SAP Knowledge Base Article - Preview

2877231 - Signal 11 in strn0cpy() when "dbcc workload_capture(start)" is executed - SAP ASE

Symptom

  • When the "dbcc workload_capture(start)" command is executed
  • An "Infected with signal 11" error in the module strn0cpy() together with a stack trace is reported in the ASE errorlog:

Current process (0x230012) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001028131 (strn0cpy+0x21), siginfo (code, address) = (1, 0x0x0000000000000200)

  •  The stack trace includes functions:

strn0cpy
worcap_admin
d_worcap_start
d_worcap 
exec_dbcc

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • Workload Analyzer

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR814980, CR#814980, 814980, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.