Please start any new threads on our new
site at https://forums.sqlteam.com. We've got lots of great SQL Server
experts to answer whatever question you can come up with.
Author |
Topic |
Alexey
Starting Member
8 Posts |
Posted - 2006-03-10 : 15:24:11
|
I'm not sure where i have to post this, but i hope this is correct branch.We have a production server with MS SQL Server 2000 SP4 and with a production db on it. It might work fine for several days, maybe even for a week, and then it starts to log this messages every 20 seconds. It logs them both in Windows' Event Logs and in SQL Server Logs.If not restarted, this leads to performance degradation and eventually it stops servicing the application's requests.I usually solve this by restarting MSSQLSERVER through the Service Control Manager. It works for another few days and starts to log those messages again.I would like to know what causes that and how it can be solved (corrected). Please, help me with that issue. This lasts for some time already and i can't figure out what's happening. And sorry for my bad english. :(Bellow i'm posting several examples of those messages without stack dump, and one with stack dump. I got this from the SQL server ERRORLOG file.2006-03-10 19:26:55.01 spid54 Using 'dbghelp.dll' version '4.0.5'*Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL\log\SQLDump6994.txt2006-03-10 19:26:58.18 spid54 Error: 0, Severity: 19, State: 02006-03-10 19:26:58.18 spid54 SqlDumpExceptionHandler: Process 54 generated fatal exception c0000095 EXCEPTION_INT_OVERFLOW. SQL Server is terminating this process..* *******************************************************************************[ Stack Dump here skipped.]* -------------------------------------------------------------------------------2006-03-10 19:27:00.65 spid54 Stack Signature for the dump is 0x5A50D8312006-03-10 19:27:00.66 spid54 Error: 0, Severity: 19, State: 02006-03-10 19:27:00.66 spid54 language_exec: Process 54 generated an access violation. SQL Server is terminating this process..2006-03-10 19:27:20.79 spid54 Using 'dbghelp.dll' version '4.0.5'*Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL\log\SQLDump6994.txt2006-03-10 19:27:23.90 spid54 Error: 0, Severity: 19, State: 02006-03-10 19:27:23.90 spid54 SqlDumpExceptionHandler: Process 54 generated fatal exception c0000095 EXCEPTION_INT_OVERFLOW. SQL Server is terminating this process..* *******************************************************************************[ Stack Dump here skipped.]* -------------------------------------------------------------------------------2006-03-10 19:27:26.37 spid54 Stack Signature for the dump is 0x5A50D8312006-03-10 19:27:26.37 spid54 Error: 0, Severity: 19, State: 02006-03-10 19:27:26.37 spid54 language_exec: Process 54 generated an access violation. SQL Server is terminating this process..2006-03-10 19:27:46.37 spid54 Using 'dbghelp.dll' version '4.0.5'*Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL\log\SQLDump6994.txt2006-03-10 19:27:49.51 spid54 Error: 0, Severity: 19, State: 02006-03-10 19:27:49.51 spid54 SqlDumpExceptionHandler: Process 54 generated fatal exception c0000095 EXCEPTION_INT_OVERFLOW. SQL Server is terminating this process..* *******************************************************************************[ Stack Dump here skipped.]* -------------------------------------------------------------------------------2006-03-10 19:27:52.10 spid54 Stack Signature for the dump is 0x5A50D8312006-03-10 19:27:52.15 spid54 Error: 0, Severity: 19, State: 02006-03-10 19:27:52.15 spid54 language_exec: Process 54 generated an access violation. SQL Server is terminating this process..2006-03-10 19:28:12.29 spid57 Using 'dbghelp.dll' version '4.0.5'*Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL\log\SQLDump6994.txt2006-03-10 19:28:15.54 spid57 Error: 0, Severity: 19, State: 02006-03-10 19:28:15.54 spid57 SqlDumpExceptionHandler: Process 57 generated fatal exception c0000095 EXCEPTION_INT_OVERFLOW. SQL Server is terminating this process..* ********************************************************************************* BEGIN STACK DUMP:* 03/10/06 19:28:15 spid 57** Exception Address = 00534F2F* Exception Code = c0000095 EXCEPTION_INT_OVERFLOW* Input Buffer 92 bytes -* EXECUTE msdb.dbo.sp_sqlagent_get_perf_counters* ** MODULE BASE END SIZE* sqlservr 00400000 00CBAFFF 008bb000* Invalid Address 77F80000 77FFBFFF 0007c000* ADVAPI32 7C2D0000 7C334FFF 00065000* KERNEL32 7C570000 7C622FFF 000b3000* RPCRT4 77D30000 77DA7FFF 00078000* MSVCP71 7C3A0000 7C41AFFF 0007b000* MSVCR71 7C340000 7C395FFF 00056000* opends60 41060000 41065FFF 00006000* SHELL32 7CF30000 7D174FFF 00245000* GDI32 77F40000 77F7BFFF 0003c000* USER32 77E10000 77E78FFF 00069000* SHLWAPI 70A70000 70AD5FFF 00066000* msvcrt 78000000 78044FFF 00045000* COMCTL32 71710000 71793FFF 00084000* sqlsort 42AE0000 42B6FFFF 00090000* ums 41070000 4107DFFF 0000e000* sqlevn70 41080000 4108AFFF 0000b000* NETAPI32 7CDC0000 7CE12FFF 00053000* DNSAPI 77980000 779A3FFF 00024000* WSOCK32 75050000 75057FFF 00008000* WS2_32 75030000 75043FFF 00014000* WS2HELP 75020000 75027FFF 00008000* NETRAP 751C0000 751C5FFF 00006000* NTDSAPI 77BF0000 77C00FFF 00011000* WLDAP32 77950000 7797AFFF 0002b000* SECUR32 2BA00000 2BA0EFFF 0000f000* SAMLIB 75150000 7515FFFF 00010000* AUTHZ 2BA20000 2BA2FFFF 00010000* ole32 7CE20000 7CF0EFFF 000ef000* XOLEHLP 2BCC0000 2BCC7FFF 00008000* MSDTCPRX 2BCD0000 2BD8AFFF 000bb000* MTXCLU 2BD90000 2BD9FFFF 00010000* VERSION 77820000 77826FFF 00007000* LZ32 759B0000 759B5FFF 00006000* CLUSAPI 73930000 7393FFFF 00010000* RESUTILS 2BDA0000 2BDACFFF 0000d000* USERENV 7C0F0000 7C153FFF 00064000* rnr20 782C0000 782CBFFF 0000c000* iphlpapi 77340000 77352FFF 00013000* ICMP 77520000 77524FFF 00005000* MPRAPI 77320000 77336FFF 00017000* OLEAUT32 779B0000 77A4AFFF 0009b000* ACTIVEDS 773B0000 773DEFFF 0002f000* ADSLDPC 77380000 773A2FFF 00023000* RTUTILS 77830000 7783DFFF 0000e000* SETUPAPI 77880000 7790DFFF 0008e000* RASAPI32 774E0000 77513FFF 00034000* rasman 774C0000 774D0FFF 00011000* TAPI32 77530000 77551FFF 00022000* DHCPCSVC 77360000 77378FFF 00019000* winrnr 777E0000 777E7FFF 00008000* rasadhlp 777F0000 777F4FFF 00005000* SSNETLIB 2C900000 2C915FFF 00016000* NTMARTA 2C960000 2C97CFFF 0001d000* WINSPOOL 77800000 7781DFFF 0001e000* MPR 76620000 76630FFF 00011000* security 75500000 75503FFF 00004000* msafd 74FD0000 74FEDFFF 0001e000* wshtcpip 75010000 75016FFF 00007000* SSmsLPCn 2CF20000 2CF27FFF 00008000* SSnmPN70 410D0000 410D6FFF 00007000* mswsock 74FF0000 75001FFF 00012000* kerberos 78280000 782B4FFF 00035000* cryptdll 76670000 7667DFFF 0000e000* MSASN1 77430000 77440FFF 00011000* rsabase 7CA00000 7CA22FFF 00023000* CRYPT32 7C740000 7C7CBFFF 0008c000* SQLFTQRY 41020000 41045FFF 00026000* CLBCATQ 7C950000 7C9DEFFF 0008f000* sqloledb 75370000 753ECFFF 0007d000* MSDART 2D6A0000 2D6C3FFF 00024000* comdlg32 76B30000 76B6DFFF 0003e000* MSDATL3 2D6D0000 2D6E4FFF 00015000* oledb32 2D9F0000 2DA5FFFF 00070000* OLEDB32R 2DA60000 2DA70FFF 00011000* xpstar 410F0000 4113CFFF 0004d000* SQLRESLD 42AC0000 42ACBFFF 0000c000* SQLSVC 2DB00000 2DB1AFFF 0001b000* ODBC32 2DB20000 2DB59FFF 0003a000* odbcbcp 2DB60000 2DB65FFF 00006000* W95SCM 41140000 4114CFFF 0000d000* SQLUNIRL 41090000 410BCFFF 0002d000* SHFOLDER 719B0000 719B7FFF 00008000* odbcint 2DC70000 2DC86FFF 00017000* NDDEAPI 769A0000 769A6FFF 00007000* SQLSVC 2DC90000 2DC95FFF 00006000* xpstar 2DCA0000 2DCA8FFF 00009000* dbghelp 02800000 028FFFFF 00100000** Edi: 2D48E7EC: 4A006300 4F8CB0E0 00000100 0042C56B 4A5F7BA0 00000001 * Esi: 4F8CB098: 1BAF7C58 00000000 4F8CB0B8 4F8CBA08 1BAF7D34 4A5F6350 * Eax: 1BAF7D34: 00534F2F 00000000 00000100 00010000 00000000 00755B3D * Ebx: 00534F2F: 709938F7 5700B39D 88107D8B 45C6DA5D 5D8903D8 F15D88DC * Ecx: 4F8CB098: 1BAF7C58 00000000 4F8CB0B8 4F8CBA08 1BAF7D34 4A5F6350 * Edx: 2D48E7EC: 4A006300 4F8CB0E0 00000100 0042C56B 4A5F7BA0 00000001 * Eip: 00534F2F: 709938F7 5700B39D 88107D8B 45C6DA5D 5D8903D8 F15D88DC * Ebp: 2D48E834: 2D48E854 00438D12 4A5F6C80 00000000 4A5F6A80 4A5F6350 * SegCs: 0000001B: * EFlags: 00010202: 005C003A 00490057 004E004E 003B0054 003A0043 0057005C * Esp: 2D48E7C4: 00418425 00000000 4A5F6C48 4A5F6350 0000E700 4F8CA850 * SegSs: 00000023: * ******************************************************************************** -------------------------------------------------------------------------------* Short Stack Dump* 00534F2F Module(sqlservr+00134F2F)* 00438D12 Module(sqlservr+00038D12)* 0043990D Module(sqlservr+0003990D)* 0040C369 Module(sqlservr+0000C369)* 0040C285 Module(sqlservr+0000C285)* 00429EAA Module(sqlservr+00029EAA)* 00415D04 Module(sqlservr+00015D04)* 00416214 Module(sqlservr+00016214)* 00415F28 Module(sqlservr+00015F28)* 0050BCEF Module(sqlservr+0010BCEF)* 0050BB13 Module(sqlservr+0010BB13)* 00415D04 Module(sqlservr+00015D04)* 00416214 Module(sqlservr+00016214)* 00415F28 Module(sqlservr+00015F28)* 0049C32E Module(sqlservr+0009C32E)* 0049C46A Module(sqlservr+0009C46A)* 41075309 Module(ums+00005309) (ProcessWorkRequests+000002D9 Line 456+00000000)* 41074978 Module(ums+00004978) (ThreadStartRoutine+00000098 Line 263+00000007)* 7C34940F Module(MSVCR71+0000940F) (endthread+000000AA)* 7C57B388 Module(KERNEL32+0000B388) (lstrcmpiW+000000B7)* -------------------------------------------------------------------------------2006-03-10 19:28:18.04 spid57 Stack Signature for the dump is 0x5A50D8312006-03-10 19:28:18.04 spid57 Error: 0, Severity: 19, State: 02006-03-10 19:28:18.04 spid57 language_exec: Process 57 generated an access violation. SQL Server is terminating this process.. |
|
paulrandal
Yak with Vast SQL Skills
899 Posts |
Posted - 2006-03-10 : 15:53:44
|
No idea without being able to resolve the symbols from the stackdump. You need to call Product Support to help debug this one. Nothing we can do through forums/newsgroups.ThanksPaul RandalLead Program Manager, Microsoft SQL Server Storage Engine + SQL Express(Legalese: This posting is provided "AS IS" with no warranties, and confers no rights.) |
|
|
|
|
|
|
|