Symptom
- An "infected with signal 11" error in the module OptGlobal::OptGlobal() together with a stack trace appears in the ASE errorlog:
Current process (0x1910021) infected with signal 11 (SIGSEGV)
Address 0x0x000000000089b4b2 (OptGlobal::OptGlobal(Node<Lop>*, tree*, OptPool*)+0x4260), siginfo (code, address) = (1, 0x0x0000000000000018)
- Alternatively, an "infected with signal 11" error in the module LeCacheWkTblIO::updateLOBCacheRow() together with a stack trace appears in the ASE errorlog, ending with a zombie task:
Current process (0x26550098) infected with signal 11 (SIGSEGV)
Address 0x0000000080932c1c (void LeCacheWkTblIO::updateLOBCacheRow(le_row*,int)+0x54), siginfo (code, address) = (1, 0x000000000000000a)
- Various different patterns of stack traces may be seen in the ASE errorlog if a query is using reformat strategy on a table with row size that is potentially bigger than the ASE configured page size.
- Memory corruption may get into different stack traces with different segmentation fault routine names.
- Examples of complete stack traces are available under Attachments.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 16.0
- SAP Adaptive Server Enterprise (ASE) 15.7
Product
Keywords
kisignal, stacktrace, registers, CR817400, CR#817400, 817400, SEGV, segmentation, storage, access, violation, fault, segfault , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview