SAP Knowledge Base Article - Preview

3235908 - Signal 11 in dseg_proc_alloc () - SAP ASE

Symptom

  • A query hit an "infected with signal 11" error in the module dseg_proc_alloc() with a stack trace.

    Current process (0x1335301c) infected with signal 11 (SIGSEGV)
    Address 0x0x0000000001792468 (dseg_proc_alloc+0x48), siginfo (code, address) = (1, 0x0x00000000ffffffdd)

  • sp_who shows the status as "infected" for the terminated process (spid):

    fid  spid   status  loginame origname hostname   blk_spid   dbname   temp        cmd   block_xloid    threadpool
    --- ----- --------  -------- -------- --------   --------   ------   ------   -------  -----------  ------------
      0 17293 infected    user1     user1 hostname          0      dev   tempdb   EXECUTE            0     pool_name
  • The stack trace includes the following functions:

    dseg_proc_alloc
    s_execute
    sequencer
    execproc
    s_execute
     
  • The affected spid became a zombie process:

    Task 322252828 is made zombie because it cannot be cleaned up during its termination. This task may have resources allocated to it.


Read more...

Environment

SAP Adaptive Server Enterprise  (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR827011, CR#827011, 827011, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers  , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Known Error

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.