SAP Knowledge Base Article - Preview

2895827 - Signal 11 in mda_fill_and_send_monProcessSQLText() - SAP ASE

Symptom

  • A client connection is unexpectedly terminated.
  • ASE errorlog contains an "infected with signal 11" error with a stack trace:

Current process (0x24930c92) infected with signal 11 (SIGSEGV)
Address 0x0900000000046a68 (), siginfo (code, address) = (50, 0x706462207661727b)

  • The stack trace includes the following functions:

free
mda_fill_and_send_monProcessSQLText
mda_std_populate_pid
mda_populate_monProcessSQLText
mda_exec

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • SAP Adaptive Server Enterprise Cluster Edition (ASE CE) 15.7 and 16.0
  • AIX

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; SAP Adaptive Server Enterprise 16.0 ; Sybase Adaptive Server Enterprise Cluster Edition 15.7

Keywords

Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal, CR821038, CR#821038, 821038, monProcessSQLText, MDA, stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.