Symptom
Address 0x0x00000000014023f9 (_DeleteObj(void*, OptPool*, unsigned long)+0x39), siginfo (code, address) = (1, 0x0x000000000000002c)
Current process (0x1d37033f) infected with signal 11 (SIGSEGV)
_DeleteObj(void*, OptPool*, unsigned long)
GcElement::Destructor(OptPool*)
GcElement::DestructObj(OptPool*)
TcElement::Destructor(OptPool*)
TcElement::DestructObj(OptPool*)
TcgState::Destructor(OptPool*)
OptGlobal::Destructor(OptPool*)
Optimize
s_compile_stmt
s_compile
s_recompile
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE)
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers, CR 831457, CR831457, 831457, CR#831457 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview