Symptom
- ASE reports an "infected with signal 11" error with stack trace including module _DeleteObj
- The signal 11 can be reported at address bufdunlink
Address 0x0x00000000014018e7 (_DeleteObj(void*, OptPool*, unsigned long)+0x7)
Current process (0x66e1046e) infected with signal 11 (SIGSEGV)
Current Process is running on Engine 27 - Followed by a stack trace including some or all of the following modules, with _DeleteObj the key one
_DeleteObj(void*, OptPool*, unsigned long)
GcElement::DestructObj(OptPool*)
TcElement::Destructor(OptPool*)
TcElement::DestructObj(OptPool*)
TcgState::Destructor(OptPool*)
OptGlobal::Destructor(OptPool*)
Optimize
s_compile_stmt
s_compile
sequencer
execproc
Read more...
Environment
- SAP ASE 16.0 SP04 PL03
Product
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers, 827974, CR827974, CR#827974 , KBA , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview