Quantcast
Channel: SQL Server Database Engine Forum
Viewing all 15872 articles
Browse latest View live

Questions on query plans

$
0
0
Hi All,

I have few questions on query plans.

1. Wanted to check for how long a query plan will stay in the plan cache? On what scenarios a plan can be removed from the plan cache?
2. for some reasons, a query which was running fine, now it is not running as in expected? For this, I want check the plan cache and see if there are new plans for that query has been generated or not ?
3. How to remove a specific plan from the plan cache.? Can we do it in SQL 2012 EE?
4. Can we take the plan from sub-prod env and use the plan guide in prod? Asking this because the same query with same data is running fast within 30 secs and the same query taking ~45 mins.
Is that a fair comparison to make between sub-prod and prod ? I know the workload changes and many other factors can make the query slow but want to see if this works or not. please let me know if that is a good thing to do?

Environment
===========
select @@version
--Microsoft SQL Server 2012 (SP4) (KB4018073) - 11.0.7001.0 (X64)
    Aug 15 2017 10:23:29
    Copyright (c) Microsoft Corporation
    Enterprise Edition (64-bit) on Windows NT 6.3 <X64> (Build 9600: ) (Hypervisor)



I am using below query to get the plans from the plan cache.

SELECT
@@servername as Servername
    ,[st].[text]
           , [qs].[execution_count]
      ,  [qs].plan_generation_num
       ,[qs].creation_time
       ,[qs].last_execution_time
       ,[qs].[sql_handle]
       ,[qs].plan_handle
       ,p.query_plan
       ,qs.query_hash
       ,qs.query_plan_hash
       , [qs].*
       , [p].*
FROM [sys].[dm_exec_query_stats] AS [qs]
       CROSS APPLY [sys].[dm_exec_sql_text]
              ([qs].[sql_handle]) AS [st]
       CROSS APPLY [sys].[dm_exec_query_plan]
              ([qs].[plan_handle]) AS [p]
WHERE [st].[text] LIKE '%vw_Employee%'
and [st].[text] not like '%[sys].[dm_exec_query_stats]%'
ORDER BY 1, [qs].[execution_count] DESC;
GO

Thanks,
Sam

Cannot open database version 782. upgrade the database to the latest version.

$
0
0

Hi,

I'm trying to restore a SQL Server 2014 database backup on SQL server 2016. The DB restore commands works fine but when I try to issue SQL queries on SQL Server 2016 DB, I get following errors:
Cannot open database version 782. upgrade the database to the latest version.

It seems the DB is unable to upgrade the internal database version from 782 to 852 when we try to bring the database online using "alter database [DB_name] set online" command.

Upgrade Readiness?

$
0
0

Hello,

I have a report give the Readiness for Upgrade:

select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,

SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client

from SMS_R_System

inner join SMS_G_System_UAComputerStatus

on SMS_G_System_UAComputerStatus.ResourceId = SMS_R_System.ResourceId

where SMS_G_System_UAComputerStatus.UpgradeAnalyticsStatus="1"


I tried to check the corresponding view(s) for it which could be v_UAComputer but this view is empty. Is it only due to the Client settings not enabled or do I have to check another view?

Thanks,

Dom


Security / System Center Configuration Manager Current Branch / SQL

msdb.sp_ReadRequest in SQL Server 2016 Enterprise

$
0
0

Yesterday as part of Maintenance we failovered from Primary Replica to Secondary Replica. But it took8 mins to failover to secondary.

This is SQL Server 2016 ENT with Primary+1 Secondary

when we check the logs msdb.sp_ReadRequest is long running during this time.

What could be the reason it took so long. I knew that the default DatabaseMailExeMinimumLifeTime =600.

till today we did so many maintenance windows and never faced this issue.


Find Procedures from SQL affecting Particular tables

$
0
0

we have two SQL server  Server1  (DB1)  &  Server2 (DB2)

some tables are synchronized from Server1(DB1)  to  Server2 (DB2) using some Procedures. 

how to find which SP involved in this Synchronize Process? 

SP_depends Tablename   -- thats one display lot of SP,view,trigger.. ( it's huge pain)


any other way to find this things?

 


How to Configure Database Mail Using Database Engine Service Credentials

$
0
0

I have jobs set up in SQL Server Agent that use sp_send_dbmail to email employees some reports on a schedule. Today I discovered the reports were not going out due to a password change on my credentials. I updated my account for Database Mail under Basic authentication and the reports are emailing once again.

[Manage Existing Account screen shot]

I began to enter a help ticket to our IT department to see if I could get an account with a non-expiring password, but then I saw the option above Basic authentication to use the Database Engine service credentials and thought this would be the way to go. When I choose this option, I get the same error I was getting when my password was incorrect:

The mail could not be sent to the recipients because of the mail server failure. (Sending Mail using Account 2 (2019-11-06T12:47:35). Exception Message: Cannot send mails to mail server. (The SMTP server requires a secure connection or the client was not authenticated. The server response was: 5.7.57 SMTP; Client was not authenticated to send anonymous mail during MAIL FROM).  )

My understanding is that the service credentials being used are the virtual account for SQL Server under SQL Server Services, which appears to be set up correctly.

[2 SSCM screen shots]

 So why does Database Mail not authenticate properly and send the email as it does when I use Basic authentication?


Unable to delete replication after restored a database with replication

$
0
0

Hi There,

Backup and restored a database from another SQL server which had Replication set up. After successfully restored database, the replication had carried forward, now wouldn’t be able to remove the replication setting such as delete subscription or publication, even wouldn’t be able to delete the database. The replication can be considered as orphan replication setup, how can I delete these settings?

Cheers,

Tony


Cheers, Tony

Service 'Microsoft.SqlServer.Management.IRegistrationService in SQL server management studio

$
0
0
Hello

I am using SQL server management studio 2012. All was working fine but just few hrs before deployement it stopped working. when i open SQL server management studio it does not loads any database inside it and shows and error 

Service 'Microsoft.SqlServer.Management.IRegistrationService' not found
(Microsoft.SqlServer.Management.SDK.SqlStudio)

TITLE: Microsoft SQL Server Management Studio
------------------------------
Service 'Microsoft.SqlServer.Management.IRegistrationService' not found (Microsoft.SqlServer.Management.SDK.SqlStudio)
------------------------------
BUTTONS:

OK
------------------------------

Please tell me how can i fix this

Sajid


help out with the sql triggers

$
0
0
am a student learning SQL but , i have an issue with the trigger thing, i have a table that tracksstudent marks in different years and different classes, i have a class repeat table table that i want to be populated automatically using a trigger, if a student happened to be in the same class in different years automatically i want to create a trigger that can insert the the word the word repeat in the class repeat track table after comparing the student class from thestudent marks table. can anyone help me out.thanks!

Transaction management related questions

$
0
0
Hi All,

Have some questions related to transaction management in sql server.

1. What is the difference between having SET XACT_ABORT is ON and having BEGIN TRY ... CATCH ROLLBACK;
2. What if I use only BEGIN TRY ... CATCH ROLLBACK; and do not use XACT_ABORT ON ? Any issues we need to keep in mind?
3. I see XACT_ABORT is a server level setting and is applied to all databases. Can we set it as a specific database level setting?
4. Coming to recent issue in our env app team has come up with is, on one of the DEV server, this XACT_ABORT setting is OFF at instance level and so ETL batch loads were giving different results, i mean loads were successful.  But on Prod this option is XACT_ABORT is ON at instance level, so ETL batch loads are failing ? question is, which is good ? do we need to turn on this option or turn off to aallow batch loads ?

Thanks,
Sam

The operating system returned the error '0xc0000427

$
0
0

Hi Everyone , 

I am facing the below error while trying to upload document from web aplication the database filestream:

The operating system returned the error '0xc0000427(The requested operation could not be completed due to a file system limitation)' while attemping 'NtCreateFile' on (drive path)

Sql server engine is SQL server 2008 R2

Has anyone faced this issue and if there is a solution.

Thanks,

Florant

Need clarification on SQL Server 2014 ENT to SQL Server 2019 RC1 upgrade

$
0
0

HI,

We are trying to perform upgrade from SQL Server 2014 ENT to SQL Server 2019 RC1 but it is failing with error:

 ---------------------------
Rule Check Result
---------------------------
Rule "SQL Server 2019 RC1 Feature Upgrade" failed.

The specified edition upgrade from source Enterprise Edition: Core-based Licensing edition to target Evaluation edition is not supported. For information about supported upgrade paths, see the SQL Server 2019 RC1 version and edition upgrade in Books Online.
---------------------------
OK   
---------------------------

Also tried upgrading to SQL 2019 Developer edition, same also failed. What i am missing here ?

Someone said SQL server can not be upgraded from old version ENT to newer version Evaluation edition, i don't think it's true.

Appreciation your help !!

Run SQL Server generate script with data from a batch file

$
0
0
My goal is to script out a database with data like you used to with the sql publishing tool that older versions of SQL Server had

I am using SQL Server Express 2017, and I know how to perform this task manually by right clicking on the database->tasks->generate scripts

Is there a .exe being called here, in older versions of SQL Server this would call sqlpubwiz.exe, and you could call this .exe from a cli, and put into a batch file. I am looking to replace this behavior. Can someone let me know the exe that is being called, and let me know how to script against it

Possibility of Controlling Transaction Commit within SQL Server Import Export Data Wizard?

$
0
0

Fellow SQLers,

I have a project coming up where I need to migrate a 1.3 tb database.  SQL 2008r2 to SQL 2016

There is a specific pattern that the vendor wants us to use.  Script out objects and then pump the data across using the SQL import/export data wizard.  That is it.

They have us pick all of the tables at once but this may not be possible at one time due to the trans log size.

so my questions are:

1 - Is it correct that the Sql import/export data wizard does its work as one transaction even though it may be exporting multiple tables at once?

2 - Is there a way to change some setting in SQL import/export wizard to have it pause, force a commit, and continue?

Thanks,

MG

Value of Database maintenance, provision

$
0
0

I am wondering how do you provide reports to customer or your management to show the value of database maintenance and server provision etc, or to answer the question such as there is no DBA work required once db server is turned on.

I can list a lot of typical detail work that DBA needs to do but customers won't understand why you need do those tasks if they haven't asked, especially I automate many maintenance tasks by scheduled jobs. I believe only the requests and incidents make sense to customers. but how to show it is necessary for other tasks.

Instead of explanation verbally or by email each time inefficiently, I think of  auto generated reports may help show the value to customers or management automatically each time they want to question , wondering what do you normally provide.

for example, in my environment, with over 200 sql server instances from (SQL2005 to SQL2017, express to Enterprise, standalone and cluster), 20+ oracle databases (10g to 12c on Windows, Linux, HPUX), I do installation/configuration/maintenance/documentation/standardization, and db related requests from end users, projects, performance tuning etc. So I developed my maintenance tool to capture nightly the job status, performance stats, auditing events, blocking/deadlocking, metrics required for capacity planning, errors, instant alerts etc., so each day I am able to quickly capture all my monitored servers/databases health/availability/risk, and get the time to fix error, troubleshoot performance complaints, and users' request and project tasks. So I provide some reports to the management but like to get more efficient report for management view purpose. such as:

the new and decommission number of databases and server instances deployed/maintained/upgraded/patched each month; the uptime/downtime of all sql server instances each month; number of ad hoc backup/restore related to request and by failed job; number of sql servers having potential risk related disk space, cpu, memory, disk io, detected and mitigated....

any ideas, thanks for all replies.


SQL 2014 won't come up. Looking for master.md

$
0
0
We had a hardware failure last night (host went down due to bad NIC) on an active-active shared disk cluster where the sql server attempted to fail over but would not come up.  The error was file not found but the strange part is that is was looking for "master.md" per ERROR.1 logs.  We looked at the config manager startup parameters and it said "master.mdf", the registry said "master.mdf" and "master.mdf" existed on the file path location as expected.  In order to get sql server running, we had to make a copy of the original "master.mdf" and rename it to "master.md".  As far as we know no one changed the file name and we don't see corruption errors from sql server logs.  Any ideas on where we should check next to find out what happened?  Right now we are dependent on that master.md file but I'm concerned about patches etc since that's not a standard configuration.

SET OPTIONS in SQL Server

$
0
0

Hi All,

I am trying to get the SET OPTIONS using plan handle. I am using below dmv , but I get below output.

select * from sys.dm_exec_plan_attributes.(0x05000A00F2B6F25BA0FC923A2001000001000000000000000000000000000000000000000000000000000000)  
attribute    value
set_options    4347
objectid    1541580530
dbid    10
dbid_execute    10

How to get what values have been set ? I mean using value = 4347 how can get output something like below..

ANSI_WARNINGS :ON
ANSI_PADDING :ON
ANSI_NULLS :ON
ARITHABORT :ON
QUOTED_IDENTIFIER :ON
NOCOUNT :OFF
CONCAT_NULL_YIELDS_NULL :ON
NUMERIC_ROUNDABORT :OFF
XACT_ABORT :OFF

Also, can we get all the Set options for a SPID? I tried but I don't see any option. If any EVENT/ACTION is there, please let me know.

Below is the code I am using for creating Xevent session.

CREATE EVENT SESSION xe_trace_sqlstmts ON SERVER
ADD EVENT sqlserver.sql_batch_starting(
ACTION(sqlserver.client_app_name,sqlserver.client_hostname,sqlserver.database_id,sqlserver.database_name,sqlserver.plan_handle,sqlserver.query_plan_hash,sqlserver.server_principal_name,sqlserver.session_id,sqlserver.sql_text,sqlserver.transaction_id)
WHERE ([sqlserver].[database_name]=N'testdb')),
ADD EVENT sqlserver.sql_statement_recompile(
ACTION(sqlserver.client_app_name,sqlserver.client_hostname,sqlserver.database_id,sqlserver.database_name,sqlserver.plan_handle,sqlserver.query_plan_hash,sqlserver.server_principal_name,sqlserver.session_id,sqlserver.sql_text,sqlserver.transaction_id)
WHERE ([sqlserver].[database_name]=N'testdb')),
ADD EVENT sqlserver.error_reported(
ACTION(sqlserver.client_app_name,sqlserver.client_hostname,sqlserver.database_id,sqlserver.database_name,sqlserver.plan_handle,sqlserver.query_plan_hash,sqlserver.server_principal_name,sqlserver.session_id,sqlserver.sql_text,sqlserver.transaction_id)
WHERE ([sqlserver].[database_name]=N'testdb')),  ---exec
ADD EVENT sqlserver.rpc_completed(
ACTION(sqlserver.client_app_name,sqlserver.client_hostname,sqlserver.database_id,sqlserver.database_name,sqlserver.plan_handle,sqlserver.query_plan_hash,sqlserver.server_principal_name,sqlserver.session_id,sqlserver.sql_text,sqlserver.transaction_id)
WHERE ([sqlserver].[database_name]=N'testdb')),
ADD EVENT sqlserver.sp_statement_completed(
ACTION(sqlserver.client_app_name,sqlserver.client_hostname,sqlserver.database_id,sqlserver.database_name,sqlserver.plan_handle,sqlserver.query_plan_hash,sqlserver.server_principal_name,sqlserver.session_id,sqlserver.sql_text,sqlserver.transaction_id)
WHERE ([sqlserver].[database_name]=N'testdb')),
ADD EVENT sqlserver.sql_batch_completed(
ACTION(sqlserver.client_app_name,sqlserver.client_hostname,sqlserver.database_id,sqlserver.database_name,sqlserver.plan_handle,sqlserver.query_plan_hash,sqlserver.server_principal_name,sqlserver.session_id,sqlserver.sql_text,sqlserver.transaction_id)
WHERE ([sqlserver].[database_name]=N'testdb'))
ADD TARGET package0.event_file(SET filename=N'C:\xevents\xe_trace_sqlstmts.xel',max_file_size=(1024))
WITH (MAX_MEMORY=4096 KB,
EVENT_RETENTION_MODE=ALLOW_SINGLE_EVENT_LOSS,
MAX_DISPATCH_LATENCY=30 SECONDS,
MAX_EVENT_SIZE=0 KB,
MEMORY_PARTITION_MODE=NONE,
TRACK_CAUSALITY=OFF
,STARTUP_STATE=OFF
)
GO

--start the traces
ALTER EVENT SESSION xe_trace_sqlstmts
ON SERVER  
STATE = START;  
GO


--start the traces
ALTER EVENT SESSION xe_trace_sqlstmts
ON SERVER  
STATE = STOP;  
GO

Thanks,

Sam


SSMS scripting Objects - Script for ServerVersion

$
0
0

Fellow SQLers.

This may sound like an odd question but if you are using SSMS and generating scripts for the db objects, one of the options to select is "Script for Server Version".  Does this mean to pick what version it currently is or what version you are go to generate it to load on?

For example, if I was going to restore something from SQL 2008 r2 to SSQL 2008r2, I would pick SQL 2008r2.

But if I was going to script a db from SSQL 2008 r2 and restore it on SQL 2016, would I pick SQL 2016 for this option?

Thanks,

MG

Yet another "There is insufficient system memory in resource pool 'internal' to run this query" thread

$
0
0

Hello everyone, hope someone can help with this issue I am having. I clearly have enough memory and have enough allocated in SQL but it seems SQL is not using what it should be, maybe.

Running on SQL server 2014 Build 12.0.6108.1 SP3 +. Windows server 2012 R2. Receiving the infamous memory message.  
Server memory is 56GB
Min SQL memory: 16384 MB
Max SQL memory 32672 MB

When looking at task manager SQL memory is at 15.7/56 GB used.
Running the following query returns the below results:


SELECT (physical_memory_in_use_kb/1024) AS Memory_usedby_Sqlserver_MB, (locked_page_allocations_kb/1024) AS Locked_pages_used_Sqlserver_MB, (total_virtual_address_space_kb/1024) AS Total_VAS_in_MB, process_physical_memory_low, process_virtual_memory_low FROM sys.dm_os_process_memory;

The results are:

Not sure how to resolve this, when this starts to happen performance drops like a rock.

Thanks

c0000005 EXCEPTION_ACCESS_VIOLATION after upgrading to SQL 2017 from 2016

$
0
0

Exception is thrown thrown on DELETE. We have a foreign key constraint on a child table with Cascade delete as well as system versioning enabled on both parent and child tables. The issue only seems to arise in this table configuration. I can provide the dump files if necessary, stack trace is follows:

7FFD0899CFFF  0000d000
2019-11-08 09:26:29.06 spid74      * ncryptsslp                     00007FFD08800000  00007FFD0881CFFF  0001d000
2019-11-08 09:26:29.06 spid74      * xpsqlbot                       00007FFCF4890000  00007FFCF4897FFF  00008000
2019-11-08 09:26:29.06 spid74      * xpstar                         00007FFCF4820000  00007FFCF488BFFF  0006c000
2019-11-08 09:26:29.06 spid74      * SQLSCM                         00007FFCFFD10000  00007FFCFFD22FFF  00013000
2019-11-08 09:26:29.06 spid74      * xpstar                         00007FFCF4810000  00007FFCF481CFFF  0000d000
2019-11-08 09:26:29.06 spid74      * Sort00001000                   00007FFCECC40000  00007FFCECD14FFF  000d5000
2019-11-08 09:26:29.06 spid74      * System.Data                    00007FFCFFDD0000  00007FFD00138FFF  00369000
2019-11-08 09:26:29.06 spid74      * System.Transactions            00007FFCFF9D0000  00007FFCFFA1EFFF  0004f000
2019-11-08 09:26:29.06 spid74      * wldp                           00007FFD08CA0000  00007FFD08CACFFF  0000d000
2019-11-08 09:26:29.06 spid74      * apphelp                        00007FFD10030000  00007FFD100BDFFF  0008e000
2019-11-08 09:26:29.06 spid74      * xplog70                        00007FFCF5440000  00007FFCF5453FFF  00014000
2019-11-08 09:26:29.06 spid74      * BROWCLI                        00007FFCFBCC0000  00007FFCFBCD2FFF  00013000
2019-11-08 09:26:29.06 spid74      * xplog70                        00007FFCFCCD0000  00007FFCFCCD3FFF  00004000
2019-11-08 09:26:29.06 spid74      * DSROLE                         00007FFD0EC80000  00007FFD0EC89FFF  0000a000
2019-11-08 09:26:29.06 spid74      * SAMLIB                         00007FFD0BC50000  00007FFD0BC6EFFF  0001f000
2019-11-08 09:26:29.06 spid74      * dbghelp                        0000000060650000  00000000607E5FFF  00196000
2019-11-08 09:26:29.06 spid74      *
2019-11-08 09:26:29.06 spid74      *     P1Home: FFFFFFFFFFFFFFFE:  
2019-11-08 09:26:29.06 spid74      *     P2Home: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *     P3Home: 000000000000000F:  
2019-11-08 09:26:29.06 spid74      *     P4Home: 00007FFD02EEEDDD:  8D4826894C906690  4468247C8948787B  4818578B480C7789  0002377B850FD285  48438D4810778944  4489486824448948  
2019-11-08 09:26:29.06 spid74      *     P5Home: FFFFFFFFFFFFFFFE:  
2019-11-08 09:26:29.06 spid74      *     P6Home: 0000001A9D5D3620:  00007FFD04969428  0000000000000001  0000001C957FC040  0000000E07800000  000000000000000E  0000001ADCED3480  
2019-11-08 09:26:29.06 spid74      * ContextFlags: 000000000010005F:  
2019-11-08 09:26:29.06 spid74      *      MxCsr: 0000000000001FA8:  
2019-11-08 09:26:29.06 spid74      *      SegCs: 0000000000000033:  
2019-11-08 09:26:29.06 spid74      *      SegDs: 000000000000002B:  
2019-11-08 09:26:29.06 spid74      *      SegEs: 000000000000002B:  
2019-11-08 09:26:29.06 spid74      *      SegFs: 0000000000000053:  
2019-11-08 09:26:29.06 spid74      *      SegGs: 000000000000002B:  
2019-11-08 09:26:29.06 spid74      *      SegSs: 000000000000002B:  
2019-11-08 09:26:29.06 spid74      *     EFlags: 0000000000010202:  
2019-11-08 09:26:29.06 spid74      *        Rax: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *        Rcx: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *        Rdx: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *        Rbx: 000000000000000F:  
2019-11-08 09:26:29.06 spid74      *        Rsp: 0000000C97277780:  0000000C97277850  000000000000000C  0000000000000000  00007FFD02ED1132  0000001AB4106060  00007FFD03101F20  
2019-11-08 09:26:29.06 spid74      *        Rbp: 0000000C97277850:  00007FFD04A372A0  0000000000000000  0000001C957FC040  0000000000000004  0000001A9F30B1A0  0000001AAD861500  
2019-11-08 09:26:29.06 spid74      *        Rsi: 0000000000000060:  
2019-11-08 09:26:29.06 spid74      *        Rdi: 000000000000000C:  
2019-11-08 09:26:29.06 spid74      *         R8: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *         R9: 000000000000000E:  
2019-11-08 09:26:29.06 spid74      *        R10: 0000001CB8FB4338:  0000001CB8FB4920  0000000000000000  0000000000000000  0000004000000001  0000000000000130  00007FFD0724AF28  
2019-11-08 09:26:29.06 spid74      *        R11: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *        R12: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *        R13: 0000001AD25266A0:  00007FFD04968900  0000147100000003  0000001CB9A88280  0000149F00000001  0000001AD25266C8  0000001AD2526750  
2019-11-08 09:26:29.06 spid74      *        R14: 000000000000000E:  
2019-11-08 09:26:29.06 spid74      *        R15: 0000000000000000:  
2019-11-08 09:26:29.06 spid74      *        Rip: 00007FFD0310200C:  85482852FF108B48  FF0116CF41850FC0  FE3B4108C68348C7  8B48FFFFFF77820F  30245C8B48382474  748B4C40247C8B48  
2019-11-08 09:26:29.06 spid74      * *******************************************************************************
2019-11-08 09:26:29.06 spid74      * -------------------------------------------------------------------------------
2019-11-08 09:26:29.06 spid74      * Short Stack Dump
2019-11-08 09:26:29.09 spid74      00007FFD0310200C Module(sqllang+00000000002C200C)
2019-11-08 09:26:29.09 spid74      00007FFD03101F20 Module(sqllang+00000000002C1F20)
2019-11-08 09:26:29.09 spid74      00007FFD0424E455 Module(sqllang+000000000140E455)
2019-11-08 09:26:29.09 spid74      00007FFD04243B26 Module(sqllang+0000000001403B26)
2019-11-08 09:26:29.09 spid74      00007FFD042527B3 Module(sqllang+00000000014127B3)
2019-11-08 09:26:29.09 spid74      00007FFD04251133 Module(sqllang+0000000001411133)
2019-11-08 09:26:29.09 spid74      00007FFD04243024 Module(sqllang+0000000001403024)
2019-11-08 09:26:29.09 spid74      00007FFD03126EA4 Module(sqllang+00000000002E6EA4)
2019-11-08 09:26:29.09 spid74      00007FFD02F14DAC Module(sqllang+00000000000D4DAC)
2019-11-08 09:26:29.09 spid74      00007FFD02F16523 Module(sqllang+00000000000D6523)
2019-11-08 09:26:29.09 spid74      00007FFD02F17B6B Module(sqllang+00000000000D7B6B)
2019-11-08 09:26:29.09 spid74      00007FFD02F175A8 Module(sqllang+00000000000D75A8)
2019-11-08 09:26:29.09 spid74      00007FFD02F1709A Module(sqllang+00000000000D709A)
2019-11-08 09:26:29.09 spid74      00007FFD02F16F66 Module(sqllang+00000000000D6F66)
2019-11-08 09:26:29.09 spid74      00007FFD02EB4278 Module(sqllang+0000000000074278)
2019-11-08 09:26:29.09 spid74      00007FFD02EB39B4 Module(sqllang+00000000000739B4)
2019-11-08 09:26:29.09 spid74      00007FFD02E9EA27 Module(sqllang+000000000005EA27)
2019-11-08 09:26:29.09 spid74      00007FFD030FE788 Module(sqllang+00000000002BE788)
2019-11-08 09:26:29.10 spid74      00007FFD030FE491 Module(sqllang+00000000002BE491)
2019-11-08 09:26:29.10 spid74      00007FFD02E7FFEC Module(sqllang+000000000003FFEC)
2019-11-08 09:26:29.10 spid74      00007FFD02E7F0D2 Module(sqllang+000000000003F0D2)
2019-11-08 09:26:29.10 spid74      00007FFD02E7F6E4 Module(sqllang+000000000003F6E4)
2019-11-08 09:26:29.10 spid74      00007FFD02E7F613 Module(sqllang+000000000003F613)
2019-11-08 09:26:29.10 spid74      00007FFD02E53D4B Module(sqllang+0000000000013D4B)
2019-11-08 09:26:29.10 spid74      00007FFD03A2202E Module(sqllang+0000000000BE202E)
2019-11-08 09:26:29.10 spid74      00007FFD03A307AF Module(sqllang+0000000000BF07AF)
2019-11-08 09:26:29.10 spid74      00007FFD03A30E7F Module(sqllang+0000000000BF0E7F)
2019-11-08 09:26:29.10 spid74      00007FFD02E5D905 Module(sqllang+000000000001D905)
2019-11-08 09:26:29.10 spid74      00007FFD02E5C3B2 Module(sqllang+000000000001C3B2)
2019-11-08 09:26:29.12 spid74      00007FFD02E5C1A3 Module(sqllang+000000000001C1A3)
2019-11-08 09:26:29.12 spid74      00007FFD02014FAD Module(sqldk+0000000000004FAD)
2019-11-08 09:26:29.12 spid74      00007FFD02015488 Module(sqldk+0000000000005488)
2019-11-08 09:26:29.12 spid74      00007FFD020150FD Module(sqldk+00000000000050FD)
2019-11-08 09:26:29.12 spid74      00007FFD0203C858 Module(sqldk+000000000002C858)
2019-11-08 09:26:29.12 spid74      00007FFD0203C950 Module(sqldk+000000000002C950)
2019-11-08 09:26:29.12 spid74      00007FFD0203C0C7 Module(sqldk+000000000002C0C7)
2019-11-08 09:26:29.12 spid74      00007FFD0203C619 Module(sqldk+000000000002C619)
2019-11-08 09:26:29.13 spid74      00007FFD124113F2 Module(KERNEL32+00000000000013F2)
2019-11-08 09:26:29.13 spid74      00007FFD142F54F4 Module(ntdll+00000000000154F4)
2019-11-08 09:26:29.13 spid74      Stack Signature for the dump is 0x000000005D4B63C3
2019-11-08 09:26:30.15 spid74      External dump process return code 0x20000001.
External dump process returned no errors.

2019-11-08 09:26:30.15 Server      Error: 17310, Severity: 20, State: 1.
2019-11-08 09:26:30.15 Server      A user request from the session with SPID 74 generated a fatal exception. SQL Server is terminating this session. Contact Product Support Services with the dump produced in the log directory.
2019-11-08 09:26:59.86 spid67      ***Stack Dump being sent to D:\DATA\MSSQL13.MSSQLSERVER\MSSQL\LOG\SQLDump0059.txt
2019-11-08 09:26:59.86 spid67      SqlDumpExceptionHandler: Process 67 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
2019-11-08 09:26:59.86 spid67      * *******************************************************************************
2019-11-08 09:26:59.86 spid67      *
2019-11-08 09:26:59.86 spid67      * BEGIN STACK DUMP:
2019-11-08 09:26:59.86 spid67      *   11/08/19 09:26:59 spid 67
2019-11-08 09:26:59.86 spid67      *
2019-11-08 09:26:59.86 spid67      *
2019-11-08 09:26:59.86 spid67      *   Exception Address = 00007FFD0310200C Module(sqllang+00000000002C200C)
2019-11-08 09:26:59.86 spid67      *   Exception Code    = c0000005 EXCEPTION_ACCESS_VIOLATION
2019-11-08 09:26:59.86 spid67      *   Access Violation occurred reading address 0000000000000000
2019-11-08 09:26:59.86 spid67      * Input Buffer 245 bytes -
2019-11-08 09:26:59.86 spid67      *            »   C    16 00 00 00 12 00 00 00 02 00 bb 00 00 00 43 00 00 00
2019-11-08 09:26:59.86 spid67      *      ÿÿ      ç¤ Ð 01 00 00 00 ff ff 0a 00 02 00 00 00 e7 a4 00 09 04 d0
2019-11-08 09:26:59.86 spid67      *   4¤ S E T   N O C  00 34 a4 00 53 00 45 00 54 00 20 00 4e 00 4f 00 43 00
2019-11-08 09:26:59.86 spid67      *  O U N T   O N ;    4f 00 55 00 4e 00 54 00 20 00 4f 00 4e 00 3b 00 0d 00
2019-11-08 09:26:59.86 spid67      *    D E L E T E   F  0a 00 44 00 45 00 4c 00 45 00 54 00 45 00 20 00 46 00
2019-11-08 09:26:59.86 spid67      *  R O M   [ T e m p  52 00 4f 00 4d 00 20 00 5b 00 54 00 65 00 6d 00 70 00
2019-11-08 09:26:59.86 spid67      *  l a t e ]     W H  6c 00 61 00 74 00 65 00 5d 00 0d 00 0a 00 57 00 48 00
2019-11-08 09:26:59.86 spid67      *  E R E   [ I d ]    45 00 52 00 45 00 20 00 5b 00 49 00 64 00 5d 00 20 00
2019-11-08 09:26:59.86 spid67      *  =   @ p 0 ;     S  3d 00 20 00 40 00 70 00 30 00 3b 00 0d 00 0a 00 53 00
2019-11-08 09:26:59.86 spid67      *  E L E C T   @ @ R  45 00 4c 00 45 00 43 00 54 00 20 00 40 00 40 00 52 00
2019-11-08 09:26:59.86 spid67      *  O W C O U N T ;    4f 00 57 00 43 00 4f 00 55 00 4e 00 54 00 3b 00 0d 00
2019-11-08 09:26:59.86 spid67      *          ç Ð 4   0a 00 0d 00 0a 00 00 00 e7 0e 00 09 04 d0 00 34 0e 00
2019-11-08 09:26:59.86 spid67      *  @ p 0   i n t  @ p 40 00 70 00 30 00 20 00 69 00 6e 00 74 00 03 40 00 70
2019-11-08 09:26:59.86 spid67      *   0  &  ¶Ž          00 30 00 00 26 04 04 b6 8e 00 00
2019-11-08 09:26:59.86 spid67      *  
2019-11-08 09:26:59.86 spid67      *
2019-11-08 09:26:59.86 spid67      *  MODULE                          BASE      END       SIZE
2019-11-08 09:26:59.86 spid67      * sqlservr                       00007FF7EB9F0000  00007FF7EBA6DFFF  0007e000
2019-11-08 09:26:59.86 spid67      * ntdll                          00007FFD142E0000  00007FFD1448CFFF  001ad000
2019-11-08 09:26:59.86 spid67      * KERNEL32                       00007FFD12410000  00007FFD1254EFFF  0013f000
2019-11-08 09:26:59.86 spid67      * KERNELBASE                     00007FFD117F0000  00007FFD11905FFF  00116000
2019-11-08 09:26:59.86 spid67      * NETAPI32                       00007FFD0E760000  00007FFD0E775FFF  00016000
2019-11-08 09:26:59.86 spid67      * pdh                            00007FFD08770000  00007FFD087BEFFF  0004f000
2019-11-08 09:26:59.86 spid67      * ADVAPI32                       00007FFD11A40000  00007FFD11AE9FFF  000aa000
2019-11-08 09:26:59.86 spid67      * ole32                          00007FFD127C0000  00007FFD12953FFF  00194000
2019-11-08 09:26:59.86 spid67      * SQLOS                          00007FFD08760000  00007FFD08766FFF  00007000
2019-11-08 09:26:59.86 spid67      * sqlmin                         00007FFD055B0000  00007FFD08756FFF  031a7000
2019-11-08 09:26:59.86 spid67      * sqllang                        00007FFD02E40000  00007FFD055A5FFF  02766000
2019-11-08 09:26:59.86 spid67      * sqlTsEs                        00007FFD02510000  00007FFD02E3DFFF  0092e000
2019-11-08 09:26:59.86 spid67      * sqldk                          00007FFD02010000  00007FFD02509FFF  004fa000
2019-11-08 09:26:59.86 spid67      * opends60                       00007FFD02000000  00007FFD02008FFF  00009000
2019-11-08 09:26:59.86 spid67      * qds                            00007FFD01EA0000  00007FFD01FCAFFF  0012b000
2019-11-08 09:26:59.86 spid67      * svl                            00007FFD01E70000  00007FFD01E9DFFF  0002e000
2019-11-08 09:26:59.86 spid67      * MSVCP120                       00007FFD09120000  00007FFD091C5FFF  000a6000
2019-11-08 09:26:59.86 spid67      * MSVCR120                       00007FFD09030000  00007FFD0911EFFF  000ef000
2019-11-08 09:26:59.86 spid67      * netutils                       00007FFD0F400000  00007FFD0F40BFFF  0000c000
2019-11-08 09:26:59.86 spid67      * srvcli                         00007FFD11020000  00007FFD11045FFF  00026000
2019-11-08 09:26:59.86 spid67      * wkscli                         00007FFD0E6E0000  00007FFD0E6F6FFF  00017000
2019-11-08 09:26:59.86 spid67      * msvcrt                         00007FFD11BC0000  00007FFD11C69FFF  000aa000
2019-11-08 09:26:59.86 spid67      * RPCRT4                         00007FFD12260000  00007FFD1239FFFF  00140000
2019-11-08 09:26:59.86 spid67      * sechost                        00007FFD123A0000  00007FFD123F8FFF  00059000
2019-11-08 09:26:59.86 spid67      * combase                        00007FFD125B0000  00007FFD127BFFFF  00210000
2019-11-08 09:26:59.86 spid67      * GDI32                          00007FFD11E80000  00007FFD11FCBFFF  0014c000
2019-11-08 09:26:59.86 spid67      * USER32                         00007FFD129C0000  00007FFD12B36FFF  00177000
2019-11-08 09:26:59.86 spid67      * CRYPT32                        00007FFD11530000  00007FFD1170EFFF  001df000
2019-11-08 09:26:59.86 spid67      * Secur32                        00007FFD08A10000  00007FFD08A1BFFF  0000c000
2019-11-08 09:26:59.86 spid67      * WS2_32                         00007FFD12550000  00007FFD125A9FFF  0005a000
2019-11-08 09:26:59.86 spid67      * WINHTTP                        00007FFD0A6A0000  00007FFD0A768FFF  000c9000
2019-11-08 09:26:59.86 spid67      * OLEAUT32                       00007FFD11970000  00007FFD11A36FFF  000c7000
2019-11-08 09:26:59.86 spid67      * ODBC32                         00007FFD01DA0000  00007FFD01E61FFF  000c2000
2019-11-08 09:26:59.86 spid67      * secforwarder                   00007FFD01D90000  00007FFD01D99FFF  0000a000
2019-11-08 09:26:59.86 spid67      * USERENV                        00007FFD10AE0000  00007FFD10B00FFF  00021000
2019-11-08 09:26:59.86 spid67      * AUTHZ                          00007FFD10710000  00007FFD10757FFF  00048000
2019-11-08 09:26:59.86 spid67      * WINTRUST                       00007FFD11910000  00007FFD11960FFF  00051000
2019-11-08 09:26:59.86 spid67      * XmlLite                        00007FFD0D120000  00007FFD0D158FFF  00039000
2019-11-08 09:26:59.86 spid67      * dhcpcsvc                       00007FFD0CE90000  00007FFD0CEA9FFF  0001a000
2019-11-08 09:26:59.86 spid67      * WININET                        00007FFD018E0000  00007FFD01D8BFFF  004ac000
2019-11-08 09:26:59.86 spid67      * WINMM                          00007FFD018B0000  00007FFD018D1FFF  00022000
2019-11-08 09:26:59.86 spid67      * SspiCli                        00007FFD117C0000  00007FFD117EDFFF  0002e000
2019-11-08 09:26:59.86 spid67      * MSASN1                         00007FFD114C0000  00007FFD114D0FFF  00011000
2019-11-08 09:26:59.86 spid67      * NSI                            00007FFD12400000  00007FFD12408FFF  00009000
2019-11-08 09:26:59.86 spid67      * bcrypt                         00007FFD10EF0000  00007FFD10F15FFF  00026000
2019-11-08 09:26:59.86 spid67      * ncrypt                         00007FFD10EC0000  00007FFD10EE4FFF  00025000
2019-11-08 09:26:59.86 spid67      * profapi                        00007FFD11410000  00007FFD11424FFF  00015000
2019-11-08 09:26:59.86 spid67      * iertutil                       00007FFD09750000  00007FFD09A1BFFF  002cc000
2019-11-08 09:26:59.86 spid67      * WINMMBASE                      00007FFD01880000  00007FFD018A9FFF  0002a000
2019-11-08 09:26:59.86 spid67      * SAMCLI                         00007FFD0BC70000  00007FFD0BC86FFF  00017000
2019-11-08 09:26:59.86 spid67      * NTASN1                         00007FFD10E80000  00007FFD10EB6FFF  00037000
2019-11-08 09:26:59.86 spid67      * LOGONCLI                       00007FFD109C0000  00007FFD109FEFFF  0003f000
2019-11-08 09:26:59.86 spid67      * cfgmgr32                       00007FFD114E0000  00007FFD1152EFFF  0004f000
2019-11-08 09:26:59.86 spid67      * DEVOBJ                         00007FFD102B0000  00007FFD102D7FFF  00028000
2019-11-08 09:26:59.86 spid67      * psapi                          00007FFD11BB0000  00007FFD11BB6FFF  00007000
2019-11-08 09:26:59.86 spid67      * kernel.appcore                 00007FFD100C0000  00007FFD100CAFFF  0000b000
2019-11-08 09:26:59.86 spid67      * CRYPTBASE                      00007FFD11280000  00007FFD1128AFFF  0000b000
2019-11-08 09:26:59.86 spid67      * bcryptPrimitives               00007FFD11210000  00007FFD11272FFF  00063000
2019-11-08 09:26:59.86 spid67      * instapi140                     00007FFD01790000  00007FFD017A1FFF  00012000
2019-11-08 09:26:59.86 spid67      * CRYPTSP                        00007FFD10C90000  00007FFD10CAFFFF  00020000
2019-11-08 09:26:59.86 spid67      * rsaenh                         00007FFD108D0000  00007FFD10905FFF  00036000
2019-11-08 09:26:59.86 spid67      * imagehlp                       00007FFD11C80000  00007FFD11C95FFF  00016000
2019-11-08 09:26:59.86 spid67      * gpapi                          00007FFD10620000  00007FFD10643FFF  00024000
2019-11-08 09:26:59.86 spid67      * cscapi                         00007FFD01710000  00007FFD01721FFF  00012000
2019-11-08 09:26:59.86 spid67      * sqlevn70                       00007FFD01400000  00007FFD0170BFFF  0030c000
2019-11-08 09:26:59.86 spid67      * CLUSAPI                        00007FFD089A0000  00007FFD08A0DFFF  0006e000
2019-11-08 09:26:59.86 spid67      * cryptdll                       00007FFD10E40000  00007FFD10E59FFF  0001a000
2019-11-08 09:26:59.86 spid67      * RESUTILS                       00007FFD01350000  00007FFD0139BFFF  0004c000
2019-11-08 09:26:59.86 spid67      * VERSION                        00007FFD0BC90000  00007FFD0BC99FFF  0000a000
2019-11-08 09:26:59.86 spid67      * hkruntime                      00007FFD01080000  00007FFD0134FFFF  002d0000
2019-11-08 09:26:59.86 spid67      * hkcompile                      00007FFD00F10000  00007FFD01070FFF  00161000
2019-11-08 09:26:59.86 spid67      * hkengine                       00007FFD00800000  00007FFD00F0AFFF  0070b000
2019-11-08 09:26:59.86 spid67      * dbghelp                        0000000063850000  00000000639E5FFF  00196000
2019-11-08 09:26:59.86 spid67      * SHLWAPI                        00007FFD12190000  00007FFD121E3FFF  00054000
2019-11-08 09:26:59.86 spid67      * pcwum                          00007FFD106B0000  00007FFD106BDFFF  0000e000
2019-11-08 09:26:59.86 spid67      * ncryptprov                     00007FFD08F10000  00007FFD08F6AFFF  0005b000
2019-11-08 09:26:59.86 spid67      * msv1_0                         00007FFD10BC0000  00007FFD10C2AFFF  0006b000
2019-11-08 09:26:59.86 spid67      * kerberos                       00007FFD10CB0000  00007FFD10DA1FFF  000f2000
2019-11-08 09:26:59.86 spid67      * schannel                       00007FFD107F0000  00007FFD1085DFFF  0006e000
2019-11-08 09:26:59.86 spid67      * MSCOREE                        00007FFD0C3A0000  00007FFD0C403FFF  00064000
2019-11-08 09:26:59.86 spid67      * mscoreei                       00007FFD0BE50000  00007FFD0BEF8FFF  000a9000
2019-11-08 09:26:59.86 spid67      * SqlServerSpatial140            00007FFD00740000  00007FFD007F1FFF  000b2000
2019-11-08 09:26:59.86 spid67      * clbcatq                        00007FFD14070000  00007FFD14125FFF  000b6000
2019-11-08 09:26:59.86 spid67      * msxml3                         00007FFD08CC0000  00007FFD08F00FFF  00241000
2019-11-08 09:26:59.86 spid67      * sqlncli11                      00007FFD003E0000  00007FFD00732FFF  00353000
2019-11-08 09:26:59.86 spid67      * MSVCR100                       0000000063A90000  0000000063B61FFF  000d2000
2019-11-08 09:26:59.86 spid67      * COMCTL32                       00007FFD00330000  00007FFD003D3FFF  000a4000
2019-11-08 09:26:59.86 spid67      * COMDLG32                       00007FFD11AF0000  00007FFD11BA5FFF  000b6000
2019-11-08 09:26:59.86 spid67      * SHELL32                        00007FFD12B40000  00007FFD1406AFFF  0152b000
2019-11-08 09:26:59.86 spid67      * SHCORE                         00007FFD0F850000  00007FFD0F901FFF  000b2000
2019-11-08 09:26:59.86 spid67      * SQLNCLIR11                     0000000063810000  0000000063847FFF  00038000
2019-11-08 09:26:59.86 spid67      * DPAPI                          00007FFD100D0000  00007FFD100D9FFF  0000a000
2019-11-08 09:26:59.86 spid67      * netbios                        00007FFD01730000  00007FFD0173AFFF  0000b000
2019-11-08 09:26:59.86 spid67      * sqlnclirda11                   00000000634B0000  0000000063808FFF  00359000
2019-11-08 09:26:59.86 spid67      * ualapi                         00007FFD0C310000  00007FFD0C328FFF  00019000
2019-11-08 09:26:59.86 spid67      * ESENT                          00007FFD0C040000  00007FFD0C309FFF  002ca000
2019-11-08 09:26:59.86 spid67      * ntmarta                        00007FFD0DEA0000  00007FFD0DED1FFF  00032000
2019-11-08 09:26:59.86 spid67      * SQLNCLIRDAR11                  0000000063470000  00000000634A7FFF  00038000
2019-11-08 09:26:59.86 spid67      * clr                            00007FFD0B110000  00007FFD0BBD5FFF  00ac6000
2019-11-08 09:26:59.86 spid67      * VCRUNTIME140_CLR0400           00007FFD0B0F0000  00007FFD0B105FFF  00016000
2019-11-08 09:26:59.86 spid67      * ucrtbase_clr0400               00007FFD0B030000  00007FFD0B0ECFFF  000bd000
2019-11-08 09:26:59.86 spid67      * clrjit                         00007FFD0AEE0000  00007FFD0B02DFFF  0014e000
2019-11-08 09:26:59.86 spid67      * BatchParser                    00007FFCFFD60000  00007FFCFFD8BFFF  0002c000
2019-11-08 09:26:59.86 spid67      * SqlAccess                      00007FFD002B0000  00007FFD00324FFF  00075000
2019-11-08 09:26:59.86 spid67      * ftimport                       0000000060000000  0000000060024FFF  00025000
2019-11-08 09:26:59.86 spid67      * MSFTE                          0000000049980000  0000000049D2DFFF  003ae000
2019-11-08 09:26:59.86 spid67      * mswsock                        00007FFD10C30000  00007FFD10C88FFF  00059000
2019-11-08 09:26:59.86 spid67      * ntdsapi                        00007FFD0E780000  00007FFD0E7A8FFF  00029000
2019-11-08 09:26:59.86 spid67      * DSPARSE                        00007FFD08990000  00007FFD0899CFFF  0000d000
2019-11-08 09:26:59.86 spid67      * ncryptsslp                     00007FFD08800000  00007FFD0881CFFF  0001d000
2019-11-08 09:26:59.86 spid67      * xpsqlbot                       00007FFCF4890000  00007FFCF4897FFF  00008000
2019-11-08 09:26:59.86 spid67      * xpstar                         00007FFCF4820000  00007FFCF488BFFF  0006c000
2019-11-08 09:26:59.86 spid67      * SQLSCM                         00007FFCFFD10000  00007FFCFFD22FFF  00013000
2019-11-08 09:26:59.86 spid67      * xpstar                         00007FFCF4810000  00007FFCF481CFFF  0000d000
2019-11-08 09:26:59.86 spid67      * Sort00001000                   00007FFCECC40000  00007FFCECD14FFF  000d5000
2019-11-08 09:26:59.86 spid67      * System.Data                    00007FFCFFDD0000  00007FFD00138FFF  00369000
2019-11-08 09:26:59.86 spid67      * System.Transactions            00007FFCFF9D0000  00007FFCFFA1EFFF  0004f000
2019-11-08 09:26:59.86 spid67      * wldp                           00007FFD08CA0000  00007FFD08CACFFF  0000d000
2019-11-08 09:26:59.86 spid67      * apphelp                        00007FFD10030000  00007FFD100BDFFF  0008e000
2019-11-08 09:26:59.86 spid67      * xplog70                        00007FFCF5440000  00007FFCF5453FFF  00014000
2019-11-08 09:26:59.86 spid67      * BROWCLI                        00007FFCFBCC0000  00007FFCFBCD2FFF  00013000
2019-11-08 09:26:59.86 spid67      * xplog70                        00007FFCFCCD0000  00007FFCFCCD3FFF  00004000
2019-11-08 09:26:59.86 spid67      * DSROLE                         00007FFD0EC80000  00007FFD0EC89FFF  0000a000
2019-11-08 09:26:59.86 spid67      * SAMLIB                         00007FFD0BC50000  00007FFD0BC6EFFF  0001f000
2019-11-08 09:26:59.86 spid67      * dbghelp                        0000000060650000  00000000607E5FFF  00196000
2019-11-08 09:26:59.86 spid67      *
2019-11-08 09:26:59.86 spid67      *     P1Home: FFFFFFFFFFFFFFFE:  
2019-11-08 09:26:59.86 spid67      *     P2Home: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *     P3Home: 000000000000000F:  
2019-11-08 09:26:59.86 spid67      *     P4Home: 00007FFD02EEEDDD:  8D4826894C906690  4468247C8948787B  4818578B480C7789  0002377B850FD285  48438D4810778944  4489486824448948  
2019-11-08 09:26:59.86 spid67      *     P5Home: FFFFFFFFFFFFFFFE:  
2019-11-08 09:26:59.86 spid67      *     P6Home: 0000001AAAC15620:  00007FFD04969428  0000000000000001  0000001AD02A8040  0000000E07800000  000000000000000E  0000001AAEFF9480  
2019-11-08 09:26:59.86 spid67      * ContextFlags: 000000000010005F:  
2019-11-08 09:26:59.86 spid67      *      MxCsr: 0000000000001FA8:  
2019-11-08 09:26:59.86 spid67      *      SegCs: 0000000000000033:  
2019-11-08 09:26:59.86 spid67      *      SegDs: 000000000000002B:  
2019-11-08 09:26:59.86 spid67      *      SegEs: 000000000000002B:  
2019-11-08 09:26:59.86 spid67      *      SegFs: 0000000000000053:  
2019-11-08 09:26:59.86 spid67      *      SegGs: 000000000000002B:  
2019-11-08 09:26:59.86 spid67      *      SegSs: 000000000000002B:  
2019-11-08 09:26:59.86 spid67      *     EFlags: 0000000000010206:  
2019-11-08 09:26:59.86 spid67      *        Rax: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *        Rcx: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *        Rdx: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *        Rbx: 000000000000000F:  
2019-11-08 09:26:59.86 spid67      *        Rsp: 0000000C93797840:  0000000C93797910  000000000000000C  0000000000000000  00007FFD02ED1132  0000001ACBD26060  00007FFD03101F20  
2019-11-08 09:26:59.86 spid67      *        Rbp: 0000000C93797910:  00007FFD04A372A0  0000000000000000  0000001AD02A8040  0000000000000004  0000001ADBF031A0  0000001AA3109500  
2019-11-08 09:26:59.86 spid67      *        Rsi: 0000000000000060:  
2019-11-08 09:26:59.86 spid67      *        Rdi: 000000000000000C:  
2019-11-08 09:26:59.86 spid67      *         R8: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *         R9: 000000000000000E:  
2019-11-08 09:26:59.86 spid67      *        R10: 0000001CB8FB4338:  0000001CB8FB4920  0000000000000000  0000000000000000  0000004000000001  0000000000000130  00007FFD0724AF28  
2019-11-08 09:26:59.86 spid67      *        R11: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *        R12: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *        R13: 0000001AAE22C6A0:  00007FFD04968900  0000147100000003  0000001ADC002280  0000149F00000001  0000001AAE22C6C8  0000001AAE22C750  
2019-11-08 09:26:59.86 spid67      *        R14: 000000000000000E:  
2019-11-08 09:26:59.86 spid67      *        R15: 0000000000000000:  
2019-11-08 09:26:59.86 spid67      *        Rip: 00007FFD0310200C:  85482852FF108B48  FF0116CF41850FC0  FE3B4108C68348C7  8B48FFFFFF77820F  30245C8B48382474  748B4C40247C8B48  
2019-11-08 09:26:59.86 spid67      * *******************************************************************************
2019-11-08 09:26:59.86 spid67      * -------------------------------------------------------------------------------
2019-11-08 09:26:59.86 spid67      * Short Stack Dump
2019-11-08 09:26:59.89 spid67      00007FFD0310200C Module(sqllang+00000000002C200C)
2019-11-08 09:26:59.89 spid67      00007FFD03101F20 Module(sqllang+00000000002C1F20)
2019-11-08 09:26:59.89 spid67      00007FFD0424E455 Module(sqllang+000000000140E455)
2019-11-08 09:26:59.89 spid67      00007FFD04243B26 Module(sqllang+0000000001403B26)
2019-11-08 09:26:59.89 spid67      00007FFD042527B3 Module(sqllang+00000000014127B3)
2019-11-08 09:26:59.89 spid67      00007FFD04251133 Module(sqllang+0000000001411133)
2019-11-08 09:26:59.89 spid67      00007FFD04243024 Module(sqllang+0000000001403024)
2019-11-08 09:26:59.89 spid67      00007FFD03126EA4 Module(sqllang+00000000002E6EA4)
2019-11-08 09:26:59.89 spid67      00007FFD02F14DAC Module(sqllang+00000000000D4DAC)
2019-11-08 09:26:59.89 spid67      00007FFD02F16523 Module(sqllang+00000000000D6523)
2019-11-08 09:26:59.89 spid67      00007FFD02F17B6B Module(sqllang+00000000000D7B6B)
2019-11-08 09:26:59.89 spid67      00007FFD02F175A8 Module(sqllang+00000000000D75A8)
2019-11-08 09:26:59.89 spid67      00007FFD02F1709A Module(sqllang+00000000000D709A)
2019-11-08 09:26:59.89 spid67      00007FFD02F16F66 Module(sqllang+00000000000D6F66)
2019-11-08 09:26:59.89 spid67      00007FFD02EB4278 Module(sqllang+0000000000074278)
2019-11-08 09:26:59.89 spid67      00007FFD02EB39B4 Module(sqllang+00000000000739B4)
2019-11-08 09:26:59.89 spid67      00007FFD02E9EA27 Module(sqllang+000000000005EA27)
2019-11-08 09:26:59.89 spid67      00007FFD030FE788 Module(sqllang+00000000002BE788)
2019-11-08 09:26:59.89 spid67      00007FFD030FE491 Module(sqllang+00000000002BE491)
2019-11-08 09:26:59.89 spid67      00007FFD02E7FFEC Module(sqllang+000000000003FFEC)
2019-11-08 09:26:59.89 spid67      00007FFD02E7F0D2 Module(sqllang+000000000003F0D2)
2019-11-08 09:26:59.89 spid67      00007FFD02E7F6E4 Module(sqllang+000000000003F6E4)
2019-11-08 09:26:59.89 spid67      00007FFD02E7F613 Module(sqllang+000000000003F613)
2019-11-08 09:26:59.90 spid67      00007FFD02E53D4B Module(sqllang+0000000000013D4B)
2019-11-08 09:26:59.90 spid67      00007FFD03A2202E Module(sqllang+0000000000BE202E)
2019-11-08 09:26:59.90 spid67      00007FFD03A307AF Module(sqllang+0000000000BF07AF)
2019-11-08 09:26:59.90 spid67      00007FFD03A30E7F Module(sqllang+0000000000BF0E7F)
2019-11-08 09:26:59.90 spid67      00007FFD02E5D905 Module(sqllang+000000000001D905)
2019-11-08 09:26:59.90 spid67      00007FFD02E5C3B2 Module(sqllang+000000000001C3B2)
2019-11-08 09:26:59.91 spid67      00007FFD02E5C1A3 Module(sqllang+000000000001C1A3)
2019-11-08 09:26:59.91 spid67      00007FFD02014FAD Module(sqldk+0000000000004FAD)
2019-11-08 09:26:59.91 spid67      00007FFD02015488 Module(sqldk+0000000000005488)
2019-11-08 09:26:59.92 spid67      00007FFD020150FD Module(sqldk+00000000000050FD)
2019-11-08 09:26:59.92 spid67      00007FFD0203C858 Module(sqldk+000000000002C858)
2019-11-08 09:26:59.92 spid67      00007FFD0203C950 Module(sqldk+000000000002C950)
2019-11-08 09:26:59.92 spid67      00007FFD0203C0C7 Module(sqldk+000000000002C0C7)
2019-11-08 09:26:59.92 spid67      00007FFD0203C619 Module(sqldk+000000000002C619)
2019-11-08 09:26:59.93 spid67      00007FFD124113F2 Module(KERNEL32+00000000000013F2)
2019-11-08 09:26:59.93 spid67      00007FFD142F54F4 Module(ntdll+00000000000154F4)
2019-11-08 09:26:59.93 spid67      Stack Signature for the dump is 0x000000005D4B63C3

Viewing all 15872 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>