SAP Knowledge Base Article - Preview

2918594 - Signal 11 after malloc() in a query on monSysStatement - SAP ASE

Symptom

  • An "infected with signal 11" error with a stack trace is raised after a malloc() call in the ASE server:

Current process (0xd3f010a) infected with signal 11 (SIGSEGV)
Address 0x090000000004041c (), siginfo (code, address) = (50, 0x0f01001100000108)

  • The process (spid) was running a query on the monitoring (MDA) table monSysStatement:

SELECT ... INTO #temptable
from master..monSysStatement

where LogicalReads >= 10000 

  • The stack trace includes functions:

malloc 
vt_mda_getrow 
mda_populate_monSysStatement
mda_exec

    Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03 PL08
  • LPAR on AIX 7.1

Product

SAP Adaptive Server Enterprise 16.0

Keywords

SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, memory, RAM, operating, system, NMON , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.