Symptom
- Current process (0x3e5947c5) infected with signal 11 (SIGSEGV)
Address 0x00000001023836d8 (LeDataRow::_updateVarLenValue(LeColumn*,sdes*,int)+0x6c), siginfo (code, address) = (51, 0x0000000000000035) - Stack trace includes the following function:
pcstkwalk.fdpr.chunk.1+0x8()
ucstkgentrace+0x3c0()
ucbacktrace+0xc4()
terminate_process.fdpr.chunk.13+0x17c()
kisignal.fdpr.chunk.2+0x19c()
LeDataRow::_updateVarLenValue(LeColumn*,sdes*,int)+0x6c()
LeDataRow::writeRowDOL_upd.fdpr.chunk.7(unsigned+0xc()
LeUpdateOp::_LeOpNext(ExeCtxt&)+0x5e0()
LeEmitNoSndOp::_LeOpNext(ExeCtxt&)+0x2dc()
LePlanNext+0x190()
le_execerr installed by the following function:-]
exec_lava+0x39c()
s_execute.fdpr.chunk.108+0x284()
Read more...
Environment
SAP Adaptive Server Enteprise (ASE) all versions
Product
SAP Adaptive Server Enterprise 16.0
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview