Generate Scripts Generates Dump (9.0.3152)
Mar 21, 2007When I attempt to generate scripts via SSMS for several databases on this server (x64 Enterprise Windows 2003 Server SP1), I receive a "severe error" message. I have run DBCC commands of various sorts and backed up and restored but the error persists.
I have read other posts on this forum that seem to be asking about related issues and the response appears to be "talk with support" or "post a bug report". What should I do? Any assistance would be appreciated.
Here's the dump:
=====================================================================
BugCheck Dump
=====================================================================
This file is generated by Microsoft SQL Server
version 9.00.3152.00
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.
Computer type is AT/AT COMPATIBLE.
Current time is 16:55:02 03/20/07.
4 Unknown CPU 9., 2205 Mhz processor (s).
Windows NT 5.2 Build 3790 CSD Service Pack 1.
Memory
MemoryLoad = 54%
Total Physical = 4951 MB
Available Physical = 2260 MB
Total Page File = 28583 MB
Available Page File = 26144 MB
Total Virtual = 8388607 MB
Available Virtual = 8383329 MB
***Stack Dump being sent to C:Program FilesMicrosoft SQL ServerMSSQL.1MSSQLLOGSQLDump0052.txt
SqlDumpExceptionHandler: Process 55 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is
terminating this process.
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 03/20/07 16:55:02 spid 55
*
*
* Exception Address = 00000000021B4CEF Module(sqlservr+00000000011B4CEF)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address 000000001DC6BEE4
* Input Buffer 510 bytes -
* SELECT SCHEMA_NAME(v.schema_id) AS [View_Schema], v.name AS [
* View_Name], st.name AS [Name], st.no_recompute AS [NoAutomaticRecomputat
* ion], st.auto_created AS [IsAutoCreated], CAST(1 - INDEXPROPERTY(st.obje
* ct_id,st.name,N'IsStatistics') AS bit) AS [IsFromIndexCreation] FROM sys
* .all_views AS v INNER JOIN sys.stats st ON st.object_id=v.object_id WHER
* E (v.type = 'V') ORDER BY [View_Schema] ASC,[View_Name] ASC,[Name] ASC
*
*
* MODULE BASE END SIZE
* sqlservr 0000000001000000 0000000003523FFF 02524000
* ntdll 0000000078EC0000 0000000078FF8FFF 00139000
* kernel32 0000000077D40000 0000000077EB2FFF 00173000
* MSVCR80 0000000078130000 00000000781FEFFF 000cf000
* msvcrt 000007FF7FC00000 000007FF7FC85FFF 00086000
* MSVCP80 000000007C420000 000000007C530FFF 00111000
* ADVAPI32 000007FF7FEE0000 000007FF7FFE4FFF 00105000
* RPCRT4 000007FF7FD30000 000007FF7FED8FFF 001a9000
* USER32 0000000078C30000 0000000078D3BFFF 0010c000
* GDI32 000007FF7FC90000 000007FF7FD28FFF 00099000
* CRYPT32 000007FF7D180000 000007FF7D2DEFFF 0015f000
* MSASN1 000007FF7D150000 000007FF7D179FFF 0002a000
* Secur32 000007FF7E7F0000 000007FF7E811FFF 00022000
* MSWSOCK 000007FF76FE0000 000007FF7705BFFF 0007c000
* WS2_32 000007FF77150000 000007FF7717FFFF 00030000
* WS2HELP 000007FF77140000 000007FF7714BFFF 0000c000
* USERENV 000007FF7C4A0000 000007FF7C5A8FFF 00109000
* opends60 00000000333E0000 00000000333E7FFF 00008000
* NETAPI32 000007FF77370000 000007FF77407FFF 00098000
* SHELL32 000007FF7F190000 000007FF7FB97FFF 00a08000
* SHLWAPI 000007FF7EF60000 000007FF7EFFAFFF 0009b000
* IMM32 000007FF7D320000 000007FF7D358FFF 00039000
* comctl32 000007FF7F000000 000007FF7F186FFF 00187000
* psapi 000007FF7E1B0000 000007FF7E1BFFFF 00010000
* instapi 0000000048060000 000000004806CFFF 0000d000
* sqlevn70 000000004F610000 000000004F7B8FFF 001a9000
* SQLOS 00000000344D0000 00000000344D5FFF 00006000
* rsaenh 000000000FFB0000 000000000FFEDFFF 0003e000
* AUTHZ 000007FF7E2C0000 000007FF7E2ECFFF 0002d000
* MSCOREE 000006427EE60000 000006427EED3FFF 00074000
* ole32 000007FF7ECE0000 000007FF7EF51FFF 00272000
* msv1_0 000007FF7E330000 000007FF7E373FFF 00044000
* iphlpapi 000007FF57250000 000007FF57280FFF 00031000
* kerberos 000007FF77410000 000007FF774C2FFF 000b3000
* cryptdll 000007FF7DAB0000 000007FF7DABEFFF 0000f000
* schannel 000007FF7DB70000 000007FF7DBB0FFF 00041000
* COMRES 000007FF7E920000 000007FF7E9E5FFF 000c6000
* XOLEHLP 000007FF5C560000 000007FF5C566FFF 00007000
* MSDTCPRX 000007FF67140000 000007FF67210FFF 000d1000
* msvcp60 0000000009460000 0000000009549FFF 000ea000
* MTXCLU 000007FF7B540000 000007FF7B569FFF 0002a000
* VERSION 000007FF7FBF0000 000007FF7FBFAFFF 0000b000
* WSOCK32 000007FF770F0000 000007FF770F9FFF 0000a000
* OLEAUT32 000007FF7E9F0000 000007FF7EB03FFF 00114000
* CLUSAPI 000007FF7B1C0000 000007FF7B1E3FFF 00024000
* RESUTILS 000007FF7B310000 000007FF7B32BFFF 0001c000
* DNSAPI 0000000009560000 00000000095ADFFF 0004e000
* winrnr 000007FF7E820000 000007FF7E82AFFF 0000b000
* WLDAP32 000007FF7E780000 000007FF7E7E5FFF 00066000
* rasadhlp 0000000009650000 0000000009656FFF 00007000
* security 000007FF77530000 000007FF77534FFF 00005000
* msfte 0000000049980000 0000000049D2DFFF 003ae000
* dbghelp 000000000BAA0000 000000000BBFCFFF 0015d000
* WINTRUST 000007FF7E210000 000007FF7E25DFFF 0004e000
* imagehlp 000007FF7E2A0000 000007FF7E2B2FFF 00013000
* dssenh 000000000FF70000 000000000FFABFFF 0003c000
* hnetcfg 000007FF6D1F0000 000007FF6D280FFF 00091000
* wshtcpip 000007FF76FA0000 000007FF76FAAFFF 0000b000
* NTMARTA 000007FF7E2F0000 000007FF7E32BFFF 0003c000
* SAMLIB 000007FF76F80000 000007FF76F95FFF 00016000
* ntdsapi 000007FF7DAD0000 000007FF7DAF3FFF 00024000
* xpsp2res 000007FF5C210000 000007FF5C4D6FFF 002c7000
* CLBCatQ 0000000003530000 000000000360CFFF 000dd000
* sqlncli 00000000337A0000 0000000033A5FFFF 002c0000
* COMCTL32 000007FF76200000 000007FF762EDFFF 000ee000
* comdlg32 000007FF7D360000 000007FF7D3D6FFF 00077000
* SQLNCLIR 0000000035000000 0000000035032FFF 00033000
* msftepxy 0000000003670000 0000000003690FFF 00021000
* xpsqlbot 000000004A7C0000 000000004A7C7FFF 00008000
* xpstar90 0000000053C30000 0000000053CB5FFF 00086000
* SQLSCM90 0000000053AD0000 0000000053ADBFFF 0000c000
* ODBC32 000007FF63EB0000 000007FF63F16FFF 00067000
* BatchParser90 00000000520C0000 00000000520ECFFF 0002d000
* ATL80 000000007C630000 000000007C64DFFF 0001e000
* odbcint 000007FF63DC0000 000007FF63DD7FFF 00018000
* xpstar90 000000000FC60000 000000000FC85FFF 00026000
* xplog70 0000000034730000 000000003473FFFF 00010000
* xplog70 000000000FCA0000 000000000FCA2FFF 00003000
*
* P1Home: FFFFFADF7A660868:
* P2Home: 000000000AC3E180: FFFFFADF7A660868 000000000AC3E180 0000000000000001 000000009EB0A930 00010000
00000000 FFFFFADF878AD010
* P3Home: 0000000000000001:
* P4Home: 000000009EB0A930: 0000000000000000 000000009EC4E1D8 000000009EB8A000 0000006400000018 00000000
9EACE000 FFFFFFFF00000000
* P5Home: 0001000000000000:
* P6Home: FFFFFADF878AD010:
* ContextFlags: 000000000010001F:
* MxCsr: 0000000000001FA0:
* SegCs: 0000000000000033:
* SegDs: 000000000000002B:
* SegEs: 000000000000002B:
* SegFs: 0000000000000053:
* SegGs: 000000000000002B:
* SegSs: 000000000000002B:
* EFlags: 0000000000010246: 005C003A0043003D 0067006F00720050 0020006D00610072 0065006C00690046 00510053
005C0073 004C004D0058004C
* Rax: 000000001DC6BD50:
* Rcx: 0000000000000000:
* Rdx: 0000000000000000:
* Rbx: 0000000000000001:
* Rsp: 000000000AC3E720: 000000000AC3E778 00000000013DA150 0000000000000000 0000000000000000 00000000
00000000 000000009EB9DD40
* Rbp: 000000009EB0A930: 0000000000000000 000000009EC4E1D8 000000009EB8A000 0000006400000018 00000000
9EACE000 FFFFFFFF00000000
* Rsi: 0000000000000000:
* Rdi: 0000000000000000:
* R8: 000000011DC6BD50: 000000001DC60001 0000000000000000 0000000000000000 0000000000000000 00000000
00000031 000000011DC6ACB0
* R9: 000000009EC4E228: 0000000000000000 0000000000000000 000000009EB0A930 0000000000000000 00000000
00000000 0000000000000000
* R10: 0000000001017C00: 2444C74878EC8348 5C8948FFFFFFFE30 4868246C89487024 247C894860247489 894C5024
64894C58 8B48DA8B4848246C
* R11: 000000000AC3E988: 0000000000000000 00000000FFFFFFFF 0000000000000000 0000000000000000 00000000
FFFFFFFF 0000000000000000
* R12: 000000011DC6BD50: 000000001DC60001 0000000000000000 0000000000000000 0000000000000000 00000000
00000031 000000011DC6ACB0
* R13: 000000000AC3EA00: 0000000000000000 0000000000000000 0000000002ECF280 0000000000000000 FFFFFFFF
FFFFFFFE 000000011D9581C0
* R14: 0000000003640580: 0000000200000000 0000000000000008 0000026300000000 0000000003640080 00000001
1DC6C300 000000011DC6A2B0
* R15: 0000000000000002:
* Rip: 00000000021B4CEF: 848900000194808B 548D480000018024 3687E8C88B497824 485024448948FEEE 1374187D
3B66E88B 01DCB58B187D8B66
* *******************************************************************************
* -------------------------------------------------------------------------------
* Short Stack Dump
00000000021B4CEF Module(sqlservr+00000000011B4CEF)
00000000021BAD40 Module(sqlservr+00000000011BAD40)
00000000021BAEBA Module(sqlservr+00000000011BAEBA)
00000000021BB029 Module(sqlservr+00000000011BB029)
00000000017B32FA Module(sqlservr+00000000007B32FA)
0000000001343FBC Module(sqlservr+0000000000343FBC)
0000000002527308 Module(sqlservr+0000000001527308)
0000000001CC9A78 Module(sqlservr+0000000000CC9A78)
0000000001391E90 Module(sqlservr+0000000000391E90)
0000000001343ACB Module(sqlservr+0000000000343ACB)
0000000001343B70 Module(sqlservr+0000000000343B70)
0000000001343D4F Module(sqlservr+0000000000343D4F)
0000000001079D91 Module(sqlservr+0000000000079D91)
00000000010796A1 Module(sqlservr+00000000000796A1)
000000000147EE04 Module(sqlservr+000000000047EE04)
000000000147EEBB Module(sqlservr+000000000047EEBB)
0000000001023AA2 Module(sqlservr+0000000000023AA2)
00000000010243A2 Module(sqlservr+00000000000243A2)
0000000001035FDA Module(sqlservr+0000000000035FDA)
00000000010355E5 Module(sqlservr+00000000000355E5)
00000000010366C8 Module(sqlservr+00000000000366C8)
0000000001289FEE Module(sqlservr+0000000000289FEE)
000000000100782E Module(sqlservr+000000000000782E)
0000000001007FB2 Module(sqlservr+0000000000007FB2)
00000000010079D1 Module(sqlservr+00000000000079D1)
000000000146B4D7 Module(sqlservr+000000000046B4D7)
000000000146BC0A Module(sqlservr+000000000046BC0A)
000000000146BB01 Module(sqlservr+000000000046BB01)
000000000146B999 Module(sqlservr+000000000046B999)
00000000781337A7 Module(MSVCR80+00000000000037A7)
0000000078133864 Module(MSVCR80+0000000000003864)
0000000077D6B69A Module(kernel32+000000000002B69A)
PSS @0x0000000099D9DBF0
-----------------------
CSession @0x0000000099D9C410
----------------------------
m_spid = 55 m_cRef = 22 m_rgcRefType[0] = 1
m_rgcRefType[1] = 1 m_rgcRefType[2] = 19 m_rgcRefType[3] = 1
m_rgcRefType[4] = 0 m_rgcRefType[5] = 0 m_pmo = 0x0000000099D9C080
m_pstackBhfPool = 0x0000000000000000 m_dwLoginFlags = 0x83e0 m_fBackground = 0
m_fClientRequestConnReset = 0 m_fUserProc = -1 m_fConnReset = 0
m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 1
m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0
m_ulLoginStamp = 122 m_eclClient = 5 m_protType = 6
m_hHttpToken = FFFFFFFFFFFFFFFF
m_pV7LoginRec
---------------------
0000000000000000: 5c010000 02000972 00100000 00000006 e8130000 ......r............
0000000000000014: 00000000 e0830000 00000000 00000000 5e000f00 ................^...
0000000000000028: 00000000 00000000 7c002600 c8000f00 e6000000 ........|.&.........
000000000000003C: e6001c00 1e010000 1e010000 0014c23f 4c1e1e01 ...............?L...
0000000000000050: 3e005c01 00005c01 00000000 0000 >...........
CPhysicalConnection @0x0000000099D9C2E0
---------------------------------------
m_pPhyConn->m_pmo = 0x0000000099D9C080
m_pPhyConn->m_pNetConn = 0x0000000099D9CB00
m_pPhyConn->m_pConnList = 0x0000000099D9C3E0
m_pPhyConn->m_pSess = 0x0000000099D9C410 m_pPhyConn->m_fTracked = -1
m_pPhyConn->m_cbPacketsize = 4096 m_pPhyConn->m_fMars = 0 m_pPhyConn->m_fKill = 0
CBatch @0x0000000099D9CFD0
--------------------------
m_pSess = 0x0000000099D9C410 m_pConn = 0x0000000099D9CEC0 m_cRef = 3
m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 1
m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x00000000062C4DA8
EXCEPT (null) @0x000000000AC3B608
---------------------------------
exc_number = 0 exc_severity = 0 exc_func = 0x0000000001891970
Task @0x00000000062C4DA8
------------------------
CPU Ticks used (ms) = 159 Task State = 2
WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0
WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0x3
ThreadId = 0x1374 m_state = 0 m_eAbortSev = 0
EC @0x0000000099D9DC00
----------------------
spid = 55 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x0 ec_atomic = 0x0 __fSubProc = 1
ec_dbccContext = 0x0000000000000000 __pSETLS = 0x0000000099D9CF30 __pSEParams = 0x0000000099D9D350
__pDbLocks = 0x0000000099D9DCC0
SEInternalTLS @0x0000000099D9CF30
---------------------------------
m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x00000000062C4DA8
m_activeHeapDatasetList = 0x0000000099D9CF30
m_activeIndexDatasetList = 0x0000000099D9CF40
SEParams @0x0000000099D9D350
----------------------------
m_lockTimeout = 10000 m_isoLevel = 4096 m_logDontReplicate = 0
m_neverReplicate = 0 m_XactWorkspace = 0x0000000091150410
m_pSessionLocks = 0x0000000099D9DD70 m_pDbLocks = 0x0000000099D9DCC0
m_execStats = 0x000000011CADE810 m_pAllocFileLimit = 0x0000000000000000