Symptom
- Stored procedure executed in ASE
- Remote procedure called to access a remote server
- CT-Lib call to establish remote connection called
- Attempt made to allocate connection structure on remote server
- Signal 11 in module prADDR()
Current process (0x522404fd) infected with signal 11 (SIGSEGV)
Address 0x0900000000042aec (prADDR__fdpr_1+0x28), siginfo (code, address) = (51, 0x0000000000000010)
- Stack trace includes modules:
prADDR__fdpr_1()
init_before_msg__fdpr_4()
malloc()
ct__mp_alloc()
ct___mm_get_a_block()
ct__mm_alloc()
ct__api_conprop_init()
ct__api_con_init()
ct_con_alloc()
usctconalloc()
omni_connect()
omni_execrproc()
dso_execrproc()
execproc()
execproc()
execrpc__fdpr_5()
Read more...
Environment
- SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 ESD 3
- AIX
Product
Keywords
CR769009, CR#769009, 769009, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, stack, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.
SAP Knowledge Base Article - Preview