SAP Knowledge Base Article - Preview

2809197 - Signal 11 (SIGSEGV) at address rvm__get_ipcr - SAP ASE

Symptom

  • The following messages are printed in the ASE log :

Current process (0x313d004b) infected with signal 11 (SIGSEGV)

Address 0x0000000080617fa0 (_$o1ceyxW0.rvm__get_ipcr+0x690), siginfo (code, address) = ...
..
SQL causing error : create procedure *ss%%%%%ss* as select * from tempdb..<tablename>

with a stack trace including


terminate_process
kisignal
rvm__get_ipcr
open_user_table
open_system_table
gettotcols_lockintent
all_expand
expand_ALL_nodes
colnames
colnames_recurse
colnames_driver
s_normquery
s__call_normquery
s_renormalize
s_recompile
s_execute

  • Not affecting running application

Read more...

Environment

Adaptive Server Enterprise (ASE) - 15.7 SP64

Solaris Platform

Product

SAP Adaptive Server Enterprise 15.7

Keywords

SIGSEGV, signal 11, lwp, statement cache , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.