Symptom
- Stored procedure executed in ASE
- Remote procedure called to access a remote server
- CT-Lib call to establish remote connection called
- Attempt made to allocate connection structure on remote server
- Signal 11 in module prADDR()
Current process (0x522404fd) infected with signal 11 (SIGSEGV)
Address 0x0900000000042aec (prADDR__fdpr_1+0x28), siginfo (code, address) = (51, 0x0000000000000010)
- Stack trace includes modules:
prADDR__fdpr_1()
init_before_msg__fdpr_4()
malloc()
ct__mp_alloc()
ct___mm_get_a_block()
ct__mm_alloc()
ct__api_conprop_init()
ct__api_con_init()
ct_con_alloc()
usctconalloc()
omni_connect()
omni_execrproc()
dso_execrproc()
execproc()
execproc()
execrpc__fdpr_5()
Read more...
Environment
- SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 ESD 3
- AIX
Product
Keywords
CR769009, CR#769009, 769009, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.