SAP Knowledge Base Article - Preview

2511621 - Signal 11 in function buf__unhash_and_keep_grabbed_mass or bufnewpage - SAP ASE 15.7

Symptom

  • ASE reports an "Infected with signal 11" error in the module buf__unhash_and_keep_grabbed_mass() or bufnewpage():

Current process (0x2cd10229) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000d88bef (buf__unhash_and_keep_grabbed_mass+0x54f), siginfo (code, address) = (1, 0x0x00002aa928e4a550) 
 
or
 
Current process (0x3fd01ff) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000d8eb4d (bufnewpage+0xd4d), siginfo (code, address) = (1, 0x0x00002aa9238af550)

  • It is followed by a stack trace that includs the following functions:

buf__unhash_and_keep_grabbed_mass
bufnewpage
pg__getpgbuf
pg__ea_initpg
pg__ea_nextpg
pg__allocate

  • ASE server went down because the terminated process (spid) was holding cache spinlock on tempdb_cache:

Spinlocks held by  kpid 751895081
Spinlock tempdb_cache at address 0x00002aaaad8cca00 owned by 751895081

Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7 SP136 HF1

Product

SAP Adaptive Server Enterprise 15.7

Keywords

instext, CR811140, CR#811140, 811140, session, descriptor, buffer, memory, corruption, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.