Wiki: Demystifying SQL Server Exception Dumps


Recently, I had replied to a MSDN post regarding an Access Violation reported by a SQL Server instance. In this post, I shall elucidate on troubleshooting memory dumps generated by SQL Server exceptions and what can be done without the availability of private symbols for debugging.

I had written a post earlier on when a memory dump is generated in SQL Server. If a single Errorlog has multiple stack dumps from multiple exceptions, then the first thing to do is to investigate the first access violation reported in the series of dumps reported. It is also possible that an exception (eg:access violation) could be followed by another exception/assertion or a non-yielding condition which may be a side effect of the earlier access violation.

When SQL encounters an access violation, there will be  SQLDumpXXXX.mdmp, SQLDumpXXXX.txt and SQLDumpXXXX.log files created in the LOG folder associated with the exception. The SQL Errorlog will report the occurrence of the exception as well.

  1. The .mdmp file is the memory dump which would be required by CSS to troubleshoot the issue.
  2. The .txt file is the symptom dump file which contains environment information along with other information depending on the nature of the exception.
  3. The .log file contains an extract from the SQL Errorlog when the exception was encountered. This helps in looking at what messages were reported in the Errorlog prior to the issue. Helps during post-mortem analysis if the current Errorlogs have already been recycled.

There can be two types of exceptions: one that is fatal enough to cause a SQL service termination or one that encounters the exception which terminates the thread which was encountered the issue.

Now what can be done in such a situation without having to look into memory dump file. The first step would be to check if the issue is a recurring behavior due to a particular operation to establish some pattern or if there is not identifiable pattern at all. If you look into the SQL Errorlog, you might be able to identify the input buffer which cause the exception (unless it’s an exception which terminated the SQL service, one such example is shown below).

Server * BEGIN STACK DUMP:
Server * spid 5728
Server * ex_handle_except encountered exception C0000005 – Server terminating

If the above snippet contains the T-SQL query which raised the exception, then you would want to execute the same query from a Management Studio query window and check if the exception re-occurs. If yes, then you have a valid repro scenario.

Example snippet from an Errorlog where the Access Violation didn’t cause a service termination:

*   Exception Address = 0042B866
*   Exception Code    = c0000005 EXCEPTION_ACCESS_VIOLATION
*   Access Violation occurred writing address 67192000
* Input Buffer 38 bytes –
*  exec sp_updatestats

Next check if you can spot any external components loaded into SQL Server address space. I shall revert back to my MSDN post where I had spotted an anti-virus filter DLL loaded in SQL Server process address space.

Server * bcrypt 000007FEFC900000 000007FEFC921FFF 00022000
Server * PCTLsp64 000000000B1E0000 000000000B251FFF 00072000
Server * mswsock 000007FEFC840000 000007FEFC893FFF 00054000

Based on a few Bing searches, I was able to determine that the PCTLsp64 was part of a virus monitoring program from PC Tools. The next step would be to check if this external component can be moved out of SQL Server process address space. The fact that the DLL is loaded in SQL process address space doesn’t make the DLL a culprit. However, when troubleshooting such issues, it is important to eliminate all unknown or third party elements that could prevent us from narrowing down to the culprit. Other DLLs which can be commonly found in SQL Server process address space would be provider DLLs when linked servers are being used on the SQL Server instance. Additionally execution of Extended Stored Procedures (XSPs) could also load external DLLs into SQL Server process address space depending on the way the XSP DLL was coded. An easy way to identifying a XSP dll is searching for the word “using” in the SQL Server Errorlog. SQL Server reports the first instance of a XSP dll being loaded into SQL Server process address space.

Using ‘xpstar.dll’ version ‘2009.100.1600’ to execute extended stored procedure ‘xp_readerrorlog’

If you do find an external component loaded in SQL process address space, check the callstack reported in the Errorlog below the list of modules printed below to determine if the functions of the exception stack are associated with external component that you identified. For the issue reported in the MSDN post, I did find this:

Module(sqlservr+00000000017A954C)
Module(kernel32+0000000000099380)
Module(ntdll+0000000000096228)
Module(ntdll+0000000000014F48)
Module(ntdll+0000000000034F6D)
Module(ntdll+0000000000015B2C)
Module(ntdll+000000000004F638)
Module(ntdll+000000000004C8F4)
Module(ntdll+000000000004C822)
Module(PCTLsp64+00000000000040AD)
Module(PCTLsp64+0000000000004701)
Module(PCTLsp64+0000000000005434)

Now this makes my story a bit more compelling of removing the external component out of SQL Server process address space. Once that is done and if you have a repro condition which causes the issue, then it would be good to re-run your repro and check if the issue is actually resolved. Not all the exceptions are the same even though they are reported in the same manner.

If all the above hasn’t helped in narrowing down the issue, then check if you are on the latest available cumulative update for the version of  SQL Server that you are using. If not, then it might be a good idea to update your instance to the latest available build to ensure that you are not hitting a known issue. If this is possible, then apply the latest cumulative update package and check if the issue re-occurs. I am cognizant of the fact that this might be an easy option due to change management restrictions on production environments. For such a dependency, my recommendation would be engage CSS to assist with a thorough investigation of the root cause of the issue.

As you can see from the steps outline above, you can look into a few things before you need to start poking into the exception memory dump using a Debugging tool.

Happy debugging!

Advertisements

18 thoughts on “Wiki: Demystifying SQL Server Exception Dumps

  1. 2011-05-25 14:32:13.35 Server Error: 17311, Severity: 16, State: 1.
    2011-05-25 14:32:13.35 Server SQL Server is terminating because of fatal exception c0000005. This error may be caused by an unhandled Win32 or C++ exception, or by an access violation encountered during exception handling. Check the SQL error log for any related stack dumps or messages. This exception forces SQL Server to shutdown. To recover from this error, restart the server (unless SQLAgent is configured to auto restart).
    2011-05-25 14:32:13.50 Server Using ‘dbghelp.dll’ version ‘4.0.5’
    2011-05-25 14:32:13.58 spid1s AppDomain 4 (REXME.dbo[runtime].3) is marked for unload due to memory pressure.
    2011-05-25 14:32:13.58 spid1s AppDomain 4 (REXME.dbo[runtime].3) unloaded.
    2011-05-25 14:32:15.50 Server **Dump thread – spid = 0, PSS = 0x00000000, EC = 0x00000000
    2011-05-25 14:32:15.50 Server ***Stack Dump being sent to D:\MSSQL.1\MSSQL\LOG\SQLDump0103.txt

  2. 2011-05-25 14:32:15.50 Server ***Stack Dump being sent to D:\data\data_srv\dbagroup\mssql\MSSQL.1\MSSQL\LOG\SQLDump0103.txt
    2011-05-25 14:32:15.50 Server * *******************************************************************************
    2011-05-25 14:32:15.50 Server *
    2011-05-25 14:32:15.50 Server * BEGIN STACK DUMP:
    2011-05-25 14:32:15.50 Server * 05/25/11 14:32:15 spid 0
    2011-05-25 14:32:15.50 Server *
    2011-05-25 14:32:15.50 Server * ex_handle_except encountered exception C0000005 – Server terminating
    2011-05-25 14:32:15.50 Server *
    2011-05-25 14:32:15.50 Server *
    2011-05-25 14:32:15.50 Server * MODULE BASE END SIZE
    2011-05-25 14:32:15.50 Server * sqlservr 01000000 02C24FFF 01c25000
    2011-05-25 14:32:15.50 Server * ntdll 7C800000 7C8C2FFF 000c3000
    2011-05-25 14:32:15.50 Server * kernel32 77E40000 77F41FFF 00102000
    2011-05-25 14:32:15.50 Server * MSVCR80 78130000 781CAFFF 0009b000
    2011-05-25 14:32:15.50 Server * msvcrt 77BA0000 77BF9FFF 0005a000
    2011-05-25 14:32:15.50 Server * MSVCP80 7C420000 7C4A6FFF 00087000
    2011-05-25 14:32:15.50 Server * ADVAPI32 7D1E0000 7D27BFFF 0009c000
    2011-05-25 14:32:15.50 Server * RPCRT4 77C50000 77CEFFFF 000a0000
    2011-05-25 14:32:15.50 Server * Secur32 76F50000 76F62FFF 00013000
    2011-05-25 14:32:15.50 Server * sqlos 344D0000 344D4FFF 00005000
    2011-05-25 14:32:15.50 Server * USERENV 76920000 769E1FFF 000c2000
    2011-05-25 14:32:15.50 Server * USER32 77380000 77410FFF 00091000
    2011-05-25 14:32:15.50 Server * GDI32 77C00000 77C48FFF 00049000
    2011-05-25 14:32:15.50 Server * WINMM 76AA0000 76ACCFFF 0002d000
    2011-05-25 14:32:15.50 Server * opends60 333E0000 333E6FFF 00007000
    2011-05-25 14:32:15.50 Server * NETAPI32 71C40000 71C96FFF 00057000
    2011-05-25 14:32:15.50 Server * psapi 76B70000 76B7AFFF 0000b000
    2011-05-25 14:32:15.50 Server * instapi 48060000 48069FFF 0000a000
    2011-05-25 14:32:15.50 Server * sqlevn70 4F610000 4F7B8FFF 001a9000
    2011-05-25 14:32:15.50 Server * NTMARTA 77E00000 77E20FFF 00021000
    2011-05-25 14:32:15.50 Server * WLDAP32 76F10000 76F3DFFF 0002e000
    2011-05-25 14:32:15.50 Server * SAMLIB 7E020000 7E02EFFF 0000f000
    2011-05-25 14:32:15.50 Server * ole32 77670000 777A8FFF 00139000
    2011-05-25 14:32:15.50 Server * rsaenh 05B50000 05B84FFF 00035000
    2011-05-25 14:32:15.50 Server * AUTHZ 76C40000 76C53FFF 00014000
    2011-05-25 14:32:15.50 Server * MSCOREE 06620000 06664FFF 00045000
    2011-05-25 14:32:15.50 Server * msv1_0 76C90000 76CB6FFF 00027000
    2011-05-25 14:32:15.50 Server * cryptdll 06880000 0688BFFF 0000c000
    2011-05-25 14:32:15.50 Server * WS2_32 71C00000 71C16FFF 00017000
    2011-05-25 14:32:15.50 Server * WS2HELP 71BF0000 71BF7FFF 00008000
    2011-05-25 14:32:15.50 Server * iphlpapi 76CF0000 76D09FFF 0001a000
    2011-05-25 14:32:15.50 Server * kerberos 068F0000 06948FFF 00059000
    2011-05-25 14:32:15.50 Server * MSASN1 06950000 06961FFF 00012000
    2011-05-25 14:32:15.50 Server * schannel 06980000 069A7FFF 00028000
    2011-05-25 14:32:15.50 Server * CRYPT32 069B0000 06A42FFF 00093000
    2011-05-25 14:32:15.50 Server * COMRES 06AA0000 06B65FFF 000c6000

  3. 2011-05-25 14:32:15.50 Server * XOLEHLP 06B70000 06B75FFF 00006000
    2011-05-25 14:32:15.50 Server * MSDTCPRX 06B80000 06BF8FFF 00079000
    2011-05-25 14:32:15.50 Server * OLEAUT32 77D00000 77D8AFFF 0008b000
    2011-05-25 14:32:15.50 Server * msvcp60 06C00000 06C64FFF 00065000
    2011-05-25 14:32:15.50 Server * MTXCLU 06C70000 06C88FFF 00019000
    2011-05-25 14:32:15.50 Server * VERSION 77B90000 77B97FFF 00008000
    2011-05-25 14:32:15.50 Server * WSOCK32 06C90000 06C98FFF 00009000
    2011-05-25 14:32:15.50 Server * CLUSAPI 06CA0000 06CB1FFF 00012000
    2011-05-25 14:32:15.50 Server * RESUTILS 06CC0000 06CD2FFF 00013000
    2011-05-25 14:32:15.50 Server * mswsock 06CF0000 06D30FFF 00041000
    2011-05-25 14:32:15.50 Server * DNSAPI 76ED0000 76EF9FFF 0002a000
    2011-05-25 14:32:15.50 Server * winrnr 06D80000 06D86FFF 00007000
    2011-05-25 14:32:15.50 Server * rasadhlp 06DA0000 06DA4FFF 00005000
    2011-05-25 14:32:15.50 Server * security 07170000 07173FFF 00004000
    2011-05-25 14:32:15.50 Server * msfte 07950000 07BA9FFF 0025a000
    2011-05-25 14:32:15.50 Server * dbghelp 07BC0000 07CD4FFF 00115000
    2011-05-25 14:32:15.50 Server * WINTRUST 76BB0000 76BDBFFF 0002c000
    2011-05-25 14:32:15.50 Server * imagehlp 76C10000 76C37FFF 00028000
    2011-05-25 14:32:15.50 Server * dssenh 080E0000 08106FFF 00027000
    2011-05-25 14:32:15.50 Server * hnetcfg 08320000 08379FFF 0005a000
    2011-05-25 14:32:15.50 Server * wshtcpip 080D0000 080D7FFF 00008000
    2011-05-25 14:32:15.50 Server * ntdsapi 08440000 08453FFF 00014000
    2011-05-25 14:32:15.50 Server * xpsp2res 08460000 08724FFF 002c5000
    2011-05-25 14:32:15.50 Server * CLBCatQ 777B0000 77832FFF 00083000
    2011-05-25 14:32:15.50 Server * sqlncli 08730000 08956FFF 00227000
    2011-05-25 14:32:15.50 Server * COMCTL32 77530000 775C6FFF 00097000
    2011-05-25 14:32:15.50 Server * comdlg32 007A0000 007E8FFF 00049000
    2011-05-25 14:32:15.50 Server * SHLWAPI 7D180000 7D1D1FFF 00052000
    2011-05-25 14:32:15.50 Server * SHELL32 08960000 0915EFFF 007ff000
    2011-05-25 14:32:15.50 Server * comctl32 77420000 77522FFF 00103000
    2011-05-25 14:32:15.50 Server * SQLNCLIR 09190000 091C2FFF 00033000
    2011-05-25 14:32:15.50 Server * xpsqlbot 0ABD0000 0ABD5FFF 00006000
    2011-05-25 14:32:15.50 Server * xpstar90 0ABF0000 0AC3BFFF 0004c000
    2011-05-25 14:32:15.50 Server * SQLSCM90 0AC50000 0AC58FFF 00009000
    2011-05-25 14:32:15.50 Server * ODBC32 0AC70000 0ACADFFF 0003e000
    2011-05-25 14:32:15.50 Server * BatchParser90 0ACB0000 0ACCEFFF 0001f000
    2011-05-25 14:32:15.50 Server * ATL80 7C630000 7C64AFFF 0001b000
    2011-05-25 14:32:15.50 Server * odbcint 0AFA0000 0AFB6FFF 00017000
    2011-05-25 14:32:15.50 Server * xpstar90 0AFC0000 0AFE5FFF 00026000
    2011-05-25 14:32:15.50 Server * xplog70 0AFF0000 0AFFBFFF 0000c000
    2011-05-25 14:32:15.50 Server * xplog70 0B010000 0B012FFF 00003000
    2011-05-25 14:32:15.50 Server * sqlevn70 0B0C0000 0B2C4FFF 00205000
    2011-05-25 14:32:15.50 Server * sqlevn70 0B2D0000 0B4D2FFF 00203000
    2011-05-25 14:32:15.50 Server * sqlevn70 0B4E0000 0B688FFF 001a9000
    2011-05-25 14:32:15.50 Server * sqlevn70 0B690000 0B87BFFF 001ec000
    2011-05-25 14:32:15.50 Server * sqlevn70 0B880000 0BA78FFF 001f9000
    2011-05-25 14:32:15.50 Server * sqlevn70 0BA80000 0BC60FFF 001e1000
    2011-05-25 14:32:15.50 Server * sqlevn70 0BC70000 0BE18FFF 001a9000
    2011-05-25 14:32:15.50 Server * sqlevn70 0BE20000 0BFC8FFF 001a9000
    2011-05-25 14:32:15.50 Server * sqlevn70 0BFD0000 0C178FFF 001a9000
    2011-05-25 14:32:15.50 Server * mscorwks 0C180000 0C6E0FFF 00561000

  4. 2011-05-25 14:32:15.50 Server * mscorlib.ni 126F0000 131D5FFF 00ae6000
    2011-05-25 14:32:15.50 Server * mscorsec 07530000 07542FFF 00013000
    2011-05-25 14:32:15.50 Server * SOFTPUB 07560000 07564FFF 00005000
    2011-05-25 14:32:15.50 Server * cryptnet 082F0000 08301FFF 00012000
    2011-05-25 14:32:15.50 Server * SensApi 09E60000 09E64FFF 00005000
    2011-05-25 14:32:15.50 Server * SqlAccess 09F00000 09F55FFF 00056000
    2011-05-25 14:32:15.50 Server * mscorjit 09F70000 09FC2FFF 00053000
    2011-05-25 14:32:15.50 Server * System.Data 131E0000 134A6FFF 002c7000
    2011-05-25 14:32:15.50 Server * System.ni 13D60000 1451DFFF 007be000
    2011-05-25 14:32:15.50 Server * System.Transactions 0A130000 0A172FFF 00043000
    2011-05-25 14:32:15.50 Server * System.Security.ni 13980000 13A35FFF 000b6000
    2011-05-25 14:32:15.50 Server * System 145E0000 148C3FFF 002e4000
    2011-05-25 14:32:15.50 Server * System.Security 148D0000 14911FFF 00042000
    2011-05-25 14:32:15.50 Server * System.Xml 14920000 14B13FFF 001f4000
    2011-05-25 14:32:15.50 Server * scrrun 13A40000 13A64FFF 00025000
    2011-05-25 14:32:15.50 Server * MFC42 14BE0000 14D00FFF 00121000
    2011-05-25 14:32:15.50 Server * WININET 14D10000 14DBAFFF 000ab000
    2011-05-25 14:32:15.50 Server * SXS 14DC0000 14E7CFFF 000bd000
    2011-05-25 14:32:15.50 Server * oledb32 343F0000 34468FFF 00079000
    2011-05-25 14:32:15.50 Server * MSDART 152E0000 152F9FFF 0001a000
    2011-05-25 14:32:15.50 Server * OLEDB32R 15300000 15310FFF 00011000
    2011-05-25 14:32:15.50 Server * comsvcs 76D10000 76E54FFF 00145000
    2011-05-25 14:32:15.50 Server * sqloledb 77840000 778C0FFF 00081000
    2011-05-25 14:32:15.50 Server * MSDATL3 344B0000 344C4FFF 00015000
    2011-05-25 14:32:15.50 Server * DBNETLIB 48040000 4805BFFF 0001c000
    2011-05-25 14:32:15.50 Server * DBnmpNTw 77FF0000 77FF6FFF 00007000
    2011-05-25 14:32:15.50 Server * System.Configuration 76E60000 76EC1FFF 00062000
    2011-05-25 14:32:15.50 Server * odsole70 15230000 1523EFFF 0000f000
    2011-05-25 14:32:15.50 Server * Microsoft.VisualBasic 7DE80000 7DF27FFF 000a8000
    2011-05-25 14:32:15.50 Server * CustomMarshalers.ni 15170000 151AFFFF 00040000
    2011-05-25 14:32:15.50 Server * CustomMarshalers 15260000 15274FFF 00015000
    2011-05-25 14:32:15.50 Server * clsHuffman 09560000 09569FFF 0000a000
    2011-05-25 14:32:15.50 Server * MSVBVM60 B93F0000
    2011-05-25 14:32:15.50 Server * dbghelp B9670000

  5. 2011-05-25 14:32:15.50 Server *
    2011-05-25 14:32:15.50 Server * Edi: 1522E74C: 0A3F8B80 00000000 1522E850 000D34C8 1522E850 7C82E0CC
    2011-05-25 14:32:15.50 Server * Esi: 00000000:
    2011-05-25 14:32:15.50 Server * Eax: 1522E630: 000042AC 00000000 00000000 77E4BEF7 00000000 00000002
    2011-05-25 14:32:15.50 Server * Ebx: 0000003F:
    2011-05-25 14:32:15.50 Server * Ecx: 1522ECA0: 00000000 00010007 C0150008 00840082 0A3F8B84 00000000
    2011-05-25 14:32:15.50 Server * Edx: 0000003D:
    2011-05-25 14:32:15.50 Server * Eip: 77E4BEF7: 10C2C95E 01093D00 840FC000 00000095 F29DE950 9090FFFF
    2011-05-25 14:32:15.50 Server * Ebp: 1522E680: 1522E6C4 021B2ECC 000042AC 00000000 00000000 00000000
    2011-05-25 14:32:15.50 Server * SegCs: 7813001B: 00000000 00000000 00000000 00000000 00000000 00000000
    2011-05-25 14:32:15.50 Server * EFlags: 00000246:
    2011-05-25 14:32:15.50 Server * Esp: 1522E62C: 00000000 000042AC 00000000 00000000 77E4BEF7 00000000
    2011-05-25 14:32:15.50 Server * SegSs: 78130023: 00000000 00000000 00000000 00000000 00000000 00000000
    2011-05-25 14:32:15.50 Server * *******************************************************************************
    2011-05-25 14:32:15.50 Server * ——————————————————————————-
    2011-05-25 14:32:15.50 Server * Short Stack Dump
    2011-05-25 14:32:15.52 Server 77E4BEF7 Module(kernel32+0000BEF7)
    2011-05-25 14:32:15.52 Server 021B2ECC Module(sqlservr+011B2ECC)
    2011-05-25 14:32:15.52 Server 021B6DE0 Module(sqlservr+011B6DE0)
    2011-05-25 14:32:15.52 Server 021B698D Module(sqlservr+011B698D)
    2011-05-25 14:32:15.52 Server 02427A29 Module(sqlservr+01427A29)
    2011-05-25 14:32:15.52 Server 77E761B7 Module(kernel32+000361B7)
    2011-05-25 14:32:15.54 Server 77E792A3 Module(kernel32+000392A3)
    2011-05-25 14:32:15.54 Server Stack Signature for the dump is 0x1A074F5C
    2011-05-25 14:32:25.53 Server External dump process return code 0x20000001.

  6. I am seeing clsHuffman (probably custom compression/decompression DLL) and VB Runtime 6.0 (MSVBVM60) in SQL process address space. I believe the operation that hit the AV was a CLR operation. This would require a thorough investigation from CSS. I would suggest opening a support incident since this is a production server.

  7. It’s not often I leave replies to items such as this but in this case many thanks are in order !
    I was investigating SQLServer error 17311 and the subsequent shutdowns and came across your item, which I found interesting.
    Then your mention of PCTLsp64 made it even more interesting since I installed PCTools on the server yesterday afternoon ………….
    The server is currently rebooting with two disc checks – once that’s done I’ll look at our dump files and see if the problem is as similar as it looks to yours !!

  8. 17311 is a generic error number which is raised when the SQL service terminates due to an exception. Gald to know that the article helped and if PCTools DLL is not on the top of the stack, you might want to check the call stack and see if the functions shown on the top of stack is from a 3rd party DLL or not.

  9. Dear All,

    I need your help.

    I have one production server working on environment Windows Server 2008 (32 bit) with SQL Server 2008 R2 Service pack 1 CU4 (32 bit).

    We have created one link server to Oracle 9i server.

    I migrated my 2000 database to 2008. I have created link server also.

    But after that I am facing a very serious problem.

    Sometimes my SQL server stop automatically and when I checked in error log I found stack dump in that. And event viewer log shows me following errors.
    SQL Server is terminating because of fatal exception c0000005. This error may be caused by an unhandled Win32 or C++ exception, or by an access violation encountered during exception handling. Check the SQL error log for any related stack dumps or messages. This exception forces SQL Server to shutdown. To recover from this error, restart the server (unless SQLAgent is configured to auto restart).
    The OLE DB provider “MSDAORA” for linked server “IIS” reported an error 0x80004005 aborting the current transaction.

    Can anyone please help me on this.

  10. This might be an access violation. MSDAORA is not supported (tested) for your version of Oracle. Ref: http://support.microsoft.com/kb/239719

    Have you tried using the Oracle Provider for setting up the linked server? As of now the information provided is not sufficient enough. Could you use the steps mentioned in this post to retrieve the offending call stack and post the information to the SQL Server MSDN Forums. Provide the link back here so that I can respond.

  11. Hi Amit,

    I cant find the exact cause of this problem.

    And a very strange things i know that this same stucture working very fine in SQL Server 2000 before migrate.

    I will try to setup link server with using Oracle OLEDB and let you know.

  12. From the information that you have provided, it is clear that it is an access violation. As I said in my previous reply, MSDAORA provider was not intended for use with higher versions of Oracle. You would want to use the Oracle provider. If it was working with SQL Server 2000, then you were lucky as this is not a tested scenario. To check what exactly is causing the Access Violation, the exception stack will have to be obtained from the .mdmp file. Without that, not much can be said other than what I have already mentioned.

  13. Hi i have same kind of problem SQL 2008 r2 is getting restarted, its not failing over to other node and creating dumps. here are the details.

    8-27 08:00:03.22 spid102 000000004441C4EA Module(OraOLEDBrst11+000000000001C4EA)
    2012-08-27 08:00:03.23 spid102 00000000444248BA Module(OraOLEDBrst11+00000000000248BA)
    2012-08-27 08:00:03.23 spid102 000000001BCC1AF9 Module(OraOLEDB11+0000000000001AF9)
    2012-08-27 08:00:03.23 spid102 00000000011B1AB7 Module(sqlservr+0000000000B41AB7)
    2012-08-27 08:00:03.23 spid102 00000000011590B7 Module(sqlservr+0000000000AE90B7)
    2012-08-27 08:00:03.23 spid102 0000000001148752 Module(sqlservr+0000000000AD8752)
    2012-08-27 08:00:03.23 spid102 00000000010C2D8F Module(sqlservr+0000000000A52D8F)
    2012-08-27 08:00:03.23 spid102 00000000011E2EC6 Module(sqlservr+0000000000B72EC6)
    2012-08-27 08:00:03.23 spid102 00000000011E1999 Module(sqlservr+0000000000B71999)
    2012-08-27 08:00:03.23 spid102 00000000011E1410 Module(sqlservr+0000000000B71410)
    2012-08-27 08:00:03.23 spid102 00000000011DDCE8 Module(sqlservr+0000000000B6DCE8)
    2012-08-27 08:00:03.23 spid102 0000000000CB160E Module(sqlservr+000000000064160E)
    2012-08-27 08:00:03.23 spid102 00000000008E0E36 Module(sqlservr+0000000000270E36)
    2012-08-27 08:00:03.23 spid102 00000000008E55B7 Module(sqlservr+00000000002755B7)
    2012-08-27 08:00:03.23 spid102 00000000008DBA93 Module(sqlservr+000000000026BA93)
    2012-08-27 08:00:03.24 spid102 0000000000927183 Module(sqlservr+00000000002B7183)
    2012-08-27 08:00:03.24 spid102 00000000008DBA93 Module(sqlservr+000000000026BA93)
    2012-08-27 08:00:03.24 spid102 0000000000936720 Module(sqlservr+00000000002C6720)
    2012-08-27 08:00:03.24 spid102 00000000008DBA93 Module(sqlservr+000000000026BA93)
    2012-08-27 08:00:03.24 spid102 00000000009EB9A2 Module(sqlservr+000000000037B9A2)
    2012-08-27 08:00:03.24 spid102 00000000008DBA93 Module(sqlservr+000000000026BA93)
    2012-08-27 08:00:03.24 spid102 0000000000BA86F7 Module(sqlservr+00000000005386F7)
    2012-08-27 08:00:03.24 spid102 00000000008DBA93 Module(sqlservr+000000000026BA93)
    2012-08-27 08:00:03.24 spid102 00000000008DB958 Module(sqlservr+000000000026B958)
    2012-08-27 08:00:03.24 spid102 00000000008DBB0E Module(sqlservr+000000000026BB0E)
    2012-08-27 08:00:03.24 spid102 00000000008437A5 Module(sqlservr+00000000001D37A5)
    2012-08-27 08:00:03.24 spid102 0000000000806644 Module(sqlservr+0000000000196644)
    2012-08-27 08:00:03.24 spid102 0000000000807259 Module(sqlservr+0000000000197259)
    2012-08-27 08:00:03.24 spid102 00000000008070FC Module(sqlservr+00000000001970FC)
    2012-08-27 08:00:03.24 spid102 0000000001B4C97F Module(sqlservr+00000000014DC97F)
    2012-08-27 08:00:03.25 spid102 0000000001B6F7E8 Module(sqlservr+00000000014FF7E8)
    2012-08-27 08:00:03.25 spid102 0000000001B6B741 Module(sqlservr+00000000014FB741)
    2012-08-27 08:00:03.25 spid102 0000000001B11DA1 Module(sqlservr+00000000014A1DA1)
    2012-08-27 08:00:03.25 spid102 0000000000CDB1C4 Module(sqlservr+000000000066B1C4)
    2012-08-27 08:00:03.25 spid102 00000000006DAD6C Module(sqlservr+000000000006AD6C)
    2012-08-27 08:00:03.25 spid102 0000000001B6DA1C Module(sqlservr+00000000014FDA1C)
    2012-08-27 08:00:03.25 spid102 0000000001B6D37A Module(sqlservr+00000000014FD37A)
    2012-08-27 08:00:03.25 spid102 0000000001B6B36D Module(sqlservr+00000000014FB36D)
    2012-08-27 08:00:03.25 spid102 0000000001B11DA1 Module(sqlservr+00000000014A1DA1)
    2012-08-27 08:00:03.25 spid102 0000000000CDB1C4 Module(sqlservr+000000000066B1C4)
    2012-08-27 08:00:03.25 spid102 00000000006DAD6C Module(sqlservr+000000000006AD6C)
    2012-08-27 08:00:03.25 spid102 00000000006FCFA6 Module(sqlservr+000000000008CFA6)
    2012-08-27 08:00:03.25 spid102 00000000007265E2 Module(sqlservr+00000000000B65E2)
    2012-08-27 08:00:03.25 spid102 000000000067B450 Module(sqlservr+000000000000B450)
    2012-08-27 08:00:03.25 spid102 000000000067B116 Module(sqlservr+000000000000B116)
    2012-08-27 08:00:03.26 spid102 000000000067AF5B Module(sqlservr+000000000000AF5B)
    2012-08-27 08:00:03.26 spid102 00000000007B44FA Module(sqlservr+00000000001444FA)
    2012-08-27 08:00:03.26 spid102 00000000007B47DD Module(sqlservr+00000000001447DD)
    2012-08-27 08:00:03.26 spid102 0000000000BFC0CD Module(sqlservr+000000000058C0CD)
    2012-08-27 08:00:03.27 spid102 00000000007B53D2 Module(sqlservr+00000000001453D2)
    2012-08-27 08:00:03.27 spid102 00000000756137D7 Module(MSVCR80+00000000000037D7)
    2012-08-27 08:00:03.27 spid102 0000000075613894 Module(MSVCR80+0000000000003894)
    2012-08-27 08:00:03.28 spid102 00000000778EF33D Module(kernel32+000000000001F33D)
    2012-08-27 08:00:03.28 spid102 0000000077A22CA1 Module(ntdll+0000000000032CA1)
    2012-08-27 08:00:03.28 spid102 Stack Signature for the dump is 0x000000010D701A16
    2012-08-27 08:00:04.44 spid102 External dump process return code 0x20000001.
    External dump process returned no errors.

    2012-08-27 08:04:28.59 spid103 Using ‘dbghelp.dll’ version ‘4.0.5’
    2012-08-27 08:04:28.60 spid103 ***Stack Dump being sent to F:\PWXDSQLV281_Data\MSSQL10_50.MSSQLSERVER\MSSQL\LOG\SQLDump0164.txt
    2012-08-27 08:04:28.60 spid103 SqlDumpExceptionHandler: Process 103 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
    2012-08-27 08:04:28.60 spid103 * *******************************************************************************
    2012-08-27 08:04:28.60 spid103 *
    2012-08-27 08:04:28.60 spid103 * BEGIN STACK DUMP:
    2012-08-27 08:04:28.60 spid103 * 08/27/12 08:04:28 spid 103
    2012-08-27 08:04:28.60 spid103 *
    2012-08-27 08:04:28.60 spid103 *
    2012-08-27 08:04:28.60 spid103 * Exception Address = 0000000077A429EE Module(ntdll+00000000000529EE)
    2012-08-27 08:04:28.60 spid103 * Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
    2012-08-27 08:04:28.60 spid103 * Access Violation occurred reading address 0000000000000000
    2012-08-27 08:04:28.60 spid103 * Input Buffer 74 bytes –
    2012-08-27 08:04:28.60 spid103 * exec dbo.usp_LoadFinConsol
    2012-08-27 08:04:28.60 spid103 *
    2012-08-27 08:04:28.60 spid103 *
    2012-08-27 08:04:28.60 spid103 * MODULE BASE END SIZE
    2012-08-27 08:04:28.60 spid103 * sqlservr 0000000000670000 000000000424CFFF 03bdd000
    2012-08-27 08:04:28.60 spid103 * ntdll 00000000779F0000 0000000077B9BFFF 001ac000
    2012-08-27 08:04:28.60 spid103 * kernel32 00000000778D0000 00000000779EEFFF 0011f000
    2012-08-27 08:04:28.60 spid103 * KERNELBASE 000007FEFDBB0000 000007FEFDC1BFFF 0006c000
    2012-08-27 08:04:28.60 spid103 * ADVAPI32 000007FEFE950000 000007FEFEA2AFFF 000db000
    2012-08-27 08:04:28.60 spid103 * msvcrt 000007FEFE8B0000 000007FEFE94EFFF 0009f000
    2012-08-27 08:04:28.60 spid103 * sechost 000007FEFFB60000 000007FEFFB7EFFF 0001f000
    2012-08-27 08:04:28.60 spid103 * RPCRT4 000007FEFFB80000 000007FEFFCADFFF 0012e000
    2012-08-27 08:04:28.60 spid103 * MSVCR80 0000000075610000 00000000756D8FFF 000c9000
    2012-08-27 08:04:28.60 spid103 * MSVCP80 0000000075500000 0000000075608FFF 00109000
    2012-08-27 08:04:28.60 spid103 * sqlos 0000000073870000 0000000073876FFF 00007000
    2012-08-27 08:04:28.60 spid103 * Secur32 000007FEFD490000 000007FEFD49AFFF 0000b000
    2012-08-27 08:04:28.60 spid103 * SSPICLI 000007FEFD7A0000 000007FEFD7C4FFF 00025000
    2012-08-27 08:04:28.60 spid103 * pdh 000007FEF75C0000 000007FEF760DFFF 0004e000
    2012-08-27 08:04:28.60 spid103 * SHLWAPI 000007FEFE7E0000 000007FEFE850FFF 00071000
    2012-08-27 08:04:28.60 spid103 * GDI32 000007FEFE2B0000 000007FEFE316FFF 00067000
    2012-08-27 08:04:28.60 spid103 * USER32 00000000777D0000 00000000778C9FFF 000fa000
    2012-08-27 08:04:28.60 spid103 * LPK 000007FEFE2A0000 000007FEFE2ADFFF 0000e000
    2012-08-27 08:04:28.60 spid103 * USP10 000007FEFE710000 000007FEFE7D9FFF 000ca000
    2012-08-27 08:04:28.60 spid103 * USERENV 000007FEFCC80000 000007FEFCC9DFFF 0001e000
    2012-08-27 08:04:28.60 spid103 * profapi 000007FEFD950000 000007FEFD95EFFF 0000f000
    2012-08-27 08:04:28.60 spid103 * WINMM 000007FEF5100000 000007FEF513AFFF 0003b000
    2012-08-27 08:04:28.60 spid103 * IPHLPAPI 000007FEFB2D0000 000007FEFB2F6FFF 00027000
    2012-08-27 08:04:28.60 spid103 * NSI 000007FEFE180000 000007FEFE187FFF 00008000
    2012-08-27 08:04:28.60 spid103 * WINNSI 000007FEFB410000 000007FEFB41AFFF 0000b000
    2012-08-27 08:04:28.60 spid103 * opends60 00000000738D0000 00000000738D7FFF 00008000
    2012-08-27 08:04:28.60 spid103 * NETAPI32 000007FEFAF50000 000007FEFAF65FFF 00016000
    2012-08-27 08:04:28.60 spid103 * netutils 000007FEFCE10000 000007FEFCE1BFFF 0000c000
    2012-08-27 08:04:28.60 spid103 * srvcli 000007FEFD3F0000 000007FEFD412FFF 00023000
    2012-08-27 08:04:28.60 spid103 * wkscli 000007FEFAEC0000 000007FEFAED4FFF 00015000
    2012-08-27 08:04:28.60 spid103 * LOGONCLI 000007FEFCFD0000 000007FEFCFFFFFF 00030000
    2012-08-27 08:04:28.60 spid103 * SAMCLI 000007FEFAA10000 000007FEFAA23FFF 00014000
    2012-08-27 08:04:28.60 spid103 * BatchParser 00000000731E0000 000000007320CFFF 0002d000
    2012-08-27 08:04:28.60 spid103 * IMM32 000007FEFDEF0000 000007FEFDF1DFFF 0002e000
    2012-08-27 08:04:28.60 spid103 * MSCTF 000007FEFE190000 000007FEFE298FFF 00109000
    2012-08-27 08:04:28.60 spid103 * psapi 0000000077BC0000 0000000077BC6FFF 00007000
    2012-08-27 08:04:28.60 spid103 * instapi10 0000000074940000 000000007494CFFF 0000d000
    2012-08-27 08:04:28.60 spid103 * CLUSAPI 000007FEF6BE0000 000007FEF6C2FFFF 00050000
    2012-08-27 08:04:28.60 spid103 * cryptdll 000007FEFD510000 000007FEFD523FFF 00014000
    2012-08-27 08:04:28.60 spid103 * RESUTILS 000007FEF6BC0000 000007FEF6BD8FFF 00019000
    2012-08-27 08:04:28.60 spid103 * cscapi 000007FEF5D60000 000007FEF5D6EFFF 0000f000
    2012-08-27 08:04:28.60 spid103 * sqlevn70 00000000721F0000 00000000723F2FFF 00203000
    2012-08-27 08:04:28.60 spid103 * ntmarta 000007FEFCA70000 000007FEFCA9CFFF 0002d000
    2012-08-27 08:04:28.60 spid103 * WLDAP32 000007FEFFCB0000 000007FEFFCFFFFF 00050000
    2012-08-27 08:04:28.60 spid103 * CRYPTSP 000007FEFD1E0000 000007FEFD1F6FFF 00017000
    2012-08-27 08:04:28.60 spid103 * rsaenh 000007FEFCEE0000 000007FEFCF26FFF 00047000
    2012-08-27 08:04:28.60 spid103 * CRYPTBASE 000007FEFD840000 000007FEFD84EFFF 0000f000
    2012-08-27 08:04:28.60 spid103 * BROWCLI 000007FEF7550000 000007FEF7561FFF 00012000
    2012-08-27 08:04:28.60 spid103 * AUTHZ 000007FEFD3B0000 000007FEFD3DEFFF 0002f000
    2012-08-27 08:04:28.60 spid103 * MSCOREE 000007FEFA7A0000 000007FEFA80EFFF 0006f000
    2012-08-27 08:04:28.60 spid103 * ole32 000007FEFE500000 000007FEFE701FFF 00202000
    2012-08-27 08:04:28.60 spid103 * credssp 000007FEFCDD0000 000007FEFCDD8FFF 00009000
    2012-08-27 08:04:28.60 spid103 * msv1_0 000007FEFD110000 000007FEFD160FFF 00051000
    2012-08-27 08:04:28.60 spid103 * kerberos 000007FEFD200000 000007FEFD2B2FFF 000b3000
    2012-08-27 08:04:28.60 spid103 * MSASN1 000007FEFD9F0000 000007FEFD9FEFFF 0000f000
    2012-08-27 08:04:28.60 spid103 * schannel 000007FEFCF70000 000007FEFCFC7FFF 00058000
    2012-08-27 08:04:28.60 spid103 * CRYPT32 000007FEFDA00000 000007FEFDB67FFF 00168000
    2012-08-27 08:04:28.60 spid103 * WS2_32 000007FEFE860000 000007FEFE8ACFFF 0004d000
    2012-08-27 08:04:28.60 spid103 * mswsock 000007FEFD180000 000007FEFD1D3FFF 00054000
    2012-08-27 08:04:28.60 spid103 * wshtcpip 000007FEFCB70000 000007FEFCB76FFF 00007000
    2012-08-27 08:04:28.60 spid103 * wship6 000007FEFD170000 000007FEFD176FFF 00007000
    2012-08-27 08:04:28.60 spid103 * DNSAPI 000007FEFD000000 000007FEFD05AFFF 0005b000
    2012-08-27 08:04:28.60 spid103 * rasadhlp 000007FEF79E0000 000007FEF79E7FFF 00008000
    2012-08-27 08:04:28.60 spid103 * fwpuclnt 000007FEFB250000 000007FEFB2A2FFF 00053000
    2012-08-27 08:04:28.60 spid103 * security 0000000073770000 0000000073772FFF 00003000
    2012-08-27 08:04:28.60 spid103 * SHELL32 000007FEFED30000 000007FEFFAB6FFF 00d87000
    2012-08-27 08:04:28.60 spid103 * OLEAUT32 000007FEFE0A0000 000007FEFE176FFF 000d7000
    2012-08-27 08:04:28.60 spid103 * ftimport 0000000060000000 0000000060024FFF 00025000
    2012-08-27 08:04:28.60 spid103 * MSFTE 0000000049980000 0000000049D2DFFF 003ae000
    2012-08-27 08:04:28.60 spid103 * VERSION 000007FEFCAA0000 000007FEFCAABFFF 0000c000
    2012-08-27 08:04:28.60 spid103 * dbghelp 0000000072FD0000 000000007312DFFF 0015e000
    2012-08-27 08:04:28.60 spid103 * WINTRUST 000007FEFDCE0000 000007FEFDD19FFF 0003a000
    2012-08-27 08:04:28.60 spid103 * ncrypt 000007FEFD360000 000007FEFD3ADFFF 0004e000
    2012-08-27 08:04:28.60 spid103 * bcrypt 000007FEFD330000 000007FEFD351FFF 00022000
    2012-08-27 08:04:28.60 spid103 * wshqos 000007FEFC2C0000 000007FEFC2C8FFF 00009000
    2012-08-27 08:04:28.60 spid103 * ntdsapi 000007FEF77C0000 000007FEF77E6FFF 00027000
    2012-08-27 08:04:28.60 spid103 * bcryptprimitives 000007FEFCE20000 000007FEFCE6BFFF 0004c000
    2012-08-27 08:04:28.60 spid103 * CLBCatQ 000007FEFFAC0000 000007FEFFB58FFF 00099000
    2012-08-27 08:04:28.60 spid103 * sqlncli10 0000000072400000 00000000726BBFFF 002bc000
    2012-08-27 08:04:28.60 spid103 * COMCTL32 000007FEF7860000 000007FEF78FFFFF 000a0000
    2012-08-27 08:04:28.60 spid103 * COMDLG32 000007FEFEA30000 000007FEFEAC7FFF 00098000
    2012-08-27 08:04:28.60 spid103 * SQLNCLIR10 0000000072B70000 0000000072BA6FFF 00037000
    2012-08-27 08:04:28.60 spid103 * netbios 000007FEFBDB0000 000007FEFBDB9FFF 0000a000
    2012-08-27 08:04:28.60 spid103 * xpsqlbot 0000000072ED0000 0000000072ED7FFF 00008000
    2012-08-27 08:04:28.60 spid103 * xpstar 0000000072DA0000 0000000072E27FFF 00088000
    2012-08-27 08:04:28.60 spid103 * SQLSCM 00000000731A0000 00000000731ADFFF 0000e000
    2012-08-27 08:04:28.60 spid103 * ODBC32 000007FEF6770000 000007FEF6820FFF 000b1000
    2012-08-27 08:04:28.60 spid103 * ATL80 0000000074CA0000 0000000074CBFFFF 00020000
    2012-08-27 08:04:28.60 spid103 * odbcint 00000000736F0000 0000000073727FFF 00038000
    2012-08-27 08:04:28.60 spid103 * xpstar 0000000072EA0000 0000000072EC4FFF 00025000
    2012-08-27 08:04:28.60 spid103 * xplog70 0000000072E90000 0000000072E9FFFF 00010000
    2012-08-27 08:04:28.60 spid103 * xplog70 0000000072E80000 0000000072E81FFF 00002000
    2012-08-27 08:04:28.60 spid103 * apphelp 000007FEFD7E0000 000007FEFD836FFF 00057000
    2012-08-27 08:04:28.60 spid103 * msxmlsql 0000000071170000 00000000712C0FFF 00151000
    2012-08-27 08:04:28.60 spid103 * odsole70 0000000072B20000 0000000072B36FFF 00017000
    2012-08-27 08:04:28.60 spid103 * wbemcomn 000007FEF7610000 000007FEF7695FFF 00086000
    2012-08-27 08:04:28.60 spid103 * wbemprox 000007FEF7450000 000007FEF745EFFF 0000f000
    2012-08-27 08:04:28.60 spid103 * SXS 000007FEFD850000 000007FEFD8E1FFF 00092000
    2012-08-27 08:04:28.60 spid103 * wmiutils 000007FEF7370000 000007FEF7395FFF 00026000
    2012-08-27 08:04:28.60 spid103 * RpcRtRemote 000007FEFD930000 000007FEFD943FFF 00014000
    2012-08-27 08:04:28.60 spid103 * wbemsvc 000007FEF7430000 000007FEF7443FFF 00014000
    2012-08-27 08:04:28.60 spid103 * fastprox 000007FEF7460000 000007FEF7541FFF 000e2000
    2012-08-27 08:04:28.60 spid103 * scrrun 000007FEFB930000 000007FEFB963FFF 00034000
    2012-08-27 08:04:28.60 spid103 * oledb32 000007FEF5760000 000007FEF586DFFF 0010e000
    2012-08-27 08:04:28.60 spid103 * MSDART 000007FEFBD60000 000007FEFBD87FFF 00028000
    2012-08-27 08:04:28.60 spid103 * Comctl32 000007FEFC2F0000 000007FEFC4E3FFF 001f4000
    2012-08-27 08:04:28.60 spid103 * OLEDB32R 0000000073230000 0000000073243FFF 00014000
    2012-08-27 08:04:28.60 spid103 * comsvcs 000007FEF4E00000 000007FEF4FAFFFF 001b0000
    2012-08-27 08:04:28.60 spid103 * OraOLEDB11 000000001BCC0000 000000001BD4EFFF 0008f000
    2012-08-27 08:04:28.60 spid103 * OraOLEDBgmr11 0000000044100000 0000000044126FFF 00027000
    2012-08-27 08:04:28.60 spid103 * OCI 000000001CE40000 000000001CEEAFFF 000ab000
    2012-08-27 08:04:28.60 spid103 * OraOLEDBrst11 0000000044400000 0000000044434FFF 00035000
    2012-08-27 08:04:28.60 spid103 * OraOLEDButl11 0000000044700000 0000000044708FFF 00009000
    2012-08-27 08:04:28.60 spid103 * OraClient11 000000003E3F0000 000000003E88DFFF 0049e000
    2012-08-27 08:04:28.60 spid103 * oracore11 000000002FDD0000 000000002FF2FFFF 00160000
    2012-08-27 08:04:28.60 spid103 * oranls11 00000000301C0000 00000000302BEFFF 000ff000
    2012-08-27 08:04:28.60 spid103 * oraunls11 0000000005150000 000000000516FFFF 00020000
    2012-08-27 08:04:28.60 spid103 * orauts 0000000005200000 0000000005206FFF 00007000
    2012-08-27 08:04:28.60 spid103 * oracommon11 000000003E890000 000000003EB46FFF 002b7000
    2012-08-27 08:04:28.60 spid103 * orasnls11 000000001B6A0000 000000001B6DCFFF 0003d000
    2012-08-27 08:04:28.60 spid103 * orageneric11 000000003EB50000 000000003FA50FFF 00f01000
    2012-08-27 08:04:28.60 spid103 * oraxml11 000000003FA60000 000000003FF3EFFF 004df000
    2012-08-27 08:04:28.60 spid103 * oran11 000000003FF40000 0000000040393FFF 00454000
    2012-08-27 08:04:28.60 spid103 * oranl11 000000001B790000 000000001B7FEFFF 0006f000
    2012-08-27 08:04:28.60 spid103 * orantcp11 000000001BF50000 000000001BF84FFF 00035000
    2012-08-27 08:04:28.60 spid103 * oranldap11 000000001C010000 000000001C05AFFF 0004b000
    2012-08-27 08:04:28.60 spid103 * orannzsbb11 00000000304F0000 0000000030673FFF 00184000
    2012-08-27 08:04:28.60 spid103 * WSOCK32 000007FEFA900000 000007FEFA908FFF 00009000
    2012-08-27 08:04:28.60 spid103 * oraldapclnt11 00000000403A0000 0000000040591FFF 001f2000
    2012-08-27 08:04:28.60 spid103 * orancrypt11 000000001BA10000 000000001BA33FFF 00024000
    2012-08-27 08:04:28.60 spid103 * orazt11 00000000320E0000 00000000322CFFFF 001f0000
    2012-08-27 08:04:28.60 spid103 * oranro11 000000001C530000 000000001C58AFFF 0005b000
    2012-08-27 08:04:28.60 spid103 * oranhost11 000000001C100000 000000001C109FFF 0000a000
    2012-08-27 08:04:28.60 spid103 * orancds11 000000001C590000 000000001C596FFF 00007000
    2012-08-27 08:04:28.60 spid103 * orantns11 000000001C930000 000000001C940FFF 00011000
    2012-08-27 08:04:28.60 spid103 * oraztkg11 000000001D0F0000 000000001D1A2FFF 000b3000
    2012-08-27 08:04:28.60 spid103 * orapls11 00000000405A0000 0000000040AC0FFF 00521000
    2012-08-27 08:04:28.60 spid103 * oraslax11 000000001C980000 000000001C98EFFF 0000f000
    2012-08-27 08:04:28.60 spid103 * oravsn11 000000001CBA0000 000000001CBA6FFF 00007000
    2012-08-27 08:04:28.60 spid103 * oraplp11 0000000040AD0000 0000000040EC4FFF 003f5000
    2012-08-27 08:04:28.60 spid103 * orahasgen11 0000000040ED0000 00000000411A5FFF 002d6000
    2012-08-27 08:04:28.60 spid103 * oraocr11 000000002DEC0000 000000002DF87FFF 000c8000
    2012-08-27 08:04:28.60 spid103 * oraocrb11 00000000308E0000 00000000309D3FFF 000f4000
    2012-08-27 08:04:28.60 spid103 * oraocrutl11 000000001D3F0000 000000001D400FFF 00011000
    2012-08-27 08:04:28.60 spid103 * imagehlp 000007FEFDD20000 000007FEFDD38FFF 00019000
    2012-08-27 08:04:28.60 spid103 * oracell11 000000002DA00000 000000002DA4AFFF 0004b000
    2012-08-27 08:04:28.60 spid103 * orasql11 000000002E020000 000000002E07DFFF 0005e000
    2012-08-27 08:04:28.60 spid103 * OraPlc11 000000001D9D0000 000000001D9EFFFF 00020000
    2012-08-27 08:04:28.60 spid103 * OraOLEDB11us 0000000044300000 0000000044305FFF 00006000
    2012-08-27 08:04:28.60 spid103 * OraOLEDBpus11 0000000044200000 0000000044207FFF 00008000
    2012-08-27 08:04:28.60 spid103 * SAMLIB 000007FEFA9F0000 000007FEFAA0CFFF 0001d000
    2012-08-27 08:04:28.60 spid103 * instapi 000000000E880000 000000000E88CFFF 0000d000
    2012-08-27 08:04:28.60 spid103 * ssdebugps 0000000073160000 0000000073172FFF 00013000
    2012-08-27 08:04:28.60 spid103 * msadce 000007FEF2EC0000 000007FEF2F76FFF 000b7000
    2012-08-27 08:04:28.60 spid103 * msadcer 0000000072AE0000 0000000072AE1FFF 00002000
    2012-08-27 08:04:28.60 spid103 * OraOLEDBrmc11 0000000005070000 0000000005075FFF 00006000
    2012-08-27 08:04:28.60 spid103 * dbghelp 00000000313E0000 000000003153DFFF 0015e000
    2012-08-27 08:04:28.60 spid103 *
    2012-08-27 08:04:28.60 spid103 * P1Home: 0000001284278640: 00000000C0000005 0000000000000000 0000000077A429EE FFFFF6FB00000002 0000000000000000 0000000000000000
    2012-08-27 08:04:28.60 spid103 * P2Home: 0000001284278150: 0000001284278640 0000001284278150 0000000000000000 0000000000000000 0000000000000000 0000000000000000
    2012-08-27 08:04:28.60 spid103 * P3Home: 0000000000000000:
    2012-08-27 08:04:28.60 spid103 * P4Home: 0000000000000000:
    2012-08-27 08:04:28.60 spid103 * P5Home: 0000000000000000:
    2012-08-27 08:04:28.60 spid103 * P6Home: 0000000000000000:
    2012-08-27 08:04:28.60 spid103 * ContextFlags: 000000000010001F:
    2012-08-27 08:04:28.60 spid103 * MxCsr: 0000000000001F80:
    2012-08-27 08:04:28.60 spid103 * SegCs: 0000000000000033:
    2012-08-27 08:04:28.60 spid103 * SegDs: 000000000000002B:
    2012-08-27 08:04:28.60 spid103 * SegEs: 000000000000002B:
    2012-08-27 08:04:28.60 spid103 * SegFs: 0000000000000053:
    2012-08-27 08:04:28.60 spid103 * SegGs: 000000000000002B:
    2012-08-27 08:04:28.60 spid103 * SegSs: 000000000000002B:
    2012-08-27 08:04:28.60 spid103 * EFlags: 0000000000010246: 0000000000000000 0000000101580000 0000000102680000 0000000102780000 0000000000000000 0000001000000000
    2012-08-27 08:04:28.60 spid103 * Rax: 0000000000000000:
    2012-08-27 08:04:28.60 spid103 * Rcx: 00000000000000C0:
    2012-08-27 08:04:28.60 spid103 * Rdx: 00000000FFFFFFC0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000
    2012-08-27 08:04:28.60 spid103 * Rbx: 00000000003E0000: 0000000000000000 01007F96E4F91226 00000000FFEEFFEE 00000000054D0018 00000000003E0128 00000000003E0000
    2012-08-27 08:04:28.60 spid103 * Rsp: 0000001284278710: 00000000000000FF 000000003EBCD365 000000004260F280 0000000000000028 000000000000002D 00000000425B8A00
    2012-08-27 08:04:28.60 spid103 * Rbp: 0000000000000000:
    2012-08-27 08:04:28.60 spid103 * Rsi: 000000005F0D83F0: 006F00720072006F 00557F4C00000006 0020000A000D0029 0029002000200020 0029000A000D0020 0048005700200061
    2012-08-27 08:04:28.60 spid103 * Rdi: 000000000000000C:
    2012-08-27 08:04:28.60 spid103 * R8: 000000005EC40120: 000000014F578BE0 0000000000000000 000000005EC8C3D0 0000000000000000 0000000000000000 0000000000000000
    2012-08-27 08:04:28.60 spid103 * R9: 00000000003E0230: 00000000003E4C70 0000000100000080 0000000000000230 0000000000000000 00000000003E0158 00000000003E0268
    2012-08-27 08:04:28.60 spid103 * R10: 0000000000000006:
    2012-08-27 08:04:28.60 spid103 * R11: 0000000000000006:
    2012-08-27 08:04:28.60 spid103 * R12: 000000005F0D8400: 0020000A000D0029 0029002000200020 0029000A000D0020 0048005700200061 0020004500520045 00520055004F0043
    2012-08-27 08:04:28.60 spid103 * R13: 00000000003E0158: 00000000416DAC20 000000004F6585A0 00000000003E0208 2F7C075931038CED 00000000003E8520 0000000000020000
    2012-08-27 08:04:28.60 spid103 * R14: 0000000077B082A0: 0001000200010008 0001000200010003 0001000200010004 0001000200010003 0001000200010005 0001000200010003
    2012-08-27 08:04:28.60 spid103 * R15: 0000000000000000:
    2012-08-27 08:04:28.60 spid103 * Rip: 0000000077A429EE: 850FC83B49088B48 2404894D0000A4C7 20894C0824448949 0846B70F0860894D 48000000C8830148 854800000140BB8B
    2012-08-27 08:04:28.60 spid103 * *******************************************************************************
    2012-08-27 08:04:28.60 spid103 * ——————————————————————————-
    2012-08-27 08:04:28.60 spid103 * Short Stack Dump
    2012-08-27 08:04:28.61 spid103 0000000077A429EE Module(ntdll+00000000000529EE)
    2012-08-27 08:04:28.61 spid103 0000000077A421BC Module(ntdll+00000000000521BC)
    2012-08-27 08:04:28.61 spid103 0000000044701A31 Module(OraOLEDButl11+0000000000001A31)
    2012-08-27 08:04:28.61 spid103 00000000444195BF Module(OraOLEDBrst11+00000000000195BF)
    2012-08-27 08:04:28.61 spid103 000000004441B97B Module(OraOLEDBrst11+000000000001B97B)
    2012-08-27 08:04:28.62 spid103 000000004441BF5B Module(OraOLEDBrst11+000000000001BF5B)
    2012-08-27 08:04:28.62 spid103 00000000444248BA Module(OraOLEDBrst11+00000000000248BA)
    2012-08-27 08:04:28.62 spid103 000000001BD1B63D Module(OraOLEDB11+000000000005B63D)
    2012-08-27 08:04:28.62 spid103 000000001BCFD8EA Module(OraOLEDB11+000000000003D8EA)
    2012-08-27 08:04:28.62 spid103 000000001BCF468A Module(OraOLEDB11+000000000003468A)
    2012-08-27 08:04:28.62 spid103 000000001BCF6253 Module(OraOLEDB11+0000000000036253)
    2012-08-27 08:04:28.62 spid103 000007FEF57F44EB Module(oledb32+00000000000944EB)
    2012-08-27 08:04:28.62 spid103 000007FEF579D56A Module(oledb32+000000000003D56A)
    2012-08-27 08:04:28.62 spid103 00000000011B25A7 Module(sqlservr+0000000000B425A7)
    2012-08-27 08:04:28.62 spid103 000000000115E517 Module(sqlservr+0000000000AEE517)
    2012-08-27 08:04:28.62 spid103 0000000001148982 Module(sqlservr+0000000000AD8982)
    2012-08-27 08:04:28.62 spid103 00000000010C45B9 Module(sqlservr+0000000000A545B9)
    2012-08-27 08:04:28.62 spid103 00000000011EF0F6 Module(sqlservr+0000000000B7F0F6)
    2012-08-27 08:04:28.62 spid103 00000000011EDC70 Module(sqlservr+0000000000B7DC70)
    2012-08-27 08:04:28.62 spid103 00000000011ED8E1 Module(sqlservr+0000000000B7D8E1)
    2012-08-27 08:04:28.62 spid103 0000000001AE4BF3 Module(sqlservr+0000000001474BF3)
    2012-08-27 08:04:28.62 spid103 00000000006C9535 Module(sqlservr+0000000000059535)
    2012-08-27 08:04:28.62 spid103 00000000006CCAA7 Module(sqlservr+000000000005CAA7)
    2012-08-27 08:04:28.62 spid103 000000000073CD47 Module(sqlservr+00000000000CCD47)
    2012-08-27 08:04:28.63 spid103 000000000073CC3A Module(sqlservr+00000000000CCC3A)
    2012-08-27 08:04:28.63 spid103 0000000001B11DA1 Module(sqlservr+00000000014A1DA1)
    2012-08-27 08:04:28.63 spid103 0000000000CDB1C4 Module(sqlservr+000000000066B1C4)
    2012-08-27 08:04:28.63 spid103 00000000006DAD6C Module(sqlservr+000000000006AD6C)
    2012-08-27 08:04:28.63 spid103 0000000001B6F8DE Module(sqlservr+00000000014FF8DE)
    2012-08-27 08:04:28.63 spid103 0000000001B6B741 Module(sqlservr+00000000014FB741)
    2012-08-27 08:04:28.63 spid103 0000000001B11DA1 Module(sqlservr+00000000014A1DA1)
    2012-08-27 08:04:28.63 spid103 0000000000CDB1C4 Module(sqlservr+000000000066B1C4)
    2012-08-27 08:04:28.63 spid103 00000000006DAD6C Module(sqlservr+000000000006AD6C)
    2012-08-27 08:04:28.63 spid103 0000000001B6DA1C Module(sqlservr+00000000014FDA1C)
    2012-08-27 08:04:28.63 spid103 0000000001B6D37A Module(sqlservr+00000000014FD37A)
    2012-08-27 08:04:28.63 spid103 0000000001B6B36D Module(sqlservr+00000000014FB36D)
    2012-08-27 08:04:28.63 spid103 0000000001B11DA1 Module(sqlservr+00000000014A1DA1)
    2012-08-27 08:04:28.63 spid103 0000000000CDB1C4 Module(sqlservr+000000000066B1C4)
    2012-08-27 08:04:28.63 spid103 00000000006DAD6C Module(sqlservr+000000000006AD6C)
    2012-08-27 08:04:28.63 spid103 00000000006FCFA6 Module(sqlservr+000000000008CFA6)
    2012-08-27 08:04:28.63 spid103 00000000007265E2 Module(sqlservr+00000000000B65E2)
    2012-08-27 08:04:28.63 spid103 000000000067B450 Module(sqlservr+000000000000B450)
    2012-08-27 08:04:28.63 spid103 000000000067B116 Module(sqlservr+000000000000B116)
    2012-08-27 08:04:28.63 spid103 000000000067AF5B Module(sqlservr+000000000000AF5B)
    2012-08-27 08:04:28.63 spid103 00000000007B44FA Module(sqlservr+00000000001444FA)
    2012-08-27 08:04:28.63 spid103 00000000007B47DD Module(sqlservr+00000000001447DD)
    2012-08-27 08:04:28.63 spid103 0000000000BFC0CD Module(sqlservr+000000000058C0CD)
    2012-08-27 08:04:28.64 spid103 00000000007B53D2 Module(sqlservr+00000000001453D2)
    2012-08-27 08:04:28.64 spid103 00000000756137D7 Module(MSVCR80+00000000000037D7)
    2012-08-27 08:04:28.65 spid103 0000000075613894 Module(MSVCR80+0000000000003894)
    2012-08-27 08:04:28.65 spid103 00000000778EF33D Module(kernel32+000000000001F33D)
    2012-08-27 08:04:28.65 spid103 0000000077A22CA1 Module(ntdll+0000000000032CA1)
    2012-08-27 08:04:28.65 spid103 Stack Signature for the dump is 0x000000004B553B60

  14. I am seeing Oracle DLLs loaded in the SQL process space. Is the issue occurring when Oracle Linked Server queries are running? Looks like Oracle calls are at the top of stack. You will have to find out what query is causing the issue. Try checking if running the Oracle provider out-of-process works for you. Also, if the SQL service successfully starts on the same node, then the resource will not failover. Do you have the dump uploaded somewhere that I can take a quick look? Other option would be to open a case with Microsoft for assistance.

It is always good to hear from you! :)

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s