SQL Server Forums
Profile | Register | Active Topics | Members | Search | Forum FAQ
 
Register Now and get your question answered!
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 SQL Server 2012 Forums
 SQL Server Administration (2012)
 SQL 2012 SP1 connection issues
 New Topic  Reply to Topic
 Printer Friendly
Author Previous Topic Topic Next Topic  

bwilliamson
Starting Member

USA
1 Posts

Posted - 06/12/2013 :  22:25:26  Show Profile  Reply with Quote
We are experiencing connection issues with our SQL server. It appears as if the SQL Server service is no longer responding, but not in a stopped state. It has stopped running completely and had to be restarted. I can't find the issue causing it and I have included the Stack Dump. Any help would be appreciated.

Current time is 21:58:14 06/12/13.
=====================================================================
BugCheck Dump
=====================================================================

This file is generated by Microsoft SQL Server
version 11.0.2100.60
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.


Computer type is Intel(R) Xeon(R) CPU E5649 @ 2.53GHz.
Bios Version is INTEL - 6040000
PhoenixBIOS 4.0 Release 6.0
2 X64 level 8664, 14 Mhz processor (s).
Windows NT 6.1 Build 7601 CSD Service Pack 1.

Memory
MemoryLoad = 53%
Total Physical = 8191 MB
Available Physical = 3775 MB
Total Page File = 16381 MB
Available Page File = 9877 MB
Total Virtual = 8388607 MB
Available Virtual = 8373535 MB
**Dump thread - spid = 0, EC = 0x0000000264DDCDF0
***Stack Dump being sent to E:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\LOG\SQLDump0081.txt
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 06/12/13 21:58:14 spid 100
*
* Location: sosmemobj.cpp:2346
* Expression: pvb->FInUse ()
* SPID: 100
* Process ID: 7296
*
* Input Buffer 510 bytes -
* DECLARE @db_id SMALLINT; SET @db_id = DB_ID(N'master'); BEGIN
* If exists ( SELECT IPS.avg_fragmentation_in_percent as [Fragmentation (
* %)], object_name(IPS.object_id) AS [TableName with fragmentation],
* SI.name AS [IndexName], IPS.Index_type_desc, IPS.avg_fragment_
* size_in_pages, IPS.avg_page_space_used_in_percent, IPS.record_co
* unt, IPS.ghost_record_count, IPS.fragment_count FROM sys.dm_db_in
* dex_physical_stats(@db_id, NULL, NULL, NULL , 'DETAILED') IPS JOIN sy
* s.tables ST WITH (nolock) ON IPS.object_id = ST.object_id JOIN sys.in
* dexes SI WITH (nolock) ON IPS.object_id = SI.object_id AND IPS.index_id
* = SI.index_id WHERE IPS.avg_fragmentation_in_percent > 0 ) begin SELECT
* IPS.avg_fragmentation_in_percent as [Fragmentation (%)], object_name
* (IPS.object_id) AS [TableName with fragmentation], SI.name AS [IndexN
* ame], IPS.Index_type_desc, IPS.avg_fragment_size_in_pages, I
* PS.avg_page_space_used_in_percent, IPS.record_count, IPS.ghost_r
* ecord_count, IPS.fragment_count FROM sys.dm_db_index_physical_stats(@
* db_id, NULL, NULL, NULL , 'DETAILED') IPS JOIN sys.tables ST WITH (no
* lock) ON IPS.object_id = ST.object_id JOIN sys.indexes SI WITH (noloc
* k) ON IPS.object_id = SI.object_id AND IPS.index_id = SI.index_id WHERE
* IPS.avg_fragmentation_in_percent > 0 ORDER BY 1 desc end else select '0'
* end
*
*
* MODULE BASE END SIZE
* sqlservr 00000000FF1B0000
* ntdll 0000000077B60000
* kernel32 0000000077730000
* KERNELBASE 000007FEFE150000
* ADVAPI32 000007FEFF560000
* msvcrt 000007FEFF8A0000
* sechost 000007FEFFBF0000
* RPCRT4 000007FEFF640000
* MSVCR100 0000000074420000
* MSVCP100 0000000074350000
* sqlos 00000000745C0000
* NETAPI32 000007FEFB4F0000
* netutils 000007FEFD480000
* srvcli 000007FEFDAD0000
* wkscli 000007FEFB4D0000
* pdh 000007FEF8260000
* opends60 0000000073C40000
* sqlmin 000007FEE0B60000
* USER32 0000000077850000
* GDI32 000007FEFFE00000
* LPK 000007FEFFAF0000
* USP10 000007FEFFA20000
* ole32 000007FEFF350000
* OLEAUT32 000007FEFF940000
* Secur32 000007FEFDB90000
* SSPICLI 000007FEFDE20000
* PSAPI 0000000077D20000
* WS2_32 000007FEFFBA0000
* NSI 000007FEFFC10000
* sqlTsEs 000007FEE4720000
* sqldk 000007FEF3A20000
* WINMM 000007FEF55B0000
* sqllang 000007FEDC830000
* USERENV 000007FEFD2F0000
* profapi 000007FEFDFC0000
* LOGONCLI 000007FEFD640000
* SAMCLI 000007FEFAEB0000
* AUTHZ 000007FEFDA20000
* WINTRUST 000007FEFE110000
* CRYPT32 000007FEFE1C0000
* MSASN1 000007FEFE060000
* IMM32 000007FEFF770000
* MSCTF 000007FEFE390000
* CRYPTBASE 000007FEFDEB0000
* instapi110 000007FEFAE70000
* cscapi 000007FEF3520000
* sqlevn70 00000000573A0000
* CRYPTSP 000007FEFD850000
* rsaenh 000007FEFD550000
* imagehlp 000007FEFE4A0000
* ncrypt 000007FEFD9D0000
* bcrypt 000007FEFD9A0000
* bcryptprimitives 000007FEFD490000
* GPAPI 000007FEFD2D0000
* cryptnet 000007FEFB0B0000
* WLDAP32 000007FEFF840000
* SHLWAPI 000007FEFE4C0000
* ntmarta 000007FEFD0D0000
* VERSION 000007FEFD100000
* credssp 000007FEFD450000
* msv1_0 000007FEFD780000
* cryptdll 000007FEFDB70000
* kerberos 000007FEFD870000
* schannel 000007FEFD5E0000
* MSCOREE 000007FEFAD10000
* mscoreei 000007FEFAC80000
* CLUSAPI 000007FEF1E30000
* RESUTILS 000007FEF1E10000
* security 0000000073940000
* BatchParser 0000000073B70000
* CLBCatQ 000007FEFF7A0000
* sqlncli11 0000000071F10000
* COMCTL32 000007FEFAD80000
* COMDLG32 000007FEFFB00000
* SHELL32 000007FEFE5C0000
* SQLNCLIR11 0000000071D90000
* clr 000007FEFA310000
* MSVCR100_CLR0400 000007FEFA230000
* mscorlib.ni 000007FEF8FB0000
* nlssorting 000007FEF8F90000
* SqlAccess 0000000071A00000
* clrjit 000007FEF82B0000
* ftimport 0000000060000000
* MSFTE 0000000049980000
* dbghelp 000000006EF70000
* mswsock 000007FEFD7F0000
* wship6 000007FEFD7E0000
* wshtcpip 000007FEFD1D0000
* ntdsapi 000007FEFB200000
* DNSAPI 000007FEFD670000
* IPHLPAPI 000007FEFB8A0000
* WINNSI 000007FEFB860000
* rasadhlp 000007FEFB260000
* fwpuclnt 000007FEFB730000
* SAMLIB 000007FEFAE90000
* xpsqlbot 0000000073A90000
* xpstar 0000000071860000
* ATL100 00000000743F0000
* SQLSCM 0000000073B60000
* ODBC32 000007FEF18B0000
* odbcint 00000000717F0000
* xpstar 0000000073A00000
* xplog70 00000000739E0000
* BROWCLI 000007FEF14E0000
* xplog70 0000000073A80000
* sqlvdi 0000000070650000
* apphelp 000007FEFDE50000
* dbghelp 0000000059B50000
*
* P1Home: 0000000000000000:
* P2Home: 0000000000000000:
* P3Home: 000000001924AC00: 000007FEFE159E70 000007FEFE150000 000007FEFE1B2F54 000007FEDC830000 000007FE
DE7C2C8C 00000000FFFFFFFF
* P4Home: 000007FEDC8660B8: 004B2122880FC085 17870FC73B489848 1F96F5840F004B21 C38B30247C8B4800 90C35B5E
38C48348 2414894C10EC8348
* P5Home: 0000000000000000:
* P6Home: 000000001924ADA0: 0044004C00510053 0000000077BB5D84 0000003100380030 00000000004D85D4 00000000
004E0070 00000000EBF52668
* ContextFlags: 000000000010000F: 0000000000006400 0000000000002000 0000010000001400 0000340000000200 000001
000000D400 0000000000000000
* MxCsr: 0000000000001FA0:
* SegCs: 0000000000000033:
* SegDs: 000000000000002B:
* SegEs: 000000000000002B:
* SegFs: 0000000000000053:
* SegGs: 000000000000002B:
* SegSs: 000000000000002B:
* EFlags: 0000000000000202:
* Rax: 00000000EBF52668:
* Rcx: 000000001924AD50: 0000000000000000 0000000000000000 000000001924AC00 000007FEDC8660B8 00000000
00000000 000000001924ADA0
* Rdx: 0000000000000000:
* Rbx: 0000000000000000:
* Rsp: 000000001924B360: 0000000000000000 0000000264DDCDF0 000000001924B5E0 0000000000000002 00000000
000042AC 0000000000000000
* Rbp: 000000001924CFC0: 00000001000003E5 000000010000092A 00000001FFFFFFFF 000000001924D930 00000000
0000000B 0000000000000057
* Rsi: 0000000264DDCDF0: 0000000264DDCDF0 0000000264DA9020 0000000000000000 0000000000000000 00000002
64DDCE10 0000000264DDCE10
* Rdi: 000000001924B5E0: 00000000040A8AE0 0000000000000000 FFFFFFFFFFFFFFFE 0000000000000001 00000000
00000000 000007FEF3C36E80
* R8: 0000000000000000:
* R9: 0000000000000000:
* R10: 0000000000000000:
* R11: 000000001924C060: 0000000000000000 0000000000000000 000000001924AC00 000007FEDC8660B8 00000000
00000000 000000001924ADA0
* R12: 0000000000000001:
* R13: 0000000000000001:
* R14: 0000000000000000:
* R15: 000000000000003F:
* Rip: 000007FEFE159E5D: C3000000C8C48148 9090909090909090 08245C8948909090 D98B4820EC834857 00002AE8
FA8B098B 2301840FC0854800
* *******************************************************************************
* -------------------------------------------------------------------------------
* Short Stack Dump
000007FEFE159E5D Module(UNKNOWN+0000000000000000)
000007FEDD9CF34E Module(UNKNOWN+0000000000000000)
000007FEDD9D4233 Module(UNKNOWN+0000000000000000)
000007FEDD9CB357 Module(UNKNOWN+0000000000000000)
000007FEF3A90035 Module(UNKNOWN+0000000000000000)
000007FEF3A7386B Module(UNKNOWN+0000000000000000)
000007FEF3A2FC9F Module(UNKNOWN+0000000000000000)
000007FEF3A301E6 Module(UNKNOWN+0000000000000000)
000007FEE1F12867 Module(UNKNOWN+0000000000000000)
000007FEE1F12FF3 Module(UNKNOWN+0000000000000000)
000007FEE1F19688 Module(UNKNOWN+0000000000000000)
000007FEE174D035 Module(UNKNOWN+0000000000000000)
000007FEE0C25340 Module(UNKNOWN+0000000000000000)
000007FEE0C2C3B2 Module(UNKNOWN+0000000000000000)
000007FEE0BE2996 Module(UNKNOWN+0000000000000000)
000007FEE0BB4033 Module(UNKNOWN+0000000000000000)
000007FEE0C2C3B2 Module(UNKNOWN+0000000000000000)
000007FEE0B956CF Module(UNKNOWN+0000000000000000)
000007FEDC85ECB4 Module(UNKNOWN+0000000000000000)
000007FEDCA1762F Module(UNKNOWN+0000000000000000)
000007FEDC8403E1 Module(UNKNOWN+0000000000000000)
000007FEDC8412CB Module(UNKNOWN+0000000000000000)
000007FEDC8409F4 Module(UNKNOWN+0000000000000000)
000007FEDC883DAC Module(UNKNOWN+0000000000000000)
000007FEDC878BA7 Module(UNKNOWN+0000000000000000)
000007FEF3A33170 Module(UNKNOWN+0000000000000000)
000007FEF3A32F64 Module(UNKNOWN+0000000000000000)
000007FEF3A32D66 Module(UNKNOWN+0000000000000000)
000007FEF3A4E22F Module(UNKNOWN+0000000000000000)
000007FEF3A4E5C0 Module(UNKNOWN+0000000000000000)
000007FEF3A4D9CB Module(UNKNOWN+0000000000000000)
000007FEF3A4E059 Module(UNKNOWN+0000000000000000)
000000007774652D Module(UNKNOWN+0000000000000000)
0000000077B8C521 Module(UNKNOWN+0000000000000000)

CSession @0x0000000264DA8450
----------------------------
m_sessionId = 100 m_cRef = 14 m_rgcRefType[0] = 1
m_rgcRefType[1] = 1 m_rgcRefType[2] = 11 m_rgcRefType[3] = 1
m_rgcRefType[4] = 0 m_rgcRefType[5] = 0 m_pmo = 0x0000000264DA8040
m_pstackBhfPool = 0x0000000000000000 m_dwLoginFlags = 0x83e0 m_fBackground = 0
m_eConnResetOption = 0 m_fUserProc = 1 m_fConnReset = 0
m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 1
m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0
m_ulLoginStamp = 180342 m_eclClient = 6 m_protType = 5
m_hHttpToken = FFFFFFFFFFFFFFFF

m_pV7LoginRec
---------------------
0000000000000000: 20080000 03000a73 401f0000 00000006 58260000 ......s@.......X&..

0000000000000014: 00000000 e0830000 00000000 00000000 5e000d00 ....à?..........^...

0000000000000028: 00000000 00000000 78001c00 b0000c00 c8000000 ........x...°...È...

000000000000003C: c8001c00 00010000 00010600 8a727c87 48ce0c01 È...........?r|?HÎ..

0000000000000050: 14072008 00002008 00000000 0000 .. ... .......




CPhysicalConnection @0x0000000264DA8230
---------------------------------------
m_pPhyConn->m_pmo = 0x0000000264DA8040
m_pPhyConn->m_pNetConn = 0x0000000264DA8BF0
m_pPhyConn->m_pConnList = 0x0000000264DA8420
m_pPhyConn->m_pSess = 0x0000000264DA84A8 m_pPhyConn->m_fTracked = -1
m_pPhyConn->m_cbPacketsize = 8000 m_pPhyConn->m_fMars = 0 m_pPhyConn->m_fKill = 0


CBatch @0x0000000264DA9140
--------------------------
m_pSess = 0x0000000264DA8450 m_pConn = 0x0000000264DA9020 m_cRef = 3
m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 1
m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x00000002F9440CF8


EXCEPT (null) @0x000000001924A9D0
---------------------------------
exc_number = 0 exc_severity = 0 exc_func = 0x000007FEF3AE51D0



Task @0x00000002F9440CF8
------------------------
CPU Ticks used (ms) = 0 Task State = 2
WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0
WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0x0
ThreadId = 0x182c m_state = 0 m_eAbortSev = 0



EC @0x0000000264DDCDF0
----------------------
spid = 0 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x0 ec_atomic = 0x0 ecType = 0
__pSETLS = 0x0000000264DA9090 __pSEParams = 0x0000000264DA9520

SEInternalTLS @0x0000000264DA9090
---------------------------------
m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x00000002F9440CF8
m_activeHeapDatasetList = 0x0000000264DA9090
m_activeIndexDatasetList = 0x0000000264DA90A0 m_pDbccContext = 0x00000002513D2930
m_pAllocFileLimit = 0x0000000000000000 m_dekInstanceIndex = 0x-1
m_pImbiContext = 0x0000000000000000

SEParams @0x0000000264DA9520
----------------------------
m_lockTimeout = -1 m_isoLevel = 4096 m_logDontReplicate = 0
m_neverReplicate = 0 m_XactWorkspace = 0x0000000263D66FE0
m_execStats = 0x00000002ED7530C8



Brian Williamson SQL DBA

tkizer
Almighty SQL Goddess

USA
36672 Posts

Posted - 06/14/2013 :  14:26:54  Show Profile  Visit tkizer's Homepage  Reply with Quote
Stack dumps need to be analyzed by Microsoft and are not normal.

Tara Kizer
Microsoft MVP for Windows Server System - SQL Server
http://weblogs.sqlteam.com/tarad/

Subscribe to my blog
Go to Top of Page
  Previous Topic Topic Next Topic  
 New Topic  Reply to Topic
 Printer Friendly
Jump To:
SQL Server Forums © 2000-2009 SQLTeam Publishing, LLC Go To Top Of Page
This page was generated in 1.02 seconds. Powered By: Snitz Forums 2000