Symptom
- An "infected with signal 11" error in the module get_stored_char_size() followed by a stack trace is reported in the ASE errorlog:
Current process (0x1d000f) infected with signal 11 (SIGSEGV)
Address 0x0x00000000015c9671 (get_stored_char_size(unsigned char*)+0x1), siginfo (code, address) = (1, 0x0x00000000000001c2)
- The stack trace includes functions:
get_stored_char_size
get_unicode_text
sqlscript_lex
sqlscript_parse
sqlpars
Note: A complete stack trace is available under Attachments.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 16.0 SP03
- SQLScript Database
Product
Keywords
CR810512, CR#810512, 810512, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, comment, comments, SQLScript , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview