SAP Knowledge Base Article - Preview

3043915 - Signal 11 in ra_malloc_mempool() - SAP ASE 16.0

Symptom

  • ASE errorlog reports an "Infected with Signal 11" error in the module ra_malloc_mempool() together with a stack trace: 

Current process (0x1a4b012c) infected with signal 11 (SIGSEGV)
Address 0x0x0000000000f73c9d (ra_malloc_mempool+0x1fe), siginfo (code, address) = (1, 0x0x0000000000000004)

  • The stack trace includes the following functions:

ra_malloc_mempool
ra_ci_sync_wakeup

syslogs_finishlog
finishlog
xact__endxact
xact__commitxact
xact__commit_extenal
xact_commit
astccommitrpc

  Note: A complete stack trace is available under Attachments.

  • The failed process (spid) may be left in the 'sleeping' status and cannot be killed.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0
  • SAP Replication Server (SRS) 16.0
  • High Availability Disaster Recovery (HADR)

Product

SAP Adaptive Server Enterprise 16.0

Keywords

ASTC, Handler, RepAgent, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, CR824491, CR#824491, 824491 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.