2052023 - How to decode or demangle stack traces on HP-UX - SAP ASE | SAP Knowledge Base Article

SAP Knowledge Base Article - Preview

2052023 - How to decode or demangle stack traces on HP-UX - SAP ASE

Symptom

  • ASE generate a stack trace including function names beginning with _ZN on HP-UX platforms.  For example:

current process (0x1d110197) infected with 11
Address 0x4000000001dde830 (si_code: 0x2, si_addr: 0x0000000000000000), siginfo (code, address) = (2, 0x0000000000000000)
......
SQL Text: ......
curdb = 4 tempdb = 2 pstat = 0x10000
lasterror = 0 preverror = 0 transtate = 1
curcmd = 224 program = isql                         
pc: 0x4000000003fe0120 pcstkwalk+0x120(0x000000001d110197, 0x0000000000000002, 0x000000000000270f, 0x0000000000000000, 0x0000000000000000)
pc: 0x4000000003fdf540 ucstkgentrace+0xad0(0x0000000000000000, 0x0000000000000001, 0x000000001d110197, 0x0000000000000001, 0xc00000002fd27f10)
pc: 0x4000000003f20620 ucbacktrace+0x240(0x0000000000000000, 0xffffffffffffffff, 0x0000000000000288, 0x0000000000000000, 0xffffffffffffffff)
pc: 0x4000000001e46e60 terminate_process+0x2bb0(0x000000000000000b, 0xc00000000cc5d010, 0xc00000000cc5d200, 0x000000000000000b, 0x0000000000000000)
pc: 0x4000000003f78170 kisignal+0x880(0xc00000000cc5d200, 0x000000000000000b, 0xc00000000cc5d010, 0xc00000000cc5d200, 0x000000000000000b)
pc: 0xe000000116002620 <signal handler called>(0xc00000000cc62070, 0xc000000038ca60f0, 0x0000000000000000, 0xc000000038cb3a10, 0xc000000038ca60f0)
pc: 0x4000000001dde830 _ZN17GtqSingleSubqScan13GtInitGcPerGtEP8OptBlock+0x5f0(0xc000000038cb3a10, 0xc000000038ca60f0, 0xc00000000cc62194, 0xc000000038cb3a10, 0xc000000038ca60f0)
pc: 0x4000000001b5acd0 _ZN9GtElement6GtInitEP8OptBlockPi+0x90(0xc000000038ca6120, 0xc00000000cc62194, 0xc000000038ca6120, 0xc00000000cc62194, 0xc000000038ca60f0)
pc: 0x4000000001aa7130 _ZN8GtsState7GtsInitEPi+0x300(0xc000000038ca6300, 0xc00000000cc62194, 0xc000000038ca60f0, 0xc00000000cc62194, 0xc000000038c95870)
pc: 0x40000000019b8aa0 _ZN8OptBlock14OptPhase1aInitEPi+0x310(0xc000000038ca68b0, 0xc000000038ca60f0, 0xc000000038c9a280, 0xc00000000cc62194, 0xc000000038ca68b0)
pc: 0x4000000001b393d0 _ZN12SearchEngine14SeCrtOptBlocksEP8OptBlockP4NodeI3LopEPi+0x1a0(0xc000000038ca3dc0, 0xc00000000cc62194, 0xc000000038ca3dc0, 0xc00000000cc62194, 0xc000000038c9a280)
pc: 0x4000000001984460 _ZN9OptGlobal16_GblSearchEngineEPi+0x1e0(0xc000000038ca3dc0, 0xc00000000cc62194, 0xc000000033539740, 0xc000000038ca3dc0, 0xc00000000cc62194)
pc: 0x40000000019cfd40 _ZN9OptGlobal11GblOptimizeEPi+0x3e0(0xc000000038c9a280, 0xc000000033539790, 0xc000000038ca3dc0, 0xc00000000cc62194, 0xc000000033539740)
pc: 0x4000000001a2d250 Optimize+0x290(0xc000000038c915f0, 0xc000000033654c90, 0xc000000038c8f640, 0x0000000000000001, 0x0000000000000002)
pc: 0x4000000001a6cef0 s_compile_stmt+0x1a50(0xc000000038c8d8b8, 0xc0000000334d7800, 0x0000000000000000, 0x0000000000000001, 0x0000000000000000)
pc: 0x4000000001afc5a0 s_compile+0x1dc0(0xc00000000cc62350, 0xc000000024c9a2f0, 0xc000000024c9a2f0, 0xc00000000cc62518, 0x0000000000000007)
end of stack trace, spid 231, kpid 487653783, suid 3

  • How to decode or demangle those functions?

Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.x
  • HP-UX

Product

SAP Adaptive Server Enterprise 15.7 ; Sybase Adaptive Server Enterprise 15.0 ; Sybase Adaptive Server Enterprise 15.5

Keywords

gdb, gnu-new-abi, demangle-style, maintenance , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , How To

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.