SAP Knowledge Base Article - Preview

3079749 - Signal 11 in strlen() when running sybmon sample command - SAP ASE

Symptom

Signal 11 in strlen() function while running sample command in sybmon

Stacktrace:
===========

Sybmon encountered signal 11 at address strlen+0x50 (0xffffffff7cbbe750)
pc: 0x0000000103c6bbac pcstkwalk+0x4c(0xffffffff7fff6c40, 0xffffffff7fff4c78, 0x000000000000270f, 0x0000000000000003, 0x0000000000000003)
        Frame Pointer= 0xffffffff7fff43c1 , Frame size=272
pc: 0x0000000103c6b720 ucstkgentrace+0x520(0x0000000000000000, 0x0000000000000003, 0x000000000000270f, 0x0000000000000000, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fff6f81 , Frame size=11200
pc: 0x0000000103e56a64 sm_print_stacktrace+0x64(0x000000000000004a, 0x000000000000000b, 0xffffffff7fff7908, 0xffffffff7cbbe750, 0x0000000000002b09)
        Frame Pointer= 0xffffffff7fff7031 , Frame size=176
pc: 0x0000000103e7ad60 sybmon_sig_handler+0x2c0(0x000000000000000b, 0xffffffff7fff87a0, 0xffffffff7fff7cb0, 0x0000000000000000, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fff71a1 , Frame size=368
pc: 0xffffffff7cc499d0 __sighndlr+0xc(0x000000000000000b, 0xffffffff7fff87a0, 0xffffffff7fff7cb0, 0x0000000103e7aaa0, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fff7251 , Frame size=176
pc: 0xffffffff7cc3c3f8 call_user_handler+0x364(0xffffffff7c502a40, 0xffffffff7fff87a0, 0x0000000000000002, 0x0000000000000000, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fff7341 , Frame size=240
pc: 0xffffffff7cc3c750 sigacthandler+0x5c(0x000000000000000b, 0xffffffff7fff87a0, 0xffffffff7fff7cb0, 0x000000000014d908, 0xffffffff7cd8a000)
        Frame Pointer= 0xffffffff7fff73f1 , Frame size=176
pc: 0xffffffff7cc0c15c _ndoprnt+0x2050(0xffffffff7fff9e92, 0xffffffff7fff9e50, 0x0000000000000000, 0xffffffff7cb5a278, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fff9161 , Frame size=7536
pc: 0xffffffff7cc0e5a8 vsnprintf+0x6c(0xffffffff7fff9ba0, 0x0000000000000200, 0xffffffff7fff9e74, 0xffffffff7fff9e48, 0xffffffff7fff9f3f)
        Frame Pointer= 0xffffffff7fff92a1 , Frame size=320
pc: 0x000000010309afe0 traceprint+0x2e0(0xffffffff7fff9e74, 0x00000000000002bc, 0xffffffff7fff9f3f, 0xffffffff7fffa1d8, 0x00000000000000cb)
        Frame Pointer= 0xffffffff7fff95c1 , Frame size=800
pc: 0x0000000103c6dbe0 pctraceprint+0x60(0x000000010598b928, 0xffffffff7fffa20c, 0x00000000000002bc, 0xffffffff7fffc690, 0x000000010598b928)
        Frame Pointer= 0xffffffff7fff9951 , Frame size=912
pc: 0x0000000103c6d580 pcdescprint+0xe0(0xffffffff7fffc9d0, 0x0000000000000003, 0xffffffff7fffc690, 0xffffffff7fffc990, 0xffffffff7fffc9d0)
        Frame Pointer= 0xffffffff7fff9ce1 , Frame size=912
pc: 0x0000000103c6ce54 pcstkprint+0x334(0xffffffff7fffc690, 0xffffffff7fffa6c8, 0x0000000000000003, 0x0000000000000000, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fff9e11 , Frame size=304
pc: 0x0000000103c6b7d0 ucstkgentrace+0x5d0(0x0000000000230012, 0x0000000000000003, 0x000000000000270f, 0x0000000000000000, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fffc9d1 , Frame size=11200
pc: 0x0000000103e56974 monbacktrace+0x3f4(0x0000000000230012, 0x0000000000000003, 0x0000000000000000, 0x00000001059afe80, 0x00000000001059af)
        Frame Pointer= 0xffffffff7fffcb01 , Frame size=304
pc: 0x0000000103e53d4c smd_sample_server+0xb0c(0x0000000000000032, 0x000000000000001e, 0x0000000000000000, 0x0000000000000000, 0x000000000000ff00)
        Frame Pointer= 0xffffffff7fffcc21 , Frame size=288
pc: 0x0000000103e97b18 sm__exec_sample+0x678(0xffffffff7fffd778, 0x0000000000000073, 0x0000000000000001, 0x0000000000000000, 0x0000000000000038)
        Frame Pointer= 0xffffffff7fffcd01 , Frame size=224
pc: 0x0000000103e7e904 sm_exec_command+0x5a4(0xffffffff7fffd778, 0x0000000000000c00, 0x0000000000000060, 0x7fffffffe0000000, 0x0000000000000000)
        Frame Pointer= 0xffffffff7fffcea1 , Frame size=416
pc: 0x0000000103e783b0 sm_process_commands+0x890(0x0000000000000001, 0x00000001059b5c88, 0x0000000000000000, 0x0000000000000108, 0x0000000000000008)
        Frame Pointer= 0xffffffff7fffd231 , Frame size=912
pc: 0x0000000103e77ad8 sybmon_main+0x378(0x0000000000000003, 0xffffffff7fffe488, 0xffffffff7fffdd05, 0x0000000106bd5038, 0xffffffff7fffe2d0)
        Frame Pointer= 0xffffffff7fffd301 , Frame size=208
pc: 0x0000000100001828 c_main+0xfc8(0x0000000000000003, 0xffffffff7fffe488, 0xffffffff7fffe4a8, 0xffffffff7c500780, 0x0000000000002880)
        Frame Pointer= 0xffffffff7fffdb01 , Frame size=2048
pc: 0x0000000100000380 main+0x40(0x0000000000000003, 0xffffffff7fffe488, 0xffffffff7fffe4a8, 0xffffffff7c500700, 0x0000000000002880)
        Frame Pointer= 0xffffffff7fffdbd1 , Frame size=208
**** End of stack trace for Sybmon process *


Read more...

Environment

SAP Adaptive Server Enterprise 16.0 - Solaris

Sybmon

Product

SAP Adaptive Server Enterprise 16.0

Keywords

strlen(), sybmon, infected, SIGSEGV, stack , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Known Error

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.