SAP Knowledge Base Article - Preview

2755225 - Signal 11 in mda__get_procedure_schemas() - SAP ASE 16.0

Symptom

  • An "Infected with signal 11" error in the module mda__get_procedure_schemas() together with a stack trace is reported in the ASE errorlog:

Current process (0x26693f7a) infected with signal 11 (SIGSEGV)
Address 0x0x000000000140a0e0 (mda__get_procedure_schemas+0x97), siginfo (code, address) = (1, 0x(nil))

  • The stack trace includes functions:

mda__get_procedure_schemas
mda_populate_monCachedProcedures
mda_exec

   Note: A complete stack trace is available under Attachments.

  • The terminated process (spid) didn't release a spinlock Resource->rprocmgr_spin:

Spinlocks held by  kpid 644431738
Spinlock Resource->rprocmgr_spin at address 0x00002aaabdb26a80 owned by 644431738

  • ASE server went down.


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 16.0

Product

SAP Adaptive Server Enterprise 16.0

Keywords

CR#817925, CR817925, 817925, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, MDA, monCachedProcedures , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.