Symptom
- A process (spid) is terminated with signal in function LeCacheDMLOp::_LeOpAcquire() followed by a stack trace:
Current process (0x431d056d) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001486a21 (LeCacheDMLOp::_LeOpAcquire(ExeCtxt&)+0x2d9), siginfo (code, address) = (1, 0x0xffffffffffffffff)
or
Address 0x0x0000000001486a21 (LeCacheDMLOp::_LeOpAcquire(ExeCtxt&)+0x2d9), siginfo (code, address) = (1, 0x(nil))
- The stack trace includes the following functions:
LeCacheDMLOp::_LeOpAcquire
LeEmittOp::_LeOpAcquire
LePlanAcquire
exec_lava
s_execute
sequencer
execproc
- Note: A complete stack trace is available under Attachments.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 16.0
Product
SAP Adaptive Server Enterprise 16.0
Keywords
CR825753 CR#825753, 825753, table variable, recompilation, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview