(Republishing, or using this info in a commercial product/website, is prohibited without permission. All other uses are permitted. If in doubt, please ask.)
Description:
This wait type is when a thread is calling the Windows AuthzGetInformationFromContext function.
(Books Online description: N/A)
Questions/comments on this wait type? Click here to send Paul an email, especially if you have any information to add to this topic.
Added in SQL Server version:
2008
Removed in SQL Server version:
N/A
Extended Events wait_type value:
The map_key value in sys.dm_xe_map_values is 378 in 2008 and 2008 R2, 426 in 2012, and 442 in 2014 RTM. After 2014 RTM, you must check the DMV to get the latest value as some map_key values have changed in later builds.
Other information:
I have not seen this wait type be a noticeable contention point.
Note that when a thread calls out to Windows, the thread changes from non-preemptive (SQL Server controls the thread) to preemptive (Windows controls the thread) mode. The thread’s state will be listed as RUNNING, as SQL Server doesn’t know what Windows is doing with the thread.
Known occurrences in SQL Server (list number matches call stack list):
- Getting security information (in this case, while querying across a linked server)
- Getting security information (in this case, while checking Service Broker dialog security while receiving a message)
- Getting security information (in this case, while updating an In-Memory OLTP-compiled procedure)
And many more similar call stacks.
Abbreviated call stacks (list number matches known occurrences list):
- SOS_Task::PopWait+ba
AutoSwitchPreemptive::~AutoSwitchPreemptive+6e
CWindowsSecurityPrimaryInfo::GetNtGroupsViaAuthZ+354
CWindowsSecurityPrimaryInfo::Init+1f8
GetWindowsSecurityPrimaryInfo+e3
CRowsetNtUserOrGroupInstantiate::GetIUtRowsetInstance+134
CUtRowset::Init+36
CreateIRowset+69
COledbRangeUtRowset::GetRowset+250
CQScanRmtScanNew::OpenConnection+24d
CQScanRmtBaseNew::OpenHelper+4a
CQScanHash::ConsumeBuild+e2
CQScanHash::Iterate+5f
CQScanHash::Open+79 - SOS_Task::PopWait+bc
SOS_Task::AutoSwitchPreemptive::~AutoSwitchPreemptive+72
CWindowsSecurityPrimaryInfo::GetNtGroupsViaAuthZ+2a3
CWindowsSecurityPrimaryInfo::Init+186
GetWindowsSecurityPrimaryInfo+8e
CreateLoginToken+2c5
CreateLoginTokenForImpersonation+60d
CAutoExecuteAsContext::Set+c5
CSbSecurityMgr::AccessCheckExecuteAs+1dd
CSbSecurityMgr::AccessCheckServiceSEND+30
CDialogEndpoint::FCreateTarget+212
CDialogEndpoint::ReceiveMessageInternal+5e
CDialogEndpoint::ReceiveMessageList+7d4
CSsbClassifier::SendMessage+6c3
CDialogEndpoint::SendMessage+951
CDialogEndpoint::SendSequencedMsg+34d
CStmtSendMsg::XretSvcBrokerExecute+4d1
CXStmtBrokerDDL::XretExecute+137
CMsqlExecContext::ExecuteStmts<1,1>+352
CMsqlExecContext::FExecute+878
CSQLSource::Execute+7d3 - SOS_Task::PopWait+b1
SOS_ExternalAutoWait::~SOS_ExternalAutoWait+7c
CWindowsSecurityPrimaryInfo::GetNtGroupsViaAuthZ+68a
CWindowsSecurityPrimaryInfo::Init+2f5
GetWindowsSecurityPrimaryInfo+be
CreateLoginToken+263
CreateLoginTokenForImpersonation+a7a
CAutoExecuteAsContext::Set+df7
CSECExecAsRuntimeServices::_Set+47f
FHasPerms+4d
CreateHkProcedure+3f8
CStmtCreateSqlProc::UpdateObject+318
CStmtCreateSqlProc::XretDoExecute+369
CStmtCreateSql::XretExecute+5e
CMsqlExecContext::ExecuteStmts<1,1>+427
CMsqlExecContext::FExecute+a43
CSQLSource::Execute+86c