SQL Server Service Terminated Unexpectedly

  • I have a production server that had the SQL Server service terminate unexpectedly last night. I have had no luck identifying the cause and am in need of assistance or ideas on either how to prevent in the future or to determine the cause. I have included the log file text.

    My Server & SQL Server info is:

    Microsoft SQL Server 2008 (SP1) - 10.0.2531.0 (X64) Mar 29 2009

    10:11:52 Copyright (c) 1988-2008 Microsoft Corporation Standard

    Edition (64-bit) on Windows NT 6.0 <X64> (Build 6002: Service Pack 2)

    SQLDumper_ErrorLog.log

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Input parameters: 4 supplied

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE,

    Parameter 1: 1948

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE,

    Parameter 2: 0

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE,

    Parameter 3: 0:0

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE,

    Parameter 4: 0000000003CA0508

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Parsed parameters:

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, ProcessID = 1948

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, ThreadId = 0

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Flags = 0x0

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, MiniDumpFlags = 0x0

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, SqlInfoPtr = 0x0000000003CA0508

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, DumpDir = <NULL>

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, ExceptionRecordPtr = 0x0000000000000000

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, ContextPtr = 0x0000000000000000

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, ExtraFile = <NULL>

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, InstanceName = <NULL>

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, ServiceName = <NULL>

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Dump is associated with file C:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\LOG\SQLDump0002.txt

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Callback type 11 not used

    (1514:1AE4) 02/11/16 05:33:46, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Callback type 15 not used

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Callback type 7 not used

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, MiniDump completed: C:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\LOG\SQLDump0002.mdmp

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Location of module 'dbghelp.dll' : 'C:\Program Files\Microsoft SQL Server\100\Shared\dbghelp.dll'

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, File version of module 'C:\Program Files\Microsoft SQL Server\100\Shared\dbghelp.dll' : '6.8:4.0'

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Product version of module 'C:\Program Files\Microsoft SQL Server\100\Shared\dbghelp.dll' : '6.8:4.0'

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Location of module 'sqldumper.exe' : 'C:\Program Files\Microsoft SQL Server\100\Shared\SQLDUMPER.EXE'

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, File version of module 'C:\Program Files\Microsoft SQL Server\100\Shared\SQLDUMPER.EXE' : '2007.100:1600.22'

    (1514:1AE4) 02/11/16 05:33:47, ACTION, SQLDUMPER_UNKNOWN_APP.EXE, Product version of module 'C:\Program Files\Microsoft SQL Server\100\Shared\SQLDUMPER.EXE' : '10.0:1600.22'

    (1514:1AE4) 02/11/16 05:33:47, ACTION, sqlservr.exe, Watson Invoke: No

    SQLDump.txt

    Current time is 05:33:46 02/11/16.

    =====================================================================

    BugCheck Dump

    =====================================================================

    This file is generated by Microsoft SQL Server

    version 10.0.2531.0

    upon detection of fatal unexpected error. Please return this file,

    the query or program that produced the bugcheck, the database and

    the error log, and any other pertinent information with a Service Request.

    Computer type is Intel(R) Xeon(R) CPU E5-2670 v2 @ 2.50GHz.

    Bios Version is Xen - 0

    Revision: 1.221

    32 X64 level 8664, 62 Mhz processor (s).

    Windows NT 6.0 Build 6002 CSD Service Pack 2.

    Memory

    MemoryLoad = 48%

    Total Physical = 249998 MB

    Available Physical = 128827 MB

    Total Page File = 251913 MB

    Available Page File = 129956 MB

    Total Virtual = 8388607 MB

    Available Virtual = 8124365 MB

    **Dump thread - spid = 0, EC = 0x0000000000000000

    ***Stack Dump being sent to C:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\LOG\SQLDump0002.txt

    * *******************************************************************************

    *

    * BEGIN STACK DUMP:

    * 02/11/16 05:33:46 spid 4104

    *

    * ex_terminator - Last chance exception handling

    *

    *

    * MODULE BASE END SIZE

    * sqlservr 0000000000AB0000 00000000042C3FFF 03814000

    * ntdll 0000000077490000 0000000077615FFF 00186000

    * kernel32 0000000077360000 000000007748CFFF 0012d000

    * MSVCR80 00000000753F0000 00000000754B8FFF 000c9000

    * msvcrt 000007FEFE290000 000007FEFE32BFFF 0009c000

    * MSVCP80 0000000074BC0000 0000000074CC8FFF 00109000

    * ADVAPI32 000007FEFF690000 000007FEFF797FFF 00108000

    * RPCRT4 000007FEFE7B0000 000007FEFE8F2FFF 00143000

    * sqlos 0000000075120000 0000000075126FFF 00007000

    * Secur32 000007FEFD820000 000007FEFD83BFFF 0001c000

    * pdh 000007FEF6BB0000 000007FEF6BFFFFF 00050000

    * SHLWAPI 000007FEFE210000 000007FEFE282FFF 00073000

    * GDI32 000007FEFDC60000 000007FEFDCC3FFF 00064000

    * USER32 0000000077290000 000000007735CFFF 000cd000

    * USERENV 000007FEFD840000 000007FEFD865FFF 00026000

    * WINMM 000007FEFB820000 000007FEFB858FFF 00039000

    * ole32 000007FEFE570000 000007FEFE747FFF 001d8000

    * OLEAUT32 000007FEFDA30000 000007FEFDB02FFF 000d3000

    * OLEACC 0000000075580000 00000000755D1FFF 00052000

    * opends60 0000000074F00000 0000000074F07FFF 00008000

    * NETAPI32 000007FEFD330000 000007FEFD3D2FFF 000a3000

    * PSAPI 0000000077630000 0000000077638FFF 00009000

    * BatchParser 0000000074ED0000 0000000074EFBFFF 0002c000

    * IMM32 000007FEFDB10000 000007FEFDB3CFFF 0002d000

    * MSCTF 000007FEFDCD0000 000007FEFDDD1FFF 00102000

    * LPK 000007FEFF7A0000 000007FEFF7ACFFF 0000d000

    * USP10 000007FEFE330000 000007FEFE3C9FFF 0009a000

    * comctl32 000007FEFC090000 000007FEFC288FFF 001f9000

    * instapi10 0000000074EC0000 0000000074ECCFFF 0000d000

    * cscapi 000007FEFAFA0000 000007FEFAFACFFF 0000d000

    * sqlevn70 00000000746E0000 00000000748DCFFF 001fd000

    * rsaenh 000007FEFCA50000 000007FEFCA97FFF 00048000

    * AUTHZ 000007FEFD7B0000 000007FEFD7D5FFF 00026000

    * MSCOREE 000007FEFB710000 000007FEFB77EFFF 0006f000

    * CRYPT32 000007FEFD0B0000 000007FEFD1E6FFF 00137000

    * MSASN1 000007FEFD280000 000007FEFD298FFF 00019000

    * credssp 000007FEFCFA0000 000007FEFCFA8FFF 00009000

    * schannel 000007FEFCCC0000 000007FEFCD17FFF 00058000

    * msv1_0 000007FEFCD70000 000007FEFCDB4FFF 00045000

    * cryptdll 000007FEFD6D0000 000007FEFD6E3FFF 00014000

    * WS2_32 000007FEFD9E0000 000007FEFDA23FFF 00044000

    * NSI 000007FEFD9D0000 000007FEFD9D6FFF 00007000

    * kerberos 000007FEFCDC0000 000007FEFCE65FFF 000a6000

    * security 0000000074530000 0000000074533FFF 00004000

    * SHELL32 000007FEFE990000 000007FEFF5E2FFF 00c53000

    * ftimport 0000000060000000 0000000060024FFF 00025000

    * MSFTE 000000004EFE0000 000000004F38DFFF 003ae000

    * VERSION 000007FEFCC50000 000007FEFCC5AFFF 0000b000

    * dbghelp 0000000074370000 00000000744CDFFF 0015e000

    * WINTRUST 000007FEFB860000 000007FEFB898FFF 00039000

    * imagehlp 000007FEFE550000 000007FEFE566FFF 00017000

    * NTMARTA 000007FEFC9E0000 000007FEFCA0BFFF 0002c000

    * WLDAP32 000007FEFE750000 000007FEFE7A4FFF 00055000

    * SAMLIB 000007FEFD2A0000 000007FEFD2BBFFF 0001c000

    * ncrypt 000007FEFCF00000 000007FEFCF41FFF 00042000

    * dssenh 000007FEF68B0000 000007FEF68E3FFF 00034000

    * mswsock 000007FEFCD20000 000007FEFCD6EFFF 0004f000

    * wship6 000007FEFCEE0000 000007FEFCEE6FFF 00007000

    * wshtcpip 000007FEFC9A0000 000007FEFC9A6FFF 00007000

    * ntdsapi 000007FEFD250000 000007FEFD275FFF 00026000

    * DNSAPI 000007FEFD2D0000 000007FEFD309FFF 0003a000

    * bcrypt 000007FEFCE70000 000007FEFCEBFFFF 00050000

    * CLBCatQ 000007FEFF5F0000 000007FEFF688FFF 00099000

    * sqlncli10 0000000074030000 0000000074336FFF 00307000

    * COMCTL32 000007FEFB940000 000007FEFB9DFFFF 000a0000

    * COMDLG32 000007FEFE900000 000007FEFE98BFFF 0008c000

    * SQLNCLIR10 0000000073DE0000 0000000073E16FFF 00037000

    * xpsqlbot 0000000074000000 0000000074007FFF 00008000

    * xpstar 0000000073CC0000 0000000073D47FFF 00088000

    * SQLSCM 0000000074020000 000000007402BFFF 0000c000

    * ODBC32 000007FEF5490000 000007FEF5501FFF 00072000

    * ATL80 0000000073EA0000 0000000073EBEFFF 0001f000

    * odbcint 0000000073F90000 0000000073FC7FFF 00038000

    * xpstar 0000000073DB0000 0000000073DD4FFF 00025000

    * xplog70 0000000073E80000 0000000073E8FFFF 00010000

    * xplog70 0000000073E50000 0000000073E51FFF 00002000

    * mscorwks 000007FEFA030000 000007FEFA9DFFFF 009b0000

    * mscorlib.ni 000007FEF8270000 000007FEF9149FFF 00eda000

    * mscorsec 00000642FFAF0000 00000642FFB08FFF 00019000

    * GPAPI 000007FEFCC60000 000007FEFCC77FFF 00018000

    * slc 000007FEFD080000 000007FEFD0A8FFF 00029000

    * cryptnet 000007FEF5650000 000007FEF5673FFF 00024000

    * SensApi 000007FEF66E0000 000007FEF66E6FFF 00007000

    * Cabinet 000007FEF6990000 000007FEF69A9FFF 0001a000

    * SqlAccess 00000000754F0000 0000000075556FFF 00067000

    * mscorjit 000007FEF9A80000 000007FEF9C03FFF 00184000

    * System.Data 0000000076980000 0000000076C69FFF 002ea000

    * System.ni 000007FEF7850000 000007FEF826DFFF 00a1e000

    * System.Transactions 000000004BD40000 000000004BD88FFF 00049000

    * System.Security.ni 000007FEEE590000 000007FEEE675FFF 000e6000

    * System 0000000077950000 0000000077C5BFFF 0030c000

    * System.Security 0000000074CE0000 0000000074D21FFF 00042000

    * System.Xml 0000000074F10000 0000000075107FFF 001f8000

    * System.Core 00000000737A0000 0000000073845FFF 000a6000

    * NLAapi 000007FEFC7A0000 000007FEFC7B2FFF 00013000

    * IPHLPAPI 000007FEFCFE0000 000007FEFD002FFF 00023000

    * dhcpcsvc 000007FEFCF50000 000007FEFCF94FFF 00045000

    * WINNSI 000007FEFD200000 000007FEFD209FFF 0000a000

    * dhcpcsvc6 000007FEFCFB0000 000007FEFCFDAFFF 0002b000

    * napinsp 000007FEF5E00000 000007FEF5E12FFF 00013000

    * winrnr 000007FEF6980000 000007FEF698AFFF 0000b000

    * rasadhlp 000007FEF6AA0000 000007FEF6AA7FFF 00008000

    * COMRES 0000000054400000 000000005453CFFF 0013d000

    * XOLEHLP 000007FEFAEE0000 000007FEFAEF1FFF 00012000

    * MSDTCPRX 000007FEF9420000 000007FEF94D7FFF 000b8000

    * MTXCLU 000007FEF95A0000 000007FEF95FCFFF 0005d000

    * CLUSAPI 000007FEF9E70000 000007FEF9EAEFFF 0003f000

    * ACTIVEDS 000007FEF91F0000 000007FEF9234FFF 00045000

    * adsldpc 000007FEF91B0000 000007FEF91EBFFF 0003c000

    * credui 000007FEF9170000 000007FEF91A5FFF 00036000

    * ATL 000007FEFC740000 000007FEFC758FFF 00019000

    * RESUTILS 000007FEFAFB0000 000007FEFAFC6FFF 00017000

    * ktmw32 000007FEFC880000 000007FEFC887FFF 00008000

    * dbghelp 0000000052CC0000 0000000052E1DFFF 0015e000

    *

    * P1Home: 0000004000A800A6:

    * P2Home: 00000040A7F016D8: 0050005C003A0043 00720067006F0072 00460020006D0061 00730065006C0069 00630069

    004D005C 006F0073006F0072

    * P3Home: 0000000000000000:

    * P4Home: 0000000000000000:

    * P5Home: 0000000000000000:

    * P6Home: 0000000000000000:

    * ContextFlags: 000000000010000F:

    * MxCsr: 0000000000001FA0:

    * SegCs: 0000000000000033:

    * SegDs: 000000000000002B:

    * SegEs: 000000000000002B:

    * SegFs: 0000000000000053:

    * SegGs: 000000000000002B:

    * SegSs: 000000000000002B:

    * EFlags: 0000000000000202:

    * Rax: 00000000773776C0: 83000000C8EC8148 FFFFEF058D4801E2 4DC93320244C89FF 893024448948C985 28244C89

    48242454 4C8900000BF9850F

    * Rcx: 00000000651CC100: 0000004000A800A6 00000040A7F016D8 0000000000000000 0000000000000000 00000000

    00000000 0000000000000000

    * Rdx: 0000000000000000:

    * Rbx: 0000000000000000:

    * Rsp: 00000000651CC5F0: 0000000000000000 0000000077490000 00000000651CBFE0 0000000000000080 00000000

    000042AC 0000000000000000

    * Rbp: 000000000344D828: 0000000819930522 000000030299D850 0000000D0299D8F8 000000780299D890 00000000

    00000000 00000000FFFFFFFF

    * Rsi: 00000000651CC8A0: 00000040A7F016D0 00000000651CC930 000000000000001D 000000000000000F 00000000

    00000001 00000000022100BE

    * Rdi: 0000000000000000:

    * R8: 0000000000000000:

    * R9: 0000000000000000:

    * R10: 0000000000000000:

    * R11: 00000000651CCDE0: 0000004000A800A6 00000040A7F016D8 0000000000000000 0000000000000000 00000000

    00000000 0000000000000000

    * R12: 000000000000002F:

    * R13: 0000000000000000:

    * R14: 0000000002399E10: 0074005F00780065 0069006D00720065 006F00740061006E 0020002D00200072 00740073

    0061004C 0061006800630020

    * R15: 0000000000000001:

    * Rip: 00000000773776FD: C3000000C8C48148 9090909090909090 4848EC8348909090 480000008024848B 7824448B

    38244489 24448B4830244489

    * *******************************************************************************

    * -------------------------------------------------------------------------------

    * Short Stack Dump

    00000000773776FD Module(kernel32+00000000000176FD)

    0000000002404C3D Module(sqlservr+0000000001954C3D)

    0000000002411DB6 Module(sqlservr+0000000001961DB6)

    0000000002412459 Module(sqlservr+0000000001962459)

    0000000002399D03 Module(sqlservr+00000000018E9D03)

    0000000002B7A27C Module(sqlservr+00000000020CA27C)

    000000007542ACF0 Module(MSVCR80+000000000003ACF0)

    0000000075429E0B Module(MSVCR80+0000000000039E0B)

    000000007542A62B Module(MSVCR80+000000000003A62B)

    000000007542A86B Module(MSVCR80+000000000003A86B)

    000000007542ABE7 Module(MSVCR80+000000000003ABE7)

    00000000774C563D Module(ntdll+000000000003563D)

    00000000774C9437 Module(ntdll+0000000000039437)

    00000000774D6B18 Module(ntdll+0000000000046B18)

    0000000000AB6609 Module(sqlservr+0000000000006609)

    0000000000AB5C09 Module(sqlservr+0000000000005C09)

    0000000000AC2A47 Module(sqlservr+0000000000012A47)

    0000000000D25205 Module(sqlservr+0000000000275205)

    000000000107DFA6 Module(sqlservr+00000000005CDFA6)

    0000000000F65118 Module(sqlservr+00000000004B5118)

    0000000000F6592C Module(sqlservr+00000000004B592C)

    0000000000F65888 Module(sqlservr+00000000004B5888)

    0000000000F657C8 Module(sqlservr+00000000004B57C8)

    0000000000AC163B Module(sqlservr+000000000001163B)

    0000000000AC12FA Module(sqlservr+00000000000112FA)

    0000000000AC0E35 Module(sqlservr+0000000000010E35)

    0000000001040E50 Module(sqlservr+0000000000590E50)

    00000000010409A0 Module(sqlservr+00000000005909A0)

    0000000001059AB0 Module(sqlservr+00000000005A9AB0)

    000000000104013F Module(sqlservr+000000000059013F)

    00000000753F37D7 Module(MSVCR80+00000000000037D7)

    00000000753F3894 Module(MSVCR80+0000000000003894)

    000000007737BE3D Module(kernel32+000000000001BE3D)

    00000000774B6611 Module(ntdll+0000000000026611)

Viewing 0 posts

You must be logged in to reply to this topic. Login to reply