Please start any new threads on our new site at https://forums.sqlteam.com. We've got lots of great SQL Server experts to answer whatever question you can come up with.

 All Forums
 SQL Server 2005 Forums
 SQL Server Administration (2005)
 Exception Code = c0000005 EXCEPTION_ACCESS_VIOL

Author  Topic 

jacksonkleip
Starting Member

1 Post

Posted - 2010-02-12 : 10:47:19
I started a few days ago getting these errors on my sql server 2005 sp3 database. It is always attributable and creates the dump for the exact same statement. I have run a dbcc check on the database and table without issues with 0 rows returned and run the exact query that is failing without producing a dump outside of the application. The users are utilizing business objects and I think the problem is there but want to make sure as I have some veritas NBU_Cache continually attached on this server as well and/or wanting to make sure it is not a bug.

This is what I see in the error log

2010-02-12 08:19:07.270 spid78 * Exception Address = 000000000172128B Module(sqlservr+000000000072128B)
2010-02-12 08:19:07.270 spid78 * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
2010-02-12 08:19:07.270 spid78 ***Stack Dump being sent to M:\Data1\CHISQLPROD01\SystemDatabases\MSSQL.1\MSSQL\LOG\SQLDump0107.txt
2010-02-12 08:19:07.270 spid78 SqlDumpExceptionHandler: Process 78 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
2010-02-12 08:19:07.270 spid78 * BEGIN STACK DUMP:
2010-02-12 08:19:07.280 spid78 * Short Stack Dump
2010-02-12 08:19:07.310 spid78 Stack Signature for the dump is 0x00000000F5B63428
2010-02-12 08:19:15.500 spid78 External dump process return code 0x20000001.

Here is the stack dump

=====================================================================
BugCheck Dump
=====================================================================

This file is generated by Microsoft SQL Server
version 9.00.4035.00
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.


Computer type is AT/AT COMPATIBLE.
Current time is 08:22:30 02/12/10.
16 Unknown CPU 9., 3 Mhz processor (s).
Windows NT 5.2 Build 3790 CSD Service Pack 2.

Memory
MemoryLoad = 12%
Total Physical = 131069 MB
Available Physical = 115154 MB
Total Page File = 132197 MB
Available Page File = 119132 MB
Total Virtual = 8388607 MB
Available Virtual = 8256357 MB
***Stack Dump being sent to M:\Data1\CHISQLPROD01\SystemDatabases\MSSQL.1\MSSQL\LOG\SQLDump0116.txt
SqlDumpExceptionHandler: Process 67 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is
terminating this process.
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 02/12/10 08:22:30 spid 67
*
*
* Exception Address = 000000000172128B Module(sqlservr+000000000072128B)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 0000000000000060
* Input Buffer 272 bytes -
* SELECT ObjectID, Version, LastModifyTime, CRC, Properties FRO
* M dbo.CMS_InfoObjects6 WHERE ObjectID IN (201) ORDER BY ObjectID
*
*
* MODULE BASE END SIZE
* sqlservr 0000000001000000 0000000003651FFF 02652000
* ntdll 0000000077EC0000 0000000077FFAFFF 0013b000
* kernel32 0000000077D40000 0000000077EB2FFF 00173000
* MSVCR80 0000000078130000 00000000781F8FFF 000c9000
* msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000
* MSVCP80 000000007C420000 000000007C528FFF 00109000
* ADVAPI32 000007FF7FEE0000 000007FF7FFE5FFF 00106000
* RPCRT4 000007FF7FD30000 000007FF7FEC8FFF 00199000
* Secur32 000007FF7E9C0000 000007FF7E9E1FFF 00022000
* sqlos 00000000344D0000 00000000344D6FFF 00007000
* USERENV 000007FF7C680000 000007FF7C789FFF 0010a000
* USER32 0000000077C20000 0000000077D2BFFF 0010c000
* GDI32 000007FF7FC90000 000007FF7FD2BFFF 0009c000
* WINMM 000007FF7E240000 000007FF7E28FFFF 00050000
* opends60 00000000333E0000 00000000333E7FFF 00008000
* NETAPI32 000007FF77370000 000007FF77408FFF 00099000
* psapi 000007FF7E380000 000007FF7E38FFFF 00010000
* instapi 0000000048060000 000000004806CFFF 0000d000
* CLUSAPI 000007FF7B3A0000 000007FF7B3C3FFF 00024000
* ole32 000007FF57140000 000007FF573C4FFF 00285000
* OLEAUT32 000007FF7EBC0000 000007FF7ECD5FFF 00116000
* RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000
* sqlevn70 000000004F610000 000000004F7B8FFF 001a9000
* rsaenh 0000000068000000 000000006804BFFF 0004c000
* AUTHZ 000007FF7E490000 000007FF7E4BDFFF 0002e000
* MSCOREE 000006427EE50000 000006427EEBFFFF 00070000
* msv1_0 000007FF7E500000 000007FF7E543FFF 00044000
* WS2_32 000007FF77310000 000007FF7733FFFF 00030000
* WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000
* iphlpapi 000007FF57040000 000007FF57070FFF 00031000
* kerberos 000007FF77410000 000007FF774C3FFF 000b4000
* cryptdll 000007FF7DC90000 000007FF7DC9EFFF 0000f000
* MSASN1 000007FF7D340000 000007FF7D369FFF 0002a000
* schannel 000007FF7DD50000 000007FF7DD90FFF 00041000
* CRYPT32 000007FF7D370000 000007FF7D4CEFFF 0015f000
* COMRES 000007FF7EAF0000 000007FF7EBB5FFF 000c6000
* XOLEHLP 000007FF5C5B0000 000007FF5C5B6FFF 00007000
* MSDTCPRX 000007FF67140000 000007FF67213FFF 000d4000
* msvcp60 00000000183E0000 00000000184C9FFF 000ea000
* MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000
* VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000
* WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000
* mswsock 000007FF771B0000 000007FF7722CFFF 0007d000
* DNSAPI 000007FF7E8F0000 000007FF7E93DFFF 0004e000
* winrnr 000007FF7E9F0000 000007FF7E9FAFFF 0000b000
* WLDAP32 000007FF7E950000 000007FF7E9B5FFF 00066000
* rasadhlp 000007FF7EA00000 000007FF7EA06FFF 00007000
* hnetcfg 000007FF6D200000 000007FF6D292FFF 00093000
* wshtcpip 000007FF77170000 000007FF7717AFFF 0000b000
* security 000007FF77530000 000007FF77534FFF 00005000
* msfte 0000000049980000 0000000049D2DFFF 003ae000
* dbghelp 000000001AE80000 000000001AFDCFFF 0015d000
* WINTRUST 000007FF7E3E0000 000007FF7E42DFFF 0004e000
* imagehlp 000007FF7E470000 000007FF7E482FFF 00013000
* dssenh 0000000068100000 000000006813EFFF 0003f000
* NTMARTA 000007FF7E4C0000 000007FF7E4FBFFF 0003c000
* SAMLIB 000007FF77150000 000007FF77165FFF 00016000
* ntdsapi 000007FF7DCB0000 000007FF7DCD3FFF 00024000
* xpsp2res 000000001D390000 000000001D656FFF 002c7000
* CLBCatQ 000007FF7EA10000 000007FF7EAEDFFF 000de000
* sqlncli 00000000337A0000 0000000033A63FFF 002c4000
* COMCTL32 000007FF76200000 000007FF762EEFFF 000ef000
* comdlg32 000007FF7D540000 000007FF7D5B6FFF 00077000
* SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000
* SHELL32 000007FF7F190000 000007FF7FB9AFFF 00a0b000
* comctl32 000007FF7F000000 000007FF7F186FFF 00187000
* SQLNCLIR 0000000035000000 0000000035032FFF 00033000
* msftepxy 00000000039D0000 00000000039F0FFF 00021000
* xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000
* xpstar90 0000000053C30000 0000000053CB7FFF 00088000
* SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000
* ODBC32 000007FF63F00000 000007FF63F66FFF 00067000
* BatchParser90 00000000520C0000 00000000520ECFFF 0002d000
* ATL80 000000007C630000 000000007C64EFFF 0001f000
* odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000
* xpstar90 000000001FCE0000 000000001FD05FFF 00026000
* xplog70 0000000034730000 000000003473FFFF 00010000
* xplog70 000000001FD20000 000000001FD22FFF 00003000
* odsole70 0000000033380000 0000000033397FFF 00018000
* scrrun 000007FF79170000 000007FF791B4FFF 00045000
* MFC42 000007FF796F0000 000007FF79859FFF 0016a000
* SXS 000007FF7CC60000 000007FF7CE46FFF 001e7000
* sqlvdi 0000000034510000 000000003453BFFF 0002c000
* msxmlsql 0000000078800000 0000000078967FFF 00168000
* msxml3 000007FF56D40000 000007FF56F53FFF 00214000
*
* P1Home: 0000000000000015:
* P2Home: 0000000025A8EC30: 0000000000000015 0000000025A8EC30 000000008F855090 0000000000000000 FFFFFAD3
11C466F0 FFFFFAD381D591A0
* P3Home: 000000008F855090: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000000
00000000 0000000000000000
* P4Home: 0000000000000000:
* P5Home: FFFFFAD311C466F0:
* P6Home: FFFFFAD381D591A0:
* ContextFlags: 000000000010001F:
* MxCsr: 0000000000001FA0:
* SegCs: 0000000000000033:
* SegDs: 000000000000002B:
* SegEs: 000000000000002B:
* SegFs: 0000000000000053:
* SegGs: 000000000000002B:
* SegSs: 000000000000002B:
* EFlags: 0000000000010206: 0044000000650078 004F004C00460045 0052004900440047 005C003A0043003D 00750063
006F0044 0074006E0065006D
* Rax: 0000000017A0F720: 000000008F855090 000000008F855090 0000000000000001 00000004000014C8 00000002
01E90910 0000000201E90B90
* Rcx: 0000000000000000:
* Rdx: 00000000000014C8:
* Rbx: 000000008F855090: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000000
00000000 0000000000000000
* Rsp: 0000000025A8F1D0: 000000027D774D98 000000027D774E04 0000000000000000 000000027D7748A0 00000000
00000000 0000000001825BE8
* Rbp: 0000000000000000:
* Rsi: 0000000003CBE598: 00000000013A6000 0000000003CBE090 0000000003CBEB00 00000000000336E1 00000000
00BA6460 0000000000BA6088
* Rdi: 0000000003CBEAA8: 000000000140207E 00000000000DC8C5 000000000006327F 00000000009BDE5F 00000000
17A00080 0000000000009C49
* R8: 00000000000007B5:
* R9: 0000000000000000:
* R10: 000000027D7748A0: 000000000124C4E0 0000000200000000 0000000000000000 0000000700000017 00000000
00000006 0000000000000000
* R11: 0000000000009C49:
* R12: 0000000001729C10: 8948018B28EC8348 402474894838245C 48247C894801F883 850FF98B48F28B48 F608528B
000000A8 0021C066850F10C2
* R13: 0000000017A0F738: 00000004000014C8 0000000201E90910 0000000201E90B90 0000000000000002 00000003
00000000 00000001CDAD02B0
* R14: 0000000025A8F2C8: 0000000A00000004 FFFFFFFE2133C7D2 000000000171000A 0000000025A8F2B0 00000002
7D7748A0 0000000025A8F2A0
* R15: 0000000000000000:
* Rip: 000000000172128B: 046880F660418B48 0001F7850F040000 508B4810438B4800 83D4FF41CE8B4928 0000028E
850F01F8 24905C840FDB8548
* *******************************************************************************
* -------------------------------------------------------------------------------
* Short Stack Dump
000000000172128B Module(sqlservr+000000000072128B)
000000000155A344 Module(sqlservr+000000000055A344)
00000000017E04AD Module(sqlservr+00000000007E04AD)
000000000171E8AE Module(sqlservr+000000000071E8AE)
000000000170B8EA Module(sqlservr+000000000070B8EA)
00000000017053E2 Module(sqlservr+00000000007053E2)
000000000170A59D Module(sqlservr+000000000070A59D)
00000000016BC32E Module(sqlservr+00000000006BC32E)
00000000016BC5C9 Module(sqlservr+00000000006BC5C9)
00000000016B5CC4 Module(sqlservr+00000000006B5CC4)
000000000155E837 Module(sqlservr+000000000055E837)
0000000001522F59 Module(sqlservr+0000000000522F59)
00000000015372B0 Module(sqlservr+00000000005372B0)
00000000014F72F8 Module(sqlservr+00000000004F72F8)
00000000781337D7 Module(MSVCR80+00000000000037D7)
0000000078133894 Module(MSVCR80+0000000000003894)
0000000077D6B71A Module(kernel32+000000000002B71A)

PSS @0x0000000279499B40
-----------------------



CSession @0x0000000279498410
----------------------------
m_spid = 67 m_cRef = 11 m_rgcRefType[0] = 1
m_rgcRefType[1] = 1 m_rgcRefType[2] = 8 m_rgcRefType[3] = 1
m_rgcRefType[4] = 0 m_rgcRefType[5] = 0 m_pmo = 0x0000000279498080
m_pstackBhfPool = 0x0000000000000000 m_dwLoginFlags = 0x83e0 m_fBackground = 0
m_fClientRequestConnReset = 0 m_fUserProc = -1 m_fConnReset = 0
m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 1
m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0
m_ulLoginStamp = 49742 m_eclClient = 5 m_protType = 5
m_hHttpToken = FFFFFFFFFFFFFFFF

m_pV7LoginRec
---------------------
0000000000000000: a8000000 02000972 00100000 00000007 c4280000 †.......r.........(..

0000000000000014: 00000000 e0830000 68010000 09040000 5e000000 †........h.......^...

0000000000000028: 00000000 00000000 5e000000 5e000000 00000000 †........^...^.......

000000000000003C: 5e000400 66000000 66000d00 0017a477 55128000 †^...f...f......wU...

0000000000000050: 28008000 00000000 00000000 0000†††††††††††††††(.............




CPhysicalConnection @0x00000002794982E0
---------------------------------------
m_pPhyConn->m_pmo = 0x0000000279498080
m_pPhyConn->m_pNetConn = 0x0000000279498B00
m_pPhyConn->m_pConnList = 0x00000002794983E0
m_pPhyConn->m_pSess = 0x0000000279498410 m_pPhyConn->m_fTracked = -1
m_pPhyConn->m_cbPacketsize = 4096 m_pPhyConn->m_fMars = 0 m_pPhyConn->m_fKill = 0


CBatch @0x0000000279498FD0
--------------------------
m_pSess = 0x0000000279498410 m_pConn = 0x0000000279498EC0 m_cRef = 3
m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 1
m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x0000000003C3A478


EXCEPT (null) @0x0000000025A8C0F8
---------------------------------
exc_number = 0 exc_severity = 0 exc_func = 0x0000000001B08F70



Task @0x0000000003C3A478
------------------------
CPU Ticks used (ms) = 0 Task State = 2
WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0
WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0x5
ThreadId = 0x14c8 m_state = 0 m_eAbortSev = 0



EC @0x0000000279499B50
----------------------
spid = 67 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x0 ec_atomic = 0x0 __fSubProc = 1
ec_dbccContext = 0x0000000000000000 __pSETLS = 0x0000000279498F30 __pSEParams = 0x0000000279499350
__pDbLocks = 0x0000000279499C10

SEInternalTLS @0x0000000279498F30
---------------------------------
m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x0000000003C3A478
m_activeHeapDatasetList = 0x0000000279498F30
m_activeIndexDatasetList = 0x0000000279498F40

SEParams @0x0000000279499350
----------------------------
m_lockTimeout = -1 m_isoLevel = 4096 m_logDontReplicate = 0
m_neverReplicate = 0 m_XactWorkspace = 0x000000008DFA7940
m_pSessionLocks = 0x000000027D774600 m_pDbLocks = 0x0000000279499C10
m_execStats = 0x00000001CEA77260 m_pAllocFileLimit = 0x0000000000000000



tripodal
Constraint Violating Yak Guru

259 Posts

Posted - 2010-02-12 : 12:53:53
Having never seen any of these errors with SQL previously, it "access violations" are typically bad code or bad hardware.

MSSQL is good code, so Im betting you have a bad CPU / RAM

particularly that it indentified your CPU as being 3mhz.
Go to Top of Page
   

- Advertisement -