SAP Knowledge Base Article - Preview

2554290 - Signal 11 in __milli_memcpy() - SAP ASE

Symptom

  • A client connection is unexpectedly terminated.
  • ASE errorlog contains an "infected with siganl 11" error in the module __milli_memcpy() with a stack trace:

Current process (0x6a150398) infected with signal 11 (SIGSEGV)
Address 0x4000000006ee8870 (__milli_memcpy+0xf30), siginfo (code, address) = (1, 0x000000006c360a00)

  • The stack trace includes the following functions:

__milli_memcpy
recvhost
tdsrecv_params

tdsrecv__process_batchparam
tdsrecv__dynexec_batch
tdsrecv__dynexec

  Note: A complete stack trace is available in the Attachments section.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) version 15.7
  • SAP Adaptive Server Enterprise (ASE) version 16.0
  • Java jConnect client application

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

Sybase, ASEServer, SAPASE, dataserver, jConnect, java, smallint, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, INSERT, TINYINT, datatype , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.