Symptom
- An "infected with signal 11" error with a stack trace is raised after a malloc() call in the ASE server:
Current process (0xd3f010a) infected with signal 11 (SIGSEGV)
Address 0x090000000004041c (), siginfo (code, address) = (50, 0x0f01001100000108)
- The process (spid) was running a query on the monitoring (MDA) table monSysStatement:
SELECT ... INTO #temptable
from master..monSysStatement
where LogicalReads >= 10000
- The stack trace includes functions:
malloc
vt_mda_getrow
mda_populate_monSysStatement
mda_exec
Note: A complete stack trace is available under Attachments.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 16.0 SP03 PL08
- LPAR on AIX 7.1
Product
Keywords
SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, memory, RAM, operating, system, NMON , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.