SAP Knowledge Base Article - Preview

2444159 - Signal 11 in rvm__audit_roletoggle() when enabling a user defined role - SAP ASE 16.0

Symptom

  • When enabling a user defined role which has a password from within a stored procedure,
  • An "infected with signal 11" error in the module rvm__audit_roletoggle() followed by a stack trace is reported in the ASE errorlog:

Current process (0x250013) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000ef195c (rvm__audit_roletoggle+0x1da), siginfo (code, address) = (1, 0x0x0000000000000010)

  • The stack trace includes functions:

rvm__audit_roletoggle
rvm_audit_dispatch
rvm_dispatch
rvm_process_dispatch
set_role

  Note: A complete stack trace is available under Attachments.

  • Auditing is enabled in ASE.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0
  • SAP Adaptive Server Enterprise Cluster Edition (ASE CE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR806510, CR#806510, 806510, Sybase, ASEServer, SAPASE, dataserver, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.