Symptom
- A process (spid) is terminated with signal in function LeCacheDMLOp::_LeOpAcquire() followed by a stack trace:
Current process (0x431d056d) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001486a21 (LeCacheDMLOp::_LeOpAcquire(ExeCtxt&)+0x2d9), siginfo (code, address) = (1, 0x0xffffffffffffffff)
or
Address 0x0x0000000001486a21 (LeCacheDMLOp::_LeOpAcquire(ExeCtxt&)+0x2d9), siginfo (code, address) = (1, 0x(nil))
- The stack trace includes the following functions:
LeCacheDMLOp::_LeOpAcquire
LeEmittOp::_LeOpAcquire
LePlanAcquire
exec_lava
s_execute
sequencer
execproc
- Note: A complete stack trace is available under Attachments.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 16.0
Product
SAP Adaptive Server Enterprise 16.0
Keywords
CR825753 CR#825753, 825753, table variable, recompilation, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.