SAP Knowledge Base Article - Preview

2030011 - Infected with Signal 11 in kstcpnetctlrCancelRequests() leaving the ASE server in a hung state -SAP ASE

Symptom

  • SAP Adaptive Server Enterprise (ASE) running in threaded kernel mode on the Linux or HPUX operating systems hit "infected with signal 11" in the kstcpnetctlrCancelRequests() module. For example:

kernel Current process (0x0) infected with signal 11 (SIGSEGV)
kernel Cannot send, host process disconnected: GLON19P10175 21348 suid: 393
kernel Address 0x0x000000000153dd4a (kstcpnetctlrCancelRequests+0x97), siginfo (code, address) = (1, 0x(nil))

  • The stack trace may include ulpspinlock() and the following modules:

kstcpnetctlrCancelRequests()
ksepollnetctlrWaitForCompletion()
iocRunController()
krtctskRun()

  • ASE becomes non-responsive.  


Read more...

Environment

SAP Adaptive Server Enterprise (ASE) 15.7.x

Product

SAP Adaptive Server Enterprise 15.7

Keywords

Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal, ulpspinlock ,  kstcpnetctlrCancelRequests , ksepollnetctlrWaitForCompletion , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.