Symptom
- An "infected with signal 11" error in the module open__byname() followed by a stack trace is reported in the ASE errorlog:
Current process (0x39001d) infected with signal 11 (SIGSEGV)
Address 0x000000008059984c (open__byname+0xac), siginfo (code, address) = (1, 0x0000000000000000)
- The stack trace includes functions:
open__byname
open_user_table
cm_which_cache
q_setup_tab_cache_info
qry_init
decision
optimize_cmd
Note: A complete stack trace is available under Attachments.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 16.0
Product
Keywords
CR811856, CR#811856, 811856, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview