SAP Knowledge Base Article - Preview

2877231 - Signal 11 in strn0cpy() when "dbcc workload_capture(start)" is executed - SAP ASE

Symptom

  • When the "dbcc workload_capture(start)" command is executed
  • An "Infected with signal 11" error in the module strn0cpy() together with a stack trace is reported in the ASE errorlog:

Current process (0x230012) infected with signal 11 (SIGSEGV)
Address 0x0x0000000001028131 (strn0cpy+0x21), siginfo (code, address) = (1, 0x0x0000000000000200)

  •  The stack trace includes functions:

strn0cpy
worcap_admin
d_worcap_start
d_worcap 
exec_dbcc

  Note: A complete stack trace is available under Attachments.


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE) 15.7 and 16.0
  • Workload Analyzer

Product

SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 16.0

Keywords

CR814980, CR#814980, 814980, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace,  registers , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.