SAP Knowledge Base Article - Preview

2722607 - Signal 11 kbfalloc with ra_malloc_mempool on stack - SAP ASE

Symptom

  • Client connection is unexpectedly terminated.
  • Replication Agent Secondary Truncation Point (STP) Manager thread terminated abnormally.
  • ASE errorlog contains an "infected with signal 11 error" in the module kbfalloc() with a stack trace, for example:

Current process (0x2b5015b) infected with signal 11 (SIGSEGV)
Address 0x0x000000000214ad72 (kbfalloc+0x542), siginfo (code, address) = (1, 0x0x0000000000000009)

  • The stack trace includes the following functions:

kbfalloc
ubfallocf
ra_mempool_alloc_internal
ra_malloc_mempool

   Note: Examples of complete stack traces are available under Attachments.

  • Replication Agent is used for streaming replication.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0 SP03 PL04
  • High Availability Disaster Recovery (HADR)

Product

SAP Adaptive Server Enterprise 16.0

Keywords

Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal, CR812678, CR#812678, 812678, CR814923, CR#814923, 814923. stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.