SAP Knowledge Base Article - Preview

2755225 - Signal 11 in mda__get_procedure_schemas() - SAP ASE 16.0

Symptom

  • An "Infected with signal 11" error in the module mda__get_procedure_schemas() together with a stack trace is reported in the ASE errorlog:

Current process (0x26693f7a) infected with signal 11 (SIGSEGV)
Address 0x0x000000000140a0e0 (mda__get_procedure_schemas+0x97), siginfo (code, address) = (1, 0x(nil))

  • The stack trace includes functions:

mda__get_procedure_schemas
mda_populate_monCachedProcedures
mda_exec

   Note: A complete stack trace is available under Attachments.

  • The terminated process (spid) didn't release a spinlock Resource->rprocmgr_spin:

Spinlocks held by  kpid 644431738
Spinlock Resource->rprocmgr_spin at address 0x00002aaabdb26a80 owned by 644431738

  • ASE server went down.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR#817925, CR817925, 817925, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, MDA, monCachedProcedures , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.