Symptom
- A user process is infected with Signal 11 at the module mem_pageallocate():
Current process (0x32cb024e) infected with signal 11 (SIGSEGV)
(mem_pageallocate+0x5c), siginfo (code, address) = (1, 0x0004000c000203e8)
- Stack trace shows the following functions:
mem_pageallocate()
mem_getpages()
memalloc()
memalloc_zero()
PssIni()
s_compile_stmt()
s_compile()
Read more...
Environment
- SAP Adaptive server Enterprise (ASE) 15.5
- SAP Adaptive server Enterprise (ASE) 15.7 GA
Product
SAP Adaptive Server Enterprise 15.7 ; Sybase Adaptive Server Enterprise 15.5
Keywords
mem_pageallocate, mem_getpages, memalloc, segmentation, fault, segfault, access, violation, stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview