There is a random crash problem in the repeated connection of webrtc in Android - webrtc

signal 6 (SIGABRT), code -6 (SI_TKILL)
There is a random crash when using webrtc on Android, and my personal skills are limited. Please ask who can help me to see where the problem occurs and how to modify it
Detailed description: Android receives audio and video data on the PC side. When reconnecting for many times, there is a crash from time to time. Specifically, the audio and video are displayed for less than 1 second when the link is connected.
The log does not specifically indicate what is wrong. The specific error log is as follows:
2022-08-08 19:42:48.434 8156-10474/com.dalongtech.cloud E/TAG:machao:SignalHelper: onIceConnectionChange: CONNECTED
2022-08-08 19:42:48.434 8156-10474/com.dalongtech.cloud E/TAG:machao:SignalHelper: onIceConnectionChange:已链接
2022-08-08 19:42:48.537 8156-10474/com.dalongtech.cloud E/rtc: #
# Fatal error in: gen/sdk/android/generated_base_jni/jni/../../../../../../../sdk/android/src/jni/jni_generator_helper.h, line 85
# last system error: 115
# Check failed: !env->ExceptionCheck()
#
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Basic Information: 'pid: 8156/tid: 10474/time: 20220808194248'
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Cpu Information: 'abi: armeabi-v7a,armeabi/processor: ARMv7 Processor rev 4 (v7l)/hardware: Qualcomm Technologies, Inc SDM439'
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Mobile Information: 'model: Redmi 7A/version: 9/sdk: 28'
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Build fingerprint: 'Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.1.0.PCMCNXM:user/release-keys'
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Runtime Information: 'start: 20220808193734/maxheap: 268435456/primaryabi: armeabi-v7a/ground: fg'
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Application Information: 'version: 5.7.0/subversion: release/buildseq: 6afc2ca6/versioncode: 670'
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: CrashSDK Information: 'version: 3.3.1.1/nativeseq: 210916105822/javaseq: 210916105822/arch: armeabi-v7a/target: release'
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Report Name: 5512a9c0fd98c5dd24000476_5.7.0_6afc2ca6_Redmi-7A_9_165995865401025903_20220808194248_fg_jni.log
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: UUID: 0288d0a2-d003-4881-9270-29328d03ec45
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Log Type: jni
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: kernel version: Linux version 4.9.112-perf+ #1 SMP PREEMPT Thu Oct 24 19:09:10 CST 2019
Build time: 1571914810000
Build version incremental: V11.0.1.0.PCMCNXM
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: Activity: (none)
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: um_app_key: 5512a9c0fd98c5dd24000476
2022-08-08 19:42:48.600 10522-10474/? E/DEBUG: um_app_channel: dalong_android
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: um_os: android
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: um_crash_sdk_version: 1.5.2
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: um_umid_header: aif8e52541e953463e804cd33ab6341115
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: um_app_carrier: 中国电信
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: um_access: wifi
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: um_network_type: 13
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: others_OS: Android
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
2022-08-08 19:42:48.601 10522-10474/? E/DEBUG: maps:
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: total lines: 4250, matched 1599 lines, write 1599 lines.
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: total address size: 1927724 kB
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: Process Name: 'com.dalongtech.cloud'
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: Thread Name: 'signaling_threa'
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: pid: 8156, tid: 10474 >>> com.dalongtech.cloud <<<
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: killed by pid: 8156, comm: alongtech.cloud, uid: 10185.
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: r0 00000000 r1 000028ea r2 00000006 r3 00000008
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: r4 00001fdc r5 000028ea r6 6697f694 r7 0000010c
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: r8 6697f6d4 r9 6697f788 10 6b6e1900 fp 6697f780
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: ip a7e1e3d8 sp 6697f680 lr a7d8d639 pc a7d84e5e cpsr 20070030
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d0 286b636568436e29 d1 697470656378450a
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d2 65684320230a3523 d3 656c696166206b20
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d4 5f726f746172656e d5 682e7265706c6568
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d6 3820656e696c202c d7 7473616c20230a35
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d8 0000000000000000 d9 0000000000000000
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d10 0000000000000000 d11 0000000000000000
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d12 0000000000000000 d13 0000000000000000
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d14 0000000000000000 d15 0000000000000000
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d16 ffffffffffffffff d17 2e6761742e676f6c
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d18 a4ce8604a4ce8604 d19 0000000000000000
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d20 3fd34413509f79fb d21 0000000020ffea9a
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d22 0000000000000000 d23 0000000019fe4856
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d24 0000000000000000 d25 0000000000ff3627
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d26 0000000000000000 d27 000000001eff6237
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d28 0000000000000000 d29 0000000000000000
2022-08-08 19:42:48.644 10522-10474/? E/DEBUG: d30 0000000005b9f5b1 d31 0000000006fc7820
2022-08-08 19:42:48.645 10522-10474/? E/DEBUG: scr 2800009f
2022-08-08 19:42:48.741 10522-10474/? E/DEBUG: #00 pc 0001ce5e /system/lib/libc.so (abort)
2022-08-08 19:42:48.742 10522-10474/? E/DEBUG: #01 pc 001b95aa /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.742 10522-10474/? E/DEBUG: #02 pc 001b75d2 /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.743 10522-10474/? E/DEBUG: #03 pc 00667fa4 /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.743 10522-10474/? E/DEBUG: #04 pc 00693dd6 /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.743 10522-10474/? E/DEBUG: #05 pc 0069493c /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.743 10522-10474/? E/DEBUG: #06 pc 00697bf0 /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.744 10522-10474/? E/DEBUG: #07 pc 002a3e74 /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.744 10522-10474/? E/DEBUG: #08 pc 002b341e /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.744 10522-10474/? E/DEBUG: #09 pc 002b3302 /data/app/com.dalongtech.cloud-eaUz71h5gpXrqlEpbydDwA==/lib/arm/libjingle_peerconnection_so.so
2022-08-08 19:42:48.744 10522-10474/? E/DEBUG: #10 pc 00071500 /system/lib/libc.so (_ZL15__pthread_startPv)
2022-08-08 19:42:48.745 10522-10474/? E/DEBUG: #11 pc 0001de84 /system/lib/libc.so (__start_thread)

Related

ubuntu 20.04 freeze when compiling kernel modules

I'm using ubuntu20.04 in vmware workstation. I allocate 8 cpu cores, 6G RAM, 4G swap and enough free disk space(at least 25G) to ubuntu20.04. But after running make modules -j4 for about 30 minutes the whole system freezes. The only thing I can do is moving the cursor in virtual machine, the click doesn't get response. When I click "hang up the vm" I get error "cannot hang up vm". After trying several times I can hang it up successsfully. And after I press "continue vm" vm works again but after running about 30 min the situation just occurs again.
gcc version, kernel version are listed below:(they are both compiling linux-4.8.5 kernel source code)
user#ubuntu:~$ gcc --version
gcc (GCC) 4.8.5
Copyright (C) 2015 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
user#ubuntu:~$ uname -r
5.15.57
user#centos7:~$ gcc --version
gcc (GCC) 4.8.5 20150623 (Red Hat 4.8.5-44)
Copyright (C) 2015 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
user#centos7:~$ uname -r
5.15.86
syslog when the freeze situation occurs:
Message from syslogd#ubuntu at Jan 26 18:55:37 ...
kernel:[ 7665.562563] watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cc1:100337]
Jan 26 18:55:37 ubuntu kernel: [ 7665.562563] watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cc1:100337]
Jan 26 18:55:37 ubuntu kernel: [ 7665.562667] Modules linked in: btrfs ... hid_generic
Jan 26 18:55:47 ubuntu kernel: [ 7665.564688] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:55:47 ubuntu kernel: [ 7665.564982] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:55:47 ubuntu kernel: [ 7665.565049] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:55:47 ubuntu kernel: [ 7665.565083] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565393] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:55:47 ubuntu kernel: [ 7665.565437] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:55:47 ubuntu kernel: [ 7665.565441] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565443] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:55:47 ubuntu kernel: [ 7665.565446] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:55:47 ubuntu kernel: [ 7665.565448] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:55:47 ubuntu kernel: [ 7665.565450] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:55:47 ubuntu kernel: [ 7665.565452] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:55:47 ubuntu kernel: [ 7665.565455] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:55:47 ubuntu kernel: [ 7665.565458] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565486] Call Trace:
Jan 26 18:55:47 ubuntu kernel: [ 7665.565515] <TASK>
Jan 26 18:55:47 ubuntu kernel: [ 7665.565669] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:55:47 ubuntu kernel: [ 7665.565844] irqentry_exit+0x1d/0x30
Jan 26 18:55:47 ubuntu kernel: [ 7665.565848] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:55:47 ubuntu kernel: [ 7665.565852] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:55:47 ubuntu kernel: [ 7665.565886] RIP: 0033:0x12cfc00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565972] Code: 33 ff ff ff 83 e6 01 48 89 df e8 4b 0c ff ff 85 c0 0f 84 29 ff ff ff 80 bb 9c 00 00 00 53 0f 85 19 ff ff ff e9 6a ff ff ff 90 <4c> 89 e0 5b 5d 41 5c c3 48 8d 15 c2 3a 79 00 be 1d 0a 00 00 48 8d
Jan 26 18:55:47 ubuntu kernel: [ 7665.565974] RSP: 002b:00007ffd36e8a930 EFLAGS: 00000246
Jan 26 18:55:47 ubuntu kernel: [ 7665.565977] RAX: 0000000002569580 RBX: 00000000023c0a00 RCX: 0000000000000005
Jan 26 18:55:47 ubuntu kernel: [ 7665.565979] RDX: 0000000000000000 RSI: 000000000241dcf0 RDI: 00000000023c0a00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565980] RBP: 00000000023c0a98 R08: 000000000000000f R09: 00007fc50177c000
Jan 26 18:55:47 ubuntu kernel: [ 7665.565981] R10: 0000000002569580 R11: 0256958002569580 R12: 000000000241dcf0
Jan 26 18:55:47 ubuntu kernel: [ 7665.565983] R13: 0000000000000000 R14: 00007ffd36e8a978 R15: 00007fc5007b8f00
Jan 26 18:55:47 ubuntu kernel: [ 7665.565986] </TASK>
Message from syslogd#ubuntu at Jan 26 18:56:06 ...
kernel:[ 7693.578970] watchdog: BUG: soft lockup - CPU#6 stuck for 48s! [cc1:100337]
Jan 26 18:56:06 ubuntu kernel: [ 7693.578970] watchdog: BUG: soft lockup - CPU#6 stuck for 48s! [cc1:100337]
Jan 26 18:56:09 ubuntu kernel: [ 7693.578983] Modules linked in: btrfs ... hid_generic
Jan 26 18:56:09 ubuntu kernel: [ 7693.579073] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:56:09 ubuntu kernel: [ 7693.579088] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:09 ubuntu kernel: [ 7693.579093] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:09 ubuntu kernel: [ 7693.579135] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579146] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:09 ubuntu kernel: [ 7693.579149] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:09 ubuntu kernel: [ 7693.579152] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579154] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:09 ubuntu kernel: [ 7693.579155] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:09 ubuntu kernel: [ 7693.579157] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:09 ubuntu kernel: [ 7693.579159] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:09 ubuntu kernel: [ 7693.579161] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:56:09 ubuntu kernel: [ 7693.579163] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:09 ubuntu kernel: [ 7693.579165] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:56:09 ubuntu kernel: [ 7693.579169] Call Trace:
Jan 26 18:56:09 ubuntu kernel: [ 7693.579172] <TASK>
(same as above)
</TASK>
Message from syslogd#ubuntu at Jan 26 18:56:40 ...
kernel:[ 7729.590239] watchdog: BUG: soft lockup - CPU#6 stuck for 81s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:57:09 ...
kernel:[ 7757.599000] watchdog: BUG: soft lockup - CPU#6 stuck for 107s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:57:36 ...
kernel:[ 7785.607641] watchdog: BUG: soft lockup - CPU#6 stuck for 133s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:58:27 ...
kernel:[ 7813.614515] watchdog: BUG: soft lockup - CPU#6 stuck for 159s! [cc1:100337]
Message from syslogd#ubuntu at Jan 26 18:58:32 ...
kernel:[ 7841.620739] watchdog: BUG: soft lockup - CPU#6 stuck for 186s! [cc1:100337]
Jan 26 18:56:15 ubuntu kernel: [ 7702.812787] rcu: INFO: rcu_sched self-detected stall on CPU
Jan 26 18:56:15 ubuntu kernel: [ 7702.812875] rcu: 6-....: (1 GPs behind) idle=2df/1/0x4000000000000000 softirq=645654/645656 fqs=31
Jan 26 18:56:15 ubuntu kernel: [ 7702.812919] (t=15001 jiffies g=1424273 q=363)
Jan 26 18:56:15 ubuntu kernel: [ 7702.812947] rcu: rcu_sched kthread starved for 509 jiffies! g1424273 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=5
Jan 26 18:56:15 ubuntu kernel: [ 7702.812954] rcu: Unless rcu_sched kthread gets sufficient CPU time, OOM is now expected behavior.
Jan 26 18:56:15 ubuntu kernel: [ 7702.812956] rcu: RCU grace-period kthread stack dump:
Jan 26 18:56:15 ubuntu kernel: [ 7702.812957] task:rcu_sched state:R running task stack: 0 pid: 14 ppid: 2 flags:0x00004000
Jan 26 18:56:15 ubuntu kernel: [ 7702.813009] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813013] <TASK>
(same as above)
</TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813330] rcu: Stack dump where RCU GP kthread last ran:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813359] Sending NMI from CPU 6 to CPUs 5:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813681] NMI backtrace for cpu 5
Jan 26 18:56:15 ubuntu kernel: [ 7702.813684] CPU: 5 PID: 843 Comm: gmain Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:15 ubuntu kernel: [ 7702.813688] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:15 ubuntu kernel: [ 7702.813690] RIP: 0010:native_write_msr+0x6/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.813761] Code: fc ff b8 40 00 00 00 0f 00 d8 44 89 e7 e8 62 15 fc ff eb cb e8 fb d6 cc 00 66 66 2e 0f 1f 84 00 00 00 00 00 89 f9 89 f0 0f 30 <66> 90 c3 cc cc cc cc 55 48 c1 e2 20 89 f6 48 09 d6 31 d2 48 89 e5
Jan 26 18:56:15 ubuntu kernel: [ 7702.813764] RSP: 0000:ffffc251805c0f00 EFLAGS: 00000007
Jan 26 18:56:15 ubuntu kernel: [ 7702.813767] RAX: 000000009437f6ed RBX: 0000000000000000 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813768] RDX: 0000000000000cb4 RSI: 000000009437f6ed RDI: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813770] RBP: ffffc251805c0f08 R08: 0000000000000001 R09: 000007014874c7c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.813771] R10: 7fffffffffffffff R11: ffffc251805c0ff8 R12: 000027a10367387b
Jan 26 18:56:15 ubuntu kernel: [ 7702.813772] R13: ffffa04af7f5fe00 R14: ffffa04af7f62db8 R15: ffffa04af7f62df8
Jan 26 18:56:15 ubuntu kernel: [ 7702.813796] FS: 00007f02c513e700(0000) GS:ffffa04af7f40000(0000) knlGS:0000000000000000
Jan 26 18:56:15 ubuntu kernel: [ 7702.813798] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:15 ubuntu kernel: [ 7702.813800] CR2: 00007f00d5bf2000 CR3: 0000000117928001 CR4: 00000000003706e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813803] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.813805] <IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813848] ? lapic_next_deadline+0x2c/0x40
Jan 26 18:56:15 ubuntu kernel: [ 7702.813936] clockevents_program_event+0xa8/0x130
Jan 26 18:56:15 ubuntu kernel: [ 7702.813968] tick_program_event+0x41/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.813971] ? hrtimer_update_next_event+0x4f/0x70
Jan 26 18:56:15 ubuntu kernel: [ 7702.813973] hrtimer_interrupt+0x136/0x230
Jan 26 18:56:15 ubuntu kernel: [ 7702.813976] __sysvec_apic_timer_interrupt+0x5e/0xe0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813978] sysvec_apic_timer_interrupt+0x7b/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.813982] </IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813983] <TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.813983] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.813986] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813989] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:15 ubuntu kernel: [ 7702.813991] RSP: 0000:ffffc2518434fed8 EFLAGS: 00000202
Jan 26 18:56:15 ubuntu kernel: [ 7702.813993] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.813994] RDX: ffffa04a40339900 RSI: 0000000000000000 RDI: ffffc2518434ff58
Jan 26 18:56:15 ubuntu kernel: [ 7702.813995] RBP: ffffc2518434ff08 R08: 0000000000000000 R09: 0000070146c988c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.813996] R10: 00000701468c7fc1 R11: 00000000000024d8 R12: ffffc2518434ff58
Jan 26 18:56:15 ubuntu kernel: [ 7702.813998] R13: ffffa04a557ce400 R14: ffffa04a557ce400 R15: ffffa04a557ce400
Jan 26 18:56:15 ubuntu kernel: [ 7702.814000] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814004] irqentry_exit+0x1d/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.814007] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814011] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814013] RIP: 0033:0x7f02c5e07508
Jan 26 18:56:15 ubuntu kernel: [ 7702.814017] Code: c0 74 0f e9 4a f5 ff ff 66 2e 0f 1f 84 00 00 00 00 00 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 31 f6 87 37 <83> fe 01 74 0b e9 ce f4 ff ff 66 0f 1f 44 00 00 c3 0f 1f 80 00 00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814019] RSP: 002b:00007f02c513dc98 EFLAGS: 00000246
Jan 26 18:56:15 ubuntu kernel: [ 7702.814021] RAX: 0000000000000f6a RBX: 000000007fffffff RCX: 0000000000000004
Jan 26 18:56:15 ubuntu kernel: [ 7702.814023] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000055920b115870
Jan 26 18:56:15 ubuntu kernel: [ 7702.814024] RBP: 0000000000000002 R08: 0000000000000002 R09: 0000000000000001
Jan 26 18:56:15 ubuntu kernel: [ 7702.814025] R10: 000055920b132e00 R11: 000055920b112580 R12: 0000000000000002
Jan 26 18:56:15 ubuntu kernel: [ 7702.814026] R13: 000055920b115870 R14: 000055920b112dd0 R15: 00007f02c513dcf4
Jan 26 18:56:15 ubuntu kernel: [ 7702.814028] </TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814382] NMI backtrace for cpu 6
Jan 26 18:56:15 ubuntu kernel: [ 7702.814389] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:15 ubuntu kernel: [ 7702.814393] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:15 ubuntu kernel: [ 7702.814394] Call Trace:
Jan 26 18:56:15 ubuntu kernel: [ 7702.814395] <IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814397] dump_stack_lvl+0x4a/0x63
Jan 26 18:56:15 ubuntu kernel: [ 7702.814484] dump_stack+0x10/0x16
Jan 26 18:56:15 ubuntu kernel: [ 7702.814487] nmi_cpu_backtrace.cold+0x4d/0x96
Jan 26 18:56:15 ubuntu kernel: [ 7702.814491] ? lapic_can_unplug_cpu+0x90/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814495] nmi_trigger_cpumask_backtrace+0xf3/0x100
Jan 26 18:56:15 ubuntu kernel: [ 7702.814594] arch_trigger_cpumask_backtrace+0x19/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814598] rcu_dump_cpu_stacks+0x132/0x16d
Jan 26 18:56:15 ubuntu kernel: [ 7702.814762] rcu_sched_clock_irq.cold+0x100/0x36a
Jan 26 18:56:15 ubuntu kernel: [ 7702.814787] ? account_system_index_time+0xa0/0xc0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814831] update_process_times+0x94/0xd0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814861] tick_sched_handle.isra.0+0x25/0x60
Jan 26 18:56:15 ubuntu kernel: [ 7702.814865] tick_sched_timer+0x71/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814868] ? tick_sched_do_timer+0x50/0x50
Jan 26 18:56:15 ubuntu kernel: [ 7702.814871] __hrtimer_run_queues+0xc8/0x1d0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814873] hrtimer_interrupt+0x109/0x230
Jan 26 18:56:15 ubuntu kernel: [ 7702.814876] __sysvec_apic_timer_interrupt+0x5e/0xe0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814878] sysvec_apic_timer_interrupt+0x7b/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814883] </IRQ>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814883] <TASK>
Jan 26 18:56:15 ubuntu kernel: [ 7702.814884] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814887] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814890] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:15 ubuntu kernel: [ 7702.814893] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:15 ubuntu kernel: [ 7702.814896] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814897] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:15 ubuntu kernel: [ 7702.814899] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:15 ubuntu kernel: [ 7702.814927] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:15 ubuntu kernel: [ 7702.814929] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:15 ubuntu kernel: [ 7702.814932] irqentry_exit_to_user_mode+0x9/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814937] irqentry_exit+0x1d/0x30
Jan 26 18:56:15 ubuntu kernel: [ 7702.814940] sysvec_apic_timer_interrupt+0x4e/0x90
Jan 26 18:56:15 ubuntu kernel: [ 7702.814943] asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jan 26 18:56:15 ubuntu kernel: [ 7702.814945] RIP: 0033:0x12cfc00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814949] Code: 33 ff ff ff 83 e6 01 48 89 df e8 4b 0c ff ff 85 c0 0f 84 29 ff ff ff 80 bb 9c 00 00 00 53 0f 85 19 ff ff ff e9 6a ff ff ff 90 <4c> 89 e0 5b 5d 41 5c c3 48 8d 15 c2 3a 79 00 be 1d 0a 00 00 48 8d
Jan 26 18:56:15 ubuntu kernel: [ 7702.814951] RSP: 002b:00007ffd36e8a930 EFLAGS: 00000246
Jan 26 18:56:15 ubuntu kernel: [ 7702.814953] RAX: 0000000002569580 RBX: 00000000023c0a00 RCX: 0000000000000005
Jan 26 18:56:15 ubuntu kernel: [ 7702.814978] RDX: 0000000000000000 RSI: 000000000241dcf0 RDI: 00000000023c0a00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814980] RBP: 00000000023c0a98 R08: 000000000000000f R09: 00007fc50177c000
Jan 26 18:56:15 ubuntu kernel: [ 7702.814981] R10: 0000000002569580 R11: 0256958002569580 R12: 000000000241dcf0
Jan 26 18:56:15 ubuntu kernel: [ 7702.814983] R13: 0000000000000000 R14: 00007ffd36e8a978 R15: 00007fc5007b8f00
Jan 26 18:56:15 ubuntu kernel: [ 7702.814985] </TASK>
Jan 26 18:56:40 ubuntu kernel: [ 7729.590239] watchdog: BUG: soft lockup - CPU#6 stuck for 81s! [cc1:100337]
Jan 26 18:56:40 ubuntu kernel: [ 7729.590249] Modules linked in: btrfs ... hid_generic
Jan 26 18:56:40 ubuntu kernel: [ 7729.590369] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:56:40 ubuntu kernel: [ 7729.590381] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:56:40 ubuntu kernel: [ 7729.590385] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:56:40 ubuntu kernel: [ 7729.590387] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590394] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:56:40 ubuntu kernel: [ 7729.590397] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:56:40 ubuntu kernel: [ 7729.590400] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590402] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:56:40 ubuntu kernel: [ 7729.590403] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:56:40 ubuntu kernel: [ 7729.590405] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:56:40 ubuntu kernel: [ 7729.590407] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:56:40 ubuntu kernel: [ 7729.590409] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:56:40 ubuntu kernel: [ 7729.590411] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:56:40 ubuntu kernel: [ 7729.590412] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:56:40 ubuntu kernel: [ 7729.590451] Call Trace:
Jan 26 18:56:40 ubuntu kernel: [ 7729.590453] <TASK>
(same as above)
</TASK>
Jan 26 18:57:09 ubuntu kernel: [ 7757.599000] watchdog: BUG: soft lockup - CPU#6 stuck for 107s! [cc1:100337]
Jan 26 18:57:09 ubuntu kernel: [ 7757.599009] Modules linked in: btrfs ... hid_generic
Jan 26 18:57:09 ubuntu kernel: [ 7757.599076] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:57:09 ubuntu kernel: [ 7757.599086] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:57:09 ubuntu kernel: [ 7757.599089] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:57:09 ubuntu kernel: [ 7757.599091] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599097] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:57:09 ubuntu kernel: [ 7757.599099] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:57:09 ubuntu kernel: [ 7757.599101] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599103] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:57:09 ubuntu kernel: [ 7757.599104] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:57:09 ubuntu kernel: [ 7757.599105] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:57:09 ubuntu kernel: [ 7757.599106] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:57:09 ubuntu kernel: [ 7757.599108] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:57:09 ubuntu kernel: [ 7757.599110] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:57:09 ubuntu kernel: [ 7757.599111] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:57:09 ubuntu kernel: [ 7757.599114] Call Trace:
Jan 26 18:57:16 ubuntu kernel: [ 7757.599116] <TASK>
(same as above)
</TASK>
Jan 26 18:57:36 ubuntu kernel: [ 7785.607641] watchdog: BUG: soft lockup - CPU#6 stuck for 133s! [cc1:100337]
Jan 26 18:57:36 ubuntu kernel: [ 7785.607651] Modules linked in: btrfs ... hid_generic
Jan 26 18:57:36 ubuntu kernel: [ 7785.607750] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:57:36 ubuntu kernel: [ 7785.607760] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:57:36 ubuntu kernel: [ 7785.607764] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:57:36 ubuntu kernel: [ 7785.607765] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:57:36 ubuntu kernel: [ 7785.607772] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:57:36 ubuntu kernel: [ 7785.607774] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:57:36 ubuntu kernel: [ 7785.607776] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:57:36 ubuntu kernel: [ 7785.607777] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:57:36 ubuntu kernel: [ 7785.607779] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:57:36 ubuntu kernel: [ 7785.607780] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:57:36 ubuntu kernel: [ 7785.607781] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:57:36 ubuntu kernel: [ 7785.607782] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:57:36 ubuntu kernel: [ 7785.607784] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:57:36 ubuntu kernel: [ 7785.607785] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:57:59 ubuntu kernel: [ 7785.607788] Call Trace:
Jan 26 18:58:27 ubuntu kernel: [ 7785.607790] <TASK>
(same as above)
</TASK>
Jan 26 18:58:27 ubuntu kernel: [ 7813.614515] watchdog: BUG: soft lockup - CPU#6 stuck for 159s! [cc1:100337]
Jan 26 18:58:27 ubuntu kernel: [ 7813.614524] Modules linked in: btrfs ... hid_generic
Jan 26 18:58:27 ubuntu kernel: [ 7813.614588] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:58:27 ubuntu kernel: [ 7813.614635] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:58:27 ubuntu kernel: [ 7813.614638] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:58:27 ubuntu kernel: [ 7813.614640] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614646] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:58:27 ubuntu kernel: [ 7813.614648] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:58:27 ubuntu kernel: [ 7813.614650] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614652] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:58:27 ubuntu kernel: [ 7813.614653] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:58:27 ubuntu kernel: [ 7813.614654] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:58:27 ubuntu kernel: [ 7813.614656] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:58:27 ubuntu kernel: [ 7813.614657] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:58:27 ubuntu kernel: [ 7813.614659] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:58:27 ubuntu kernel: [ 7813.614660] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:58:27 ubuntu kernel: [ 7813.614686] Call Trace:
(same as above)
</TASK>
Jan 26 18:58:32 ubuntu kernel: [ 7841.620739] watchdog: BUG: soft lockup - CPU#6 stuck for 186s! [cc1:100337]
Jan 26 18:58:32 ubuntu kernel: [ 7841.620748] Modules linked in: btrfs ... hid_generic
Jan 26 18:58:32 ubuntu kernel: [ 7841.620818] crc32_pclmul mptspi usbhid mptscsih ahci psmouse mptbase hid e1000 pata_acpi libahci scsi_transport_spi i2c_piix4
Jan 26 18:58:32 ubuntu kernel: [ 7841.620830] CPU: 6 PID: 100337 Comm: cc1 Tainted: G
L 5.15.0-52-generic #58~20.04.1-Ubuntu
Jan 26 18:58:32 ubuntu kernel: [ 7841.620833] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 02/27/2020
Jan 26 18:58:32 ubuntu kernel: [ 7841.620835] RIP: 0010:exit_to_user_mode_prepare+0xea/0x1c0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620842] Code: e3 02 75 71 fa 66 0f 1f 44 00 00 65 48 8b 04 25 c0 fb 01 00 48 8b 18 f7 c3 0e 30 02 00 0f 84 48 ff ff ff fb 66 0f 1f 44 00 00 <f6> c3 08 74 be e8 3c 23 c0 00 f6 c7 10 74 b9 4c 89 e7 e8 ff 49 13
Jan 26 18:58:32 ubuntu kernel: [ 7841.620844] RSP: 0000:ffffc251922e7ed8 EFLAGS: 00000202
Jan 26 18:58:32 ubuntu kernel: [ 7841.620847] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000000006e0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620848] RDX: ffffa04a4033cb00 RSI: 0000000000000000 RDI: ffffc251922e7f58
Jan 26 18:58:32 ubuntu kernel: [ 7841.620886] RBP: ffffc251922e7f08 R08: 0000000000000000 R09: 000006f3506a78c1
Jan 26 18:58:32 ubuntu kernel: [ 7841.620888] R10: 000006f3502d6fc1 R11: 0000000000512638 R12: ffffc251922e7f58
Jan 26 18:58:32 ubuntu kernel: [ 7841.620890] R13: ffffa04a460d3200 R14: ffffa04a460d3200 R15: ffffa04a460d3200
Jan 26 18:58:32 ubuntu kernel: [ 7841.620891] FS: 00007fc500f3aac0(0000) GS:ffffa04af7f80000(0000) knlGS:0000000000000000
Jan 26 18:58:32 ubuntu kernel: [ 7841.620893] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 26 18:58:32 ubuntu kernel: [ 7841.620895] CR2: 00007fc50060f000 CR3: 000000010b0ae004 CR4: 00000000003706e0
Jan 26 18:58:32 ubuntu kernel: [ 7841.620898] Call Trace:
Jan 26 18:58:32 ubuntu kernel: [ 7841.620900] <TASK>
(same as above)
</TASK>
Jan 26 19:05:42 ubuntu NetworkManager[768]: <info> [1674788384.3036] manager: NetworkManager state is now CONNECTED_SITE
I encountered freezing once, by adding RAM I solved the problem. But this time I add RAM to 8G, freezing still occurs. What also confuses me is that my centos vm with 3G RAM and 8 cpu cores run make modules -j8 successfully. I have no idea about the difference.
To check the cpu and memory usage I execute top at the same time. the picture is top's output when freezing occurs. top command output

Where are Kernel global variables stored?

As i know global variables(in userspace programs) are stored in coressponding DATA (and BSS) segment. But how and where are they stored in case of kernel code?
For an example let's look at one of Linux's global variable. Basically, Linux is an ELF image compressed with gzip or other compression tools. As stated on Wikipedia (https://en.wikipedia.org/wiki/Vmlinux):
Traditionally, when creating a bootable kernel image, the kernel is also compressed using gzip, or, since Linux 2.6.30,[3] using LZMA or bzip2, which requires a very small decompression stub to be included in the resulting image. The stub decompresses the kernel code, on some systems printing dots to the console to indicate progress, and then continues the boot process. Support for LZO,[4] xz[5] and LZ4[6] compression was added later.
On Ubuntu, there is a special script called extract-vmlinux which comes with your version of the Linux kernel (https://blog.packagecloud.io/eng/2016/03/08/how-to-extract-and-disassmble-a-linux-kernel-image-vmlinuz/). The Linux ELF file is /boot/vmlinuz. To decompress it, you must use the extract-vmlinux script which can be installed with
sudo apt-get install linux-headers-$(uname -r)
The script is safe to use because it is a standard script which is found in the official repository of packages for your distribution (most packages there are open source and safe). Now use
sudo /usr/src/kernels/$(uname -r)/scripts/extract-vmlinux /boot/vmlinuz-$(uname -r) > vmlinux
to extract the Linux kernel's ELF file from the compressed vmlinux image to your home repository. Now we can look at the ELF file of the Linux kernel. Use readelf -a vmlinux to have a summary of the content. The output for me is this:
user#user-System-Product-Name:~$ readelf -a vmlinux
ELF Header:
Magic: 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00
Class: ELF64
Data: 2's complement, little endian
Version: 1 (current)
OS/ABI: UNIX - System V
ABI Version: 0
Type: EXEC (Executable file)
Machine: Advanced Micro Devices X86-64
Version: 0x1
Entry point address: 0x1000000
Start of program headers: 64 (bytes into file)
Start of section headers: 46137728 (bytes into file)
Flags: 0x0
Size of this header: 64 (bytes)
Size of program headers: 56 (bytes)
Number of program headers: 5
Size of section headers: 64 (bytes)
Number of section headers: 35
Section header string table index: 34
Section Headers:
[Nr] Name Type Address Offset
Size EntSize Flags Link Info Align
[ 0] NULL 0000000000000000 00000000
0000000000000000 0000000000000000 0 0 0
[ 1] .text PROGBITS ffffffff81000000 00200000
0000000000e025f7 0000000000000000 AX 0 0 4096
[ 2] .rodata PROGBITS ffffffff82000000 01200000
00000000004e46f2 0000000000000000 WA 0 0 4096
[ 3] .pci_fixup PROGBITS ffffffff824e4700 016e4700
00000000000032b0 0000000000000000 A 0 0 16
[ 4] .tracedata PROGBITS ffffffff824e79b0 016e79b0
0000000000000078 0000000000000000 A 0 0 1
[ 5] __ksymtab PROGBITS ffffffff824e7a28 016e7a28
0000000000010a34 0000000000000000 A 0 0 4
[ 6] __ksymtab_gpl PROGBITS ffffffff824f845c 016f845c
00000000000121ec 0000000000000000 A 0 0 4
[ 7] __kcrctab PROGBITS ffffffff8250a648 0170a648
00000000000058bc 0000000000000000 A 0 0 4
[ 8] __kcrctab_gpl PROGBITS ffffffff8250ff04 0170ff04
00000000000060a4 0000000000000000 A 0 0 4
[ 9] __ksymtab_strings PROGBITS ffffffff82515fa8 01715fa8
0000000000037bea 0000000000000001 AMS 0 0 1
[10] __init_rodata PROGBITS ffffffff8254dba0 0174dba0
00000000000002a8 0000000000000000 A 0 0 32
[11] __param PROGBITS ffffffff8254de48 0174de48
00000000000038e0 0000000000000000 A 0 0 8
[12] __modver PROGBITS ffffffff82551728 01751728
00000000000005a0 0000000000000000 WA 0 0 8
[13] __ex_table PROGBITS ffffffff82551cd0 01751cd0
0000000000001af4 0000000000000000 A 0 0 4
[14] .notes NOTE ffffffff825537c4 017537c4
00000000000001ec 0000000000000000 A 0 0 4
[15] .data PROGBITS ffffffff82600000 01800000
00000000003657c0 0000000000000000 WA 0 0 8192
[16] __bug_table PROGBITS ffffffff829657c0 01b657c0
00000000000178d4 0000000000000000 WA 0 0 1
[17] .vvar PROGBITS ffffffff8297e000 01b7e000
0000000000001000 0000000000000000 WA 0 0 16
[18] .data..percpu PROGBITS 0000000000000000 01c00000
000000000002f000 0000000000000000 WA 0 0 4096
[19] .init.text PROGBITS ffffffff829ae000 01dae000
00000000000772e5 0000000000000000 AX 0 0 16
[20] .altinstr_aux PROGBITS ffffffff82a252e5 01e252e5
0000000000002d9b 0000000000000000 AX 0 0 1
[21] .init.data PROGBITS ffffffff82a2a000 01e2a000
00000000001c74f0 0000000000000000 WA 0 0 8192
[22] .x86_cpu_dev.init PROGBITS ffffffff82bf14f0 01ff14f0
0000000000000028 0000000000000000 A 0 0 8
[23] .parainstructions PROGBITS ffffffff82bf1518 01ff1518
0000000000022b7c 0000000000000000 A 0 0 8
[24] .altinstructions PROGBITS ffffffff82c14098 02014098
0000000000006660 0000000000000000 A 0 0 1
[25] .altinstr_replace PROGBITS ffffffff82c1a6f8 0201a6f8
0000000000001789 0000000000000000 AX 0 0 1
[26] .iommu_table PROGBITS ffffffff82c1be88 0201be88
00000000000000f0 0000000000000000 A 0 0 8
[27] .apicdrivers PROGBITS ffffffff82c1bf78 0201bf78
0000000000000040 0000000000000000 WA 0 0 8
[28] .exit.text PROGBITS ffffffff82c1bfb8 0201bfb8
0000000000001f4b 0000000000000000 AX 0 0 1
[29] .smp_locks PROGBITS ffffffff82c1e000 0201e000
000000000000a000 0000000000000000 A 0 0 4
[30] .data_nosave PROGBITS ffffffff82c28000 02028000
0000000000001000 0000000000000000 WA 0 0 4
[31] .bss NOBITS ffffffff82c29000 02029000
00000000005d7000 0000000000000000 WA 0 0 4096
[32] .brk NOBITS ffffffff83200000 02029000
000000000002c000 0000000000000000 WA 0 0 1
[33] .init.scratch PROGBITS ffffffff83400000 02800000
0000000000400000 0000000000000000 WA 0 0 32
[34] .shstrtab STRTAB 0000000000000000 02c00000
0000000000000180 0000000000000000 0 0 1
Key to Flags:
W (write), A (alloc), X (execute), M (merge), S (strings), I (info),
L (link order), O (extra OS processing required), G (group), T (TLS),
C (compressed), x (unknown), o (OS specific), E (exclude),
l (large), p (processor specific)
There are no section groups in this file.
Program Headers:
Type Offset VirtAddr PhysAddr
FileSiz MemSiz Flags Align
LOAD 0x0000000000200000 0xffffffff81000000 0x0000000001000000
0x00000000015539b0 0x00000000015539b0 R E 0x200000
LOAD 0x0000000001800000 0xffffffff82600000 0x0000000002600000
0x000000000037f000 0x000000000037f000 RW 0x200000
LOAD 0x0000000001c00000 0x0000000000000000 0x000000000297f000
0x000000000002f000 0x000000000002f000 RW 0x200000
LOAD 0x0000000001dae000 0xffffffff829ae000 0x00000000029ae000
0x0000000000e52000 0x0000000000e52000 RWE 0x200000
NOTE 0x00000000017537c4 0xffffffff825537c4 0x00000000025537c4
0x00000000000001ec 0x00000000000001ec 0x4
Section to Segment mapping:
Segment Sections...
00 .text .rodata .pci_fixup .tracedata __ksymtab __ksymtab_gpl __kcrctab __kcrctab_gpl __ksymtab_strings __init_rodata __param __modver __ex_table .notes
01 .data __bug_table .vvar
02 .data..percpu
03 .init.text .altinstr_aux .init.data .x86_cpu_dev.init .parainstructions .altinstructions .altinstr_replacement .iommu_table .apicdrivers .exit.text .smp_locks .data_nosave .bss .brk .init.scratch
04 .notes
There is no dynamic section in this file.
There are no relocations in this file.
The decoding of unwind sections for machine type Advanced Micro Devices X86-64 is not currently supported.
No version information found in this file.
Displaying notes found in: .notes
Owner Data size Description
Xen 0x00000006 Unknown note type: (0x00000006)
description data: 6c 69 6e 75 78 00
Xen 0x00000004 Unknown note type: (0x00000007)
description data: 32 2e 36 00
Xen 0x00000008 Unknown note type: (0x00000005)
description data: 78 65 6e 2d 33 2e 30 00
Xen 0x00000008 Unknown note type: (0x00000003)
description data: 00 00 00 80 ff ff ff ff
Xen 0x00000008 Unknown note type: (0x0000000f)
description data: 00 00 00 00 80 00 00 00
Xen 0x00000008 NT_VERSION (version)
description data: c0 e1 9a 82 ff ff ff ff
Xen 0x00000008 NT_ARCH (architecture)
description data: 00 20 00 81 ff ff ff ff
Xen 0x00000029 Unknown note type: (0x0000000a)
description data: 21 77 72 69 74 61 62 6c 65 5f 70 61 67 65 5f 74 61 62 6c 65 73 7c 70 61 65 5f 70 67 64 69 72 5f 61 62 6f 76 65 5f 34 67 62
Xen 0x00000004 Unknown note type: (0x00000011)
description data: 01 88 00 00
Xen 0x00000004 Unknown note type: (0x00000009)
description data: 79 65 73 00
Xen 0x00000008 Unknown note type: (0x00000008)
description data: 67 65 6e 65 72 69 63 00
Xen 0x00000010 Unknown note type: (0x0000000d)
description data: 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00
Xen 0x00000004 Unknown note type: (0x0000000e)
description data: 01 00 00 00
Xen 0x00000004 Unknown note type: (0x00000010)
description data: 01 00 00 00
Xen 0x00000008 Unknown note type: (0x0000000c)
description data: 00 00 00 00 00 80 ff ff
Xen 0x00000008 Unknown note type: (0x00000004)
description data: 00 00 00 00 00 00 00 00
GNU 0x00000014 NT_GNU_BUILD_ID (unique build ID bitstring)
Build ID: c0263a3075bc0a9388365ddf35ab5422da3356a9
Linux 0x00000001 OPEN
description data: 00
Xen 0x00000008 Unknown note type: (0x00000012)
description data: 40 07 00 01 00 00 00 00
The important section for the question is the Program headers section:
Program Headers:
Type Offset VirtAddr PhysAddr
FileSiz MemSiz Flags Align
LOAD 0x0000000000200000 0xffffffff81000000 0x0000000001000000
0x00000000015539b0 0x00000000015539b0 R E 0x200000
LOAD 0x0000000001800000 0xffffffff82600000 0x0000000002600000
0x000000000037f000 0x000000000037f000 RW 0x200000
LOAD 0x0000000001c00000 0x0000000000000000 0x000000000297f000
0x000000000002f000 0x000000000002f000 RW 0x200000
LOAD 0x0000000001dae000 0xffffffff829ae000 0x00000000029ae000
0x0000000000e52000 0x0000000000e52000 RWE 0x200000
NOTE 0x00000000017537c4 0xffffffff825537c4 0x00000000025537c4
0x00000000000001ec 0x00000000000001ec 0x4
I would guess that the RW sections are the data/bss segments of the static and freestanding kernel image. There isn't much bss data (uninitialized data) in this kernel image. You can see that by looking at the filesize versus the memsize of the different segments. In bss data, only the size is written in the executable. The loader will then assign zeroes to these segments. Since we have only memsizes which are equal to the filesizes, then we don't have much bss here.
Also, we can look at the different virtual addresses at which the kernel will load itself after decompression. This will be useful to find the segment in which a certain global variable resides.
Now, to determine where a global variable is loaded one can look at the System.map file in the /boot directory. For example, we can take a random global variable in kernel/sched/core.c called sysctl_sched_rt_period and find its address using
user#user-System-Product-Name:~$ sudo grep "sysctl_sched_rt_period" /boot/System.map-$(uname -r)
ffffffff8266eb24 D sysctl_sched_rt_period
The address is thus ffffffff8266eb24. This address resides in the RW segment loaded at ffffffff82600000 because the size of this segment is 37f000 and because ffffffff82600000 + 37f000 > ffffffff8266eb24. You can clearly see that this global variable is stored in the data segment of the kernel's executable.

SSL not working between Linux and Windows

I have gone through loads of material present on internet for SSL. I followed the steps and created self signed certificate on server (linux) using keytool. Server keystore was already having an entry as ( CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown), my new certificate was second entry as ( CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server ). Then I exported the certificate(.cer) using keytool and copied same on my client(windows). I then imported server generated certificate to client trustore. Now when I try to communicate using SSL it fails everytime. I turned on SSL debug on client. Below is the log
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
***
found key for : Client
chain [0] = [
[
Version: V3
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits
modulus: 19643942881710234591525118408612815215632338692166465250629734200981703093763200559775845583913404371567241804832487728799610532434766533695993759141114319525441958126364976642955560446067359829730544145500409447935888670367709958247941184557182316292540918805424085096889405623367353240389104083404287642633808982388623942568195322780929142023222276129235672938020453213230922184807911898395818264624343113898437136096266829934433793735074739359988881755805184514603338282021635155460130597302085016075305135792447640646817495498043975883348791446660517781531653507565586938242488813328480016900010365926159926261191
public exponent: 65537
Validity: [From: Fri Oct 21 13:20:47 IST 2016,
To: Thu Jan 19 13:20:47 IST 2017]
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
SerialNumber: [ 46dac56d]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 72 B5 E3 14 98 BD 53 F3 69 33 96 A5 71 F5 99 2B r.....S.i3..q..+
0010: 22 0F B9 F6 "...
]
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 21 16 B3 C9 5D BC EB 71 35 78 95 8E BF 30 72 AC !...]..q5x...0r.
0010: D1 42 AA B7 C1 8B 23 FD 67 DF 6F 36 85 E8 C6 05 .B....#.g.o6....
0020: A4 7B E7 A5 B5 3A FC 0C 88 29 3D C3 CD C2 88 8D .....:...)=.....
0030: 86 3A BF 14 85 93 01 75 5E 6E 01 87 44 A9 0A 21 .:.....u^n..D..!
0040: A2 F0 C3 05 9C 40 7B 89 61 DB 84 28 73 89 0F 3A .....#..a..(s..:
0050: B7 96 E8 63 30 29 8A B5 11 4C D2 7E A8 17 6F 0F ...c0)...L....o.
0060: 4E C7 4A AD E0 A8 6E 68 CE 72 FE DD DE F7 1C 84 N.J...nh.r......
0070: 20 C9 C4 CA F1 6A 3B C0 F9 A8 DD 03 0B EF 04 03 ....j;.........
0080: 40 BA 37 F6 B6 9C BE FF A9 E6 0E BF E6 32 B8 B3 #.7..........2..
0090: 0A EB 0F F7 EA 23 93 D1 17 D7 6E 94 0C 98 4C 90 .....#....n...L.
00A0: 40 21 DE 39 09 A9 16 2A 97 DD 2D E5 C0 FC FE 2E #!.9...*..-.....
00B0: AE 36 0C 04 6D A8 8F 1D B8 2B 99 54 7C AD 4F 8C .6..m....+.T..O.
00C0: 01 9C C2 07 77 81 A7 6C 07 2D A3 75 1D 4E E4 16 ....w..l.-.u.N..
00D0: 7E D0 BD E4 79 0F B6 9C C8 62 2E D6 E1 AC 35 58 ....y....b....5X
00E0: 22 B2 8C 4B FE 9A 06 C4 53 C1 8F 45 EA 61 3A 7F "..K....S..E.a:.
00F0: 3C D1 15 0D A8 27 3E 0F AB F5 8F DA 78 05 5F AE <....'>.....x._.
]
***
trigger seeding of SecureRandom
done seeding SecureRandom
keyStore is : D:\\Development\\Workspace\\Eclipse\\testSSL\\Sample\\.keystore
keyStore type is : jks
keyStore provider is :
init keystore
init keymanager of type SunX509
***
found key for : Client
chain [0] = [
[
Version: V3
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits
modulus: 19643942881710234591525118408612815215632338692166465250629734200981703093763200559775845583913404371567241804832487728799610532434766533695993759141114319525441958126364976642955560446067359829730544145500409447935888670367709958247941184557182316292540918805424085096889405623367353240389104083404287642633808982388623942568195322780929142023222276129235672938020453213230922184807911898395818264624343113898437136096266829934433793735074739359988881755805184514603338282021635155460130597302085016075305135792447640646817495498043975883348791446660517781531653507565586938242488813328480016900010365926159926261191
public exponent: 65537
Validity: [From: Fri Oct 21 13:20:47 IST 2016,
To: Thu Jan 19 13:20:47 IST 2017]
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
SerialNumber: [ 46dac56d]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 72 B5 E3 14 98 BD 53 F3 69 33 96 A5 71 F5 99 2B r.....S.i3..q..+
0010: 22 0F B9 F6 "...
]
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 21 16 B3 C9 5D BC EB 71 35 78 95 8E BF 30 72 AC !...]..q5x...0r.
0010: D1 42 AA B7 C1 8B 23 FD 67 DF 6F 36 85 E8 C6 05 .B....#.g.o6....
0020: A4 7B E7 A5 B5 3A FC 0C 88 29 3D C3 CD C2 88 8D .....:...)=.....
0030: 86 3A BF 14 85 93 01 75 5E 6E 01 87 44 A9 0A 21 .:.....u^n..D..!
0040: A2 F0 C3 05 9C 40 7B 89 61 DB 84 28 73 89 0F 3A .....#..a..(s..:
0050: B7 96 E8 63 30 29 8A B5 11 4C D2 7E A8 17 6F 0F ...c0)...L....o.
0060: 4E C7 4A AD E0 A8 6E 68 CE 72 FE DD DE F7 1C 84 N.J...nh.r......
0070: 20 C9 C4 CA F1 6A 3B C0 F9 A8 DD 03 0B EF 04 03 ....j;.........
0080: 40 BA 37 F6 B6 9C BE FF A9 E6 0E BF E6 32 B8 B3 #.7..........2..
0090: 0A EB 0F F7 EA 23 93 D1 17 D7 6E 94 0C 98 4C 90 .....#....n...L.
00A0: 40 21 DE 39 09 A9 16 2A 97 DD 2D E5 C0 FC FE 2E #!.9...*..-.....
00B0: AE 36 0C 04 6D A8 8F 1D B8 2B 99 54 7C AD 4F 8C .6..m....+.T..O.
00C0: 01 9C C2 07 77 81 A7 6C 07 2D A3 75 1D 4E E4 16 ....w..l.-.u.N..
00D0: 7E D0 BD E4 79 0F B6 9C C8 62 2E D6 E1 AC 35 58 ....y....b....5X
00E0: 22 B2 8C 4B FE 9A 06 C4 53 C1 8F 45 EA 61 3A 7F "..K....S..E.a:.
00F0: 3C D1 15 0D A8 27 3E 0F AB F5 8F DA 78 05 5F AE <....'>.....x._.
]
***
trustStore is: D:\Development\Workspace\Eclipse\testSSL\Sample\.keystore
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
trigger seeding of SecureRandom
done seeding SecureRandom
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
main, setSoTimeout(0) called
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1476980696 bytes = { 63, 74, 124, 176, 200, 133, 175, 107, 173, 166, 115, 188, 94, 103, 2, 237, 54, 77, 30, 244, 166, 94, 22, 118, 220, 68, 182, 101 }
Session ID: {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods: { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
***
main, WRITE: TLSv1 Handshake, length = 149
main, READ: TLSv1 Handshake, length = 893
*** ServerHello, TLSv1
RandomCookie: GMT: 1476980313 bytes = { 231, 179, 63, 173, 107, 35, 84, 125, 43, 218, 134, 171, 63, 175, 41, 97, 49, 69, 68, 114, 75, 255, 22, 5, 125, 125, 124, 228 }
Session ID: {88, 9, 238, 89, 11, 220, 101, 208, 32, 106, 9, 30, 220, 143, 218, 47, 199, 2, 7, 90, 179, 24, 198, 139, 59, 34, 141, 169, 98, 186, 165, 87}
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
** TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits
modulus: 95112623927847376021742911976482809760928286563374389538614118188348331948203986176617263611529390313893505980510111828145989572854367203125102386298954935692697121151897799979668903275037476471253143679337867450398842776382716002256891170241471053163351903550915614869043680655531661128282766400131123099323
public exponent: 65537
Validity: [From: Wed Jan 02 01:20:42 IST 2013,
To: Sat Jan 06 01:20:42 IST 2018]
Issuer: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown
SerialNumber: [ 50e33e12]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 3F 48 66 AE 51 1D 5C 0C E9 0D 88 DD CD 48 84 B7 ?Hf.Q.\......H..
0010: 9A B3 70 79 C9 43 0E 4D B1 1E 10 5B 7A EB DC 6B ..py.C.M...[z..k
0020: 9B 15 E4 9E 9C 94 39 1C E7 CF 0E 2C D0 A8 A0 1D ......9....,....
0030: A1 A4 E4 63 A0 37 AA 98 72 31 77 56 16 31 49 B9 ...c.7..r1wV.1I.
0040: 8D BD A1 D7 53 BF 82 69 9C C7 B6 2A F0 FA A2 2D ....S..i...*...-
0050: C2 34 25 23 9C DA B6 74 D5 E0 CC 27 45 A9 8C 41 .4%#...t...'E..A
0060: 23 8B 33 A8 92 72 46 77 E0 10 E7 C6 38 9D 1D A8 #.3..rFw....8...
0070: E5 B2 B3 B5 58 99 B3 BD 1C E3 B0 39 54 F2 EB 46 ....X......9T..F
]
***
CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
X.509
adding as trusted cert:
Subject: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Issuer: CN=Server, OU=Server, O=Server, L=Server, ST=Server, C=Server
Algorithm: RSA; Serial number: 0x3bd2165e
Valid from Fri Oct 21 13:08:11 IST 2016 until Thu Jan 19 13:08:11 IST 2017
adding as trusted cert:
Subject: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Issuer: CN=Client, OU=Client, O=Client, L=Client, ST=Client, C=Client
Algorithm: RSA; Serial number: 0x46dac56d
Valid from Fri Oct 21 13:20:47 IST 2016 until Thu Jan 19 13:20:47 IST 2017
%% Invalidated: [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
main, SEND TLSv1 ALERT: fatal, description = certificate_unknown
main, WRITE: TLSv1 Alert, length = 2
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
main, IOException in getSession(): javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
main, called close()
main, called closeInternal(true)
main, called close()
main, called closeInternal(true)
When I checked logs carefully I noticed Server is sending only first certificate in chain of certificates to client i.e,. ( CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown ), my newly created certificate is not present. Am I doing something wrong?

Paypal Handshake failure - IBM WCS/WAS

we have updated the SSL protocol to use SSL_TLSv2 (which should allow TLSv1, TLSv1.1 and TLSv1.2) and we are using https://api.sandbox.paypal.com/2.0/ endpoint URL to connect to paypal. We have added VeriSign Class 3 Public Primary Certification Authority - G5 certificate to our keystore. But still we are getting handshake failure.
Error LOG:
javax.xml.ws.soap.SOAPFaultException: javax.net.ssl.SSLException: Received fatal alert: handshake_failure". javax.xml.ws.soap.SOAPFaultException: javax.net.ssl.SSLException: Received fatal alert: handshake_failure
at org.apache.axis2.jaxws.marshaller.impl.alt.MethodMarshallerUtils.createSystemException(MethodMarshallerUtils.java:1363)
at org.apache.axis2.jaxws.marshaller.impl.alt.MethodMarshallerUtils.demarshalFaultResponse(MethodMarshallerUtils.java:1089)
at org.apache.axis2.jaxws.marshaller.impl.alt.DocLitBareMethodMarshaller.demarshalFaultResponse(DocLitBareMethodMarshaller.java:417)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.getFaultResponse(JAXWSProxyHandler.java:626)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.createResponse(JAXWSProxyHandler.java:566)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.invokeSEIMethod(JAXWSProxyHandler.java:432)
at org.apache.axis2.jaxws.client.proxy.JAXWSProxyHandler.invoke(JAXWSProxyHandler.java:213)
at com.sun.proxy.$Proxy62.setExpressCheckout(Unknown Source)
Please find the logs below (After enabling SSL Debug)
[6/29/16 12:17:29:389 IST] 00000211 WSChannelFram A CHFW0019I: The Transport Channel Service has started chain HttpsOutboundChain:web-proxy.corp.hp.com:8088:706802748:api.sandbox.paypal.com:-1.
adding as trusted cert:
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Subject: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Issuer: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Algorithm: RSA; Serial number: 0x9256ccd0f74
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Valid from Mon Mar 28 18:05:23 IST 2016 until Tue Mar 25 18:05:23 IST 2031
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O adding as trusted cert:
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Algorithm: RSA; Serial number: 0x250ce8e030612e9f2b89f7054d7cf8fd
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Valid from Wed Nov 08 05:30:00 IST 2006 until Mon Nov 08 05:29:59 IST 2021
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O adding as trusted cert:
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Subject: CN=Symantec Class 3 Secure Server CA - G4, OU=Symantec Trust Network, O=Symantec Corporation, C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Algorithm: RSA; Serial number: 0x513fb9743870b73440418d30930699ff
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O Valid from Thu Oct 31 05:30:00 IST 2013 until Tue Oct 31 05:29:59 IST 2023
[6/29/16 12:17:30:016 IST] 00000211 SystemOut O
[6/29/16 12:17:30:019 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:019 IST] 00000211 SystemOut O found key for : default
[6/29/16 12:17:30:020 IST] 00000211 SystemOut O chain [0] = [
[
Version: V3
Subject: CN=localhost, OU=localhost, OU=localhost, O=IBM, C=US
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
Key: IBMJCE RSA Public Key:
modulus:
26167541711086627791578871564616365051862711740169857710554547535189479149908374929516177090517001379910396688828760654542434329119238956286945379132186129759458751111248999650559731436488161569437501148312306505875762201215861268858168483037657932583161029509501700884430074843289607373839133072877375577360636060242737127872859949426685225542431385914834039901653766669062129732208534425904601424824899456065980585969976422194265319042002149984018361515399815820913269930221749561374832898783792638898537082727405570885654709258468168429473416388030507181343754356665510039104609297653873247510424200394843741361793
public exponent:
65537
Validity: [From: Mon Mar 28 18:05:24 IST 2016,
To: Tue Mar 28 18:05:24 IST 2017]
Issuer: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
SerialNumber: [10056828754800]
Certificate Extensions: 2
[1]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
[RFC822Name: ProfileUUID:WCDE80_180144-BASE-8a713340-a4f8-4abe-ae41-aaedf50c06bd]]
[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 41 79 84 39 4f 6c 37 6f Ay.9Ol7o
]
]
]
Algorithm: [SHA256withRSA]
Signature:
0000: 16 f9 9f a4 29 1d f4 17 7d 80 6e 34 e7 47 5b b2 ..........n4.G..
0010: 1c fd 5b 08 92 b8 24 e7 51 04 67 71 0a 91 1c 88 ........Q.gq....
0020: 63 c4 02 99 94 dd a2 21 93 0e 58 f0 5b 94 54 27 c.........X...T.
0030: 02 d1 fe 65 8d 05 78 4d 35 02 c4 28 f9 d5 3b 11 ...e..xM5.......
0040: 95 28 d4 87 b2 2c e2 e5 77 f8 06 55 f4 f3 72 ec ........w..U..r.
0050: c9 95 6f 1e 9c a4 02 f5 41 8d 50 c0 c0 5c df 5f ..o.....A.P.....
0060: 2f dd 90 2f 8c a1 53 f3 8b a4 5f 25 37 30 06 b9 ......S.....70..
0070: 2d a2 24 7b 4c bb 60 56 0b a4 b3 6e 73 a0 71 12 ....L..V...ns.q.
0080: ab 30 df 4d 27 3c 2b 8c 66 c5 b1 b5 56 e5 3c 41 .0.M....f...V..A
0090: 65 42 d4 d6 c2 8a ec 4e ec cc c1 62 49 75 ed 1c eB.....N...bIu..
00a0: 1d c3 f6 d0 dd 79 d4 a0 9c 1e ce 1a a8 ac 0b 68 .....y.........h
00b0: b4 50 cb 6b 92 8b 9e 99 96 2c ff 5b f8 63 2e a4 .P.k.........c..
00c0: fa 4c 82 13 8d 6d 5c 49 6b 32 49 41 4d 3f 8a eb .L...m.Ik2IAM...
00d0: 16 77 60 3e 84 af 7d 38 ed 06 7d 7c b9 69 0c 50 .w.....8.....i.P
00e0: f6 59 10 d4 70 76 8c 0d 23 40 68 66 7c be d0 a7 .Y..pv....hf....
00f0: 5d 43 55 c7 5e 31 6c ef 25 cc ec 6b d3 05 4f e8 .CU..1l....k..O.
]
[6/29/16 12:17:30:020 IST] 00000211 SystemOut O chain [1] = [
[
Version: V3
Subject: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
Key: IBMJCE RSA Public Key:
modulus:
19904753990009309220640490407026050840230290478827945495559467830914675305969718816314697475824624971015421979520946317273041884889483490534710677359598087244263711680653006429506370864649858288482237624045812419537775828964539312096597139584695395163230244568608219831591052376071824331577827894488085049089178639843811986500484212726449214616765323493684584926518468131402057026630937301877109272783156174698101767247279976634672974959576739431097029244885330417865240554525368272023593234999310504632854754949649989504797724839753383392964247687587360456802376083021433419450872358735106842206689297528583371429329
public exponent:
65537
Validity: [From: Mon Mar 28 18:05:23 IST 2016,
To: Tue Mar 25 18:05:23 IST 2031]
Issuer: CN=localhost, OU=Root Certificate, OU=localhost, OU=localhost, O=IBM, C=US
SerialNumber: [10056343818100]
Certificate Extensions: 3
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
[2]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
[RFC822Name: ProfileUUID:WCDE80_180144-BASE-8a713340-a4f8-4abe-ae41-aaedf50c06bd]]
[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 40 c3 48 d5 8e 43 b9 e0 ..H..C..
]
]
]
Algorithm: [SHA256withRSA]
Signature:
0000: 87 17 da 78 ef 39 12 f0 d2 1b f0 11 70 9d 83 96 ...x.9......p...
0010: 00 70 6f bd 2d 19 6c 5b 64 3f 75 8b cf 61 ae b9 .po...l.d.u..a..
0020: 2c 6c b4 cd da b7 6e 6f 03 1b 9f f0 ff 07 6f ff .l....no......o.
0030: a1 79 a7 4a 08 e6 2a 1c 4e 5b 13 75 03 9d ab 88 .y.J....N..u....
0040: 79 be ca e3 e7 c5 66 ab f9 49 96 06 b4 81 2b 3a y.....f..I......
0050: 33 5b c1 bd c9 e4 c7 07 10 61 5c 38 0f 5d a6 b1 3........a.8....
0060: 40 93 bf ec 37 34 34 d2 ec 30 3d ae 9a 80 6b ca ....744..0....k.
0070: 1b 43 58 73 be ec 1b 41 70 3f 11 1c f3 42 a0 e6 .CXs...Ap....B..
0080: ce d5 a3 a5 37 a7 c9 46 34 3e ac a1 32 bd c3 6e ....7..F4...2..n
0090: 07 49 e0 e3 2e 85 f4 04 6b 68 80 58 a3 32 58 1c .I......kh.X.2X.
00a0: 06 90 e2 64 1a 8d 68 20 e4 a2 28 56 cf d6 06 76 ...d..h....V...v
00b0: eb 53 4f d1 90 3b 82 b0 fc 61 47 3d 3d 4b dd 03 .SO......aG..K..
00c0: 59 e4 03 7e 7e 00 47 51 2f f4 f2 17 f8 34 d1 bd Y.....GQ.....4..
00d0: 24 b9 12 8c 8e b9 18 32 4e 89 a3 fe 6e ec 3f 9b .......2N...n...
00e0: 33 0d a0 f3 45 4c 88 04 97 3d 31 07 33 81 5a 11 3...EL....1.3.Z.
00f0: e8 1d d1 68 2e 50 66 8a 4e f7 77 3c 64 82 60 a8 ...h.Pf.N.w.d...
]
[6/29/16 12:17:30:020 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O found key for : paypal
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O chain [0] = [
[
Version: V3
Subject: C=US, ST=CA, L=Santa Clara, O=HP, CN=hpbiztest_api1.hp.com
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: IBMJCE RSA Public Key:
modulus:
167767787854827133772476094878602356419059997517346374275255466537187831576020199052607407432097460847863697600517067858769595716996015976450736236072075948148640801631718329787519229056273024787589358929246179803681154066413328089574908636575846498188850427968011672902341432046713914611785901831874548450751
public exponent:
65537
Validity: [From: Tue Jan 10 01:00:44 IST 2012,
To: Fri Jan 07 01:00:44 IST 2022]
Issuer: EMAILADDRESS=re#paypal.com, CN=sandbox_camerchapi, OU=sandbox_certs, O="PayPal, Inc.", L=San Jose, ST=California, C=US
SerialNumber: [1049731]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 2a 5c 68 2b fd 0a 5f 62 71 32 51 2b 25 66 cf 65 ..h....bq2Q..f.e
0010: a4 ca 06 2a d3 f1 ae 58 6d d0 bf a3 c4 e2 2e a4 .......Xm.......
0020: 98 5b 4a 01 c1 09 aa ba e9 d3 91 a0 09 d8 bf c1 ..J.............
0030: 28 17 b8 9c 7c 15 7a 08 1b ff 92 71 98 2c 28 11 ......z....q....
0040: c4 97 6f 23 fc d7 4f 3f 09 b1 5a c9 06 f2 49 6d ..o...O...Z...Im
0050: 11 d5 87 fc d4 3e 25 1d 91 fe ff 4d 67 a8 ec a4 ...........Mg...
0060: b2 4d 5e 39 5d ef 7e 6b e8 f7 86 b7 2b 35 d6 d5 .M.9...k.....5..
0070: f0 24 6c 7a 0f bc 15 9e e2 84 3c f5 80 81 d2 01 ..lz............
]
[6/29/16 12:17:30:022 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O SSLContextImpl: Using X509ExtendedKeyManager com.ibm.ws.ssl.core.WSX509KeyManager
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O SSLContextImpl: Using X509TrustManager com.ibm.ws.ssl.core.WSX509TrustManager
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O JsseJCE: Using SecureRandom IBMSecureRandom from provider IBMJCE version 1.7
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O trigger seeding of SecureRandom
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O done seeding SecureRandom
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O Using SSLEngineImpl.
[6/29/16 12:17:30:023 IST] 00000211 SystemOut O SSLv3 protocol was requested but was not enabled
[6/29/16 12:17:30:025 IST] 00000211 SystemOut O SSLv3 protocol was requested but was not enabled
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O IBMJSSE2 will not allow unsafe server certificate change during renegotiation per jdk.tls.allowUnsafeServerCertChange set to FALSE or default
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O
Is initial handshake: true
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_CBC_SHA256
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_CBC_SHA256
[6/29/16 12:17:30:027 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_GCM_SHA256
[6/29/16 12:17:30:029 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
[6/29/16 12:17:30:029 IST] 00000211 SystemOut O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_GCM_SHA256
[6/29/16 12:17:30:029 IST] 00000211 SystemOut O %% No cached client session
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O *** ClientHello, TLSv1
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O RandomCookie: GMT: 1467182850 bytes = { 165, 170, 151, 64, 41, 40, 119, 74, 254, 115, 32, 213, 78, 45, 52, 66, 73, 224, 116, 255, 176, 137, 93, 27, 30, 166, 193, 21 }
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Session ID: {}
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Cipher Suites: [SSL_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Compression Methods: { 0 }
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Extension renegotiation_info, ri_length: 0, ri_connection_data: { null }
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O Extension server_name, server_name: [host_name: web-proxy.corp.hp.com]
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O ***
[6/29/16 12:17:30:030 IST] 00000211 SystemOut O [write] MD5 and SHA1 hashes: len = 92
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O 0000: 01 00 00 58 03 01 57 73 6f 02 a5 aa 97 40 29 28 ...X..Wso.......
0010: 77 4a fe 73 20 d5 4e 2d 34 42 49 e0 74 ff b0 89 wJ.s..N.4BI.t...
0020: 5d 1b 1e a6 c1 15 00 00 0c 00 2f 00 33 00 32 00 ............3.2.
0030: 0a 00 16 00 13 01 00 00 23 ff 01 00 01 00 00 00 ................
0040: 00 1a 00 18 00 00 15 77 65 62 2d 70 72 6f 78 79 .......web.proxy
0050: 2e 63 6f 72 70 2e 68 70 2e 63 6f 6d .corp.hp.com
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O WebContainer : 4, WRITE: TLSv1 Handshake, length = 92
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O [Raw write]: length = 97
[6/29/16 12:17:30:031 IST] 00000211 SystemOut O 0000: 16 03 01 00 5c 01 00 00 58 03 01 57 73 6f 02 a5 ........X..Wso..
0010: aa 97 40 29 28 77 4a fe 73 20 d5 4e 2d 34 42 49 .....wJ.s..N.4BI
0020: e0 74 ff b0 89 5d 1b 1e a6 c1 15 00 00 0c 00 2f .t..............
0030: 00 33 00 32 00 0a 00 16 00 13 01 00 00 23 ff 01 .3.2............
0040: 00 01 00 00 00 00 1a 00 18 00 00 15 77 65 62 2d ............web.
0050: 70 72 6f 78 79 2e 63 6f 72 70 2e 68 70 2e 63 6f proxy.corp.hp.co
0060: 6d m
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O [Raw read]: length = 5
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O 0000: 15 03 01 00 02 .....
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O [Raw read]: length = 2
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O 0000: 02 28 ..
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O WebContainer : 4, READ: TLSv1 Alert, length = 2
[6/29/16 12:17:30:371 IST] 00000211 SystemOut O WebContainer : 4, RECV TLSv1 ALERT: fatal, handshake_failure
[6/29/16 12:17:30:373 IST] 00000211 SystemOut O WebContainer : 4, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Received fatal alert: handshake_failure
[6/29/16 12:17:30:373 IST] 00000211 SystemOut O WebContainer : 4, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Received fatal alert: handshake_failure

PANIC: "Oops: 0000 [#1]" (check log for details) - Updated Kernel Tested

I'm trying to interpret a system crash that is repeatable, but but not that often. I believe it has do with a third party driver and a optical scanning device. I'm not sure if the driver for scanning device is causing the hang if it's bringing something out in a USB driver that causes the hang or if it's something totally different.
I'm not a driver developer, so I'm fumbling my way through the crash dump while reading the Linux Kernel Crash Book located here - http://rogunix.com/docs/Reversing&Exploiting/Linux_Kernel_Crash_Book.pdf .
I was able to setup a debug kernel with the kexec tools to produce a vmcore. With crash is see the PANIC: "Oops: 0000 [#1]" (check log for details) and in the logs is see the BUG: unable to handle kernel paging request at virtual address 00100100.
Can you help me interpret more of the dump so I can go back to the developer of the driver and tell them the findings or can you tell me is not the driver at all.
Here's more from the dump. Many thanks in advance.
KERNEL: /usr/lib/debug/lib/modules/2.6.18-194.el5debug/vmlinux
DUMPFILE: /root/kernel/vmcore_12032014
CPUS: 4
DATE: Sat Oct 20 16:51:55 2001
UPTIME: 00:03:55
LOAD AVERAGE: 0.79, 0.83, 0.38
TASKS: 128
NODENAME: 3232A
RELEASE: 2.6.18-194.el5debug
VERSION: #1 SMP Fri Apr 2 16:56:41 EDT 2010
MACHINE: i686 (1800 Mhz)
MEMORY: 2 GB
PANIC: "Oops: 0000 [#1]" (check log for details)
PID: 0
COMMAND: "swapper"
TASK: c069d460 (1 of 4) [THREAD_INFO: c075f000]
CPU: 0
STATE: TASK_RUNNING (PANIC)
crash> bt
PID: 0 TASK: c069d460 CPU: 0 COMMAND: "swapper"
#0 [c080cdb0] crash_kexec at c044a386
#1 [c080cdf4] die at c04065c3
#2 [c080ce24] do_page_fault at c062d1b7
#3 [c080ce5c] error_code (via page_fault) at c0405bc3
EAX: f7c7de2c EBX: 000ffaec ECX: 00000000 EDX: f4282e8c EBP: f7c665a0
DS: 007b ESI: f7c7ddf8 ES: 007b EDI: c080cea4
CS: 0060 EIP: c05a2ef2 ERR: ffffffff EFLAGS: 00010012
#4 [c080ce90] hiddev_send_event at c05a2ef2
#5 [c080cea0] hiddev_report_event at c05a2fcc
#6 [c080cec8] hid_input_report at c05a0fc3
#7 [c080cf1c] hid_irq_in at c05a261d
#8 [c080cf2c] usb_hcd_giveback_urb at c05964b6
#9 [c080cf3c] uhci_giveback_urb at f883f618 [uhci_hcd]
#10 [c080cf58] uhci_scan_schedule at f883fc14 [uhci_hcd]
#11 [c080cfa4] uhci_irq at f884163d [uhci_hcd]
#12 [c080cfc4] usb_hcd_irq at c0596f9b
#13 [c080cfcc] handle_IRQ_event at c0454d5f
#14 [c080cfe4] __do_IRQ at c0454e2d
--- <hard IRQ> ---
#0 [c075ff80] do_IRQ at c040761f
#1 [c075ff98] common_interrupt at c0405a28
EAX: 00000000 EBX: c075f008 ECX: 00000000 EDX: 00000000 EBP: 00000020
DS: 007b ESI: c06440f8 ES: 007b EDI: ca138790
CS: 0060 EIP: c0403d0a ERR: ffffff4e EFLAGS: 00000246
#2 [c075ffcc] mwait_idle at c0403d0a
#3 [c075ffd4] cpu_idle at c0403cc4
crash> log
Scan: First buffer received = 0x6
Scan: Last packet of command transfer = 6 Command size 6
Scan: 0x2 0x51 0x88 0x80 0x81 0x3
Scan: Read data present
Scan: IOCTL_PS3_PEAK_MSG
Scan: In scanner_read Scan: Copied 1 chunks of data to user space
usb 4-1: new full speed USB device using uhci_hcd and address 3
usb 4-1: configuration #1 chosen from 1 choice
pl2303 4-1:1.0: pl2303 converter detected
usb 4-1: pl2303 converter now attached to ttyUSB0
BUG: unable to handle kernel paging request at virtual address 00100100
printing eip:
c05a2ef2
*pde = 76330067
Oops: 0000 [#1]
SMP
last sysfs file: /devices/pci0000:00/0000:00:1d.2/usb4/4-1/bConfigurationValue
Modules linked in: vfat fat scan_drv_scanner(U) xt_limit xt_tcpudp xt_state ip_conntrack nfnetlink iptable_filter ip_tables x_tables loop dm_mirror dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi ac lp joydev snd_hda_intel snd_seq_dummy sg snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_page_alloc parport_pc serio_raw snd_hwdep parport pl2303 snd soundcore i2c_i801 usbserial r8169 i2c_core mii pcspkr dm_raid45 dm_message dm_region_hash dm_log dm_mod dm_mem_cache usb_storage ata_piix libata sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
CPU: 0
EIP: 0060:[<c05a2ef2>] Tainted: G VLI
EFLAGS: 00010012 (2.6.18-194.el5debug #1)
EIP is at hiddev_send_event+0x65/0x95
eax: f7c7de2c ebx: 000ffaec ecx: 00000000 edx: f4282e8c
esi: f7c7ddf8 edi: c080cea4 ebp: f7c665a0 esp: c080ce94
ds: 007b es: 007b ss: 0068
Process swapper (pid: 0, ti=c080c000 task=c069d460 task.ti=c075f000)
Stack: f7cbba78 ca3ec000 c080cebc c05a2fd1 00000001 00000001 ffffffff 00000000
00000000 00000000 00000005 f7cc857c c075ff9c c05a0fc8 f7c57348 00000002
00000002 00000046 c06cbfb0 00000001 ca3ec000 f7cca001 f7cbba78 00000046
Call Trace:
[<c05a2fd1>] hiddev_report_event+0x4b/0x52
[<c05a0fc8>] hid_input_report+0x99/0x399
[<c05a2622>] hid_irq_in+0x49/0xcc
[<c05964b9>] usb_hcd_giveback_urb+0x28/0x53
[<f883f61d>] uhci_giveback_urb+0x104/0x12b [uhci_hcd]
[<f883fc19>] uhci_scan_schedule+0x4f0/0x76b [uhci_hcd]
[<f8841642>] uhci_irq+0x118/0x12e [uhci_hcd]
[<c0596f9e>] usb_hcd_irq+0x23/0x50
[<c0454d61>] handle_IRQ_event+0x3e/0x8a
[<c0454e32>] __do_IRQ+0x85/0xda
[<c0454dad>] __do_IRQ+0x0/0xda
[<c040761f>] do_IRQ+0xa4/0xd1
[<c0405a2d>] common_interrupt+0x25/0x2c
[<c0403d0a>] mwait_idle+0x2a/0x3d
[<c0403cc6>] cpu_idle+0xa4/0xbe
[<c0764a22>] start_kernel+0x39e/0x3a6
=======================
Code: b9 01 00 02 00 ba 1d 00 00 00 40 83 e0 3f 89 83 00 06 00 00 8d 83 0c 06 00 00 e8 93 ac ee ff 8b 9b 14 06 00 00 81 eb 14 06 00 00 <8b> 83 14 06 00 00 0f 18 00 90 8d 93 14 06 00 00 8d 46 34 39 c2
EIP: [<c05a2ef2>] hiddev_send_event+0x65/0x95 SS:ESP 0068:c080ce94
Updated Kernel Tested
I have since updated to the latest CentOS 5.5 released kernel (2.6.18-371.6.1), but still got a kernel panic. However this time the panic occured on the command "khubd" and not on "swapper". I was able to capture the dump and below I have provided what I hope is relevant information to pinpoint this problem. Is it a bug in the kernel or something in the driver?
KERNEL: /usr/lib/debug/lib/modules/2.6.18-371.6.1.el5debug/vmlinux
DUMPFILE: /root/kernel2/HWID-2277-31032014/vmcore
CPUS: 4
DATE: Mon Mar 31 12:50:25 2014
UPTIME: 2 days, 19:29:28
LOAD AVERAGE: 0.07, 0.09, 0.02
TASKS: 181
NODENAME: 32277
RELEASE: 2.6.18-371.6.1.el5debug
VERSION: #1 SMP Wed Mar 12 22:29:36 EDT 2014
MACHINE: i686 (1800 Mhz)
MEMORY: 2 GB
PANIC: "Oops: 0000 [#1]" (check log for details)
PID: 126
COMMAND: "khubd"
TASK: ca2fc5b0 [THREAD_INFO: f7fb2000]
CPU: 3
STATE: TASK_RUNNING (PANIC)
crash> bt
PID: 126 TASK: ca2fc5b0 CPU: 3 COMMAND: "khubd"
#0 [f7fb2dfc] crash_kexec at c044da51
#1 [f7fb2e40] die at c0406649
#2 [f7fb2e70] do_page_fault at c0639449
#3 [f7fb2eb0] device_del at c057053e
#4 [f7fb2efc] device_del at c0570552
#5 [f7fb2f10] device_unregister at c0570669
#6 [f7fb2f18] usb_remove_ep_files at c05a3dac
#7 [f7fb2f38] usb_remove_sysfs_dev_files at c05a39d6
#8 [f7fb2f44] usb_disconnect at c059db59
#9 [f7fb2f58] hub_thread at c059e663
#10 [f7fb2fcc] kthread at c0439ef6
#11 [f7fb2fe4] kernel_thread_helper at c0405e0d
crash> log (truncated)
Scan: no error - In command_callback
Scan: In command_callback
Scan: First buffer received = 0x2a
Scan: Last packet of command transfer = 42 Command size 42
Scan: 0x2 0x44 0x20 0x54 0x65 0x73 0x74 0x20 0x4d 0x65 0x73 0x73
Scan: Read data present
Scan: IOCTL_PS3_PEAK_MSG
Scan: In scanner_read Scan: Copied 1 chunks of data to user space
Scan: IOCTL_PS3_SCANNER_COMMAND Busy slots = 0x0 Total_slots = 0x8 Busy image slots = 0x0
Scan: 0x2 0x38 0x3 0x4
Scan: In write_callback status = 0x0
Scan: In image_callback
Scan: Urb status = 0xffffffb9 Urb length = 0x0
Scan: In image_callback_fun - lost connection to scanner.
Scan: urb set to re-submit
Scan: In command_callback
Scan: Urb status = 0xffffffb9 Urb length = 0x0
Scan: In command_callback_fun - lost connection to scanner.
Scan: urb set to re-submit
usb 1-6: USB disconnect, address 11
BUG: unable to handle kernel paging request at virtual address 6b6b6b93
printing eip:
c04bd310
*pde = 00000000
Oops: 0000 [#1]
SMP
last sysfs file: /devices/pci0000:00/0000:00:1d.7/usb1/1-6/bConfigurationValue
Modules linked in: vfat fat pdi_ps3_drv_scanner(U) xt_limit xt_tcpudp xt_state ip_conntrack nfnetlink iptable_filter ip_tables x_tables loop dm_mirror dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi ac lp joydev snd_hda_intel snd_seq_dummy sg snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer parport_pc snd_page_alloc snd_hwdep snd parport tpm_tis tpm soundcore r8169 tpm_bios i2c_i801 serio_raw pcspkr pl2303 usbserial mii i2c_core dm_raid45 dm_message dm_region_hash dm_log dm_mod dm_mem_cache usb_storage ata_piix libata sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
CPU: 3
EIP: 0060:[<c04bd310>] Tainted: G -------------------- VLI
EFLAGS: 00010202 (2.6.18-371.6.1.el5debug #1)
EIP is at sysfs_hash_and_remove+0x18/0x103
eax: 6b6b6b6b ebx: f4be5bf4 ecx: c0570543 edx: 6b6b6b6b
esi: f4be5b0c edi: f3cd936c ebp: f3cd93c4 esp: f7fb2ee0
ds: 007b es: 007b ss: 0068
Process khubd (pid: 126, ti=f7fb2000 task=ca2fc5b0 task.ti=f7fb2000)
Stack: f4be5c50 6b6b6b6b f764d16c f4be5bf4 f4be5b0c f3cd936c f3cd93c4 c0570557
f4be5b0c f3cd93a0 f3cd936c f7c8da2c c057066e f7fb2f28 c05a3db1 f7fb2f28
c06827a6 00000000 305f7065 c06d0030 f3cd936c f3cd93c4 c05a39db f3cd96cc
Call Trace:
[<c0570557>] device_del+0x5c/0x16b
[<c057066e>] device_unregister+0x8/0x10
[<c05a3db1>] usb_remove_ep_files+0x53/0x75
[<c05a39db>] usb_remove_sysfs_dev_files+0xf/0x6c
[<c059db5e>] usb_disconnect+0xa7/0xe0
[<c059e668>] hub_thread+0x327/0x987
[<c0439ed9>] kthread+0xa1/0xec
[<c0439fab>] autoremove_wake_function+0x0/0x2d
[<c059e341>] hub_thread+0x0/0x987
[<c0439ef8>] kthread+0xc0/0xec
[<c0439e38>] kthread+0x0/0xec
[<c0405e0f>] kernel_thread_helper+0x7/0x10
=======================
Code: 8b 40 24 8b 40 40 c3 8b 40 14 8b 00 c3 8b 40 14 8b 00 c3 55 57 56 53 83 ec 0c 85 c0 89 44 24 04 89 14 24 0f 84 e5 00 00 00 89 c2 <8b> 40 28 85 c0 0f 84 d8 00 00 00 8b 52 70 05 90 00 00 00 89 54
EIP: [<c04bd310>] sysfs_hash_and_remove+0x18/0x103 SS:ESP 0068:f7fb2ee0