SAP Knowledge Base Article - Preview

2871729 - Signal 11 in cm_grabmem_clock() - SAP ASE

Symptom

  • "Infected with signal 11" error in the module cm_grabmem_clock() together with a stack trace is reported in the ASE errorlog:

Current process (0x14cb0231) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001d21a60 (cm_grabmem_clock+0x60), siginfo (code, address) = (1, 0x0x0000000000000010)

  • The stack trace include functions:

cm_grabmem_clock
bufgrab
getpage_with_validation
bt__getnextscanpg       
bt__handle_pagedone
bt_getnext              
dol_bt_getnext
getnext                 
LeScanOp::_LeOpNext(ExeCtxt&)
LeRestrictOp::_LeOpNext(ExeCtxt&)
LeEmitSndOp::_LeOpNext(ExeCtxt&)
LePlanNext
exec_lava
curs_fetch      

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR816549, CR#816549, 816549, cursor, relaxed, LRU, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.