Symptom
- A user process is infected with Signal 11 at the module mem_pageallocate():
Current process (0x32cb024e) infected with signal 11 (SIGSEGV)
(mem_pageallocate+0x5c), siginfo (code, address) = (1, 0x0004000c000203e8)
- Stack trace shows the following functions:
mem_pageallocate()
mem_getpages()
memalloc()
memalloc_zero()
PssIni()
s_compile_stmt()
s_compile()
Read more...
Environment
- SAP Adaptive server Enterprise (ASE) 15.5
- SAP Adaptive server Enterprise (ASE) 15.7 GA
Product
SAP Adaptive Server Enterprise 15.7 ; Sybase Adaptive Server Enterprise 15.5
Keywords
mem_pageallocate, mem_getpages, memalloc, segmentation, fault, segfault, access, violation, stacktrace , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.