SAP Knowledge Base Article - Preview

2895827 - Signal 11 in mda_fill_and_send_monProcessSQLText() - SAP ASE

Symptom

  • A client connection is unexpectedly terminated.
  • ASE errorlog contains an "infected with signal 11" error with a stack trace:

Current process (0x24930c92) infected with signal 11 (SIGSEGV)
Address 0x0900000000046a68 (), siginfo (code, address) = (50, 0x706462207661727b)

  • The stack trace includes the following functions:

free
mda_fill_and_send_monProcessSQLText
mda_std_populate_pid
mda_populate_monProcessSQLText
mda_exec

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • SAP Adaptive Server Enterprise Cluster Edition (ASE CE) 15.7 and 16.0
  • AIX

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; SAP Adaptive Server Enterprise 16.0 ; Sybase Adaptive Server Enterprise Cluster Edition 15.7

Keywords

Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal, CR821038, CR#821038, 821038, monProcessSQLText, MDA, stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.