Symptom
- ASE reports an "infected with signal 11" error with stack trace including module _DeleteObj
- The signal 11 can be reported at address bufdunlink
Address 0x0x00000000014018e7 (_DeleteObj(void*, OptPool*, unsigned long)+0x7)
Current process (0x66e1046e) infected with signal 11 (SIGSEGV)
Current Process is running on Engine 27 - Followed by a stack trace including some or all of the following modules, with _DeleteObj the key one
_DeleteObj(void*, OptPool*, unsigned long)
GcElement::DestructObj(OptPool*)
TcElement::Destructor(OptPool*)
TcElement::DestructObj(OptPool*)
TcgState::Destructor(OptPool*)
OptGlobal::Destructor(OptPool*)
Optimize
s_compile_stmt
s_compile
sequencer
execproc
Read more...
Environment
- SAP ASE 16.0 SP04 PL03
Product
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers, 827974, CR827974, CR#827974 , KBA , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.