SAP Knowledge Base Article - Preview

2809197 - Signal 11 (SIGSEGV) at address rvm__get_ipcr - SAP ASE

Symptom

  • The following messages are printed in the ASE log :

Current process (0x313d004b) infected with signal 11 (SIGSEGV)

Address 0x0000000080617fa0 (_$o1ceyxW0.rvm__get_ipcr+0x690), siginfo (code, address) = ...
..
SQL causing error : create procedure *ss%%%%%ss* as select * from tempdb..<tablename>

with a stack trace including

terminate_process
kisignal
rvm__get_ipcr
open_user_table
open_system_table
gettotcols_lockintent
all_expand
expand_ALL_nodes
colnames
colnames_recurse
colnames_driver
s_normquery
s__call_normquery
s_renormalize
s_recompile
s_execute

  • Not affecting running application


Read more...

Environment

  • Adaptive Server Enterprise (ASE) - 15.7
  • Solaris Platform

Product

SAP Adaptive Server Enterprise 15.7

Keywords

SIGSEGV, signal 11, lwp, statement cache , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.