SAP Knowledge Base Article - Preview

2661566 - Signal 11 in ubffreef() holding spinlock Resource->rgmemfrag - SAP ASE

Symptom

  • ASE errorlog reports a signal 11 in the module ubffreef() followed by a stack trace, for example:

Current process (0x5f03001f) infected with signal 11 (SIGSEGV)
Address 0x0x000000000214c489 (ubffreef+0x3d9), siginfo (code, address) = (1, 0x0xfffffffffffffff8)

  • The stack trace may include the following functions:

ubffreef
js__chores
jobscheduler

or
 
ubffreef
ufclose
DIRRemoteAccess::getNext
LeScanOp::_LeOpNext

   Note: A more complete stack traces are available under Attachments.

  • The terminated process (spid) is holding spinlock Resource->mfrag, so the ASE server crashes:

Spinlocks held by kpid 1594032159
Spinlock Resource->rgmemfrag at address 0x00002aaaab6c8d80 owned by 1594032159


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

815599, CR#815599, CR815599, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.