Symptom
- The ASE errorlog reports an "infected with signal 11" error at address open__byname:
Current process (0x49b50b55) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000af3621 (open__byname+0x111)
- With SQL Text showing cached statement or dynamic sql
- SQL causing error : create procedure *ss0200465308_1832547178ss*
- SQL Text: create proc dyn100 as SELECT * from tempdb..t1 where c1 = ?
- And a stacktrace showing functions that can include:
open__byname
open_user_table
open_system_table
gettotcols_lockintent
gettotcols
all_expand
expand_ALL_nodes
colnames
colnames_recurse
colnames_driver
s_normquery
s__call_normquery
See attachment for a full stack trace example.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 15.7
- SAP Adaptive Server Enterprise (ASE) 16.0
Product
SAP Adaptive Server Enterprise 15.7 ; Sybase Adaptive Server Enterprise 15.0 ; Sybase Adaptive Server Enterprise 15.5
Keywords
CR742869 , CR#742869 , 742869, lwp, lightweight, procedure , sybase , ase , KBA , memory corruption , light weight procedure , lwp , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview