SAP Knowledge Base Article - Preview

2765439 - Infected with signal 11 in sparclock() with stack including ind_getval - SAP ASE

Symptom

  • The ASE errorlog reports a signal 11 at address sparclock
  • With a stack trace including functions ind_getval and par_get_info
  • Log sequence shows entries like:

Current process (0x473023a) infected with signal 11 (SIGSEGV)
Address 0x000000008179776c (sparclock+0x4)

  • With stack trace functions

sparclock
ind_getval
par_get_info
GtPtnInfo*GtElement::GtReadPtnInfo
GttTable::GtAddReqCols
GtElement::GtInit


Read more...

Environment

  • SAP Adaptive Server Enterprise  (ASE) - 15.7 & 16.0
  • Rarely reported, known instances on
    • 15.7 SP140
    • 16.0 SP02 PL06
  • Solaris SPARC OS

Product

SAP Adaptive Server Enterprise 15.7

Keywords

sparclock, ind_getval, sp_sysmon, 'cache wizard', sig11, SIGSEGV , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.