Symptom
- Signal 11 stack trace in kbfalloc() in ASE errorlog:
Current process (0x12c706a7) infected with signal 11 (SIGSEGV)
Address 0x00000001004e6bcc (kbfalloc+0x11c), siginfo (code, address) = (50, 0x17293c50657b92c2)
- Process holding spinlock on Network Memory Pool:
Spinlock Network memory pool spinlock at address 0000000167a27260 owned by 315033255
- Stack trace shows RSA decryption modules, among others:
kbfalloc
ks_falloc
csi_malloc
local_malloc
default_malloc_ex
CRYPTO_malloc
BN_mod_exp_mont_consttime
BN_mod_exp_mont__fdpr_3
RSA_eay_mod_exp
RSA_eay_private_decrypt
RSA_private_decrypt
- Configuration parameter 'net password encryption reqd' turned on.
- OpenSSL may be in use.
- Timeslice errors may also be reported.
- ASE receiving heavy load of incoming connection attempts.
- ASE crashes.
Read more...
Environment
- SAP Adaptive Server Enterprise (ASE) 15.7
- SAP Adaptive Server Enterprise (ASE) 16.0
- SAP/Sybase Adaptive Server Enterprise (ASE) 15.0
- SAP/Sybase Adaptive Server Enterprise (ASE) 15.5
Product
Keywords
encrypt, decrypt, sha256, ssl, SEGV, segmentation, storage, access, violation, fault, segfault, kisignal, stacktrace, registers , KBA , server panic , memory corruption , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.