- An "infected with signal 11" error in the module open__byname() followed by a stack trace is reported in the ASE errorlog:
Current process (0x39001d) infected with signal 11 (SIGSEGV)
Address 0x000000008059984c (open__byname+0xac), siginfo (code, address) = (1, 0x0000000000000000)
- The stack trace includes functions:
Note: A complete stack trace is available under Attachments.
SAP Adaptive Server Enterprise (ASE) 16.0
CR811856, CR#811856, 811856, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.