SAP Knowledge Base Article - Preview

2739220 - Infected with Signal 11 in open__byname with 'predicated privileges' on - SAP ASE

Symptom

  • Client process unexpectedly terminated when running a statement with a variable of type 'table'
  • Errorlog contains an Infected with signal 11 error at address open__byname
  • The following stack trace including functions s__attachPreds and attach_predicates
  • Errorlog entries include:

Current process (0x39001d) infected with signal 11 (SIGSEGV)
Address 0x0x00000000018e11d7 (open__byname+0xa7)

with a stack trace including

open__byname
open_user_table
open_system_table
gettotcols_lockintent
s__attachPreds
attach_predicates

  • Please refer to attachment Full_Stack_Example.txt for a complete example from ASE log


Read more...

Environment

  • SAP Adaptive Server Enterprise 16.0
  • "Predicated Privileges" configuration is on

Product

SAP Adaptive Server Enterprise 16.0

Keywords

dataserver, open__byname, SIGSEGV , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.