SAP Knowledge Base Article - Preview

2486754 - Signal 11 in stackmda_populate_monSysExecutionTimetrace() when accessing monSysExecutionTime - SAP ASE

Symptom

  • A user connection may be terminated unexpectedly.
  • An "infected with signal 11" error in the module stackmda_populate_monSysExecutionTimetrace() together with a stack trace is reported in the ASE errorlog:

Current process (0x642b131e) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001432a89 (mda_populate_monSysExecutionTime+0x7b), siginfo (code, address) = (1, 0x(nil))

  • The stack trace contains the following functions:

mda_populate_monSysExecutionTime
mda_exec
VTABRemoteAccess::startScan

  Note: A complete stack trace is available under Attachments.

  • There must also be another process disconnecting from the ASE at the same time.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • SAP Adaptive Server Enterprise Cluster Edition (ASE CE) 15.7 

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; SAP Adaptive Server Enterprise 16.0

Keywords

CR808804, CR#808804, 808804, Sybase, ASEServer, SAPASE, dataserver, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, CR#803956, CR803956, 803956 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.