SAP Knowledge Base Article - Preview

3311430 - Infected with Signal 11 in module _memcpy - SAP ASE

Symptom

  • ASE receive a signal 11 error in the module _memcpy together with a stack trace:
    Current process (0x3230192) infected with signal 11 (SIGSEGV)
    Address 0xffffffff78a215d4 (_memcpy%sun4v-hwcap5+0x40), siginfo (code, address) = (1, 0x0000000000000000)
  • The stack may include the following modules:
    _memcpy
    AnyDataType*AnyDataType::AnyConvertType 
    EmbedDataSet*EmbedDataSet::embedConvertType
    int PecConjPredicate::_roundTrip
    PeBasicPredicate*PecConjPredicate::_doXlate
    PeBasicPredicate*PecConjPredicate::getXlatedPred
    void PtInterval::anyAddPredRg
    void PesState::PesBuildFromConj
    void OptBlock::OptDoPredElim
    void traverse_top_down
    void traverse_list
    void OptGlobal::_GblSearchEngine


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7
  • SAP Adaptive Server Enterprise (ASE) 16.0

Keywords

CR 711521, signal 11, _memcpy , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.