SAP Knowledge Base Article - Preview

2516401 - Signal 11 in mda_calc_proc_hdr_mem_KB() - SAP ASE

Symptom

  • Signal 11 in the module mda_calc_proc_hdr_mem_KB() when querying the MDA table monCachedProcedures:

Current process (0x685b00cb) infected with signal 11 (SIGSEGV)
Address 0x0x000000000180868c (mda_calc_proc_hdr_mem_KB+0xc), siginfo (code, address) = (128, 0x(nil))     

  • Stack trace may include the following modules:

mda_calc_proc_hdr_mem_KB
mda_populate_monCachedProcedures
mda_exec
VTABRemoteAccess::getNext
VTABRemoteAccess::startScan

Note: A complete stack trace is available under Attachments.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7

Product

SAP Adaptive Server Enterprise 15.7

Keywords

SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  stack, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.