SAP Knowledge Base Article - Preview

2631173 - Signal 11 at fgunlock - SAP ASE

Symptom

  • Signal 11 and stack trace in ASE errorlog: 
      
    Current process (0x51910688) infected with signal 11 (SIGSEGV)
    Address 0x0x000000000184e006 (fgunlock+0x96), siginfo (code, address) = (1, 0x0x0000000000000057)
       
  • Stack trace may include the following modules:
      
    fgunlock
    endscan
    closetable
    close_range
    le_runerr
    LeInsertOp::_LeOpNext(ExeCtxt&)
    LeEmitNoSndOp::_LeOpNext(ExeCtxt&)
    LePlanNext
      
    Note: Complete stack trace can be found in Attachments.  

Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

kisignal, stacktrace, stack, Current process, infected with signal 11, lasterror = 2601, LeInsertOp::_LeOpNext(ExeCtxt&), LeEmitNoSndOp::_LeOpNext(ExeCtxt&), LePlanNext, fgunlock, endscan, closetable, close_range, le_runerr, exexproc, kill_proc, clean_process, s_cleanframe.   , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.