SAP Knowledge Base Article - Preview

2187723 - Signal 11 in module deletetext() on proxy table to IQ - SAP ASE

Symptom

  • ASE reported an "infected with signal 11" error in the deletetext module:

Current process (0xd5006b) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000e6fca9 (deletetext+0x62), siginfo (code, address) = (1, 0x0x0000000000000200)
**** Saved signal context (0x0x00002aab179d6a40): ****
uc_flags: 0x0, uc_link: 0x(nil)
uc_sigmask: 0x416000 0xb 0x1 0x200
uc_stack: ss_sp: 0x(nil), ss_size: 0x0, ss_flags: 0x2

  •  Stack trace include the following modules:

deletetext
omni_text_free
omni_text_recover
boot__recover_and_online


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7
  • SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR786358, CR#786358, 786358, text, proxy, sysattributes, traceflag, 11214,-TF11214, SEGV, segment, storage, access, violation, fault, segfault, kisignal, stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.