SAP Knowledge Base Article - Preview

2554157 - Signal 11 in search_root_block_from_seqnode() or get_root_block() - SAP ASE 16.0

Symptom

  • On UNIX Operating Systems, an "infected with signal 11" error in the module get_root_block() together with a stack trace is reported in the ASE errorlog:

Current process (...) infected with signal 11 (SIGSEGV)
Address 0x400000000215e6a0 (get_root_block+0x100)

  • On Windows OS, the ASE errorlog reports a storage access violation in module search_root_block_from_seqnode():

Adaptive Server Enterprise system exception (0xc0000005) generated by a storage access violation.
pc: 0x00000000005EFE8E search_root_block_from_seqnode+...

  • Both are followed by a stack trace including modules:

get_root_block
tdsrecv__mktree
get_datachange

  Note: A sample of a complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

SYBASE, CR#809251, CR809251, 809251, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, builtin, built-in, datachange , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.