SAP Knowledge Base Article - Preview

2534520 - Signal 11 in sdes_hookup() - SAP ASE

Symptom

  • A process (spid) is aborted by ASE with an "infected with signal 11" error in the module sdes_hookup() followed by a stack trace:

Current process (0x54ed013d) infected with signal 11 (SIGSEGV)
Address 0x00000000803ff06c (sdes_hookup+0x10c), siginfo (code, address) = (1, 0x0000000000000000)

  • The stack trace includes the following functions:

sdes_hookup
open__byid
open_user_table
get_range_sdes
open_range
open_one_side

   Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7

Product

SAP Adaptive Server Enterprise 15.7

Keywords

CR810730, CR#810730, 810730, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.