SAP Knowledge Base Article - Preview

2144373 - Signal 11 in __milli_memcpy - SAP ASE

Symptom

ASE getting  stack trace with signal 11 in __milli_memcpy with following modules:

 Current process (0x4f0220) infected with signal 11 (SIGSEGV)
 Address 0x400000000674cdc0 (__milli_memcpy+0x100), siginfo (code, address) = (1, 0x0101011400000005)

ucstkgentrace+0xb70
ucbacktrace+0x140
$cold_terminate_process+0x1df0
kisignal+0x530
<signal handler called>
__milli_memcpy+0x100
bt__getrestartkey+0x340
bt__getrestartpg+0x90
bt__handle_reposition+0x80
bt_getnext+0xe50
dol_bt_getnext+0xba0
getnext+0x320
_ZN8LeScanOp9_LeOpNextER7ExeCtxt+0x490
_ZN7LeNLJOp9_LeOpNextER7ExeCtxt+0x220
_ZN11LeNaryNLJOp9_LeOpNextER7ExeCtxt+0x280
_Z17LeSortInputStreamPPvP7sortdesP8datapage+0x330

 


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • SAP Adaptive Server Enterprise (ASE CE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; Sybase Adaptive Server Enterprise 15.5

Keywords

signal, stacktrace,startsort , KBA , memory corruption , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.