SAP Knowledge Base Article - Preview

2571913 - Signal 11 in dmpx__find_dmpxact_type() - SAP ASE 16.0

Symptom

  • When an encrypted database is dumped,
  • An "infected with signal 11 (SIGSEGV)" error in the module dmpx__find_dmpxact_type() with a stack trace is reported in the ASE errorlog:

Current process (0x68d700bb) infected with signal 11 (SIGSEGV)
Address 0x0x00000000019b7b1d (dmpx__find_dmpxact_type+0x7d), siginfo (code, address) = (1, 0x0x000000000000003a)

  • The stack trace includes the following functions:

dmpx__find_dmpxact_type
dmpx_truncatemain
dmpxact


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

Sybase, SEGV, segment violation, storage access violation, kisignal, CR806252, CR#806252, 806252, dump, threshold, procedure, sp_helpthreshold,  stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.