SAP Knowledge Base Article - Preview

2933987 - Infected with Signal 11 in get_stored_char_size() - SAP ASE 16.0 SP03

Symptom

  • An "infected with signal 11" error in the module get_stored_char_size() followed by a stack trace is reported in the ASE errorlog:

Current process (0x1d000f) infected with signal 11 (SIGSEGV)
Address 0x0x00000000015c9671 (get_stored_char_size(unsigned char*)+0x1), siginfo (code, address) = (1, 0x0x00000000000001c2)

  • The stack trace includes functions:

get_stored_char_size 
get_unicode_text 
sqlscript_lex
sqlscript_parse 
sqlpars

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03
  • SQLScript Database

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR810512, CR#810512, 810512, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, comment, comments, SQLScript , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.