Symptom
- A process is infected with signal 11 in the module alloc_dirtychains() followed by a stacktrace:
Current process (0x290015) infected with signal 11 (SIGSEGV)
Current Process is running on Engine 0
Address 0x0x0000000001edd2d9 (alloc_dirtychains+0x29), siginfo (code, address) = (1, 0x0x000000000000453c)
- The stacktrace contains functions:
alloc_dirtychains
CgLavaUtils::CgCompFakeTable
CgGenLava::CGConsScanOp
CgpTabScan::_cgpCodeGen
or
alloc_dirtychains
LeWkTbl::CreateNewDES
CgGenLava::CGConsStoreOp
CgpStoreInd::_cgpCodeGen
CgpPop::cgpCodeGen
Note: The complete stacktrace is available under Attachments.
- ASE was booted with the traceflag 3608 (boot recovering only the master database).
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 16.0 SP02 and higher
Product
Keywords
Sybase, ASEServer, SAPASE, dataserver, syslogsdetail, fake, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stack, registers, CR814705, CR#814705, 814705 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.