SAP Knowledge Base Article - Preview

2212272 - Signal 11 in mda_fill_and_send_monProcessObject() - SAP ASE

Symptom

  • Signal 11 in the module mda_fill_and_send_monProcessObject() followed by a stack trace was reported in the ASE errorlog:

Current process (0x4dab059a) infected with signal 11 (SIGSEGV)
Address 0x000000010241ed40 (mda_fill_and_send_monProcessObject+0x274), siginfo (code, address) = (50, 0x0000000013bb8800)

  • SQL causing error as shown in the ASE errorlog:

insert #monProcessObject (...) select... from  master..monProcessObject

  • The stack trace includes modules:

mda_fill_and_send_monProcessObject
mda_std_populate_pid
mda_populate_monProcessObject
mda_exec
VTABRemoteAccess::startScan
LeInsertOp::_LeOpNext
LeEmitNoSndOp::_LeOpNext
LePlanNext
internal_sql


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • SAP Adaptive Server Enterprise Cluster Edition (ASE CE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; SAP Adaptive Server Enterprise 16.0 ; SAP Adaptive Server Enterprise 16.0 Cluster Edition

Keywords

CR787966, CR#787966, 787966, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.