Symptom
- An "infected with signal 11" error with a stack trace is raised after a malloc() call in the ASE server:
Current process (0xd3f010a) infected with signal 11 (SIGSEGV)
Address 0x090000000004041c (), siginfo (code, address) = (50, 0x0f01001100000108)
- The process (spid) was running a query on the monitoring (MDA) table monSysStatement:
SELECT ... INTO #temptable
from master..monSysStatement
where LogicalReads >= 10000
- The stack trace includes functions:
malloc
vt_mda_getrow
mda_populate_monSysStatement
mda_exec
Note: A complete stack trace is available under Attachments.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 16.0 SP03 PL08
- LPAR on AIX 7.1
Product
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, memory, RAM, operating, system, NMON , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview