SAP Knowledge Base Article - Preview

2709132 - Signal 11 in get_root_block() - SAP ASE 16.0

Symptom

  • A "infected with signal 11" error in the module get_root_block() may be reported in the SAP ASE error log when a user stored procedure with an execute cursor is run:

Current process (0x6cb0366) infected with signal 11 (SIGSEGV)
Address 0x0000000102b5ff5c (get_root_block.fdpr.chunk.2+0x24), siginfo (code, address) = (50, 0x8115008216008309)

  • It is followed by a stack trace with these functions:

get_root_block
s_compile

   Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

execute, cursor, CR 816528, 816528, CR#816528, CR 814468, 814468, CR#814468 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.