Symptom
Address 0x0x000000000xxxxxxx (buf_get_latch+0x1d5), siginfo (code, address) = (1, 0x0x0000000100000nil)
Current process (0x6727037c) infected with signal 11 (SIGSEGV)
bufdunlink
cm_mass_destroystate
buf_check_and_destroy
bufpagedestroy
bufpagedestroy_noscan
pg__dropbuf
pg__deal_ext_commit
pg__drop_extents_AP
pg_free_extents
pg__objdeall_process_alloc
pg_ptndeall
closetable
LeWkTbl::closeWkTbl
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE)
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers, CR 831160, CR831160, 831160, CR#831160 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview