SAP Knowledge Base Article - Preview

2534520 - Signal 11 in sdes_hookup() - SAP ASE

Symptom

  • A process (spid) is aborted by ASE with an "infected with signal 11" error in the module sdes_hookup() followed by a stack trace:

Current process (0x54ed013d) infected with signal 11 (SIGSEGV)
Address 0x00000000803ff06c (sdes_hookup+0x10c), siginfo (code, address) = (1, 0x0000000000000000)

  • The stack trace includes the following functions:

sdes_hookup
open__byid
open_user_table
get_range_sdes
open_range
open_one_side

   Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7

Product

SAP Adaptive Server Enterprise 15.7

Keywords

CR810730, CR#810730, 810730, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.