SAP Knowledge Base Article - Preview

2291967 - After decrypting a database DBCC CHECKDB raises page, index, and column length errors - SAP ASE 16.0

Symptom

  • A database with full database encryption was altered to decrypt the database, e.g. "alter database testdb decrypt with key testkey".
     
  • DBCC is run immediately after the decryption completes (no other activity in the database) and finds these errors:

DBCC checkdb(testdb)

Error (2507) Table Corrupt: Offset table is incorrect (page number 295018, partition ID 818150979; row number 202; offset in the offset table is 45; the correct offset is 14).
Error (2509) Table Corrupt: The row number and offset of each row in the page should have a matching entry in the row number table. Checkpage number 295018, partition ID 818150979 (row number 202, offset in row number table is 0).
Error (2596) Page Page pointer = 0x00000014D553A000, pageno = 295018, status = 0x411, ptnid = 818150979, indexid = 0, level = 0, pnextrno =255, partition ID 818150979, has an incorrect 'pgfreeoff' value of 1798. The offset should be 14410.
Error (2511) Keys of index ID 1 for table 'worktab' in data page are not in the correct order. Drop and re-create the index (index page 932010, partition ID 818150979).
Error (7930) Table Corrupt: Keys in the left child page do not precede the parent key; check page 295018, partition ID 818150979.
Error (2510) Key mismatch between index page 292721, partition ID 818150979; at offset 2012; and data page 295018 (row ID 22), partition ID 818150979. Drop and re-create index ID 2 of table 'worktab' in database 'testdb'.

  • DBCC may also fails with a stack trace:

server  Invalid column length: 68. Value must be between 0 and 4 at offset -3 for 'all-pages' row with minimum row length of 17.
kernel  pc: 0x0000000000E76D45 os_get_cur_stk_desc+ 0xc5 (0x0000000000000002, 0x0000000000000002, 0x0000000000000000, 0x00000000061AB470)
kernel  pc: 0x0000000000EFC1F7 pcstkwalk+ 0x2f7 (0x0000000000630032, 0x00000000061A9AE0, 0x000000000000270F, 0x000000000034A0FB)
kernel  pc: 0x00000000016A6BF9 ucstkgentrace+ 0x229 (0x00000000061AC378, 0x000000002192B460, 0x0000000000000001, 0x0000000000630032)
kernel  pc: 0x00000000016A6D60 ucbacktrace+ 0xb0 (0x0000000000000001, 0x0000000000000004, 0x0000000000000044, 0x0000000000000004)
kernel  pc: 0x0000000000C2398F collocate+ 0x71658f (0x0000000000000001, 0x00000000061AD50F, 0x00000000061AC378, 0x0000010000000000)
kernel  pc: 0x000000000050FDF1 keycomp+ 0x121 (0x00000000061AC370, 0x00000000061AC160, 0x00000000061AD508, 0x0000000000000001)
kernel  pc: 0x000000000052AACF leafdatacheck+ 0x78f (0x0000000023A628B0, 0x00000000061AC838, 0x00000000061AC838, 0x0000000023A628B0)
kernel  pc: 0x00000000006B4584 index_check+ 0x1d4 (0x0000000000039599, 0x00000000061AD4C0, 0x0000000023A728A0, 0x0000000000000000)
kernel  pc: 0x00000000006B44BD index_check+ 0x10d (0x0000000000039598, 0x00000000061AD4C0, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x00000000006B4108 check__index+ 0x5a8 (0x0000000000000000, 0x00000000061AD364, 0x00000000061AD3D0, 0x0000000000000000)
kernel  pc: 0x0000000000702491 check_indexes+ 0x1d1 (0x0000000000455067, 0x0000000000001EF9, 0x000000000000000A, 0x0000000000000001)
kernel  pc: 0x00000000006CD0AE checktable+ 0x8be (0x0000000000000002, 0x0000000000000000, 0x0000000000000000, 0x0000000000000001)
kernel  pc: 0x00000000014A9039 checkdb+ 0x439 (0x0000000028545B20, 0x00000000061AE3B0, 0x0000000028545B20, 0x00000000061AE450)
kernel  pc: 0x0000000000B8BF4A exec_dbcc+ 0x54b0ea (0x000000000000013D, 0x000000000000013D, 0x0000000028545B28, 0x0000000000000001)
kernel  pc: 0x0000000000504D7D s_execute+ 0x32dd (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000023A628B0)
kernel  pc: 0x000000000054212C sequencer+ 0x4cc (0x000000D1C74EB40D, 0x0000000023A628B0, 0x0000000000000000, 0x000000000000C000)
kernel  pc: 0x00000000005B9674 tdsrecv_language+ 0x1f4 (0x0000000000000000, 0x0000000023A628B0, 0x00000000061AF730, 0x0000000000000000)
kernel  pc: 0x00000000004D0194 conn_hdlr+ 0xc14 (0x000000002192B460, 0x000000002192B460, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000041639F kpntwrapper+ 0x4f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x0000000076E1866D CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  end of stack trace, spid 35, kpid 6488114, suid 1

  • Errors are returned when dropping the database:

server  Error: 806, Severity: 21, State: 1
server  Could not find virtual page for logical page 1714391661 in database 'testdb'.
kernel  ************************************
kernel  SQL causing error : drop database testdb
kernel  ************************************
server  SQL Text: drop database testdb
kernel  curdb = 6 tempdb = 2 pstat = 0x10000 p2stat = 0x101000
kernel  p3stat = 0x800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x10 p7stat = 0x10000
kernel  lasterror = 806 preverror = 0 transtate = 0
kernel  curcmd = 297 program = isql                         
kernel  extended error information: hostname: uat  login: sa
kernel  pc: 0x0000000000E76D45 os_get_cur_stk_desc+ 0xc5 (0x0000000000000002, 0x0000000000000002, 0x0000000000000000, 0x00000000060AB740)
kernel  pc: 0x0000000000EFC1F7 pcstkwalk+ 0x2f7 (0x00000000005D002F, 0x00000000060A9DB0, 0x000000000000270F, 0x00000000060A9898)
kernel  pc: 0x00000000016A6BF9 ucstkgentrace+ 0x229 (0x00000000FFFFFFFF, 0x000000002192A410, 0x0000000000000001, 0x00000000005D002F)
kernel  pc: 0x00000000016A6D60 ucbacktrace+ 0xb0 (0x00000000239FA9C0, 0x00000000239FA9C0, 0x000000000000000A, 0x0000000000000000)
kernel  pc: 0x0000000000C5A902 terminate_process+ 0x841a32 (0x0000000000000015, 0x00000000060AC870, 0x0000000000000015, 0x00000000239FA9C0)
kernel  pc: 0x00000000015F5395 hdl_default+ 0x35 (0x0000000000000015, 0x00000000060AC870, 0x0000000000000015, 0x0000000000000010)
kernel  pc: 0x0000000000C39CAE s_handle+ 0x58c13e (0x0000000023A094C0, 0x0000000000000015, 0x0000000023A17F70, 0x00000000239FA9C0)
kernel  pc: 0x00000000006D2EF5 exc__raise+ 0x315 (0x00000000239FA9C0, 0x0000000021BD3F80, 0x0000000000000008, 0x0000000100000006)
kernel  pc: 0x00000000006D30AC exc_raise+ 0x11c (0x0000000002DDF045, 0x0000000000000008, 0x0000000000000006, 0x0000000000000015)
kernel  pc: 0x0000000000A6F06A log_to_virt+ 0x58e7da (0x0000000000000000, 0x00000000004F6C6F, 0x0000000000000006, 0x00000000060ACB88)
kernel  pc: 0x00000000004E0D0D virtmap+ 0x12d (0x00000000239FC4C0, 0x00000000060A0006, 0x00000000662F8A6D, 0x00000000060ACC54)
kernel  pc: 0x00000000004E4184 bufgrab+ 0x3a4 (0x00000000239FC4C0, 0x00000000239FA9C0, 0x0000000023081400, 0x0000000000000001)
kernel  pc: 0x000000000052C079 getpage_nowait+ 0x219 (0x00000000239FC4C0, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x0000000000709BF2 dol__prefetch_forwrows+ 0xf2 (0x000000007C8414E0, 0x00000000060ACF50, 0x0000000000000000, 0x00000000239FC4C0)
kernel  pc: 0x00000000004F151E dol_qualrow+ 0x80e (0x00000000239FC4C0, 0x0000000000000000, 0x00000000FFFFFFFF, 0x00000000239FC4C0)
kernel  pc: 0x00000000005854DA dol_oamscan_getnext+ 0x20a (0x00000000239FC4C0, 0x00000000239F2000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x00000000004FB96E getnext+ 0x20e (0x0000000000000002, 0x00000000239FC4C0, 0x0000000000000000, 0x0000000000000001)
kernel  pc: 0x0000000001388344 omni_drop_database+ 0x124 (0x0000000000000006, 0x0000000000000006, 0x0000000000000007, 0x0000000000000000)
kernel  pc: 0x000000000138FB3F dso_drop_database+ 0x1f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000148C057 dropd+ 0x1887 (0x0000000028550620, 0x0000000000000007, 0x0000000028550450, 0x0000000000000000)
kernel  pc: 0x000000000148CCD9 dropdb+ 0xa9 (0x0000000000000001, 0x0000000000000129, 0x0000000000000129, 0x0000000000000000)
kernel  pc: 0x0000000000BB44F9 s_execute+ 0x6b2a59 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x00000000239FA9C0)
kernel  pc: 0x000000000054212C sequencer+ 0x4cc (0x000000D69A4F3F4F, 0x00000000239FA9C0, 0x0000000000000000, 0x000000000000C000)
kernel  pc: 0x00000000005B9674 tdsrecv_language+ 0x1f4 (0x0000000000000000, 0x00000000239FA9C0, 0x00000000060AF730, 0x0000000000000000)
kernel  pc: 0x00000000004D0194 conn_hdlr+ 0xc14 (0x000000002192A410, 0x000000002192A410, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000041639F kpntwrapper+ 0x4f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x0000000076E1866D CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  end of stack trace, spid 32, kpid 6094895, suid 1

  • Errors are raised during an attempt to recover from a database backup:

server  Error: 614, Severity: 21, State: 7
server  Adaptive Server accessed a row that has an illegal length of 63800 while in data base 'testdb'. Page pointer = 0x0000000029F72000, pageno = 134813, status = 0xc11, ptnid = 5, indexid = 0, level = 0, pnextrno = 8. The minimum row length is 20. The page size is 8192.
kernel  ************************************
kernel  SQL causing error : load database testdb from 'd:\testdb.dmp'
kernel  ************************************
server  SQL Text: load database workdb from 'd:\testdb.dmp'
kernel  curdb = 10 tempdb = 2 pstat = 0x1010000 p2stat = 0x101000
kernel  p3stat = 0x80800 p4stat = 0x0 p5stat = 0x8 p6stat = 0x8000010 p7stat = 0x10000
kernel  lasterror = 614 preverror = 102 transtate = 0
kernel  curcmd = 316 program = isql                         
kernel  extended error information: hostname: uat login: sa
kernel  pc: 0x0000000000E76D45 os_get_cur_stk_desc+ 0xc5 (0x0000000000000002, 0x0000000000000002, 0x0000000000000000, 0x0000000004A4A920)
kernel  pc: 0x0000000000EFC1F7 pcstkwalk+ 0x2f7 (0x00000000032F003E, 0x0000000004A48F90, 0x000000000000270F, 0x0000000004A48A78)
kernel  pc: 0x00000000016A6BF9 ucstkgentrace+ 0x229 (0x00000000FFFFFFFF, 0x0000000021ABE5A0, 0x0000000000000001, 0x00000000032F003E)
kernel  pc: 0x00000000016A6D60 ucbacktrace+ 0xb0 (0x0000000023986CC0, 0x0000000023986CC0, 0x000000000000000A, 0x0000000000000000)
kernel  pc: 0x0000000000C5A902 terminate_process+ 0x841a32 (0x0000000000000015, 0x0000000000000007, 0x0000000000000015, 0x000000000000000E)
kernel  pc: 0x00000000015F5395 hdl_default+ 0x35 (0x0000000000000015, 0x0000000000000007, 0x0000000000000266, 0x00000000000FA2AF)
kernel  pc: 0x0000000000C364DA ut_handle+ 0x55264a (0x0000000023995798, 0x0000000000000015, 0x00000000239A43A0, 0x0000000000000000)
kernel  pc: 0x00000000006D2EF5 exc__raise+ 0x315 (0x0000000023986CC0, 0x0000000000000000, 0x0000000000000006, 0x000000000000000E)
kernel  pc: 0x00000000006D30AC exc_raise+ 0x11c (0x00000000000FA2AF, 0x0000000000000006, 0x000000000000000E, 0x0000000000000015)
kernel  pc: 0x00000000009723FD rowsize+ 0x49d5ed (0x0000000023987900, 0x0000000023211240, 0x000000002A02DAA0, 0x0000000004A4BBE9)
kernel  pc: 0x00000000004C68DC subst_rcopy+ 0x7c (0x0000000023987900, 0x0000000023986CC0, 0x0000000023987900, 0x0000000000000002)
kernel  pc: 0x00000000004FBAA7 getnext+ 0x347 (0x0000000000000002, 0x0000000000000000, 0x0000000000000000, 0x0000000000000001)
kernel  pc: 0x00000000006D2075 crdb_procmark+ 0x185 (0x00000000FFFF8000, 0x0000000000000C41, 0x00000000FFFF8000, 0x0000000000000001)
kernel  pc: 0x00000000014F2D4D lddb_main+ 0x109d (0x000000000000013C, 0x000000000000013C, 0x0000000027CB9328, 0x0000000027CB9320)
kernel  pc: 0x0000000000BB464C s_execute+ 0x6b2bac (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000023986CC0)
kernel  pc: 0x000000000054212C sequencer+ 0x4cc (0x000000439232F2BB, 0x0000000023986CC0, 0x0000000000000000, 0x000000000000C000)
kernel  pc: 0x00000000005B9674 tdsrecv_language+ 0x1f4 (0x0000000000000000, 0x0000000023986CC0, 0x0000000004A4F730, 0x0000000000000000)
kernel  pc: 0x00000000004D0194 conn_hdlr+ 0xc14 (0x0000000021ABE5A0, 0x0000000021ABE5A0, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000000041639F kpntwrapper+ 0x4f (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  pc: 0x000000007725866D CreateFiberEx+ 0x27d (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
kernel  end of stack trace, spid 16, kpid 53411902, suid 1


Read more...

Environment

SAP Adaptive Server Enterprise (ASE)  16.0 SP02 PL01-PL04 (but may not be limited to SP02 PL0x)

Product

SAP Adaptive Server Enterprise 16.0

Keywords

decryption stacktrace corruption CR796745 CR#796745 796745 large buffer pool , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.