SAP Knowledge Base Article - Preview

2228168 - signal 11 at address _memcpy followed by stack trace occurred - SAP ASE


  • A user session terminates unexpectedly.

  • The ASE error log contains a message 'infected with signal 11' at address memcpy.

  • The ASE error log will include entries and a stack trace including the following(offsets will vary by platform and version):
  • Current process (hex#) infected with signal 11 (SIGSEGV)
  • Address hex# (_memcpy+0xbc)
  • _memcpy+0xbc
  • LeAlignedDataRow::readRow
  • LeCacheRow::freeReadBuf
  • LeCacheRow::writeRow



SAP Adaptive Server Enterprise (ASE) 15.7


SAP Adaptive Server Enterprise 15.7


 _memcpy+0xbc , memcpy+0xbc , memcpy, memcopy , _$o1cezeZ0.__1cQLeAlignedDataRowHreadRow6MpCpnILeVtuple_nMLeDRReadMode_iipi_i_+0x1dc , LeAlignedDataRow::readRow , LeCacheRow::freeReadBuf
LeCacheRow::writeRow  , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-DB-SYB , Business Suite on Adaptive Server Enterprise , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.