SAP Knowledge Base Article - Preview

3030036 - Infected with signal 11 in addstep() while parsing incoming SQL statements - SAP ASE

Symptom

  • A batch containing many queries fails with a "Current process infected with signal 11" error while ASE SQL parser is validating the syntax of those incoming SQL statements and building a parse tree.

Current process (0x6d1b0415) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001f3a190 (addstep+0xe0), siginfo (code, address) = (1, 0x0x000000000000001a)

  • The error is accompanied by a stacktrace referencing the functions:

kisignal
addstep
yyparse
sqlpars
tdsrecv_language
conn_hdlr


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

addstep, 824272, CR#824272, CR824272, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.