SAP Knowledge Base Article - Preview

2933987 - Infected with Signal 11 in get_stored_char_size() - SAP ASE 16.0 SP03

Symptom

  • An "infected with signal 11" error in the module get_stored_char_size() followed by a stack trace is reported in the ASE errorlog:

Current process (0x1d000f) infected with signal 11 (SIGSEGV)
Address 0x0x00000000015c9671 (get_stored_char_size(unsigned char*)+0x1), siginfo (code, address) = (1, 0x0x00000000000001c2)

  • The stack trace includes functions:

get_stored_char_size 
get_unicode_text 
sqlscript_lex
sqlscript_parse 
sqlpars

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03
  • SQLScript Database

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR810512, CR#810512, 810512, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, comment, comments, SQLScript , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.