Symptom
- Current process (0x3e5947c5) infected with signal 11 (SIGSEGV)
Address 0x00000001023836d8 (LeDataRow::_updateVarLenValue(LeColumn*,sdes*,int)+0x6c), siginfo (code, address) = (51, 0x0000000000000035) - Stack trace includes the following function:
pcstkwalk.fdpr.chunk.1+0x8()
ucstkgentrace+0x3c0()
ucbacktrace+0xc4()
terminate_process.fdpr.chunk.13+0x17c()
kisignal.fdpr.chunk.2+0x19c()
LeDataRow::_updateVarLenValue(LeColumn*,sdes*,int)+0x6c()
LeDataRow::writeRowDOL_upd.fdpr.chunk.7(unsigned+0xc()
LeUpdateOp::_LeOpNext(ExeCtxt&)+0x5e0()
LeEmitNoSndOp::_LeOpNext(ExeCtxt&)+0x2dc()
LePlanNext+0x190()
le_execerr installed by the following function:-]
exec_lava+0x39c()
s_execute.fdpr.chunk.108+0x284()
Read more...
Environment
SAP Adaptive Server Enteprise (ASE) all versions
Product
SAP Adaptive Server Enterprise 16.0
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.