2144373 - Stack trace with signal 11 in __milli_memcpy - SAP ASE | SAP Knowledge Base Article

SAP Knowledge Base Article - Preview

2144373 - Stack trace with signal 11 in __milli_memcpy - SAP ASE

Symptom

ASE getting  stack trace with signal 11 in __milli_memcpy with following modules:

 Current process (0x4f0220) infected with signal 11 (SIGSEGV)
 Address 0x400000000674cdc0 (__milli_memcpy+0x100), siginfo (code, address) = (1, 0x0101011400000005)

ucstkgentrace+0xb70
ucbacktrace+0x140
$cold_terminate_process+0x1df0
kisignal+0x530
<signal handler called>
__milli_memcpy+0x100
bt__getrestartkey+0x340
bt__getrestartpg+0x90
bt__handle_reposition+0x80
bt_getnext+0xe50
dol_bt_getnext+0xba0
getnext+0x320
_ZN8LeScanOp9_LeOpNextER7ExeCtxt+0x490
_ZN7LeNLJOp9_LeOpNextER7ExeCtxt+0x220
_ZN11LeNaryNLJOp9_LeOpNextER7ExeCtxt+0x280
_Z17LeSortInputStreamPPvP7sortdesP8datapage+0x330

 


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • SAP Adaptive Server Enterprise (ASE CE) 15.7 and 16.0

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; Sybase Adaptive Server Enterprise 15.5

Keywords

signal, stacktrace,startsort , KBA , memory corruption , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.