SAP Knowledge Base Article - Preview

2871729 - Signal 11 in cm_grabmem_clock() - SAP ASE

Symptom

  • "Infected with signal 11" error in the module cm_grabmem_clock() together with a stack trace is reported in the ASE errorlog:

Current process (0x14cb0231) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001d21a60 (cm_grabmem_clock+0x60), siginfo (code, address) = (1, 0x0x0000000000000010)

  • The stack trace include functions:

cm_grabmem_clock
bufgrab
getpage_with_validation
bt__getnextscanpg       
bt__handle_pagedone
bt_getnext              
dol_bt_getnext
getnext                 
LeScanOp::_LeOpNext(ExeCtxt&)
LeRestrictOp::_LeOpNext(ExeCtxt&)
LeEmitSndOp::_LeOpNext(ExeCtxt&)
LePlanNext
exec_lava
curs_fetch      

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR816549, CR#816549, 816549, cursor, relaxed, LRU, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.