Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 
        
Home       Members    Calendar    Who's On


Add to briefcase 12»»

Exception happened when running extended stored procedure 'xp_enumerrorlogs' in the library 'xpstar90.dll'. SQL Server is terminating process 77. Exception... Expand / Collapse
Author
Message
Posted Wednesday, December 9, 2009 7:14 AM
SSC Journeyman

SSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC Journeyman

Group: General Forum Members
Last Login: Wednesday, October 3, 2012 6:35 AM
Points: 97, Visits: 501
..at 11 am today all maintenance plans started failing on one node. SQL 2005 SP3 CU2 64 Bit.

The error message stated:

Description: Executing the query "EXECUTE master.dbo.xp_delete_file 0,N'F:\SQLBackups\EDUC_CAPITAL_LIVE',N'trn',N'2009-11-25T13:00:33' " failed with the following error: "A sever... The package execution fa... The step failed.

The event log had many entries like..

Description:
Exception happened when running extended stored procedure 'xp_enumerrorlogs' in the library 'xpstar90.dll'. SQL Server is terminating process 77. Exception type: Win32 exception; Exception code: 0xc0000005.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
Data:
0000: 52 46 00 00 14 00 00 00 RF......
0008: 0c 00 00 00 44 00 2d 00 ....D.-.
0010: 44 00 42 00 39 00 37 00 D.B.9.7.
0018: 5c 00 43 00 4f 00 52 00 \.C.O.R.
0020: 50 00 00 00 07 00 00 00 P.......
0028: 6d 00 61 00 73 00 74 00 m.a.s.t.
0030: 65 00 72 00 00 00 e.r...

The sql exception log contains:

12/09/09 11:00:38 spid 565 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF63F4C2DA
12/09/09 11:00:38 spid 564 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:30:32 spid 553 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:30:32 spid 556 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:30:32 spid 561 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:30:32 spid 565 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:30:34 spid 530 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:33:31 spid 211 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:34:28 spid 510 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71
12/09/09 11:35:53 spid 542 Exception 0xc0000005 EXCEPTION_ACCESS_VIOLATION reading address FFFFFFFFFFFFFFFF at 0x000007FF7FC51D71

SQL Error and Dump Files are being generated containing:
=====================================================================
BugCheck Dump
=====================================================================

This file is generated by Microsoft SQL Server
version 9.00.4211.00
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.


Computer type is AT/AT COMPATIBLE.
Current time is 11:00:38 12/09/09.
8 Unknown CPU 9., 2133 Mhz processor (s).
Windows NT 5.2 Build 3790 CSD Service Pack 2.

Memory
MemoryLoad = 83%
Total Physical = 32764 MB
Available Physical = 5392 MB
Total Page File = 33871 MB
Available Page File = 6991 MB
Total Virtual = 8388607 MB
Available Virtual = 8348705 MB
***Stack Dump being sent to G:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\SQLDump0003.txt
SqlDumpExceptionHandler: Process 567 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is
terminating this process.
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 12/09/09 11:00:38 spid 567
*
*
* Exception Address = 000007FF7FC51D71 Module(msvcrt+0000000000051D71)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address FFFFFFFFFFFFFFFF
* Input Buffer 230 bytes -
* EXECUTE master.dbo.xp_delete_file 0,N'F:\SQLBackups\CAYA_DNfL
* _Core_Live',N'trn',N'2009-12-02T11:00:37'
*
*
* MODULE BASE END SIZE
* sqlservr 0000000001000000 0000000003659FFF 0265a000
* ntdll 0000000077EC0000 0000000077FFAFFF 0013b000
* kernel32 0000000077D40000 0000000077EB2FFF 00173000
* MSVCR80 0000000078130000 00000000781F8FFF 000c9000
* msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000
* MSVCP80 000000007C420000 000000007C528FFF 00109000
* ADVAPI32 000007FF7FEE0000 000007FF7FFE5FFF 00106000
* RPCRT4 000007FF7FD30000 000007FF7FEC8FFF 00199000
* Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000
* sqlos 00000000344D0000 00000000344D6FFF 00007000
* USERENV 000007FF7C680000 000007FF7C789FFF 0010a000
* USER32 0000000077C20000 0000000077D2BFFF 0010c000
* GDI32 000007FF7FC90000 000007FF7FD2BFFF 0009c000
* WINMM 000007FF7E240000 000007FF7E28FFFF 00050000
* opends60 00000000333E0000 00000000333E7FFF 00008000
* NETAPI32 000007FF77370000 000007FF77408FFF 00099000
* IMM32 000007FF7D500000 000007FF7D538FFF 00039000
* psapi 000007FF7E380000 000007FF7E38FFFF 00010000
* instapi 0000000048060000 000000004806CFFF 0000d000
* CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000
* ole32 000007FF57140000 000007FF573C4FFF 00285000
* OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000
* RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000
* sqlevn70 000000004F610000 000000004F7B8FFF 001a9000
* rsaenh 0000000068000000 000000006804BFFF 0004c000
* AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000
* MSCOREE 000006427EE50000 000006427EEB5FFF 00066000
* msv1_0 000007FF7E500000 000007FF7E544FFF 00045000
* cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000
* WS2_32 000007FF77310000 000007FF7733FFFF 00030000
* WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000
* iphlpapi 000007FF57040000 000007FF57070FFF 00031000
* kerberos 000007FF77410000 000007FF774C4FFF 000b5000
* MSASN1 000007FF7D340000 000007FF7D36BFFF 0002c000
* schannel 000007FF7DD50000 000007FF7DD91FFF 00042000
* CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000
* COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000
* XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000
* MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000
* msvcp60 0000000011260000 0000000011349FFF 000ea000
* MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000
* VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000
* WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000
* mswsock 000007FF771B0000 000007FF7722CFFF 0007d000
* DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000
* winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000
* WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000
* rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000
* hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000
* wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000
* security 000007FF77530000 000007FF77534FFF 00005000
* msfte 0000000049980000 0000000049D2DFFF 003ae000
* dbghelp 0000000013AF0000 0000000013C4CFFF 0015d000
* WINTRUST 000007FF7E3E0000 000007FF7E42DFFF 0004e000
* imagehlp 000007FF7E470000 000007FF7E482FFF 00013000
* dssenh 0000000068100000 000000006813EFFF 0003f000
* NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000
* SAMLIB 000007FF77150000 000007FF77165FFF 00016000
* ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000
* xpsp2res 00000000142D0000 0000000014596FFF 002c7000
* CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000
* sqlncli 00000000337A0000 0000000033A63FFF 002c4000
* COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000
* comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000
* SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000
* SHELL32 000007FF7F190000 000007FF7FB9AFFF 00a0b000
* comctl32 000007FF7F000000 000007FF7F186FFF 00187000
* SQLNCLIR 0000000035000000 0000000035032FFF 00033000
* msftepxy 00000000039A0000 00000000039C0FFF 00021000
* xplog70 0000000034730000 000000003473FFFF 00010000
* xplog70 0000000019D60000 0000000019D62FFF 00003000
* xpstar90 0000000053C30000 0000000053CB7FFF 00088000
* SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000
* ODBC32 000007FF63F00000 000007FF63F66FFF 00067000
* BatchParser90 00000000520C0000 00000000520ECFFF 0002d000
* ATL80 000000007C630000 000000007C64FFFF 00020000
* odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000
* xpstar90 000000001A360000 000000001A385FFF 00026000
* odsole70 0000000033380000 0000000033397FFF 00018000
* wbemprox 000007FF7B070000 000007FF7B07CFFF 0000d000
* wbemcomn 000007FF7B7E0000 000007FF7B864FFF 00085000
* SXS 000007FF7CC60000 000007FF7CE46FFF 001e7000
* wmiutils 000007FF7B400000 000007FF7B42EFFF 0002f000
* wbemsvc 000007FF7B050000 000007FF7B061FFF 00012000
* fastprox 000007FF7C030000 000007FF7C10CFFF 000dd000
* scrrun 000007FF79170000 000007FF791B4FFF 00045000
* MFC42 000007FF796F0000 000007FF79859FFF 0016a000
* xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000
* msxmlsql 0000000078800000 0000000078967FFF 00168000
* msxml3 000007FF56D40000 000007FF56F53FFF 00214000
* mscorwks 000006427F330000 000006427FCE0FFF 009b1000
* mscorlib.ni 0000064278000000 0000064278ED8FFF 00ed9000
* mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000
* cryptnet 000007FF79690000 000007FF796AEFFF 0001f000
* SensApi 000007FF77C90000 000007FF77C96FFF 00007000
* WINHTTP 000007FF763B0000 000007FF76433FFF 00084000
* RASAPI32 000007FF7E880000 000007FF7E8EAFFF 0006b000
* rasman 000007FF7E800000 000007FF7E81BFFF 0001c000
* TAPI32 000007FF7E820000 000007FF7E876FFF 00057000
* rtutils 000007FF7E610000 000007FF7E624FFF 00015000
* SqlAccess 0000000017300000 0000000017357FFF 00058000
* mscorjit 000006427EED0000 000006427F053FFF 00184000
* System.Data 0000000017760000 0000000017A49FFF 002ea000
* System.ni 0000064274880000 0000064275283FFF 00a04000
* System.Transactions 0000000017A60000 0000000017AA8FFF 00049000
* System.Security.ni 000006424F240000 000006424F324FFF 000e5000
* System 000000007A440000 000000007A743FFF 00304000
* System.Security 0000000067920000 0000000067961FFF 00042000
* System.Xml 00000000637A0000 0000000063997FFF 001f8000
*
* P1Home: 0000000000000000:
* P2Home: 000000002E7B7AC0: 0000000000000000 000000002E7B7AC0 0000000019DE8860 000007FF7FC78990 00000000
00000000 FFFFFADCBF028395
* P3Home: 0000000019DE8860: 0056004900520044 007B003D00520045 0020004C00510053 006900740061004E 00430020
00650076 006E00650069006C
* P4Home: 000007FF7FC78990: 0000000000000091 0000000000000000 0000000000000000 0000000000000000 00000001
00000000 0000000000000001
* P5Home: 0000000000000000:
* P6Home: FFFFFADCBF028395:
* ContextFlags: 000000000010001F:
* MxCsr: 0000000000001FA0:
* SegCs: 0000000000000033:
* SegDs: 000000000000002B:
* SegEs: 000000000000002B:
* SegFs: 0000000000000053:
* SegGs: 000000000000002B:
* SegSs: 000000000000002B:
* EFlags: 0000000000010246: 0065004400720065 00720061006C0063 006F006900740061 00650052003B006E 00730061
0065006C 006E006100480065
* Rax: 0000000000528420: 0000000000001A2C FFFFFFFFFFFFFFFF 0000000000000000 0000000100000000 00000000
00000000 0000000000000000
* Rcx: 0000000000000000:
* Rdx: 00000000334A89E0: 00000000185C8540 000000002FED4010 0000000000000000 0000000000528420 00000000
0061E310 0000000010E84640
* Rbx: 0000000019DE8860: 0056004900520044 007B003D00520045 0020004C00510053 006900740061004E 00430020
00650076 006E00650069006C
* Rsp: 000000002E7B8060: 0000000001000000 0000000000000002 0000000019DE8860 0020004C00510053 00000010
0000000A 000007FF63F266BE
* Rbp: 000007FF7FC78990: 0000000000000091 0000000000000000 0000000000000000 0000000000000000 00000001
00000000 0000000000000001
* Rsi: 000000002E7B9630: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 00000000
00000074 0000000100002F3D
* Rdi: 0020004C00510053:
* R8: 000007FFFFE68000: 0000000000000000 000000002E7C0000 000000002E7A2000 0000000000000000 00000000
00001E00 0000000000000000
* R9: 000000002E7B8C10: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000000
00000000 0000000000000000
* R10: 0000000000000000:
* R11: 000000002E7B8BB8: 000007FF63F27335 0000000000000005 00000000016256F2 0000000000000012 00000000
00000001 0000000000000105
* R12: 0000000000000001:
* R13: 0000000000000001:
* R14: 0000000000000000:
* R15: 000000002E7B9630: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 00000000
00000074 0000000100002F3D
* Rip: 000007FF7FC51D71: 7241FB83661FB70F 6604775AFB83660A 3D6606B70F20C383 005A3D660A720041 83480020
05660477 856602C6834802C7
* *******************************************************************************
* -------------------------------------------------------------------------------
* Short Stack Dump
000007FF7FC51D71 Module(msvcrt+0000000000051D71)
000007FF63F266BE Module(ODBC32+00000000000266BE)
000007FF63F27335 Module(ODBC32+0000000000027335)
000007FF63F1A451 Module(ODBC32+000000000001A451)
0000000053C50494 Module(xpstar90+0000000000020494)
0000000053C62B72 Module(xpstar90+0000000000032B72)
0000000053C63668 Module(xpstar90+0000000000033668)
0000000053C64271 Module(xpstar90+0000000000034271)
0000000001CCED61 Module(sqlservr+0000000000CCED61)
0000000001E622DC Module(sqlservr+0000000000E622DC)
000000000244440A Module(sqlservr+000000000144440A)
0000000002445A35 Module(sqlservr+0000000001445A35)
000000000264FE4B Module(sqlservr+000000000164FE4B)
0000000001AE5E1F Module(sqlservr+0000000000AE5E1F)
0000000001842405 Module(sqlservr+0000000000842405)
00000000018425F2 Module(sqlservr+00000000008425F2)
000000000185B8A0 Module(sqlservr+000000000085B8A0)
000000000161A508 Module(sqlservr+000000000061A508)
0000000001616639 Module(sqlservr+0000000000616639)
000000000161457D Module(sqlservr+000000000061457D)
000000000165FCE2 Module(sqlservr+000000000065FCE2)
000000000165F7FD Module(sqlservr+000000000065F7FD)
0000000001665E9E Module(sqlservr+0000000000665E9E)
0000000001665BE9 Module(sqlservr+0000000000665BE9)
000000000166EFA4 Module(sqlservr+000000000066EFA4)
0000000001557097 Module(sqlservr+0000000000557097)
00000000018290A9 Module(sqlservr+00000000008290A9)
0000000001550B80 Module(sqlservr+0000000000550B80)
0000000001503748 Module(sqlservr+0000000000503748)
00000000781337D7 Module(MSVCR80+00000000000037D7)
0000000078133894 Module(MSVCR80+0000000000003894)
0000000077D6B71A Module(kernel32+000000000002B71A)
PSS @0x000000009F755A80
-----------------------
CSession @0x000000009F754410
----------------------------
m_spid = 567 m_cRef = 11 m_rgcRefType[0] = 1
m_rgcRefType[1] = 1 m_rgcRefType[2] = 8 m_rgcRefType[3] = 1
m_rgcRefType[4] = 0 m_rgcRefType[5] = 0 m_pmo = 0x000000009F754080
m_pstackBhfPool = 0x00000006750A7480 m_dwLoginFlags = 0x83e0 m_fBackground = 0
m_fClientRequestConnReset = 0 m_fUserProc = -1 m_fConnReset = 0
m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 1
m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0
m_ulLoginStamp = 2215643 m_eclClient = 5 m_protType = 5
m_hHttpToken = FFFFFFFFFFFFFFFF
m_pV7LoginRec
---------------------
0000000000000000: 1d070000 03000a73 00100000 00000006 f8020000 †.......s............
0000000000000014: 00000000 e0830000 00000000 00000000 5e000600 †................^...
0000000000000028: 00000000 00000000 6a002600 b6000b00 cc000000 †........j.&.........
000000000000003C: cc001c00 04010000 04010000 592c303e 4a9d0401 †............Y,0>J...
0000000000000050: 19061d07 00001d07 00000000 0000†††††††††††††††..............

CPhysicalConnection @0x000000009F7542E0
---------------------------------------
m_pPhyConn->m_pmo = 0x000000009F754080
m_pPhyConn->m_pNetConn = 0x000000009F754B00
m_pPhyConn->m_pConnList = 0x000000009F7543E0
m_pPhyConn->m_pSess = 0x000000009F754410 m_pPhyConn->m_fTracked = -1
m_pPhyConn->m_cbPacketsize = 4096 m_pPhyConn->m_fMars = 0 m_pPhyConn->m_fKill = 0

CBatch @0x000000009F754FD0
--------------------------
m_pSess = 0x000000009F754410 m_pConn = 0x000000009F754EC0 m_cRef = 3
m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 1
m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x0000000003C096D8

EXCEPT (null) @0x000000002E7B5708
---------------------------------
exc_number = 0 exc_severity = 0 exc_func = 0x0000000001B0DD90
Task @0x0000000003C096D8
------------------------
CPU Ticks used (ms) = 0 Task State = 2
WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0
WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000
WAITINFO_EXTERNAL: WaitResource = 0x0000000000000000 WAITINFO_EXTERNAL: WaitType = 0x4000C7
WAITINFO_EXTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0x0
ThreadId = 0x1a2c m_state = 0 m_eAbortSev = 0
EC @0x000000009F755A90
----------------------
spid = 567 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x0 ec_atomic = 0x0 __fSubProc = 1
ec_dbccContext = 0x0000000000000000 __pSETLS = 0x000000009F754F30 __pSEParams = 0x000000009F755350
__pDbLocks = 0x000000009F755B50
SEInternalTLS @0x000000009F754F30
---------------------------------
m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x0000000003C096D8
m_activeHeapDatasetList = 0x000000009F754F30
m_activeIndexDatasetList = 0x000000009F754F40
SEParams @0x000000009F755350
----------------------------
m_lockTimeout = -1 m_isoLevel = 4096 m_logDontReplicate = 0
m_neverReplicate = 0 m_XactWorkspace = 0x0000000590098080
m_pSessionLocks = 0x000000009F755EA0 m_pDbLocks = 0x000000009F755B50
m_execStats = 0x00000000C9BECE40 m_pAllocFileLimit = 0x0000000000000000

and

2009-12-09 13:29:23.01 spid60 Error: 18002, Severity: 20, State: 1.
2009-12-09 13:29:23.01 spid60 Exception happened when running extended stored procedure 'xp_enumerrorlogs' in the library 'xpstar90.dll'. SQL Server is terminating process 60. Exception type: Win32 exception; Exception code: 0xc0000005.
2009-12-09 13:30:42.02 Backup Log was backed up. Database: AC_StaffPlan_Live, creation date(time): 2009/11/18(17:57:36), first LSN: 55980:58420:1, last LSN: 55992:8063:1, number of dump devices: 1, device information: (FILE=1, TYPE=DISK: {'F:\SQLBackups\AC_StaffPlan_Live\AC_StaffPlan_Live_backup_200912091330.trn'}). This is an informational message only. No user action is required.
2009-12-09 13:30:42.19 spid392 Using 'dbghelp.dll' version '4.0.5'
2009-12-09 13:30:42.19 spid392 ***Stack Dump being sent to G:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\SQLDump0098.txt
2009-12-09 13:30:42.19 spid392 SqlDumpExceptionHandler: Process 392 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
2009-12-09 13:30:42.19 spid392 * *******************************************************************************
2009-12-09 13:30:42.19 spid392 *
2009-12-09 13:30:42.19 spid392 * BEGIN STACK DUMP:
2009-12-09 13:30:42.19 spid392 * 12/09/09 13:30:42 spid 392
2009-12-09 13:30:42.19 spid392 *
2009-12-09 13:30:42.19 spid392 *
2009-12-09 13:30:42.19 spid392 * Exception Address = 000007FF7FC51D71 Module(msvcrt+0000000000051D71)
2009-12-09 13:30:42.19 spid392 * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
2009-12-09 13:30:42.19 spid392 * Access Violation occurred reading address FFFFFFFFFFFFFFFF
2009-12-09 13:30:42.19 spid392 * Input Buffer 226 bytes -
2009-12-09 13:30:42.19 spid392 * EXECUTE master.dbo.xp_delete_file 0,N'F:\SQLBackups\AC_StaffP
2009-12-09 13:30:42.19 spid392 * lan_Live',N'trn',N'2009-12-02T13:30:42'
2009-12-09 13:30:42.19 spid392 *

When you try to open the SQL Server Logs via SSMO you get an error saying " A severe error occurred on the current command. The results, if any, should be discarded..." At this point the below entry is added to the system event log.

Event Type: Error
Event Source: MSSQL$CORP
Event Category: (2)
Event ID: 18002
Date: 09/12/2009
Time: 13:49:40
Description:
Exception happened when running extended stored procedure 'xp_enumerrorlogs' in the library 'xpstar90.dll'. SQL Server is terminating process 59. Exception type: Win32 exception; Exception code: 0xc0000005.
For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
Data:
0000: 52 46 00 00 14 00 00 00 RF......
0008: 0c 00 00 00 44 00 2d 00 ....D.-.
0010: 44 00 42 00 39 00 37 00 D.B.9.7.
0018: 5c 00 43 00 4f 00 52 00 \.C.O.R.
0020: 50 00 00 00 07 00 00 00 P.......
0028: 6d 00 61 00 73 00 74 00 m.a.s.t.
0030: 65 00 72 00 00 00 e.r...

any ideas?


Oraculum
Post #831385
Posted Wednesday, December 9, 2009 2:41 PM
SSC-Addicted

SSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-Addicted

Group: General Forum Members
Last Login: Today @ 12:01 AM
Points: 414, Visits: 2,894
Did you have a failover, are the SQL error logs still available?

Andrew



Post #831861
Posted Wednesday, December 9, 2009 2:59 PM
SSC Journeyman

SSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC Journeyman

Group: General Forum Members
Last Login: Wednesday, October 3, 2012 6:35 AM
Points: 97, Visits: 501
no it has not failed over (well its running on B the failover node anyway not A) ..

cannot access any sql error logs via SSMS get the error I mentioned before, and the entries from accessing error log, exception log etc via the OS files direct are shown above...


Oraculum
Post #831873
Posted Thursday, December 10, 2009 7:54 AM
SSC-Addicted

SSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-Addicted

Group: General Forum Members
Last Login: Today @ 12:01 AM
Points: 414, Visits: 2,894
Can you confirm the error logs are on a drive that is accessible by the cluster?

Andrew



Post #832242
Posted Monday, December 14, 2009 8:01 AM
Valued Member

Valued MemberValued MemberValued MemberValued MemberValued MemberValued MemberValued MemberValued Member

Group: General Forum Members
Last Login: Wednesday, September 10, 2014 10:40 AM
Points: 63, Visits: 152
Hi there,

We are getting a similar problem. Were you able to resolve this?
Post #833842
Posted Tuesday, December 15, 2009 9:48 AM
Valued Member

Valued MemberValued MemberValued MemberValued MemberValued MemberValued MemberValued MemberValued Member

Group: General Forum Members
Last Login: Wednesday, September 10, 2014 10:40 AM
Points: 63, Visits: 152
FYI - Never figured out what the problem was but a reboot fixed it.
Post #834606
Posted Tuesday, December 22, 2009 4:07 AM
SSC Journeyman

SSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC JourneymanSSC Journeyman

Group: General Forum Members
Last Login: Wednesday, October 3, 2012 6:35 AM
Points: 97, Visits: 501
we failed back over to node a and the problem has gone... I guess it could be an issue with Node B and we wont find out till we failover to it again!

Oraculum
Post #837827
Posted Saturday, June 19, 2010 5:59 PM
Forum Newbie

Forum NewbieForum NewbieForum NewbieForum NewbieForum NewbieForum NewbieForum NewbieForum Newbie

Group: General Forum Members
Last Login: Friday, November 11, 2011 4:45 AM
Points: 1, Visits: 4
I has discober somthing that´s may be help you like me (I home many people)... ... in internet I has read that´s if I install sql native client 2008 I work the same for SQL 2000, SQL 2005 and SQL 2008 and I can connect php easy whit the mssql_conect() function and yes it works fine with it but sorprice works my conection but stop to work my mantenence plans and Management studio (my god) what happen oviusly I don´t take care till 2 days after what I see the backups didn´t happen then I has seen when I try to use Managemen studio:


An exception ocurred......

additional info...

Could not load DLL xpstar90.dll or one of the DLLs reference....

then I try updating MSSQL SP2 this give me the tip because this can not connect at the server and the reason say some think about nativeclient then I remember the last backup was the same day I change the native client I uninstall the 2008 native client and reinstall the 2005 and voala it works again may you do not do some thing like me but may be is you reinstall the native client 2005 it fix the problem like me
Post #940005
Posted Wednesday, May 25, 2011 9:28 AM
Forum Newbie

Forum NewbieForum NewbieForum NewbieForum NewbieForum NewbieForum NewbieForum NewbieForum Newbie

Group: General Forum Members
Last Login: Friday, August 15, 2014 11:37 AM
Points: 1, Visits: 15
I am basically getting same issue on two SQL boxes running SQL 2005 Standard edition SP3 64-bit (9.0.4035). This exception seems random and I was not able to repro it. SQL Instance restart fixes this problem, but now it occured at least two time withing 5 month.

I found only one MS article KB2463332 where MS claims that SQL 2005 Issue ID: 555409: An access violation error may occur during the execution of Extended Stored Procedures under high stress conditions was fixed. Unfortunately, I could not find more distinct definition of this issue neither repro it.

Has anyone has applied SQL 2005 SP4 and confirmed that it resolves this problem? Or anyone has a way to reproduce it?

Thanks

Alex

2011-05-13 03:50:07.75 spid88 Exception happened when running extended stored procedure 'xp_delete_file' in the library 'xpstar90.dll'. SQL Server is terminating process 88. Exception type: Win32 exception; Exception code: 0xc0000005.
2011-05-13 03:50:07.75 spid79 Using 'dbghelp.dll' version '4.0.5'
2011-05-13 03:50:07.75 spid79 ***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL.2\MSSQL\LOG\SQLDump0004.txt
2011-05-13 03:50:07.75 spid79 SqlDumpExceptionHandler: Process 79 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
2011-05-13 03:50:07.75 spid79 * *******************************************************************************
2011-05-13 03:50:07.75 spid79 *
2011-05-13 03:50:07.75 spid79 * BEGIN STACK DUMP:
2011-05-13 03:50:07.75 spid79 * 05/13/11 03:50:07 spid 79
2011-05-13 03:50:07.75 spid79 *
2011-05-13 03:50:07.75 spid79 *
2011-05-13 03:50:07.75 spid79 * Exception Address = 000007FF7FC51D71 Module(msvcrt+0000000000051D71)
2011-05-13 03:50:07.75 spid79 * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
2011-05-13 03:50:07.75 spid79 * Access Violation occurred reading address 0000000000000000
2011-05-13 03:50:07.75 spid79 * Input Buffer 510 bytes -
2011-05-13 03:50:07.75 spid79 BEGIN TRY EXECUTE master.dbo.xp_delete_fil
2011-05-13 03:50:07.75 spid79 * e 0, @backupFolder, N'TRN',@deleteFromDate,0 END TRY 2011-05-13 03:50:07.75 spid79 *
2011-05-13 03:50:07.75 spid79 *
2011-05-13 03:50:07.75 spid79 * MODULE BASE END SIZE
2011-05-13 03:50:07.75 spid79 * sqlservr 0000000001000000 0000000003651FFF 02652000
2011-05-13 03:50:07.76 spid79 * ntdll 0000000077EC0000 0000000077FFAFFF 0013b000
2011-05-13 03:50:07.76 spid79 * kernel32 0000000077D40000 0000000077EB2FFF 00173000
2011-05-13 03:50:07.76 spid79 * MSVCR80 0000000078130000 00000000781F8FFF 000c9000
2011-05-13 03:50:07.76 spid79 * msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000
2011-05-13 03:50:07.76 spid79 * MSVCP80 000000007C420000 000000007C528FFF 00109000
2011-05-13 03:50:07.76 spid79 * ADVAPI32 000007FF7FEE0000 000007FF7FFE5FFF 00106000
2011-05-13 03:50:07.76 spid79 * RPCRT4 000007FF7FD30000 000007FF7FEC8FFF 00199000
2011-05-13 03:50:07.76 spid79 * Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000
2011-05-13 03:50:07.76 spid79 * sqlos 00000000344D0000 00000000344D6FFF 00007000
2011-05-13 03:50:07.76 spid79 * USERENV 000007FF7C680000 000007FF7C789FFF 0010a000
2011-05-13 03:50:07.76 spid79 * USER32 0000000077C20000 0000000077D2BFFF 0010c000
2011-05-13 03:50:07.76 spid79 * GDI32 000007FF7FC90000 000007FF7FD2BFFF 0009c000
2011-05-13 03:50:07.76 spid79 * WINMM 000007FF7E240000 000007FF7E28FFFF 00050000
2011-05-13 03:50:07.76 spid79 * opends60 00000000333E0000 00000000333E7FFF 00008000
2011-05-13 03:50:07.76 spid79 * NETAPI32 000007FF77370000 000007FF77408FFF 00099000
2011-05-13 03:50:07.76 spid79 * psapi 000007FF7E380000 000007FF7E38FFFF 00010000
2011-05-13 03:50:07.76 spid79 * instapi 0000000048060000 000000004806CFFF 0000d000
2011-05-13 03:50:07.76 spid79 * sqlevn70 000000004F610000 000000004F7B8FFF 001a9000
2011-05-13 03:50:07.76 spid79 * rsaenh 0000000068000000 000000006804BFFF 0004c000
2011-05-13 03:50:07.76 spid79 * AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000
2011-05-13 03:50:07.76 spid79 * MSCOREE 000006427EE50000 000006427EEB5FFF 00066000
2011-05-13 03:50:07.76 spid79 * ole32 000007FF57140000 000007FF573C4FFF 00285000
2011-05-13 03:50:07.76 spid79 * msv1_0 000007FF7E500000 000007FF7E544FFF 00045000
2011-05-13 03:50:07.76 spid79 * cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000
2011-05-13 03:50:07.76 spid79 * WS2_32 000007FF77310000 000007FF7733FFFF 00030000
2011-05-13 03:50:07.76 spid79 * WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000
2011-05-13 03:50:07.76 spid79 * iphlpapi 000007FF57040000 000007FF57070FFF 00031000
2011-05-13 03:50:07.76 spid79 * kerberos 000007FF77410000 000007FF774C4FFF 000b5000
2011-05-13 03:50:07.76 spid79 * MSASN1 000007FF7D340000 000007FF7D36BFFF 0002c000
2011-05-13 03:50:07.76 spid79 * schannel 000007FF7DD50000 000007FF7DD91FFF 00042000
2011-05-13 03:50:07.76 spid79 * CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000
2011-05-13 03:50:07.76 spid79 * COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000
2011-05-13 03:50:07.76 spid79 * XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000
2011-05-13 03:50:07.76 spid79 * MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000
2011-05-13 03:50:07.76 spid79 * OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000
2011-05-13 03:50:07.76 spid79 * msvcp60 0000000016860000 0000000016949FFF 000ea000
2011-05-13 03:50:07.76 spid79 * MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000
2011-05-13 03:50:07.76 spid79 * VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000
2011-05-13 03:50:07.76 spid79 * WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000
2011-05-13 03:50:07.76 spid79 * CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000
2011-05-13 03:50:07.76 spid79 * RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000
2011-05-13 03:50:07.76 spid79 * mswsock 000007FF771B0000 000007FF7722CFFF 0007d000
2011-05-13 03:50:07.76 spid79 * DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000
2011-05-13 03:50:07.76 spid79 * winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000
2011-05-13 03:50:07.76 spid79 * WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000
2011-05-13 03:50:07.76 spid79 * rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000
2011-05-13 03:50:07.76 spid79 * security 000007FF77530000 000007FF77534FFF 00005000
2011-05-13 03:50:07.76 spid79 * dssenh 0000000068100000 000000006813EFFF 0003f000
2011-05-13 03:50:07.76 spid79 * hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000
2011-05-13 03:50:07.76 spid79 * wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000
2011-05-13 03:50:07.76 spid79 * NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000
2011-05-13 03:50:07.76 spid79 * SAMLIB 000007FF77150000 000007FF77165FFF 00016000
2011-05-13 03:50:07.76 spid79 * ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000
2011-05-13 03:50:07.76 spid79 * xpsp2res 000000001CEE0000 000000001D1A6FFF 002c7000
2011-05-13 03:50:07.76 spid79 * CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000
2011-05-13 03:50:07.76 spid79 * sqlncli 00000000337A0000 0000000033A63FFF 002c4000
2011-05-13 03:50:07.76 spid79 * COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000
2011-05-13 03:50:07.76 spid79 * comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000
2011-05-13 03:50:07.76 spid79 * SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000
2011-05-13 03:50:07.76 spid79 * SHELL32 000007FF7F190000 000007FF7FB9AFFF 00a0b000
2011-05-13 03:50:07.76 spid79 * comctl32 000007FF7F000000 000007FF7F186FFF 00187000
2011-05-13 03:50:07.76 spid79 * SQLNCLIR 0000000035000000 0000000035032FFF 00033000
2011-05-13 03:50:07.76 spid79 * xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000
2011-05-13 03:50:07.76 spid79 * xpstar90 0000000053C30000 0000000053CB7FFF 00088000
2011-05-13 03:50:07.76 spid79 * SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000
2011-05-13 03:50:07.76 spid79 * ODBC32 000007FF63F00000 000007FF63F66FFF 00067000
2011-05-13 03:50:07.76 spid79 * BatchParser90 00000000520C0000 00000000520ECFFF 0002d000
2011-05-13 03:50:07.76 spid79 * ATL80 000000007C630000 000000007C64EFFF 0001f000
2011-05-13 03:50:07.76 spid79 * odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000
2011-05-13 03:50:07.76 spid79 * xpstar90 000000001E160000 000000001E185FFF 00026000
2011-05-13 03:50:07.76 spid79 * xplog70 0000000034730000 000000003473FFFF 00010000
2011-05-13 03:50:07.76 spid79 * xplog70 000000001E1A0000 000000001E1A2FFF 00003000
2011-05-13 03:50:07.76 spid79 * msxmlsql 0000000078800000 0000000078967FFF 00168000
2011-05-13 03:50:07.76 spid79 * msxml3 000007FF4A9A0000 000007FF4ABC4FFF 00225000
2011-05-13 03:50:07.76 spid79 * mscorwks 000006427F330000 000006427FCE0FFF 009b1000
2011-05-13 03:50:07.76 spid79 * mscorlib.ni 0000064278000000 0000064278ED8FFF 00ed9000
2011-05-13 03:50:07.76 spid79 * mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000
2011-05-13 03:50:07.76 spid79 * WINTRUST 000007FF7E3E0000 000007FF7E42FFFF 00050000
2011-05-13 03:50:07.76 spid79 * imagehlp 000007FF7E470000 000007FF7E482FFF 00013000
2011-05-13 03:50:07.76 spid79 * cryptnet 000007FF79690000 000007FF796AEFFF 0001f000
2011-05-13 03:50:07.76 spid79 * SensApi 000007FF77C90000 000007FF77C96FFF 00007000
2011-05-13 03:50:07.76 spid79 * WINHTTP 000007FF763B0000 000007FF76434FFF 00085000
2011-05-13 03:50:07.76 spid79 * RASAPI32 000007FF7E880000 000007FF7E8EAFFF 0006b000
2011-05-13 03:50:07.76 spid79 * rasman 000007FF7E800000 000007FF7E81BFFF 0001c000
2011-05-13 03:50:07.76 spid79 * TAPI32 000007FF7E820000 000007FF7E876FFF 00057000
2011-05-13 03:50:07.76 spid79 * rtutils 000007FF7E610000 000007FF7E624FFF 00015000
2011-05-13 03:50:07.76 spid79 * DHCPCSVC 000007FF7E5D0000 000007FF7E60AFFF 0003b000
2011-05-13 03:50:07.76 spid79 * SqlAccess 0000000028510000 0000000028567FFF 00058000
2011-05-13 03:50:07.76 spid79 * mscorjit 000006427EED0000 000006427F053FFF 00184000
2011-05-13 03:50:07.76 spid79 * System.Data 0000000031140000 0000000031429FFF 002ea000
2011-05-13 03:50:07.76 spid79 * System.ni 0000064274880000 0000064275283FFF 00a04000
2011-05-13 03:50:07.76 spid79 * System.Transactions 000000002A2D0000 000000002A318FFF 00049000
2011-05-13 03:50:07.76 spid79 * System.Security.ni 000006424F240000 000006424F324FFF 000e5000
2011-05-13 03:50:07.76 spid79 * System 000000007A440000 000000007A743FFF 00304000
2011-05-13 03:50:07.76 spid79 * System.Security 0000000067920000 0000000067961FFF 00042000
2011-05-13 03:50:07.76 spid79 * System.Xml 00000000637A0000 0000000063997FFF 001f8000
2011-05-13 03:50:07.76 spid79 * peverify 00000642FFC10000 00000642FFC44FFF 00035000
2011-05-13 03:50:07.76 spid79 * xprepl 000000004D5A0000 000000004D5B6FFF 00017000
2011-05-13 03:50:07.76 spid79 * dbghelp 0000000031B40000 0000000031C9CFFF 0015d000
2011-05-13 03:50:07.76 spid79 *
2011-05-13 03:50:07.76 spid79 * P1Home: FFFFFA8001B66530:
2011-05-13 03:50:07.76 spid79 * P2Home: 0000000025CE7AD0: FFFFFA8001B66530 0000000025CE7AD0 000000001D7EEFE0 000007FF7FC78990 FFFFFA8000000000 FFFFFA8000000000
2011-05-13 03:50:07.76 spid79 * P3Home: 000000001D7EEFE0: 0000000000000003 000000001D7E8B90 0000000000000000 0000000000000000 0000000000000000 0000000000000000
2011-05-13 03:50:07.76 spid79 * P4Home: 000007FF7FC78990: 000000000000005B 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001
2011-05-13 03:50:07.76 spid79 * P5Home: FFFFFA8000000000:
2011-05-13 03:50:07.76 spid79 * P6Home: FFFFFA8000000000:
2011-05-13 03:50:07.76 spid79 * ContextFlags: 000000000010001F:
2011-05-13 03:50:07.76 spid79 * MxCsr: 0000000000001FA0:
2011-05-13 03:50:07.76 spid79 * SegCs: 0000000000000033:
2011-05-13 03:50:07.76 spid79 * SegDs: 000000000000002B:
2011-05-13 03:50:07.76 spid79 * SegEs: 000000000000002B:
2011-05-13 03:50:07.76 spid79 * SegFs: 0000000000000053:
2011-05-13 03:50:07.76 spid79 * SegGs: 000000000000002B:
2011-05-13 03:50:07.76 spid79 * SegSs: 000000000000002B:
2011-05-13 03:50:07.76 spid79 * EFlags: 0000000000010246: 0065004400720065 00720061006C0063 006F006900740061 00650052003B006E 007300610065006C 006E006100480065
2011-05-13 03:50:07.76 spid79 * Rax: 00000000172F9D70: 000000000000106C FFFFFFFFFFFFFFFF 0000000000000000 0000000100000000 0000000000000000 0000000000000000
2011-05-13 03:50:07.76 spid79 * Rcx: 0000000000000000:
2011-05-13 03:50:07.76 spid79 * Rdx: 000000004B06A9D0: 000000004B076870 000000002BCDD2F0 0000000000000000 00000000172F9D70 000000001A26A1A0 00000000160E50F0
2011-05-13 03:50:07.76 spid79 * Rbx: 000000001D7EEFE0: 0000000000000003 000000001D7E8B90 0000000000000000 0000000000000000 0000000000000000 0000000000000000
2011-05-13 03:50:07.76 spid79 * Rsp: 0000000025CE8070: 0000EF5B572157BF 0000000077EF3CC7 000000001D7EEFE0 0000000000000000 0000000000000000 000007FF63F266BE
2011-05-13 03:50:07.76 spid79 * Rbp: 000007FF7FC78990: 000000000000005B 0000000000000000 0000000000000000 0000000000000000 0000000100000000 0000000000000001
2011-05-13 03:50:07.76 spid79 * Rsi: 0000000025CE9640: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000700000074 0000000025CE9740
2011-05-13 03:50:07.76 spid79 * Rdi: 0000000000000000:
2011-05-13 03:50:07.76 spid79 * R8: 000007FFFFF1C000: 0000000000000000 0000000025CF0000 0000000025CD5000 0000000000000000 0000000000001E00 0000000000000000
2011-05-13 03:50:07.76 spid79 * R9: 0000000025CE8C20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000
2011-05-13 03:50:07.76 spid79 * R10: 0000000000000000:
2011-05-13 03:50:07.76 spid79 * R11: 0000000025CE8BC8: 000007FF63F27335 00001FA00010000F 0053002B002B0033 0000000000000012 000000001B5F8080 0000000000000105
2011-05-13 03:50:07.76 spid79 * R12: 0000000000000001:
2011-05-13 03:50:07.76 spid79 * R13: 0000000000000001:
2011-05-13 03:50:07.76 spid79 * R14: 0000000000000000:
2011-05-13 03:50:07.76 spid79 * R15: 0000000025CE9640: 0020004C00510053 006900740061004E 0043002000650076 006E00650069006C 0000000700000074 0000000025CE9740
2011-05-13 03:50:07.76 spid79 * Rip: 000007FF7FC51D71: 7241FB83661FB70F 6604775AFB83660A 3D6606B70F20C383 005A3D660A720041 8348002005660477 856602C6834802C7
2011-05-13 03:50:07.76 spid79 * *******************************************************************************
2011-05-13 03:50:07.76 spid79 * -------------------------------------------------------------------------------
2011-05-13 03:50:07.76 spid79 * Short Stack Dump
2011-05-13 03:50:07.76 spid79 000007FF7FC51D71 Module(msvcrt+0000000000051D71)
2011-05-13 03:50:07.76 spid79 000007FF63F266BE Module(ODBC32+00000000000266BE)
2011-05-13 03:50:07.76 spid79 000007FF63F27335 Module(ODBC32+0000000000027335)
2011-05-13 03:50:07.76 spid79 000007FF63F1A451 Module(ODBC32+000000000001A451)
2011-05-13 03:50:07.76 spid79 0000000053C50494 Module(xpstar90+0000000000020494)
2011-05-13 03:50:07.76 spid79 0000000053C62B72 Module(xpstar90+0000000000032B72)
2011-05-13 03:50:07.76 spid79 0000000053C63668 Module(xpstar90+0000000000033668)
2011-05-13 03:50:07.76 spid79 0000000053C64271 Module(xpstar90+0000000000034271)
2011-05-13 03:50:07.76 spid79 0000000001CC9C41 Module(sqlservr+0000000000CC9C41)
2011-05-13 03:50:07.76 spid79 0000000001E5D45C Module(sqlservr+0000000000E5D45C)
2011-05-13 03:50:07.76 spid79 000000000243BA3A Module(sqlservr+000000000143BA3A)
2011-05-13 03:50:07.76 spid79 000000000243CC95 Module(sqlservr+000000000143CC95)
2011-05-13 03:50:07.76 spid79 00000000026115CB Module(sqlservr+00000000016115CB)
2011-05-13 03:50:07.76 spid79 0000000001AE0D8F Module(sqlservr+0000000000AE0D8F)
2011-05-13 03:50:07.76 spid79 0000000001839DF5 Module(sqlservr+0000000000839DF5)
2011-05-13 03:50:07.76 spid79 0000000001839FE2 Module(sqlservr+0000000000839FE2)
2011-05-13 03:50:07.76 spid79 00000000018583A0 Module(sqlservr+00000000008583A0)
2011-05-13 03:50:07.76 spid79 00000000017073CE Module(sqlservr+00000000007073CE)
2011-05-13 03:50:07.76 spid79 0000000001708F59 Module(sqlservr+0000000000708F59)
2011-05-13 03:50:07.76 spid79 000000000170B9C5 Module(sqlservr+000000000070B9C5)
2011-05-13 03:50:07.76 spid79 00000000017053E2 Module(sqlservr+00000000007053E2)
2011-05-13 03:50:07.76 spid79 000000000170A59D Module(sqlservr+000000000070A59D)
2011-05-13 03:50:07.76 spid79 00000000016BC32E Module(sqlservr+00000000006BC32E)
2011-05-13 03:50:07.76 spid79 00000000016BC5C9 Module(sqlservr+00000000006BC5C9)
2011-05-13 03:50:07.76 spid79 00000000016B5CC4 Module(sqlservr+00000000006B5CC4)
2011-05-13 03:50:07.76 spid79 000000000155E837 Module(sqlservr+000000000055E837)
2011-05-13 03:50:07.76 spid79 0000000001522F59 Module(sqlservr+0000000000522F59)
2011-05-13 03:50:07.76 spid79 00000000015372B0 Module(sqlservr+00000000005372B0)
2011-05-13 03:50:07.77 spid79 00000000014F72F8 Module(sqlservr+00000000004F72F8)
2011-05-13 03:50:07.77 spid79 00000000781337D7 Module(MSVCR80+00000000000037D7)
2011-05-13 03:50:07.77 spid79 0000000078133894 Module(MSVCR80+0000000000003894)
2011-05-13 03:50:07.77 spid79 0000000077D6B71A Module(kernel32+000000000002B71A)
2011-05-13 03:50:07.77 spid79 Stack Signature for the dump is 0x00000001C0C656C9
2011-05-13 03:50:08.55 spid79 External dump process return code 0x20000001.
Post #1114840
Posted Wednesday, June 22, 2011 6:25 AM
SSC Veteran

SSC VeteranSSC VeteranSSC VeteranSSC VeteranSSC VeteranSSC VeteranSSC VeteranSSC Veteran

Group: General Forum Members
Last Login: Thursday, September 18, 2014 7:16 AM
Points: 253, Visits: 440
I know that this is a bit of an old thread, but this is what we uncovered that corrected this issue on a permanent basis on several of our servers...

First off, this is not actually a SQL Server issue, but one for the OS. Install the ODBC fix from KB940046 (http://support.microsoft.com/kb/940046). There is a known issue with ODBC that affects 3 of the extended stored procedures in SQL Server 2005 (xp_delete_file, xp_enumerrorlogs, and xp_readerrorlog). If you apply the fix from this KB on your server(s), the error will no longer present itself.

Note: your ODBC drivers may currently have a higher build number than the fix has, apply it anyway, it is a QFE build and has not been (and will likely never be) folded into a GDR build.


T. Michael Herring
Database Administrator
Wells Fargo
Post #1129589
« Prev Topic | Next Topic »

Add to briefcase 12»»

Permissions Expand / Collapse