SAP Knowledge Base Article - Preview

2236656 - Infected with 11 at address mda_populate_monSpinlockActivity - SAP ASE

Symptom

  • ASE is terminating the user process
  • ASE log report a signal 11 (Unix) or storage access violation (Windows) in function "mda_populate_monSpinlockActivity"
  • The ASE contains a stack trace containing functions including:
mda_populate_monSpinlockActivity
mda_exec
VTABRemoteAccess::getNext
VTABRemoteAccess::startScan

Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7
  • SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

mda_populate_monSpinlockActivity+0x42d(), mda_exec+0xb2(), VTABRemoteAccess::getNext()+0x527(), VTABRemoteAccess::startScan(short, short, bool)+0x112(), LeScanOp::_LeOpNext(ExeCtxt&)+0x7bd(), LeInsertOp::_LeOpNext(ExeCtxt&)+0x14a(), LeEmitNoSndOp::_LeOpNext(ExeCtxt&)+0x1aa(), LePlanNext+0xf7(), sybase
  , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.