Symptom
- A client connection is unexpectedly terminated.
- ASE errorlog contains an "infected with siganl 11" error in the module __milli_memcpy() with a stack trace:
Current process (0x6a150398) infected with signal 11 (SIGSEGV)
Address 0x4000000006ee8870 (__milli_memcpy+0xf30), siginfo (code, address) = (1, 0x000000006c360a00)
- The stack trace includes the following functions:
__milli_memcpy
recvhost
tdsrecv_params
tdsrecv__process_batchparam
tdsrecv__dynexec_batch
tdsrecv__dynexec
Note: A complete stack trace is available in the Attachments section.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) version 15.7
- SAP Adaptive Server Enterprise (ASE) version 16.0
- Java jConnect client application
Product
Keywords
Sybase, ASEServer, SAPASE, dataserver, jConnect, java, smallint, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, INSERT, TINYINT, datatype , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview