- An "infected with signal 11" error with a stack trace is raised after a malloc() call in the ASE server:
Current process (0xd3f010a) infected with signal 11 (SIGSEGV)
Address 0x090000000004041c (), siginfo (code, address) = (50, 0x0f01001100000108)
- The process (spid) was running a query on the monitoring (MDA) table monSysStatement:
SELECT ... INTO #temptable
where LogicalReads >= 10000
- The stack trace includes functions:
Note: A complete stack trace is available under Attachments.
- SAP Adaptive Server Enterprise (ASE) 16.0 SP03 PL08
- LPAR on AIX 7.1
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, memory, RAM, operating, system, NMON , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.