Friday, March 9, 2012

Exception_Access_Violation.

I received the following AV in SS2K Std. Edition - I can find nothing on this
AV, however the log did fill with over 10,000 "WaitForChildren" errors before
we had to bring it down. I have the dump file and log file available, but this
looks like a pretty serious bug. If anyone from Microsoft can assist, please
reply. The stack dump is below. The mdmp file is available if needed. Please
reply to this newsgroup only.
This file is generated by Microsoft SQL Server 8.00.760
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.
Computer type is AT/AT COMPATIBLE.
Bios Version is DELL - 1
Phoenix ROM BIOS PLUS Version 1.10 A07
Current time is 13:12:17 11/05/04.
4 Intel x86 level 15, 2388 Mhz processor(s).
Windows NT 5.2 Build 3790 CSD .
Memory
MemoryLoad = 93%
Total Physical = 2047 MB
Available Physical = 143 MB
Total Page File = 3947 MB
Available Page File = 2266 MB
Total Virtual = 2047 MB
Available Virtual = 279 MB
*Stack Dump being sent to d:\MSSQL\log\SQLDump0001.txt
*
*****************************************************************************
**
*
* BEGIN STACK DUMP:
* 11/05/04 13:12:17 spid 4
*
* Exception Address = 006FDA74 (CXid::Kill + 0000001E Line 0+00000000)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 00000004
*
*
* MODULE BASE END SIZE
* sqlservr 00400000 00B2CFFF 0072d000
* ntdll 77F40000 77FF9FFF 000ba000
* kernel32 77E40000 77F33FFF 000f4000
* ADVAPI32 77DA0000 77E2FFFF 00090000
* RPCRT4 77C50000 77CF4FFF 000a5000
* USER32 77D00000 77D8EFFF 0008f000
* GDI32 77C00000 77C43FFF 00044000
* OPENDS60 41060000 41065FFF 00006000
* MSVCRT 77BA0000 77BF3FFF 00054000
* UMS 41070000 4107CFFF 0000d000
* SQLSORT 42AE0000 42B6FFFF 00090000
* MSVCIRT 60020000 6002FFFF 00010000
* sqlevn70 41080000 41086FFF 00007000
* NETAPI32 02A00000 02A52FFF 00053000
* ole32 02E70000 02F94FFF 00125000
* XOLEHLP 02FA0000 02FA5FFF 00006000
* MSDTCPRX 02FB0000 03021FFF 00072000
* OLEAUT32 03030000 030ACFFF 0007d000
* MSVCP60 030B0000 03110FFF 00061000
* MTXCLU 03120000 03137FFF 00018000
* VERSION 03140000 03147FFF 00008000
* WSOCK32 03150000 03158FFF 00009000
* WS2_32 03160000 03177FFF 00018000
* WS2HELP 03180000 03187FFF 00008000
* CLUSAPI 031D0000 031E0FFF 00011000
* RESUTILS 031F0000 03201FFF 00012000
* USERENV 03210000 032C9FFF 000ba000
* MFC42u 032D0000 033C3FFF 000f4000
* secur32 03450000 03462FFF 00013000
* mswsock 03480000 034C2FFF 00043000
* DNSAPI 034D0000 034F6FFF 00027000
* winrnr 03540000 03546FFF 00007000
* WLDAP32 03550000 0357EFFF 0002f000
* rasadhlp 035A0000 035A4FFF 00005000
* SSNETLIB 00C70000 00C84FFF 00015000
* SSNMPN70 00C90000 00C95FFF 00006000
* security 04060000 04063FFF 00004000
* wshtcpip 040B0000 040B7FFF 00008000
* SSmsLPCn 040C0000 040C6FFF 00007000
* ntdsapi 040E0000 040F5FFF 00016000
* kerberos 04A50000 04AA5FFF 00056000
* cryptdll 04110000 0411BFFF 0000c000
* MSASN1 043B0000 043C1FFF 00012000
* rsaenh 0FFD0000 0FFFCFFF 0002d000
* PSAPI 04100000 0410AFFF 0000b000
* SQLFTQRY 048E0000 04911FFF 00032000
* CLBCatQ 055F0000 0566DFFF 0007e000
* COMRes 05670000 05735FFF 000c6000
* sqloledb 05740000 057C5FFF 00086000
* MSDART 057D0000 057F8FFF 00029000
* COMCTL32 05800000 0588FFFF 00090000
* comdlg32 05890000 058D6FFF 00047000
* SHLWAPI 058E0000 05928FFF 00049000
* SHELL32 05930000 0610CFFF 007dd000
* MSDATL3 06110000 06127FFF 00018000
* comctl32 06140000 06225FFF 000e6000
* oledb32 065D0000 0664CFFF 0007d000
* OLEDB32R 06650000 06660FFF 00011000
* xpsqlbot 06670000 06675FFF 00006000
* xpstar 06690000 066D6FFF 00047000
* SQLRESLD 066F0000 066F6FFF 00007000
* SQLSVC 06700000 06716FFF 00017000
* ODBC32 06720000 06759FFF 0003a000
* odbcbcp 06760000 06765FFF 00006000
* W95SCM 06770000 0677BFFF 0000c000
* SQLUNIRL 06780000 067ACFFF 0002d000
* WINSPOOL 067B0000 067D5FFF 00026000
* SHFOLDER 067E0000 067E8FFF 00009000
* odbcint 068F0000 06906FFF 00017000
* NDDEAPI 06AF0000 06AF6FFF 00007000
* SQLSVC 06B00000 06B05FFF 00006000
* xpstar 06B10000 06B18FFF 00009000
* xplog70 06BB0000 06BC1FFF 00012000
* xplog70 06680000 06683FFF 00004000
* odsole70 04000000 0400FFFF 00010000
* jmail 06E50000 06EA2FFF 00053000
* SAMLIB 03FE0000 03FEFFFF 00010000
* msv1_0 07530000 07553FFF 00024000
* ACTIVEDS 07590000 075C1FFF 00032000
* adsldpc 075D0000 075F5FFF 00026000
* credui 07600000 0762CFFF 0002d000
* ATL 07560000 07577FFF 00018000
* adsldp 07670000 0769CFFF 0002d000
* SXS 07820000 078D9FFF 000ba000
* DBNETLIB 00D50000 00D62FFF 00013000
* crypt32 070B0000 07147FFF 00098000
* msadce 050B0000 0510AFFF 0005b000
* msadcer 047B0000 047B4FFF 00005000
* srchadm 06FB0000 06FE5FFF 00036000
* mssws 04F00000 04F07FFF 00008000
* athprxy 04F10000 04F17FFF 00008000
* msi 09560000 09773FFF 00214000
* sqlmap70 044E0000 04509FFF 0002a000
* MAPI32 02E20000 02E3EFFF 0001f000
* dbghelp 07E60000 07F14FFF 000b5000
*
* Edi: 00000001:
* Esi: 19DC28A4: 009B694C 19DC2B88 19DDE0F0 00000002 00000003
00000
002
* Eax: 00000000:
* Ebx: 00000004:
* Ecx: 19DC28A4: 009B694C 19DC2B88 19DDE0F0 00000002 00000003
00000
002
* Edx: 7FFE0304: 0C819CC3 00010024 90C39D00 90909090 90909090
90909
090
* Eip: 006FDA74: 8904408B 4E8B7078 4DBCE848 C0850000 468B1475
08408
B3C
* Ebp: 03B6FDE8: 03B6FE30 008405DD 00000004 19D433B8 008404C7
2AB4C
098
* SegCs: 0000001B:
* EFlags: 00010246: 006F0072 00720067 006D0061 00460020 006C0069
00730
065
* Esp: 03B6FDD8: 2AB4C098 19D433B8 00000000 00000000 03B6FE30
00840
5DD
* SegSs: 00000023:
*
*****************************************************************************
**
*
----
--
* Short Stack Dump
* 006FDA74 Module(sqlservr+002FDA74) (CXid::Kill+0000001E)
* 008405DD Module(sqlservr+004405DD)
(DeadlockMonitor::ResolveDeadlock+0000002A
)
* 008404C7 Module(sqlservr+004404C7)
(DeadlockMonitor::SearchAndResolve+0000013
4)
* 00516E1A Module(sqlservr+00116E1A) (lockMonitor+000002F7)
* 00516CC4 Module(sqlservr+00116CC4) (lockMonitorThread+000000A4)
* 41075002 Module(UMS+00005002) (ProcessWorkRequests+00000272)
* 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
* 77BC90A2 Module(MSVCRT+000290A2) (endthread+000000A6)
* 77E4A990 Module(kernel32+0000A990) (FlsSetValue+00000779)
----
* Location : 006FDA74 Module(sqlservr+002FDA74) (CXid::Kill+0000001E)
* Return Addr: 008405DD Module(sqlservr+004405DD)
(DeadlockMonitor::ResolveDead
lock+0000002A)
Frame : 03B6FDE8
Parameters:
[1] 00000004:
[2] 19D433B8: 00000012 000693CC 19DDE030 19D433C4 19D433C4 19DC3988
[3] 008404C7: 8901F883 850FEC45 FFBFD2B9 145005C7 000300A2 AAE90000
[4] 2AB4C098: 2F5BD1F0 2AB4C09C 2AB4C09C 2AB4C5E8 2AB4C5E8 2AB4C030
160 bytes of stack data from 03B6FD48 to 03B6FDE8
03B6FD48: 00000000 00000000 00000000 00000000 [............]
:::: 8 Duplicate lines detected
03B6FDD8: 2AB4C098 19D433B8 00000000 00000000 [...*.3........]
----
* Location : 008405DD Module(sqlservr+004405DD)
(DeadlockMonitor::ResolveDead
lock+0000002A)
* Return Addr: 008404C7 Module(sqlservr+004404C7)
(DeadlockMonitor::SearchAndRe
solve+00000134)
Frame : 03B6FDF4
Parameters:
[1] 2AB4C098: 2F5BD1F0 2AB4C09C 2AB4C09C 2AB4C5E8 2AB4C5E8 2AB4C030
[2] 19DC3988: 009B694C 19DDE130 19DDE130 00000002 00000001 00000001
[3] 19DC3988: 009B694C 19DDE130 19DDE130 00000002 00000001 00000001
[4] 03B6FE48: 00000000 00000000 00931CFA 00000000 00000000 2F5BD1F0
12 bytes of stack data from 03B6FDE8 to 03B6FDF4
03B6FDE8: 03B6FE30 008405DD 00000004 [0.........]
----
* Location : 008404C7 Module(sqlservr+004404C7)
(DeadlockMonitor::SearchAndRe
solve+00000134)
* Return Addr: 00516E1A Module(sqlservr+00116E1A) (lockMonitor+000002F7)
Frame : 03B6FE30
Parameters:
[1] 19DC3988: 009B694C 19DDE130 19DDE130 00000002 00000001 00000001
[2] 00C56780: 00C56780 00C56780 00000000 00000003 00000000 00000000
[3] 19DD6098: 01000004 00000000 00000000 00000000 00000000 00000000
[4] 00000001:
60 bytes of stack data from 03B6FDF4 to 03B6FE30
03B6FDF4: 19D433B8 008404C7 2AB4C098 19DC3988 [.3.......*.9..]
03B6FE04: 19DC3988 03B6FE48 00000000 00931CFA [.9..H.........]
03B6FE14: 02A65EDC 19D433B8 00000001 03B6FDFC [.^...3........]
03B6FE24: 03B6FEB4 009803BB 00000001 [.........]
----
* Location : 00516E1A Module(sqlservr+00116E1A) (lockMonitor+000002F7)
* Return Addr: 00516CC4 Module(sqlservr+00116CC4)
(lockMonitorThread+000000A4)
Frame : 03B6FEC0
Parameters:
[1] 00C56780: 00C56780 00C56780 00000000 00000003 00000000 00000000
[2] 0363503C: 00000000 00000000 03635010 00000000 00516C29 03B6FF1C
[3] 00000000:
[4] 77F43741: 90000CC2 90909090 00011AB8 0300BA00 D2FF7FFE 900004C2
144 bytes of stack data from 03B6FE30 to 03B6FEC0
03B6FE30: 03B6FEC0 00516E1A 19DC3988 00C56780 [....nQ..9...g..]
03B6FE40: 19DD6098 00000001 00000000 00000000 [.`...........]
03B6FE50: 00931CFA 00000000 00000000 2F5BD1F0 [...........[/]
03B6FE60: 2AB4C098 2F5BD44C 00000000 FFFFFFFF [...*L.[/......]
03B6FE70: 00000000 00000000 C1F7FA5B 2F5BD44C [......[...L.[/]
03B6FE80: 00000061 C1F8216B C1F7FA5B 00000065 [a...k!..[...e...]
03B6FE90: 00000000 2F5BD1F0 00000000 00000000 [.....[/......]
03B6FEA0: 2F5BD1F0 03B6FEEC 00001388 19DC3988 [..[/.......9..]
03B6FEB0: 03B6FE3C 03B6FEEC 0098061F 00000006 [<............]
----
* Location : 00516CC4 Module(sqlservr+00116CC4)
(lockMonitorThread+000000A4)
* Return Addr: 41075002 Module(UMS+00005002) (ProcessWorkRequests+00000272)
Frame : 03B6FEFC
Parameters:
[1] 00000000:
[2] 03635010: 41076104 00000000 00000000 00000000 00000000 C1F7FA5B
[3] 00000002:
[4] 00000000:
60 bytes of stack data from 03B6FEC0 to 03B6FEFC
03B6FEC0: 03B6FEFC 00516CC4 00C56780 0363503C [....lQ..g..<Pc.]
03B6FED0: 00000000 77F43741 77E41817 19DD6098 [...A7.w...w.`..]
03B6FEE0: 77E41864 03B6FEC8 77E4178F 03B6FF64 [d..w......wd...]
03B6FEF0: 00488754 009A7D90 00000000 [T.H..}.....]
----
* Location : 41075002 Module(UMS+00005002) (ProcessWorkRequests+00000272)
* Return Addr: 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
Frame : 03B6FF70
Parameters:
[1] 00C56788: 00000000 00000003 00000000 00000000 073AFF1C 0509FF1C
[2] 03635268: 0000078C 000002DC 00000009 00000000 00000000 3EBEC2C9
[3] 03B6FFB8: 03B6FFEC 77E4A990 03634D68 00000000 00000000 03634D68
[4] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
116 bytes of stack data from 03B6FEFC to 03B6FF70
03B6FEFC: 03B6FF70 41075002 00000000 03635010 [p...P.A....Pc.]
03B6FF0C: 00000002 00000000 00000001 00C56650 [.........Pf..]
03B6FF1C: 00000000 00000000 0000078C 03635080 [..........Pc.]
03B6FF2C: 00000000 00000000 00000002 03B6FF38 [.........8...]
03B6FF3C: 03B6FF38 00000000 00000002 00000000 [8............]
03B6FF4C: 41074A13 00000000 00000000 03635080 [.J.A.......Pc.]
03B6FF5C: 000DBBA0 00C56650 03B6FFA8 41075428 [...Pf.....(T.A]
03B6FF6C: 00000000 [...]
----
* Location : 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
* Return Addr: 77BC90A2 Module(MSVCRT+000290A2) (endthread+000000A6)
Frame : 03B6FF84
Parameters:
[1] 00C56780: 00C56780 00C56780 00000000 00000003 00000000 00000000
[2] 00000000:
[3] 00000000:
[4] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
20 bytes of stack data from 03B6FF70 to 03B6FF84
03B6FF70: 41074D90 41074698 00C56788 03635268 [.M.A.F.A.g..hRc.]
03B6FF80: 03B6FFB8 [...]
----
* Location : 77BC90A2 Module(MSVCRT+000290A2) (endthread+000000A6)
* Return Addr: 77E4A990 Module(kernel32+0000A990) (FlsSetValue+00000779)
Frame : 03B6FFB8
Parameters:
[1] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
[2] 00000000:
[3] 00000000:
[4] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
52 bytes of stack data from 03B6FF84 to 03B6FFB8
03B6FF84: 03634D68 77BC90A2 00C56780 00000000 [hMc...w.g.....]
03B6FF94: 00000000 03634D68 B6C14C90 03B6FF90 [...hMc..L.....]
03B6FFA4: 89450A30 03B6FFDC 77BC4D50 77BA4040 [0.E....PM.w@.@..w]
03B6FFB4: 00000000 [...]
----
* Location : 77E4A990 Module(kernel32+0000A990) (FlsSetValue+00000779)
* Return Addr: 00000000 Module(sqlservr+FFC00000)
Frame : 03B6FFEC
Parameters:
[1] 77BC9032: 40680C6A E877BA40 FFFFD3EE BAEC35FF 15FF77BE 77BED9FC
[2] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
[3] 00000000:
[4] 00000000:
*
----
--
PSS @.0x19DD6098
--
pspid = 4 m_dwLoginFlags = 0x0000 plsid = 433398744
pbackground = 1
pbSid
--
01 .
sSecFlags = 0x10
pdeadlockpri = 0 poffsets = 0x0 pss_stats = 0x0
ptickcount = 72093 pcputickcount = 169421353078
ploginstamp = 4 ptimestamp = 1900-01-01 00:00:00.000
plangid = 0 pdateformat = 0 pdatefirst = 0
poptions = 0x0 poptions2 = 0x0 pline = 0
pcurstepno = 0 prowcount = 0 pstatlist = 0
pcurcmd = 35 pseqstat = 0 ptextsize = 4096
pretstat = 0 CNestLevel = 0 @.@.procid = 0
pslastbatchstarttime = 1900-01-01 00:00:00.000 pmemusage = -174655
hLicense = 0 tpFlags = 0x1 isolation_level = 0
fips_flag = 0x0 sSaveSecFlags = 0x0 psavedb = 0
pfetchstat = 0 pcrsrows = 0
pslastbatchtime = 1900-01-01 00:00:00.000 pubexecdb = 0
fInReplicatedProcExec = 0 pMsqlXact = 0x19DD6A10 presSemCount = [0]62322896
presSemCount = [0]62322896 pcputot = 0
pcputotstart = 0 pcpucmdstart = 0 pbufread = 0
pbufreadstart = 0 plogbufread = 0 plogbufreadstart = 0
pbufwrite = 0 pbufwritestart = 0 pLockTimeout = 4294967295
pUtilResultSet = 0x00000000
pec
--
ec_pss->pspid = 4 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x100000 ec_atomic = 0x0 pcurdb = 0
ec_lasterror = 0 ec_preverror = 0 ec_cpucur = 0
ec_cmderrs = 0 ec_timeslice = 100 ec_dbtable = 0x00000000
ec_reswait = 0xa74488 ec_dbindex = -1 ec_waittype = 0x0000
Waittime = 0 ec_umsContext->m_pSched->m_id (SchedulerId) = 0x3
ec_umsContext->m_workercntxt->m_id (threadId) = 0x78c
ExecutionContext Summary @.0x19DD63C0
--
ec_pss->pspid = 4 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x100000 ec_atomic = 0x0 pcurdb = 0
ec_lasterror = 0 ec_preverror = 0 ec_cpucur = 0
ec_cmderrs = 0 ec_timeslice = 100 ec_dbtable = 0x00000000
ec_reswait = 0xa74488 ec_dbindex = -1 ec_waittype = 0x0000
Waittime = 0 ec_umsContext->m_pSched->m_id (SchedulerId) = 0x3
ec_umsContext->m_workercntxt->m_id (threadId) = 0x78c
EC @.0x19DD63C0
--
ec_pss->pspid = 4 ecid = 0 ec_cmderrs = 0
ec_stat = 0x0 ec_stat2 = 0x100000 ec_atomic = 0x0
ec_curdb = 0 ec_dbtable = 0x0 ec_dbstat = 0x0
ec_lospin = 0x0 ec_dbindex = -1 ec_lasterror = 0
ec_save_ex_number = 0 ec_save_ex_address = 0x00000000
ec_cpucur = 0 ec_timeslice = 100 ec_next = 0x00000000
ec_prev = 0x00000000 ec_state = 1 ec_waittype = 0x0000
ec_dbstat2 = 0 ec_preverror = 0 ec_subecstat = 1
ec_subecnext = 0x00000000 ec_resSemWaitInfo = 0
ec_umsContext->m_pSched->m_id (SchedulerId) = 0x3
ec_umsContext->m_workercntxt->m_id (threadId) = 0x78c
ec_backupContext = 0x00000000 ec_dbccContext = 0x00000000
ec_allocFile = 0x00000000 ec_buftrace.Index = 0
EXCEPT (null) @.0x03B6FE08
--
exc_number = 0 exc_severity = 0
exc_func = hdl_prntbackout+0 Line 0+0x0Hi
Similar bug, but that was fixed in 8.00.0592.
Try applying 8.00.0878
(http://support.microsoft.com/default.aspx?scid=kb;en-us;838166), failing
that, open a ticket with Microsoft PSS
Regards
--
Mike Epprecht, Microsoft SQL Server MVP
Zurich, Switzerland
IM: mike@.epprecht.net
MVP Program: http://www.microsoft.com/mvp
Blog: http://www.msmvps.com/epprecht/
"VEN" <VEN@.discussions.microsoft.com> wrote in message
news:8EDA3346-D12E-4D9C-B8A4-DBD4E6A328A5@.microsoft.com...
> I received the following AV in SS2K Std. Edition - I can find nothing on
this
> AV, however the log did fill with over 10,000 "WaitForChildren" errors
before
> we had to bring it down. I have the dump file and log file available, but
this
> looks like a pretty serious bug. If anyone from Microsoft can assist,
please
> reply. The stack dump is below. The mdmp file is available if needed.
Please
> reply to this newsgroup only.
> This file is generated by Microsoft SQL Server 8.00.760
> upon detection of fatal unexpected error. Please return this file,
> the query or program that produced the bugcheck, the database and
> the error log, and any other pertinent information with a Service Request.
>
> Computer type is AT/AT COMPATIBLE.
> Bios Version is DELL - 1
> Phoenix ROM BIOS PLUS Version 1.10 A07
> Current time is 13:12:17 11/05/04.
> 4 Intel x86 level 15, 2388 Mhz processor(s).
> Windows NT 5.2 Build 3790 CSD .
>
> Memory
> MemoryLoad = 93%
> Total Physical = 2047 MB
> Available Physical = 143 MB
> Total Page File = 3947 MB
> Available Page File = 2266 MB
> Total Virtual = 2047 MB
> Available Virtual = 279 MB
> *Stack Dump being sent to d:\MSSQL\log\SQLDump0001.txt
> *
>
****************************************************************************
*
> **
> *
> * BEGIN STACK DUMP:
> * 11/05/04 13:12:17 spid 4
> *
> * Exception Address = 006FDA74 (CXid::Kill + 0000001E Line 0+00000000)
> * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
> * Access Violation occurred reading address 00000004
> *
> *
> * MODULE BASE END SIZE
> * sqlservr 00400000 00B2CFFF 0072d000
> * ntdll 77F40000 77FF9FFF 000ba000
> * kernel32 77E40000 77F33FFF 000f4000
> * ADVAPI32 77DA0000 77E2FFFF 00090000
> * RPCRT4 77C50000 77CF4FFF 000a5000
> * USER32 77D00000 77D8EFFF 0008f000
> * GDI32 77C00000 77C43FFF 00044000
> * OPENDS60 41060000 41065FFF 00006000
> * MSVCRT 77BA0000 77BF3FFF 00054000
> * UMS 41070000 4107CFFF 0000d000
> * SQLSORT 42AE0000 42B6FFFF 00090000
> * MSVCIRT 60020000 6002FFFF 00010000
> * sqlevn70 41080000 41086FFF 00007000
> * NETAPI32 02A00000 02A52FFF 00053000
> * ole32 02E70000 02F94FFF 00125000
> * XOLEHLP 02FA0000 02FA5FFF 00006000
> * MSDTCPRX 02FB0000 03021FFF 00072000
> * OLEAUT32 03030000 030ACFFF 0007d000
> * MSVCP60 030B0000 03110FFF 00061000
> * MTXCLU 03120000 03137FFF 00018000
> * VERSION 03140000 03147FFF 00008000
> * WSOCK32 03150000 03158FFF 00009000
> * WS2_32 03160000 03177FFF 00018000
> * WS2HELP 03180000 03187FFF 00008000
> * CLUSAPI 031D0000 031E0FFF 00011000
> * RESUTILS 031F0000 03201FFF 00012000
> * USERENV 03210000 032C9FFF 000ba000
> * MFC42u 032D0000 033C3FFF 000f4000
> * secur32 03450000 03462FFF 00013000
> * mswsock 03480000 034C2FFF 00043000
> * DNSAPI 034D0000 034F6FFF 00027000
> * winrnr 03540000 03546FFF 00007000
> * WLDAP32 03550000 0357EFFF 0002f000
> * rasadhlp 035A0000 035A4FFF 00005000
> * SSNETLIB 00C70000 00C84FFF 00015000
> * SSNMPN70 00C90000 00C95FFF 00006000
> * security 04060000 04063FFF 00004000
> * wshtcpip 040B0000 040B7FFF 00008000
> * SSmsLPCn 040C0000 040C6FFF 00007000
> * ntdsapi 040E0000 040F5FFF 00016000
> * kerberos 04A50000 04AA5FFF 00056000
> * cryptdll 04110000 0411BFFF 0000c000
> * MSASN1 043B0000 043C1FFF 00012000
> * rsaenh 0FFD0000 0FFFCFFF 0002d000
> * PSAPI 04100000 0410AFFF 0000b000
> * SQLFTQRY 048E0000 04911FFF 00032000
> * CLBCatQ 055F0000 0566DFFF 0007e000
> * COMRes 05670000 05735FFF 000c6000
> * sqloledb 05740000 057C5FFF 00086000
> * MSDART 057D0000 057F8FFF 00029000
> * COMCTL32 05800000 0588FFFF 00090000
> * comdlg32 05890000 058D6FFF 00047000
> * SHLWAPI 058E0000 05928FFF 00049000
> * SHELL32 05930000 0610CFFF 007dd000
> * MSDATL3 06110000 06127FFF 00018000
> * comctl32 06140000 06225FFF 000e6000
> * oledb32 065D0000 0664CFFF 0007d000
> * OLEDB32R 06650000 06660FFF 00011000
> * xpsqlbot 06670000 06675FFF 00006000
> * xpstar 06690000 066D6FFF 00047000
> * SQLRESLD 066F0000 066F6FFF 00007000
> * SQLSVC 06700000 06716FFF 00017000
> * ODBC32 06720000 06759FFF 0003a000
> * odbcbcp 06760000 06765FFF 00006000
> * W95SCM 06770000 0677BFFF 0000c000
> * SQLUNIRL 06780000 067ACFFF 0002d000
> * WINSPOOL 067B0000 067D5FFF 00026000
> * SHFOLDER 067E0000 067E8FFF 00009000
> * odbcint 068F0000 06906FFF 00017000
> * NDDEAPI 06AF0000 06AF6FFF 00007000
> * SQLSVC 06B00000 06B05FFF 00006000
> * xpstar 06B10000 06B18FFF 00009000
> * xplog70 06BB0000 06BC1FFF 00012000
> * xplog70 06680000 06683FFF 00004000
> * odsole70 04000000 0400FFFF 00010000
> * jmail 06E50000 06EA2FFF 00053000
> * SAMLIB 03FE0000 03FEFFFF 00010000
> * msv1_0 07530000 07553FFF 00024000
> * ACTIVEDS 07590000 075C1FFF 00032000
> * adsldpc 075D0000 075F5FFF 00026000
> * credui 07600000 0762CFFF 0002d000
> * ATL 07560000 07577FFF 00018000
> * adsldp 07670000 0769CFFF 0002d000
> * SXS 07820000 078D9FFF 000ba000
> * DBNETLIB 00D50000 00D62FFF 00013000
> * crypt32 070B0000 07147FFF 00098000
> * msadce 050B0000 0510AFFF 0005b000
> * msadcer 047B0000 047B4FFF 00005000
> * srchadm 06FB0000 06FE5FFF 00036000
> * mssws 04F00000 04F07FFF 00008000
> * athprxy 04F10000 04F17FFF 00008000
> * msi 09560000 09773FFF 00214000
> * sqlmap70 044E0000 04509FFF 0002a000
> * MAPI32 02E20000 02E3EFFF 0001f000
> * dbghelp 07E60000 07F14FFF 000b5000
> *
> * Edi: 00000001:
> * Esi: 19DC28A4: 009B694C 19DC2B88 19DDE0F0 00000002 00000003
> 00000
> 002
> * Eax: 00000000:
> * Ebx: 00000004:
> * Ecx: 19DC28A4: 009B694C 19DC2B88 19DDE0F0 00000002 00000003
> 00000
> 002
> * Edx: 7FFE0304: 0C819CC3 00010024 90C39D00 90909090 90909090
> 90909
> 090
> * Eip: 006FDA74: 8904408B 4E8B7078 4DBCE848 C0850000 468B1475
> 08408
> B3C
> * Ebp: 03B6FDE8: 03B6FE30 008405DD 00000004 19D433B8 008404C7
> 2AB4C
> 098
> * SegCs: 0000001B:
> * EFlags: 00010246: 006F0072 00720067 006D0061 00460020 006C0069
> 00730
> 065
> * Esp: 03B6FDD8: 2AB4C098 19D433B8 00000000 00000000 03B6FE30
> 00840
> 5DD
> * SegSs: 00000023:
> *
>
****************************************************************************
*
> **
> *
> ----
--
> --
> * Short Stack Dump
> * 006FDA74 Module(sqlservr+002FDA74) (CXid::Kill+0000001E)
> * 008405DD Module(sqlservr+004405DD)
> (DeadlockMonitor::ResolveDeadlock+0000002A
> )
> * 008404C7 Module(sqlservr+004404C7)
> (DeadlockMonitor::SearchAndResolve+0000013
> 4)
> * 00516E1A Module(sqlservr+00116E1A) (lockMonitor+000002F7)
> * 00516CC4 Module(sqlservr+00116CC4) (lockMonitorThread+000000A4)
> * 41075002 Module(UMS+00005002) (ProcessWorkRequests+00000272)
> * 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
> * 77BC90A2 Module(MSVCRT+000290A2) (endthread+000000A6)
> * 77E4A990 Module(kernel32+0000A990) (FlsSetValue+00000779)
> ----
--
> * Location : 006FDA74 Module(sqlservr+002FDA74) (CXid::Kill+0000001E)
> * Return Addr: 008405DD Module(sqlservr+004405DD)
> (DeadlockMonitor::ResolveDead
> lock+0000002A)
> Frame : 03B6FDE8
> Parameters:
> [1] 00000004:
> [2] 19D433B8: 00000012 000693CC 19DDE030 19D433C4 19D433C4 19DC3988
> [3] 008404C7: 8901F883 850FEC45 FFBFD2B9 145005C7 000300A2 AAE90000
> [4] 2AB4C098: 2F5BD1F0 2AB4C09C 2AB4C09C 2AB4C5E8 2AB4C5E8 2AB4C030
> 160 bytes of stack data from 03B6FD48 to 03B6FDE8
> 03B6FD48: 00000000 00000000 00000000 00000000 [............]
> :::: 8 Duplicate lines detected
> 03B6FDD8: 2AB4C098 19D433B8 00000000 00000000 [...*.3........]
>
> ----
--
> * Location : 008405DD Module(sqlservr+004405DD)
> (DeadlockMonitor::ResolveDead
> lock+0000002A)
> * Return Addr: 008404C7 Module(sqlservr+004404C7)
> (DeadlockMonitor::SearchAndRe
> solve+00000134)
> Frame : 03B6FDF4
> Parameters:
> [1] 2AB4C098: 2F5BD1F0 2AB4C09C 2AB4C09C 2AB4C5E8 2AB4C5E8 2AB4C030
> [2] 19DC3988: 009B694C 19DDE130 19DDE130 00000002 00000001 00000001
> [3] 19DC3988: 009B694C 19DDE130 19DDE130 00000002 00000001 00000001
> [4] 03B6FE48: 00000000 00000000 00931CFA 00000000 00000000 2F5BD1F0
> 12 bytes of stack data from 03B6FDE8 to 03B6FDF4
> 03B6FDE8: 03B6FE30 008405DD 00000004 [0.........]
>
> ----
--
> * Location : 008404C7 Module(sqlservr+004404C7)
> (DeadlockMonitor::SearchAndRe
> solve+00000134)
> * Return Addr: 00516E1A Module(sqlservr+00116E1A) (lockMonitor+000002F7)
> Frame : 03B6FE30
> Parameters:
> [1] 19DC3988: 009B694C 19DDE130 19DDE130 00000002 00000001 00000001
> [2] 00C56780: 00C56780 00C56780 00000000 00000003 00000000 00000000
> [3] 19DD6098: 01000004 00000000 00000000 00000000 00000000 00000000
> [4] 00000001:
> 60 bytes of stack data from 03B6FDF4 to 03B6FE30
> 03B6FDF4: 19D433B8 008404C7 2AB4C098 19DC3988 [.3.......*.9..]
> 03B6FE04: 19DC3988 03B6FE48 00000000 00931CFA [.9..H.........]
> 03B6FE14: 02A65EDC 19D433B8 00000001 03B6FDFC [.^...3........]
> 03B6FE24: 03B6FEB4 009803BB 00000001 [.........]
>
> ----
--
> * Location : 00516E1A Module(sqlservr+00116E1A) (lockMonitor+000002F7)
> * Return Addr: 00516CC4 Module(sqlservr+00116CC4)
> (lockMonitorThread+000000A4)
> Frame : 03B6FEC0
> Parameters:
> [1] 00C56780: 00C56780 00C56780 00000000 00000003 00000000 00000000
> [2] 0363503C: 00000000 00000000 03635010 00000000 00516C29 03B6FF1C
> [3] 00000000:
> [4] 77F43741: 90000CC2 90909090 00011AB8 0300BA00 D2FF7FFE 900004C2
> 144 bytes of stack data from 03B6FE30 to 03B6FEC0
> 03B6FE30: 03B6FEC0 00516E1A 19DC3988 00C56780 [....nQ..9...g..]
> 03B6FE40: 19DD6098 00000001 00000000 00000000 [.`...........]
> 03B6FE50: 00931CFA 00000000 00000000 2F5BD1F0 [...........[/]
> 03B6FE60: 2AB4C098 2F5BD44C 00000000 FFFFFFFF [...*L.[/......]
> 03B6FE70: 00000000 00000000 C1F7FA5B 2F5BD44C [......[...L.[/]
> 03B6FE80: 00000061 C1F8216B C1F7FA5B 00000065 [a...k!..[...e...]
> 03B6FE90: 00000000 2F5BD1F0 00000000 00000000 [.....[/......]
> 03B6FEA0: 2F5BD1F0 03B6FEEC 00001388 19DC3988 [..[/.......9..]
> 03B6FEB0: 03B6FE3C 03B6FEEC 0098061F 00000006 [<............]
>
> ----
--
> * Location : 00516CC4 Module(sqlservr+00116CC4)
> (lockMonitorThread+000000A4)
> * Return Addr: 41075002 Module(UMS+00005002)
(ProcessWorkRequests+00000272)
> Frame : 03B6FEFC
> Parameters:
> [1] 00000000:
> [2] 03635010: 41076104 00000000 00000000 00000000 00000000 C1F7FA5B
> [3] 00000002:
> [4] 00000000:
> 60 bytes of stack data from 03B6FEC0 to 03B6FEFC
> 03B6FEC0: 03B6FEFC 00516CC4 00C56780 0363503C [....lQ..g..<Pc.]
> 03B6FED0: 00000000 77F43741 77E41817 19DD6098 [...A7.w...w.`..]
> 03B6FEE0: 77E41864 03B6FEC8 77E4178F 03B6FF64 [d..w......wd...]
> 03B6FEF0: 00488754 009A7D90 00000000 [T.H..}.....]
>
> ----
--
> * Location : 41075002 Module(UMS+00005002)
(ProcessWorkRequests+00000272)
> * Return Addr: 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
> Frame : 03B6FF70
> Parameters:
> [1] 00C56788: 00000000 00000003 00000000 00000000 073AFF1C 0509FF1C
> [2] 03635268: 0000078C 000002DC 00000009 00000000 00000000 3EBEC2C9
> [3] 03B6FFB8: 03B6FFEC 77E4A990 03634D68 00000000 00000000 03634D68
> [4] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
> 116 bytes of stack data from 03B6FEFC to 03B6FF70
> 03B6FEFC: 03B6FF70 41075002 00000000 03635010 [p...P.A....Pc.]
> 03B6FF0C: 00000002 00000000 00000001 00C56650 [.........Pf..]
> 03B6FF1C: 00000000 00000000 0000078C 03635080 [..........Pc.]
> 03B6FF2C: 00000000 00000000 00000002 03B6FF38 [.........8...]
> 03B6FF3C: 03B6FF38 00000000 00000002 00000000 [8............]
> 03B6FF4C: 41074A13 00000000 00000000 03635080 [.J.A.......Pc.]
> 03B6FF5C: 000DBBA0 00C56650 03B6FFA8 41075428 [...Pf.....(T.A]
> 03B6FF6C: 00000000 [...]
>
> ----
--
> * Location : 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
> * Return Addr: 77BC90A2 Module(MSVCRT+000290A2) (endthread+000000A6)
> Frame : 03B6FF84
> Parameters:
> [1] 00C56780: 00C56780 00C56780 00000000 00000003 00000000 00000000
> [2] 00000000:
> [3] 00000000:
> [4] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
> 20 bytes of stack data from 03B6FF70 to 03B6FF84
> 03B6FF70: 41074D90 41074698 00C56788 03635268 [.M.A.F.A.g..hRc.]
> 03B6FF80: 03B6FFB8 [...]
>
> ----
--
> * Location : 77BC90A2 Module(MSVCRT+000290A2) (endthread+000000A6)
> * Return Addr: 77E4A990 Module(kernel32+0000A990) (FlsSetValue+00000779)
> Frame : 03B6FFB8
> Parameters:
> [1] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
> [2] 00000000:
> [3] 00000000:
> [4] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
> 52 bytes of stack data from 03B6FF84 to 03B6FFB8
> 03B6FF84: 03634D68 77BC90A2 00C56780 00000000 [hMc...w.g.....]
> 03B6FF94: 00000000 03634D68 B6C14C90 03B6FF90 [...hMc..L.....]
> 03B6FFA4: 89450A30 03B6FFDC 77BC4D50 77BA4040 [0.E....PM.w@.@..w]
> 03B6FFB4: 00000000 [...]
>
> ----
--
> * Location : 77E4A990 Module(kernel32+0000A990) (FlsSetValue+00000779)
> * Return Addr: 00000000 Module(sqlservr+FFC00000)
> Frame : 03B6FFEC
> Parameters:
> [1] 77BC9032: 40680C6A E877BA40 FFFFD3EE BAEC35FF 15FF77BE 77BED9FC
> [2] 03634D68: 048E76C0 048E7760 048E77A0 04900870 00000000 00000001
> [3] 00000000:
> [4] 00000000:
> *
> ----
--
> --
> PSS @.0x19DD6098
> --
> pspid = 4 m_dwLoginFlags = 0x0000 plsid = 433398744
> pbackground = 1
> pbSid
> --
> 01 .
> sSecFlags = 0x10
> pdeadlockpri = 0 poffsets = 0x0 pss_stats = 0x0
> ptickcount = 72093 pcputickcount = 169421353078
> ploginstamp = 4 ptimestamp = 1900-01-01 00:00:00.000
> plangid = 0 pdateformat = 0 pdatefirst = 0
> poptions = 0x0 poptions2 = 0x0 pline = 0
> pcurstepno = 0 prowcount = 0 pstatlist = 0
> pcurcmd = 35 pseqstat = 0 ptextsize = 4096
> pretstat = 0 CNestLevel = 0 @.@.procid = 0
> pslastbatchstarttime = 1900-01-01 00:00:00.000 pmemusage = -174655
> hLicense = 0 tpFlags = 0x1 isolation_level = 0
> fips_flag = 0x0 sSaveSecFlags = 0x0 psavedb = 0
> pfetchstat = 0 pcrsrows = 0
> pslastbatchtime = 1900-01-01 00:00:00.000 pubexecdb = 0
> fInReplicatedProcExec = 0 pMsqlXact = 0x19DD6A10 presSemCount => [0]62322896
> presSemCount = [0]62322896 pcputot = 0
> pcputotstart = 0 pcpucmdstart = 0 pbufread = 0
> pbufreadstart = 0 plogbufread = 0 plogbufreadstart = 0
> pbufwrite = 0 pbufwritestart = 0 pLockTimeout => 4294967295
> pUtilResultSet = 0x00000000
> pec
> --
> ec_pss->pspid = 4 ecid = 0 ec_stat = 0x0
> ec_stat2 = 0x100000 ec_atomic = 0x0 pcurdb = 0
> ec_lasterror = 0 ec_preverror = 0 ec_cpucur = 0
> ec_cmderrs = 0 ec_timeslice = 100 ec_dbtable =0x00000000
> ec_reswait = 0xa74488 ec_dbindex = -1 ec_waittype = 0x0000
> Waittime = 0 ec_umsContext->m_pSched->m_id (SchedulerId) =0x3
> ec_umsContext->m_workercntxt->m_id (threadId) = 0x78c
>
>
> ExecutionContext Summary @.0x19DD63C0
> --
> ec_pss->pspid = 4 ecid = 0 ec_stat = 0x0
> ec_stat2 = 0x100000 ec_atomic = 0x0 pcurdb = 0
> ec_lasterror = 0 ec_preverror = 0 ec_cpucur = 0
> ec_cmderrs = 0 ec_timeslice = 100 ec_dbtable =0x00000000
> ec_reswait = 0xa74488 ec_dbindex = -1 ec_waittype = 0x0000
> Waittime = 0 ec_umsContext->m_pSched->m_id (SchedulerId) =0x3
> ec_umsContext->m_workercntxt->m_id (threadId) = 0x78c
>
>
> EC @.0x19DD63C0
> --
> ec_pss->pspid = 4 ecid = 0 ec_cmderrs = 0
> ec_stat = 0x0 ec_stat2 = 0x100000 ec_atomic = 0x0
> ec_curdb = 0 ec_dbtable = 0x0 ec_dbstat = 0x0
> ec_lospin = 0x0 ec_dbindex = -1 ec_lasterror = 0
> ec_save_ex_number = 0 ec_save_ex_address = 0x00000000
> ec_cpucur = 0 ec_timeslice = 100 ec_next = 0x00000000
> ec_prev = 0x00000000 ec_state = 1 ec_waittype = 0x0000
> ec_dbstat2 = 0 ec_preverror = 0 ec_subecstat = 1
> ec_subecnext = 0x00000000 ec_resSemWaitInfo = 0
> ec_umsContext->m_pSched->m_id (SchedulerId) = 0x3
> ec_umsContext->m_workercntxt->m_id (threadId) = 0x78c
> ec_backupContext = 0x00000000 ec_dbccContext => 0x00000000
> ec_allocFile = 0x00000000 ec_buftrace.Index = 0
> EXCEPT (null) @.0x03B6FE08
> --
> exc_number = 0 exc_severity = 0
> exc_func = hdl_prntbackout+0 Line 0+0x0
>
>

No comments:

Post a Comment