SAP Knowledge Base Article - Preview

2975520 - Signal 11 in STSendMsgs() - SAP ASE 16.0 with HADR

Symptom

  •  ASE errorlog reports an "infected with Signal 11" error in the module STSendMsgs() with a stack trace:

Current process (0x0) infected with signal 11 (SIGSEGV)
Current Process is running on a Non-Engine Thread
Address 0x0x00007fc77252e54c (STSendMsgs+0x374), siginfo (code, address) = (1, 0x0x0000000000000eb8)

  • The stack trace includes the following functions:

STSendMsgs
ubcExecute
kbctMain
krtctskRun
ktskRun
kt__RTCMain
upsleepgeneric
ubcWaitForCompletion
undo_blockingcall_thread
ra_ci_send_CI_message
ra_ci_send_mode_switch_message
ra__ci_background_task_wait_for_srs_ack
ra__ci_background_task

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 16.0
  • SAP Replication Server (SRS) 16.0
  • High Availability Disaster Recovery (HADR)

Product

SAP Adaptive Server Enterprise 16.0 ; SAP Replication Server 16.0

Keywords

CR822998, CR#822998, 822998,  CR813899, 813899, CR#813899, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, async, RAT-CI , KBA , BC-SYB-REP , Sybase Replication Server (standalone) , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.