Symptom
- Signal 11 in the module mda_fill_and_send_monProcessObject() followed by a stack trace was reported in the ASE errorlog:
Current process (0x4dab059a) infected with signal 11 (SIGSEGV)
Address 0x000000010241ed40 (mda_fill_and_send_monProcessObject+0x274), siginfo (code, address) = (50, 0x0000000013bb8800)
- SQL causing error as shown in the ASE errorlog:
insert #monProcessObject (...) select... from master..monProcessObject
- The stack trace includes modules:
mda_fill_and_send_monProcessObject
mda_std_populate_pid
mda_populate_monProcessObject
mda_exec
VTABRemoteAccess::startScan
LeInsertOp::_LeOpNext
LeEmitNoSndOp::_LeOpNext
LePlanNext
internal_sql
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
- SAP Adaptive Server Enterprise Cluster Edition (ASE CE) 15.7 and 16.0
Product
Keywords
CR787966, CR#787966, 787966, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview