SAP Knowledge Base Article - Preview

2765439 - Infected with signal 11 in sparclock() with stack including ind_getval - SAP ASE

Symptom

  • The ASE errorlog reports a signal 11 at address sparclock
  • With a stack trace including functions ind_getval and par_get_info
  • Log sequence shows entries like:

Current process (0x473023a) infected with signal 11 (SIGSEGV)
Address 0x000000008179776c (sparclock+0x4)

  • With stack trace functions

sparclock
ind_getval
par_get_info
GtPtnInfo*GtElement::GtReadPtnInfo
GttTable::GtAddReqCols
GtElement::GtInit


Read more...

Environment

  • SAP Adaptive Server Enterprise  (ASE) - 15.7 & 16.0
  • Rarely reported, known instances on
    • 15.7 SP140
    • 16.0 SP02 PL06
  • Solaris SPARC OS

Product

SAP Adaptive Server Enterprise 15.7

Keywords

sparclock, ind_getval, sp_sysmon, 'cache wizard', sig11, SIGSEGV , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.