Symptom
- ASE reports an "infected with signal 11" error at address open__byname()
Current process (0x49b50b55) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000af3621 (open__byname+0x111)
- With SQL Text showing cached statement or dynamic sql
- SQL causing error : create procedure *ss0200465308_1832547178ss*
- SQL Text: create proc dyn100 as SELECT * from tempdb..t1 where c1 = ?
- And a stacktrace showing functions that can include:
open__byname
open_user_table
open_system_table
gettotcols_lockintent
gettotcols
all_expand
expand_ALL_nodes
colnames
colnames_recurse
colnames_driver
s_normquery
s__call_normquery
s_normalize
See attachment for a full stack trace example.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 15.7
- SAP Adaptive Server Enterprise (ASE) 16.0
Product
Keywords
CR742869 , CR#742869 , 742869, lwp, lightweight, procedure , sybase , ase , KBA , memory corruption , light weight procedure , lwp , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.