SAP Knowledge Base Article - Preview

2228168 - signal 11 at address _memcpy followed by stack trace occurred - SAP ASE


  • A user session terminates unexpectedly.

  • The ASE error log contains a message 'infected with signal 11' at address memcpy.

  • The ASE error log will include entries and a stack trace including the following(offsets will vary by platform and version):
  • Current process (hex#) infected with signal 11 (SIGSEGV)
  • Address hex# (_memcpy+0xbc)
  • _memcpy+0xbc
  • LeAlignedDataRow::readRow
  • LeCacheRow::freeReadBuf
  • LeCacheRow::writeRow



SAP Adaptive Server Enterprise (ASE) 15.7


SAP Adaptive Server Enterprise 15.7


_memcpy+0xbc , memcpy+0xbc , memcpy, memcopy , _$o1cezeZ0.__1cQLeAlignedDataRowHreadRow6MpCpnILeVtuple_nMLeDRReadMode_iipi_i_+0x1dc , LeAlignedDataRow::readRow , LeCacheRow::freeReadBuf
LeCacheRow::writeRow , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.