Hi,
while executing a bulk insert DTS task, we sometimes experience an
'EXCEPTION_ACCESS_VIOLATION' error. We load several text files
into sql tables parrallel. The error occurs does not necessarily occur
on the same bulk load task, every we test the dts package. Sometimes
we don't even get the error at all.
We're running on sql server 2000 sp3 , any input or advice on this matter
would be highly appreciated.
Please find below the stack dump file...
Regards,
Erwin
================================================== ===================
BugCheck Dump
================================================== ===================
This file is generated by Microsoft SQL Server 8.00.760
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.
Computer type is AT/AT COMPATIBLE.
Bios Version is IBM - 1000
IBM BIOS Ver 1.05
Current time is 03:00:33 12/24/05.
4 Intel x86 level 15, 3000 Mhz processor(s).
Windows NT 5.2 Build 3790 CSD .
Memory
MemoryLoad = 60%
Total Physical = 3583 MB
Available Physical = 1403 MB
Total Page File = 5474 MB
Available Page File = 3466 MB
Total Virtual = 2047 MB
Available Virtual = 236 MB
*Stack Dump being sent to e:\MSSQL\log\SQLDump0001.txt
*
************************************************** ***************************
**
*
* BEGIN STACK DUMP:
* 12/24/05 03:00:33 spid 61
*
* Exception Address = 06B824C5 (DDCS_Enter + 00000004 Line 0+00000000)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 06E1FF2C
* Input Buffer 468 bytes -
* BULK INSERT S_Import_IncrementalStock_InsertUpdates FROM 'e:\MerRep_Data
* \Work\DwMerchandise_UKwms_Batch00481_IncrementalSt ock_InsertUpdates.txt'
* WITH (CODEPAGE = 'RAW' , FIELDTERMINATOR = '??' , ROWTERMINATOR = ' ' ,
* MAXERRORS = 10 )
*
*
* MODULE BASE END SIZE
* sqlservr 00400000 00B2CFFF 0072d000
* ntdll 77F40000 77FF9FFF 000ba000
* kernel32 77E40000 77F33FFF 000f4000
* ADVAPI32 77DA0000 77E2FFFF 00090000
* RPCRT4 77C50000 77CF4FFF 000a5000
* USER32 77D00000 77D8EFFF 0008f000
* GDI32 77C00000 77C43FFF 00044000
* OPENDS60 41060000 41065FFF 00006000
* MSVCRT 77BA0000 77BF3FFF 00054000
* UMS 41070000 4107CFFF 0000d000
* SQLSORT 42AE0000 42B6FFFF 00090000
* MSVCIRT 60020000 6002FFFF 00010000
* sqlevn70 41080000 41086FFF 00007000
* NETAPI32 02C60000 02CB2FFF 00053000
* ole32 030D0000 031F4FFF 00125000
* XOLEHLP 03200000 03205FFF 00006000
* MSDTCPRX 03210000 03281FFF 00072000
* OLEAUT32 03290000 0330CFFF 0007d000
* MSVCP60 03310000 03370FFF 00061000
* MTXCLU 03380000 03397FFF 00018000
* VERSION 033A0000 033A7FFF 00008000
* WSOCK32 033B0000 033B8FFF 00009000
* WS2_32 033C0000 033D7FFF 00018000
* WS2HELP 033E0000 033E7FFF 00008000
* CLUSAPI 03430000 03440FFF 00011000
* RESUTILS 03450000 03461FFF 00012000
* USERENV 03470000 03529FFF 000ba000
* MFC42u 03530000 03623FFF 000f4000
* secur32 036B0000 036C2FFF 00013000
* mswsock 036E0000 03722FFF 00043000
* DNSAPI 03730000 03756FFF 00027000
* winrnr 037A0000 037A6FFF 00007000
* WLDAP32 037B0000 037DEFFF 0002f000
* rasadhlp 03800000 03804FFF 00005000
* SSNETLIB 00C70000 00C84FFF 00015000
* SSNMPN70 00C90000 00C95FFF 00006000
* security 042C0000 042C3FFF 00004000
* wshtcpip 04310000 04317FFF 00008000
* SSmsLPCn 04320000 04326FFF 00007000
* ntdsapi 04340000 04355FFF 00016000
* kerberos 04770000 047C5FFF 00056000
* cryptdll 047D0000 047DBFFF 0000c000
* MSASN1 047E0000 047F1FFF 00012000
* SQLFTQRY 04630000 04661FFF 00032000
* CLBCatQ 04B20000 04B9DFFF 0007e000
* COMRes 04BA0000 04C65FFF 000c6000
* sqloledb 04C90000 04D15FFF 00086000
* MSDART 04D20000 04D48FFF 00029000
* COMCTL32 04D50000 04DDFFFF 00090000
* comdlg32 04DE0000 04E26FFF 00047000
* SHLWAPI 04E30000 04E78FFF 00049000
* SHELL32 04E80000 0565DFFF 007de000
* MSDATL3 05660000 05677FFF 00018000
* comctl32 05690000 05775FFF 000e6000
* oledb32 05B20000 05B9CFFF 0007d000
* OLEDB32R 05BA0000 05BB0FFF 00011000
* msv1_0 05C50000 05C73FFF 00024000
* xpsqlbot 05C80000 05C85FFF 00006000
* xpstar 05CB0000 05CF6FFF 00047000
* SQLRESLD 05D00000 05D06FFF 00007000
* SQLSVC 05D10000 05D26FFF 00017000
* ODBC32 05D30000 05D69FFF 0003a000
* odbcbcp 05D70000 05D75FFF 00006000
* W95SCM 05D90000 05D9BFFF 0000c000
* SQLUNIRL 05DA0000 05DCCFFF 0002d000
* WINSPOOL 05DD0000 05DF5FFF 00026000
* SHFOLDER 05E00000 05E08FFF 00009000
* odbcint 05FF0000 06006FFF 00017000
* NDDEAPI 06110000 06116FFF 00007000
* SQLSVC 06120000 06125FFF 00006000
* xpstar 06130000 06138FFF 00009000
* rsaenh 0FFD0000 0FFFCFFF 0002d000
* PSAPI 05D80000 05D8AFFF 0000b000
* impprov 065D0000 065E8FFF 00019000
* sqlmap70 06580000 065A9FFF 0002a000
* MAPI32 065B0000 065CEFFF 0001f000
* MSMAPI32 06B80000 06CCDFFF 0014e000
* mso 07510000 080C1FFF 00bb2000
* iphlpapi 06F20000 06F36FFF 00017000
* MPRAPI 08270000 08286FFF 00017000
* ACTIVEDS 08290000 082C1FFF 00032000
* adsldpc 082D0000 082F5FFF 00026000
* credui 08300000 0832CFFF 0002d000
* ATL 08330000 08347FFF 00018000
* rtutils 08350000 0835AFFF 0000b000
* SAMLIB 08360000 0836FFFF 00010000
* SETUPAPI 08370000 0846FFFF 00100000
* netman 084D0000 08506FFF 00037000
* RASAPI32 08510000 0854AFFF 0003b000
* rasman 08550000 08560FFF 00011000
* TAPI32 08570000 0859DFFF 0002e000
* WINMM 085A0000 085CBFFF 0002c000
* CRYPT32 085D0000 08667FFF 00098000
* WZCSvc 08670000 086B6FFF 00047000
* WMI 08470000 08474FFF 00005000
* DHCPCSVC 086C0000 086DBFFF 0001c000
* WTSAPI32 086E0000 086E7FFF 00008000
* WINSTA 086F0000 086FFFFF 00010000
* ESENT 08700000 08807FFF 00108000
* WZCSAPI 08810000 08818FFF 00009000
* xplog70 06560000 06571FFF 00012000
* xplog70 09160000 09163FFF 00004000
* sqlvdi 09170000 0917BFFF 0000c000
* msi 0AA10000 0AC23FFF 00214000
* MAPIR 06F50000 0700FFFF 000c0000
* contab32 030B0000 030CEFFF 0001f000
* EMSABP32 06DA0000 06DD7FFF 00038000
* EMSMDB32 08F60000 09019FFF 000ba000
* uxtheme 09120000 09152FFF 00033000
* dbghelp 09720000 097D4FFF 000b5000
*
* Edi: 06E1FF14:
* Esi: 06E1FEF8:
* Eax: C0000000:
* Ebx: 00000000:
* Ecx: 06E1FF14:
* Edx: 00000020:
* Eip: 06B824C5:
* Ebp: 0A30EDF4: 0A30EE20 77D0612F 00EC019E 00000507 06E1FEF8
00000
000
* SegCs: 0000001B:
* EFlags: 00010246: 006D0065 00320033 0057005C 00650062 003B006D
003A0
043
* Esp: 0A30EDD8: 06B86F6F 06E1FF14 0A30EE6C 06E1FEF8 06B8510A
06E1F
EF8
* SegSs: 00000023:
*
************************************************** ***************************
**
*
* Short Stack Dump
* 06B824C5 Module(MSMAPI32+000024C5) (DDCS_Enter+00000004)
* 77D0612F Module(USER32+0000612F)
* 77D069A5 Module(USER32+000069A5) (GetMessageW+000001EE)
* 77D06689 Module(USER32+00006689) (TranslateMessage+00000520)
* 77D0FAE4 Module(USER32+0000FAE4) (DispatchMessageA+0000000B)
* 065D2BB3 Module(impprov+00002BB3)
* 065DE84A Module(impprov+0000E84A) (DllRegisterServer+0000AA3A)
* 065E145C Module(impprov+0001145C) (DllRegisterServer+0000D64C)
* 065DE1DC Module(impprov+0000E1DC) (DllRegisterServer+0000A3CC)
* 0047E663 Module(sqlservr+0007E663)
(CBcpImport::CreateInprocProvider+000002EF
)
* 0047DB5A Module(sqlservr+0007DB5A) (CBcpImport::Init+0000029D)
* 0047D854 Module(sqlservr+0007D854) (BcpImportMain+0000014D)
* 0047D714 Module(sqlservr+0007D714) (CStmtBulkIns::XretExecute+0000005F)
* 0041B442 Module(sqlservr+0001B442)
(CMsqlExecContext::ExecuteStmts+000003B9)
* 0041AA88 Module(sqlservr+0001AA88) (CMsqlExecContext::Execute+000001B6)
* 0041B9B6 Module(sqlservr+0001B9B6) (CSQLSource::Execute+00000357)
* 0048A63B Module(sqlservr+0008A63B) (language_exec+000003E1)
* 0042708C Module(sqlservr+0002708C) (process_commands+0000010E)
* 41075002 Module(UMS+00005002) (ProcessWorkRequests+00000272)
* 41074698 Module(UMS+00004698) (ThreadStartRoutine+00000098)
* 77BC90A2 Module(MSVCRT+000290A2) (endthread+000000A6)
* 77E4A990 Module(kernel32+0000A990) (FlsSetValue+00000779)
* Location : 06B824C5 Module(MSMAPI32+000024C5) (DDCS_Enter+00000004)
* Return Addr: 77D0612F Module(USER32+0000612F)
Frame : 0A30EDF4
Parameters:
[1] 00EC019E: 00000240 00000000 00000000 00000000 00000000 00000000
[2] 00000507:
[3] 06E1FEF8:
[4] 00000000:
160 bytes of stack data from 0A30ED54 to 0A30EDF4
0A30ED54: 00000000 00000000 00000000 00000000 [............]
:::: 7 Duplicate lines detected
0A30EDD4: 00000000 06B86F6F 06E1FF14 0A30EE6C [...oo.....l.0.]
0A30EDE4: 06E1FEF8 06B8510A 06E1FEF8 06B850F4 [....Q......P..]
* Location : 77D0612F Module(USER32+0000612F)
* Return Addr: 77D069A5 Module(USER32+000069A5) (GetMessageW+000001EE)
Frame : 0A30EE20
Parameters:
[1] 06B850F4:
[2] 00EC019E: 00000240 00000000 00000000 00000000 00000000 00000000
[3] 00000507:
[4] 06E1FEF8:
44 bytes of stack data from 0A30EDF4 to 0A30EE20
0A30EDF4: 0A30EE20 77D0612F 00EC019E 00000507 [ .0./a.w......]
0A30EE04: 06E1FEF8 00000000 06B850F4 DCBAABCD [.......P.....]
0A30EE14: 00000000 0A30EE6C 06B850F4 [...l.0..P..]
..
PSS @.0x76D8D258
pspid = 61 m_dwLoginFlags = 0x1083e0 plsid = 1717878624
pbackground = 0
pbSid
01010000 00000005 12000000 .........
sSecFlags = 0x1e
pdeadlockpri = 0 poffsets = 0x0 pss_stats = 0x0
ptickcount = 1352914718 pcputickcount = 4059555816433772
ploginstamp = 10002 ptimestamp = 2005-12-24 03:00:33.530
plangid = 0 pdateformat = 1 pdatefirst = 7
Language = us_english UserName = NT AUTHORITY\SYSTEM
poptions = 0x28000020 poptions2 = 0x13f438 pline = 1
pcurstepno = 1 prowcount = 0 pstatlist = 0
pcurcmd = 240 pseqstat = 0 ptextsize = 2147483647
pretstat = 0 CNestLevel = 0 @.@.procid = 0
Xact_Begin_Time = 2005-12-24 03:00:33.543
pslastbatchstarttime = 2005-12-24 03:00:33.543 pmemusage = 5
hLicense = 0 tpFlags = 0x1 isolation_level = 0
fips_flag = 0x0 sSaveSecFlags = 0x0 psavedb = 0
pfetchstat = 0 pcrsrows = 0
pslastbatchtime = 2005-12-24 03:00:33.543 pNtUser = SYSTEM
pNtDomain = NT AUTHORITY pubexecdb = 0 fInReplicatedProcExec =
0
pMsqlXact = 0x76D8DE60 presSemCount = [0]170977488
presSemCount = [0]170977488 pcputot = 0
pcputotstart = 0 pcpucmdstart = 0 pbufread = 0
pbufreadstart = 0 plogbufread = 178 plogbufreadstart = 162
pbufwrite = 0 pbufwritestart = 0 pLockTimeout =
4294967295
pUtilResultSet = 0x00000000
pec
ec_pss->pspid = 61 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x100001 ec_atomic = 0x0 pcurdb = 9
ec_lasterror = 0 ec_preverror = 0 ec_cpucur = 2408031
ec_cmderrs = 0 ec_timeslice = 84 ec_dbtable = 0x19EB0030
ec_reswait = 0x0 ec_dbindex = -1 ec_waittype = 0x0000
Waittime = 0 ec_umsContext->m_pSched->m_id (SchedulerId) = 0x2
ec_umsContext->m_workercntxt->m_id (threadId) = 0x9fc
ExecutionContext Summary @.0x76D8D580
ec_pss->pspid = 61 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x100001 ec_atomic = 0x0 pcurdb = 9
ec_lasterror = 0 ec_preverror = 0 ec_cpucur = 2408031
ec_cmderrs = 0 ec_timeslice = 84 ec_dbtable = 0x19EB0030
ec_reswait = 0x0 ec_dbindex = -1 ec_waittype = 0x0000
Waittime = 0 ec_umsContext->m_pSched->m_id (SchedulerId) = 0x2
ec_umsContext->m_workercntxt->m_id (threadId) = 0x9fc
psrvproc->eclClient = 4 psrvproc->status = 8
psrvproc->state = SRV_RUNNING psrvproc->bNewPacket = 0
psrvproc->pmo = 0x76D84030
psrvproc->ums_context = 0x038A1950 psrvproc->threadId =
0x9fc
client threadId = 0xdc8
...
Hi
This http://support.microsoft.com/default...b;en-us;839458 was
fixed after SP3, although you don't give any information about identity
values and I would not expect it to perform inconsistently as you describe;
but you may want to see if loading SP4 removes this issue. Something else you
may wish to try could be to run them all on the main thread.
John
"Erwin" wrote:
> Hi,
> while executing a bulk insert DTS task, we sometimes experience an
> 'EXCEPTION_ACCESS_VIOLATION' error. We load several text files
> into sql tables parrallel. The error occurs does not necessarily occur
> on the same bulk load task, every we test the dts package. Sometimes
> we don't even get the error at all.
> We're running on sql server 2000 sp3 , any input or advice on this matter
> would be highly appreciated.
> Please find below the stack dump file...
> Regards,
> Erwin
> ================================================== ===================
> BugCheck Dump
> ================================================== ===================
>
> This file is generated by Microsoft SQL Server 8.00.760
> upon detection of fatal unexpected error. Please return this file,
> the query or program that produced the bugcheck, the database and
> the error log, and any other pertinent information with a Service Request.
>
> Computer type is AT/AT COMPATIBLE.
> Bios Version is IBM - 1000
> IBM BIOS Ver 1.05
> Current time is 03:00:33 12/24/05.
> 4 Intel x86 level 15, 3000 Mhz processor(s).
> Windows NT 5.2 Build 3790 CSD .
>
> Memory
> MemoryLoad = 60%
> Total Physical = 3583 MB
> Available Physical = 1403 MB
> Total Page File = 5474 MB
> Available Page File = 3466 MB
> Total Virtual = 2047 MB
> Available Virtual = 236 MB
> *Stack Dump being sent to e:\MSSQL\log\SQLDump0001.txt
> *
> ************************************************** ***************************
> **
> *
> * BEGIN STACK DUMP:
> * 12/24/05 03:00:33 spid 61
> *
> * Exception Address = 06B824C5 (DDCS_Enter + 00000004 Line 0+00000000)
> * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
> * Access Violation occurred reading address 06E1FF2C
> * Input Buffer 468 bytes -
> * BULK INSERT S_Import_IncrementalStock_InsertUpdates FROM 'e:\MerRep_Data
> * \Work\DwMerchandise_UKwms_Batch00481_IncrementalSt ock_InsertUpdates.txt'
> * WITH (CODEPAGE = 'RAW' , FIELDTERMINATOR = '??' , ROWTERMINATOR = ' ' ,
> * MAXERRORS = 10 )
> *
> *
> * MODULE BASE END SIZE
> * sqlservr 00400000 00B2CFFF 0072d000
> * ntdll 77F40000 77FF9FFF 000ba000
> * kernel32 77E40000 77F33FFF 000f4000
> * ADVAPI32 77DA0000 77E2FFFF 00090000
> * RPCRT4 77C50000 77CF4FFF 000a5000
> * USER32 77D00000 77D8EFFF 0008f000
> * GDI32 77C00000 77C43FFF 00044000
> * OPENDS60 41060000 41065FFF 00006000
> * MSVCRT 77BA0000 77BF3FFF 00054000
> * UMS 41070000 4107CFFF 0000d000
> * SQLSORT 42AE0000 42B6FFFF 00090000
> * MSVCIRT 60020000 6002FFFF 00010000
> * sqlevn70 41080000 41086FFF 00007000
> * NETAPI32 02C60000 02CB2FFF 00053000
> * ole32 030D0000 031F4FFF 00125000
> * XOLEHLP 03200000 03205FFF 00006000
> * MSDTCPRX 03210000 03281FFF 00072000
> * OLEAUT32 03290000 0330CFFF 0007d000
> * MSVCP60 03310000 03370FFF 00061000
> * MTXCLU 03380000 03397FFF 00018000
> * VERSION 033A0000 033A7FFF 00008000
> * WSOCK32 033B0000 033B8FFF 00009000
> * WS2_32 033C0000 033D7FFF 00018000
> * WS2HELP 033E0000 033E7FFF 00008000
> * CLUSAPI 03430000 03440FFF 00011000
> * RESUTILS 03450000 03461FFF 00012000
> * USERENV 03470000 03529FFF 000ba000
> * MFC42u 03530000 03623FFF 000f4000
> * secur32 036B0000 036C2FFF 00013000
> * mswsock 036E0000 03722FFF 00043000
> * DNSAPI 03730000 03756FFF 00027000
> * winrnr 037A0000 037A6FFF 00007000
> * WLDAP32 037B0000 037DEFFF 0002f000
> * rasadhlp 03800000 03804FFF 00005000
> * SSNETLIB 00C70000 00C84FFF 00015000
> * SSNMPN70 00C90000 00C95FFF 00006000
> * security 042C0000 042C3FFF 00004000
> * wshtcpip 04310000 04317FFF 00008000
> * SSmsLPCn 04320000 04326FFF 00007000
> * ntdsapi 04340000 04355FFF 00016000
> * kerberos 04770000 047C5FFF 00056000
> * cryptdll 047D0000 047DBFFF 0000c000
> * MSASN1 047E0000 047F1FFF 00012000
> * SQLFTQRY 04630000 04661FFF 00032000
> * CLBCatQ 04B20000 04B9DFFF 0007e000
> * COMRes 04BA0000 04C65FFF 000c6000
> * sqloledb 04C90000 04D15FFF 00086000
> * MSDART 04D20000 04D48FFF 00029000
> * COMCTL32 04D50000 04DDFFFF 00090000
> * comdlg32 04DE0000 04E26FFF 00047000
> * SHLWAPI 04E30000 04E78FFF 00049000
> * SHELL32 04E80000 0565DFFF 007de000
> * MSDATL3 05660000 05677FFF 00018000
> * comctl32 05690000 05775FFF 000e6000
> * oledb32 05B20000 05B9CFFF 0007d000
> * OLEDB32R 05BA0000 05BB0FFF 00011000
> * msv1_0 05C50000 05C73FFF 00024000
> * xpsqlbot 05C80000 05C85FFF 00006000
> * xpstar 05CB0000 05CF6FFF 00047000
> * SQLRESLD 05D00000 05D06FFF 00007000
> * SQLSVC 05D10000 05D26FFF 00017000
> * ODBC32 05D30000 05D69FFF 0003a000
> * odbcbcp 05D70000 05D75FFF 00006000
> * W95SCM 05D90000 05D9BFFF 0000c000
> * SQLUNIRL 05DA0000 05DCCFFF 0002d000
> * WINSPOOL 05DD0000 05DF5FFF 00026000
> * SHFOLDER 05E00000 05E08FFF 00009000
> * odbcint 05FF0000 06006FFF 00017000
> * NDDEAPI 06110000 06116FFF 00007000
> * SQLSVC 06120000 06125FFF 00006000
> * xpstar 06130000 06138FFF 00009000
> * rsaenh 0FFD0000 0FFFCFFF 0002d000
> * PSAPI 05D80000 05D8AFFF 0000b000
> * impprov 065D0000 065E8FFF 00019000
> * sqlmap70 06580000 065A9FFF 0002a000
> * MAPI32 065B0000 065CEFFF 0001f000
> * MSMAPI32 06B80000 06CCDFFF 0014e000
> * mso 07510000 080C1FFF 00bb2000
> * iphlpapi 06F20000 06F36FFF 00017000
> * MPRAPI 08270000 08286FFF 00017000
> * ACTIVEDS 08290000 082C1FFF 00032000
> * adsldpc 082D0000 082F5FFF 00026000
> * credui 08300000 0832CFFF 0002d000
> * ATL 08330000 08347FFF 00018000
> * rtutils 08350000 0835AFFF 0000b000
> * SAMLIB 08360000 0836FFFF 00010000
> * SETUPAPI 08370000 0846FFFF 00100000
> * netman 084D0000 08506FFF 00037000
> * RASAPI32 08510000 0854AFFF 0003b000
> * rasman 08550000 08560FFF 00011000
> * TAPI32 08570000 0859DFFF 0002e000
> * WINMM 085A0000 085CBFFF 0002c000
> * CRYPT32 085D0000 08667FFF 00098000
> * WZCSvc 08670000 086B6FFF 00047000
> * WMI 08470000 08474FFF 00005000
> * DHCPCSVC 086C0000 086DBFFF 0001c000
> * WTSAPI32 086E0000 086E7FFF 00008000
> * WINSTA 086F0000 086FFFFF 00010000
> * ESENT 08700000 08807FFF 00108000
> * WZCSAPI 08810000 08818FFF 00009000
> * xplog70 06560000 06571FFF 00012000
> * xplog70 09160000 09163FFF 00004000
> * sqlvdi 09170000 0917BFFF 0000c000
>
No comments:
Post a Comment