ubuntu 20.04 freeze when compiling kernel modules - virtual-machine

I'm using ubuntu20.04 in vmware workstation. I allocate 8 cpu cores, 6G RAM, 4G swap and enough free disk space(at least 25G) to ubuntu20.04. But after running make modules -j4 for about 30 minutes the whole system freezes. The only thing I can do is moving the cursor in virtual machine, the click doesn't get response. When I click "hang up the vm" I get error "cannot hang up vm". After trying several times I can hang it up successsfully. And after I press "continue vm" vm works again but after running about 30 min the situation just occurs again.
gcc version, kernel version are listed below:(they are both compiling linux-4.8.5 kernel source code)
user#ubuntu:~$ gcc --version
gcc (GCC) 4.8.5
Copyright (C) 2015 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
user#ubuntu:~$ uname -r
5.15.57
user#centos7:~$ gcc --version
gcc (GCC) 4.8.5 20150623 (Red Hat 4.8.5-44)
Copyright (C) 2015 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
user#centos7:~$ uname -r
5.15.86
syslog when the freeze situation occurs:
Message from syslogd#ubuntu at Jan 26 18:55:37 ...
kernel:[ 7665.562563] watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cc1:100337]
Jan 26 18:55:37 ubuntu kernel: [ 7665.562563] watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cc1:100337]
Jan 26 18:55:37 ubuntu kernel: [ 7665.562667] Modules linked in: btrfs ... hid_generic
Jan 26 18:55:47 ubuntu kernel: [ 7665.564688] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:55:47 ubuntu kernel: [ 7665.564982] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:55:47 ubuntu kernel: [ 7665.565049] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:55:47 ubuntu kernel: [ 7665.565083] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565393] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:55:47 ubuntu kernel: [ 7665.565437] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:55:47 ubuntu kernel: [ 7665.565441] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565443] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:55:47 ubuntu kernel: [ 7665.565446] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:55:47 ubuntu kernel: [ 7665.565448] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:55:47 ubuntu kernel: [ 7665.565450] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:55:47 ubuntu kernel: [ 7665.565452] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:55:47 ubuntu kernel: [ 7665.565455] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:55:47 ubuntu kernel: [ 7665.565458] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565486] Call Trace:
Jan 26 18:55:47 ubuntu kernel: [ 7665.565515] <TASK>
Jan 26 18:55:47 ubuntu kernel: [ 7665.565669] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:55:47 ubuntu kernel: [ 7665.565844] irqentry_exit+0x1d/0x30
Jan 26 18:55:47 ubuntu kernel: [ 7665.565848] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:55:47 ubuntu kernel: [ 7665.565852] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:55:47 ubuntu kernel: [ 7665.565886] RIP: 0033:0x12cfc00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565972] Code: 33 ff ff ff 83 e6 01 48 89 df e8 4b 0c ff ff 85 c0 0f 84 29 ff ff ff 80 bb 9c 00 00 00 53 0f 85 19 ff ff ff e9 6a ff ff ff 90 <4c> 89 e0 5b 5d 41 5c c3 48 8d 15 c2 3a 79 00 be 1d 0a 00 00 48 8d
Jan 26 18:55:47 ubuntu kernel: [ 7665.565974] RSP: 002b:00007ffd36e8a930 EFLAGS: 00000246
Jan 26 18:55:47 ubuntu kernel: [ 7665.565977] RAX: 0000000002569580 RBX: 00000000023c0a00 RCX: 0000000000000005
Jan 26 18:55:47 ubuntu kernel: [ 7665.565979] RDX: 0000000000000000 RSI: 000000000241dcf0 RDI: 00000000023c0a00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565980] RBP: 00000000023c0a98 R08: 000000000000000f R09: 00007fc50177c000
Jan 26 18:55:47 ubuntu kernel: [ 7665.565981] R10: 0000000002569580 R11: 0256958002569580 R12: 000000000241dcf0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565983] R13: 0000000000000000 R14: 00007ffd36e8a978 R15: 00007fc5007b8f00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565986] </TASK>
Message from syslogd#ubuntu at Jan 26 18:56:06 ...
kernel:[ 7693.578970] watchdog: BUG: soft lockup - CPU#6 stuck for 48s! [cc1:100337]
Jan 26 18:56:06 ubuntu kernel: [ 7693.578970] watchdog: BUG: soft lockup - CPU#6 stuck for 48s! [cc1:100337]
Jan 26 18:56:09 ubuntu kernel: [ 7693.578983] Modules linked in: btrfs ... hid_generic
Jan 26 18:56:09 ubuntu kernel: [ 7693.579073] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:56:09 ubuntu kernel: [ 7693.579088] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:09 ubuntu kernel: [ 7693.579093] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:09 ubuntu kernel: [ 7693.579135] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579146] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:09 ubuntu kernel: [ 7693.579149] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:09 ubuntu kernel: [ 7693.579152] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579154] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:09 ubuntu kernel: [ 7693.579155] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:09 ubuntu kernel: [ 7693.579157] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:09 ubuntu kernel: [ 7693.579159] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:09 ubuntu kernel: [ 7693.579161] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:56:09 ubuntu kernel: [ 7693.579163] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:09 ubuntu kernel: [ 7693.579165] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579169] Call Trace:
Jan 26 18:56:09 ubuntu kernel: [ 7693.579172] <TASK>
(same as above)
</TASK>
Message from syslogd#ubuntu at Jan 26 18:56:40 ...
kernel:[ 7729.590239] watchdog: BUG: soft lockup - CPU#6 stuck for 81s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:57:09 ...
kernel:[ 7757.599000] watchdog: BUG: soft lockup - CPU#6 stuck for 107s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:57:36 ...
kernel:[ 7785.607641] watchdog: BUG: soft lockup - CPU#6 stuck for 133s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:58:27 ...
kernel:[ 7813.614515] watchdog: BUG: soft lockup - CPU#6 stuck for 159s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:58:32 ...
kernel:[ 7841.620739] watchdog: BUG: soft lockup - CPU#6 stuck for 186s! [cc1:100337]
Jan 26 18:56:15 ubuntu kernel: [ 7702.812787] rcu: INFO: rcu_sched self-detected stall on CPU
Jan 26 18:56:15 ubuntu kernel: [ 7702.812875] rcu: 6-....: (1 GPs behind) idle=2df/1/0x4000000000000000 softirq=645654/645656 fqs=31
Jan 26 18:56:15 ubuntu kernel: [ 7702.812919] (t=15001 jiffies g=1424273 q=363)
Jan 26 18:56:15 ubuntu kernel: [ 7702.812947] rcu: rcu_sched kthread starved for 509 jiffies! g1424273 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=5
Jan 26 18:56:15 ubuntu kernel: [ 7702.812954] rcu: Unless rcu_sched kthread gets sufficient CPU time, OOM is now expected behavior.
Jan 26 18:56:15 ubuntu kernel: [ 7702.812956] rcu: RCU grace-period kthread stack dump:
Jan 26 18:56:15 ubuntu kernel: [ 7702.812957] task:rcu_sched state:R running task stack: 0 pid: 14 ppid: 2 flags:0x00004000
Jan 26 18:56:15 ubuntu kernel: [ 7702.813009] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813013] <TASK>
(same as above)
</TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813330] rcu: Stack dump where RCU GP kthread last ran:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813359] Sending NMI from CPU 6 to CPUs 5:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813681] NMI backtrace for cpu 5
Jan 26 18:56:15 ubuntu kernel: [ 7702.813684] CPU: 5 PID: 843 Comm: gmain Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:15 ubuntu kernel: [ 7702.813688] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:15 ubuntu kernel: [ 7702.813690] RIP: 0010:native_write_msr+0x6/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.813761] Code: fc ff b8 40 00 00 00 0f 00 d8 44 89 e7 e8 62 15 fc ff eb cb e8 fb d6 cc 00 66 66 2e 0f 1f 84 00 00 00 00 00 89 f9 89 f0 0f 30 <66> 90 c3 cc cc cc cc 55 48 c1 e2 20 89 f6 48 09 d6 31 d2 48 89 e5
Jan 26 18:56:15 ubuntu kernel: [ 7702.813764] RSP: 0000:ffffc251805c0f00 EFLAGS: 00000007
Jan 26 18:56:15 ubuntu kernel: [ 7702.813767] RAX: 000000009437f6ed RBX: 0000000000000000 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813768] RDX: 0000000000000cb4 RSI: 000000009437f6ed RDI: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813770] RBP: ffffc251805c0f08 R08: 0000000000000001 R09: 000007014874c7c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.813771] R10: 7fffffffffffffff R11: ffffc251805c0ff8 R12: 000027a10367387b
Jan 26 18:56:15 ubuntu kernel: [ 7702.813772] R13: ffffa04af7f5fe00 R14: ffffa04af7f62db8 R15: ffffa04af7f62df8
Jan 26 18:56:15 ubuntu kernel: [ 7702.813796] FS: 00007f02c513e700(0000) GS:ffffa04af7f40000(0000) knlGS:0000000000000000
Jan 26 18:56:15 ubuntu kernel: [ 7702.813798] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:15 ubuntu kernel: [ 7702.813800] CR2: 00007f00d5bf2000 CR3: 0000000117928001 CR4: 00000000003706e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813803] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813805] <IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813848] ? lapic_next_deadline+0x2c/0x40
Jan 26 18:56:15 ubuntu kernel: [ 7702.813936] clockevents_program_event+0xa8/0x130
Jan 26 18:56:15 ubuntu kernel: [ 7702.813968] tick_program_event+0x41/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.813971] ? hrtimer_update_next_event+0x4f/0x70
Jan 26 18:56:15 ubuntu kernel: [ 7702.813973] hrtimer_interrupt+0x136/0x230
Jan 26 18:56:15 ubuntu kernel: [ 7702.813976] __sysvec_apic_timer_interrupt+0x5e/0xe0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813978] sysvec_apic_timer_interrupt+0x7b/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.813982] </IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813983] <TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813983] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.813986] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813989] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:15 ubuntu kernel: [ 7702.813991] RSP: 0000:ffffc2518434fed8 EFLAGS: 00000202
Jan 26 18:56:15 ubuntu kernel: [ 7702.813993] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813994] RDX: ffffa04a40339900 RSI: 0000000000000000 RDI: ffffc2518434ff58
Jan 26 18:56:15 ubuntu kernel: [ 7702.813995] RBP: ffffc2518434ff08 R08: 0000000000000000 R09: 0000070146c988c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.813996] R10: 00000701468c7fc1 R11: 00000000000024d8 R12: ffffc2518434ff58
Jan 26 18:56:15 ubuntu kernel: [ 7702.813998] R13: ffffa04a557ce400 R14: ffffa04a557ce400 R15: ffffa04a557ce400
Jan 26 18:56:15 ubuntu kernel: [ 7702.814000] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814004] irqentry_exit+0x1d/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.814007] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814011] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814013] RIP: 0033:0x7f02c5e07508
Jan 26 18:56:15 ubuntu kernel: [ 7702.814017] Code: c0 74 0f e9 4a f5 ff ff 66 2e 0f 1f 84 00 00 00 00 00 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 31 f6 87 37 <83> fe 01 74 0b e9 ce f4 ff ff 66 0f 1f 44 00 00 c3 0f 1f 80 00 00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814019] RSP: 002b:00007f02c513dc98 EFLAGS: 00000246
Jan 26 18:56:15 ubuntu kernel: [ 7702.814021] RAX: 0000000000000f6a RBX: 000000007fffffff RCX: 0000000000000004
Jan 26 18:56:15 ubuntu kernel: [ 7702.814023] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000055920b115870
Jan 26 18:56:15 ubuntu kernel: [ 7702.814024] RBP: 0000000000000002 R08: 0000000000000002 R09: 0000000000000001
Jan 26 18:56:15 ubuntu kernel: [ 7702.814025] R10: 000055920b132e00 R11: 000055920b112580 R12: 0000000000000002
Jan 26 18:56:15 ubuntu kernel: [ 7702.814026] R13: 000055920b115870 R14: 000055920b112dd0 R15: 00007f02c513dcf4
Jan 26 18:56:15 ubuntu kernel: [ 7702.814028] </TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814382] NMI backtrace for cpu 6
Jan 26 18:56:15 ubuntu kernel: [ 7702.814389] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:15 ubuntu kernel: [ 7702.814393] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:15 ubuntu kernel: [ 7702.814394] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.814395] <IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814397] dump_stack_lvl+0x4a/0x63
Jan 26 18:56:15 ubuntu kernel: [ 7702.814484] dump_stack+0x10/0x16
Jan 26 18:56:15 ubuntu kernel: [ 7702.814487] nmi_cpu_backtrace.cold+0x4d/0x96
Jan 26 18:56:15 ubuntu kernel: [ 7702.814491] ? lapic_can_unplug_cpu+0x90/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814495] nmi_trigger_cpumask_backtrace+0xf3/0x100
Jan 26 18:56:15 ubuntu kernel: [ 7702.814594] arch_trigger_cpumask_backtrace+0x19/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814598] rcu_dump_cpu_stacks+0x132/0x16d
Jan 26 18:56:15 ubuntu kernel: [ 7702.814762] rcu_sched_clock_irq.cold+0x100/0x36a
Jan 26 18:56:15 ubuntu kernel: [ 7702.814787] ? account_system_index_time+0xa0/0xc0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814831] update_process_times+0x94/0xd0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814861] tick_sched_handle.isra.0+0x25/0x60
Jan 26 18:56:15 ubuntu kernel: [ 7702.814865] tick_sched_timer+0x71/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814868] ? tick_sched_do_timer+0x50/0x50
Jan 26 18:56:15 ubuntu kernel: [ 7702.814871] __hrtimer_run_queues+0xc8/0x1d0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814873] hrtimer_interrupt+0x109/0x230
Jan 26 18:56:15 ubuntu kernel: [ 7702.814876] __sysvec_apic_timer_interrupt+0x5e/0xe0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814878] sysvec_apic_timer_interrupt+0x7b/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814883] </IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814883] <TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814884] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814887] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814890] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:15 ubuntu kernel: [ 7702.814893] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:15 ubuntu kernel: [ 7702.814896] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814897] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:15 ubuntu kernel: [ 7702.814899] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.814927] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:15 ubuntu kernel: [ 7702.814929] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:15 ubuntu kernel: [ 7702.814932] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814937] irqentry_exit+0x1d/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.814940] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814943] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814945] RIP: 0033:0x12cfc00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814949] Code: 33 ff ff ff 83 e6 01 48 89 df e8 4b 0c ff ff 85 c0 0f 84 29 ff ff ff 80 bb 9c 00 00 00 53 0f 85 19 ff ff ff e9 6a ff ff ff 90 <4c> 89 e0 5b 5d 41 5c c3 48 8d 15 c2 3a 79 00 be 1d 0a 00 00 48 8d
Jan 26 18:56:15 ubuntu kernel: [ 7702.814951] RSP: 002b:00007ffd36e8a930 EFLAGS: 00000246
Jan 26 18:56:15 ubuntu kernel: [ 7702.814953] RAX: 0000000002569580 RBX: 00000000023c0a00 RCX: 0000000000000005
Jan 26 18:56:15 ubuntu kernel: [ 7702.814978] RDX: 0000000000000000 RSI: 000000000241dcf0 RDI: 00000000023c0a00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814980] RBP: 00000000023c0a98 R08: 000000000000000f R09: 00007fc50177c000
Jan 26 18:56:15 ubuntu kernel: [ 7702.814981] R10: 0000000002569580 R11: 0256958002569580 R12: 000000000241dcf0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814983] R13: 0000000000000000 R14: 00007ffd36e8a978 R15: 00007fc5007b8f00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814985] </TASK>
Jan 26 18:56:40 ubuntu kernel: [ 7729.590239] watchdog: BUG: soft lockup - CPU#6 stuck for 81s! [cc1:100337]
Jan 26 18:56:40 ubuntu kernel: [ 7729.590249] Modules linked in: btrfs ... hid_generic
Jan 26 18:56:40 ubuntu kernel: [ 7729.590369] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:56:40 ubuntu kernel: [ 7729.590381] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:40 ubuntu kernel: [ 7729.590385] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:40 ubuntu kernel: [ 7729.590387] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590394] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:40 ubuntu kernel: [ 7729.590397] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:40 ubuntu kernel: [ 7729.590400] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590402] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:40 ubuntu kernel: [ 7729.590403] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:40 ubuntu kernel: [ 7729.590405] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:40 ubuntu kernel: [ 7729.590407] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:40 ubuntu kernel: [ 7729.590409] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:56:40 ubuntu kernel: [ 7729.590411] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:40 ubuntu kernel: [ 7729.590412] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590451] Call Trace:
Jan 26 18:56:40 ubuntu kernel: [ 7729.590453] <TASK>
(same as above)
</TASK>
Jan 26 18:57:09 ubuntu kernel: [ 7757.599000] watchdog: BUG: soft lockup - CPU#6 stuck for 107s! [cc1:100337]
Jan 26 18:57:09 ubuntu kernel: [ 7757.599009] Modules linked in: btrfs ... hid_generic
Jan 26 18:57:09 ubuntu kernel: [ 7757.599076] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:57:09 ubuntu kernel: [ 7757.599086] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:57:09 ubuntu kernel: [ 7757.599089] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:57:09 ubuntu kernel: [ 7757.599091] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599097] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:57:09 ubuntu kernel: [ 7757.599099] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:57:09 ubuntu kernel: [ 7757.599101] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599103] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:57:09 ubuntu kernel: [ 7757.599104] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:57:09 ubuntu kernel: [ 7757.599105] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:57:09 ubuntu kernel: [ 7757.599106] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:57:09 ubuntu kernel: [ 7757.599108] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:57:09 ubuntu kernel: [ 7757.599110] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:57:09 ubuntu kernel: [ 7757.599111] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599114] Call Trace:
Jan 26 18:57:16 ubuntu kernel: [ 7757.599116] <TASK>
(same as above)
</TASK>
Jan 26 18:57:36 ubuntu kernel: [ 7785.607641] watchdog: BUG: soft lockup - CPU#6 stuck for 133s! [cc1:100337]
Jan 26 18:57:36 ubuntu kernel: [ 7785.607651] Modules linked in: btrfs ... hid_generic
Jan 26 18:57:36 ubuntu kernel: [ 7785.607750] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:57:36 ubuntu kernel: [ 7785.607760] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:57:36 ubuntu kernel: [ 7785.607764] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:57:36 ubuntu kernel: [ 7785.607765] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:57:36 ubuntu kernel: [ 7785.607772] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:57:36 ubuntu kernel: [ 7785.607774] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:57:36 ubuntu kernel: [ 7785.607776] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:57:36 ubuntu kernel: [ 7785.607777] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:57:36 ubuntu kernel: [ 7785.607779] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:57:36 ubuntu kernel: [ 7785.607780] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:57:36 ubuntu kernel: [ 7785.607781] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:57:36 ubuntu kernel: [ 7785.607782] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:57:36 ubuntu kernel: [ 7785.607784] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:57:36 ubuntu kernel: [ 7785.607785] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:57:59 ubuntu kernel: [ 7785.607788] Call Trace:
Jan 26 18:58:27 ubuntu kernel: [ 7785.607790] <TASK>
(same as above)
</TASK>
Jan 26 18:58:27 ubuntu kernel: [ 7813.614515] watchdog: BUG: soft lockup - CPU#6 stuck for 159s! [cc1:100337]
Jan 26 18:58:27 ubuntu kernel: [ 7813.614524] Modules linked in: btrfs ... hid_generic
Jan 26 18:58:27 ubuntu kernel: [ 7813.614588] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:58:27 ubuntu kernel: [ 7813.614635] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:58:27 ubuntu kernel: [ 7813.614638] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:58:27 ubuntu kernel: [ 7813.614640] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614646] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:58:27 ubuntu kernel: [ 7813.614648] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:58:27 ubuntu kernel: [ 7813.614650] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614652] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:58:27 ubuntu kernel: [ 7813.614653] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:58:27 ubuntu kernel: [ 7813.614654] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:58:27 ubuntu kernel: [ 7813.614656] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:58:27 ubuntu kernel: [ 7813.614657] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:58:27 ubuntu kernel: [ 7813.614659] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:58:27 ubuntu kernel: [ 7813.614660] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614686] Call Trace:
(same as above)
</TASK>
Jan 26 18:58:32 ubuntu kernel: [ 7841.620739] watchdog: BUG: soft lockup - CPU#6 stuck for 186s! [cc1:100337]
Jan 26 18:58:32 ubuntu kernel: [ 7841.620748] Modules linked in: btrfs ... hid_generic
Jan 26 18:58:32 ubuntu kernel: [ 7841.620818] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:58:32 ubuntu kernel: [ 7841.620830] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:58:32 ubuntu kernel: [ 7841.620833] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:58:32 ubuntu kernel: [ 7841.620835] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620842] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:58:32 ubuntu kernel: [ 7841.620844] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:58:32 ubuntu kernel: [ 7841.620847] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620848] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:58:32 ubuntu kernel: [ 7841.620886] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:58:32 ubuntu kernel: [ 7841.620888] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:58:32 ubuntu kernel: [ 7841.620890] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:58:32 ubuntu kernel: [ 7841.620891] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:58:32 ubuntu kernel: [ 7841.620893] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:58:32 ubuntu kernel: [ 7841.620895] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620898] Call Trace:
Jan 26 18:58:32 ubuntu kernel: [ 7841.620900] <TASK>
(same as above)
</TASK>
Jan 26 19:05:42 ubuntu NetworkManager[768]: <info> [1674788384.3036] manager: NetworkManager state is now CONNECTED_SITE
I encountered freezing once, by adding RAM I solved the problem. But this time I add RAM to 8G, freezing still occurs. What also confuses me is that my centos vm with 3G RAM and 8 cpu cores run make modules -j8 successfully. I have no idea about the difference.
To check the cpu and memory usage I execute top at the same time. the picture is top's output when freezing occurs. top command output

Related

Where are Kernel global variables stored?

As i know global variables(in userspace programs) are stored in coressponding DATA (and BSS) segment. But how and where are they stored in case of kernel code?
For an example let's look at one of Linux's global variable. Basically, Linux is an ELF image compressed with gzip or other compression tools. As stated on Wikipedia (https://en.wikipedia.org/wiki/Vmlinux):
Traditionally, when creating a bootable kernel image, the kernel is also compressed using gzip, or, since Linux 2.6.30,[3] using LZMA or bzip2, which requires a very small decompression stub to be included in the resulting image. The stub decompresses the kernel code, on some systems printing dots to the console to indicate progress, and then continues the boot process. Support for LZO,[4] xz[5] and LZ4[6] compression was added later.
On Ubuntu, there is a special script called extract-vmlinux which comes with your version of the Linux kernel (https://blog.packagecloud.io/eng/2016/03/08/how-to-extract-and-disassmble-a-linux-kernel-image-vmlinuz/). The Linux ELF file is /boot/vmlinuz. To decompress it, you must use the extract-vmlinux script which can be installed with
sudo apt-get install linux-headers-$(uname -r)
The script is safe to use because it is a standard script which is found in the official repository of packages for your distribution (most packages there are open source and safe). Now use
sudo /usr/src/kernels/$(uname -r)/scripts/extract-vmlinux /boot/vmlinuz-$(uname -r) > vmlinux
to extract the Linux kernel's ELF file from the compressed vmlinux image to your home repository. Now we can look at the ELF file of the Linux kernel. Use readelf -a vmlinux to have a summary of the content. The output for me is this:
user#user-System-Product-Name:~$ readelf -a vmlinux
ELF Header:
Magic: 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00
Class: ELF64
Data: 2's complement, little endian
Version: 1 (current)
OS/ABI: UNIX - System V
ABI Version: 0
Type: EXEC (Executable file)
Machine: Advanced Micro Devices X86-64
Version: 0x1
Entry point address: 0x1000000
Start of program headers: 64 (bytes into file)
Start of section headers: 46137728 (bytes into file)
Flags: 0x0
Size of this header: 64 (bytes)
Size of program headers: 56 (bytes)
Number of program headers: 5
Size of section headers: 64 (bytes)
Number of section headers: 35
Section header string table index: 34
Section Headers:
[Nr] Name Type Address Offset
Size EntSize Flags Link Info Align
[ 0] NULL 0000000000000000 00000000
0000000000000000 0000000000000000 0 0 0
[ 1] .text PROGBITS ffffffff81000000 00200000
0000000000e025f7 0000000000000000 AX 0 0 4096
[ 2] .rodata PROGBITS ffffffff82000000 01200000
00000000004e46f2 0000000000000000 WA 0 0 4096
[ 3] .pci_fixup PROGBITS ffffffff824e4700 016e4700
00000000000032b0 0000000000000000 A 0 0 16
[ 4] .tracedata PROGBITS ffffffff824e79b0 016e79b0
0000000000000078 0000000000000000 A 0 0 1
[ 5] __ksymtab PROGBITS ffffffff824e7a28 016e7a28
0000000000010a34 0000000000000000 A 0 0 4
[ 6] __ksymtab_gpl PROGBITS ffffffff824f845c 016f845c
00000000000121ec 0000000000000000 A 0 0 4
[ 7] __kcrctab PROGBITS ffffffff8250a648 0170a648
00000000000058bc 0000000000000000 A 0 0 4
[ 8] __kcrctab_gpl PROGBITS ffffffff8250ff04 0170ff04
00000000000060a4 0000000000000000 A 0 0 4
[ 9] __ksymtab_strings PROGBITS ffffffff82515fa8 01715fa8
0000000000037bea 0000000000000001 AMS 0 0 1
[10] __init_rodata PROGBITS ffffffff8254dba0 0174dba0
00000000000002a8 0000000000000000 A 0 0 32
[11] __param PROGBITS ffffffff8254de48 0174de48
00000000000038e0 0000000000000000 A 0 0 8
[12] __modver PROGBITS ffffffff82551728 01751728
00000000000005a0 0000000000000000 WA 0 0 8
[13] __ex_table PROGBITS ffffffff82551cd0 01751cd0
0000000000001af4 0000000000000000 A 0 0 4
[14] .notes NOTE ffffffff825537c4 017537c4
00000000000001ec 0000000000000000 A 0 0 4
[15] .data PROGBITS ffffffff82600000 01800000
00000000003657c0 0000000000000000 WA 0 0 8192
[16] __bug_table PROGBITS ffffffff829657c0 01b657c0
00000000000178d4 0000000000000000 WA 0 0 1
[17] .vvar PROGBITS ffffffff8297e000 01b7e000
0000000000001000 0000000000000000 WA 0 0 16
[18] .data..percpu PROGBITS 0000000000000000 01c00000
000000000002f000 0000000000000000 WA 0 0 4096
[19] .init.text PROGBITS ffffffff829ae000 01dae000
00000000000772e5 0000000000000000 AX 0 0 16
[20] .altinstr_aux PROGBITS ffffffff82a252e5 01e252e5
0000000000002d9b 0000000000000000 AX 0 0 1
[21] .init.data PROGBITS ffffffff82a2a000 01e2a000
00000000001c74f0 0000000000000000 WA 0 0 8192
[22] .x86_cpu_dev.init PROGBITS ffffffff82bf14f0 01ff14f0
0000000000000028 0000000000000000 A 0 0 8
[23] .parainstructions PROGBITS ffffffff82bf1518 01ff1518
0000000000022b7c 0000000000000000 A 0 0 8
[24] .altinstructions PROGBITS ffffffff82c14098 02014098
0000000000006660 0000000000000000 A 0 0 1
[25] .altinstr_replace PROGBITS ffffffff82c1a6f8 0201a6f8
0000000000001789 0000000000000000 AX 0 0 1
[26] .iommu_table PROGBITS ffffffff82c1be88 0201be88
00000000000000f0 0000000000000000 A 0 0 8
[27] .apicdrivers PROGBITS ffffffff82c1bf78 0201bf78
0000000000000040 0000000000000000 WA 0 0 8
[28] .exit.text PROGBITS ffffffff82c1bfb8 0201bfb8
0000000000001f4b 0000000000000000 AX 0 0 1
[29] .smp_locks PROGBITS ffffffff82c1e000 0201e000
000000000000a000 0000000000000000 A 0 0 4
[30] .data_nosave PROGBITS ffffffff82c28000 02028000
0000000000001000 0000000000000000 WA 0 0 4
[31] .bss NOBITS ffffffff82c29000 02029000
00000000005d7000 0000000000000000 WA 0 0 4096
[32] .brk NOBITS ffffffff83200000 02029000
000000000002c000 0000000000000000 WA 0 0 1
[33] .init.scratch PROGBITS ffffffff83400000 02800000
0000000000400000 0000000000000000 WA 0 0 32
[34] .shstrtab STRTAB 0000000000000000 02c00000
0000000000000180 0000000000000000 0 0 1
Key to Flags:
W (write), A (alloc), X (execute), M (merge), S (strings), I (info),
L (link order), O (extra OS processing required), G (group), T (TLS),
C (compressed), x (unknown), o (OS specific), E (exclude),
l (large), p (processor specific)
There are no section groups in this file.
Program Headers:
Type Offset VirtAddr PhysAddr
FileSiz MemSiz Flags Align
LOAD 0x0000000000200000 0xffffffff81000000 0x0000000001000000
0x00000000015539b0 0x00000000015539b0 R E 0x200000
LOAD 0x0000000001800000 0xffffffff82600000 0x0000000002600000
0x000000000037f000 0x000000000037f000 RW 0x200000
LOAD 0x0000000001c00000 0x0000000000000000 0x000000000297f000
0x000000000002f000 0x000000000002f000 RW 0x200000
LOAD 0x0000000001dae000 0xffffffff829ae000 0x00000000029ae000
0x0000000000e52000 0x0000000000e52000 RWE 0x200000
NOTE 0x00000000017537c4 0xffffffff825537c4 0x00000000025537c4
0x00000000000001ec 0x00000000000001ec 0x4
Section to Segment mapping:
Segment Sections...
00 .text .rodata .pci_fixup .tracedata __ksymtab __ksymtab_gpl __kcrctab __kcrctab_gpl __ksymtab_strings __init_rodata __param __modver __ex_table .notes
01 .data __bug_table .vvar
02 .data..percpu
03 .init.text .altinstr_aux .init.data .x86_cpu_dev.init .parainstructions .altinstructions .altinstr_replacement .iommu_table .apicdrivers .exit.text .smp_locks .data_nosave .bss .brk .init.scratch
04 .notes
There is no dynamic section in this file.
There are no relocations in this file.
The decoding of unwind sections for machine type Advanced Micro Devices X86-64 is not currently supported.
No version information found in this file.
Displaying notes found in: .notes
Owner Data size Description
Xen 0x00000006 Unknown note type: (0x00000006)
description data: 6c 69 6e 75 78 00
Xen 0x00000004 Unknown note type: (0x00000007)
description data: 32 2e 36 00
Xen 0x00000008 Unknown note type: (0x00000005)
description data: 78 65 6e 2d 33 2e 30 00
Xen 0x00000008 Unknown note type: (0x00000003)
description data: 00 00 00 80 ff ff ff ff
Xen 0x00000008 Unknown note type: (0x0000000f)
description data: 00 00 00 00 80 00 00 00
Xen 0x00000008 NT_VERSION (version)
description data: c0 e1 9a 82 ff ff ff ff
Xen 0x00000008 NT_ARCH (architecture)
description data: 00 20 00 81 ff ff ff ff
Xen 0x00000029 Unknown note type: (0x0000000a)
description data: 21 77 72 69 74 61 62 6c 65 5f 70 61 67 65 5f 74 61 62 6c 65 73 7c 70 61 65 5f 70 67 64 69 72 5f 61 62 6f 76 65 5f 34 67 62
Xen 0x00000004 Unknown note type: (0x00000011)
description data: 01 88 00 00
Xen 0x00000004 Unknown note type: (0x00000009)
description data: 79 65 73 00
Xen 0x00000008 Unknown note type: (0x00000008)
description data: 67 65 6e 65 72 69 63 00
Xen 0x00000010 Unknown note type: (0x0000000d)
description data: 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00
Xen 0x00000004 Unknown note type: (0x0000000e)
description data: 01 00 00 00
Xen 0x00000004 Unknown note type: (0x00000010)
description data: 01 00 00 00
Xen 0x00000008 Unknown note type: (0x0000000c)
description data: 00 00 00 00 00 80 ff ff
Xen 0x00000008 Unknown note type: (0x00000004)
description data: 00 00 00 00 00 00 00 00
GNU 0x00000014 NT_GNU_BUILD_ID (unique build ID bitstring)
Build ID: c0263a3075bc0a9388365ddf35ab5422da3356a9
Linux 0x00000001 OPEN
description data: 00
Xen 0x00000008 Unknown note type: (0x00000012)
description data: 40 07 00 01 00 00 00 00
The important section for the question is the Program headers section:
Program Headers:
Type Offset VirtAddr PhysAddr
FileSiz MemSiz Flags Align
LOAD 0x0000000000200000 0xffffffff81000000 0x0000000001000000
0x00000000015539b0 0x00000000015539b0 R E 0x200000
LOAD 0x0000000001800000 0xffffffff82600000 0x0000000002600000
0x000000000037f000 0x000000000037f000 RW 0x200000
LOAD 0x0000000001c00000 0x0000000000000000 0x000000000297f000
0x000000000002f000 0x000000000002f000 RW 0x200000
LOAD 0x0000000001dae000 0xffffffff829ae000 0x00000000029ae000
0x0000000000e52000 0x0000000000e52000 RWE 0x200000
NOTE 0x00000000017537c4 0xffffffff825537c4 0x00000000025537c4
0x00000000000001ec 0x00000000000001ec 0x4
I would guess that the RW sections are the data/bss segments of the static and freestanding kernel image. There isn't much bss data (uninitialized data) in this kernel image. You can see that by looking at the filesize versus the memsize of the different segments. In bss data, only the size is written in the executable. The loader will then assign zeroes to these segments. Since we have only memsizes which are equal to the filesizes, then we don't have much bss here.
Also, we can look at the different virtual addresses at which the kernel will load itself after decompression. This will be useful to find the segment in which a certain global variable resides.
Now, to determine where a global variable is loaded one can look at the System.map file in the /boot directory. For example, we can take a random global variable in kernel/sched/core.c called sysctl_sched_rt_period and find its address using
user#user-System-Product-Name:~$ sudo grep "sysctl_sched_rt_period" /boot/System.map-$(uname -r)
ffffffff8266eb24 D sysctl_sched_rt_period
The address is thus ffffffff8266eb24. This address resides in the RW segment loaded at ffffffff82600000 because the size of this segment is 37f000 and because ffffffff82600000 + 37f000 > ffffffff8266eb24. You can clearly see that this global variable is stored in the data segment of the kernel's executable.

Commaide killed by OOM when analyzing a file

Comma is always killed by oom when I try to edit a file in which I use 10 modules (mainly Cro::HTTP ) and after the start of analysis. I can see that many raku process are running (in order to analyze?) :
journalctl :
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 4722] 1000 4722 654 29 40960 0 0 comma.sh
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 4771] 1000 4771 1085318 155576 1949696 0 0 java
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 4825] 1000 4825 783 35 40960 0 0 fsnotifier64
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5036] 1000 5036 52039 24008 364544 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5038] 1000 5038 51119 25114 372736 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5039] 1000 5039 52391 23805 368640 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5047] 1000 5047 51473 22787 352256 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5049] 1000 5049 51129 22929 356352 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5050] 1000 5050 49796 21981 348160 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5052] 1000 5052 50929 25154 368640 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5057] 1000 5057 52078 23535 364544 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5066] 1000 5066 51071 22735 348160 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5075] 1000 5075 51254 22555 356352 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5081] 1000 5081 49423 21271 335872 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5093] 1000 5093 49375 21590 344064 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5100] 1000 5100 50784 22763 352256 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5104] 1000 5104 49360 21141 335872 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: [ 5115] 1000 5115 46338 14169 282624 0 0 rakudo
janv. 09 19:47:42 samuel-Virtual-Machine kernel: oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/user.slice/user-1000.slice/user#1000.service,task=java,pid=4771,uid=1000
janv. 09 19:47:42 samuel-Virtual-Machine kernel: Out of memory: Killed process 4771 (java) total-vm:4341272kB, anon-rss:622236kB, file-rss:0kB, shmem-rss:68kB, UID:1000 pgtables:1904kB oom_score_adj:0
janv. 09 19:47:42 samuel-Virtual-Machine kernel: oom_reaper: reaped process 4771 (java), now anon-rss:0kB, file-rss:0kB, shmem-rss:68kB
Is this a normal behavior? Is there an option to limit the number of parallel raku process ?
(I work on a small Vm with 4GB of memory).
It's expected that Comma will invoke the selected Raku compiler in order to obtain symbols from modules. That should take place once at the start of editing a file using a particular module and then be cached (and the caching is across the project as a whole).
Aside from the number of rakudo instances spawned, the memory usage of the java process itself looks a bit on the high side. Probably it's worth asking the Comma developers to take a look at it, and providing some more detailed information. Of note, the Help menu has a "Collect Logs and Diagnostic Data" option (which will provide a zip file that can be sent to the developers, although note it may also include some data about the project you are working on). Any other information to aid reproduction (such as the list of modules being used) would also be useful.

LDAP_BIND (Invalid DN) Webmin User And Group DB (Docker)

I have some issues with my Webmin when i try to bind it to the User and Group DB to allow LDAP users enter on webmin i have this issue
Failed to login to LDAP server as admin : invalid DN
So i when i check my logs on openldap this is what i have
ber_dump: buf=0x7f33f4002400 ptr=0x7f33f4002400 end=0x7f33f4002419 len=25
0000: 02 01 01 60 14 02 01 03 04 05 61 64 6d 69 6e 80 ...`......admin.
0010: 08 4e 44 67 35 47 36 44 46 .password
ber_dump: buf=0x7f33f4002400 ptr=0x7f33f4002403 end=0x7f33f4002419 len=22
0000: 60 14 02 01 03 04 05 61 64 6d 69 6e 80 08 4e 44 `......admin....
0010: 67 35 47 36 44 46 password
ber_dump: buf=0x7f33f4002400 ptr=0x7f33f400240f end=0x7f33f4002419 len=10
0000: 00 08 4e 44 67 35 47 36 44 46 ..password
5ebde922 conn=1001 op=0 do_bind: invalid dn (admin)
0000: 30 16 02 01 01 61 11 0a 01 22 04 00 04 0a 69 6e 0....a..."....in
0010: 76 61 6c 69 64 20 44 4e valid DN
Btw, with phpadmin it works great no issues,
so i will post the log here in debug 256
5ebdea13 conn=1000 op=0 do_bind: invalid dn (admin)
5ebdea13 conn=1000 op=0 RESULT tag=97 err=34 text=invalid DN
5ebdea14 conn=1000 fd=12 closed (connection lost)
Thanks,
Info
OS:Ubuntu 18.04
Openldap under docker.
Webmin under docker
I found out, what was wrong. I was trying to bind with:
dc=blackdragon, dc=tv
Instead of:
cn=Administrator, dc=balckdragon, dc=tv

SSL not working between Linux and Windows

I have gone through loads of material present on internet for SSL. I followed the steps and created self signed certificate on server (linux) using keytool. Server keystore was already having an entry as ( CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown), my new certificate was second entry as ( CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server ). Then I exported the certificate(.cer) using keytool and copied same on my client(windows). I then imported server generated certificate to client trustore. Now when I try to communicate using SSL it fails everytime. I turned on SSL debug on client. Below is the log
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
***
found key for : Client
chain [0] = [
[
Version: V3
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits
modulus: 19643942881710234591525118408612815215632338692166465250629734200981703093763200559775845583913404371567241804832487728799610532434766533695993759141114319525441958126364976642955560446067359829730544145500409447935888670367709958247941184557182316292540918805424085096889405623367353240389104083404287642633808982388623942568195322780929142023222276129235672938020453213230922184807911898395818264624343113898437136096266829934433793735074739359988881755805184514603338282021635155460130597302085016075305135792447640646817495498043975883348791446660517781531653507565586938242488813328480016900010365926159926261191
public exponent: 65537
Validity: [From: Fri Oct 21 13:20:47 IST 2016,
To: Thu Jan 19 13:20:47 IST 2017]
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
SerialNumber: [ 46dac56d]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 72 B5 E3 14 98 BD 53 F3 69 33 96 A5 71 F5 99 2B r.....S.i3..q..+
0010: 22 0F B9 F6 "...
]
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 21 16 B3 C9 5D BC EB 71 35 78 95 8E BF 30 72 AC !...]..q5x...0r.
0010: D1 42 AA B7 C1 8B 23 FD 67 DF 6F 36 85 E8 C6 05 .B....#.g.o6....
0020: A4 7B E7 A5 B5 3A FC 0C 88 29 3D C3 CD C2 88 8D .....:...)=.....
0030: 86 3A BF 14 85 93 01 75 5E 6E 01 87 44 A9 0A 21 .:.....u^n..D..!
0040: A2 F0 C3 05 9C 40 7B 89 61 DB 84 28 73 89 0F 3A .....#..a..(s..:
0050: B7 96 E8 63 30 29 8A B5 11 4C D2 7E A8 17 6F 0F ...c0)...L....o.
0060: 4E C7 4A AD E0 A8 6E 68 CE 72 FE DD DE F7 1C 84 N.J...nh.r......
0070: 20 C9 C4 CA F1 6A 3B C0 F9 A8 DD 03 0B EF 04 03 ....j;.........
0080: 40 BA 37 F6 B6 9C BE FF A9 E6 0E BF E6 32 B8 B3 #.7..........2..
0090: 0A EB 0F F7 EA 23 93 D1 17 D7 6E 94 0C 98 4C 90 .....#....n...L.
00A0: 40 21 DE 39 09 A9 16 2A 97 DD 2D E5 C0 FC FE 2E #!.9...*..-.....
00B0: AE 36 0C 04 6D A8 8F 1D B8 2B 99 54 7C AD 4F 8C .6..m....+.T..O.
00C0: 01 9C C2 07 77 81 A7 6C 07 2D A3 75 1D 4E E4 16 ....w..l.-.u.N..
00D0: 7E D0 BD E4 79 0F B6 9C C8 62 2E D6 E1 AC 35 58 ....y....b....5X
00E0: 22 B2 8C 4B FE 9A 06 C4 53 C1 8F 45 EA 61 3A 7F "..K....S..E.a:.
00F0: 3C D1 15 0D A8 27 3E 0F AB F5 8F DA 78 05 5F AE <....'>.....x._.
]
***
trigger seeding of SecureRandom
done seeding SecureRandom
keyStore is : D:\\Development\\Workspace\\Eclipse\\testSSL\\Sample\\.keystore
keyStore type is : jks
keyStore provider is :
init keystore
init keymanager of type SunX509
***
found key for : Client
chain [0] = [
[
Version: V3
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits
modulus: 19643942881710234591525118408612815215632338692166465250629734200981703093763200559775845583913404371567241804832487728799610532434766533695993759141114319525441958126364976642955560446067359829730544145500409447935888670367709958247941184557182316292540918805424085096889405623367353240389104083404287642633808982388623942568195322780929142023222276129235672938020453213230922184807911898395818264624343113898437136096266829934433793735074739359988881755805184514603338282021635155460130597302085016075305135792447640646817495498043975883348791446660517781531653507565586938242488813328480016900010365926159926261191
public exponent: 65537
Validity: [From: Fri Oct 21 13:20:47 IST 2016,
To: Thu Jan 19 13:20:47 IST 2017]
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
SerialNumber: [ 46dac56d]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 72 B5 E3 14 98 BD 53 F3 69 33 96 A5 71 F5 99 2B r.....S.i3..q..+
0010: 22 0F B9 F6 "...
]
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 21 16 B3 C9 5D BC EB 71 35 78 95 8E BF 30 72 AC !...]..q5x...0r.
0010: D1 42 AA B7 C1 8B 23 FD 67 DF 6F 36 85 E8 C6 05 .B....#.g.o6....
0020: A4 7B E7 A5 B5 3A FC 0C 88 29 3D C3 CD C2 88 8D .....:...)=.....
0030: 86 3A BF 14 85 93 01 75 5E 6E 01 87 44 A9 0A 21 .:.....u^n..D..!
0040: A2 F0 C3 05 9C 40 7B 89 61 DB 84 28 73 89 0F 3A .....#..a..(s..:
0050: B7 96 E8 63 30 29 8A B5 11 4C D2 7E A8 17 6F 0F ...c0)...L....o.
0060: 4E C7 4A AD E0 A8 6E 68 CE 72 FE DD DE F7 1C 84 N.J...nh.r......
0070: 20 C9 C4 CA F1 6A 3B C0 F9 A8 DD 03 0B EF 04 03 ....j;.........
0080: 40 BA 37 F6 B6 9C BE FF A9 E6 0E BF E6 32 B8 B3 #.7..........2..
0090: 0A EB 0F F7 EA 23 93 D1 17 D7 6E 94 0C 98 4C 90 .....#....n...L.
00A0: 40 21 DE 39 09 A9 16 2A 97 DD 2D E5 C0 FC FE 2E #!.9...*..-.....
00B0: AE 36 0C 04 6D A8 8F 1D B8 2B 99 54 7C AD 4F 8C .6..m....+.T..O.
00C0: 01 9C C2 07 77 81 A7 6C 07 2D A3 75 1D 4E E4 16 ....w..l.-.u.N..
00D0: 7E D0 BD E4 79 0F B6 9C C8 62 2E D6 E1 AC 35 58 ....y....b....5X
00E0: 22 B2 8C 4B FE 9A 06 C4 53 C1 8F 45 EA 61 3A 7F "..K....S..E.a:.
00F0: 3C D1 15 0D A8 27 3E 0F AB F5 8F DA 78 05 5F AE <....'>.....x._.
]
***
trustStore is: D:\Development\Workspace\Eclipse\testSSL\Sample\.keystore
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
trigger seeding of SecureRandom
done seeding SecureRandom
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
main, setSoTimeout(0) called
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1476980696 bytes = { 63, 74, 124, 176, 200, 133, 175, 107, 173, 166, 115, 188, 94, 103, 2, 237, 54, 77, 30, 244, 166, 94, 22, 118, 220, 68, 182, 101 }
Session ID: {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods: { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
***
main, WRITE: TLSv1 Handshake, length = 149
main, READ: TLSv1 Handshake, length = 893
*** ServerHello, TLSv1
RandomCookie: GMT: 1476980313 bytes = { 231, 179, 63, 173, 107, 35, 84, 125, 43, 218, 134, 171, 63, 175, 41, 97, 49, 69, 68, 114, 75, 255, 22, 5, 125, 125, 124, 228 }
Session ID: {88, 9, 238, 89, 11, 220, 101, 208, 32, 106, 9, 30, 220, 143, 218, 47, 199, 2, 7, 90, 179, 24, 198, 139, 59, 34, 141, 169, 98, 186, 165, 87}
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
** TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits
modulus: 95112623927847376021742911976482809760928286563374389538614118188348331948203986176617263611529390313893505980510111828145989572854367203125102386298954935692697121151897799979668903275037476471253143679337867450398842776382716002256891170241471053163351903550915614869043680655531661128282766400131123099323
public exponent: 65537
Validity: [From: Wed Jan 02 01:20:42 IST 2013,
To: Sat Jan 06 01:20:42 IST 2018]
Issuer: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown
SerialNumber: [ 50e33e12]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 3F 48 66 AE 51 1D 5C 0C E9 0D 88 DD CD 48 84 B7 ?Hf.Q.\......H..
0010: 9A B3 70 79 C9 43 0E 4D B1 1E 10 5B 7A EB DC 6B ..py.C.M...[z..k
0020: 9B 15 E4 9E 9C 94 39 1C E7 CF 0E 2C D0 A8 A0 1D ......9....,....
0030: A1 A4 E4 63 A0 37 AA 98 72 31 77 56 16 31 49 B9 ...c.7..r1wV.1I.
0040: 8D BD A1 D7 53 BF 82 69 9C C7 B6 2A F0 FA A2 2D ....S..i...*...-
0050: C2 34 25 23 9C DA B6 74 D5 E0 CC 27 45 A9 8C 41 .4%#...t...'E..A
0060: 23 8B 33 A8 92 72 46 77 E0 10 E7 C6 38 9D 1D A8 #.3..rFw....8...
0070: E5 B2 B3 B5 58 99 B3 BD 1C E3 B0 39 54 F2 EB 46 ....X......9T..F
]
***
CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
X.509
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
%% Invalidated: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
main, SEND TLSv1 ALERT: fatal, description = certificate_unknown
main, WRITE: TLSv1 Alert, length = 2
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
main, IOException in getSession(): javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
main, called close()
main, called closeInternal(true)
main, called close()
main, called closeInternal(true)
When I checked logs carefully I noticed Server is sending only first certificate in chain of certificates to client i.e,. ( CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown ), my newly created certificate is not present. Am I doing something wrong?

PANIC: "Oops: 0000 [#1]" (check log for details) - Updated Kernel Tested

I'm trying to interpret a system crash that is repeatable, but but not that often. I believe it has do with a third party driver and a optical scanning device. I'm not sure if the driver for scanning device is causing the hang if it's bringing something out in a USB driver that causes the hang or if it's something totally different.
I'm not a driver developer, so I'm fumbling my way through the crash dump while reading the Linux Kernel Crash Book located here - http://rogunix.com/docs/Reversing&Exploiting/Linux_Kernel_Crash_Book.pdf .
I was able to setup a debug kernel with the kexec tools to produce a vmcore. With crash is see the PANIC: "Oops: 0000 [#1]" (check log for details) and in the logs is see the BUG: unable to handle kernel paging request at virtual address 00100100.
Can you help me interpret more of the dump so I can go back to the developer of the driver and tell them the findings or can you tell me is not the driver at all.
Here's more from the dump. Many thanks in advance.
KERNEL: /usr/lib/debug/lib/modules/2.6.18-194.el5debug/vmlinux
DUMPFILE: /root/kernel/vmcore_12032014
CPUS: 4
DATE: Sat Oct 20 16:51:55 2001
UPTIME: 00:03:55
LOAD AVERAGE: 0.79, 0.83, 0.38
TASKS: 128
NODENAME: 3232A
RELEASE: 2.6.18-194.el5debug
VERSION: #1 SMP Fri Apr 2 16:56:41 EDT 2010
MACHINE: i686 (1800 Mhz)
MEMORY: 2 GB
PANIC: "Oops: 0000 [#1]" (check log for details)
PID: 0
COMMAND: "swapper"
TASK: c069d460 (1 of 4) [THREAD_INFO: c075f000]
CPU: 0
STATE: TASK_RUNNING (PANIC)
crash> bt
PID: 0 TASK: c069d460 CPU: 0 COMMAND: "swapper"
#0 [c080cdb0] crash_kexec at c044a386
#1 [c080cdf4] die at c04065c3
#2 [c080ce24] do_page_fault at c062d1b7
#3 [c080ce5c] error_code (via page_fault) at c0405bc3
EAX: f7c7de2c EBX: 000ffaec ECX: 00000000 EDX: f4282e8c EBP: f7c665a0
DS: 007b ESI: f7c7ddf8 ES: 007b EDI: c080cea4
CS: 0060 EIP: c05a2ef2 ERR: ffffffff EFLAGS: 00010012
#4 [c080ce90] hiddev_send_event at c05a2ef2
#5 [c080cea0] hiddev_report_event at c05a2fcc
#6 [c080cec8] hid_input_report at c05a0fc3
#7 [c080cf1c] hid_irq_in at c05a261d
#8 [c080cf2c] usb_hcd_giveback_urb at c05964b6
#9 [c080cf3c] uhci_giveback_urb at f883f618 [uhci_hcd]
#10 [c080cf58] uhci_scan_schedule at f883fc14 [uhci_hcd]
#11 [c080cfa4] uhci_irq at f884163d [uhci_hcd]
#12 [c080cfc4] usb_hcd_irq at c0596f9b
#13 [c080cfcc] handle_IRQ_event at c0454d5f
#14 [c080cfe4] __do_IRQ at c0454e2d
--- <hard IRQ> ---
#0 [c075ff80] do_IRQ at c040761f
#1 [c075ff98] common_interrupt at c0405a28
EAX: 00000000 EBX: c075f008 ECX: 00000000 EDX: 00000000 EBP: 00000020
DS: 007b ESI: c06440f8 ES: 007b EDI: ca138790
CS: 0060 EIP: c0403d0a ERR: ffffff4e EFLAGS: 00000246
#2 [c075ffcc] mwait_idle at c0403d0a
#3 [c075ffd4] cpu_idle at c0403cc4
crash> log
Scan: First buffer received = 0x6
Scan: Last packet of command transfer = 6 Command size 6
Scan: 0x2 0x51 0x88 0x80 0x81 0x3
Scan: Read data present
Scan: IOCTL_PS3_PEAK_MSG
Scan: In scanner_read Scan: Copied 1 chunks of data to user space
usb 4-1: new full speed USB device using uhci_hcd and address 3
usb 4-1: configuration #1 chosen from 1 choice
pl2303 4-1:1.0: pl2303 converter detected
usb 4-1: pl2303 converter now attached to ttyUSB0
BUG: unable to handle kernel paging request at virtual address 00100100
printing eip:
c05a2ef2
*pde = 76330067
Oops: 0000 [#1]
SMP
last sysfs file: /devices/pci0000:00/0000:00:1d.2/usb4/4-1/bConfigurationValue
Modules linked in: vfat fat scan_drv_scanner(U) xt_limit xt_tcpudp xt_state ip_conntrack nfnetlink iptable_filter ip_tables x_tables loop dm_mirror dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi ac lp joydev snd_hda_intel snd_seq_dummy sg snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_page_alloc parport_pc serio_raw snd_hwdep parport pl2303 snd soundcore i2c_i801 usbserial r8169 i2c_core mii pcspkr dm_raid45 dm_message dm_region_hash dm_log dm_mod dm_mem_cache usb_storage ata_piix libata sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
CPU: 0
EIP: 0060:[<c05a2ef2>] Tainted: G VLI
EFLAGS: 00010012 (2.6.18-194.el5debug #1)
EIP is at hiddev_send_event+0x65/0x95
eax: f7c7de2c ebx: 000ffaec ecx: 00000000 edx: f4282e8c
esi: f7c7ddf8 edi: c080cea4 ebp: f7c665a0 esp: c080ce94
ds: 007b es: 007b ss: 0068
Process swapper (pid: 0, ti=c080c000 task=c069d460 task.ti=c075f000)
Stack: f7cbba78 ca3ec000 c080cebc c05a2fd1 00000001 00000001 ffffffff 00000000
00000000 00000000 00000005 f7cc857c c075ff9c c05a0fc8 f7c57348 00000002
00000002 00000046 c06cbfb0 00000001 ca3ec000 f7cca001 f7cbba78 00000046
Call Trace:
[<c05a2fd1>] hiddev_report_event+0x4b/0x52
[<c05a0fc8>] hid_input_report+0x99/0x399
[<c05a2622>] hid_irq_in+0x49/0xcc
[<c05964b9>] usb_hcd_giveback_urb+0x28/0x53
[<f883f61d>] uhci_giveback_urb+0x104/0x12b [uhci_hcd]
[<f883fc19>] uhci_scan_schedule+0x4f0/0x76b [uhci_hcd]
[<f8841642>] uhci_irq+0x118/0x12e [uhci_hcd]
[<c0596f9e>] usb_hcd_irq+0x23/0x50
[<c0454d61>] handle_IRQ_event+0x3e/0x8a
[<c0454e32>] __do_IRQ+0x85/0xda
[<c0454dad>] __do_IRQ+0x0/0xda
[<c040761f>] do_IRQ+0xa4/0xd1
[<c0405a2d>] common_interrupt+0x25/0x2c
[<c0403d0a>] mwait_idle+0x2a/0x3d
[<c0403cc6>] cpu_idle+0xa4/0xbe
[<c0764a22>] start_kernel+0x39e/0x3a6
=======================
Code: b9 01 00 02 00 ba 1d 00 00 00 40 83 e0 3f 89 83 00 06 00 00 8d 83 0c 06 00 00 e8 93 ac ee ff 8b 9b 14 06 00 00 81 eb 14 06 00 00 <8b> 83 14 06 00 00 0f 18 00 90 8d 93 14 06 00 00 8d 46 34 39 c2
EIP: [<c05a2ef2>] hiddev_send_event+0x65/0x95 SS:ESP 0068:c080ce94
Updated Kernel Tested
I have since updated to the latest CentOS 5.5 released kernel (2.6.18-371.6.1), but still got a kernel panic. However this time the panic occured on the command "khubd" and not on "swapper". I was able to capture the dump and below I have provided what I hope is relevant information to pinpoint this problem. Is it a bug in the kernel or something in the driver?
KERNEL: /usr/lib/debug/lib/modules/2.6.18-371.6.1.el5debug/vmlinux
DUMPFILE: /root/kernel2/HWID-2277-31032014/vmcore
CPUS: 4
DATE: Mon Mar 31 12:50:25 2014
UPTIME: 2 days, 19:29:28
LOAD AVERAGE: 0.07, 0.09, 0.02
TASKS: 181
NODENAME: 32277
RELEASE: 2.6.18-371.6.1.el5debug
VERSION: #1 SMP Wed Mar 12 22:29:36 EDT 2014
MACHINE: i686 (1800 Mhz)
MEMORY: 2 GB
PANIC: "Oops: 0000 [#1]" (check log for details)
PID: 126
COMMAND: "khubd"
TASK: ca2fc5b0 [THREAD_INFO: f7fb2000]
CPU: 3
STATE: TASK_RUNNING (PANIC)
crash> bt
PID: 126 TASK: ca2fc5b0 CPU: 3 COMMAND: "khubd"
#0 [f7fb2dfc] crash_kexec at c044da51
#1 [f7fb2e40] die at c0406649
#2 [f7fb2e70] do_page_fault at c0639449
#3 [f7fb2eb0] device_del at c057053e
#4 [f7fb2efc] device_del at c0570552
#5 [f7fb2f10] device_unregister at c0570669
#6 [f7fb2f18] usb_remove_ep_files at c05a3dac
#7 [f7fb2f38] usb_remove_sysfs_dev_files at c05a39d6
#8 [f7fb2f44] usb_disconnect at c059db59
#9 [f7fb2f58] hub_thread at c059e663
#10 [f7fb2fcc] kthread at c0439ef6
#11 [f7fb2fe4] kernel_thread_helper at c0405e0d
crash> log (truncated)
Scan: no error - In command_callback
Scan: In command_callback
Scan: First buffer received = 0x2a
Scan: Last packet of command transfer = 42 Command size 42
Scan: 0x2 0x44 0x20 0x54 0x65 0x73 0x74 0x20 0x4d 0x65 0x73 0x73
Scan: Read data present
Scan: IOCTL_PS3_PEAK_MSG
Scan: In scanner_read Scan: Copied 1 chunks of data to user space
Scan: IOCTL_PS3_SCANNER_COMMAND Busy slots = 0x0 Total_slots = 0x8 Busy image slots = 0x0
Scan: 0x2 0x38 0x3 0x4
Scan: In write_callback status = 0x0
Scan: In image_callback
Scan: Urb status = 0xffffffb9 Urb length = 0x0
Scan: In image_callback_fun - lost connection to scanner.
Scan: urb set to re-submit
Scan: In command_callback
Scan: Urb status = 0xffffffb9 Urb length = 0x0
Scan: In command_callback_fun - lost connection to scanner.
Scan: urb set to re-submit
usb 1-6: USB disconnect, address 11
BUG: unable to handle kernel paging request at virtual address 6b6b6b93
printing eip:
c04bd310
*pde = 00000000
Oops: 0000 [#1]
SMP
last sysfs file: /devices/pci0000:00/0000:00:1d.7/usb1/1-6/bConfigurationValue
Modules linked in: vfat fat pdi_ps3_drv_scanner(U) xt_limit xt_tcpudp xt_state ip_conntrack nfnetlink iptable_filter ip_tables x_tables loop dm_mirror dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi ac lp joydev snd_hda_intel snd_seq_dummy sg snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer parport_pc snd_page_alloc snd_hwdep snd parport tpm_tis tpm soundcore r8169 tpm_bios i2c_i801 serio_raw pcspkr pl2303 usbserial mii i2c_core dm_raid45 dm_message dm_region_hash dm_log dm_mod dm_mem_cache usb_storage ata_piix libata sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
CPU: 3
EIP: 0060:[<c04bd310>] Tainted: G -------------------- VLI
EFLAGS: 00010202 (2.6.18-371.6.1.el5debug #1)
EIP is at sysfs_hash_and_remove+0x18/0x103
eax: 6b6b6b6b ebx: f4be5bf4 ecx: c0570543 edx: 6b6b6b6b
esi: f4be5b0c edi: f3cd936c ebp: f3cd93c4 esp: f7fb2ee0
ds: 007b es: 007b ss: 0068
Process khubd (pid: 126, ti=f7fb2000 task=ca2fc5b0 task.ti=f7fb2000)
Stack: f4be5c50 6b6b6b6b f764d16c f4be5bf4 f4be5b0c f3cd936c f3cd93c4 c0570557
f4be5b0c f3cd93a0 f3cd936c f7c8da2c c057066e f7fb2f28 c05a3db1 f7fb2f28
c06827a6 00000000 305f7065 c06d0030 f3cd936c f3cd93c4 c05a39db f3cd96cc
Call Trace:
[<c0570557>] device_del+0x5c/0x16b
[<c057066e>] device_unregister+0x8/0x10
[<c05a3db1>] usb_remove_ep_files+0x53/0x75
[<c05a39db>] usb_remove_sysfs_dev_files+0xf/0x6c
[<c059db5e>] usb_disconnect+0xa7/0xe0
[<c059e668>] hub_thread+0x327/0x987
[<c0439ed9>] kthread+0xa1/0xec
[<c0439fab>] autoremove_wake_function+0x0/0x2d
[<c059e341>] hub_thread+0x0/0x987
[<c0439ef8>] kthread+0xc0/0xec
[<c0439e38>] kthread+0x0/0xec
[<c0405e0f>] kernel_thread_helper+0x7/0x10
=======================
Code: 8b 40 24 8b 40 40 c3 8b 40 14 8b 00 c3 8b 40 14 8b 00 c3 55 57 56 53 83 ec 0c 85 c0 89 44 24 04 89 14 24 0f 84 e5 00 00 00 89 c2 <8b> 40 28 85 c0 0f 84 d8 00 00 00 8b 52 70 05 90 00 00 00 89 54
EIP: [<c04bd310>] sysfs_hash_and_remove+0x18/0x103 SS:ESP 0068:f7fb2ee0