Symptom
Current Process infected with signal 11 at idt_remove_all_reservations. Stack trace below:
kernel Current process (0x47630b66) infected with signal 11 (SIGSEGV)
kernel Address 0x000000010138376c (idt_remove_all_reservations+0x48), siginfo (code, address) = (50, 0x0000000042281834)
.......
kernel pc: 0x0000000100827fdc terminate_process.fdpr.chunk.2+0x764()
kernel pc: 0x000000010228dd44 kisignal+0x464()
kernel pc: 0x000000010138376c idt_remove_all_reservations+0x48()
kernel pc: 0x0000000100fbe3d4 dropo.fdpr.chunk.8+0x180()
kernel pc: 0x000000010197dbe4 dropobject+0xf4()
kernel pc: 0x000000010197dabc s_execute.fdpr.chunk.125+0xc()
kernel pc: 0x000000010175dfd8 sequencer+0x388()
kernel pc: 0x00000001017640f0 execproc+0x424()
kernel pc: 0x00000001017e38f0 execrpc+0xa20()
kernel pc: 0x00000001017e40a8 tdsrecv_rpc+0x28()
kernel pc: 0x00000001017f6400 conn_hdlr.fdpr.chunk.10+0x318()
kernel end of stack trace, spid 3376, kpid 1197673318, suid 11904
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 15.7
Product
Keywords
timeslice, infected with signal , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.