SAP Knowledge Base Article - Preview

2722607 - Signal 11 kbfalloc with ra_malloc_mempool on stack - SAP ASE

Symptom

  • Client connection is unexpectedly terminated.
  • Replication Agent Secondary Truncation Point (STP) Manager thread terminated abnormally.
  • ASE errorlog contains an "infected with signal 11 error" in the module kbfalloc() with a stack trace, for example:

Current process (0x2b5015b) infected with signal 11 (SIGSEGV)
Address 0x0x000000000214ad72 (kbfalloc+0x542), siginfo (code, address) = (1, 0x0x0000000000000009)

  • The stack trace includes the following functions:

kbfalloc
ubfallocf
ra_mempool_alloc_internal
ra_malloc_mempool

   Note: Examples of complete stack traces are available under Attachments.

  • Replication Agent is used for streaming replication.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03 PL04
  • High Availability Disaster Recovery (HADR)

Product

SAP Adaptive Server Enterprise 16.0

Keywords

Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal, CR812678, CR#812678, 812678, CR814923, CR#814923, 814923. stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.