SQL Server 2017的Linked Server配置触发的bug“Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION”...

本文详细记录了在SQL Server 2017中配置Oracle Linked Server时遇到的异常错误"Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION"的问题。问题源于"Allow InProcess"选项,微软技术支持建议取消该选项并更新权限设置,实施后问题得到解决。但该问题仅在特定版本SQL Server 2017中出现,且简单查询可能不会触发此bug。
摘要由CSDN通过智能技术生成

SQL Server 2017的Linked Server配置触发的bugException Code    = c0000005 EXCEPTION_ACCESS_VIOLATION

 

现象描述:

 

 

数据库版本:SQL Server 2017 (RTM-CU14) (KB4484710) - 14.0.3076.1 (X64) 出现大量的Dump File文件,如下所示:

 

clip_image001

 

其中一个SQLDump748.txt如下所示:

 

 

Current time is 05:00:20 05/17/19.                                                                               
=====================================================================                                            
       BugCheck Dump                                                                                             
=====================================================================                                            
                                                                                                                 
This file is generated by Microsoft SQL Server                                                                   
version 14.0.3076.1                                                                                              
upon detection of fatal unexpected error. Please return this file,                                               
the query or program that produced the bugcheck, the database and                                                
the error log, and any other pertinent information with a Service Request.                                       
                                                                                                                 
                                                                                                                 
Computer type is Intel(R) Xeon(R) Gold 6148 CPU @ 2.40GHz.                                                       
Bios Version is INTEL  - 6040000                                                                                 
PhoenixBIOS 4.0 Release 6.0                                                                                      
8 X64 level 8664, 2 Mhz processor (s).                                                                           
Windows NT 6.2 Build 9200 CSD .                                                                                  
                                     
Memory                               
MemoryLoad = 92%                     
Total Physical = 131071 MB           
Available Physical = 10157 MB        
Total Page File = 262143 MB          
Available Page File = 135435 MB      
Total Virtual = 134217727 MB         
Available Virtual = 133928023 MB     
***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\LOG\SQLDump7265.txt  
SqlDumpExceptionHandler: Process 59 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is 
terminating this process.                                                                                        
* *******************************************************************************                                
*                                                                                                                
* BEGIN STACK DUMP:                                                                                              
*   05/17/19 05:00:20 spid 59                                                                                    
*                                                                                                                
*                                                                                                                
*   Exception Address = 000001DF83DBC4AC Module(oranls11+000000000004C4AC)                                       
*   Exception Code    = c0000005 EXCEPTION_ACCESS_VIOLATION                                                      
*   Access Violation occurred writing address 00000000E7DF2E60                                                   
* Input Buffer 140 bytes -                                                                                       
*             EXEC [DBO].[usp_sdAutoUploadPriceAndDeliveryDateToESCM_New]                                        
*                                                                                                                
*                                                                                                                
MODULE                          BASE      END       SIZE                                                      
* sqlservr                       00007FF6C47C0000  00007FF6C483EFFF  0007f000                                    
* ntdll                          00007FFE18480000  00007FFE1864FFFF  001d0000                                    
* KERNEL32                       00007FFE16BC0000  00007FFE16C6BFFF  000ac000                                    
* KERNELBASE                     00007FFE15340000  00007FFE1555CFFF  0021d000                                    
* SYSFER                         000000006E400000  000000006E494FFF  00095000                                    
* ADVAPI32                       00007FFE16D10000  00007FFE16DB1FFF  000a2000                                    
* msvcrt                         00007FFE165D0000  00007FFE1666DFFF  0009e000                                    
* sechost                        00007FFE182D0000  00007FFE18328FFF  00059000                                    
* RPCRT4                         00007FFE16910000  00007FFE16A30FFF  00121000                                    
* ole32                          00007FFE15CE0000  00007FFE15E17FFF  00138000                                    
* combase                        00007FFE15A10000  00007FFE15CD4FFF  002c5000                                    
* ucrtbase                       00007FFE149E0000  00007FFE14AD3FFF  000f4000                                    
* bcryptPrimitives               00007FFE14BF0000  00007FFE14C59FFF  0006a000                                    
* GDI32                          00007FFE16420000  00007FFE16453FFF  00034000                                    
* gdi32full                      00007FFE15610000  00007FFE15790FFF  00181000                                    
* USER32                         00007FFE15E80000  00007FFE15FE4FFF  00165000                                    
* NETAPI32                       00007FFE0C660000  00007FFE0C677FFF  00018000                                    
* pdh                            00007FFE11390000  00007FFE113DCFFF  0004d000                                    
* win32u                         00007FFE14970000  00007FFE1498DFFF  0001e000                                    
* sqlmin                         00007FFE02EC0000  00007FFE060B8FFF  031f9000                                    
* sqlTsEs                        00007FFE060C0000  00007FFE069EEFFF  0092f000                                    
* sqllang                        00007FFE00740000  00007FFE02EBAFFF  0277b000                                    
* SQLOS                          00007FFE06EF0000  00007FFE06EF6FFF  00007000                                    
* sqldk                          00007FFE069F0000  00007FFE06EEBFFF  004fc000                                    
* OLEAUT32                       00007FFE16500000  00007FFE165BEFFF  000bf000                                    
* msvcp_win                      00007FFE157A0000  00007FFE1583BFFF  0009c000                                    
* opends60                       00007FFE00730000  00007FFE00738FFF  00009000                                    
* qds                            00007FFE00600000  00007FFE0072BFFF  0012c000                                    
* svl                            00007FFE004E0000  00007FFE0050DFFF  0002e000                                    
* CRYPT32                        00007FFE15840000  00007FFE15A08FFF  001c9000                                    
* MSASN1                         00007FFE14910000  00007FFE1491FFFF  00010000                                    
* WS2_32                         00007FFE18350000  00007FFE183B9FFF  0006a000                                    
* MSVCP120                       00007FFE0BDF0000  00007FFE0BE95FFF  000a6000                                    
* MSVCR120                       00007FFE0D6B0000  00007FFE0D79EFFF  000ef000                                    
* WINMM                          00007FFE12CF0000  00007FFE12D12FFF  00023000                                    
* Secur32                        00007FFE11250000  00007FFE1125BFFF  0000c000                                    
* WINHTTP                        00007FFE11280000  00007FFE1134BFFF  000cc000                                    
* ODBC32                         00007FFE00430000  00007FFE004DEFFF  000af000                                    
* secforwarder                   00007FFE00510000  00007FFE00519FFF  0000a000                                    
* WINMMBASE                      00007FFE12C90000  00007FFE12CBAFFF  0002b000                                    
* cfgmgr32                       00007FFE14990000  00007FFE149D1FFF  00042000                                    
* bcrypt                         00007FFE14820000  00007FFE1484AFFF  0002b000                                    
* ncrypt                         00007FFE14430000  00007FFE14455FFF  00026000                                    
* NTASN1                         00007FFE143F0000  00007FFE1442AFFF  0003b000                                    
* SSPICLI                        00007FFE14550000  00007FFE1457BFFF  0002c000                                    
* NETUTILS                       00007FFE13F70000  00007F
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值