SQL SERVER Fatal Error When Job is running stored procedure.

  • =====================================================================

    BugCheck Dump

    =====================================================================

    This file is generated by Microsoft SQL Server

    version 9.00.3077.00

    upon detection of fatal unexpected error. Please return this file,

    the query or program that produced the bugcheck, the database and

    the error log, and any other pertinent information with a Service Request.

    Computer type is AT/AT COMPATIBLE.

    Current time is 23:15:01 11/03/09.

    8 Unknown CPU 9., 1596 Mhz processor (s).

    Windows NT 5.2 Build 3790 CSD Service Pack 2.

    Memory

    MemoryLoad = 89%

    Total Physical = 4094 MB

    Available Physical = 446 MB

    Total Page File = 11834 MB

    Available Page File = 7657 MB

    Total Virtual = 8388607 MB

    Available Virtual = 8377909 MB

    ***Stack Dump being sent to D:\MSSQL\Data\MSSQL.1\MSSQL\LOG\SQLDump0016.txt

    SqlDumpExceptionHandler: Process 52 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is

    terminating this process.

    * *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 11/03/09 23:15:01 spid 52

    *

    *

    * Exception Address = 000000000196D869 Module(sqlservr+000000000096D869)

    * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION

    * Access Violation occurred reading address 00000000AAECB6A0

    * Input Buffer 102 bytes -

    * [highlight=#ffff11]EXEC usp_StoredProcedureTopExTime_Update [/highlight]

    *

    *

    * MODULE BASE END SIZE

    * sqlservr 0000000001000000 000000000365BFFF 0265c000

    * ntdll 0000000077EC0000 0000000077FFAFFF 0013b000

    * kernel32 0000000077D40000 0000000077EB2FFF 00173000

    * MSVCR80 0000000078130000 00000000781F8FFF 000c9000

    * msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000

    * MSVCP80 000000007C420000 000000007C528FFF 00109000

    * ADVAPI32 000007FF7FEE0000 000007FF7FFE5FFF 00106000

    * RPCRT4 000007FF7FD30000 000007FF7FEC8FFF 00199000

    * Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000

    * USER32 0000000077C20000 0000000077D2BFFF 0010c000

    * GDI32 000007FF7FC90000 000007FF7FD2BFFF 0009c000

    * CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000

    * MSASN1 000007FF7D340000 000007FF7D36BFFF 0002c000

    * MSWSOCK 000007FF771B0000 000007FF7722CFFF 0007d000

    * WS2_32 000007FF77310000 000007FF7733FFFF 00030000

    * WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000

    * USERENV 000007FF7C680000 000007FF7C789FFF 0010a000

    * opends60 00000000333E0000 00000000333E7FFF 00008000

    * NETAPI32 000007FF77370000 000007FF77408FFF 00099000

    * SHELL32 000007FF7F190000 000007FF7FB9AFFF 00a0b000

    * SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000

    * IMM32 000007FF7D500000 000007FF7D538FFF 00039000

    * comctl32 000007FF7F000000 000007FF7F186FFF 00187000

    * psapi 000007FF7E380000 000007FF7E38FFFF 00010000

    * instapi 0000000048060000 000000004806CFFF 0000d000

    * sqlevn70 000000004F610000 000000004F7B8FFF 001a9000

    * SQLOS 00000000344D0000 00000000344D5FFF 00006000

    * rsaenh 0000000068000000 000000006804BFFF 0004c000

    * AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000

    * MSCOREE 000006427EE50000 000006427EEB5FFF 00066000

    * ole32 000007FF57140000 000007FF573C4FFF 00285000

    * msv1_0 000007FF7E500000 000007FF7E544FFF 00045000

    * cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000

    * iphlpapi 000007FF57040000 000007FF57070FFF 00031000

    * kerberos 000007FF77410000 000007FF774C4FFF 000b5000

    * schannel 000007FF7DD50000 000007FF7DD91FFF 00042000

    * COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000

    * XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000

    * MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000

    * OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000

    * msvcp60 0000000009920000 0000000009A09FFF 000ea000

    * MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000

    * VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000

    * WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000

    * CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000

    * RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000

    * DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000

    * winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000

    * WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000

    * rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000

    * security 000007FF77530000 000007FF77534FFF 00005000

    * msfte 0000000049980000 0000000049D2DFFF 003ae000

    * dbghelp 000000000B8C0000 000000000BA1CFFF 0015d000

    * WINTRUST 000007FF7E3E0000 000007FF7E42DFFF 0004e000

    * imagehlp 000007FF7E470000 000007FF7E482FFF 00013000

    * dssenh 0000000068100000 000000006813EFFF 0003f000

    * hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000

    * wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000

    * NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000

    * SAMLIB 000007FF77150000 000007FF77165FFF 00016000

    * ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000

    * xpsp2res 000000000C150000 000000000C416FFF 002c7000

    * CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000

    * sqlncli 00000000337A0000 0000000033A5FFFF 002c0000

    * COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000

    * comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000

    * SQLNCLIR 0000000035000000 0000000035032FFF 00033000

    * msftepxy 00000000037E0000 0000000003800FFF 00021000

    * xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000

    * xpstar90 0000000053C30000 0000000053CB5FFF 00086000

    * SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000

    * ODBC32 000007FF63F00000 000007FF63F66FFF 00067000

    * BatchParser90 00000000520C0000 00000000520ECFFF 0002d000

    * ATL80 000000007C630000 000000007C64DFFF 0001e000

    * odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000

    * xpstar90 0000000010010000 0000000010035FFF 00026000

    * xplog70 0000000034730000 000000003473FFFF 00010000

    * xplog70 0000000010250000 0000000010252FFF 00003000

    * mpr 000007FF772D0000 000007FF772F0FFF 00021000

    * msxmlsql 0000000078800000 0000000078967FFF 00168000

    * msxml3 000007FF56D40000 000007FF56F53FFF 00214000

    * mscorwks 000006427F330000 000006427FCE0FFF 009b1000

    * mscorlib.ni 0000064278000000 0000064278ED8FFF 00ed9000

    * mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000

    * cryptnet 000007FF79690000 000007FF796AEFFF 0001f000

    * SensApi 000007FF77C90000 000007FF77C96FFF 00007000

    * SqlAccess 000000000CE30000 000000000CE87FFF 00058000

    * mscorjit 000006427EED0000 000006427F053FFF 00184000

    * System.Data 000000001B6D0000 000000001B9B9FFF 002ea000

    * System.ni 0000064274880000 0000064275283FFF 00a04000

    * System.Transactions 000000001E230000 000000001E278FFF 00049000

    * System.Security.ni 000006424F240000 000006424F324FFF 000e5000

    * System 000000007A440000 000000007A743FFF 00304000

    * System.Security 0000000067920000 0000000067961FFF 00042000

    * System.Xml 00000000637A0000 0000000063997FFF 001f8000

    *

    * P1Home: 0000200000000000:

    * P2Home: 000000000B8AD260: 0000200000000000 000000000B8AD260 0000000000000000 0000000080000000 FFFFFADF

    8D6D5110 FFFFFADF8D798AD4

    * P3Home: 0000000000000000:

    * P4Home: 0000000080000000: 0000000000000000 0000000080000050 0000000100000008 00000000A632A000 00000001

    16A3C000 000000000023003D

    * P5Home: FFFFFADF8D6D5110:

    * P6Home: FFFFFADF8D798AD4:

    * ContextFlags: 000000000010001F:

    * MxCsr: 0000000000001FA0:

    * SegCs: 0000000000000033:

    * SegDs: 000000000000002B:

    * SegEs: 000000000000002B:

    * SegFs: 0000000000000053:

    * SegGs: 000000000000002B:

    * SegSs: 000000000000002B:

    * EFlags: 0000000000010246: 0065004400720065 00720061006C0063 006F006900740061 00650052003B006E 00730061

    0065006C 006E006100480065

    * Rax: 0000000000F6FCC0: 00000000800AA170 0000000000000000 0000000000F6FFD0 0000000000000000 00400020

    00000001 0000000000000000

    * Rcx: 00000000800A8088: 00000000013A3AB0 0000000000F6F7C0 00000000800A85A0 0000000000000056 00000000

    00C38460 0000000000C38088

    * Rdx: 00000000F039A340: 0000000001245CB0 0000000000000010 000000017EFA0661 0000000000002050 00009C83

    0028432E 0000000000000007

    * Rbx: 0000000000000000:

    * Rsp: 000000000B8AD800: FFFFFFFFFFFFFFFE 0000000000000000 000000000B8AD8A0 00000000F039A340 00000000

    00000000 FFFFFFFFFFFFFFFE

    * Rbp: 0000000080000000: 0000000000000000 0000000080000050 0000000100000008 00000000A632A000 00000001

    16A3C000 000000000023003D

    * Rsi: 00000000AAECB670:

    * Rdi: 00000000800A8088: 00000000013A3AB0 0000000000F6F7C0 00000000800A85A0 0000000000000056 00000000

    00C38460 0000000000C38088

    * R8: 0000000000000000:

    * R9: 00000000F039A170: 00000000013A5CC0 0000000000002000 000000000000000E 00000000F039A080 00000000

    D3813840 0000000100000011

    * R10: 3D3D3D3D3D3D3D3D:

    * R11: 000000012A3E0050: 003D0020002D002D 003D003D003D003D 003D003D003D003D 003D003D003D003D 003D003D

    003D003D 003D003D003D003D

    * R12: 0000000000000000:

    * R13: 00000000F039A340: 0000000001245CB0 0000000000000010 000000017EFA0661 0000000000002050 00009C83

    0028432E 0000000000000007

    * R14: 000000012A87C0E0: 00000000013A5A60 0000000000000400 00000000000000A4 0000000000000000 00000001

    2A90EBC0 0000000100000008

    * R15: 0000000000000000:

    * Rip: 000000000196D869: 2484894830468B48 24848B48000000A0 24848948000000A0 C0248483000000C0 24848B4C

    FF000000 24948B48000000A0

    * *******************************************************************************

    * -------------------------------------------------------------------------------

    * Short Stack Dump

    000000000196D869 Module(sqlservr+000000000096D869)

    000000000154536B Module(sqlservr+000000000054536B)

    000000000238057B Module(sqlservr+000000000138057B)

    00000000026CCFD3 Module(sqlservr+00000000016CCFD3)

    0000000002AD039E Module(sqlservr+0000000001AD039E)

    0000000002AD0755 Module(sqlservr+0000000001AD0755)

    000000000174D81D Module(sqlservr+000000000074D81D)

    000000000161419D Module(sqlservr+000000000061419D)

    00000000015D1671 Module(sqlservr+00000000005D1671)

    00000000015ED044 Module(sqlservr+00000000005ED044)

    00000000015E40B3 Module(sqlservr+00000000005E40B3)

    00000000015D3F60 Module(sqlservr+00000000005D3F60)

    00000000015D3F06 Module(sqlservr+00000000005D3F06)

    00000000015ED044 Module(sqlservr+00000000005ED044)

    00000000015E49A0 Module(sqlservr+00000000005E49A0)

    00000000015D3FC6 Module(sqlservr+00000000005D3FC6)

    00000000017BA62E Module(sqlservr+00000000007BA62E)

    0000000001613A8D Module(sqlservr+0000000000613A8D)

    0000000001613A8D Module(sqlservr+0000000000613A8D)

    00000000015E7402 Module(sqlservr+00000000005E7402)

    0000000001613A8D Module(sqlservr+0000000000613A8D)

    000000000163C338 Module(sqlservr+000000000063C338)

    000000000157E5EB Module(sqlservr+000000000057E5EB)

    00000000016380B2 Module(sqlservr+00000000006380B2)

    000000000162D762 Module(sqlservr+000000000062D762)

    00000000016304D6 Module(sqlservr+00000000006304D6)

    00000000015F6350 Module(sqlservr+00000000005F6350)

    000000000163D0FA Module(sqlservr+000000000063D0FA)

    000000000163EDA5 Module(sqlservr+000000000063EDA5)

    0000000001841035 Module(sqlservr+0000000000841035)

    0000000001840E72 Module(sqlservr+0000000000840E72)

    0000000001862BE0 Module(sqlservr+0000000000862BE0)

    00000000015F5CF8 Module(sqlservr+00000000005F5CF8)

    000000000163D0FA Module(sqlservr+000000000063D0FA)

    000000000163EDA5 Module(sqlservr+000000000063EDA5)

    000000000163F9B2 Module(sqlservr+000000000063F9B2)

    000000000163F4B7 Module(sqlservr+000000000063F4B7)

    000000000164576E Module(sqlservr+000000000064576E)

    00000000016454B9 Module(sqlservr+00000000006454B9)

    000000000164ED44 Module(sqlservr+000000000064ED44)

    00000000014E3207 Module(sqlservr+00000000004E3207)

    00000000017B7859 Module(sqlservr+00000000007B7859)

    00000000014E2B40 Module(sqlservr+00000000004E2B40)

    00000000017E8658 Module(sqlservr+00000000007E8658)

    00000000781337D7 Module(MSVCR80+00000000000037D7)

    0000000078133894 Module(MSVCR80+0000000000003894)

    0000000077D6B71A Module(kernel32+000000000002B71A)

    PSS @0x000000012A907BF0

    -----------------------

    CSession @0x000000012A906410

    ----------------------------

    m_spid = 52 m_cRef = 28 m_rgcRefType[0] = 1

    m_rgcRefType[1] = 1 m_rgcRefType[2] = 25 m_rgcRefType[3] = 1

    m_rgcRefType[4] = 0 m_rgcRefType[5] = 0 m_pmo = 0x000000012A906080

    m_pstackBhfPool = 0x000000012A9E8CC0 m_dwLoginFlags = 0x83e0 m_fBackground = 0

    m_fClientRequestConnReset = 0 m_fUserProc = -1 m_fConnReset = 0

    m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 1

    m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0

    m_ulLoginStamp = 957790 m_eclClient = 5 m_protType = 5

    m_hHttpToken = FFFFFFFFFFFFFFFF

    m_pV7LoginRec

    ---------------------

    0000000000000000: 57010000 02000972 00100000 00000007 c4080000 †W......r............

    0000000000000014: 00000000 e0830000 68010000 09040000 5e000a00 †........h.......^...

    0000000000000028: 00000000 00000000 72004900 04010000 00000000 †........r.I.........

    000000000000003C: 04010400 0c010000 0c010b00 0019b9e6 d58e2201 †..................".

    0000000000000050: 35002201 00000000 00000000 0000†††††††††††††††5."...........

    CPhysicalConnection @0x000000012A9062E0

    ---------------------------------------

    m_pPhyConn->m_pmo = 0x000000012A906080

    m_pPhyConn->m_pNetConn = 0x000000012A906B00

    m_pPhyConn->m_pConnList = 0x000000012A9063E0

    m_pPhyConn->m_pSess = 0x000000012A906410 m_pPhyConn->m_fTracked = -1

    m_pPhyConn->m_cbPacketsize = 4096 m_pPhyConn->m_fMars = 0 m_pPhyConn->m_fKill = 0

    CBatch @0x000000012A906FD0

    --------------------------

    m_pSess = 0x000000012A906410 m_pConn = 0x000000012A906EC0 m_cRef = 3

    m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 1

    m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x0000000000F072E8

    EXCEPT (null) @0x000000000B8AA728

    ---------------------------------

    exc_number = 0 exc_severity = 0 exc_func = 0x0000000001B23AA0

    Task @0x0000000000F072E8

    ------------------------

    CPU Ticks used (ms) = 145 Task State = 2

    WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0

    WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0x4

    ThreadId = 0xe010 m_state = 0 m_eAbortSev = 0

    EC @0x000000012A907C00

    ----------------------

    spid = 52 ecid = 0 ec_stat = 0x0

    ec_stat2 = 0x0 ec_atomic = 0x0 __fSubProc = 1

    ec_dbccContext = 0x0000000000000000 __pSETLS = 0x000000012A906F30 __pSEParams = 0x000000012A907350

    __pDbLocks = 0x000000012A907CC0

    SEInternalTLS @0x000000012A906F30

    ---------------------------------

    m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x0000000000F072E8

    m_activeHeapDatasetList = 0x000000012A906F30

    m_activeIndexDatasetList = 0x000000012A906F40

    SEParams @0x000000012A907350

    ----------------------------

    m_lockTimeout = -1 m_isoLevel = 4096 m_logDontReplicate = 0

    m_neverReplicate = 0 m_XactWorkspace = 0x000000008004F680

    m_pSessionLocks = 0x000000012A907D70 m_pDbLocks = 0x000000012A907CC0

    m_execStats = 0x000000008037C810 m_pAllocFileLimit = 0x0000000000000000

  • If you get this repeatedly, call Microsoft's customer support people. They have the tools to analyse and debug stackdumps, we don't.

    Gail Shaw
    Microsoft Certified Master: SQL Server, MVP, M.Sc (Comp Sci)
    SQL In The Wild: Discussions on DB performance with occasional diversions into recoverability

    We walk in the dark places no others will enter
    We stand on the bridge and no one may pass

Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic. Login to reply