I'm using ubuntu20.04 in vmware workstation. I allocate 8 cpu cores, 6G RAM, 4G swap and enough free disk space(at least 25G) to ubuntu20.04. But after running make modules -j4 for about 30 minutes the whole system freezes. The only thing I can do is moving the cursor in virtual machine, the click doesn't get response. When I click "hang up the vm" I get error "cannot hang up vm". After trying several times I can hang it up successsfully. And after I press "continue vm" vm works again but after running about 30 min the situation just occurs again.
gcc version, kernel version are listed below:(they are both compiling linux-4.8.5 kernel source code)
user#ubuntu:~$ gcc --version
gcc (GCC) 4.8.5
Copyright (C) 2015 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
user#ubuntu:~$ uname -r
5.15.57
user#centos7:~$ gcc --version
gcc (GCC) 4.8.5 20150623 (Red Hat 4.8.5-44)
Copyright (C) 2015 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
user#centos7:~$ uname -r
5.15.86
syslog when the freeze situation occurs:
Message from syslogd#ubuntu at Jan 26 18:55:37 ...
kernel:[ 7665.562563] watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cc1:100337]
Jan 26 18:55:37 ubuntu kernel: [ 7665.562563] watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cc1:100337]
Jan 26 18:55:37 ubuntu kernel: [ 7665.562667] Modules linked in: btrfs ... hid_generic
Jan 26 18:55:47 ubuntu kernel: [ 7665.564688] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:55:47 ubuntu kernel: [ 7665.564982] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:55:47 ubuntu kernel: [ 7665.565049] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:55:47 ubuntu kernel: [ 7665.565083] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565393] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:55:47 ubuntu kernel: [ 7665.565437] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:55:47 ubuntu kernel: [ 7665.565441] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565443] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:55:47 ubuntu kernel: [ 7665.565446] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:55:47 ubuntu kernel: [ 7665.565448] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:55:47 ubuntu kernel: [ 7665.565450] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:55:47 ubuntu kernel: [ 7665.565452] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:55:47 ubuntu kernel: [ 7665.565455] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:55:47 ubuntu kernel: [ 7665.565458] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565486] Call Trace:
Jan 26 18:55:47 ubuntu kernel: [ 7665.565515] <TASK>
Jan 26 18:55:47 ubuntu kernel: [ 7665.565669] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:55:47 ubuntu kernel: [ 7665.565844] irqentry_exit+0x1d/0x30
Jan 26 18:55:47 ubuntu kernel: [ 7665.565848] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:55:47 ubuntu kernel: [ 7665.565852] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:55:47 ubuntu kernel: [ 7665.565886] RIP: 0033:0x12cfc00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565972] Code: 33 ff ff ff 83 e6 01 48 89 df e8 4b 0c ff ff 85 c0 0f 84 29 ff ff ff 80 bb 9c 00 00 00 53 0f 85 19 ff ff ff e9 6a ff ff ff 90 <4c> 89 e0 5b 5d 41 5c c3 48 8d 15 c2 3a 79 00 be 1d 0a 00 00 48 8d
Jan 26 18:55:47 ubuntu kernel: [ 7665.565974] RSP: 002b:00007ffd36e8a930 EFLAGS: 00000246
Jan 26 18:55:47 ubuntu kernel: [ 7665.565977] RAX: 0000000002569580 RBX: 00000000023c0a00 RCX: 0000000000000005
Jan 26 18:55:47 ubuntu kernel: [ 7665.565979] RDX: 0000000000000000 RSI: 000000000241dcf0 RDI: 00000000023c0a00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565980] RBP: 00000000023c0a98 R08: 000000000000000f R09: 00007fc50177c000
Jan 26 18:55:47 ubuntu kernel: [ 7665.565981] R10: 0000000002569580 R11: 0256958002569580 R12: 000000000241dcf0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565983] R13: 0000000000000000 R14: 00007ffd36e8a978 R15: 00007fc5007b8f00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565986] </TASK>
Message from syslogd#ubuntu at Jan 26 18:56:06 ...
kernel:[ 7693.578970] watchdog: BUG: soft lockup - CPU#6 stuck for 48s! [cc1:100337]
Jan 26 18:56:06 ubuntu kernel: [ 7693.578970] watchdog: BUG: soft lockup - CPU#6 stuck for 48s! [cc1:100337]
Jan 26 18:56:09 ubuntu kernel: [ 7693.578983] Modules linked in: btrfs ... hid_generic
Jan 26 18:56:09 ubuntu kernel: [ 7693.579073] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:56:09 ubuntu kernel: [ 7693.579088] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:09 ubuntu kernel: [ 7693.579093] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:09 ubuntu kernel: [ 7693.579135] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579146] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:09 ubuntu kernel: [ 7693.579149] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:09 ubuntu kernel: [ 7693.579152] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579154] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:09 ubuntu kernel: [ 7693.579155] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:09 ubuntu kernel: [ 7693.579157] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:09 ubuntu kernel: [ 7693.579159] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:09 ubuntu kernel: [ 7693.579161] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:56:09 ubuntu kernel: [ 7693.579163] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:09 ubuntu kernel: [ 7693.579165] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579169] Call Trace:
Jan 26 18:56:09 ubuntu kernel: [ 7693.579172] <TASK>
(same as above)
</TASK>
Message from syslogd#ubuntu at Jan 26 18:56:40 ...
kernel:[ 7729.590239] watchdog: BUG: soft lockup - CPU#6 stuck for 81s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:57:09 ...
kernel:[ 7757.599000] watchdog: BUG: soft lockup - CPU#6 stuck for 107s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:57:36 ...
kernel:[ 7785.607641] watchdog: BUG: soft lockup - CPU#6 stuck for 133s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:58:27 ...
kernel:[ 7813.614515] watchdog: BUG: soft lockup - CPU#6 stuck for 159s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:58:32 ...
kernel:[ 7841.620739] watchdog: BUG: soft lockup - CPU#6 stuck for 186s! [cc1:100337]
Jan 26 18:56:15 ubuntu kernel: [ 7702.812787] rcu: INFO: rcu_sched self-detected stall on CPU
Jan 26 18:56:15 ubuntu kernel: [ 7702.812875] rcu: 6-....: (1 GPs behind) idle=2df/1/0x4000000000000000 softirq=645654/645656 fqs=31
Jan 26 18:56:15 ubuntu kernel: [ 7702.812919] (t=15001 jiffies g=1424273 q=363)
Jan 26 18:56:15 ubuntu kernel: [ 7702.812947] rcu: rcu_sched kthread starved for 509 jiffies! g1424273 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=5
Jan 26 18:56:15 ubuntu kernel: [ 7702.812954] rcu: Unless rcu_sched kthread gets sufficient CPU time, OOM is now expected behavior.
Jan 26 18:56:15 ubuntu kernel: [ 7702.812956] rcu: RCU grace-period kthread stack dump:
Jan 26 18:56:15 ubuntu kernel: [ 7702.812957] task:rcu_sched state:R running task stack: 0 pid: 14 ppid: 2 flags:0x00004000
Jan 26 18:56:15 ubuntu kernel: [ 7702.813009] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813013] <TASK>
(same as above)
</TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813330] rcu: Stack dump where RCU GP kthread last ran:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813359] Sending NMI from CPU 6 to CPUs 5:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813681] NMI backtrace for cpu 5
Jan 26 18:56:15 ubuntu kernel: [ 7702.813684] CPU: 5 PID: 843 Comm: gmain Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:15 ubuntu kernel: [ 7702.813688] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:15 ubuntu kernel: [ 7702.813690] RIP: 0010:native_write_msr+0x6/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.813761] Code: fc ff b8 40 00 00 00 0f 00 d8 44 89 e7 e8 62 15 fc ff eb cb e8 fb d6 cc 00 66 66 2e 0f 1f 84 00 00 00 00 00 89 f9 89 f0 0f 30 <66> 90 c3 cc cc cc cc 55 48 c1 e2 20 89 f6 48 09 d6 31 d2 48 89 e5
Jan 26 18:56:15 ubuntu kernel: [ 7702.813764] RSP: 0000:ffffc251805c0f00 EFLAGS: 00000007
Jan 26 18:56:15 ubuntu kernel: [ 7702.813767] RAX: 000000009437f6ed RBX: 0000000000000000 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813768] RDX: 0000000000000cb4 RSI: 000000009437f6ed RDI: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813770] RBP: ffffc251805c0f08 R08: 0000000000000001 R09: 000007014874c7c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.813771] R10: 7fffffffffffffff R11: ffffc251805c0ff8 R12: 000027a10367387b
Jan 26 18:56:15 ubuntu kernel: [ 7702.813772] R13: ffffa04af7f5fe00 R14: ffffa04af7f62db8 R15: ffffa04af7f62df8
Jan 26 18:56:15 ubuntu kernel: [ 7702.813796] FS: 00007f02c513e700(0000) GS:ffffa04af7f40000(0000) knlGS:0000000000000000
Jan 26 18:56:15 ubuntu kernel: [ 7702.813798] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:15 ubuntu kernel: [ 7702.813800] CR2: 00007f00d5bf2000 CR3: 0000000117928001 CR4: 00000000003706e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813803] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813805] <IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813848] ? lapic_next_deadline+0x2c/0x40
Jan 26 18:56:15 ubuntu kernel: [ 7702.813936] clockevents_program_event+0xa8/0x130
Jan 26 18:56:15 ubuntu kernel: [ 7702.813968] tick_program_event+0x41/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.813971] ? hrtimer_update_next_event+0x4f/0x70
Jan 26 18:56:15 ubuntu kernel: [ 7702.813973] hrtimer_interrupt+0x136/0x230
Jan 26 18:56:15 ubuntu kernel: [ 7702.813976] __sysvec_apic_timer_interrupt+0x5e/0xe0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813978] sysvec_apic_timer_interrupt+0x7b/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.813982] </IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813983] <TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813983] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.813986] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813989] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:15 ubuntu kernel: [ 7702.813991] RSP: 0000:ffffc2518434fed8 EFLAGS: 00000202
Jan 26 18:56:15 ubuntu kernel: [ 7702.813993] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813994] RDX: ffffa04a40339900 RSI: 0000000000000000 RDI: ffffc2518434ff58
Jan 26 18:56:15 ubuntu kernel: [ 7702.813995] RBP: ffffc2518434ff08 R08: 0000000000000000 R09: 0000070146c988c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.813996] R10: 00000701468c7fc1 R11: 00000000000024d8 R12: ffffc2518434ff58
Jan 26 18:56:15 ubuntu kernel: [ 7702.813998] R13: ffffa04a557ce400 R14: ffffa04a557ce400 R15: ffffa04a557ce400
Jan 26 18:56:15 ubuntu kernel: [ 7702.814000] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814004] irqentry_exit+0x1d/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.814007] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814011] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814013] RIP: 0033:0x7f02c5e07508
Jan 26 18:56:15 ubuntu kernel: [ 7702.814017] Code: c0 74 0f e9 4a f5 ff ff 66 2e 0f 1f 84 00 00 00 00 00 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 31 f6 87 37 <83> fe 01 74 0b e9 ce f4 ff ff 66 0f 1f 44 00 00 c3 0f 1f 80 00 00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814019] RSP: 002b:00007f02c513dc98 EFLAGS: 00000246
Jan 26 18:56:15 ubuntu kernel: [ 7702.814021] RAX: 0000000000000f6a RBX: 000000007fffffff RCX: 0000000000000004
Jan 26 18:56:15 ubuntu kernel: [ 7702.814023] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000055920b115870
Jan 26 18:56:15 ubuntu kernel: [ 7702.814024] RBP: 0000000000000002 R08: 0000000000000002 R09: 0000000000000001
Jan 26 18:56:15 ubuntu kernel: [ 7702.814025] R10: 000055920b132e00 R11: 000055920b112580 R12: 0000000000000002
Jan 26 18:56:15 ubuntu kernel: [ 7702.814026] R13: 000055920b115870 R14: 000055920b112dd0 R15: 00007f02c513dcf4
Jan 26 18:56:15 ubuntu kernel: [ 7702.814028] </TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814382] NMI backtrace for cpu 6
Jan 26 18:56:15 ubuntu kernel: [ 7702.814389] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:15 ubuntu kernel: [ 7702.814393] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:15 ubuntu kernel: [ 7702.814394] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.814395] <IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814397] dump_stack_lvl+0x4a/0x63
Jan 26 18:56:15 ubuntu kernel: [ 7702.814484] dump_stack+0x10/0x16
Jan 26 18:56:15 ubuntu kernel: [ 7702.814487] nmi_cpu_backtrace.cold+0x4d/0x96
Jan 26 18:56:15 ubuntu kernel: [ 7702.814491] ? lapic_can_unplug_cpu+0x90/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814495] nmi_trigger_cpumask_backtrace+0xf3/0x100
Jan 26 18:56:15 ubuntu kernel: [ 7702.814594] arch_trigger_cpumask_backtrace+0x19/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814598] rcu_dump_cpu_stacks+0x132/0x16d
Jan 26 18:56:15 ubuntu kernel: [ 7702.814762] rcu_sched_clock_irq.cold+0x100/0x36a
Jan 26 18:56:15 ubuntu kernel: [ 7702.814787] ? account_system_index_time+0xa0/0xc0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814831] update_process_times+0x94/0xd0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814861] tick_sched_handle.isra.0+0x25/0x60
Jan 26 18:56:15 ubuntu kernel: [ 7702.814865] tick_sched_timer+0x71/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814868] ? tick_sched_do_timer+0x50/0x50
Jan 26 18:56:15 ubuntu kernel: [ 7702.814871] __hrtimer_run_queues+0xc8/0x1d0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814873] hrtimer_interrupt+0x109/0x230
Jan 26 18:56:15 ubuntu kernel: [ 7702.814876] __sysvec_apic_timer_interrupt+0x5e/0xe0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814878] sysvec_apic_timer_interrupt+0x7b/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814883] </IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814883] <TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814884] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814887] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814890] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:15 ubuntu kernel: [ 7702.814893] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:15 ubuntu kernel: [ 7702.814896] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814897] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:15 ubuntu kernel: [ 7702.814899] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.814927] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:15 ubuntu kernel: [ 7702.814929] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:15 ubuntu kernel: [ 7702.814932] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814937] irqentry_exit+0x1d/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.814940] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814943] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814945] RIP: 0033:0x12cfc00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814949] Code: 33 ff ff ff 83 e6 01 48 89 df e8 4b 0c ff ff 85 c0 0f 84 29 ff ff ff 80 bb 9c 00 00 00 53 0f 85 19 ff ff ff e9 6a ff ff ff 90 <4c> 89 e0 5b 5d 41 5c c3 48 8d 15 c2 3a 79 00 be 1d 0a 00 00 48 8d
Jan 26 18:56:15 ubuntu kernel: [ 7702.814951] RSP: 002b:00007ffd36e8a930 EFLAGS: 00000246
Jan 26 18:56:15 ubuntu kernel: [ 7702.814953] RAX: 0000000002569580 RBX: 00000000023c0a00 RCX: 0000000000000005
Jan 26 18:56:15 ubuntu kernel: [ 7702.814978] RDX: 0000000000000000 RSI: 000000000241dcf0 RDI: 00000000023c0a00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814980] RBP: 00000000023c0a98 R08: 000000000000000f R09: 00007fc50177c000
Jan 26 18:56:15 ubuntu kernel: [ 7702.814981] R10: 0000000002569580 R11: 0256958002569580 R12: 000000000241dcf0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814983] R13: 0000000000000000 R14: 00007ffd36e8a978 R15: 00007fc5007b8f00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814985] </TASK>
Jan 26 18:56:40 ubuntu kernel: [ 7729.590239] watchdog: BUG: soft lockup - CPU#6 stuck for 81s! [cc1:100337]
Jan 26 18:56:40 ubuntu kernel: [ 7729.590249] Modules linked in: btrfs ... hid_generic
Jan 26 18:56:40 ubuntu kernel: [ 7729.590369] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:56:40 ubuntu kernel: [ 7729.590381] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:40 ubuntu kernel: [ 7729.590385] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:40 ubuntu kernel: [ 7729.590387] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590394] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:40 ubuntu kernel: [ 7729.590397] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:40 ubuntu kernel: [ 7729.590400] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590402] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:40 ubuntu kernel: [ 7729.590403] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:40 ubuntu kernel: [ 7729.590405] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:40 ubuntu kernel: [ 7729.590407] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:40 ubuntu kernel: [ 7729.590409] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:56:40 ubuntu kernel: [ 7729.590411] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:40 ubuntu kernel: [ 7729.590412] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590451] Call Trace:
Jan 26 18:56:40 ubuntu kernel: [ 7729.590453] <TASK>
(same as above)
</TASK>
Jan 26 18:57:09 ubuntu kernel: [ 7757.599000] watchdog: BUG: soft lockup - CPU#6 stuck for 107s! [cc1:100337]
Jan 26 18:57:09 ubuntu kernel: [ 7757.599009] Modules linked in: btrfs ... hid_generic
Jan 26 18:57:09 ubuntu kernel: [ 7757.599076] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:57:09 ubuntu kernel: [ 7757.599086] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:57:09 ubuntu kernel: [ 7757.599089] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:57:09 ubuntu kernel: [ 7757.599091] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599097] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:57:09 ubuntu kernel: [ 7757.599099] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:57:09 ubuntu kernel: [ 7757.599101] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599103] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:57:09 ubuntu kernel: [ 7757.599104] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:57:09 ubuntu kernel: [ 7757.599105] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:57:09 ubuntu kernel: [ 7757.599106] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:57:09 ubuntu kernel: [ 7757.599108] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:57:09 ubuntu kernel: [ 7757.599110] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:57:09 ubuntu kernel: [ 7757.599111] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599114] Call Trace:
Jan 26 18:57:16 ubuntu kernel: [ 7757.599116] <TASK>
(same as above)
</TASK>
Jan 26 18:57:36 ubuntu kernel: [ 7785.607641] watchdog: BUG: soft lockup - CPU#6 stuck for 133s! [cc1:100337]
Jan 26 18:57:36 ubuntu kernel: [ 7785.607651] Modules linked in: btrfs ... hid_generic
Jan 26 18:57:36 ubuntu kernel: [ 7785.607750] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:57:36 ubuntu kernel: [ 7785.607760] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:57:36 ubuntu kernel: [ 7785.607764] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:57:36 ubuntu kernel: [ 7785.607765] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:57:36 ubuntu kernel: [ 7785.607772] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:57:36 ubuntu kernel: [ 7785.607774] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:57:36 ubuntu kernel: [ 7785.607776] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:57:36 ubuntu kernel: [ 7785.607777] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:57:36 ubuntu kernel: [ 7785.607779] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:57:36 ubuntu kernel: [ 7785.607780] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:57:36 ubuntu kernel: [ 7785.607781] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:57:36 ubuntu kernel: [ 7785.607782] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:57:36 ubuntu kernel: [ 7785.607784] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:57:36 ubuntu kernel: [ 7785.607785] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:57:59 ubuntu kernel: [ 7785.607788] Call Trace:
Jan 26 18:58:27 ubuntu kernel: [ 7785.607790] <TASK>
(same as above)
</TASK>
Jan 26 18:58:27 ubuntu kernel: [ 7813.614515] watchdog: BUG: soft lockup - CPU#6 stuck for 159s! [cc1:100337]
Jan 26 18:58:27 ubuntu kernel: [ 7813.614524] Modules linked in: btrfs ... hid_generic
Jan 26 18:58:27 ubuntu kernel: [ 7813.614588] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:58:27 ubuntu kernel: [ 7813.614635] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:58:27 ubuntu kernel: [ 7813.614638] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:58:27 ubuntu kernel: [ 7813.614640] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614646] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:58:27 ubuntu kernel: [ 7813.614648] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:58:27 ubuntu kernel: [ 7813.614650] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614652] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:58:27 ubuntu kernel: [ 7813.614653] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:58:27 ubuntu kernel: [ 7813.614654] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:58:27 ubuntu kernel: [ 7813.614656] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:58:27 ubuntu kernel: [ 7813.614657] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:58:27 ubuntu kernel: [ 7813.614659] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:58:27 ubuntu kernel: [ 7813.614660] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614686] Call Trace:
(same as above)
</TASK>
Jan 26 18:58:32 ubuntu kernel: [ 7841.620739] watchdog: BUG: soft lockup - CPU#6 stuck for 186s! [cc1:100337]
Jan 26 18:58:32 ubuntu kernel: [ 7841.620748] Modules linked in: btrfs ... hid_generic
Jan 26 18:58:32 ubuntu kernel: [ 7841.620818] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:58:32 ubuntu kernel: [ 7841.620830] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:58:32 ubuntu kernel: [ 7841.620833] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:58:32 ubuntu kernel: [ 7841.620835] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620842] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:58:32 ubuntu kernel: [ 7841.620844] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:58:32 ubuntu kernel: [ 7841.620847] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620848] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:58:32 ubuntu kernel: [ 7841.620886] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:58:32 ubuntu kernel: [ 7841.620888] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:58:32 ubuntu kernel: [ 7841.620890] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:58:32 ubuntu kernel: [ 7841.620891] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:58:32 ubuntu kernel: [ 7841.620893] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:58:32 ubuntu kernel: [ 7841.620895] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620898] Call Trace:
Jan 26 18:58:32 ubuntu kernel: [ 7841.620900] <TASK>
(same as above)
</TASK>
Jan 26 19:05:42 ubuntu NetworkManager[768]: <info> [1674788384.3036] manager: NetworkManager state is now CONNECTED_SITE
I encountered freezing once, by adding RAM I solved the problem. But this time I add RAM to 8G, freezing still occurs. What also confuses me is that my centos vm with 3G RAM and 8 cpu cores run make modules -j8 successfully. I have no idea about the difference.
To check the cpu and memory usage I execute top at the same time. the picture is top's output when freezing occurs. top command output
As i know global variables(in userspace programs) are stored in coressponding DATA (and BSS) segment. But how and where are they stored in case of kernel code?
For an example let's look at one of Linux's global variable. Basically, Linux is an ELF image compressed with gzip or other compression tools. As stated on Wikipedia (https://en.wikipedia.org/wiki/Vmlinux):
Traditionally, when creating a bootable kernel image, the kernel is also compressed using gzip, or, since Linux 2.6.30,[3] using LZMA or bzip2, which requires a very small decompression stub to be included in the resulting image. The stub decompresses the kernel code, on some systems printing dots to the console to indicate progress, and then continues the boot process. Support for LZO,[4] xz[5] and LZ4[6] compression was added later.
On Ubuntu, there is a special script called extract-vmlinux which comes with your version of the Linux kernel (https://blog.packagecloud.io/eng/2016/03/08/how-to-extract-and-disassmble-a-linux-kernel-image-vmlinuz/). The Linux ELF file is /boot/vmlinuz. To decompress it, you must use the extract-vmlinux script which can be installed with
sudo apt-get install linux-headers-$(uname -r)
The script is safe to use because it is a standard script which is found in the official repository of packages for your distribution (most packages there are open source and safe). Now use
sudo /usr/src/kernels/$(uname -r)/scripts/extract-vmlinux /boot/vmlinuz-$(uname -r) > vmlinux
to extract the Linux kernel's ELF file from the compressed vmlinux image to your home repository. Now we can look at the ELF file of the Linux kernel. Use readelf -a vmlinux to have a summary of the content. The output for me is this:
user#user-System-Product-Name:~$ readelf -a vmlinux
ELF Header:
Magic: 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00
Class: ELF64
Data: 2's complement, little endian
Version: 1 (current)
OS/ABI: UNIX - System V
ABI Version: 0
Type: EXEC (Executable file)
Machine: Advanced Micro Devices X86-64
Version: 0x1
Entry point address: 0x1000000
Start of program headers: 64 (bytes into file)
Start of section headers: 46137728 (bytes into file)
Flags: 0x0
Size of this header: 64 (bytes)
Size of program headers: 56 (bytes)
Number of program headers: 5
Size of section headers: 64 (bytes)
Number of section headers: 35
Section header string table index: 34
Section Headers:
[Nr] Name Type Address Offset
Size EntSize Flags Link Info Align
[ 0] NULL 0000000000000000 00000000
0000000000000000 0000000000000000 0 0 0
[ 1] .text PROGBITS ffffffff81000000 00200000
0000000000e025f7 0000000000000000 AX 0 0 4096
[ 2] .rodata PROGBITS ffffffff82000000 01200000
00000000004e46f2 0000000000000000 WA 0 0 4096
[ 3] .pci_fixup PROGBITS ffffffff824e4700 016e4700
00000000000032b0 0000000000000000 A 0 0 16
[ 4] .tracedata PROGBITS ffffffff824e79b0 016e79b0
0000000000000078 0000000000000000 A 0 0 1
[ 5] __ksymtab PROGBITS ffffffff824e7a28 016e7a28
0000000000010a34 0000000000000000 A 0 0 4
[ 6] __ksymtab_gpl PROGBITS ffffffff824f845c 016f845c
00000000000121ec 0000000000000000 A 0 0 4
[ 7] __kcrctab PROGBITS ffffffff8250a648 0170a648
00000000000058bc 0000000000000000 A 0 0 4
[ 8] __kcrctab_gpl PROGBITS ffffffff8250ff04 0170ff04
00000000000060a4 0000000000000000 A 0 0 4
[ 9] __ksymtab_strings PROGBITS ffffffff82515fa8 01715fa8
0000000000037bea 0000000000000001 AMS 0 0 1
[10] __init_rodata PROGBITS ffffffff8254dba0 0174dba0
00000000000002a8 0000000000000000 A 0 0 32
[11] __param PROGBITS ffffffff8254de48 0174de48
00000000000038e0 0000000000000000 A 0 0 8
[12] __modver PROGBITS ffffffff82551728 01751728
00000000000005a0 0000000000000000 WA 0 0 8
[13] __ex_table PROGBITS ffffffff82551cd0 01751cd0
0000000000001af4 0000000000000000 A 0 0 4
[14] .notes NOTE ffffffff825537c4 017537c4
00000000000001ec 0000000000000000 A 0 0 4
[15] .data PROGBITS ffffffff82600000 01800000
00000000003657c0 0000000000000000 WA 0 0 8192
[16] __bug_table PROGBITS ffffffff829657c0 01b657c0
00000000000178d4 0000000000000000 WA 0 0 1
[17] .vvar PROGBITS ffffffff8297e000 01b7e000
0000000000001000 0000000000000000 WA 0 0 16
[18] .data..percpu PROGBITS 0000000000000000 01c00000
000000000002f000 0000000000000000 WA 0 0 4096
[19] .init.text PROGBITS ffffffff829ae000 01dae000
00000000000772e5 0000000000000000 AX 0 0 16
[20] .altinstr_aux PROGBITS ffffffff82a252e5 01e252e5
0000000000002d9b 0000000000000000 AX 0 0 1
[21] .init.data PROGBITS ffffffff82a2a000 01e2a000
00000000001c74f0 0000000000000000 WA 0 0 8192
[22] .x86_cpu_dev.init PROGBITS ffffffff82bf14f0 01ff14f0
0000000000000028 0000000000000000 A 0 0 8
[23] .parainstructions PROGBITS ffffffff82bf1518 01ff1518
0000000000022b7c 0000000000000000 A 0 0 8
[24] .altinstructions PROGBITS ffffffff82c14098 02014098
0000000000006660 0000000000000000 A 0 0 1
[25] .altinstr_replace PROGBITS ffffffff82c1a6f8 0201a6f8
0000000000001789 0000000000000000 AX 0 0 1
[26] .iommu_table PROGBITS ffffffff82c1be88 0201be88
00000000000000f0 0000000000000000 A 0 0 8
[27] .apicdrivers PROGBITS ffffffff82c1bf78 0201bf78
0000000000000040 0000000000000000 WA 0 0 8
[28] .exit.text PROGBITS ffffffff82c1bfb8 0201bfb8
0000000000001f4b 0000000000000000 AX 0 0 1
[29] .smp_locks PROGBITS ffffffff82c1e000 0201e000
000000000000a000 0000000000000000 A 0 0 4
[30] .data_nosave PROGBITS ffffffff82c28000 02028000
0000000000001000 0000000000000000 WA 0 0 4
[31] .bss NOBITS ffffffff82c29000 02029000
00000000005d7000 0000000000000000 WA 0 0 4096
[32] .brk NOBITS ffffffff83200000 02029000
000000000002c000 0000000000000000 WA 0 0 1
[33] .init.scratch PROGBITS ffffffff83400000 02800000
0000000000400000 0000000000000000 WA 0 0 32
[34] .shstrtab STRTAB 0000000000000000 02c00000
0000000000000180 0000000000000000 0 0 1
Key to Flags:
W (write), A (alloc), X (execute), M (merge), S (strings), I (info),
L (link order), O (extra OS processing required), G (group), T (TLS),
C (compressed), x (unknown), o (OS specific), E (exclude),
l (large), p (processor specific)
There are no section groups in this file.
Program Headers:
Type Offset VirtAddr PhysAddr
FileSiz MemSiz Flags Align
LOAD 0x0000000000200000 0xffffffff81000000 0x0000000001000000
0x00000000015539b0 0x00000000015539b0 R E 0x200000
LOAD 0x0000000001800000 0xffffffff82600000 0x0000000002600000
0x000000000037f000 0x000000000037f000 RW 0x200000
LOAD 0x0000000001c00000 0x0000000000000000 0x000000000297f000
0x000000000002f000 0x000000000002f000 RW 0x200000
LOAD 0x0000000001dae000 0xffffffff829ae000 0x00000000029ae000
0x0000000000e52000 0x0000000000e52000 RWE 0x200000
NOTE 0x00000000017537c4 0xffffffff825537c4 0x00000000025537c4
0x00000000000001ec 0x00000000000001ec 0x4
Section to Segment mapping:
Segment Sections...
00 .text .rodata .pci_fixup .tracedata __ksymtab __ksymtab_gpl __kcrctab __kcrctab_gpl __ksymtab_strings __init_rodata __param __modver __ex_table .notes
01 .data __bug_table .vvar
02 .data..percpu
03 .init.text .altinstr_aux .init.data .x86_cpu_dev.init .parainstructions .altinstructions .altinstr_replacement .iommu_table .apicdrivers .exit.text .smp_locks .data_nosave .bss .brk .init.scratch
04 .notes
There is no dynamic section in this file.
There are no relocations in this file.
The decoding of unwind sections for machine type Advanced Micro Devices X86-64 is not currently supported.
No version information found in this file.
Displaying notes found in: .notes
Owner Data size Description
Xen 0x00000006 Unknown note type: (0x00000006)
description data: 6c 69 6e 75 78 00
Xen 0x00000004 Unknown note type: (0x00000007)
description data: 32 2e 36 00
Xen 0x00000008 Unknown note type: (0x00000005)
description data: 78 65 6e 2d 33 2e 30 00
Xen 0x00000008 Unknown note type: (0x00000003)
description data: 00 00 00 80 ff ff ff ff
Xen 0x00000008 Unknown note type: (0x0000000f)
description data: 00 00 00 00 80 00 00 00
Xen 0x00000008 NT_VERSION (version)
description data: c0 e1 9a 82 ff ff ff ff
Xen 0x00000008 NT_ARCH (architecture)
description data: 00 20 00 81 ff ff ff ff
Xen 0x00000029 Unknown note type: (0x0000000a)
description data: 21 77 72 69 74 61 62 6c 65 5f 70 61 67 65 5f 74 61 62 6c 65 73 7c 70 61 65 5f 70 67 64 69 72 5f 61 62 6f 76 65 5f 34 67 62
Xen 0x00000004 Unknown note type: (0x00000011)
description data: 01 88 00 00
Xen 0x00000004 Unknown note type: (0x00000009)
description data: 79 65 73 00
Xen 0x00000008 Unknown note type: (0x00000008)
description data: 67 65 6e 65 72 69 63 00
Xen 0x00000010 Unknown note type: (0x0000000d)
description data: 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00
Xen 0x00000004 Unknown note type: (0x0000000e)
description data: 01 00 00 00
Xen 0x00000004 Unknown note type: (0x00000010)
description data: 01 00 00 00
Xen 0x00000008 Unknown note type: (0x0000000c)
description data: 00 00 00 00 00 80 ff ff
Xen 0x00000008 Unknown note type: (0x00000004)
description data: 00 00 00 00 00 00 00 00
GNU 0x00000014 NT_GNU_BUILD_ID (unique build ID bitstring)
Build ID: c0263a3075bc0a9388365ddf35ab5422da3356a9
Linux 0x00000001 OPEN
description data: 00
Xen 0x00000008 Unknown note type: (0x00000012)
description data: 40 07 00 01 00 00 00 00
The important section for the question is the Program headers section:
Program Headers:
Type Offset VirtAddr PhysAddr
FileSiz MemSiz Flags Align
LOAD 0x0000000000200000 0xffffffff81000000 0x0000000001000000
0x00000000015539b0 0x00000000015539b0 R E 0x200000
LOAD 0x0000000001800000 0xffffffff82600000 0x0000000002600000
0x000000000037f000 0x000000000037f000 RW 0x200000
LOAD 0x0000000001c00000 0x0000000000000000 0x000000000297f000
0x000000000002f000 0x000000000002f000 RW 0x200000
LOAD 0x0000000001dae000 0xffffffff829ae000 0x00000000029ae000
0x0000000000e52000 0x0000000000e52000 RWE 0x200000
NOTE 0x00000000017537c4 0xffffffff825537c4 0x00000000025537c4
0x00000000000001ec 0x00000000000001ec 0x4
I would guess that the RW sections are the data/bss segments of the static and freestanding kernel image. There isn't much bss data (uninitialized data) in this kernel image. You can see that by looking at the filesize versus the memsize of the different segments. In bss data, only the size is written in the executable. The loader will then assign zeroes to these segments. Since we have only memsizes which are equal to the filesizes, then we don't have much bss here.
Also, we can look at the different virtual addresses at which the kernel will load itself after decompression. This will be useful to find the segment in which a certain global variable resides.
Now, to determine where a global variable is loaded one can look at the System.map file in the /boot directory. For example, we can take a random global variable in kernel/sched/core.c called sysctl_sched_rt_period and find its address using
user#user-System-Product-Name:~$ sudo grep "sysctl_sched_rt_period" /boot/System.map-$(uname -r)
ffffffff8266eb24 D sysctl_sched_rt_period
The address is thus ffffffff8266eb24. This address resides in the RW segment loaded at ffffffff82600000 because the size of this segment is 37f000 and because ffffffff82600000 + 37f000 > ffffffff8266eb24. You can clearly see that this global variable is stored in the data segment of the kernel's executable.
I have gone through loads of material present on internet for SSL. I followed the steps and created self signed certificate on server (linux) using keytool. Server keystore was already having an entry as ( CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown), my new certificate was second entry as ( CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server ). Then I exported the certificate(.cer) using keytool and copied same on my client(windows). I then imported server generated certificate to client trustore. Now when I try to communicate using SSL it fails everytime. I turned on SSL debug on client. Below is the log
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
***
found key for : Client
chain [0] = [
[
Version: V3
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits
modulus: 19643942881710234591525118408612815215632338692166465250629734200981703093763200559775845583913404371567241804832487728799610532434766533695993759141114319525441958126364976642955560446067359829730544145500409447935888670367709958247941184557182316292540918805424085096889405623367353240389104083404287642633808982388623942568195322780929142023222276129235672938020453213230922184807911898395818264624343113898437136096266829934433793735074739359988881755805184514603338282021635155460130597302085016075305135792447640646817495498043975883348791446660517781531653507565586938242488813328480016900010365926159926261191
public exponent: 65537
Validity: [From: Fri Oct 21 13:20:47 IST 2016,
To: Thu Jan 19 13:20:47 IST 2017]
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
SerialNumber: [ 46dac56d]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 72 B5 E3 14 98 BD 53 F3 69 33 96 A5 71 F5 99 2B r.....S.i3..q..+
0010: 22 0F B9 F6 "...
]
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 21 16 B3 C9 5D BC EB 71 35 78 95 8E BF 30 72 AC !...]..q5x...0r.
0010: D1 42 AA B7 C1 8B 23 FD 67 DF 6F 36 85 E8 C6 05 .B....#.g.o6....
0020: A4 7B E7 A5 B5 3A FC 0C 88 29 3D C3 CD C2 88 8D .....:...)=.....
0030: 86 3A BF 14 85 93 01 75 5E 6E 01 87 44 A9 0A 21 .:.....u^n..D..!
0040: A2 F0 C3 05 9C 40 7B 89 61 DB 84 28 73 89 0F 3A .....#..a..(s..:
0050: B7 96 E8 63 30 29 8A B5 11 4C D2 7E A8 17 6F 0F ...c0)...L....o.
0060: 4E C7 4A AD E0 A8 6E 68 CE 72 FE DD DE F7 1C 84 N.J...nh.r......
0070: 20 C9 C4 CA F1 6A 3B C0 F9 A8 DD 03 0B EF 04 03 ....j;.........
0080: 40 BA 37 F6 B6 9C BE FF A9 E6 0E BF E6 32 B8 B3 #.7..........2..
0090: 0A EB 0F F7 EA 23 93 D1 17 D7 6E 94 0C 98 4C 90 .....#....n...L.
00A0: 40 21 DE 39 09 A9 16 2A 97 DD 2D E5 C0 FC FE 2E #!.9...*..-.....
00B0: AE 36 0C 04 6D A8 8F 1D B8 2B 99 54 7C AD 4F 8C .6..m....+.T..O.
00C0: 01 9C C2 07 77 81 A7 6C 07 2D A3 75 1D 4E E4 16 ....w..l.-.u.N..
00D0: 7E D0 BD E4 79 0F B6 9C C8 62 2E D6 E1 AC 35 58 ....y....b....5X
00E0: 22 B2 8C 4B FE 9A 06 C4 53 C1 8F 45 EA 61 3A 7F "..K....S..E.a:.
00F0: 3C D1 15 0D A8 27 3E 0F AB F5 8F DA 78 05 5F AE <....'>.....x._.
]
***
trigger seeding of SecureRandom
done seeding SecureRandom
keyStore is : D:\\Development\\Workspace\\Eclipse\\testSSL\\Sample\\.keystore
keyStore type is : jks
keyStore provider is :
init keystore
init keymanager of type SunX509
***
found key for : Client
chain [0] = [
[
Version: V3
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits
modulus: 19643942881710234591525118408612815215632338692166465250629734200981703093763200559775845583913404371567241804832487728799610532434766533695993759141114319525441958126364976642955560446067359829730544145500409447935888670367709958247941184557182316292540918805424085096889405623367353240389104083404287642633808982388623942568195322780929142023222276129235672938020453213230922184807911898395818264624343113898437136096266829934433793735074739359988881755805184514603338282021635155460130597302085016075305135792447640646817495498043975883348791446660517781531653507565586938242488813328480016900010365926159926261191
public exponent: 65537
Validity: [From: Fri Oct 21 13:20:47 IST 2016,
To: Thu Jan 19 13:20:47 IST 2017]
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
SerialNumber: [ 46dac56d]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 72 B5 E3 14 98 BD 53 F3 69 33 96 A5 71 F5 99 2B r.....S.i3..q..+
0010: 22 0F B9 F6 "...
]
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 21 16 B3 C9 5D BC EB 71 35 78 95 8E BF 30 72 AC !...]..q5x...0r.
0010: D1 42 AA B7 C1 8B 23 FD 67 DF 6F 36 85 E8 C6 05 .B....#.g.o6....
0020: A4 7B E7 A5 B5 3A FC 0C 88 29 3D C3 CD C2 88 8D .....:...)=.....
0030: 86 3A BF 14 85 93 01 75 5E 6E 01 87 44 A9 0A 21 .:.....u^n..D..!
0040: A2 F0 C3 05 9C 40 7B 89 61 DB 84 28 73 89 0F 3A .....#..a..(s..:
0050: B7 96 E8 63 30 29 8A B5 11 4C D2 7E A8 17 6F 0F ...c0)...L....o.
0060: 4E C7 4A AD E0 A8 6E 68 CE 72 FE DD DE F7 1C 84 N.J...nh.r......
0070: 20 C9 C4 CA F1 6A 3B C0 F9 A8 DD 03 0B EF 04 03 ....j;.........
0080: 40 BA 37 F6 B6 9C BE FF A9 E6 0E BF E6 32 B8 B3 #.7..........2..
0090: 0A EB 0F F7 EA 23 93 D1 17 D7 6E 94 0C 98 4C 90 .....#....n...L.
00A0: 40 21 DE 39 09 A9 16 2A 97 DD 2D E5 C0 FC FE 2E #!.9...*..-.....
00B0: AE 36 0C 04 6D A8 8F 1D B8 2B 99 54 7C AD 4F 8C .6..m....+.T..O.
00C0: 01 9C C2 07 77 81 A7 6C 07 2D A3 75 1D 4E E4 16 ....w..l.-.u.N..
00D0: 7E D0 BD E4 79 0F B6 9C C8 62 2E D6 E1 AC 35 58 ....y....b....5X
00E0: 22 B2 8C 4B FE 9A 06 C4 53 C1 8F 45 EA 61 3A 7F "..K....S..E.a:.
00F0: 3C D1 15 0D A8 27 3E 0F AB F5 8F DA 78 05 5F AE <....'>.....x._.
]
***
trustStore is: D:\Development\Workspace\Eclipse\testSSL\Sample\.keystore
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
trigger seeding of SecureRandom
done seeding SecureRandom
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
main, setSoTimeout(0) called
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1476980696 bytes = { 63, 74, 124, 176, 200, 133, 175, 107, 173, 166, 115, 188, 94, 103, 2, 237, 54, 77, 30, 244, 166, 94, 22, 118, 220, 68, 182, 101 }
Session ID: {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods: { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
***
main, WRITE: TLSv1 Handshake, length = 149
main, READ: TLSv1 Handshake, length = 893
*** ServerHello, TLSv1
RandomCookie: GMT: 1476980313 bytes = { 231, 179, 63, 173, 107, 35, 84, 125, 43, 218, 134, 171, 63, 175, 41, 97, 49, 69, 68, 114, 75, 255, 22, 5, 125, 125, 124, 228 }
Session ID: {88, 9, 238, 89, 11, 220, 101, 208, 32, 106, 9, 30, 220, 143, 218, 47, 199, 2, 7, 90, 179, 24, 198, 139, 59, 34, 141, 169, 98, 186, 165, 87}
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
** TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits
modulus: 95112623927847376021742911976482809760928286563374389538614118188348331948203986176617263611529390313893505980510111828145989572854367203125102386298954935692697121151897799979668903275037476471253143679337867450398842776382716002256891170241471053163351903550915614869043680655531661128282766400131123099323
public exponent: 65537
Validity: [From: Wed Jan 02 01:20:42 IST 2013,
To: Sat Jan 06 01:20:42 IST 2018]
Issuer: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown
SerialNumber: [ 50e33e12]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 3F 48 66 AE 51 1D 5C 0C E9 0D 88 DD CD 48 84 B7 ?Hf.Q.\......H..
0010: 9A B3 70 79 C9 43 0E 4D B1 1E 10 5B 7A EB DC 6B ..py.C.M...[z..k
0020: 9B 15 E4 9E 9C 94 39 1C E7 CF 0E 2C D0 A8 A0 1D ......9....,....
0030: A1 A4 E4 63 A0 37 AA 98 72 31 77 56 16 31 49 B9 ...c.7..r1wV.1I.
0040: 8D BD A1 D7 53 BF 82 69 9C C7 B6 2A F0 FA A2 2D ....S..i...*...-
0050: C2 34 25 23 9C DA B6 74 D5 E0 CC 27 45 A9 8C 41 .4%#...t...'E..A
0060: 23 8B 33 A8 92 72 46 77 E0 10 E7 C6 38 9D 1D A8 #.3..rFw....8...
0070: E5 B2 B3 B5 58 99 B3 BD 1C E3 B0 39 54 F2 EB 46 ....X......9T..F
]
***
CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
X.509
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
%% Invalidated: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
main, SEND TLSv1 ALERT: fatal, description = certificate_unknown
main, WRITE: TLSv1 Alert, length = 2
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
main, IOException in getSession(): javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
main, called close()
main, called closeInternal(true)
main, called close()
main, called closeInternal(true)
When I checked logs carefully I noticed Server is sending only first certificate in chain of certificates to client i.e,. ( CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown ), my newly created certificate is not present. Am I doing something wrong?
we have updated the SSL protocol to use SSL_TLSv2 (which should allow TLSv1, TLSv1.1 and TLSv1.2) and we are using https://api.sandbox.paypal.com/2.0/ endpoint URL to connect to paypal. We have added VeriSign Class 3 Public Primary Certification Authority - G5 certificate to our keystore. But still we are getting handshake failure.
Error LOG:
javax.xml.ws.soap.SOAPFaultException: javax.net.ssl.SSLException: Received fatal alert: handshake_failure". javax.xml.ws.soap.SOAPFaultException: javax.net.ssl.SSLException: Received fatal alert: handshake_failure
at org.apache.axis2.jaxws.marshaller.impl.alt.MethodMarshallerUtils.createSystemException(MethodMarshallerUtils.java:1363)
at org.apache.axis2.jaxws.marshaller.impl.alt.MethodMarshallerUtils.demarshalFaultResponse(MethodMarshallerUtils.java:1089)
at org.apache.axis2.jaxws.marshaller.impl.alt.DocLitBareMethodMarshaller.demarshalFaultResponse(DocLitBareMethodMarshaller.java:417)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.getFaultResponse(JAXWSProxyHandler.java:626)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.createResponse(JAXWSProxyHandler.java:566)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.invokeSEIMethod(JAXWSProxyHandler.java:432)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.invoke(JAXWSProxyHandler.java:213)
at com.sun.proxy.$Proxy62.setExpressCheckout(Unknown Source)
Please find the logs below (After enabling SSL Debug)
[6/29/16 12:17:29:389 IST] 00000211 WSChannelFram A CHFW0019I: The Transport Channel Service has started chain HttpsOutboundChain:web-proxy.corp.hp.com:8088:706802748:api.sandbox.paypal.com:-1.
adding as trusted cert:
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Subject: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Issuer: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Algorithm: RSA; Serial number: 0x9256ccd0f74
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Valid from Mon Mar 28 18:05:23 IST 2016 until Tue Mar 25 18:05:23 IST 2031
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O adding as trusted cert:
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Algorithm: RSA; Serial number: 0x250ce8e030612e9f2b89f7054d7cf8fd
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Valid from Wed Nov 08 05:30:00 IST 2006 until Mon Nov 08 05:29:59 IST 2021
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O adding as trusted cert:
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Subject: CN=Symantec Class 3 Secure Server CA - G4, OU=Symantec Trust Network, O=Symantec Corporation, C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Algorithm: RSA; Serial number: 0x513fb9743870b73440418d30930699ff
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Valid from Thu Oct 31 05:30:00 IST 2013 until Tue Oct 31 05:29:59 IST 2023
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O
[6/29/16 12:17:30:019 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:019 IST] 00000211 SystemOut O found key for : default
[6/29/16 12:17:30:020 IST] 00000211 SystemOut O chain [0] = [
[
Version: V3
Subject: CN=localhost, OU=localhost, OU=localhost, O=IBM, C=US
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
Key: IBMJCE RSA Public Key:
modulus:
26167541711086627791578871564616365051862711740169857710554547535189479149908374929516177090517001379910396688828760654542434329119238956286945379132186129759458751111248999650559731436488161569437501148312306505875762201215861268858168483037657932583161029509501700884430074843289607373839133072877375577360636060242737127872859949426685225542431385914834039901653766669062129732208534425904601424824899456065980585969976422194265319042002149984018361515399815820913269930221749561374832898783792638898537082727405570885654709258468168429473416388030507181343754356665510039104609297653873247510424200394843741361793
public exponent:
65537
Validity: [From: Mon Mar 28 18:05:24 IST 2016,
To: Tue Mar 28 18:05:24 IST 2017]
Issuer: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
SerialNumber: [10056828754800]
Certificate Extensions: 2
[1]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
[RFC822Name: ProfileUUID:WCDE80_180144-BASE-8a713340-a4f8-4abe-ae41-aaedf50c06bd]]
[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 41 79 84 39 4f 6c 37 6f Ay.9Ol7o
]
]
]
Algorithm: [SHA256withRSA]
Signature:
0000: 16 f9 9f a4 29 1d f4 17 7d 80 6e 34 e7 47 5b b2 ..........n4.G..
0010: 1c fd 5b 08 92 b8 24 e7 51 04 67 71 0a 91 1c 88 ........Q.gq....
0020: 63 c4 02 99 94 dd a2 21 93 0e 58 f0 5b 94 54 27 c.........X...T.
0030: 02 d1 fe 65 8d 05 78 4d 35 02 c4 28 f9 d5 3b 11 ...e..xM5.......
0040: 95 28 d4 87 b2 2c e2 e5 77 f8 06 55 f4 f3 72 ec ........w..U..r.
0050: c9 95 6f 1e 9c a4 02 f5 41 8d 50 c0 c0 5c df 5f ..o.....A.P.....
0060: 2f dd 90 2f 8c a1 53 f3 8b a4 5f 25 37 30 06 b9 ......S.....70..
0070: 2d a2 24 7b 4c bb 60 56 0b a4 b3 6e 73 a0 71 12 ....L..V...ns.q.
0080: ab 30 df 4d 27 3c 2b 8c 66 c5 b1 b5 56 e5 3c 41 .0.M....f...V..A
0090: 65 42 d4 d6 c2 8a ec 4e ec cc c1 62 49 75 ed 1c eB.....N...bIu..
00a0: 1d c3 f6 d0 dd 79 d4 a0 9c 1e ce 1a a8 ac 0b 68 .....y.........h
00b0: b4 50 cb 6b 92 8b 9e 99 96 2c ff 5b f8 63 2e a4 .P.k.........c..
00c0: fa 4c 82 13 8d 6d 5c 49 6b 32 49 41 4d 3f 8a eb .L...m.Ik2IAM...
00d0: 16 77 60 3e 84 af 7d 38 ed 06 7d 7c b9 69 0c 50 .w.....8.....i.P
00e0: f6 59 10 d4 70 76 8c 0d 23 40 68 66 7c be d0 a7 .Y..pv....hf....
00f0: 5d 43 55 c7 5e 31 6c ef 25 cc ec 6b d3 05 4f e8 .CU..1l....k..O.
]
[6/29/16 12:17:30:020 IST] 00000211 SystemOut O chain [1] = [
[
Version: V3
Subject: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
Key: IBMJCE RSA Public Key:
modulus:
19904753990009309220640490407026050840230290478827945495559467830914675305969718816314697475824624971015421979520946317273041884889483490534710677359598087244263711680653006429506370864649858288482237624045812419537775828964539312096597139584695395163230244568608219831591052376071824331577827894488085049089178639843811986500484212726449214616765323493684584926518468131402057026630937301877109272783156174698101767247279976634672974959576739431097029244885330417865240554525368272023593234999310504632854754949649989504797724839753383392964247687587360456802376083021433419450872358735106842206689297528583371429329
public exponent:
65537
Validity: [From: Mon Mar 28 18:05:23 IST 2016,
To: Tue Mar 25 18:05:23 IST 2031]
Issuer: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
SerialNumber: [10056343818100]
Certificate Extensions: 3
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
[2]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
[RFC822Name: ProfileUUID:WCDE80_180144-BASE-8a713340-a4f8-4abe-ae41-aaedf50c06bd]]
[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 40 c3 48 d5 8e 43 b9 e0 ..H..C..
]
]
]
Algorithm: [SHA256withRSA]
Signature:
0000: 87 17 da 78 ef 39 12 f0 d2 1b f0 11 70 9d 83 96 ...x.9......p...
0010: 00 70 6f bd 2d 19 6c 5b 64 3f 75 8b cf 61 ae b9 .po...l.d.u..a..
0020: 2c 6c b4 cd da b7 6e 6f 03 1b 9f f0 ff 07 6f ff .l....no......o.
0030: a1 79 a7 4a 08 e6 2a 1c 4e 5b 13 75 03 9d ab 88 .y.J....N..u....
0040: 79 be ca e3 e7 c5 66 ab f9 49 96 06 b4 81 2b 3a y.....f..I......
0050: 33 5b c1 bd c9 e4 c7 07 10 61 5c 38 0f 5d a6 b1 3........a.8....
0060: 40 93 bf ec 37 34 34 d2 ec 30 3d ae 9a 80 6b ca ....744..0....k.
0070: 1b 43 58 73 be ec 1b 41 70 3f 11 1c f3 42 a0 e6 .CXs...Ap....B..
0080: ce d5 a3 a5 37 a7 c9 46 34 3e ac a1 32 bd c3 6e ....7..F4...2..n
0090: 07 49 e0 e3 2e 85 f4 04 6b 68 80 58 a3 32 58 1c .I......kh.X.2X.
00a0: 06 90 e2 64 1a 8d 68 20 e4 a2 28 56 cf d6 06 76 ...d..h....V...v
00b0: eb 53 4f d1 90 3b 82 b0 fc 61 47 3d 3d 4b dd 03 .SO......aG..K..
00c0: 59 e4 03 7e 7e 00 47 51 2f f4 f2 17 f8 34 d1 bd Y.....GQ.....4..
00d0: 24 b9 12 8c 8e b9 18 32 4e 89 a3 fe 6e ec 3f 9b .......2N...n...
00e0: 33 0d a0 f3 45 4c 88 04 97 3d 31 07 33 81 5a 11 3...EL....1.3.Z.
00f0: e8 1d d1 68 2e 50 66 8a 4e f7 77 3c 64 82 60 a8 ...h.Pf.N.w.d...
]
[6/29/16 12:17:30:020 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O found key for : paypal
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O chain [0] = [
[
Version: V3
Subject: C=US, ST=CA, L=Santa Clara, O=HP, CN=hpbiztest_api1.hp.com
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: IBMJCE RSA Public Key:
modulus:
167767787854827133772476094878602356419059997517346374275255466537187831576020199052607407432097460847863697600517067858769595716996015976450736236072075948148640801631718329787519229056273024787589358929246179803681154066413328089574908636575846498188850427968011672902341432046713914611785901831874548450751
public exponent:
65537
Validity: [From: Tue Jan 10 01:00:44 IST 2012,
To: Fri Jan 07 01:00:44 IST 2022]
Issuer: EMAILADDRESS=re#paypal.com, CN=sandbox_camerchapi, OU=sandbox_certs, O="PayPal, Inc.", L=San Jose, ST=California, C=US
SerialNumber: [1049731]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 2a 5c 68 2b fd 0a 5f 62 71 32 51 2b 25 66 cf 65 ..h....bq2Q..f.e
0010: a4 ca 06 2a d3 f1 ae 58 6d d0 bf a3 c4 e2 2e a4 .......Xm.......
0020: 98 5b 4a 01 c1 09 aa ba e9 d3 91 a0 09 d8 bf c1 ..J.............
0030: 28 17 b8 9c 7c 15 7a 08 1b ff 92 71 98 2c 28 11 ......z....q....
0040: c4 97 6f 23 fc d7 4f 3f 09 b1 5a c9 06 f2 49 6d ..o...O...Z...Im
0050: 11 d5 87 fc d4 3e 25 1d 91 fe ff 4d 67 a8 ec a4 ...........Mg...
0060: b2 4d 5e 39 5d ef 7e 6b e8 f7 86 b7 2b 35 d6 d5 .M.9...k.....5..
0070: f0 24 6c 7a 0f bc 15 9e e2 84 3c f5 80 81 d2 01 ..lz............
]
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O SSLContextImpl: Using X509ExtendedKeyManager com.ibm.ws.ssl.core.WSX509KeyManager
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O SSLContextImpl: Using X509TrustManager com.ibm.ws.ssl.core.WSX509TrustManager
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O JsseJCE: Using SecureRandom IBMSecureRandom from provider IBMJCE version 1.7
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O trigger seeding of SecureRandom
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O done seeding SecureRandom
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O Using SSLEngineImpl.
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O SSLv3 protocol was requested but was not enabled
[6/29/16 12:17:30:025 IST] 00000211 SystemOut O SSLv3 protocol was requested but was not enabled
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O IBMJSSE2 will not allow unsafe server certificate change during renegotiation per jdk.tls.allowUnsafeServerCertChange set to FALSE or default
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O
Is initial handshake: true
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_CBC_SHA256
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_CBC_SHA256
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_GCM_SHA256
[6/29/16 12:17:30:029 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
[6/29/16 12:17:30:029 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_GCM_SHA256
[6/29/16 12:17:30:029 IST] 00000211 SystemOut O %% No cached client session
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O *** ClientHello, TLSv1
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O RandomCookie: GMT: 1467182850 bytes = { 165, 170, 151, 64, 41, 40, 119, 74, 254, 115, 32, 213, 78, 45, 52, 66, 73, 224, 116, 255, 176, 137, 93, 27, 30, 166, 193, 21 }
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Session ID: {}
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Cipher Suites: [SSL_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Compression Methods: { 0 }
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Extension renegotiation_info, ri_length: 0, ri_connection_data: { null }
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Extension server_name, server_name: [host_name: web-proxy.corp.hp.com]
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O [write] MD5 and SHA1 hashes: len = 92
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O 0000: 01 00 00 58 03 01 57 73 6f 02 a5 aa 97 40 29 28 ...X..Wso.......
0010: 77 4a fe 73 20 d5 4e 2d 34 42 49 e0 74 ff b0 89 wJ.s..N.4BI.t...
0020: 5d 1b 1e a6 c1 15 00 00 0c 00 2f 00 33 00 32 00 ............3.2.
0030: 0a 00 16 00 13 01 00 00 23 ff 01 00 01 00 00 00 ................
0040: 00 1a 00 18 00 00 15 77 65 62 2d 70 72 6f 78 79 .......web.proxy
0050: 2e 63 6f 72 70 2e 68 70 2e 63 6f 6d .corp.hp.com
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O WebContainer : 4, WRITE: TLSv1 Handshake, length = 92
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O [Raw write]: length = 97
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O 0000: 16 03 01 00 5c 01 00 00 58 03 01 57 73 6f 02 a5 ........X..Wso..
0010: aa 97 40 29 28 77 4a fe 73 20 d5 4e 2d 34 42 49 .....wJ.s..N.4BI
0020: e0 74 ff b0 89 5d 1b 1e a6 c1 15 00 00 0c 00 2f .t..............
0030: 00 33 00 32 00 0a 00 16 00 13 01 00 00 23 ff 01 .3.2............
0040: 00 01 00 00 00 00 1a 00 18 00 00 15 77 65 62 2d ............web.
0050: 70 72 6f 78 79 2e 63 6f 72 70 2e 68 70 2e 63 6f proxy.corp.hp.co
0060: 6d m
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O [Raw read]: length = 5
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O 0000: 15 03 01 00 02 .....
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O [Raw read]: length = 2
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O 0000: 02 28 ..
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O WebContainer : 4, READ: TLSv1 Alert, length = 2
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O WebContainer : 4, RECV TLSv1 ALERT: fatal, handshake_failure
[6/29/16 12:17:30:373 IST] 00000211 SystemOut O WebContainer : 4, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Received fatal alert: handshake_failure
[6/29/16 12:17:30:373 IST] 00000211 SystemOut O WebContainer : 4, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Received fatal alert: handshake_failure