Symptom
- An "Infected with signal 11" error in the module mda__get_procedure_schemas() together with a stack trace is reported in the ASE errorlog:
Current process (0x26693f7a) infected with signal 11 (SIGSEGV)
Address 0x0x000000000140a0e0 (mda__get_procedure_schemas+0x97), siginfo (code, address) = (1, 0x(nil))
- The stack trace includes functions:
mda__get_procedure_schemas
mda_populate_monCachedProcedures
mda_exec
Note: A complete stack trace is available under Attachments.
- The terminated process (spid) didn't release a spinlock Resource->rprocmgr_spin:
Spinlocks held by kpid 644431738
Spinlock Resource->rprocmgr_spin at address 0x00002aaabdb26a80 owned by 644431738
- ASE server went down.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 16.0
Product
Keywords
CR#817925, CR817925, 817925, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, MDA, monCachedProcedures , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview