Symptom
- Receiving "Infected with signal 11" in the bitstr::test module with a stack trace:
Current process (0x4d3026a) infected with signal 11 (SIGSEGV)
Address 0x0x00000000008aa193 (bitstr::test(unsigned long) const+0x13), siginfo (code, address) = (128, 0x(nil))
- Modules seen on the ASE stacktrace include:
bitstr::test(unsigned long)
LePtnScanOp::LeOpPrint(ExeCtxt&)
LeScanOp::_LeSoCalculatePIOC(ExeCtxt&, double*)
LeScanOp::_LeOpOpen(ExeCtxt&)
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 16.0 SP01 PL02 and higher
- SAP Adaptive Server Enterprise (ASE) 16.0 SP02 PL02 and higher
Product
Keywords
bitstr, LePtnScanOp, LeOpPrint, LeScanOp, _LeSoCalculatePIOC, threaded, process, kernel, mode, segmentation, fault, segfault, access, violation, "stack trace", CR796426, CR796426, 796426 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview