microsoft.public.sqlserver.notificationsvcs
[Top] [All Lists]

Re: error state

Subject: Re: error state
From: stake
Date: Tue, 16 May 2006 04:57:02 -0700
Newsgroups: microsoft.public.sqlserver.notificationsvcs
if it helps diagnostic here is dump from SQL, I hope in some solution...

       BugCheck Dump                                                         
  
=====================================================================        
  
                                                                             
  
This file is generated by Microsoft SQL Server 8.00.2039                     
  
upon detection of fatal unexpected error. Please return this file,           
  
the query or program that produced the bugcheck, the database and            
  
the error log, and any other pertinent information with a Service Request.   
  
                                                                             
  
Computer type is AT/AT COMPATIBLE.                                           
  
Bios Version is COMPAQ - 2                                                   
  
Current time is 13:37:02 05/15/06.                                           
  
8 Intel x86 level 15, 2199 Mhz processor(s).                                 
  
Windows NT 5.2 Build 3790 CSD Service Pack 1.                                
  
                          
                                                     
Memory                    
MemoryLoad = 62%          
Total Physical = 3711 MB   
Available Physical = 1394 MB                        
Total Page File = 7614 MB  
Available Page File = 5372 MB                       
Total Virtual = 3071 MB    
Available Virtual = 1246 MB                         
                           
*Stack Dump being sent to f:\MSSQL\MSSQL\log\SQLDump0248.txt                 
  
* 
*****************************************************************************
**                                                                           
  
*                                                                            
  
* BEGIN STACK DUMP:                                                          
  
*   05/15/06 13:37:02 spid 584                                               
  
*                                                                            
  
*   Exception Address = 007EA027 (SQLExit + 00282530 Line 0+00000000)        
  
*   Exception Code    = c0000005 EXCEPTION_ACCESS_VIOLATION                  
  
*   Access Violation occurred reading address 0003090A                       
  
* Input Buffer 116 bytes -                                                   
  
*  SELECT * FROM QZBOZI WHERE VLTYP_SLOZ=1 ORDER BY CIS_ZBOZI                
  
*                                                                            
  
*                                                                            
  
*  MODULE                          BASE      END       SIZE                  
  
* sqlservr                       00400000  00CBAFFF  008bb000                
  
* ntdll                          7C910000  7C9CDFFF  000be000                
  
* kernel32                       7C800000  7C900FFF  00101000                
  
* ADVAPI32                       77D90000  77E3DFFF  000ae000                
  
* RPCRT4                         77C40000  77CDEFFF  0009f000                
  
* MSVCP71                        7C3A0000  7C41AFFF  0007b000                
  
* MSVCR71                        7C340000  7C395FFF  00056000                
  
* opends60                       41060000  41065FFF  00006000                
  
* SHELL32                        7C9D0000  7D1D3FFF  00804000                
  
* msvcrt                         77B90000  77BE9FFF  0005a000                
  
* GDI32                          77BF0000  77C37FFF  00048000                
  
* USER32                         77F40000  77FD1FFF  00092000                
  
* SHLWAPI                        77EE0000  77F31FFF  00052000                
  
* sqlsort                        42AE0000  42B6FFFF  00090000                
  
* ums                            41070000  4107DFFF  0000e000                
  
* comctl32                       77370000  77472FFF  00103000                
  
* sqlevn70                       41080000  4108AFFF  0000b000                
  
* NETAPI32                       71AC0000  71B17FFF  00058000                
  
* AUTHZ                          76B70000  76B83FFF  00014000                
  
* COMRES                         76F40000  770C8FFF  00189000                
  
* ole32                          77520000  77653FFF  00134000                
  
* XOLEHLP                        015F0000  015F5FFF  00006000                
  
* MSDTCPRX                       03350000  033C7FFF  00078000                
  
* msvcp60                        780C0000  78120FFF  00061000                
  
* MTXCLU                         74E70000  74E88FFF  00019000                
  
* VERSION                        77B80000  77B87FFF  00008000                
  
* WSOCK32                        71A30000  71A39FFF  0000a000                
  
* WS2_32                         71A80000  71A96FFF  00017000                
  
* WS2HELP                        71A70000  71A77FFF  00008000                
  
* OLEAUT32                       77CF0000  77D7BFFF  0008c000                
  
* CLUSAPI                        74D10000  74D21FFF  00012000                
  
* RESUTILS                       74E20000  74E32FFF  00013000                
  
* USERENV                        76850000  76913FFF  000c4000                
  
* secur32                        76E80000  76E92FFF  00013000                
  
* mswsock                        719A0000  719E1FFF  00042000                
  
* DNSAPI                         76E00000  76E29FFF  0002a000                
  
* winrnr                         76EA0000  76EA6FFF  00007000                
  
* WLDAP32                        76E40000  76E6EFFF  0002f000                
  
* rasadhlp                       76EB0000  76EB4FFF  00005000                
  
* NTMARTA                        777C0000  777E1FFF  00022000                
  
* SAMLIB                         00E70000  00E7EFFF  0000f000                
  
* SSNETLIB                       00E80000  00E95FFF  00016000                
  
* security                       71DE0000  71DE3FFF  00004000                
  
* hnetcfg                        04A10000  04A68FFF  00059000                
  
* wshtcpip                       71960000  71967FFF  00008000                
  
* SSmsLPCn                       00EE0000  00EE7FFF  00008000                
  
* SSnmPN70                       410D0000  410D6FFF  00007000                
  
* ntdsapi                        76620000  76634FFF  00015000                
  
* kerberos                       71B20000  71B77FFF  00058000                
  
* cryptdll                       76610000  7661BFFF  0000c000                
  
* MSASN1                         760C0000  760D1FFF  00012000                
  
* SQLFTQRY                       41020000  41045FFF  00026000                
  
* xpsp2res                       10000000  102CBFFF  002cc000                
  
* CLBCatQ                        77660000  776E2FFF  00083000                
  
* sqloledb                       04320000  043A0FFF  00081000                
  
* MSDART                         74980000  74999FFF  0001a000                
  
* MSDATL3                        03EC0000  03ED4FFF  00015000                
  
* oledb32                        04930000  049A8FFF  00079000                
  
* OLEDB32R                       03EE0000  03EF1FFF  00012000                
  
* msv1_0                         76BC0000  76BE6FFF  00027000                
  
* iphlpapi                       76C20000  76C39FFF  0001a000                
  
* PSAPI                          76AA0000  76AAAFFF  0000b000                
  
* xpsqlbot                       049B0000  049B5FFF  00006000                
  
* xpstar                         410F0000  4113CFFF  0004d000                
  
* SQLRESLD                       42AC0000  42ACBFFF  0000c000                
  
* SQLSVC                         05700000  0571AFFF  0001b000                
  
* ODBC32                         05720000  0575CFFF  0003d000                
  
* COMCTL32                       77E40000  77ED6FFF  00097000                
  
* comdlg32                       761E0000  76229FFF  0004a000                
  
* odbcbcp                        04A00000  04A05FFF  00006000                
  
* W95SCM                         41140000  4114CFFF  0000d000                
  
* SQLUNIRL                       05760000  0578CFFF  0002d000                
  
* WINSPOOL                       72EE0000  72F06FFF  00027000                
  
* SHFOLDER                       76600000  76608FFF  00009000                
  
* odbcint                        05A50000  05A66FFF  00017000                
  
* NDDEAPI                        75740000  75746FFF  00007000                
  
* SQLSVC                         05B80000  05B85FFF  00006000                
  
* xpstar                         05BA0000  05BA8FFF  00009000                
  
* odsole70                       419A0000  419B0FFF  00011000                
  
* comsvcs                        76230000  76368FFF  00139000                
  
* rsaenh                         05320000  0534EFFF  0002f000                
  
* msi                            745E0000  748A5FFF  002c6000                
  
* xplog70                        04160000  0416EFFF  0000f000                
  
* xplog70                        04170000  04174FFF  00005000                
  
* impprov                        41900000  41918FFF  00019000                
  
* ACTIVEDS                       76D20000  76D52FFF  00033000                
  
* adsldpc                        76CF0000  76D16FFF  00027000                
  
* credui                         76AB0000  76ADDFFF  0002e000                
  
* ATL                            769B0000  769C7FFF  00018000                
  
* adsldp                         71140000  7116DFFF  0002e000                
  
* SXS                            75CD0000  75D8BFFF  000bc000                
  
* dbghelp                        05480000  0557FFFF  00100000                
  
*                                                                            
  
stake pÃÅe:

> Thank you for advice, but do u think that apply to MS SQL2000server Standard 
> Edition with SP4 applied ?
> 
> 
> Joe Webb pÃÅe:
> 
> > http://support.microsoft.com/default.aspx/kb/309435 
> > 
> > HTH...
> > 
> > 
> > 
> > -- 
> > Joe Webb
> > SQL Server MVP
> > http://www.sqlns.com
> > 
> > 
> > ~~~
> > Get up to speed quickly with SQLNS
> > http://www.amazon.com/exec/obidos/tg/detail/-/0972688811 
> > 
> > I support PASS, the Professional Association for SQL Server.
> > (www.sqlpass.org)
> > 
> > 
> > 
> > 
> > On Mon, 10 Apr 2006 19:30:37 +0200, "sk" <[email protected]> wrote:
> > 
> > >Hello,
> > >    anybody know what this state mean ??
> > >
> > >Error: 0, Severity: 19, State: 0
> > >SqlDumpExceptionHandler: Process 767 generated fatal exception c0000005 
> > >EXCEPTION_ACCESS_VIOLATION.
> > >
> > >Thanks to all 
> > >
> > 

<Prev in Thread] Current Thread [Next in Thread>
  • Re: error state, stake <=