SAP Knowledge Base Article - Preview

3030036 - Infected with signal 11 in addstep() while parsing incoming SQL statements - SAP ASE

Symptom

  • A batch containing many queries fails with a "Current process infected with signal 11" error while ASE SQL parser is validating the syntax of those incoming SQL statements and building a parse tree.

Current process (0x6d1b0415) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001f3a190 (addstep+0xe0), siginfo (code, address) = (1, 0x0x000000000000001a)

  • The error is accompanied by a stacktrace referencing the functions:

kisignal
addstep
yyparse
sqlpars
tdsrecv_language
conn_hdlr


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

addstep, 824272, CR#824272, CR824272, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.