Symptom
- An "Infected with signal 11" error in the module mda__get_procedure_schemas() together with a stack trace is reported in the ASE errorlog:
Current process (0x26693f7a) infected with signal 11 (SIGSEGV)
Address 0x0x000000000140a0e0 (mda__get_procedure_schemas+0x97), siginfo (code, address) = (1, 0x(nil))
- The stack trace includes functions:
mda__get_procedure_schemas
mda_populate_monCachedProcedures
mda_exec
Note: A complete stack trace is available under Attachments.
- The terminated process (spid) didn't release a spinlock Resource->rprocmgr_spin:
Spinlocks held by kpid 644431738
Spinlock Resource->rprocmgr_spin at address 0x00002aaabdb26a80 owned by 644431738
- ASE server went down.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 16.0
Product
Keywords
CR#817925, CR817925, 817925, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, MDA, monCachedProcedures , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.