SAP Knowledge Base Article - Preview

2288340 - ASE infected with signal 11 (SIGSEGV) at bitstr::test()

Symptom

  • Receiving "Infected with signal 11" in the bitstr::test module with a stack trace:

Current process (0x4d3026a) infected with signal 11 (SIGSEGV)
Address 0x0x00000000008aa193 (bitstr::test(unsigned long) const+0x13), siginfo (code, address) = (128, 0x(nil))

  • Modules seen on the ASE stacktrace include: 

bitstr::test(unsigned long)
LePtnScanOp::LeOpPrint(ExeCtxt&)
LeScanOp::_LeSoCalculatePIOC(ExeCtxt&, double*)
LeScanOp::_LeOpOpen(ExeCtxt&)


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP01 PL02 and higher
  • SAP Adaptive Server Enterprise (ASE) 16.0 SP02 PL02 and higher

Product

SAP Adaptive Server Enterprise 16.0

Keywords

bitstr, LePtnScanOp, LeOpPrint, LeScanOp, _LeSoCalculatePIOC, threaded, process, kernel, mode, segmentation, fault, segfault, access, violation, "stack trace", CR796426, CR796426, 796426 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.