SAP Knowledge Base Article - Preview

2187723 - Signal 11 in module deletetext() on proxy table to a remote server - SAP ASE

Symptom

  • ASE reported an "infected with signal 11" error in the deletetext module:

Current process (0xd5006b) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000e6fca9 (deletetext+0x62), siginfo (code, address) = (1, 0x0x0000000000000200)
**** Saved signal context (0x0x00002aab179d6a40): ****
uc_flags: 0x0, uc_link: 0x(nil)
uc_sigmask: 0x416000 0xb 0x1 0x200
uc_stack: ss_sp: 0x(nil), ss_size: 0x0, ss_flags: 0x2

  •  Stack trace include the following modules:

deletetext
omni_text_free
omni_text_recover
boot__recover_and_online


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7
  • SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR786358, CR#786358, 786358, text, proxy, sysattributes, traceflag, 11214,-TF11214, SEGV, segment, storage, access, violation, fault, segfault, kisignal, stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.