Symptom
-
"Infected with signal 11" error in the module cm_grabmem_clock() together with a stack trace is reported in the ASE errorlog:
Current process (0x14cb0231) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001d21a60 (cm_grabmem_clock+0x60), siginfo (code, address) = (1, 0x0x0000000000000010)
- The stack trace include functions:
cm_grabmem_clock
bufgrab
getpage_with_validation
bt__getnextscanpg
bt__handle_pagedone
bt_getnext
dol_bt_getnext
getnext
LeScanOp::_LeOpNext(ExeCtxt&)
LeRestrictOp::_LeOpNext(ExeCtxt&)
LeEmitSndOp::_LeOpNext(ExeCtxt&)
LePlanNext
exec_lava
curs_fetch
Note: A complete stack trace is available under Attachments.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
Product
Keywords
CR816549, CR#816549, 816549, cursor, relaxed, LRU, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview