SAP Knowledge Base Article - Preview

2065981 - Signal 11 stack trace in module prADDR() - SAP ASE

Symptom

  • Stored procedure executed in ASE
  • Remote procedure called to access a remote server
  • CT-Lib call to establish remote connection called
  • Attempt made to allocate connection structure on remote server
  • Signal 11 in module prADDR()

Current process (0x522404fd) infected with signal 11 (SIGSEGV)
Address 0x0900000000042aec (prADDR__fdpr_1+0x28), siginfo (code, address) = (51, 0x0000000000000010)

  • Stack trace includes modules:

prADDR__fdpr_1()
init_before_msg__fdpr_4()
malloc()
ct__mp_alloc()
ct___mm_get_a_block()
ct__mm_alloc()
ct__api_conprop_init()
ct__api_con_init()
ct_con_alloc()
usctconalloc()
omni_connect()
omni_execrproc()
dso_execrproc()
execproc()
execproc()
execrpc__fdpr_5()


Read more...

Environment

  • SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 ESD 3
  • AIX

Product

Sybase Adaptive Server Enterprise 15.0

Keywords

CR769009, CR#769009, 769009, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  stack, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.