SAP Knowledge Base Article - Preview

2682423 - ASE infected with 11 (SIGSEGV) in site_login_cancel SAP ASE

Symptom

ASE errorlog contains errors and a stacktrace similar to the following:
00:0021:00000:00941:2018/07/03 08:17:36.81 kernel  ssl_server_handshake: vsn 2107 kpid 508628194 enp_sslAccept() failed
00:0023:00000:00000:2018/07/03 08:31:29.06 kernel  ssl_nrpacket: vsn 5646 kpid 535498155 incomplete header
00:0010:00000:00000:2018/07/03 08:36:00.58 server  Timed out waiting for login on logical connection 193
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  Current process (0x0) infected with signal 11 (SIGSEGV)
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  Current Process is running on Engine 2
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  Address 0x0x00000000008a0516 (site_login_cancel+0x13), siginfo (code, address) = (1, 0x0x0000000000000020)
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  **** Saved signal context (0x0x00007f50e4475680): ****
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  uc_flags: 0x1, uc_link: 0x(nil)
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  uc_sigmask: 0x7bfbf037 0xb 0x1 0x20
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  uc_stack: ss_sp: 0x(nil), ss_size: 0x0, ss_flags: 0x2
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  General Registers (uc_mcontext.gregs):
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       PC : 0x00000000008a0516 (site_login_cancel+0x13)
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel          RAX : (nil)  RBX : (nil)
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel          RCX : (nil)  RDX : 0x000000014c33f680
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       RBP : 0x00007f50e4475c40  RSP : 0x00007f50e4475c30
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       R8  : 0x000000014dc20a08  R9  : 0x00000000000151b7
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       R10 : 0x000000014d624670  R11 : (nil)
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       R12 : (nil)  R13 : 0x0000000000000001
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       R14 : 0x00000000047b4828  R15 : 0x00007f50e4475c50
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       RDI : (nil)  RSI : 0x000000000002e6e6
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       RIP : 0x00000000008a0516  CSGSFS : 0x0000000000000033
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       TRAPNO : 0x000000000000000e  ERR : 0x0000000000000004
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel       EFL : 0x0000000000010206
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  **** end of signal context ****
00:0008:00000:00000:2018/07/03 08:38:00.58 kernel  Scheduler infected: exiting

Happens with HADR system where there are commit waits then get ssl error


Read more...

Environment

  • SAP Adaptive Server Enterprise (ASE)  all versions
  • SAP Adaptive Server Enterprise Cluster Edition (ASE CE) all versions
  • jConnect 7.07

 

Product

SAP Adaptive Server Enterprise 12.5 ; SAP Adaptive Server Enterprise 15.7 ; SAP Adaptive Server Enterprise 15.7 Cluster Edition ; SAP Adaptive Server Enterprise 16.0 ; Sybase Adaptive Server Enterprise 12.5 ; Sybase Adaptive Server Enterprise 15.0 ; Sybase Adaptive Server Enterprise 15.5 ; Sybase Adaptive Server Enterprise Cluster Edition 15.0 ; Sybase Adaptive Server Enterprise Cluster Edition 15.5 ; Sybase Adaptive Server Enterprise Cluster Edition 15.7

Keywords

Sybase, infected, signal, SEGV, SIGSEGV, segment violation, storage access violation, kisignal , KBA , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , BC-SYB-ASE-CE , ASE Cluster Edition (Standalone) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.