ASE errorlog reports a signal 11 in the module ubffreef() followed by a stack trace, for example:
Current process (0x5f03001f) infected with signal 11 (SIGSEGV)
Address 0x0x000000000214c489 (ubffreef+0x3d9), siginfo (code, address) = (1, 0x0xfffffffffffffff8)
- The stack trace may include the following functions:
Note: A more complete stack traces are available under Attachments.
The terminated process (spid) is holding spinlock Resource->mfrag, so the ASE server crashes:
Spinlocks held by kpid 1594032159
Spinlock Resource->rgmemfrag at address 0x00002aaaab6c8d80 owned by 1594032159
SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
815599, CR#815599, CR815599, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.