- When the "dbcc workload_capture(start)" command is executed
- An "Infected with signal 11" error in the module strn0cpy() together with a stack trace is reported in the ASE errorlog:
Current process (0x230012) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001028131 (strn0cpy+0x21), siginfo (code, address) = (1, 0x0x0000000000000200)
- The stack trace includes functions:
Note: A complete stack trace is available under Attachments.
- SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
- Workload Analyzer
CR814980, CR#814980, 814980, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.