SAP Knowledge Base Article - Preview

2554290 - Signal 11 in __milli_memcpy() - SAP ASE

Symptom

  • A client connection is unexpectedly terminated.
  • ASE errorlog contains an "infected with siganl 11" error in the module __milli_memcpy() with a stack trace:

Current process (0x6a150398) infected with signal 11 (SIGSEGV)
Address 0x4000000006ee8870 (__milli_memcpy+0xf30), siginfo (code, address) = (1, 0x000000006c360a00)

  • The stack trace includes the following functions:

__milli_memcpy
recvhost
tdsrecv_params

tdsrecv__process_batchparam
tdsrecv__dynexec_batch
tdsrecv__dynexec

  Note: A complete stack trace is available in the Attachments section.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) version 15.7
  • SAP Adaptive Server Enterprise (ASE) version 16.0
  • Java jConnect client application

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

Sybase, ASEServer, SAPASE, dataserver, jConnect, java, smallint, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers, INSERT, TINYINT, datatype , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.