SAP Knowledge Base Article - Preview

2288340 - ASE infected with signal 11 (SIGSEGV) at bitstr::test()

Symptom

  • Receiving "Infected with signal 11" in the bitstr::test module with a stack trace:

Current process (0x4d3026a) infected with signal 11 (SIGSEGV)
Address 0x0x00000000008aa193 (bitstr::test(unsigned long) const+0x13), siginfo (code, address) = (128, 0x(nil))

  • Modules seen on the ASE stacktrace include: 

bitstr::test(unsigned long)
LePtnScanOp::LeOpPrint(ExeCtxt&)
LeScanOp::_LeSoCalculatePIOC(ExeCtxt&, double*)
LeScanOp::_LeOpOpen(ExeCtxt&)


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP01 PL02 and higher
  • SAP Adaptive Server Enterprise (ASE) 16.0 SP02 PL02 and higher

Product

SAP Adaptive Server Enterprise 16.0

Keywords

bitstr, LePtnScanOp, LeOpPrint, LeScanOp, _LeSoCalculatePIOC, threaded, process, kernel, mode, segmentation, fault, segfault, access, violation, "stack trace", CR796426, CR796426, 796426 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.