Symptom
Current Process infected with signal 11 at idt_remove_all_reservations. Stack trace below:
kernel Current process (0x47630b66) infected with signal 11 (SIGSEGV)
kernel Address 0x000000010138376c (idt_remove_all_reservations+0x48), siginfo (code, address) = (50, 0x0000000042281834)
.......
kernel pc: 0x0000000100827fdc terminate_process.fdpr.chunk.2+0x764()
kernel pc: 0x000000010228dd44 kisignal+0x464()
kernel pc: 0x000000010138376c idt_remove_all_reservations+0x48()
kernel pc: 0x0000000100fbe3d4 dropo.fdpr.chunk.8+0x180()
kernel pc: 0x000000010197dbe4 dropobject+0xf4()
kernel pc: 0x000000010197dabc s_execute.fdpr.chunk.125+0xc()
kernel pc: 0x000000010175dfd8 sequencer+0x388()
kernel pc: 0x00000001017640f0 execproc+0x424()
kernel pc: 0x00000001017e38f0 execrpc+0xa20()
kernel pc: 0x00000001017e40a8 tdsrecv_rpc+0x28()
kernel pc: 0x00000001017f6400 conn_hdlr.fdpr.chunk.10+0x318()
kernel end of stack trace, spid 3376, kpid 1197673318, suid 11904
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 15.7
Product
Keywords
timeslice, infected with signal , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview