Symptom
- Client connection unexpectedly terminated.
- The ASE errorlog contains an "infected with signal 11" error with an "Address:" line showing the function STSendMsgs():
Current process (0x0) infected with signal 11 (SIGSEGV)
Current Process is running on a Non-Engine Thread
Address 0x0x00007f331af7d61a (STSendMsgs+0x3a2), siginfo (code, address) = (1, 0x0x0000000000000eb8)
- The erorr is followed by a stack trace that includes these functions:
STSendMsgs
ubcWaitForCompletion
undo_blockingcall_thread
ra_ci_send_CI_message
ra_ci_send_mode_switch_message
ra__ci_background_task_wait_for_srs_ack
ra__ci_background_task
along with the message:
Blocking call executing on behalf of xxxxxxx failed with exception.
Note: A complete stack trace is available under Attachments.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 16.0
- SAP Replication Server (SRS) 16.0
- High Availability Disaster Recovery (HADR)
Product
Keywords
Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal, CR#825255, CR825255, 825255
, KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview