SAP Knowledge Base Article - Preview

3683831 - SIGSEV from _DeleteObj

Symptom

Address 0x0x00000000014023f9 (_DeleteObj(void*, OptPool*, unsigned long)+0x39), siginfo (code, address) = (1, 0x0x000000000000002c)
Current process (0x1d37033f) infected with signal 11 (SIGSEGV)

_DeleteObj(void*, OptPool*, unsigned long)
GcElement::Destructor(OptPool*) 
GcElement::DestructObj(OptPool*)
TcElement::Destructor(OptPool*) 
TcElement::DestructObj(OptPool*)
TcgState::Destructor(OptPool*) 
OptGlobal::Destructor(OptPool*) 
Optimize
s_compile_stmt 
s_compile 
s_recompile 


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE)

Keywords

SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  stack, registers, CR 831457, CR831457, 831457, CR#831457 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.