SAP Knowledge Base Article - Preview

2554157 - Signal 11 in search_root_block_from_seqnode() or get_root_block() - SAP ASE 16.0

Symptom

  • On UNIX Operating Systems, an "infected with signal 11" error in the module get_root_block() together with a stack trace is reported in the ASE errorlog:

Current process (...) infected with signal 11 (SIGSEGV)
Address 0x400000000215e6a0 (get_root_block+0x100)

  • On Windows OS, the ASE errorlog reports a storage access violation in module search_root_block_from_seqnode():

Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
pc: 0x00000000005EFE8E search_root_block_from_seqnode+...

  • Both are followed by a stack trace including modules:

get_root_block
tdsrecv__mktree
get_datachange

  Note: A sample of a complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

SYBASE, CR#809251, CR809251, 809251, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, builtin, built-in, datachange , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.