SAP Knowledge Base Article - Preview

2591095 - Signal 11 in mda_fill_and_send_monProcessWaits() when querying monProcessWaits - SAP ASE

Symptom

  • A query on monProcessWaits fails:

select SPID, KPID, WaitEventID, Waits, WaitTime from master.dbo.monProcessWaits

  • An "infected with signal 11" error in the module mda_fill_and_send_monProcessWaits() with a stack trace is reported in the ASE errorlog:

Current process (0x399d2783) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001815c57 (mda_fill_and_send_monProcessWaits+0xf9), siginfo (code, address) = (1, 0x0x0000000000000230)

  • The stack trace includes the following functions:

mda_fill_and_send_monProcessWaits
mda_std_populate_pid
mda_populate_monProcessWaits
mda_exec
VTABRemoteAccess::getNext
VTABRemoteAccess::startScan
LeScanOp::_LeOpNext
LeEmitSndOp::_LeOpNext
LePlanNext
exec_lava
s_execute

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 SP137
  • SAP Adaptive Server Enterprise (ASE) 16.0 SP02
  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR#812173, 812173, CR812173, mda, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.