SAP Knowledge Base Article - Preview

2975520 - Signal 11 in STSendMsgs() - SAP ASE 16.0 with HADR

Symptom

  •  ASE errorlog reports an "infected with Signal 11" error in the module STSendMsgs() with a stack trace:

Current process (0x0) infected with signal 11 (SIGSEGV)
Current Process is running on a Non-Engine Thread
Address 0x0x00007fc77252e54c (STSendMsgs+0x374), siginfo (code, address) = (1, 0x0x0000000000000eb8)

  • The stack trace includes the following functions:

STSendMsgs
ubcExecute
kbctMain
krtctskRun
ktskRun
kt__RTCMain
upsleepgeneric
ubcWaitForCompletion
undo_blockingcall_thread
ra_ci_send_CI_message
ra_ci_send_mode_switch_message
ra__ci_background_task_wait_for_srs_ack
ra__ci_background_task

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0
  • SAP Replication Server (SRS) 16.0
  • High Availability Disaster Recovery (HADR)

Product

SAP Adaptive Server Enterprise 16.0 ; SAP Replication Server 16.0

Keywords

CR822998, CR#822998, 822998,  CR813899, 813899, CR#813899, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, async, RAT-CI , KBA , BC-SYB-REP , Sybase Replication Server (standalone) , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.