SAP Knowledge Base Article - Preview

2548566 - Stack trace in _dsi_exec_send_cmd in Replication Server 15.7 - SRS

Symptom

  • SAP Replication Server (SRS)
  • DSI EXEC infected with signal 11
  • The STACK TRACE contains the following modules:

       dbg_dump_stack
       exc__appDumpStack
       exc_terminate
       linux_catch_signal
       /lib64/libpthread.so.0
       unknown dynamic function
       _dsi_exec
       dsi__ExecThread
       _dsi_exec_send_cmd
      
    dsi__seqInternalCheck
      
    dsi__seqSubmitCheck
      
    dsi__seqCheckSequence
      
    _dsi_exec
      
    _dsi_qm_exec_cmd
      
    dsie__GenerateSQL ()
       dsie__ProcessGroup ()
       dsie__main ()
       dsie__wrap ()
       srv__start_function ()
       unknown dynamic function
       unknown dynamic function

Read more...

Environment

  • SAP Replication Server (SRS) 15.7/P (GA)
  • Linux on x86_64 64bit

 

Product

SAP Replication Server 15.7

Keywords

KBA , BC-SYB-REP , Sybase Replication Server (standalone) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.