ASE errorlog reports a signal 11 in the module ubffreef() followed by a stack trace, for example:
Current process (0x5f03001f) infected with signal 11 (SIGSEGV)
Address 0x0x000000000214c489 (ubffreef+0x3d9), siginfo (code, address) = (1, 0x0xfffffffffffffff8)
- The stack trace may include the following functions:
Note: A more complete stack traces are available under Attachments.
The terminated process (spid) is holding spinlock Resource->mfrag, so the ASE server crashes:
Spinlocks held by kpid 1594032159
Spinlock Resource->rgmemfrag at address 0x00002aaaab6c8d80 owned by 1594032159
SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
815599, CR#815599, CR815599, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.