SAP Knowledge Base Article - Preview

3130547 - Signal 11 in sendtext() on queries with large IN lists - SAP ASE 16.0

Symptom

  • ASE errorlog reports an "infected with signal 11" error in the module sendtext() together with a stack trace:

Current process (0xnnnnnnnn) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000d3a50d (sendtext+0x25), siginfo (code, address) = (128, 0x(nil))

  • The stack trace includes the functions:

sendtext
LeSendRow::_sendColsToClient(pss*, int, int)
LeSendRow::sendRowToClient(pss*, unsigned char, short)
LeEmitSndOp::_LeOpNext(ExeCtxt&)
LePlanNext
exec_lava
s_execute

  Note: A complete stack trace is available under Attachments.

  • The affected sql query contains a large IN list


Read more...

Environment

Upgrade ASE to a release where SAP CR 825873 is fixed:

  • SAP Adaptive Server Enterprise (ASE) 16.0 for Business Suite
  • SAP Customer Relationship Management (CRM) 7.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

sendtext, LeSendRow::sendRowToClient, CR#825873, CR825873, 825873, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.