SQL Server 2017的Linked Server配置觸發的bug“Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION” 現象描述: 資料庫版本:SQL Server 2017 (RTM-CU14) (KB4484710) - 14.0.... ...
SQL Server 2017的Linked Server配置觸發的bug“Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION”
現象描述:
資料庫版本:SQL Server 2017 (RTM-CU14) (KB4484710) - 14.0.3076.1 (X64) 出現大量的Dump File文件,如下所示:
其中一個SQLDump748.txt如下所示:
Current time is 05:00:20 05/17/19.
=====================================================================
BugCheck Dump
=====================================================================
This file is generated by Microsoft SQL Server
version 14.0.3076.1
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.
Computer type is Intel(R) Xeon(R) Gold 6148 CPU @ 2.40GHz.
Bios Version is INTEL - 6040000
PhoenixBIOS 4.0 Release 6.0
8 X64 level 8664, 2 Mhz processor (s).
Windows NT 6.2 Build 9200 CSD .
Memory
MemoryLoad = 92%
Total Physical = 131071 MB
Available Physical = 10157 MB
Total Page File = 262143 MB
Available Page File = 135435 MB
Total Virtual = 134217727 MB
Available Virtual = 133928023 MB
***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\LOG\SQLDump7265.txt
SqlDumpExceptionHandler: Process 59 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is
terminating this process.
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 05/17/19 05:00:20 spid 59
*
*
* Exception Address = 000001DF83DBC4AC Module(oranls11+000000000004C4AC)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred writing address 00000000E7DF2E60
* Input Buffer 140 bytes -
* EXEC [DBO].[usp_sdAutoUploadPriceAndDeliveryDateToESCM_New]
*
*
* MODULE BASE END SIZE
* sqlservr 00007FF6C47C0000 00007FF6C483EFFF 0007f000
* ntdll 00007FFE18480000 00007FFE1864FFFF 001d0000
* KERNEL32 00007FFE16BC0000 00007FFE16C6BFFF 000ac000
* KERNELBASE 00007FFE15340000 00007FFE1555CFFF 0021d000
* SYSFER 000000006E400000 000000006E494FFF 00095000
* ADVAPI32 00007FFE16D10000 00007FFE16DB1FFF 000a2000
* msvcrt 00007FFE165D0000 00007FFE1666DFFF 0009e000
* sechost 00007FFE182D0000 00007FFE18328FFF 00059000
* RPCRT4 00007FFE16910000 00007FFE16A30FFF 00121000
* ole32 00007FFE15CE0000 00007FFE15E17FFF 00138000
* combase 00007FFE15A10000 00007FFE15CD4FFF 002c5000
* ucrtbase 00007FFE149E0000 00007FFE14AD3FFF 000f4000
* bcryptPrimitives 00007FFE14BF0000 00007FFE14C59FFF 0006a000
* GDI32 00007FFE16420000 00007FFE16453FFF 00034000
* gdi32full 00007FFE15610000 00007FFE15790FFF 00181000
* USER32 00007FFE15E80000 00007FFE15FE4FFF 00165000
* NETAPI32 00007FFE0C660000 00007FFE0C677FFF 00018000
* pdh 00007FFE11390000 00007FFE113DCFFF 0004d000
* win32u 00007FFE14970000 00007FFE1498DFFF 0001e000
* sqlmin 00007FFE02EC0000 00007FFE060B8FFF 031f9000
* sqlTsEs 00007FFE060C0000 00007FFE069EEFFF 0092f000
* sqllang 00007FFE00740000 00007FFE02EBAFFF 0277b000
* SQLOS 00007FFE06EF0000 00007FFE06EF6FFF 00007000