SAP Knowledge Base Article - Preview

2291967 - After decrypting a database DBCC CHECKDB raises page, index, and column length errors - SAP ASE 16.0

Symptom

  • A database with full database encryption was altered to decrypt the database, e.g. "alter database testdb decrypt with key testkey".
     
  • DBCC is run immediately after the decryption completes (no other activity in the database) and finds these errors:

DBCC checkdb(testdb)

Error (2507) Table Corrupt: Offset table is incorrect (page number 295018, partition ID 818150979; row number 202; offset in the offset table is 45; the correct offset is 14).
Error (2509) Table Corrupt: The row number and offset of each row in the page should have a matching entry in the row number table. Checkpage number 295018, partition ID 818150979 (row number 202, offset in row number table is 0).
Error (2596) Page Page pointer = 0x00000014D553A000, pageno = 295018, status = 0x411, ptnid = 818150979, indexid = 0, level = 0, pnextrno =255, partition ID 818150979, has an incorrect 'pgfreeoff' value of 1798. The offset should be 14410.
Error (2511) Keys of index ID 1 for table 'worktab' in data page are not in the correct order. Drop and re-create the index (index page 932010, partition ID 818150979).
Error (7930) Table Corrupt: Keys in the left child page do not precede the parent key; check page 295018, partition ID 818150979.
Error (2510) Key mismatch between index page 292721, partition ID 818150979; at offset 2012; and data page 295018 (row ID 22), partition ID 818150979. Drop and re-create index ID 2 of table 'worktab' in database 'testdb'.

  • DBCC may also fails with a stack trace:

server  Invalid column length: 68. Value must be between 0 and 4 at offset -3 for 'all-pages' row with minimum row length of 17.
kernel  pc: 0x0000000000E76D45 os_get_cur_stk_desc+ 0xc5 (0x0000000000000002, 0x0000000000000002, 0x0000000000000000, 0x00000000061AB470)
kernel  pc: 0x0000000000EFC1F7 pcstkwalk+ 0x2f7 (0x0000000000630032, 0x00000000061A9AE0, 0x000000000000270F, 0x000000000034A0FB)
kernel  pc: 0x00000000016A6BF9 ucstkgentrace+ 0x229 (0x00000000061AC378, 0x000000002192B460, 0x0000000000000001, 0x0000000000630032)
kernel  pc: 0x00000000016A6D60 ucbacktrace+ 0xb0 (0x0000000000000001, 0x0000000000000004, 0x0000000000000044, 0x0000000000000004)
kernel  pc: 0x0000000000C2398F collocate+ 0x71658f (0x0000000000000001, 0x00000000061AD50F, 0x00000000061AC378, 0x0000010000000000)
kernel  pc: 0x000000000050FDF1 keycomp+ 0x121 (0x00000000061AC370, 0x00000000061AC160, 0x00000000061AD508, 0x0000000000000001)
kernel  pc: 0x000000000052AACF leafdatacheck+ 0x78f (0x0000000023A628B0, 0x00000000061AC838, 0x00000000061AC838, 0x0000000023A628B0)
kernel  pc: 0x00000000006B4584 index_check+ 0x1d4 (0x0000000000039599, 0x00000000061AD4C0, 0x0000000023A728A0, 0x0000000000000000)
kernel  pc: 0x00000000006B44BD index_check+ 0x10d (0x0000000000039598, 0x00000000061AD4C0, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x00000000006B4108 check__index+ 0x5a8 (0x0000000000000000, 0x00000000061AD364, 0x00000000061AD3D0, 0x0000000000000000)
kernel  pc: 0x0000000000702491 check_indexes+ 0x1d1 (0x0000000000455067, 0x0000000000001EF9, 0x000000000000000A, 0x0000000000000001)
kernel  pc: 0x00000000006CD0AE checktable+ 0x8be (0x0000000000000002, 0x0000000000000000, 0x0000000000000000, 0x0000000000000001)
kernel  pc: 0x00000000014A9039 checkdb+ 0x439 (0x0000000028545B20, 0x00000000061AE3B0, 0x0000000028545B20, 0x00000000061AE450)
kernel  pc: 0x0000000000B8BF4A exec_dbcc+ 0x54b0ea (0x000000000000013D, 0x000000000000013D, 0x0000000028545B28, 0x0000000000000001)
kernel  pc: 0x0000000000504D7D s_execute+ 0x32dd (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000023A628B0)
kernel  pc: 0x000000000054212C sequencer+ 0x4cc (0x000000D1C74EB40D, 0x0000000023A628B0, 0x0000000000000000, 0x000000000000C000)
kernel  pc: 0x00000000005B9674 tdsrecv_language+ 0x1f4 (0x0000000000000000, 0x0000000023A628B0, 0x00000000061AF730, 0x0000000000000000)
kernel  pc: 0x00000000004D0194 conn_hdlr+ 0xc14 (0x000000002192B460, 0x000000002192B460, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000041639F kpntwrapper+ 0x4f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x0000000076E1866D CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  end of stack trace, spid 35, kpid 6488114, suid 1

  • Errors are returned when dropping the database:

server  Error: 806, Severity: 21, State: 1
server  Could not find virtual page for logical page 1714391661 in database 'testdb'.
kernel  ************************************
kernel  SQL causing error : drop database testdb
kernel  ************************************
server  SQL Text: drop database testdb
kernel  curdb = 6 tempdb = 2 pstat = 0x10000 p2stat = 0x101000
kernel  p3stat = 0x800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x10 p7stat = 0x10000
kernel  lasterror = 806 preverror = 0 transtate = 0
kernel  curcmd = 297 program = isql                         
kernel  extended error information: hostname: uat  login: sa
kernel  pc: 0x0000000000E76D45 os_get_cur_stk_desc+ 0xc5 (0x0000000000000002, 0x0000000000000002, 0x0000000000000000, 0x00000000060AB740)
kernel  pc: 0x0000000000EFC1F7 pcstkwalk+ 0x2f7 (0x00000000005D002F, 0x00000000060A9DB0, 0x000000000000270F, 0x00000000060A9898)
kernel  pc: 0x00000000016A6BF9 ucstkgentrace+ 0x229 (0x00000000FFFFFFFF, 0x000000002192A410, 0x0000000000000001, 0x00000000005D002F)
kernel  pc: 0x00000000016A6D60 ucbacktrace+ 0xb0 (0x00000000239FA9C0, 0x00000000239FA9C0, 0x000000000000000A, 0x0000000000000000)
kernel  pc: 0x0000000000C5A902 terminate_process+ 0x841a32 (0x0000000000000015, 0x00000000060AC870, 0x0000000000000015, 0x00000000239FA9C0)
kernel  pc: 0x00000000015F5395 hdl_default+ 0x35 (0x0000000000000015, 0x00000000060AC870, 0x0000000000000015, 0x0000000000000010)
kernel  pc: 0x0000000000C39CAE s_handle+ 0x58c13e (0x0000000023A094C0, 0x0000000000000015, 0x0000000023A17F70, 0x00000000239FA9C0)
kernel  pc: 0x00000000006D2EF5 exc__raise+ 0x315 (0x00000000239FA9C0, 0x0000000021BD3F80, 0x0000000000000008, 0x0000000100000006)
kernel  pc: 0x00000000006D30AC exc_raise+ 0x11c (0x0000000002DDF045, 0x0000000000000008, 0x0000000000000006, 0x0000000000000015)
kernel  pc: 0x0000000000A6F06A log_to_virt+ 0x58e7da (0x0000000000000000, 0x00000000004F6C6F, 0x0000000000000006, 0x00000000060ACB88)
kernel  pc: 0x00000000004E0D0D virtmap+ 0x12d (0x00000000239FC4C0, 0x00000000060A0006, 0x00000000662F8A6D, 0x00000000060ACC54)
kernel  pc: 0x00000000004E4184 bufgrab+ 0x3a4 (0x00000000239FC4C0, 0x00000000239FA9C0, 0x0000000023081400, 0x0000000000000001)
kernel  pc: 0x000000000052C079 getpage_nowait+ 0x219 (0x00000000239FC4C0, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x0000000000709BF2 dol__prefetch_forwrows+ 0xf2 (0x000000007C8414E0, 0x00000000060ACF50, 0x0000000000000000, 0x00000000239FC4C0)
kernel  pc: 0x00000000004F151E dol_qualrow+ 0x80e (0x00000000239FC4C0, 0x0000000000000000, 0x00000000FFFFFFFF, 0x00000000239FC4C0)
kernel  pc: 0x00000000005854DA dol_oamscan_getnext+ 0x20a (0x00000000239FC4C0, 0x00000000239F2000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x00000000004FB96E getnext+ 0x20e (0x0000000000000002, 0x00000000239FC4C0, 0x0000000000000000, 0x0000000000000001)
kernel  pc: 0x0000000001388344 omni_drop_database+ 0x124 (0x0000000000000006, 0x0000000000000006, 0x0000000000000007, 0x0000000000000000)
kernel  pc: 0x000000000138FB3F dso_drop_database+ 0x1f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000148C057 dropd+ 0x1887 (0x0000000028550620, 0x0000000000000007, 0x0000000028550450, 0x0000000000000000)
kernel  pc: 0x000000000148CCD9 dropdb+ 0xa9 (0x0000000000000001, 0x0000000000000129, 0x0000000000000129, 0x0000000000000000)
kernel  pc: 0x0000000000BB44F9 s_execute+ 0x6b2a59 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x00000000239FA9C0)
kernel  pc: 0x000000000054212C sequencer+ 0x4cc (0x000000D69A4F3F4F, 0x00000000239FA9C0, 0x0000000000000000, 0x000000000000C000)
kernel  pc: 0x00000000005B9674 tdsrecv_language+ 0x1f4 (0x0000000000000000, 0x00000000239FA9C0, 0x00000000060AF730, 0x0000000000000000)
kernel  pc: 0x00000000004D0194 conn_hdlr+ 0xc14 (0x000000002192A410, 0x000000002192A410, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000041639F kpntwrapper+ 0x4f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x0000000076E1866D CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  end of stack trace, spid 32, kpid 6094895, suid 1

  • Errors are raised during an attempt to recover from a database backup:

server  Error: 614, Severity: 21, State: 7
server  Adaptive Server accessed a row that has an illegal length of 63800 while in data base 'testdb'. Page pointer = 0x0000000029F72000, pageno = 134813, status = 0xc11, ptnid = 5, indexid = 0, level = 0, pnextrno = 8. The minimum row length is 20. The page size is 8192.
kernel  ************************************
kernel  SQL causing error : load database testdb from 'd:\testdb.dmp'
kernel  ************************************
server  SQL Text: load database workdb from 'd:\testdb.dmp'
kernel  curdb = 10 tempdb = 2 pstat = 0x1010000 p2stat = 0x101000
kernel  p3stat = 0x80800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x8000010 p7stat = 0x10000
kernel  lasterror = 614 preverror = 102 transtate = 0
kernel  curcmd = 316 program = isql                         
kernel  extended error information: hostname: uat login: sa
kernel  pc: 0x0000000000E76D45 os_get_cur_stk_desc+ 0xc5 (0x0000000000000002, 0x0000000000000002, 0x0000000000000000, 0x0000000004A4A920)
kernel  pc: 0x0000000000EFC1F7 pcstkwalk+ 0x2f7 (0x00000000032F003E, 0x0000000004A48F90, 0x000000000000270F, 0x0000000004A48A78)
kernel  pc: 0x00000000016A6BF9 ucstkgentrace+ 0x229 (0x00000000FFFFFFFF, 0x0000000021ABE5A0, 0x0000000000000001, 0x00000000032F003E)
kernel  pc: 0x00000000016A6D60 ucbacktrace+ 0xb0 (0x0000000023986CC0, 0x0000000023986CC0, 0x000000000000000A, 0x0000000000000000)
kernel  pc: 0x0000000000C5A902 terminate_process+ 0x841a32 (0x0000000000000015, 0x0000000000000007, 0x0000000000000015, 0x000000000000000E)
kernel  pc: 0x00000000015F5395 hdl_default+ 0x35 (0x0000000000000015, 0x0000000000000007, 0x0000000000000266, 0x00000000000FA2AF)
kernel  pc: 0x0000000000C364DA ut_handle+ 0x55264a (0x0000000023995798, 0x0000000000000015, 0x00000000239A43A0, 0x0000000000000000)
kernel  pc: 0x00000000006D2EF5 exc__raise+ 0x315 (0x0000000023986CC0, 0x0000000000000000, 0x0000000000000006, 0x000000000000000E)
kernel  pc: 0x00000000006D30AC exc_raise+ 0x11c (0x00000000000FA2AF, 0x0000000000000006, 0x000000000000000E, 0x0000000000000015)
kernel  pc: 0x00000000009723FD rowsize+ 0x49d5ed (0x0000000023987900, 0x0000000023211240, 0x000000002A02DAA0, 0x0000000004A4BBE9)
kernel  pc: 0x00000000004C68DC subst_rcopy+ 0x7c (0x0000000023987900, 0x0000000023986CC0, 0x0000000023987900, 0x0000000000000002)
kernel  pc: 0x00000000004FBAA7 getnext+ 0x347 (0x0000000000000002, 0x0000000000000000, 0x0000000000000000, 0x0000000000000001)
kernel  pc: 0x00000000006D2075 crdb_procmark+ 0x185 (0x00000000FFFF8000, 0x0000000000000C41, 0x00000000FFFF8000, 0x0000000000000001)
kernel  pc: 0x00000000014F2D4D lddb_main+ 0x109d (0x000000000000013C, 0x000000000000013C, 0x0000000027CB9328, 0x0000000027CB9320)
kernel  pc: 0x0000000000BB464C s_execute+ 0x6b2bac (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000023986CC0)
kernel  pc: 0x000000000054212C sequencer+ 0x4cc (0x000000439232F2BB, 0x0000000023986CC0, 0x0000000000000000, 0x000000000000C000)
kernel  pc: 0x00000000005B9674 tdsrecv_language+ 0x1f4 (0x0000000000000000, 0x0000000023986CC0, 0x0000000004A4F730, 0x0000000000000000)
kernel  pc: 0x00000000004D0194 conn_hdlr+ 0xc14 (0x0000000021ABE5A0, 0x0000000021ABE5A0, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000041639F kpntwrapper+ 0x4f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000007725866D CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  end of stack trace, spid 16, kpid 53411902, suid 1


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0 SP02 PL01-PL04

Product

SAP Adaptive Server Enterprise 16.0

Keywords

decryption stacktrace corruption CR796745 CR#796745 796745 large buffer pool , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.