Symptom
- A query hit an "infected with signal 11" error in the module dseg_proc_alloc() with a stack trace.
Current process (0x1335301c) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001792468 (dseg_proc_alloc+0x48), siginfo (code, address) = (1, 0x0x00000000ffffffdd) - sp_who shows the status as "infected" for the terminated process (spid):
fid spid status loginame origname hostname blk_spid dbname temp cmd block_xloid threadpool
--- ----- -------- -------- -------- -------- -------- ------ ------ ------- ----------- ------------
0 17293 infected user1 user1 hostname 0 dev tempdb EXECUTE 0 pool_name - The stack trace includes the following functions:
dseg_proc_alloc
s_execute
sequencer
execproc
s_execute
- The affected spid became a zombie process:
Task 322252828 is made zombie because it cannot be cleaned up during its termination. This task may have resources allocated to it.
Read more...
Environment
SAP Adaptive Server Enterprise (ASE) 16.0
Product
SAP Adaptive Server Enterprise 16.0
Keywords
CR827011, CR#827011, 827011, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Known Error
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.