Symptom
- An "Infected with signal 11" error in the module memcpy() together with a stack trace is reported in the ASE errorlog:
Current process (0xbbd01be) infected with signal 11 (SIGSEGV)
Address 0xffffffff7cb81e78 (memcpy%sun4v-hwcap3+0x3c4), siginfo (code, address) = (1, 0x0000000000000000)
- The stack trace includes the following functions:
memcpy%sun4v-hwcap3
_$o1ceziC0.__1cQLeAlignedDataRowHreadRow6MpCpnILeVtuple_nMLeDRReadMode_iipi_i_
LeCacheRow::freeReadBuf
LeCacheRow::writeRow
LeScrollCache::_insertRow
LeScrollCache::LeCacheInsert
_$o1cezzB0.__1cMLeScrContextOscrCacheInsert6M_v_
_$o1cfacW0.__1cKLeInsScrOpJ_LeOpOpen6MrnHExeCtxt__nKLeRetnCode__
LeOperator::LeOpOpen
LeEmittOp::_LeOpOpen
LeEmitSndOp::_LeOpOpen
LeOperator::LeOpOpen
exec_lava
curs_open
s_execute
Note: A complete stack trace is available under Attachments.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 15.7
- SAP Adaptive Server Enterprise (ASE) 16.0
- Solaris
Product
Keywords
AlignedDataRow::copyOneCol, copyOneCol, CR#821057, CR821057, 821057, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers, traceflag, trace, flag, 16948 , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.