Коллеги, добрый день.
В субботу 21го на базе стало все подвисать. Корнем зла был один процесс. Вроде бы обычная проца, где делаются селекты.
Правда запрос гетерогенный, данные тянутся, в том числе, с линкед-сервера.
Я процессу сделал kill. В итоге понедельник, а процесс до сих пор висит с состоянии KILLED/ROLLBACK, с типом ожидания SOSHOST_MUTEX. В инете скудная информация.
Почитал в справке: "
SOSHOST_MUTEX: Происходит, когда включенный компонент, например среда CLR, ожидает объекта синхронизации мьютекс SQL Server. "
Посмотрел лог сервера за 21.04.2018. В 5.10 был аварийно завершен(по ходу, доступ временно пропадал и MS SQL сам прибил процесс) один процесс с другой процедурой, которая также лезет на тот же линкед-сервер, причем делает это в транзакции.
Проблемы с распределенными транзакциями уже имел. В прошлый раз это вылезло в бесконечном увеличении лога TampDB и так же неубиваемости процесса. Лечили тем, что переехали на другой сервер, где tempDB создалось заново.
В этот раз никакой лог не растет, но зависший процесс напрягает. + подвешивает всю базу другой необходимый процесс, который периодически тянет данные с того же линкед-сервера, и который блокируется этим вот неубиваемым процессом.
Что делать? Пока думаю, если ничего не поможет, перегрузить как-нибудь сервер.
Вот дамп лога ошибок:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
123.
124.
125.
126.
127.
128.
129.
130.
131.
132.
133.
134.
135.
136.
137.
138.
139.
140.
141.
142.
143.
144.
145.
146.
147.
148.
149.
150.
151.
152.
153.
154.
155.
156.
157.
158.
159.
160.
161.
162.
163.
164.
165.
166.
167.
168.
169.
170.
171.
172.
173.
174.
175.
176.
177.
178.
179.
180.
181.
182.
183.
184.
185.
186.
187.
188.
189.
190.
191.
192.
193.
194.
195.
196.
197.
198.
199.
200.
201.
202.
203.
204.
205.
206.
207.
208.
209.
210.
211.
212.
213.
214.
215.
216.
217.
218.
219.
220.
221.
222.
223.
224.
225.
226.
227.
228.
229.
230.
231.
232.
233.
234.
235.
236.
237.
238.
239.
240.
241.
242.
243.
244.
245.
246.
247.
248.
249.
250.
251.
252.
253.
254.
255.
256.
257.
258.
259.
260.
261.
262.
263.
264.
265.
266.
267.
268.
269.
270.
271.
272.
273.
274.
275.
276.
277.
278.
279.
280.
281.
282.
283.
284.
285.
286.
287.
288.
289.
290.
291.
292.
293.
294.
295.
296.
297.
298.
299.
300.
301.
302.
303.
304.
305.
306.
307.
308.
309.
310.
311.
312.
313.
314.
315.
316.
317.
318.
319.
320.
321.
322.
323.
324.
325.
326.
327.
328.
329.
330.
331.
332.
333.
334.
335.
336.
337.
338.
339.
340.
341.
342.
343.
344.
345.
346.
347.
348.
349.
350.
351.
352.
353.
354.
355.
356.
357.
358.
359.
360.
361.
362.
363.
364.
365.
366.
367.
368.
369.
370.
371.
372.
373.
374.
375.
376.
377.
378.
379.
380.
381.
382.
383.
384.
385.
386.
387.
Current time is 05:10:01 04/21/18.
=====================================================================
BugCheck Dump
=====================================================================
This file is generated by Microsoft SQL Server
version 10.50.6000.34
upon detection of fatal unexpected error. Please return this file,
the query or program that produced the bugcheck, the database and
the error log, and any other pertinent information with a Service Request.
Computer type is Intel(R) Xeon(R) CPU E5-2660 0 @ 2.20GHz.
Bios Version is INTEL - 6040000
PhoenixBIOS 4.0 Release 6.0
8 X64 level 8664, 10 Mhz processor (s).
Windows NT 6.1 Build 7601 CSD Service Pack 1.
Memory
MemoryLoad = 92%
Total Physical = 24575 MB
Available Physical = 1941 MB
Total Page File = 49149 MB
Available Page File = 25847 MB
Total Virtual = 8388607 MB
Available Virtual = 8356314 MB
***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL10_50.MSSQLSERVER\MSSQL\LOG\SQLDump0007.tx
t
SqlDumpExceptionHandler: Process 182 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is
terminating this process.
* *******************************************************************************
*
* BEGIN STACK DUMP:
* 04/21/18 05:10:01 spid 182
*
*
* Exception Address = 000007FEFF501183 Module(OLEAUT32+0000000000001183)
* Exception Code = c0000005 EXCEPTION_ACCESS_VIOLATION
* Access Violation occurred reading address FFFFFFFFFFFFFFFF
* Input Buffer 114 bytes -
* exec proc_WebAstraRep_OnlineData_Make_SnapShot
*
*
* MODULE BASE END SIZE
* sqlservr 0000000000D70000 000000000498FFFF 03c20000
* ntdll 00000000776C0000 0000000077869FFF 001aa000
* kernel32 00000000774A0000 00000000775BEFFF 0011f000
* KERNELBASE 000007FEFD970000 000007FEFD9D9FFF 0006a000
* ADVAPI32 000007FEFDF30000 000007FEFE00AFFF 000db000
* msvcrt 000007FEFDBE0000 000007FEFDC7EFFF 0009f000
* sechost 000007FEFDCB0000 000007FEFDCCEFFF 0001f000
* RPCRT4 000007FEFF170000 000007FEFF29CFFF 0012d000
* MSVCR80 0000000075290000 0000000075358FFF 000c9000
* MSVCP80 0000000074E90000 0000000074F98FFF 00109000
* sqlos 0000000074D70000 0000000074D76FFF 00007000
* Secur32 000007FEFD190000 000007FEFD19AFFF 0000b000
* SSPICLI 000007FEFD2B0000 000007FEFD2D4FFF 00025000
* pdh 000007FEF79A0000 000007FEF79EDFFF 0004e000
* SHLWAPI 000007FEFF780000 000007FEFF7F0FFF 00071000
* GDI32 000007FEFEF00000 000007FEFEF66FFF 00067000
* USER32 00000000775C0000 00000000776B9FFF 000fa000
* LPK 000007FEFE0E0000 000007FEFE0EDFFF 0000e000
* USP10 000007FEFE010000 000007FEFE0DAFFF 000cb000
* USERENV 000007FEFC8C0000 000007FEFC8DDFFF 0001e000
* profapi 000007FEFD5D0000 000007FEFD5DEFFF 0000f000
* WINMM 000007FEF7960000 000007FEF799AFFF 0003b000
* IPHLPAPI 000007FEFBA00000 000007FEFBA26FFF 00027000
* NSI 000007FEFF770000 000007FEFF777FFF 00008000
* WINNSI 000007FEFB9F0000 000007FEFB9FAFFF 0000b000
* opends60 0000000074D60000 0000000074D67FFF 00008000
* NETAPI32 000007FEFC150000 000007FEFC165FFF 00016000
* netutils 000007FEFD020000 000007FEFD02BFFF 0000c000
* srvcli 000007FEFD060000 000007FEFD082FFF 00023000
* wkscli 000007FEFC130000 000007FEFC144FFF 00015000
* LOGONCLI 000007FEFCCE0000 000007FEFCD0FFFF 00030000
* SAMCLI 000007FEFA780000 000007FEFA793FFF 00014000
* BatchParser 0000000074D30000 0000000074D5CFFF 0002d000
* IMM32 000007FEFDC80000 000007FEFDCADFFF 0002e000
* MSCTF 000007FEFEF70000 000007FEFF078FFF 00109000
* psapi 0000000077880000 0000000077886FFF 00007000
* instapi10 0000000074DF0000 0000000074DFCFFF 0000d000
* cscapi 000007FEF9CF0000 000007FEF9CFEFFF 0000f000
* sqlevn70 0000000074AD0000 0000000074D15FFF 00246000
* sqlevn70 00000000748C0000 0000000074AC3FFF 00204000
* CRYPTSP 000007FEFCF70000 000007FEFCF87FFF 00018000
* rsaenh 000007FEFCB40000 000007FEFCB86FFF 00047000
* CRYPTBASE 000007FEFD4C0000 000007FEFD4CEFFF 0000f000
* BROWCLI 000007FEF7800000 000007FEF7811FFF 00012000
* AUTHZ 000007FEFCFE0000 000007FEFD00EFFF 0002f000
* MSCOREE 000007FEFA710000 000007FEFA77EFFF 0006f000
* ole32 000007FEFDCD0000 000007FEFDECBFFF 001fc000
* credssp 000007FEFCA40000 000007FEFCA49FFF 0000a000
* msv1_0 000007FEFCD70000 000007FEFCDC1FFF 00052000
* cryptdll 000007FEFD170000 000007FEFD183FFF 00014000
* kerberos 000007FEFCE40000 000007FEFCEF7FFF 000b8000
* MSASN1 000007FEFD670000 000007FEFD67EFFF 0000f000
* schannel 000007FEFCC80000 000007FEFCCD7FFF 00058000
* CRYPT32 000007FEFD800000 000007FEFD96CFFF 0016d000
* security 00000000748B0000 00000000748B2FFF 00003000
* WS2_32 000007FEFF080000 000007FEFF0CCFFF 0004d000
* RsFxFt 0000000073690000 0000000073698FFF 00009000
* SHELL32 000007FEFE170000 000007FEFEEF9FFF 00d8a000
* OLEAUT32 000007FEFF500000 000007FEFF5D9FFF 000da000
* ncrypt 000007FEFCF90000 000007FEFCFDFFFF 00050000
* bcrypt 000007FEFD030000 000007FEFD051FFF 00022000
* mswsock 000007FEFCDE0000 000007FEFCE34FFF 00055000
* wship6 000007FEFCDD0000 000007FEFCDD6FFF 00007000
* wshtcpip 000007FEFCA30000 000007FEFCA36FFF 00007000
* ntmarta 000007FEFC6D0000 000007FEFC6FCFFF 0002d000
* WLDAP32 000007FEFDED0000 000007FEFDF21FFF 00052000
* ntdsapi 000007FEFADC0000 000007FEFADE6FFF 00027000
* DNSAPI 000007FEFCD10000 000007FEFCD6AFFF 0005b000
* rasadhlp 000007FEFADF0000 000007FEFADF7FFF 00008000
* fwpuclnt 000007FEFB8A0000 000007FEFB8F2FFF 00053000
* bcryptprimitives 000007FEFCA80000 000007FEFCACBFFF 0004c000
* CLBCatQ 000007FEFF930000 000007FEFF9C8FFF 00099000
* sqlncli10 0000000073390000 000000007364CFFF 002bd000
* VERSION 000007FEFC9F0000 000007FEFC9FBFFF 0000c000
* COMCTL32 000007FEF79F0000 000007FEF7A8FFFF 000a0000
* COMDLG32 000007FEFF0D0000 000007FEFF166FFF 00097000
* SQLNCLIR10 0000000073050000 000000007308AFFF 0003b000
* xpsqlbot 0000000073040000 0000000073047FFF 00008000
* xpstar 0000000072C50000 0000000072CD7FFF 00088000
* SQLSCM 0000000073380000 000000007338DFFF 0000e000
* ODBC32 000007FEF6210000 000007FEF62C0FFF 000b1000
* ATL80 00000000751D0000 00000000751EFFFF 00020000
* odbcint 0000000073330000 0000000073367FFF 00038000
* clusapi 000007FEF5F20000 000007FEF5F6FFFF 00050000
* resutils 000007FEF5F00000 000007FEF5F18FFF 00019000
* xpstar 0000000072C20000 0000000072C45FFF 00026000
* xplog70 0000000073030000 000000007303FFFF 00010000
* xplog70 0000000072C10000 0000000072C11FFF 00002000
* SAMLIB 000007FEFA6F0000 000007FEFA70CFFF 0001d000
* COMRES 00000000729C0000 0000000072AFDFFF 0013e000
* XOLEHLP 000007FEF4470000 000007FEF4483FFF 00014000
* MSDTCPRX 000007FEF43B0000 000007FEF446BFFF 000bc000
* MTXCLU 000007FEF4330000 000007FEF438FFFF 00060000
* ktmw32 000007FEFB4B0000 000007FEFB4B9FFF 0000a000
* RpcRtRemote 000007FEFD570000 000007FEFD583FFF 00014000
* odsole70 0000000070CF0000 0000000070D06FFF 00017000
* SXS 000007FEFD4D0000 000007FEFD560FFF 00091000
* GPAPI 000007FEFC8A0000 000007FEFC8BAFFF 0001b000
* mlang 000007FEF7870000 000007FEF78AAFFF 0003b000
* odsole70 0000000070CE0000 0000000070CE3FFF 00004000
* apphelp 000007FEFD460000 000007FEFD4B6FFF 00057000
* oledb32 000007FEF46C0000 000007FEF47CDFFF 0010e000
* MSDART 000007FEF4BF0000 000007FEF4C17FFF 00028000
* Comctl32 000007FEFBF10000 000007FEFC103FFF 001f4000
* OLEDB32R 00000000728F0000 0000000072903FFF 00014000
* comsvcs 000007FEF4D50000 000007FEF4EFFFFF 001b0000
* ACEOLEDB 000007FEF4A80000 000007FEF4B00FFF 00081000
* MSVCR90 0000000074770000 0000000074812FFF 000a3000
* mso 000007FEEBB70000 000007FEED29AFFF 0172b000
* msi 000007FEEB850000 000007FEEBB6DFFF 0031e000
* ACECORE 000007FEEB550000 000007FEEB845FFF 002f6000
* MSVCP90 0000000074360000 0000000074432FFF 000d3000
* ACEWSTR 000007FEF2A90000 000007FEF2B64FFF 000d5000
* MSORES 000007FEE6C00000 000007FEEB12AFFF 0452b000
* MSOINTL 000007FEE6990000 000007FEE6BF9FFF 0026a000
* ACEINTL 000007FEF4B70000 000007FEF4BA2FFF 00033000
* msxml6 000007FEF7600000 000007FEF77F1FFF 001f2000
* msdasql 000007FEF3F10000 000007FEF3FC5FFF 000b6000
* MSDATL3 000007FEF4B30000 000007FEF4B4FFFF 00020000
* MSDASQLR 00000000728E0000 00000000728EEFFF 0000f000
* psqlodbc35w 000007FEEB4B0000 000007FEEB54BFFF 0009c000
* LIBPQ 00000000231E0000 0000000023228FFF 00049000
* SSLEAY32 000007FEF24E0000 000007FEF2539FFF 0005a000
* LIBEAY32 000007FEEB310000 000007FEEB4ACFFF 0019d000
* MSVCR120 000007FEEB220000 000007FEEB30EFFF 000ef000
* libintl-8 0000000061CC0000 0000000061D63FFF 000a4000
* libiconv-2 0000000066000000 0000000066197FFF 00198000
* WSOCK32 000007FEF64C0000 000007FEF64C8FFF 00009000
* odbccp32 000007FEF4680000 000007FEF46A7FFF 00028000
* msxmlsql 0000000072770000 00000000728C0FFF 00151000
* myodbc3 000007FEE6420000 000007FEE68F8FFF 004d9000
* NLAapi 000007FEFC110000 000007FEFC124FFF 00015000
* napinsp 000007FEF8DF0000 000007FEF8E04FFF 00015000
* winrnr 000007FEF9D00000 000007FEF9D0AFFF 0000b000
* instapi 0000000048060000 000000004806CFFF 0000d000
* mpr 000007FEF7AC0000 000007FEF7AD7FFF 00018000
* ACEES 000007FEE5CF0000 000007FEE5DE5FFF 000f6000
* VBAJET32 000007FEF3FE0000 000007FEF3FEFFFF 00010000
* expsrv 000007FEE5C60000 000007FEE5CE0FFF 00081000
* mscorwks 000007FEF9D40000 000007FEFA6DFFFF 009a0000
* mscorlib.ni 000007FEF8E10000 000007FEF9CEDFFF 00ede000
* mscorsec 000007FEF7170000 000007FEF7188FFF 00019000
* WINTRUST 000007FEFD7C0000 000007FEFD7FAFFF 0003b000
* imagehlp 000007FEFD9E0000 000007FEFD9F8FFF 00019000
* cryptnet 000007FEFAC00000 000007FEFAC26FFF 00027000
* SensApi 000007FEF67F0000 000007FEF67F8FFF 00009000
* mscorlib.resources 0000000075220000 0000000075283FFF 00064000
* SqlAccess 0000000072700000 0000000072763FFF 00064000
* mscorjit 000007FEF64D0000 000007FEF6652FFF 00183000
* System.Data 0000000072CE0000 0000000072FEDFFF 0030e000
* System.ni 000007FEF83B0000 000007FEF8DE2FFF 00a33000
* System.Transactions 0000000072910000 0000000072958FFF 00049000
* System.Security.ni 000007FEE61B0000 000007FEE629FFFF 000f0000
* System 0000000050070000 000000005037FFFF 00310000
* System.Security 00000000726B0000 00000000726F5FFF 00046000
* System.Xml 0000000045560000 0000000045759FFF 001fa000
* ACEERR 000007FEF3FD0000 000007FEF3FDCFFF 0000d000
* ssdebugps 0000000072690000 00000000726A2FFF 00013000
* winhttp 000007FEFA850000 000007FEFA8C0FFF 00071000
* webio 000007FEFA7A0000 000007FEFA804FFF 00065000
* msxml3 000007FEF1C10000 000007FEF1DE4FFF 001d5000
* dbghelp 00000000386F0000 000000003884DFFF 0015e000
*
* P1Home: 000000004D5AC7F0: 00000000C0000005 0000000000000000 000007FEFF501183 0000000000000002 00000000
00000000 FFFFFFFFFFFFFFFF
* P2Home: 000000004D5AC300: 000000004D5AC7F0 000000004D5AC300 0000000000000000 0000000000000000 00000004
F79535A0 0000000000000000
* P3Home: 0000000000000000:
* P4Home: 0000000000000000:
* P5Home: 00000004F79535A0: 00000004F7953640 4E3C4F368F4A6B68 5CC4E9A47CBC81BE 0000000000000000 00000004
F7953660 0000000000000000
* P6Home: 0000000000000000:
* ContextFlags: 000000000010005F:
* MxCsr: 0000000000001FA0:
* SegCs: 0000000000000033:
* SegDs: 000000000000002B:
* SegEs: 000000000000002B:
* SegFs: 0000000000000053:
* SegGs: 000000000000002B:
* SegSs: 000000000000002B:
* EFlags: 0000000000010202: 703000000000001F FFFF00000000777F 000000000000FFFF 0000000000000000 0FA00000
00000000 0000000000000000
* Rax: 0000C54E403FB1EA:
* Rcx: 0000000032115C70: 0000000000000000 0000000000000000 0000000000000000 8000349145A2FAB5 B5D080D1
B5D0000C B8D081D1B8D0BCD0
* Rdx: 0000000000000003:
* Rbx: 0000000032115C70: 0000000000000000 0000000000000000 0000000000000000 8000349145A2FAB5 B5D080D1
B5D0000C B8D081D1B8D0BCD0
* Rsp: 000000004D5ACA28: 00000000733DDC4D 00000000080000C3 0000000000000000 0000000000000000 00000000
00000000 0000000000000000
* Rbp: 0000000000000003:
* Rsi: 0000C54E403FB1EA:
* Rdi: 00000000000000F4:
* R8: 00000000000000F4:
* R9: 0000000032115C44: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000000
00000000 0000000000000000
* R10: 00000000733A1FC0: 00000000733DDDB8 0000000073523B98 00000000733D4750 000000007352500C 00000000
733CF744 00000000733CF320
* R11: 000000000000000A:
* R12: 000000034751C1A8: 00000000733A1FC0 0000000100000001 0000000000000000 0000000000000000 00000000
734020B0 0000000300000007
* R13: 0000000032115C44: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000000
00000000 0000000000000000
* R14: 0000000000000001:
* R15: 0000000032115C40: 00000000000000F4 0000000000000000 0000000000000000 0000000000000000 00000000
00000000 0000000000000000
* Rip: 000007FEFF501183: 571024748948FE6C 3311B70F20EC8348 08FA8366D98B48F6 25C78BFAB70F3172 0F48F883
FFFF9FFF FA83660009D32084
* *******************************************************************************
* -------------------------------------------------------------------------------
* Short Stack Dump
000007FEFF501183 Module(OLEAUT32+0000000000001183)
00000000733DDC4D Module(sqlncli10+000000000004DC4D)
00000000733DE4D5 Module(sqlncli10+000000000004E4D5)
00000000733DDBB0 Module(sqlncli10+000000000004DBB0)
00000000018BDDD5 Module(sqlservr+0000000000B4DDD5)
000000000187D256 Module(sqlservr+0000000000B0D256)
00000000018547F1 Module(sqlservr+0000000000AE47F1)
00000000017D61C7 Module(sqlservr+0000000000A661C7)
00000000018E20B3 Module(sqlservr+0000000000B720B3)
000000000267367A Module(sqlservr+000000000190367A)
0000000002674BC6 Module(sqlservr+0000000001904BC6)
000000000266CC86 Module(sqlservr+00000000018FCC86)
0000000000DFBD4D Module(sqlservr+000000000008BD4D)
0000000000DF6547 Module(sqlservr+0000000000086547)
0000000000DF65E5 Module(sqlservr+00000000000865E5)
0000000000E5CA61 Module(sqlservr+00000000000ECA61)
0000000000E60786 Module(sqlservr+00000000000F0786)
0000000000E5CA61 Module(sqlservr+00000000000ECA61)
0000000000DE8BD5 Module(sqlservr+0000000000078BD5)
0000000000E5CA61 Module(sqlservr+00000000000ECA61)
0000000000E5CA61 Module(sqlservr+00000000000ECA61)
0000000000E5CF84 Module(sqlservr+00000000000ECF84)
0000000000DFAB7B Module(sqlservr+000000000008AB7B)
0000000000E5CA61 Module(sqlservr+00000000000ECA61)
0000000000E0632C Module(sqlservr+000000000009632C)
0000000002678684 Module(sqlservr+0000000001908684)
0000000000E26CC0 Module(sqlservr+00000000000B6CC0)
0000000000E26DBE Module(sqlservr+00000000000B6DBE)
0000000000DE8882 Module(sqlservr+0000000000078882)
0000000000DEB8AB Module(sqlservr+000000000007B8AB)
0000000000E6C595 Module(sqlservr+00000000000FC595)
0000000000E6C3EA Module(sqlservr+00000000000FC3EA)
0000000000DC9B55 Module(sqlservr+0000000000059B55)
0000000000DE076B Module(sqlservr+000000000007076B)
0000000000DDFF3C Module(sqlservr+000000000006FF3C)
0000000002278A90 Module(sqlservr+0000000001508A90)
00000000022783E6 Module(sqlservr+00000000015083E6)
00000000022763DD Module(sqlservr+00000000015063DD)
0000000000DC9B55 Module(sqlservr+0000000000059B55)
0000000000DE076B Module(sqlservr+000000000007076B)
0000000000DDFF3C Module(sqlservr+000000000006FF3C)
0000000000DE0F4D Module(sqlservr+0000000000070F4D)
0000000000DAA252 Module(sqlservr+000000000003A252)
0000000000D7EF70 Module(sqlservr+000000000000EF70)
0000000000D7ED4A Module(sqlservr+000000000000ED4A)
0000000000D7EB8F Module(sqlservr+000000000000EB8F)
0000000000E9D706 Module(sqlservr+000000000012D706)
0000000000E9D7E5 Module(sqlservr+000000000012D7E5)
000000000111D869 Module(sqlservr+00000000003AD869)
0000000000E9E01A Module(sqlservr+000000000012E01A)
00000000752937D7 Module(MSVCR80+00000000000037D7)
0000000075293894 Module(MSVCR80+0000000000003894)
00000000774B59CD Module(kernel32+00000000000159CD)
00000000776EA561 Module(ntdll+000000000002A561)
CSession @0x00000004881EA3B0
----------------------------
m_spid = 182 m_cRef = 19 m_rgcRefType[0] = 1
m_rgcRefType[1] = 1 m_rgcRefType[2] = 16 m_rgcRefType[3] = 1
m_rgcRefType[4] = 0 m_rgcRefType[5] = 0 m_pmo = 0x00000004881EA080
m_pstackBhfPool = 0x00000003B44A11A0 m_dwLoginFlags = 0x83e0 m_fBackground = 0
m_eConnResetOption = 0 m_fUserProc = -1 m_fConnReset = 0
m_fIsConnReset = 0 m_fInLogin = 0 m_fAuditLoginSent = 1
m_fAuditLoginFailedSent = 0 m_fReplRelease = 0 m_fKill = 0
m_ulLoginStamp = 100368698 m_eclClient = 6 m_protType = 6
m_hHttpToken = FFFFFFFFFFFFFFFF
m_pV7LoginRec
---------------------
0000000000000000: 98010000 03000b73 00100000 00000007 88070000 †.......s............
0000000000000014: 00000000 e0830000 4cffffff 19040000 5e000500 †....àƒ..Lÿÿÿ....^...
0000000000000028: 00000000 00000000 68004900 fa000000 00000000 †........h.I.ú.......
000000000000003C: fa000400 02010000 02010e00 000c290f ddbb1e01 †ú.............).Ý»..
0000000000000050: 7a001e01 00000000 00000000 0000†††††††††††††††z.............
CPhysicalConnection @0x00000004881EA270
---------------------------------------
m_pPhyConn->m_pmo = 0x00000004881EA080
m_pPhyConn->m_pNetConn = 0x00000004881EAAD0
m_pPhyConn->m_pConnList = 0x00000004881EA380
m_pPhyConn->m_pSess = 0x00000004881EA3B0 m_pPhyConn->m_fTracked = -1
m_pPhyConn->m_cbPacketsize = 4096 m_pPhyConn->m_fMars = 0 m_pPhyConn->m_fKill = 0
CBatch @0x00000004881EAFA0
--------------------------
m_pSess = 0x00000004881EA3B0 m_pConn = 0x00000004881EAEA0 m_cRef = 3
m_rgcRefType[0] = 1 m_rgcRefType[1] = 1 m_rgcRefType[2] = 1
m_rgcRefType[3] = 0 m_rgcRefType[4] = 0 m_pTask = 0x0000000004C68748
EXCEPT (null) @0x000000004D5A9DD8
---------------------------------
exc_number = 0 exc_severity = 0 exc_func = 0x000000000329F6E4
Task @0x0000000004C68748
------------------------
CPU Ticks used (ms) = 474 Task State = 2
WAITINFO_INTERNAL: WaitResource = 0x0000000000000000 WAITINFO_INTERNAL: WaitType = 0x0
WAITINFO_INTERNAL: WaitSpinlock = 0x0000000000000000 SchedulerId = 0x4
ThreadId = 0x1140 m_state = 0 m_eAbortSev = 0
EC @0x00000004881EBEC0
----------------------
spid = 0 ecid = 0 ec_stat = 0x0
ec_stat2 = 0x0 ec_atomic = 0x0 __fSubProc = 1
__pSETLS = 0x00000004881EAF10 __pSEParams = 0x00000004881EB350
SEInternalTLS @0x00000004881EAF10
---------------------------------
m_flags = 0 m_TLSstatus = 3 m_owningTask = 0x0000000004C68748
m_activeHeapDatasetList = 0x00000004881EAF10
m_activeIndexDatasetList = 0x00000004881EAF20 m_pDbccContext = 0x0000000000000000
SEParams @0x00000004881EB350
----------------------------
m_lockTimeout = -1 m_isoLevel = 4096 m_logDontReplicate = 0
m_neverReplicate = 0 m_XactWorkspace = 0x00000003903DC080
m_pSessionLocks = 0x00000003B44A0A70 m_pDbLocks = 0x00000004881EB870
m_execStats = 0x00000000C8C52D30 m_pAllocFileLimit = 0x0000000000000000
---
Проходя мимо разложенных граблей, ты теряешь драгоценный опыт. (с)