SAP Knowledge Base Article - Preview

2834468 - HADR: Signal with 11 in CtlibRemoteAccess::getSubstValue() - SAP ASE

Symptom

  • The ASE errorlog reports an "infected with signal 11" error in the module CtlibRemoteAccess::getSubstValue() along with a stack trace:

Current process (0x38c9003b) infected with signal 11 (SIGSEGV)
Address 0x0x00000000015f752b (CtlibRemoteAccess::getSubstValue(_cs_datafmt*, LeColumn*, int, unsigned char*, int, short)+0x65f), siginfo (code, address) = (1, 0x0x000000000000029c)

  • This impacted process (spdi) is running a procedure involving an INSERT-SELECT query against HADR tables in the saptools database.
  • The stack trace includes the following functions:

CtlibRemoteAccess::getSubstValue
CtlibRemoteAccess::getColumnValues
RPCRemoteAccess::getNext

   Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • High Availability Disaster Recovery (HADR)
  • SAP NetWeaver (NW) - All versions 

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0 ; SAP NetWeaver 7.52 for SAP S/4HANA 1709

Keywords

stacktrace, 814240, CR814240, CR#814240, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, registers, granular, permissions , KBA , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.