SAP Knowledge Base Article - Preview

2918594 - Signal 11 after malloc() in a query on monSysStatement - SAP ASE

Symptom

  • An "infected with signal 11" error with a stack trace is raised after a malloc() call in the ASE server:

Current process (0xd3f010a) infected with signal 11 (SIGSEGV)
Address 0x090000000004041c (), siginfo (code, address) = (50, 0x0f01001100000108)

  • The process (spid) was running a query on the monitoring (MDA) table monSysStatement:

SELECT ... INTO #temptable
from master..monSysStatement

where LogicalReads >= 10000 

  • The stack trace includes functions:

malloc 
vt_mda_getrow 
mda_populate_monSysStatement
mda_exec

    Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03 PL08
  • LPAR on AIX 7.1

Product

SAP Adaptive Server Enterprise 16.0

Keywords

SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, memory, RAM, operating, system, NMON , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.