Symptom
- User session is terminated unexpectedly when running a stored procedure
- With a message showing "process infected with signal 11" in ind__get_sysindrow()
Current process (hex#) infected with signal 11 (SIGSEGV)
Address hex# (ind__get_sysindrow+0x25d)... - The ind__get_sysindrow function name is missing from the "Address" line of the stacktrace output
Current process (0x691010a) infected with signal 11 (SIGSEGV)
Address 0x4000000001c4a0b1 (si_code: 0x2, si_addr: 0x0000000000000000), siginfo (code, address) = (2, 0x0000000000000000) - Followed by a stack trace containing functions:
ind__get_sysindrow
ind_getval
getindexname
- The issue reproduces regularly but not at every execution.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 15.x pre-15.7 SP63
- SAP Adaptive Server Enterprise (ASE) 15.7 pre-SP130
- SAP Adaptive Server Enterprise (ASE) 16.0 GA pre-PL04
Product
SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0 ; Sybase Adaptive Server Enterprise 15.0 ; Sybase Adaptive Server Enterprise 15.5
Keywords
temporary, table, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers, CR#664848, CR664848, 664848, statement, cache, lightweight, procedure, LWP, index, purgesqlcache, purge , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview