SAP Knowledge Base Article - Preview

3683944 - Signal 11(SIGSEGV) from function bufdunlink

Symptom

Address 0x0x000000000xxxxxxx (buf_get_latch+0x1d5), siginfo (code, address) = (1, 0x0x0000000100000nil)
Current process (0x6727037c) infected with signal 11 (SIGSEGV) 

bufdunlink
cm_mass_destroystate
buf_check_and_destroy
bufpagedestroy
bufpagedestroy_noscan
pg__dropbuf
pg__deal_ext_commit
pg__drop_extents_AP
pg_free_extents
pg__objdeall_process_alloc
pg_ptndeall
closetable 
LeWkTbl::closeWkTbl


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE)

Keywords

SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  stack, registers, CR 831160, CR831160, 831160, CR#831160 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.