SAP Knowledge Base Article - Preview

2635388 - Signal 11 in alloc_dirtychains() when selecting from syslogsdetail - SAP ASE

Symptom

  •  A process is infected with signal 11 in the module alloc_dirtychains() followed by a stacktrace:

Current process (0x290015) infected with signal 11 (SIGSEGV)
Current Process is running on Engine 0
Address 0x0x0000000001edd2d9 (alloc_dirtychains+0x29), siginfo (code, address) = (1, 0x0x000000000000453c)

  • The stacktrace contains functions:

alloc_dirtychains
CgLavaUtils::CgCompFakeTable
CgGenLava::CGConsScanOp
CgpTabScan::_cgpCodeGen

or

alloc_dirtychains
LeWkTbl::CreateNewDES
CgGenLava::CGConsStoreOp
CgpStoreInd::_cgpCodeGen
CgpPop::cgpCodeGen

   Note: The complete stacktrace is available under Attachments.

  • ASE was booted with the traceflag 3608 (boot recovering only the master database).


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0 SP02 and higher

Product

SAP Adaptive Server Enterprise 16.0

Keywords

Sybase, ASEServer, SAPASE, dataserver, syslogsdetail, fake, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stack, registers, CR814705, CR#814705, 814705 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.