Symptom
- Signal 11 in the module mda_calc_proc_hdr_mem_KB() when querying the MDA table monCachedProcedures:
Current process (0x685b00cb) infected with signal 11 (SIGSEGV)
Address 0x0x000000000180868c (mda_calc_proc_hdr_mem_KB+0xc), siginfo (code, address) = (128, 0x(nil))
- Stack trace may include the following modules:
mda_calc_proc_hdr_mem_KB
mda_populate_monCachedProcedures
mda_exec
VTABRemoteAccess::getNext
VTABRemoteAccess::startScan
Note: A complete stack trace is available under Attachments.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 15.7
Product
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.