPI 05450000 0545AFFF 0000b000 * rsaenh 05470000 054A4FFF 00035000 * xpsp2res 059C0000 05C84FFF 002c5000 * CLBCatQ 05C90000 05D12FFF 00083000 * sqloledb 05D30000 05DB0FFF 00081000 * MSDART 04260000 04279FFF 0001a000 * MSDATL3 04280000 04294FFF 00015000 * oledb32 06140000 061B8FFF 00079000 * OLEDB32R 061C0000 061D0FFF 00011000 * xpstar 06260000 062ACFFF 0004d000 * SQLRESLD 062E0000 062EBFFF 0000c000 * SQLSVC 062F0000 0630AFFF 0001b000 * ODBC32 06310000 0634CFFF 0003d000 * COMCTL32 06350000 063E6FFF 00097000 * comdlg32 063F0000 06438FFF 00049000 * odbcbcp 064D0000 064D5FFF 00006000 * W95SCM 064E0000 064ECFFF 0000d000 * SQLUNIRL 064F0000 0651CFFF 0002d000 * WINSPOOL 06520000 06546FFF 00027000 * SHFOLDER 06550000 06558FFF 00009000 * odbcint 06730000 06746FFF 00017000 * NDDEAPI 06860000 06867FFF 00008000 * SQLSVC 06870000 06875FFF 00006000 * xpstar 06880000 06888FFF 00009000 * SQLFTQRY 04490000 044B5FFF 00026000 * xpsqlbot 04650000 04655FFF 00006000 * sqldbg 04B10000 04B1DFFF 0000e000 * CRYPT32 06910000 069A2FFF 00093000 * mssdi98 04990000 049CCFFF 0003d000 * oledlg 049D0000 049F2FFF 00023000 * OLEACC 05860000 05890FFF 00031000 * dbghelp 07720000 0781FFFF 00100000 * …………………….…………. A lot of stuff here not *****************………….* Short Stack Dump * 7C8285EC Module(ntdll+000285EC) (KiFastSystemCallRet+00000000) * 41074AEE Module(ums+00004AEE) (UmsThreadScheduler::Switch+0000004E Line 490+0000000A) * 410729F9 Module(ums+000029F9) (UmsScheduler::IdleLoop+00000119 Line 1373+0000000D) * 41072B26 Module(ums+00002B26) (UmsScheduler::Suspend+00000066 Line 1182+00000000) * 4107311B Module(ums+0000311B) (UmsEvent::Wait+0000007B Line 320+00000000) * 00401261 Module(sqlservr+00001261) * 00401C92 Module(sqlservr+00001C92) * 00565F7E Module(sqlservr+00165F7E) * 41075309 Module(ums+00005309) (ProcessWorkRequests+000002D9 Line 456+00000000) * 41074978 Module(ums+00004978) (ThreadStartRoutine+00000098 Line 263+00000007)* 7C34940F Module(MSVCR71+0000940F) (endthread+000000AA) * 77E64829 Module(kernel32+00024829) (GetModuleHandleA+000000DF) -------------------------------------------------------------------------------* Location : 7C8285EC Module(ntdll+000285EC) (KiFastSystemCallRet+00000000) * Return Addr: 41074AEE Module(ums+00004AEE) (UmsThreadScheduler::Switch+0000004E Line 490+0000000A) Frame : 03C0FB18 Parameters: [1] 00000310: [2] FFFFFFFF: [3] 00000001: [4] 002A76E0: 41076154 42C6C594 42C6C594 002AE90C 002AEC0C 65E353B9 160 bytes of stack data from 03C0FA78 to 03C0FB18 03C0FA78: 000120A5 0001763F 00000000 0000152E [. ..?v..........] 03C0FA88: 00000000 00000072 002A6C60 002A6C10 [....r...`l*..l*.] 03C0FA98: 410728B1 044C2AA4 00000000 06BAFF48 [.(.A.*L.....H...] 03C0FAA8: 7C827D0B 77E61D1E 00000310 00000001 [.}.|...w........] 03C0FAB8: 00000000 77E61C96 002A76E0 002A6C10 [.......w.v*..l*.] 03C0FAC8: 00000024 00000001 00000000 00000000 [$...............] ……………………………………… |
|
Kristen
Test
22859 Posts |
Posted - 2007-10-09 : 09:39:46
|
When that happens to us I normally see enough text that I can recognise to pin-point the culprit. Which is normally some crappy COM object that some twit has though would make a good server-bound-instability-object!Can;t see anything like that in the part that you have posted though - but maybe you can recognise something in the part you have not posted?I would be inclined to do a DBCC CHECKDB to make sure none of your databases are corrupted.Kristen |
 |
|
viatorg
Starting Member
3 Posts |
Posted - 2007-10-09 : 10:02:36
|
Thanks for your help..Found the problem. Was the Stored Procedure debug wizardthat disconnected the SQL Service.Another Developer decided to use this to help him debug a Stored Procedure. Has anyone heard of this one?thanksgv |
 |
|
|
|
|