SAP Knowledge Base Article - Preview

2709132 - Signal 11 in get_root_block() - SAP ASE 16.0

Symptom

  • A "infected with signal 11" error in the module get_root_block() may be reported in the SAP ASE error log when a user stored procedure with an execute cursor is run:

Current process (0x6cb0366) infected with signal 11 (SIGSEGV)
Address 0x0000000102b5ff5c (get_root_block.fdpr.chunk.2+0x24), siginfo (code, address) = (50, 0x8115008216008309)

  • It is followed by a stack trace with these functions:

get_root_block
s_compile

   Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

execute, cursor, CR 816528, 816528, CR#816528, CR 814468, 814468, CR#814468 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.