SAP Knowledge Base Article - Preview

3332923 - Signal 11 with module _DeleteObj in stack - SAP ASE

Symptom

  • ASE reports an "infected with signal 11" error with stack trace including module _DeleteObj
  • The signal 11 can be reported at address bufdunlink

    Address 0x0x00000000014018e7 (_DeleteObj(void*, OptPool*, unsigned long)+0x7)
    Current process (0x66e1046e) infected with signal 11 (SIGSEGV)
    Current Process is running on Engine 27

  • Followed by a stack trace including some or all of the following modules, with _DeleteObj the key one

    _DeleteObj(void*, OptPool*, unsigned long)
    GcElement::DestructObj(OptPool*)
    TcElement::Destructor(OptPool*)
    TcElement::DestructObj(OptPool*)
    TcgState::Destructor(OptPool*)
    OptGlobal::Destructor(OptPool*)
    Optimize
    s_compile_stmt
    s_compile
    sequencer
    execproc


Read more...

Environment

  •  SAP ASE 16.0 SP04 PL03

Product

SAP ERP 6.0

Keywords

SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  stack, registers, 827974, CR827974, CR#827974 , KBA , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.