SAP Knowledge Base Article - Preview

2739220 - Infected with Signal 11 in open__byname with 'predicated privileges' on - SAP ASE

Symptom

  • Client process unexpectedly terminated when running a statement with a variable of type 'table'
  • Errorlog contains an Infected with signal 11 error at address open__byname
  • The following stack trace including functions s__attachPreds and attach_predicates
  • Errorlog entries include:

Current process (0x39001d) infected with signal 11 (SIGSEGV)
Address 0x0x00000000018e11d7 (open__byname+0xa7)

with a stack trace including

open__byname
open_user_table
open_system_table
gettotcols_lockintent
s__attachPreds
attach_predicates

  • Please refer to attachment Full_Stack_Example.txt for a complete example from ASE log


Read more...

Environment

  • SAP Adaptive Server Enterprise 16.0
  • "Predicated Privileges" configuration is on

Product

SAP Adaptive Server Enterprise 16.0

Keywords

dataserver, open__byname, SIGSEGV , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.