SAP Knowledge Base Article - Preview

2212272 - Signal 11 in mda_fill_and_send_monProcessObject() - SAP ASE

Symptom

  • Signal 11 in the module mda_fill_and_send_monProcessObject() followed by a stack trace was reported in the ASE errorlog:

Current process (0x4dab059a) infected with signal 11 (SIGSEGV)
Address 0x000000010241ed40 (mda_fill_and_send_monProcessObject+0x274), siginfo (code, address) = (50, 0x0000000013bb8800)

  • SQL causing error as shown in the ASE errorlog:

insert #monProcessObject (...) select... from  master..monProcessObject

  • The stack trace includes modules:

mda_fill_and_send_monProcessObject
mda_std_populate_pid
mda_populate_monProcessObject
mda_exec
VTABRemoteAccess::startScan
LeInsertOp::_LeOpNext
LeEmitNoSndOp::_LeOpNext
LePlanNext
internal_sql


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • SAP Adaptive Server Enterprise Cluster Edition (ASE CE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; SAP Adaptive Server Enterprise 16.0 ; SAP Adaptive Server Enterprise 16.0 Cluster Edition

Keywords

CR787966, CR#787966, 787966, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.