SAP Knowledge Base Article - Preview

3216088 - Signal 11 in memchr() - SAP ASE

Symptom

  • Client connection unexpectedly terminated.
  • ASE errorlog contains an "Infected with signal 11" error with an "Address:" line showing the function memchr():

    Current process (0x3f0020) infected with signal 11 (SIGSEGV)
    Address 0xfffffd7ffe741684 (memchr+0x14), siginfo (code, address) = (1,0x0000000000000000)

  • The following stack trace includes these functions:

memchr
query_text
prSensitiveSQLTEXT

  Note: The complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0
  • Solaris

Product

SAP Adaptive Server Enterprise 16.0

Keywords

sp_showplan, Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal, CR#826499, CR826499, 826499 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.