Quantcast
Channel: SQL Server Database Engine Forum
Viewing all 15872 articles
Browse latest View live

How to manipulate the sys.dm_exec_Procedure_Stats?

$
0
0
I executed the below query and obtained the result set which is shown in the image.

select top 1 st.dbid,st.objectid, ps.execution_count, total_Worker_Time, total_physical_reads, total_elapsed_time, total_logical_reads, total_logical_writes  from sys.dm_exec_procedure_stats ps
cross apply
sys.dm_exec_sql_text(ps.plan_handle) st
order by total_logical_reads + total_logical_writes desc

My intention is to find the execution statistics of a Stored Procedure with top IO.

From the SP's statistics obtained, I have derived the below values.

Total CPU Time = 27237.03 secs (Total_Worker_Time/1000000)

Avg CPU Time = 405.12 Millisecs ((Total_Worker_Time/execution_count)/1000)

Total Elapsed Time = 27619.94 secs (Total_Elapsed_Time/1000000)

Avg Elapsed Time = 410.81 Millisecs ((Total_Elapsed_Time/execution_count)/1000)

Total Logical IO = 16912.25 GB ((Total_Logical_Reads + Total_Logical_Writes)* 8/1024/1024)

Avg Logical IO = 257.58 MB (((Total_Logical_Reads + Total_Logical_Writes)/execution_count)* 8/1024/1024)

Whether the above manipulated approach is correct?

capture baseline with perfmon using a remote server

$
0
0

Hi there,

I'm not sure if this is a SQL DE question or not but a lot of my searches led me to this section of the forum.  In any case, I have the following question about perfmon.  Please move the correct forum if this is the wrong one.

My perfmon server is a windows 2008 r2.  The server I'm looking at is awindows 2003 R2 running SQL 2005 sp2.

From my perfmon server, I'm trying to capture some baseline counters for the SQL 2005 instances but I'm not getting any data and i'm getting the following message when I attempt to open up the blg file:

The data source is not in active mode, this is generally caused by invalid log files.

I'm not sure how my log files are invalid as they were generated for me and no counter information was captured.  On the Windows 2003 R2 server itself, I'm able to capture the required data.

Any suggestions?

Thanks,

Ghost cleanup process in SQL Server 2008 R2

$
0
0

Hi Everyone,

Greetings of the day. 

I have a production job which runs on daily basis to backup, restore and rename the database. In recently, some times at restore database  and rename database steps job failing with below reason “Only user processes can be killed. [SQLSTATE 42000] (Error 6107).  NOTE: The step was retried the requested number of times (3) without succeeding.  The step failed”, after verifying sp_who2 at run time I came to know that a task running with command “GHOST CLEANUP”. Database size around 2TB. Now my requirement is to check the job/script to if “GHOST CLEANUP” running or not? if running step should wait till Ghost Cleanup to complete and start next step/statement (restore database and rename database steps). I hope my question is clear. Please help on this. I’ve below script for basic check,

SELECT  spid,

        sp.[status],

        loginame [Login],

        hostname,

        blocked BlkBy,

        sd.name DBName,

        cmd Command,

        cpu CPUTime,

        physical_io DiskIO,

        last_batch LastBatch,

        [program_name] ProgramName  

FROMmaster.dbo.sysprocesses sp

JOINmaster.dbo.sysdatabases sdON sp.dbid= sd.dbid

Regards,

Syed Jakeer,



Syed Jakeer

SQL Server Assertion error

$
0
0

A SQL Server 2008 R2 Enterprise with SP2 reported SQL Server Assertion error.  it is acting as a subscriber. Page compression is applied to some tables.  A search the forum did not yield similar error being report.   DBCC CheckDB will be performed over the weekend.  I did not see any patches released for this particular problem.

SQL Server Assertion: File: <pageref.cpp>, line=922 Failed Assertion = 'IS_OFF (BUF_MINLOGGED, m_buf->bstat) || pageModifyType != PageModifyType_Contents || GetPagePtr ()->IsTextPage ()'. This error may be timing-related. If the error persists after rerunning the statement, use DBCC CHECKDB to check the database for structural integrity, or restart the server to ensure in-memory data structures are not corrupted.


Debugging SQL minidump - sqllang.dll symbol issue

$
0
0

Hi,

I am attempting to debug a SQL 2012 minidump to find the root cause for the dump.

I am getting the following log

0:006> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

DBGHELP: C:\Program Files (x86)\Windows Kits\8.1\Debuggers\x64\sqllang.dll - file not found
DBGHELP: C:\Program Files (x86)\Windows Kits\8.1\Debuggers\x64\sqllang.dll - file not found
DBGHELP: C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\sqllang.dll - mismatched timestamp
DBGHELP: C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\sqllang.dll - mismatched timestamp
DBGHELP: sqllang.dll not found in C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn
DBGHELP: sqllang.dll not found in C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn
SYMSRV:  Get File Path: /download/symbols/sqllang.dll/519DC178208f000/sqllang.dll

SYMSRV:  Get File Path: /download/symbols/sqllang.dll/519DC178208f000/sqllang.dll

SYMSRV:  Notifies the client application that a proxy has been detected.
SYMSRV:  Notifies the client application that a proxy has been detected.
SYMSRV:  Connecting to the Server: http://msdl.microsoft.com/download/symbols.
SYMSRV:  Connecting to the Server: http://msdl.microsoft.com/download/symbols.
SYMSRV:  Successfully connected to the Server.
SYMSRV:  Successfully connected to the Server.
SYMSRV:  Sending the information request to the server.
SYMSRV:  Sending the information request to the server.
SYMSRV:  Successfully sent the information request to the server.
SYMSRV:  Successfully sent the information request to the server.
SYMSRV:  Waiting for the server to respond to a request.
SYMSRV:  Waiting for the server to respond to a request.
SYMSRV:  Successfully received a response from the server.
SYMSRV:  Successfully received a response from the server.
SYMSRV:  Closing the connection to the Server.
SYMSRV:  Closing the connection to the Server.
SYMSRV:  Successfully closed the connection to the Server.
SYMSRV:  Successfully closed the connection to the Server.
SYMSRV:  Notifies the client application that a proxy has been detected.
SYMSRV:  Notifies the client application that a proxy has been detected.
SYMSRV:  Connecting to the Server: http://msdl.microsoft.com/download/symbols.
SYMSRV:  Connecting to the Server: http://msdl.microsoft.com/download/symbols.
SYMSRV:  Successfully connected to the Server.
SYMSRV:  Successfully connected to the Server.
SYMSRV:  Sending the information request to the server.
SYMSRV:  Sending the information request to the server.
SYMSRV:  Successfully sent the information request to the server.
SYMSRV:  Successfully sent the information request to the server.
SYMSRV:  Waiting for the server to respond to a request.
SYMSRV:  Waiting for the server to respond to a request.
SYMSRV:  Successfully received a response from the server.
SYMSRV:  Successfully received a response from the server.
SYMSRV:  Closing the connection to the Server.
SYMSRV:  Closing the connection to the Server.
SYMSRV:  Successfully closed the connection to the Server.
SYMSRV:  Successfully closed the connection to the Server.
SYMSRV:  Get File Path: /download/symbols/sqllang.dll/519DC178208f000/file.ptr

SYMSRV:  Get File Path: /download/symbols/sqllang.dll/519DC178208f000/file.ptr

SYMSRV:  Notifies the client application that a proxy has been detected.
SYMSRV:  Notifies the client application that a proxy has been detected.
SYMSRV:  Connecting to the Server: http://msdl.microsoft.com/download/symbols.
SYMSRV:  Connecting to the Server: http://msdl.microsoft.com/download/symbols.
SYMSRV:  Successfully connected to the Server.
SYMSRV:  Successfully connected to the Server.
SYMSRV:  Sending the information request to the server.
SYMSRV:  Sending the information request to the server.
SYMSRV:  Successfully sent the information request to the server.
SYMSRV:  Successfully sent the information request to the server.
SYMSRV:  Waiting for the server to respond to a request.
SYMSRV:  Waiting for the server to respond to a request.
SYMSRV:  Successfully received a response from the server.
SYMSRV:  Successfully received a response from the server.
SYMSRV:  Closing the connection to the Server.
SYMSRV:  Closing the connection to the Server.
SYMSRV:  Successfully closed the connection to the Server.
SYMSRV:  Successfully closed the connection to the Server.
SYMSRV:  c:\symbols\sqllang.dll\519DC178208f000\sqllang.dll not found
SYMSRV:  c:\symbols\sqllang.dll\519DC178208f000\sqllang.dll not found
SYMSRV:  http://msdl.microsoft.com/download/symbols/sqllang.dll/519DC178208f000/sqllang.dll not found
SYMSRV:  http://msdl.microsoft.com/download/symbols/sqllang.dll/519DC178208f000/sqllang.dll not found
DBGHELP: C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\sqllang.dll - mismatched
DBGHELP: C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\sqllang.dll - mismatched
DBGHELP: C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\sqllang.dll - mismatched
DBGHELP: C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\sqllang.dll - mismatched

FAULTING_IP:
sqllang!stackTrace+107
000007fb`d123c9f7 456d            ins     dword ptr [rdi],dx

EXCEPTION_RECORD:  ffffffffffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 000007fbd123c9f7 (sqllang!stackTrace+0x0000000000000107)
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

CONTEXT:  0000000000000000 -- (.cxr 0x0;r)
rax=0000000000344fd0 rbx=0000000000000000 rcx=0000000000320000
rdx=0000000000000008 rsi=0000000000000064 rdi=0000000000000f0c
rip=000007fbdd0a2c2a rsp=0000000003d9ce48 rbp=0000000003dbef10
 r8=0000000000000086  r9=0000000000000000 r10=0000000000000000
r11=0000000003d9c168 r12=0000000000000000 r13=0000000000000000
r14=0000000003d9ce78 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00000287
ntdll!NtWaitForSingleObject+0xa:
000007fb`dd0a2c2a c3              ret

DEFAULT_BUCKET_ID:  WRONG_SYMBOLS

PROCESS_NAME:  sqlservr.exe

NTGLOBALFLAG:  0

APP:  sqlservr.exe

ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre

MANAGED_STACK: !dumpstack -EE
OS Thread Id: 0x5f8 (6)
Current frame:
Child-SP         RetAddr          Caller, Callee

LAST_CONTROL_TRANSFER:  from 000007fbda0a10ea to 000007fbdd0a2c2a

PRIMARY_PROBLEM_CLASS:  WRONG_SYMBOLS

BUGCHECK_STR:  APPLICATION_FAULT_WRONG_SYMBOLS

STACK_TEXT: 
000007fb`d123c9f7 000007fb`d123c9f7 sqllang!stackTrace+0x107


FOLLOWUP_IP:
sqllang!stackTrace+107
000007fb`d123c9f7 456d            ins     dword ptr [rdi],dx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  sqllang!stackTrace+107

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: sqllang

IMAGE_NAME:  sqllang.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  519dc178

STACK_COMMAND:  dps 7fbd123c9f7 ; kb

FAILURE_BUCKET_ID:  WRONG_SYMBOLS_0_sqllang.dll!stackTrace

BUCKET_ID:  APPLICATION_FAULT_WRONG_SYMBOLS_sqllang!stackTrace+107

ANALYSIS_SOURCE:  UM

FAILURE_ID_HASH_STRING:  um:wrong_symbols_0_sqllang.dll!stacktrace

FAILURE_ID_HASH:  {1cd55e21-f050-d551-7897-61b3cb5bf8d6}

Followup: MachineOwner
---------

0:006> .ecxr
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=0000000000000000 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
cs=0000  ss=0000  ds=0000  es=0000  fs=0000  gs=0000             efl=00000000
00000000`00000000 ??              ???
0:006> kv 1000
Child-SP          RetAddr           : Args to Child                                                           : Call Site
00000000`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0

***********************

How do I resolve this issue?" Been going round in circles with this one.

Thanks

Michael

Index rebuild assertion

$
0
0

Hi all,

I met an assertion recently on production environment as below. 

SQL Server Assertion: File: <pageref.cpp>, line=935 Failed Assertion = 'IS_OFF (BUF_MINLOGGED, m_buf->bstat) || pageModifyType != PageModifyType_Contents || GetPagePtr ()->IsTextPage ()'. This error may be timing-related. If the error persists after rerunning the statement, use DBCC CHECKDB to check the database for structural integrity, or restart the server to ensure in-memory data structures are not corrupted.

The version is 

Microsoft SQL Server 2014 (SP1-CU6-OD) (KB3167392) - 12.0.4457.0 (X64) 
May 26 2016 23:44:09 
Copyright (c) Microsoft Corporation
Enterprise Edition (64-bit) on Windows NT 6.1 <X64> (Build 7601: Service Pack 1)

I did the search and found the similar cases:

https://support.microsoft.com/da-dk/kb/2297709

https://support.microsoft.com/en-us/kb/968740

But one is for 2008 and said to be fixed already and another is related to bulk insert. So I am not sure if this was a known issue or a new one. Please provide some assistance if you can.

Below is the full description of the stack dump:

2016-06-12 02:13:41.61 spid73      Using 'dbghelp.dll' version '4.0.5'
2016-06-12 02:13:41.62 spid73      **Dump thread - spid = 73, EC = 0x000000140DF9C160
2016-06-12 02:13:41.63 spid73      ***Stack Dump being sent to D:\MSSQL10_50.SQP01\MSSQL\LOG\SQLDump0054.txt
2016-06-12 02:13:41.63 spid73      * *******************************************************************************
2016-06-12 02:13:41.63 spid73      *
2016-06-12 02:13:41.63 spid73      * BEGIN STACK DUMP:
2016-06-12 02:13:41.63 spid73      *   06/12/16 02:13:41 spid 14348
2016-06-12 02:13:41.63 spid73      *
2016-06-12 02:13:41.63 spid73      * Location:pageref.cpp:935
2016-06-12 02:13:41.63 spid73      * Expression:IS_OFF (BUF_MINLOGGED, m_buf->bstat) || pageModifyType != PageModifyType_Contents || GetPagePtr ()->IsTextPage ()
2016-06-12 02:13:41.63 spid73      * SPID:73
2016-06-12 02:13:41.63 spid73      * Process ID:9972
2016-06-12 02:13:41.63 spid73      *
2016-06-12 02:13:41.63 spid73      * Input Buffer 255 bytes -
2016-06-12 02:13:41.63 spid73      *                     16 00 00 00 12 00 00 00 02 00 00 00 00 00 00 00 00 00
2016-06-12 02:13:41.63 spid73      *        d b o . I n  01 00 00 00 11 00 64 00 62 00 6f 00 2e 00 49 00 6e 00
2016-06-12 02:13:41.63 spid73      *  d e x O p t i m i  64 00 65 00 78 00 4f 00 70 00 74 00 69 00 6d 00 69 00
2016-06-12 02:13:41.63 spid73      *  z e    @ D a t a b 7a 00 65 00 00 00 0a 40 00 44 00 61 00 74 00 61 00 62
2016-06-12 02:13:41.63 spid73      *   a s e s  ç0 Ð 4 00 61 00 73 00 65 00 73 00 00 e7 30 00 09 04 d0 00 34
2016-06-12 02:13:41.63 spid73      *  0 p r d 0 O p e r  30 00 70 00 72 00 64 00 30 00 4f 00 70 00 65 00 72 00
2016-06-12 02:13:41.63 spid73      *  a t i o n a l D a  61 00 74 00 69 00 6f 00 6e 00 61 00 6c 00 44 00 61 00
2016-06-12 02:13:41.63 spid73      *  t a S t o r e  @ F 74 00 61 00 53 00 74 00 6f 00 72 00 65 00 11 40 00 46
2016-06-12 02:13:41.63 spid73      *   r a g m e n t a t 00 72 00 61 00 67 00 6d 00 65 00 6e 00 74 00 61 00 74
2016-06-12 02:13:41.63 spid73      *   i o n L o w  ç  00 69 00 6f 00 6e 00 4c 00 6f 00 77 00 00 e7 02 00 09
2016-06-12 02:13:41.63 spid73      *   Ð 4ÿÿ @ F r a g m 04 d0 00 34 ff ff 14 40 00 46 00 72 00 61 00 67 00 6d
2016-06-12 02:13:41.63 spid73      *   e n t a t i o n M 00 65 00 6e 00 74 00 61 00 74 00 69 00 6f 00 6e 00 4d
2016-06-12 02:13:41.63 spid73      *   e d i u m  çv Ð 00 65 00 64 00 69 00 75 00 6d 00 00 e7 76 00 09 04 d0
2016-06-12 02:13:41.63 spid73      *   4v I N D E X _ R  00 34 76 00 49 00 4e 00 44 00 45 00 58 00 5f 00 52 00
2016-06-12 02:13:41.63 spid73      *  E O R G A N I Z E  45 00 4f 00 52 00 47 00 41 00 4e 00 49 00 5a 00 45 00
2016-06-12 02:13:41.63 spid73      *  , I N D E X _ R E  2c 00 49 00 4e 00 44 00 45 00 58 00 5f 00 52 00 45 00
2016-06-12 02:13:41.63 spid73      *  B U I L D _ O N L  42 00 55 00 49 00 4c 00 44 00 5f 00 4f 00 4e 00 4c 00
2016-06-12 02:13:41.63 spid73      *  I N E , I N D E X  49 00 4e 00 45 00 2c 00 49 00 4e 00 44 00 45 00 58 00
2016-06-12 02:13:41.63 spid73      *  _ R E B U I L D _  5f 00 52 00 45 00 42 00 55 00 49 00 4c 00 44 00 5f 00
2016-06-12 02:13:41.63 spid73      *  O F F L I N E  @ F 4f 00 46 00 46 00 4c 00 49 00 4e 00 45 00 12 40 00 46
2016-06-12 02:13:41.63 spid73      *   r a g m e n t a t 00 72 00 61 00 67 00 6d 00 65 00 6e 00 74 00 61 00 74
2016-06-12 02:13:41.63 spid73      *   i o n H i g h  çT 00 69 00 6f 00 6e 00 48 00 69 00 67 00 68 00 00 e7 54
2016-06-12 02:13:41.63 spid73      *   Ð 4T I N D E X  00 09 04 d0 00 34 54 00 49 00 4e 00 44 00 45 00 58 00
2016-06-12 02:13:41.63 spid73      *  _ R E B U I L D _  5f 00 52 00 45 00 42 00 55 00 49 00 4c 00 44 00 5f 00
2016-06-12 02:13:41.63 spid73      *  O N L I N E , I N  4f 00 4e 00 4c 00 49 00 4e 00 45 00 2c 00 49 00 4e 00
2016-06-12 02:13:41.63 spid73      *  D E X _ R E B U I  44 00 45 00 58 00 5f 00 52 00 45 00 42 00 55 00 49 00
2016-06-12 02:13:41.63 spid73      *  L D _ O F F L I N  4c 00 44 00 5f 00 4f 00 46 00 46 00 4c 00 49 00 4e 00
2016-06-12 02:13:41.63 spid73      *  E  @ F r a g m e n 45 00 14 40 00 46 00 72 00 61 00 67 00 6d 00 65 00 6e
2016-06-12 02:13:41.63 spid73      *   t a t i o n L e v 00 74 00 61 00 74 00 69 00 6f 00 6e 00 4c 00 65 00 76
2016-06-12 02:13:41.63 spid73      *   e l 1  &       @  00 65 00 6c 00 31 00 00 26 04 04 05 00 00 00 14 40 00
2016-06-12 02:13:41.63 spid73      *  F r a g m e n t a  46 00 72 00 61 00 67 00 6d 00 65 00 6e 00 74 00 61 00
2016-06-12 02:13:41.63 spid73      *  t i o n L e v e l  74 00 69 00 6f 00 6e 00 4c 00 65 00 76 00 65 00 6c 00
2016-06-12 02:13:41.63 spid73      *  2  &       @ U p d 32 00 00 26 04 04 1e 00 00 00 11 40 00 55 00 70 00 64
2016-06-12 02:13:41.63 spid73      *   a t e S t a t i s 00 61 00 74 00 65 00 53 00 74 00 61 00 74 00 69 00 73
2016-06-12 02:13:41.63 spid73      *   t i c s  ç  Ð 4 00 74 00 69 00 63 00 73 00 00 e7 06 00 09 04 d0 00 34
2016-06-12 02:13:41.63 spid73      *    A L L  @ L o g T 06 00 41 00 4c 00 4c 00 0b 40 00 4c 00 6f 00 67 00 54
2016-06-12 02:13:41.63 spid73      *   o T a b l e  ç  00 6f 00 54 00 61 00 62 00 6c 00 65 00 00 e7 02 00 09
2016-06-12 02:13:41.63 spid73      *   Ð 4  Y  @ O n l y 04 d0 00 34 02 00 59 00 17 40 00 4f 00 6e 00 6c 00 79
2016-06-12 02:13:41.63 spid73      *   M o d i f i e d S 00 4d 00 6f 00 64 00 69 00 66 00 69 00 65 00 64 00 53
2016-06-12 02:13:41.63 spid73      *   t a t i s t i c s 00 74 00 61 00 74 00 69 00 73 00 74 00 69 00 63 00 73
2016-06-12 02:13:41.63 spid73      *    ç  Ð 4  Y  @ P 00 00 e7 02 00 09 04 d0 00 34 02 00 59 00 0f 40 00 50
2016-06-12 02:13:41.63 spid73      *   a r t i t i o n L 00 61 00 72 00 74 00 69 00 74 00 69 00 6f 00 6e 00 4c
2016-06-12 02:13:41.63 spid73      *   e v e l  ç  Ð 4 00 65 00 76 00 65 00 6c 00 00 e7 02 00 09 04 d0 00 34
2016-06-12 02:13:41.63 spid73      *    Y  @ I n d e x e 02 00 59 00 08 40 00 49 00 6e 00 64 00 65 00 78 00 65
2016-06-12 02:13:41.63 spid73      *   s  ç  Ð 4  A L  00 73 00 00 e7 16 00 09 04 d0 00 34 16 00 41 00 4c 00
2016-06-12 02:13:41.63 spid73      *  L _ I N D E X E S  4c 00 5f 00 49 00 4e 00 44 00 45 00 58 00 45 00 53 00
2016-06-12 02:13:41.63 spid73      *   @ T i m e L i m i 0a 40 00 54 00 69 00 6d 00 65 00 4c 00 69 00 6d 00 69
2016-06-12 02:13:41.63 spid73      *   t  &   p          00 74 00 00 26 04 04 80 70 00 00
2016-06-12 02:13:41.63 spid73      *  
2016-06-12 02:13:41.63 spid73      *
2016-06-12 02:13:41.63 spid73      *  MODULE                          BASE      END       SIZE
2016-06-12 02:13:41.63 spid73      * sqlservr                       00000000FFA20000  00000000FFA7FFFF  00060000
2016-06-12 02:13:41.63 spid73      * ntdll                          00000000773C0000  0000000077569FFF  001aa000
2016-06-12 02:13:41.63 spid73      * kernel32                       00000000772A0000  00000000773BEFFF  0011f000
2016-06-12 02:13:41.63 spid73      * KERNELBASE                     000007FEFD380000  000007FEFD3E9FFF  0006a000
2016-06-12 02:13:41.63 spid73      * NETAPI32                       000007FEFAFF0000  000007FEFB005FFF  00016000
2016-06-12 02:13:41.63 spid73      * netutils                       000007FEFC940000  000007FEFC94BFFF  0000c000
2016-06-12 02:13:41.63 spid73      * msvcrt                         000007FEFE6D0000  000007FEFE76EFFF  0009f000
2016-06-12 02:13:41.63 spid73      * srvcli                         000007FEFCC10000  000007FEFCC32FFF  00023000
2016-06-12 02:13:41.63 spid73      * RPCRT4                         000007FEFECC0000  000007FEFEDECFFF  0012d000
2016-06-12 02:13:41.63 spid73      * wkscli                         000007FEFAFD0000  000007FEFAFE4FFF  00015000
2016-06-12 02:13:41.63 spid73      * pdh                            000007FEF9770000  000007FEF97BDFFF  0004e000
2016-06-12 02:13:41.63 spid73      * ADVAPI32                       000007FEFD5C0000  000007FEFD69AFFF  000db000
2016-06-12 02:13:41.63 spid73      * sechost                        000007FEFE6B0000  000007FEFE6CEFFF  0001f000
2016-06-12 02:13:41.63 spid73      * opends60                       000007FEFA550000  000007FEFA558FFF  00009000
2016-06-12 02:13:41.63 spid73      * MSVCR100                       0000000074720000  00000000747F1FFF  000d2000
2016-06-12 02:13:41.63 spid73      * MSVCP100                       0000000073510000  00000000735A7FFF  00098000
2016-06-12 02:13:41.63 spid73      * SQLOS                          000007FEF1B30000  000007FEF1B36FFF  00007000
2016-06-12 02:13:41.63 spid73      * sqlmin                         000007FEDA740000  000007FEDE5FDFFF  03ebe000
2016-06-12 02:13:41.63 spid73      * CRYPT32                        000007FEFD3F0000  000007FEFD55CFFF  0016d000
2016-06-12 02:13:41.63 spid73      * MSASN1                         000007FEFD210000  000007FEFD21EFFF  0000f000
2016-06-12 02:13:41.63 spid73      * Secur32                        000007FEFCE00000  000007FEFCE0AFFF  0000b000
2016-06-12 02:13:41.63 spid73      * SSPICLI                        000007FEFCFD0000  000007FEFCFF4FFF  00025000
2016-06-12 02:13:41.63 spid73      * PSAPI                          0000000077590000  0000000077596FFF  00007000
2016-06-12 02:13:41.63 spid73      * WS2_32                         000007FEFE880000  000007FEFE8CCFFF  0004d000
2016-06-12 02:13:41.63 spid73      * NSI                            000007FEFF000000  000007FEFF007FFF  00008000
2016-06-12 02:13:41.63 spid73      * WINHTTP                        000007FEF9090000  000007FEF9100FFF  00071000
2016-06-12 02:13:41.63 spid73      * webio                          000007FEF9020000  000007FEF9083FFF  00064000
2016-06-12 02:13:41.63 spid73      * USER32                         00000000771A0000  0000000077299FFF  000fa000
2016-06-12 02:13:41.63 spid73      * GDI32                          000007FEFF3B0000  000007FEFF416FFF  00067000
2016-06-12 02:13:41.63 spid73      * LPK                            000007FEFD6A0000  000007FEFD6ADFFF  0000e000
2016-06-12 02:13:41.63 spid73      * USP10                          000007FEFE8D0000  000007FEFE999FFF  000ca000
2016-06-12 02:13:41.63 spid73      * ole32                          000007FEFEDF0000  000007FEFEFF2FFF  00203000
2016-06-12 02:13:41.63 spid73      * OLEAUT32                       000007FEFF2A0000  000007FEFF377FFF  000d8000
2016-06-12 02:13:41.63 spid73      * sqlTsEs                        000007FED9EA0000  000007FEDA733FFF  00894000
2016-06-12 02:13:41.63 spid73      * sqldk                          000007FED99D0000  000007FED9E9FFFF  004d0000
2016-06-12 02:13:41.63 spid73      * WINMM                          000007FEEC580000  000007FEEC5BAFFF  0003b000
2016-06-12 02:13:41.63 spid73      * qds                            000007FEE30D0000  000007FEE315EFFF  0008f000
2016-06-12 02:13:41.63 spid73      * sqllang                        000007FED7720000  000007FED99C7FFF  022a8000
2016-06-12 02:13:41.63 spid73      * USERENV                        000007FEFD260000  000007FEFD27DFFF  0001e000
2016-06-12 02:13:41.63 spid73      * profapi                        000007FEFD200000  000007FEFD20EFFF  0000f000
2016-06-12 02:13:41.63 spid73      * LOGONCLI                       000007FEFC8B0000  000007FEFC8DFFFF  00030000
2016-06-12 02:13:41.63 spid73      * SAMCLI                         000007FEFA660000  000007FEFA673FFF  00014000
2016-06-12 02:13:41.63 spid73      * AUTHZ                          000007FEFCBD0000  000007FEFCBFEFFF  0002f000
2016-06-12 02:13:41.63 spid73      * WINTRUST                       000007FEFD580000  000007FEFD5BAFFF  0003b000
2016-06-12 02:13:41.63 spid73      * IMM32                          000007FEFF380000  000007FEFF3ADFFF  0002e000
2016-06-12 02:13:41.63 spid73      * MSCTF                          000007FEFE770000  000007FEFE878FFF  00109000
2016-06-12 02:13:41.63 spid73      * CRYPTBASE                      000007FEFD000000  000007FEFD00EFFF  0000f000
2016-06-12 02:13:41.63 spid73      * instapi120                     000007FEF4A10000  000007FEF4A1EFFF  0000f000
2016-06-12 02:13:41.63 spid73      * CLUSAPI                        000007FEFA160000  000007FEFA1AFFFF  00050000
2016-06-12 02:13:41.63 spid73      * cryptdll                       000007FEFCD20000  000007FEFCD33FFF  00014000
2016-06-12 02:13:41.63 spid73      * RESUTILS                       000007FEFA140000  000007FEFA158FFF  00019000
2016-06-12 02:13:41.63 spid73      * cscapi                         000007FEFA830000  000007FEFA83EFFF  0000f000
2016-06-12 02:13:41.63 spid73      * sqlevn70                       000007FED7470000  000007FED771DFFF  002ae000
2016-06-12 02:13:41.63 spid73      * CRYPTSP                        000007FEFCAF0000  000007FEFCB07FFF  00018000
2016-06-12 02:13:41.63 spid73      * rsaenh                         000007FEFC720000  000007FEFC766FFF  00047000
2016-06-12 02:13:41.63 spid73      * imagehlp                       000007FEFF650000  000007FEFF668FFF  00019000
2016-06-12 02:13:41.63 spid73      * ncrypt                         000007FEFCB80000  000007FEFCBCFFFF  00050000
2016-06-12 02:13:41.63 spid73      * bcrypt                         000007FEFCB10000  000007FEFCB31FFF  00022000
2016-06-12 02:13:41.63 spid73      * bcryptprimitives               000007FEFC660000  000007FEFC6ABFFF  0004c000
2016-06-12 02:13:41.63 spid73      * GPAPI                          000007FEFC510000  000007FEFC52AFFF  0001b000
2016-06-12 02:13:41.63 spid73      * cryptnet                       000007FEF9CE0000  000007FEF9D06FFF  00027000
2016-06-12 02:13:41.63 spid73      * WLDAP32                        000007FEFF670000  000007FEFF6C1FFF  00052000
2016-06-12 02:13:41.63 spid73      * SHLWAPI                        000007FEFD6B0000  000007FEFD720FFF  00071000
2016-06-12 02:13:41.63 spid73      * VERSION                        000007FEFC2D0000  000007FEFC2DBFFF  0000c000
2016-06-12 02:13:41.63 spid73      * hkruntime                      000007FED71B0000  000007FED7466FFF  002b7000
2016-06-12 02:13:41.63 spid73      * hkcompile                      000007FED70F0000  000007FED71ADFFF  000be000
2016-06-12 02:13:41.63 spid73      * XmlLite                        000007FEFB310000  000007FEFB344FFF  00035000
2016-06-12 02:13:41.63 spid73      * hkengine                       000007FED6F30000  000007FED70E0FFF  001b1000
2016-06-12 02:13:41.63 spid73      * dbghelp                        000000006D150000  000000006D2E5FFF  00196000
2016-06-12 02:13:41.63 spid73      * pcwum                          000007FEFC500000  000007FEFC50CFFF  0000d000
2016-06-12 02:13:41.63 spid73      * credssp                        000007FEFC610000  000007FEFC619FFF  0000a000
2016-06-12 02:13:41.63 spid73      * msv1_0                         000007FEFC8E0000  000007FEFC931FFF  00052000
2016-06-12 02:13:41.63 spid73      * kerberos                       000007FEFCA00000  000007FEFCAB7FFF  000b8000
2016-06-12 02:13:41.63 spid73      * schannel                       000007FEFC570000  000007FEFC5C7FFF  00058000
2016-06-12 02:13:41.63 spid73      * MSCOREE                        000007FEF8A20000  000007FEF8A8EFFF  0006f000
2016-06-12 02:13:41.63 spid73      * mscoreei                       000007FEF8990000  000007FEF8A1FFFF  00090000
2016-06-12 02:13:41.63 spid73      * security                       000000006F690000  000000006F692FFF  00003000
2016-06-12 02:13:41.63 spid73      * CLBCatQ                        000007FEFE9A0000  000007FEFEA38FFF  00099000
2016-06-12 02:13:41.63 spid73      * sqlncli11                      000007FED6BD0000  000007FED6F22FFF  00353000
2016-06-12 02:13:41.63 spid73      * COMCTL32                       000007FEFA1B0000  000007FEFA24FFFF  000a0000
2016-06-12 02:13:41.63 spid73      * COMDLG32                       000007FEFEC20000  000007FEFECB6FFF  00097000
2016-06-12 02:13:41.63 spid73      * SHELL32                        000007FEFD730000  000007FEFE4B8FFF  00d89000
2016-06-12 02:13:41.63 spid73      * ntmarta                        000007FEFC2A0000  000007FEFC2CCFFF  0002d000
2016-06-12 02:13:41.63 spid73      * SQLNCLIR11                     000000006F3F0000  000000006F427FFF  00038000
2016-06-12 02:13:41.63 spid73      * netbios                        000007FEEE7E0000  000007FEEE7E9FFF  0000a000
2016-06-12 02:13:41.63 spid73      * clr                            000007FEF8020000  000007FEF8984FFF  00965000
2016-06-12 02:13:41.63 spid73      * MSVCR100_CLR0400               000007FEF7F40000  000007FEF8010FFF  000d1000
2016-06-12 02:13:41.63 spid73      * mscorlib.ni                    000007FEF6BD0000  000007FEF7E48FFF  01279000
2016-06-12 02:13:41.63 spid73      * nlssorting                     000007FEF6BB0000  000007FEF6BC3FFF  00014000
2016-06-12 02:13:41.63 spid73      * SqlAccess                      000000006D700000  000000006D771FFF  00072000
2016-06-12 02:13:41.63 spid73      * clrjit                         000007FEF5120000  000007FEF5292FFF  00173000
2016-06-12 02:13:41.63 spid73      * BatchParser                    000007FEECFD0000  000007FEECFF7FFF  00028000
2016-06-12 02:13:41.63 spid73      * ftimport                       0000000060000000  0000000060024FFF  00025000
2016-06-12 02:13:41.63 spid73      * MSFTE                          000000005E430000  000000005E7DDFFF  003ae000
2016-06-12 02:13:41.63 spid73      * mswsock                        000007FEFC9A0000  000007FEFC9F4FFF  00055000
2016-06-12 02:13:41.63 spid73      * wshtcpip                       000007FEFC3A0000  000007FEFC3A6FFF  00007000
2016-06-12 02:13:41.63 spid73      * ntdsapi                        000007FEFA800000  000007FEFA826FFF  00027000
2016-06-12 02:13:41.63 spid73      * wship6                         000007FEFC990000  000007FEFC996FFF  00007000
2016-06-12 02:13:41.63 spid73      * DNSAPI                         000007FEFC770000  000007FEFC7CAFFF  0005b000
2016-06-12 02:13:41.63 spid73      * IPHLPAPI                       000007FEFB390000  000007FEFB3B6FFF  00027000
2016-06-12 02:13:41.63 spid73      * WINNSI                         000007FEFB360000  000007FEFB36AFFF  0000b000
2016-06-12 02:13:41.63 spid73      * rasadhlp                       000007FEFA850000  000007FEFA857FFF  00008000
2016-06-12 02:13:41.63 spid73      * fwpuclnt                       000007FEFB220000  000007FEFB272FFF  00053000
2016-06-12 02:13:41.63 spid73      * netfxperf                      000007FEEE7F0000  000007FEEE7FFFFF  00010000
2016-06-12 02:13:41.63 spid73      * perfcounter                    000007FEF0120000  000007FEF0142FFF  00023000
2016-06-12 02:13:41.63 spid73      * CorperfmonExt                  000007FEF00F0000  000007FEF0114FFF  00025000
2016-06-12 02:13:41.63 spid73      * WTSAPI32                       000007FEFB760000  000007FEFB770FFF  00011000
2016-06-12 02:13:41.63 spid73      * aspnet_counters                000007FEF00E0000  000007FEF00E7FFF  00008000
2016-06-12 02:13:41.63 spid73      * aspnet_perf                    000007FEF00D0000  000007FEF00DCFFF  0000d000
2016-06-12 02:13:41.63 spid73      * aspnet_perf                    000007FEF00C0000  000007FEF00CCFFF  0000d000
2016-06-12 02:13:41.63 spid73      * MSVCR80                        0000000074EB0000  0000000074F78FFF  000c9000
2016-06-12 02:13:41.63 spid73      * bitsperf                       000007FEFB180000  000007FEFB189FFF  0000a000
2016-06-12 02:13:41.63 spid73      * FrameworkPerf                  000000006F680000  000000006F688FFF  00009000
2016-06-12 02:13:41.63 spid73      * MSVCP120                       000007FEF0010000  000007FEF00B5FFF  000a6000
2016-06-12 02:13:41.63 spid73      * MSVCR120                       000007FEEFF20000  000007FEF000EFFF  000ef000
2016-06-12 02:13:41.63 spid73      * ccmperf                        000000006F5A0000  000000006F5BBFFF  0001c000
2016-06-12 02:13:41.63 spid73      * ccmcore                        0000000071810000  000000007195BFFF  0014c000
2016-06-12 02:13:41.63 spid73      * CcmProfiler                    00000000714A0000  00000000714D2FFF  00033000
2016-06-12 02:13:41.63 spid73      * CcmSqlCE                       000007FEEF3E0000  000007FEEF419FFF  0003a000
2016-06-12 02:13:41.63 spid73      * DTSPipelinePerf                000000003DFA0000  000000003DFABFFF  0000c000
2016-06-12 02:13:41.63 spid73      * MSVCP80                        0000000074DA0000  0000000074EA8FFF  00109000
2016-06-12 02:13:41.63 spid73      * DTSPipelinePerf100             000000006F570000  000000006F57BFFF  0000c000
2016-06-12 02:13:41.63 spid73      * DTSPipelinePerf110             000007FEEE7D0000  000007FEEE7DBFFF  0000c000
2016-06-12 02:13:41.63 spid73      * DTSPipelinePerf120             000007FEEE760000  000007FEEE76CFFF  0000d000
2016-06-12 02:13:41.63 spid73      * SSOPerfMonExt                  000000006EF60000  000000006EF6BFFF  0000c000
2016-06-12 02:13:41.63 spid73      * esentprf                       000007FEEE6A0000  000007FEEE6B1FFF  00012000
2016-06-12 02:13:41.63 spid73      * HealthServicePerformance       000007FEEE750000  000007FEEE75CFFF  0000d000
2016-06-12 02:13:41.63 spid73      * InterceptCounters              000007FED6A80000  000007FED6B14FFF  00095000
2016-06-12 02:13:41.63 spid73      * loadperf                       000007FEED190000  000007FEED1B6FFF  00027000
2016-06-12 02:13:41.63 spid73      * MOMConnectorPerformance        000007FEEE360000  000007FEEE36AFFF  0000b000
2016-06-12 02:13:41.63 spid73      * msdtcuiu                       000007FEEBE80000  000007FEEBECFFFF  00050000
2016-06-12 02:13:41.63 spid73      * ATL                            000007FEFBA20000  000007FEFBA38FFF  00019000
2016-06-12 02:13:41.63 spid73      * MSDTCPRX                       000007FEF1E60000  000007FEF1F1BFFF  000bc000
2016-06-12 02:13:41.63 spid73      * MTXCLU                         000007FEF1F20000  000007FEF1F7FFFF  00060000
2016-06-12 02:13:41.63 spid73      * ktmw32                         000007FEFAE50000  000007FEFAE59FFF  0000a000
2016-06-12 02:13:41.63 spid73      * msfte                          000000006A600000  000000006A9B0FFF  003b1000
2016-06-12 02:13:41.63 spid73      * msfte                          000000006A9C0000  000000006AD70FFF  003b1000
2016-06-12 02:13:41.63 spid73      * msmdctr120                     000007FEF1B20000  000007FEF1B29FFF  0000a000
2016-06-12 02:13:41.63 spid73      * msmdctr100                     0000000071970000  0000000071979FFF  0000a000
2016-06-12 02:13:41.63 spid73      * perf-MSSQL$SQP13-sqlctr11.3.6020.0 000007FEEE700000  000007FEEE74EFFF  0004f000
2016-06-12 02:13:41.63 spid73      * instapi110                     000007FEF7F30000  000007FEF7F3DFFF  0000e000
2016-06-12 02:13:41.63 spid73      * perfdisk                       000007FEFA4C0000  000007FEFA4CCFFF  0000d000
2016-06-12 02:13:41.63 spid73      * CFGMGR32                       000007FEFD220000  000007FEFD255FFF  00036000
2016-06-12 02:13:41.63 spid73      * perfnet                        000007FEED870000  000007FEED879FFF  0000a000
2016-06-12 02:13:41.63 spid73      * BROWCLI                        000007FEEE2C0000  000007FEEE2D1FFF  00012000
2016-06-12 02:13:41.63 spid73      * perfos                         000007FEEE2B0000  000007FEEE2BAFFF  0000b000
2016-06-12 02:13:41.63 spid73      * perfproc                       000007FEECFC0000  000007FEECFCDFFF  0000e000
2016-06-12 02:13:41.63 spid73      * rasctrs                        000007FEFB170000  000007FEFB177FFF  00008000
2016-06-12 02:13:41.63 spid73      * rasman                         000007FEFAA40000  000007FEFAA5BFFF  0001c000
2016-06-12 02:13:41.63 spid73      * winspool                       000007FEFA5A0000  000007FEFA610FFF  00071000
2016-06-12 02:13:41.63 spid73      * SQLAGENTCTR90                  0000000055200000  000000005538AFFF  0018b000
2016-06-12 02:13:41.63 spid73      * instapi                        000000003F880000  000000003F88CFFF  0000d000
2016-06-12 02:13:41.63 spid73      * perf-MSSQL12.SQP01-sqlagtctr   0000000071500000  000000007151BFFF  0001c000
2016-06-12 02:13:41.63 spid73      * perf-MSSQL12.SQP05-sqlagtctr   0000000070990000  00000000709ABFFF  0001c000
2016-06-12 02:13:41.63 spid73      * perf-MSSQL11.SQP13-sqlagtctr   000007FEF1AB0000  000007FEF1AC9FFF  0001a000
2016-06-12 02:13:41.63 spid73      * tapiperf                       000007FEF0150000  000007FEF0156FFF  00007000
2016-06-12 02:13:41.63 spid73      * Perfctrs                       000007FEF7EB0000  000007FEF7EBFFFF  00010000
2016-06-12 02:13:41.63 spid73      * perfts                         000007FEEBE70000  000007FEEBE78FFF  00009000
2016-06-12 02:13:41.63 spid73      * WINSTA                         000007FEFD110000  000007FEFD14CFFF  0003d000
2016-06-12 02:13:41.63 spid73      * UTILDLL                        000007FEED170000  000007FEED186FFF  00017000
2016-06-12 02:13:41.63 spid73      * SETUPAPI                       000007FEFEA40000  000007FEFEC16FFF  001d7000
2016-06-12 02:13:41.63 spid73      * DEVOBJ                         000007FEFD350000  000007FEFD369FFF  0001a000
2016-06-12 02:13:41.63 spid73      * usbperf                        000007FEF1AA0000  000007FEF1AA6FFF  00007000
2016-06-12 02:13:41.63 spid73      * wmiaprpl                       000007FEEBB10000  000007FEEBB35FFF  00026000
2016-06-12 02:13:41.63 spid73      * wbemcomn                       000007FEFA0A0000  000007FEFA125FFF  00086000
2016-06-12 02:13:41.63 spid73      * msxml3                         000007FEE9B30000  000007FEE9D04FFF  001d5000
2016-06-12 02:13:41.63 spid73      * xpstar                         000007FEE2FC0000  000007FEE3027FFF  00068000
2016-06-12 02:13:41.63 spid73      * ODBC32                         000007FEF3370000  000007FEF3420FFF  000b1000
2016-06-12 02:13:41.63 spid73      * SQLSCM                         000007FEEE2E0000  000007FEEE2EEFFF  0000f000
2016-06-12 02:13:41.63 spid73      * odbcint                        0000000072550000  0000000072587FFF  00038000
2016-06-12 02:13:41.63 spid73      * xpstar                         000007FEEE2A0000  000007FEEE2ACFFF  0000d000
2016-06-12 02:13:41.63 spid73      * xprepl                         000007FEEB930000  000007FEEB946FFF  00017000
2016-06-12 02:13:41.63 spid73      * xpsqlbot                       000007FEFA560000  000007FEFA567FFF  00008000
2016-06-12 02:13:41.63 spid73      * SAMLIB                         000007FEFA8F0000  000007FEFA90CFFF  0001d000
2016-06-12 02:13:41.63 spid73      * dbghelp                        0000000055400000  0000000055595FFF  00196000
2016-06-12 02:13:41.63 spid73      *
2016-06-12 02:13:41.63 spid73      *     P1Home: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *     P2Home: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *     P3Home: 00000000923F14A0:  0000000000000000  0000000000000000  0000000000000000  0000000000000000  000000000000000A  00000000FFFFFFFF  
2016-06-12 02:13:41.63 spid73      *     P4Home: 000007FED773A748:  002FAE47880FC085  3C870FC73B489848  1C89661275002FAE  C38B30247C8B487E  48C35B5E38C48348  8348C38B30247C8B  
2016-06-12 02:13:41.63 spid73      *     P5Home: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *     P6Home: 00000000923F1640:  0044004C00510053  0000000000489E10  0000003400350030  000000000048A084  000000000049DB80  00000000E531214E  
2016-06-12 02:13:41.63 spid73      * ContextFlags: 000000000010004F:  0000000000000000  0001D00000000000  000010000000FE00  0000740000000600  0000010000000200  0001FC000000D400  
2016-06-12 02:13:41.63 spid73      *      MxCsr: 0000000000001FA8:  
2016-06-12 02:13:41.63 spid73      *      SegCs: 0000000000000033:  
2016-06-12 02:13:41.63 spid73      *      SegDs: 000000000000002B:  
2016-06-12 02:13:41.63 spid73      *      SegEs: 000000000000002B:  
2016-06-12 02:13:41.63 spid73      *      SegFs: 0000000000000053:  
2016-06-12 02:13:41.63 spid73      *      SegGs: 000000000000002B:  
2016-06-12 02:13:41.63 spid73      *      SegSs: 000000000000002B:  
2016-06-12 02:13:41.63 spid73      *     EFlags: 0000000000000206:  
2016-06-12 02:13:41.63 spid73      *        Rax: 00000000E531214E:  
2016-06-12 02:13:41.63 spid73      *        Rcx: 00000000923F15F0:  0000000000000000  0000000000000000  00000000923F14A0  000007FED773A748  0000000000000000  00000000923F1640  
2016-06-12 02:13:41.63 spid73      *        Rdx: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *        Rbx: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *        Rsp: 00000000923F1C00:  0000000000000000  000000140DF9C160  00000000923F1E70  0000000000000002  00000000000042AC  0000000000000000  
2016-06-12 02:13:41.63 spid73      *        Rbp: 00000000923F3930:  000003A700000000  FFFFFFFF00000001  0000000100000001  00000000923F42A0  0000165E0000165E  00000000000000B6  
2016-06-12 02:13:41.63 spid73      *        Rsi: 000000140DF9C160:  0000000A91860840  000000140DF9C840  0000000000000002  0000000000000000  000000140DF9C180  000000140DF9C180  
2016-06-12 02:13:41.63 spid73      *        Rdi: 00000000923F1E70:  0000000063DD12C0  000000025AF69850  000000025AF69860  000000025AF69870  000000025AF69880  000000025AF69890  
2016-06-12 02:13:41.63 spid73      *         R8: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *         R9: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *        R10: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *        R11: 00000000923F2910:  0000000000000000  0000000000000000  00000000923F14A0  000007FED773A748  0000000000000000  00000000923F1640  
2016-06-12 02:13:41.63 spid73      *        R12: 00000000000000BF:  
2016-06-12 02:13:41.63 spid73      *        R13: 0000000000000001:  
2016-06-12 02:13:41.63 spid73      *        R14: 0000000000000001:  
2016-06-12 02:13:41.63 spid73      *        R15: 0000000000000000:  
2016-06-12 02:13:41.63 spid73      *        Rip: 000007FEFD39A06D:  C3000000C8C48148  9090909090909090  6528EC8348909090  0000003025048B48  488B48D233C18B4C  A815FF30498B4860  
2016-06-12 02:13:41.63 spid73      * *******************************************************************************
2016-06-12 02:13:41.63 spid73      * -------------------------------------------------------------------------------
2016-06-12 02:13:41.63 spid73      * Short Stack Dump
2016-06-12 02:13:41.64 spid73      000007FEFD39A06D Module(KERNELBASE+000000000001A06D)
2016-06-12 02:13:41.64 spid73      000007FED8626C1E Module(sqllang+0000000000F06C1E)
2016-06-12 02:13:41.64 spid73      000007FED862A7D2 Module(sqllang+0000000000F0A7D2)
2016-06-12 02:13:41.64 spid73      000007FED866BCED Module(sqllang+0000000000F4BCED)
2016-06-12 02:13:41.65 spid73      000007FED9A25B65 Module(sqldk+0000000000055B65)
2016-06-12 02:13:41.65 spid73      000007FEDD3D56D0 Module(sqlmin+0000000002C956D0)
2016-06-12 02:13:41.65 spid73      000007FEDB43946E Module(sqlmin+0000000000CF946E)
2016-06-12 02:13:41.65 spid73      000007FEDB3B5987 Module(sqlmin+0000000000C75987)
2016-06-12 02:13:41.65 spid73      000007FEDA9A0551 Module(sqlmin+0000000000260551)
2016-06-12 02:13:41.65 spid73      000007FEDA8FC4C4 Module(sqlmin+00000000001BC4C4)
2016-06-12 02:13:41.65 spid73      000007FEDA7B0FE7 Module(sqlmin+0000000000070FE7)
2016-06-12 02:13:41.65 spid73      000007FEDA798BD1 Module(sqlmin+0000000000058BD1)
2016-06-12 02:13:41.65 spid73      000007FEDB3DE899 Module(sqlmin+0000000000C9E899)
2016-06-12 02:13:41.65 spid73      000007FEDD873E77 Module(sqlmin+0000000003133E77)
2016-06-12 02:13:41.65 spid73      000007FEDD86DDB9 Module(sqlmin+000000000312DDB9)
2016-06-12 02:13:41.65 spid73      000007FEDB23717A Module(sqlmin+0000000000AF717A)
2016-06-12 02:13:41.65 spid73      000007FED9EA1437 Module(sqlTsEs+0000000000001437)
2016-06-12 02:13:41.65 spid73      000007FEDB29F2B7 Module(sqlmin+0000000000B5F2B7)
2016-06-12 02:13:41.65 spid73      000007FEDB29ECCB Module(sqlmin+0000000000B5ECCB)
2016-06-12 02:13:41.65 spid73      000007FEDA7E0743 Module(sqlmin+00000000000A0743)
2016-06-12 02:13:41.65 spid73      000007FEDA7E0895 Module(sqlmin+00000000000A0895)
2016-06-12 02:13:41.65 spid73      000007FEDA7E0845 Module(sqlmin+00000000000A0845)
2016-06-12 02:13:41.65 spid73      000007FEDA8B69F5 Module(sqlmin+00000000001769F5)
2016-06-12 02:13:41.65 spid73      000007FEDA8B664F Module(sqlmin+000000000017664F)
2016-06-12 02:13:41.65 spid73      000007FED99D4780 Module(sqldk+0000000000004780)
2016-06-12 02:13:41.65 spid73      000007FED99D4547 Module(sqldk+0000000000004547)
2016-06-12 02:13:41.65 spid73      000007FED99D4216 Module(sqldk+0000000000004216)
2016-06-12 02:13:41.65 spid73      000007FED99F66FF Module(sqldk+00000000000266FF)
2016-06-12 02:13:41.65 spid73      000007FED99F6850 Module(sqldk+0000000000026850)
2016-06-12 02:13:41.65 spid73      000007FED99F67D9 Module(sqldk+00000000000267D9)
2016-06-12 02:13:41.66 spid73      000007FED99F7068 Module(sqldk+0000000000027068)
2016-06-12 02:13:41.66 spid73      00000000772B59BD Module(kernel32+00000000000159BD)
2016-06-12 02:13:41.66 spid73      00000000773EA2E1 Module(ntdll+000000000002A2E1)
2016-06-12 02:13:41.67 spid73      Stack Signature for the dump is 0x000000014A0E6493
2016-06-12 02:13:42.41 spid73      [INFO]          Identity             Begin               End |        State                 Result     Error  Speculate   Prepared LazyCommit   ReadOnly |      Transaction         Database          ThreadId |   ReadSet WriteSet   ScanSet Savepoint LogSizeRq | CommitDep TotalComm       Dependent 0       Dependent 1       Dependent 2       Dependent 3       Dependent 4       Dependent 5       Dependent 6       Dependent 7 |            Area  Location |
2016-06-12 02:13:44.47 spid73      External dump process return code 0x20000001.
External dump process returned no errors.

2016-06-12 02:13:44.48 spid73      Error: 17066, Severity: 16, State: 1.
2016-06-12 02:13:44.48 spid73      SQL Server Assertion: File: <pageref.cpp>, line=935 Failed Assertion = 'IS_OFF (BUF_MINLOGGED, m_buf->bstat) || pageModifyType != PageModifyType_Contents || GetPagePtr ()->IsTextPage ()'. This error may be timing-related. If the error persists after rerunning the statement, use DBCC CHECKDB to check the database for structural integrity, or restart the server to ensure in-memory data structures are not corrupted.
2016-06-12 02:13:44.48 spid73      Error: 3624, Severity: 20, State: 1.
2016-06-12 02:13:44.48 spid73      A system assertion check has failed. Check the SQL Server error log for details. Typically, an assertion failure is caused by a software bug or data corruption. To check for database corruption, consider running DBCC CHECKDB. If you agreed to send dumps to Microsoft during setup, a mini dump will be sent to Microsoft. An update might be available from Microsoft in the latest Service Pack or in a Hotfix from Technical Support.

The process could not execute 'sp_MSadd_replcmds'

$
0
0

Hello,

I'm trying to troubleshoot a transactional pull replication with a subscriber initialized from backup.

Log reader agent is failing with the following error:

2016-06-08 16:23:06.671 The agent is running. Use Replication Monitor to view the details of this agent session.
2016-06-08 16:23:06.679 Status: 0, code: 1007, text: 'The process could not execute 'sp_MSadd_replcmds' on 'SQLVMCI2\ISQL2012CI2'.'.
2016-06-08 16:23:06.679 The process could not execute 'sp_MSadd_replcmds' on 'SERVER\INSTANCE2'.
2016-06-08 16:23:06.679 Status: 0, code: 1007, text: 'Only members of the sysadmin fixed server role can perform this operation.'.

The windows account used to run the log reader agent is already member of the sysadmin role on the server hosting the pubblished database.

Publisher is SQL Server 2008R2 SE

Subcriber and distributor on the same machine are SQL Server 2012 SE

I've launched profiler (and selected all "error" category) but I see no error messages.

Any help is appreciated

UCP Enrollment fails validation check

$
0
0

Dear all,

referring back UCP... again.

I am trying to enroll my second instance from the first one.


The instance of SQL Server must have utility collection sets installed. Validation failed. Utility collection sets are not installed.  Enrollment of an instance requires utility collection sets be pre-installed on a supported version of SQL Server. For more information, see the Help topic for this operation.

In the process to enroll:

According this document it is possible to do that:

https://msdn.microsoft.com/en-us/library/ee210563.aspx?f=255&MSPPError=-2147217396

I've repaired the installation of this instance but after that, the same..

Thanks for share your feedback and bring hints on that!!




SQL Server 2012 Management Studio: "Number of Errors" report crashed

$
0
0

I have Data Collection on SQL server 2012 setup and all statistics data was stored in [MngDataWarehouse].

Recently when I tried to get report from SSMS Management: Number of Errors, the report crashed and got following error and I also found that the SQL Server Agent scheduled job have been running very long more than 3 hours sometime and there are deadlocks for cleaning the expired logs.

How could I fix this? Please help!

Thanks, Steven


Create failed for LinkedServerLogin

$
0
0

Dear all,

From one of my nodes.

Create failed for LinkedServerLogin

An error ocurred during Service Master Key decryption

There is no remote user “userenric” mapped to local user ‘(null)’ from the remote server “B”

Ms Sql Server, error: 33094

Thanks in advance,

Msg 22022, Level 16, State 1, Line 0 SQLServerAgent Error: WMI error: 0x800700a4.

$
0
0

Hi,

I tried to disable SQL alert based WMI event type. I am getting this error message. I t happed on 4 servers out of 100.

Msg 22022, Level 16, State 1, Line 0

SQLServerAgent Error: WMI error: 0x800700a4.

Msg 14511, Level 16, State 1, Procedure sp_verify_alert, Line 304

The @wmi_query could not be executed in the @wmi_namespace provided. Verify that an event class selected in the query exists in the namespace and that the query has the correct syntax.


Please help me what is this error about and how to resolve.


------------------------ Brahma http://brahmarao.tech.officelive.com http://nani1211.info/sql

SQL Server 2016 Execution plan taking a while to be created.

$
0
0

Hi Folks,

  I have a stored procedure that I am trying to view the actual execution plan for.  When I execute the stored procedure, it takes 2 minutes, when I enable 'Include Actual Execution Plan'  the query takes several hours and SQL Server Management Studio sometimes locks with task manager showing 'not responding'.

Disk I/O is minimal and memory available is 32Gb, CPU loading is averaging 17%.

I have rebuilt the indexes and index fragmentation is 0% on all tables.  I have also done an sp_updatestats prior to running the query.

The database is set to compatibility level 100 and the server was upgraded to SQL Server 2016 from 2014. 

Does anyone have an idea of how I might be able to diagnose what might be causing the query to slow down so much?

Regards

Andy

Cannot initialize the data source object of OLE DB provider "SQLNCLI11" for linked server "

$
0
0

Dear all,

Source: SQL Server 2014

Destination: SQL Server 2008

Every time I go to the linked server XXXXX I get this dialog:

Cannot initialize the data source object of OLE DB provider "SQLNCLI11" for linked server "XXXXX"

If I try this, the same:

sp_testlinkedserver N'XXXXX'

Nonetheless and it is very surprising (how odd!!!!!) If I go at first on Properties Tab and then, close, it works.. even If you disconnected the source from SSMS->Object Explorer and reopen again.

Any hints or advises on that wouldb be greatly appreciated!!

SQL Server Login Auditing Setting Not Sticking

$
0
0

I want to just audit failed logins for my instance of SQL Server 2008R2

In SSMS, I right click the server, properties, security, and set the Login auditing to failed only.

I then Restart all SQL Server Services on the box.

After a restart, successful logins are still being captured in the log. "Hello, Bob" etc.

I have tried setting the login auditing to none, another restart, and still get failed and successfull logins.

I have also verified that when making the change in SSMS, the registry value for the login auditing does change.

Anyone have this issue or a solution to it?

SQL Server upgrade from SP2 to SP3 problems with master key service decrypting

$
0
0
Hi,

We have an SQL Server Cluster 2012 SP2, on Windows Server 2012 (2 nodes), and the service Database Engine run under a same local user account.
We have upgraded SQL Server to SP3, from this moment we have a problem with the linked servers configured, we receive the error: the current master key cannot be decrypted.
We tried with the command ALTER SERVICE MASTER KEY REGENERATE FORCE (without the option Force, we get the same error), reconfiguring the linked servers and everything was fine, but just on one node, if the cluster moves on the other node we get the same error.
We`ve tried to make the same reconfigurations, and it worked, but the same problem, just on this node, when we move on the other node we get the same error.
We don`t have backup for master key service, how we can repair/regenerate the master key service that will can be decrypted on both nodes?
For any other informations or questions i will be on your disposal,
Thanks


An error 1069 - )The service did not start due to logon failure) occurred while performing this service operation ...

$
0
0

Hi All,

 

We seem to be being plagued by the error below by our SQL Server agent. This happens almost everytime we restart the server that has been running for a day or two.

 

Our SQL Server Agent uses a none expiring domain credential. I understand that this problem only happens when the profile being used by the SQL Servr Agent has changed (password change). What puzzles me is that the login is A ok and no changes has been made to it's password.

 

We always resolve this problem by changing the login used in the SQL Server Agent to local and after that, returning it back to it's original domain login. Unfortunately, we cant always do this everytime something goes wrong.

 

Can anyone please help us shed a light on this? We're using SQL2k with SP3a. Thanks!

 

Error:

An error 1069 - )The service did not start due to logon failure) occurred while performing this service operation on the SQLServerAgent service.

 

 

Regards,

Joseph

High CPU Utilisation Issue

$
0
0

Hi guys,

We are facing problem with my SQL Server for High CPU Utilizaiton

SQL Server Windows NT -64 \SQL Server (MSSQLSERVER) CPU Usage is  90-100 %

how can we identify, where is the problem on the server ?

Thanks

Sangh Priya

SQLWriter is aborting our backups

$
0
0

Dear all,

Primary platform: SQL Server 2014 SP1. We've got Always On with two listeners for Always On and another listener for the global cluster (FCI)

Does aynone has any clue about that?

Before to apply backup with our third-part tool:

Unable to release guest. Error: Error code: 0x80004005 Failed to invoke func [Unfreeze]: Unspecified error. Unfreeze error (over VIX): [Backup job failed.Cannot create a shadow copy of the volumes containing writer's data. A VSS critical writer has failed. Writer name: [SqlServerWriter].Class ID: [{a65faa63-5ea8-4ebc-9dbd-a0c4db26912a}]. Instance ID: [{9f3fb8ae-defe-493e-aeb5-8ccf547422ec}]. Writer's state: [VSS_WS_FAILED_AT_THAW]. Error code: [0x800423f4].] Error code: 0x80004005


Log Name: Application
Source: VSS
Date: 26/05/2016 02:06:25
Event ID: 8229
Task Category: None
Level: Warning
Keywords: Classic
User: N/A
Computer: xxxxxxxxxxx.lc.group
Description:
A VSS writer has rejected an event with error 0x800423f4, The writer experienced a non-transient error. If the backup process is retried,
the error is likely to reoccur.
. Changes that the writer made to the writer components while handling the event will not be available to the requester. Check the event log for related events from the application hosting the VSS writer.


Log Name: Application
Source: SQLWRITER
Date: 26/05/2016 02:06:25
Event ID: 24580
Task Category: None
Level: Error
Keywords: Classic
User: N/A
Computer: CH002SQL01P.lc.group
Description:
Sqllib error: Error thawing server xxxxxxxxxxx

inserted,deleted table mssql

$
0
0

Hello. I would like to ask for how long inserted and deleted system tables are maintained in dbms; 

Can i select records from those table during a conference?

backup fails (sector size)

$
0
0

Dear all,

I am trying to perform a backup by hand in my localbox SQL2k14:

Cannot use the backup file 'C:\Program Files\Microsoft SQL Server\MSSQL12.xxx\MSSQL\Backup\zxxzz.bak'
 because it was originally formatted with sector size 4096 and is now on a device with sector size 512.

is there some workaround with that?

As per my understanding applying BLOCKSIZE clause in the BACKUP T-SQL statement amends that but it does not work

FSTUTIL informs me that my disk (where I want to do the backup) has 512

Viewing all 15872 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>