SAP Knowledge Base Article - Preview

2591095 - Signal 11 in mda_fill_and_send_monProcessWaits() when querying monProcessWaits - SAP ASE

Symptom

  • A query on monProcessWaits fails:

select SPID, KPID, WaitEventID, Waits, WaitTime from master.dbo.monProcessWaits

  • An "infected with signal 11" error in the module mda_fill_and_send_monProcessWaits() with a stack trace is reported in the ASE errorlog:

Current process (0x399d2783) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001815c57 (mda_fill_and_send_monProcessWaits+0xf9), siginfo (code, address) = (1, 0x0x0000000000000230)

  • The stack trace includes the following functions:

mda_fill_and_send_monProcessWaits
mda_std_populate_pid
mda_populate_monProcessWaits
mda_exec
VTABRemoteAccess::getNext
VTABRemoteAccess::startScan
LeScanOp::_LeOpNext
LeEmitSndOp::_LeOpNext
LePlanNext
exec_lava
s_execute

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 SP137
  • SAP Adaptive Server Enterprise (ASE) 16.0 SP02
  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR#812173, 812173, CR812173, mda, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.