SAP Knowledge Base Article - Preview

2878359 - Signal 11 in lt_get_proc() when DBCC SETTRUNC or DBCC GETTRUNC is executed - SAP ASE 16.0

Symptom

  • An "Infected with signal 11" error in the module lt_get_proc() together with a stack trace is reported in the ASE errorlog:

Current process (0xd510129) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000b48154 (lt_get_proc+0xc7), siginfo (code, address) = (128, 0x(nil))

  •  The stack trace includes functions:

lt_get_proc
lt_send_row 
lt_send_truncpoint
lt_settrunc
exec_dbcc

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0
  • High Availability Disaster Recovery (HADR)

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR815932, CR#815932, 815932, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.