SAP Knowledge Base Article - Preview

2661566 - Signal 11 in ubffreef() holding spinlock Resource->rgmemfrag - SAP ASE

Symptom

  • ASE errorlog reports a signal 11 in the module ubffreef() followed by a stack trace, for example:

Current process (0x5f03001f) infected with signal 11 (SIGSEGV)
Address 0x0x000000000214c489 (ubffreef+0x3d9), siginfo (code, address) = (1, 0x0xfffffffffffffff8)

  • The stack trace may include the following functions:

ubffreef
js__chores
jobscheduler

or
 
ubffreef
ufclose
DIRRemoteAccess::getNext
LeScanOp::_LeOpNext

   Note: A more complete stack traces are available under Attachments.

  • The terminated process (spid) is holding spinlock Resource->mfrag, so the ASE server crashes:

Spinlocks held by kpid 1594032159
Spinlock Resource->rgmemfrag at address 0x00002aaaab6c8d80 owned by 1594032159


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

815599, CR#815599, CR815599, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.