Symptom
-
ASE errorlog reports a signal 11 in the module ubffreef() followed by a stack trace, for example:
Current process (0x5f03001f) infected with signal 11 (SIGSEGV)
Address 0x0x000000000214c489 (ubffreef+0x3d9), siginfo (code, address) = (1, 0x0xfffffffffffffff8)
- The stack trace may include the following functions:
ubffreef
js__chores
jobscheduler
or
ubffreef
ufclose
DIRRemoteAccess::getNext
LeScanOp::_LeOpNext
Note: A more complete stack traces are available under Attachments.
-
The terminated process (spid) is holding spinlock Resource->mfrag, so the ASE server crashes:
Spinlocks held by kpid 1594032159
Spinlock Resource->rgmemfrag at address 0x00002aaaab6c8d80 owned by 1594032159
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
Product
Keywords
815599, CR#815599, CR815599, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview