SAP Knowledge Base Article - Preview

2878359 - Signal 11 in lt_get_proc() when DBCC SETTRUNC or DBCC GETTRUNC is executed - SAP ASE 16.0

Symptom

  • An "Infected with signal 11" error in the module lt_get_proc() together with a stack trace is reported in the ASE errorlog:

Current process (0xd510129) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000b48154 (lt_get_proc+0xc7), siginfo (code, address) = (128, 0x(nil))

  •  The stack trace includes functions:

lt_get_proc
lt_send_row 
lt_send_truncpoint
lt_settrunc
exec_dbcc

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0
  • High Availability Disaster Recovery (HADR)

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR815932, CR#815932, 815932, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.