SAP Knowledge Base Article - Preview

2571913 - Signal 11 in dmpx__find_dmpxact_type() - SAP ASE 16.0

Symptom

  • When an encrypted database is dumped,
  • An "infected with signal 11 (SIGSEGV)" error in the module dmpx__find_dmpxact_type() with a stack trace is reported in the ASE errorlog:

Current process (0x68d700bb) infected with signal 11 (SIGSEGV)
Address 0x0x00000000019b7b1d (dmpx__find_dmpxact_type+0x7d), siginfo (code, address) = (1, 0x0x000000000000003a)

  • The stack trace includes the following functions:

dmpx__find_dmpxact_type
dmpx_truncatemain
dmpxact


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

Sybase, SEGV, segment violation, storage access violation, kisignal, CR806252, CR#806252, 806252, dump, threshold, procedure, sp_helpthreshold,  stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.