2065981 - Signal 11 stack trace in module prADDR() - SAP ASE | SAP Knowledge Base Article

SAP Knowledge Base Article - Preview

2065981 - Signal 11 stack trace in module prADDR() - SAP ASE

Symptom

  • Stored procedure executed in ASE
  • Remote procedure called to access a remote server
  • CT-Lib call to establish remote connection called
  • Attempt made to allocate connection structure on remote server
  • Signal 11 in module prADDR()

Current process (0x522404fd) infected with signal 11 (SIGSEGV)
Address 0x0900000000042aec (prADDR__fdpr_1+0x28), siginfo (code, address) = (51, 0x0000000000000010)

  • Stack trace includes modules:

prADDR__fdpr_1()
init_before_msg__fdpr_4()
malloc()
ct__mp_alloc()
ct___mm_get_a_block()
ct__mm_alloc()
ct__api_conprop_init()
ct__api_con_init()
ct_con_alloc()
usctconalloc()
omni_connect()
omni_execrproc()
dso_execrproc()
execproc()
execproc()
execrpc__fdpr_5()


Read more...

Environment

  • SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 ESD 3
  • AIX

Product

Sybase Adaptive Server Enterprise 15.0

Keywords

CR769009, CR#769009, 769009, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  stack, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.