Related
I'm trying to compile and install linux 4.20.17 after adding my own kernel module (a simple multiplier module) source files. I am successfully able to compile and install linux-4.20.17 with the source files. The problem occurs when i try to boot up the system. I get a segmentation fault when my multiplier module is getting inserted.
When i try to insert the module on my own using insmod everything works fine. I can even create a device file, read and write to it.
This is my module_init() function.
int my_init(void)
{
valueToBeWritten = (int *)kmalloc(INT_BUF_LEN*sizeof(int), GFP_KERNEL);
msg_bf_Ptr = (char *)valueToBeWritten; //msg_bf_Ptr is in kernel space
if (msg_bf_Ptr == NULL) {
/* Failed to get memory, exit gracefully */
printk(KERN_ALERT "Unable to allocate needed memory\n");
return 10; /* Defining error code of 10 for
"Unable to allocate memory" */
}
Major = register_chrdev(0, DEVICE_NAME, &fops);
/* Negative values indicate a problem */
if (Major < 0) {
printk(KERN_ALERT "Registering char device failed with %d\n", Major);
kfree(valueToBeWritten);
printk(KERN_INFO "Mapping virtual address...\n");
printk("Physical address: %x; Virtual address: %x\n.", (unsigned int)virt_addr, (unsigned int)PHY_ADDR);
return Major;
}
sprintf(msg_bf_Ptr, "This device has not been written to yet\n");
cur_Ptr = msg_bf_Ptr;
printk(KERN_INFO "Registered a device with dynamic Major number of %d\n", Major);
printk(KERN_INFO "Create a device file for this device with this command:\n'mknod /dev/%s c %d 0'.\n", DEVICE_NAME, Major);
return 0; /* success */
}
I read that "modules cannot reserve resources during boot time". Is that what's causing the problem? Is the kmalloc statement causing the segmentation fault?
EDIT: I booted in through recovery mode and tried to look at the full error trace. But I couldn't find the segmentation fault. But here is the call trace where the multiplier module gets loaded.
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918412] Call Trace:
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918431] apparmor_sk_alloc_security+0x49/0x70
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918438] security_sk_alloc+0x37/0x50
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918449] sk_prot_alloc+0x58/0x130
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918453] sk_alloc+0x31/0x240
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918459] unix_create1+0x68/0x1e0
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918464] unix_stream_connect+0x97/0x4b0
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918469] __sys_connect+0xa3/0x120
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918476] __x64_sys_connect+0x1a/0x20
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918481] do_syscall_64+0x5a/0x120
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918487] entry_SYSCALL_64_after_hwframe+0x44/0xa9
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918491] RIP: 0033:0x7f32457968e7
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918494] Code: c3 66 90 41 54 55 41 89 d4 53 48 89 f5 89 fb 48 83 ec 10 e8 0b de 00 00 44 89 e2 41 89 c0 48 89 ee 89 df b8 2a 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 89 44 24 0c e8 45 de 00 00 8b 44
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918497] RSP: 002b:00007f32382fb6f0 EFLAGS: 00000293 ORIG_RAX: 000000000000002a
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918500] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f32457968e7
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918502] RDX: 000000000000006e RSI: 00007f32382fb720 RDI: 0000000000000005
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918504] RBP: 00007f32382fb720 R08: 0000000000000000 R09: 00007f32300145b0
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918507] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000000006e
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918509] R13: 0000000000000000 R14: 00007f32382fb720 R15: 00007f3230017000
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918514] Modules linked in: multiplier(OE) crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel vboxvideo(C) aes_x86_64 crypto_simd ttm cryptd drm_kms_helper glue_helper drm joydev intel_rapl_perf input_leds fb_sys_fops syscopyarea serio_raw sysfillrect sysimgblt mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 hid_generic usbhid hid psmouse ahci libahci pata_acpi e1000 i2c_piix4 video
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918604] ---[ end trace 821aa2233cf391a7 ]---
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918611] RIP: 0010:__kmalloc_track_caller+0xaf/0x210
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918614] Code: 39 7a 49 83 78 10 00 4d 8b 38 0f 84 ee 00 00 00 4d 85 ff 0f 84 e5 00 00 00 41 8b 59 20 49 8b 39 48 8d 4a 01 4c 89 f8 4c 01 fb <48> 33 1b 49 33 99 38 01 00 00 65 48 0f c7 0f 0f 94 c0 84 c0 74 b2
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918617] RSP: 0018:ffffa994814f3d18 EFLAGS: 00010202
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918620] RAX: 06fb5d499a5b6b73 RBX: 06fb5d499a5b6b73 RCX: 00000000000013b4
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918623] RDX: 00000000000013b3 RSI: 00000000006000c0 RDI: 0000000000027060
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918624] RBP: ffffa994814f3d50 R08: ffff98acbda27060 R09: ffff98acbd403b00
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918627] R10: ffffffff870ff020 R11: 304a565a46412d72 R12: 00000000006000c0
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918629] R13: 000000000000000a R14: ffff98acbd403b00 R15: 06fb5d499a5b6b73
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918632] FS: 00007f32382fc700(0000) GS:ffff98acbda00000(0000) knlGS:0000000000000000
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918635] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Apr 22 16:19:25 student-VirtualBox kernel: [ 247.918637] CR2: 00007f32382faff8 CR3: 000000005c9b2001 CR4: 00000000000606f0
Apr 22 16:19:39 student-VirtualBox kernel: [ 261.077288] general protection fault: 0000 [#3] SMP PTI
Apr 22 16:19:39 student-VirtualBox kernel: [ 261.077306] CPU: 0 PID: 1119 Comm: upowerd Tainted: G D C OE 4.20.17 #1
Apr 22 16:19:39 student-VirtualBox kernel: [ 261.077312] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
Apr 22 16:19:39 student-VirtualBox kernel: [ 261.077325] RIP: 0010:__kmalloc+0xb3/0x220
Apr 22 16:19:39 student-VirtualBox kernel: [ 261.077333] Code: 39 7a 49 83 78 10 00 4d 8b 38 0f 84 fb 00 00 00 4d 85 ff 0f 84 f2 00 00 00 41 8b 59 20 49 8b 39 48 8d 4a 01 4c 89 f8 4c 01 fb <48> 33 1b 49 33 99 38 01 00 00 65 48 0f c7 0f 0f 94 c0 84 c0 74 b2
I'm pretty new to device drivers I can't seem to make sense out of these logs I tried looking up some of the codes and phrases from the log but couldn't arrive at anything solid.
I want to route all http requests to a https service using the spring cloud gateway but always receive a handshake_failure.
Routing everything to https://google.com for example works, but to my own service with its private certificate, created and signed by my own private CA, it does not, although I provided the matching truststore via -Djavax.net.ssl.trustStore and set useInsecureTrustManager: true. So what is wrong here?
My spring cloud gateway config:
server:
port: ${PORT:8081}
spring:
application:
name: gateway-service
cloud:
gateway:
httpclient:
ssl:
useInsecureTrustManager: true
routes:
- id: after_route
uri: https://my.server:2900/server/ping
predicates:
- After=2017-01-20T17:42:47.789-07:00[America/Denver]
And the log out put with -Djavax.net.debug=all:
2019-07-30 14:14:27.206 INFO 8257 --- [ main] trationDelegate$BeanPostProcessorChecker : Bean 'org.springframework.cloud.autoconfigure.ConfigurationPropertiesRebinderAutoConfiguration' of type [org.springframework.cloud.autoconfigure.ConfigurationPropertiesRebinderAutoConfiguration$$EnhancerBySpringCGLIB$$ddc24342] is not eligible for getting processed by all BeanPostProcessors (for example: not eligible for auto-proxying)
. ____ _ __ _ _
/\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
\\/ ___)| |_)| | | | | || (_| | ) ) ) )
' |____| .__|_| |_|_| |_\__, | / / / /
=========|_|==============|___/=/_/_/_/
:: Spring Boot :: (v2.1.6.RELEASE)
2019-07-30 14:14:27.315 INFO 8257 --- [ main] com.tobias.gateway.Gateway : No active profile set, falling back to default profiles: default
2019-07-30 14:14:27.704 INFO 8257 --- [ main] o.s.cloud.context.scope.GenericScope : BeanFactory id=90eb380c-f88b-3401-b688-6ef3ead8e5f1
2019-07-30 14:14:27.724 INFO 8257 --- [ main] trationDelegate$BeanPostProcessorChecker : Bean 'org.springframework.cloud.autoconfigure.ConfigurationPropertiesRebinderAutoConfiguration' of type [org.springframework.cloud.autoconfigure.ConfigurationPropertiesRebinderAutoConfiguration$$EnhancerBySpringCGLIB$$ddc24342] is not eligible for getting processed by all BeanPostProcessors (for example: not eligible for auto-proxying)
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:27.950 CEST|SSLContextImpl.java:427|System property jdk.tls.client.cipherSuites is set to 'null'
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:27.953 CEST|SSLContextImpl.java:427|System property jdk.tls.server.cipherSuites is set to 'null'
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:27.974 CEST|SSLCipher.java:437|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:27.984 CEST|SSLContextImpl.java:401|Ignore disabled cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
javax.net.ssl|ALL|01|main|2019-07-30 14:14:27.984 CEST|SSLContextImpl.java:410|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
...
... Lots of other ignored cipher suites
...
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.009 CEST|TrustStoreManager.java:112|trustStore is: truststore.jks
trustStore type is: pkcs12
trustStore provider is:
the last modified time is: Wed Apr 10 10:36:03 CEST 2019
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.009 CEST|TrustStoreManager.java:311|Reload the trust store
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.022 CEST|TrustStoreManager.java:318|Reload trust certs
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.022 CEST|TrustStoreManager.java:323|Reloaded 1 trust certs
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.026 CEST|X509TrustManagerImpl.java:79|adding as trusted certificates (
"certificate" : {
"version" : "v3",
"serial number" : "00 E0 97 A2 3A FB A3 C1 44",
"signature algorithm": "SHA256withRSA",
"issuer" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"not before" : "2018-10-05 13:38:39.000 CEST",
"not after" : "2023-10-04 13:38:39.000 CEST",
"subject" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
}
]}
)
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.026 CEST|SSLContextImpl.java:115|trigger seeding of SecureRandom
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.026 CEST|SSLContextImpl.java:119|done seeding of SecureRandom
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.040 CEST|TrustStoreManager.java:112|trustStore is: truststore.jks
trustStore type is: pkcs12
trustStore provider is:
the last modified time is: Wed Apr 10 10:36:03 CEST 2019
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.041 CEST|X509TrustManagerImpl.java:79|adding as trusted certificates (
"certificate" : {
"version" : "v3",
"serial number" : "00 E0 97 A2 3A FB A3 C1 44",
"signature algorithm": "SHA256withRSA",
"issuer" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"not before" : "2018-10-05 13:38:39.000 CEST",
"not after" : "2023-10-04 13:38:39.000 CEST",
"subject" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
}
]}
)
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.041 CEST|SSLContextImpl.java:115|trigger seeding of SecureRandom
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.042 CEST|SSLContextImpl.java:119|done seeding of SecureRandom
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.048 CEST|TrustStoreManager.java:112|trustStore is: truststore.jks
trustStore type is: pkcs12
trustStore provider is:
the last modified time is: Wed Apr 10 10:36:03 CEST 2019
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.049 CEST|X509TrustManagerImpl.java:79|adding as trusted certificates (
"certificate" : {
"version" : "v3",
"serial number" : "00 E0 97 A2 3A FB A3 C1 44",
"signature algorithm": "SHA256withRSA",
"issuer" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"not before" : "2018-10-05 13:38:39.000 CEST",
"not after" : "2023-10-04 13:38:39.000 CEST",
"subject" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
}
]}
)
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.049 CEST|SSLContextImpl.java:115|trigger seeding of SecureRandom
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.049 CEST|SSLContextImpl.java:119|done seeding of SecureRandom
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.055 CEST|TrustStoreManager.java:112|trustStore is: truststore.jks
trustStore type is: pkcs12
trustStore provider is:
the last modified time is: Wed Apr 10 10:36:03 CEST 2019
javax.net.ssl|DEBUG|01|main|2019-07-30 14:14:28.056 CEST|X509TrustManagerImpl.java:79|adding as trusted certificates (
"certificate" : {
"version" : "v3",
"serial number" : "00 E0 97 A2 3A FB A3 C1 44",
"signature algorithm": "SHA256withRSA",
"issuer" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"not before" : "2018-10-05 13:38:39.000 CEST",
"not after" : "2023-10-04 13:38:39.000 CEST",
"subject" : "EMAILADDRESS=my#e.mail, CN=My Root Certificate Authority, OU=My OU, O=Me, L=Hamburg, ST=Hamburg, C=DE",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 87 FB AB 07 09 69 28 5C 53 05 29 49 44 B1 5C C7 .....i(\S.)ID.\.
0010: E2 A3 54 22 ..T"
]
]
}
]}
)
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.056 CEST|SSLContextImpl.java:115|trigger seeding of SecureRandom
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.056 CEST|SSLContextImpl.java:119|done seeding of SecureRandom
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.068 CEST|SSLContextImpl.java:115|trigger seeding of SecureRandom
javax.net.ssl|ALL|01|main|2019-07-30 14:14:28.068 CEST|SSLContextImpl.java:119|done seeding of SecureRandom
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [After]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Before]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Between]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Cookie]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Header]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Host]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Method]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Path]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Query]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [ReadBodyPredicateFactory]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [RemoteAddr]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [Weight]
2019-07-30 14:14:28.408 INFO 8257 --- [ main] o.s.c.g.r.RouteDefinitionRouteLocator : Loaded RoutePredicateFactory [CloudFoundryRouteService]
2019-07-30 14:14:28.828 INFO 8257 --- [ main] o.s.b.web.embedded.netty.NettyWebServer : Netty started on port(s): 8081
2019-07-30 14:14:28.832 INFO 8257 --- [ main] com.tobias.gateway.Gateway : Started Gateway in 2.114 seconds (JVM running for 2.72)
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.298 CEST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.298 CEST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLS11
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.298 CEST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLS11
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.299 CEST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.299 CEST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLS10
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.299 CEST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLS10
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.308 CEST|SupportedGroupsExtension.java:841|Ignore inactive or disabled named group: ffdhe2048
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.309 CEST|SupportedGroupsExtension.java:841|Ignore inactive or disabled named group: ffdhe3072
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.309 CEST|SupportedGroupsExtension.java:841|Ignore inactive or disabled named group: ffdhe4096
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.309 CEST|SupportedGroupsExtension.java:841|Ignore inactive or disabled named group: ffdhe6144
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.309 CEST|SupportedGroupsExtension.java:841|Ignore inactive or disabled named group: ffdhe8192
javax.net.ssl|WARNING|29|reactor-http-nio-6|2019-07-30 14:14:36.313 CEST|SignatureScheme.java:282|Signature algorithm, ed25519, is not supported by the underlying providers
javax.net.ssl|WARNING|29|reactor-http-nio-6|2019-07-30 14:14:36.314 CEST|SignatureScheme.java:282|Signature algorithm, ed448, is not supported by the underlying providers
javax.net.ssl|ALL|29|reactor-http-nio-6|2019-07-30 14:14:36.317 CEST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5
javax.net.ssl|INFO|29|reactor-http-nio-6|2019-07-30 14:14:36.317 CEST|AlpnExtension.java:161|No available application protocols
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.317 CEST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.318 CEST|ClientHello.java:651|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "BC 92 B0 0D 8A 40 3B CD E7 64 2D 46 A3 49 24 55 08 48 3A BC 02 B3 31 89 20 B2 F3 68 32 AF C4 82",
"session id" : "",
"cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035)]",
"compression methods" : "00",
"extensions" : [
]
}
)
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.329 CEST|SSLEngineOutputRecord.java:507|WRITE: TLS12 handshake, length = 260
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.330 CEST|SSLEngineOutputRecord.java:525|Raw write (
0000: 16 03 03 01 04 01 00 01 00 03 03 BC 92 B0 0D 8A ................
0010: 40 3B CD E7 64 2D 46 A3 49 24 55 08 48 3A BC 02 #;..d-F.I$U.H:..
0020: B3 31 89 20 B2 F3 68 32 AF C4 82 00 00 10 C0 2C .1. ..h2.......,
0030: C0 2B C0 2F C0 13 C0 14 00 9C 00 2F 00 35 01 00 .+./......./.5..
0040: 00 C7 00 00 00 21 00 1F 00 00 1C 70 6C 61 79 67 .....!.....playg
0050: 72 6F 75 6E 64 2E 6D 61 63 68 69 6E 65 73 2E 6E round.machines.n
0060: 37 6C 61 62 2E 69 6F 00 05 00 05 01 00 00 00 00 7lab.io.........
0070: 00 0A 00 16 00 14 00 17 00 18 00 19 00 09 00 0A ................
0080: 00 0B 00 0C 00 0D 00 0E 00 16 00 0B 00 02 01 00 ................
0090: 00 0D 00 28 00 26 04 03 05 03 06 03 08 04 08 05 ...(.&..........
00A0: 08 06 08 09 08 0A 08 0B 04 01 05 01 06 01 04 02 ................
00B0: 03 03 03 01 03 02 02 03 02 01 02 02 00 32 00 28 .............2.(
00C0: 00 26 04 03 05 03 06 03 08 04 08 05 08 06 08 09 .&..............
00D0: 08 0A 08 0B 04 01 05 01 06 01 04 02 03 03 03 01 ................
00E0: 03 02 02 03 02 01 02 02 00 11 00 09 00 07 02 00 ................
00F0: 04 00 00 00 00 00 17 00 00 00 2B 00 07 06 03 03 ..........+.....
0100: 03 02 03 01 FF 01 00 01 00 .........
)
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.357 CEST|SSLEngineInputRecord.java:177|Raw read (
0000: 15 03 03 00 02 02 28 ......(
)
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.358 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 alert, length = 2
javax.net.ssl|DEBUG|29|reactor-http-nio-6|2019-07-30 14:14:36.359 CEST|Alert.java:232|Received alert message (
"Alert": {
"level" : "fatal",
"description": "handshake_failure"
}
)
javax.net.ssl|ERROR|29|reactor-http-nio-6|2019-07-30 14:14:36.360 CEST|TransportContext.java:313|Fatal (HANDSHAKE_FAILURE): Received fatal alert: handshake_failure (
"throwable" : {
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:128)
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:308)
at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:279)
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:181)
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:164)
at java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:672)
at java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:627)
at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:443)
at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:422)
at java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:634)
at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:295)
at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1332)
at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1227)
at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1274)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:502)
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:441)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:278)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:374)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:360)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:352)
at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1408)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:374)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:360)
at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:930)
at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:163)
at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:682)
at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:617)
at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:534)
at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:496)
at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:906)
at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
at java.base/java.lang.Thread.run(Thread.java:834)}
)
Ok, I found the answer after playing around with the server ssl configuration. The service that I route to ist a spring boot application and its ssl config restricts the cipher suites to use like this:
server.ssl.ciphers=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
And that suite can not be handled by the spring cloud gateway. If I do not set that property at all, it works.
But now I would like to know what suites the spring cloud gateway supports? And why is that a problem of the gateway at all?
We have build an hybrid application and we have noticed an intermittent issue with connectivity to the mobile-first server from Android and iPhone. And it resolves once we kill the app and start again. This happens in following scenarios
1) when the direct update is requested and once the direct update is done immediately after that it stops working.
2) when the app is open and kept ideal in the background for some time like 30 min and then if try to access it does not connect to the server.
iPhone Logs
Jan 17 21:37:42 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Error>: NSURLConnection finished with error - code -1100
Jan 17 21:37:42 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677143475613, "end_mach":6677143529851, "elapsed_s":"0.002259917", "event":"Motion::CoarseMovement", "now_s":"537935862.468443036"}
Jan 17 21:37:43 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677159234428, "end_mach":6677159257208, "elapsed_s":"0.000949167", "event":"Motion::CoarseMovement", "now_s":"537935863.124722004"}
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WORKLIGHT] +[WLClient sharedInstance] in WLClient.m:165 :: IBMMobilieFirstFoundation.framework version = 7.1-2016/09/19 17:15:50
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [My.SessionTimeoutServiceFactory] SessionTimeoutService elapsedTime : NaN
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [My.services] {"wifiName":"Not Available","networkConnectionType":"WIFI","ipv4Addresses":{"3GAddress":"10.192.82.165","wifiAddress":"10.0.1.5"},"ipv6Addresses":{"3GAddress":"::2600:380:a32b:513d:40ac:e5f3","wifiAddress":"::fe80:8:0:0:1c1a:a8cf"},"isNetworkConnected":"true","carrierName":"Not Available","isRoaming":"Not Available","isAirplaneMode":"Not Available","telephonyNetworkType":"Not Available","ipAddress":"10.0.1.5"}
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] +[WLAFHTTPRequestOperationManagerWrapper requestWithURL:] in WLAFHTTPRequestOperationManagerWrapper.m:51 :: Request url is https://myServerIp:443/MyProject/adapters/AnnouncementsAdapter/announcements/fetchannouncements
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper start] in WLAFHTTPRequestOperationManagerWrapper.m:356 :: Starting the request with URL https://myServerIp:443/MyProject/adapters/AnnouncementsAdapter/announcements/fetchannouncements
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Error>: NSURLConnection finished with error - code -1001
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Error>: NSURLConnection finished with error - code -1001
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:388 :: Request Failed
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:389 :: Response Status Code : 0
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:390 :: Response Error : The request timed out.
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:388 :: Request Failed
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:389 :: Response Status Code : 0
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:390 :: Response Error : The request timed out.
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TCP Conn Cancel [39:0x1c4362700]
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TCP Conn Cancel [41:0x1c0365400]
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC Enabling TLS [45:0x1c0368f40]
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TCP Conn Start [45:0x1c0368f40]
Jan 17 21:37:43 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: Task <8A3D00F0-37B8-4A43-BA2E-2C96EAE6AA9F>.<0> setting up Connection 45
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TLS Event [45:0x1c0368f40]: 1, Pending(0)
Jan 17 21:37:44 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677182200912, "end_mach":6677182224304, "elapsed_s":"0.000974667", "event":"Motion::CoarseMovement", "now_s":"537935864.081508040"}
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TLS Event [45:0x1c0368f40]: 2, Pending(0)
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TLS Event [45:0x1c0368f40]: 20, Pending(0)
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TCP Conn Connected [45:0x1c0368f40]: Err(16)
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TCP Conn Event [45:0x1c0368f40]: 1
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TCP Conn Event [45:0x1c0368f40]: 8
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: TIC TLS Handshake Complete [45:0x1c0368f40]
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: Task <8A3D00F0-37B8-4A43-BA2E-2C96EAE6AA9F>.<0> now using Connection 45
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: Task <8A3D00F0-37B8-4A43-BA2E-2C96EAE6AA9F>.<0> sent request, body N
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: Task <8A3D00F0-37B8-4A43-BA2E-2C96EAE6AA9F>.<0> received response, status 401 content K
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: Task <8A3D00F0-37B8-4A43-BA2E-2C96EAE6AA9F>.<0> response ended
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:388 :: Request Failed
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:389 :: Response Status Code : 401
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper requestFailed:error:] in WLAFHTTPRequestOperationManagerWrapper.m:390 :: Response Error : Request failed: unauthorized (401)
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WORKLIGHT] +[WLClient sharedInstance] in WLClient.m:165 :: IBMMobilieFirstFoundation.framework version = 7.1-2016/09/19 17:15:50
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [NONE] Request [https://myServerIp:443/MyProject/authorization/v1/authorization]
Jan 17 21:37:44 Owners-iPhone-3 trustd[5056] <Notice>: could not disable pinning: not an internal release
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: THREAD WARNING: ['WLAuthorizationManagerPlugin'] took '22.705078' ms. Plugin should use a background thread.
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] +[WLAFHTTPRequestOperationManagerWrapper requestWithURL:] in WLAFHTTPRequestOperationManagerWrapper.m:51 :: Request url is https://myServerIp:443/MyProject/authorization/v1/authorization?response_type=code&client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&redirect_uri=http%3A%2F%2Fmfpredirecturi&isAjaxRequest=true&x=0.15013111462581286
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: Client relinquished <BKProcessAssertion: 0x100f8a9f0; "Called by UIKit, from <redacted>" (finishTask:180s); id:\M-b\M^#\M-&0B8CA7216A0C>
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: [MyMobileApp:5966] Deactivate assertion: <BKProcessAssertion: 0x100f8a9f0; "Called by UIKit, from <redacted>" (finishTask:180s); id:\M-b\M^#\M-&0B8CA7216A0C>
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: [MyMobileApp:5966] dump all assertions HWM:4 (deactivateAssertion): {
<BKProcessAssertion: 0x101884d90; "Resume" (activation:inf); id:\M-b\M^#\M-&9D6AF759764B> [active]
}
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: [MyMobileApp:5966] New process assertion state; preventSuspend, preventThrottleDownUI, preventThrottleDownCPU, preventSuspendOnSleep (assertion 0x100f8a9f0 added: (none); removed: preventIdleSleep)
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: [MyMobileApp:5966] Setting jetsam priority to 10 [0x10100]
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: [MyMobileApp:5966] dump all assertions HWM:4 (CPUMON check): {
<BKProcessAssertion: 0x101884d90; "Resume" (activation:inf); id:\M-b\M^#\M-&9D6AF759764B> [active]
}
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: Releasing PowerAssertion on MyMobileApp:5966 from update
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: [MyMobileApp:5966] Remove assertion: <BKProcessAssertion: 0x100f8a9f0; "Called by UIKit, from <redacted>" (finishTask:180s); id:\M-b\M^#\M-&0B8CA7216A0C>
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: [MyMobileApp:5966] dump all assertions HWM:4 (CPUMON check): {
<BKProcessAssertion: 0x101884d90; "Resume" (activation:inf); id:\M-b\M^#\M-&9D6AF759764B> [active]
}
Jan 17 21:37:44 Owners-iPhone-3 assertiond[74] <Notice>: -[BKAssertion dealloc] - <0x100f8a9f0>
Jan 17 21:37:44 Owners-iPhone-3 powerd[40] <Notice>: Process assertiond.74 Released SystemIsActive "MyMobileApp:5966:5966-C6CEB4F5-9DCC-4E15-8BB6-0B8CA7216A0C [Called by UIKit, from <redacted>] [0x100f8a9f0]" age:00:00:02 id:51539648155 [System: PrevIdle SysAct]
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp[5966] <Notice>: [DEBUG] [WL_AFHTTPRequestOperationManagerWrapper_PACKAGE] -[WLAFHTTPRequestOperationManagerWrapper start] in WLAFHTTPRequestOperationManagerWrapper.m:356 :: Starting the request with URL https://myServerIp:443/MyProject/authorization/v1/authorization?response_type=code&client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&redirect_uri=http%3A%2F%2Fmfpredirecturi&isAjaxRequest=true&x=0.15013111462581286
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: Task <D0C8DF5A-65FD-4BE0-82C9-21579B9947D1>.<0> now using Connection 45
Jan 17 21:37:44 Owners-iPhone-3 MyMobileApp(CFNetwork)[5966] <Notice>: Task <D0C8DF5A-65FD-4BE0-82C9-21579B9947D1>.<0> sent request, body N
Jan 17 21:37:44 Owners-iPhone-3 CommCenter(libATCommandStudioDynamic.dylib)[88] <Notice>: QMI: Svc=0x03(NAS) Ind MsgId=0x0051 Bin=['01 1F 00 80 03 02 04 EB 71 51 00 13 00 14 06 00 C1 F3 A2 FF D4 00 A2 01 00 64 A4 03 00 01 64 00']
Jan 17 21:37:44 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677197559866, "end_mach":6677197584343, "elapsed_s":"0.001019875", "event":"Motion::CoarseMovement", "now_s":"537935864.721438050"}
Jan 17 21:37:45 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677205218631, "end_mach":6677205243804, "elapsed_s":"0.001048875", "event":"Motion::CoarseMovement", "now_s":"537935865.040650964"}
Jan 17 21:37:45 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677220543131, "end_mach":6677220575096, "elapsed_s":"0.001331875", "event":"Motion::CoarseMovement", "now_s":"537935865.679077029"}
Jan 17 21:37:47 Owners-iPhone-3 destinationd(DuetExpertCenter)[5082] <Notice>: predictionForCategories returned error: <private>
Jan 17 21:37:47 Owners-iPhone-3 destinationd(DuetExpertCenter)[5082] <Error>: Error: <private>
Jan 17 21:37:47 Owners-iPhone-3 destinationd[5082] <Error>: <private> received error: <private>
Jan 17 21:37:48 Owners-iPhone-3 symptomsd(SymptomEvaluator)[5571] <Error>: AWD direct: received libnetcore symptom w/ non conforming layout, dropping
Jan 17 21:37:49 Owners-iPhone-3 CommCenter(libATCommandStudioDynamic.dylib)[88] <Notice>: QMI: Svc=0x03(NAS) Ind MsgId=0x0051 Bin=['01 1F 00 80 03 02 04 EC 71 51 00 13 00 14 06 00 C1 F2 A2 FF 8A 00 A2 01 00 64 A4 03 00 01 64 00']
Jan 17 21:37:49 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677320175459, "end_mach":6677320223146, "elapsed_s":"0.001986958", "event":"Motion::CoarseMovement", "now_s":"537935869.830474019"}
Jan 17 21:37:50 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677343176271, "end_mach":6677343215897, "elapsed_s":"0.001651083", "event":"Motion::CoarseMovement", "now_s":"537935870.788828015"}
Jan 17 21:37:50 Owners-iPhone-3 backboardd(IOKit)[66] <Error>: iohideventsystem_client_dispatch_properties_changed:0x10004003
Jan 17 21:37:51 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677350805334, "end_mach":6677350831802, "elapsed_s":"0.001102833", "event":"Motion::CoarseMovement", "now_s":"537935871.106637001"}
Jan 17 21:37:51 Owners-iPhone-3 dataaccessd(PersistentConnection)[574] <Notice>: SimpleTimer <PCSimpleTimer: 0x105abd500> has fired
Jan 17 21:37:51 Owners-iPhone-3 dataaccessd(PersistentConnection)[574] <Notice>: Invalidating simple timer <PCSimpleTimer: 0x105abd500>
Jan 17 21:37:51 Owners-iPhone-3 dataaccessd(PersistentConnection)[574] <Notice>: Disabling power monitoring for <PCSimpleTimer: 0x105abd500> - 2 timers
Jan 17 21:37:51 Owners-iPhone-3 dataaccessd(PersistentConnection)[574] <Notice>: SimpleTimer <PCSimpleTimer: 0x106356790> has fired
Jan 17 21:37:51 Owners-iPhone-3 dataaccessd(PersistentConnection)[574] <Notice>: Invalidating simple timer <PCSimpleTimer: 0x106356790>
Jan 17 21:37:51 Owners-iPhone-3 dataaccessd(PersistentConnection)[574] <Notice>: Disabling power monitoring for <PCSimpleTimer: 0x106356790> - 1 timers
Jan 17 21:37:51 Owners-iPhone-3 MyMobileApp(WebCore)[5966] <Notice>: 0x103313d00 - PerformanceMonitor::measurePostLoadMemoryUsage: Process was using 158139272 bytes of memory after the page load.
Jan 17 21:37:53 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677396859076, "end_mach":6677396897944, "elapsed_s":"0.001619500", "event":"Motion::CoarseMovement", "now_s":"537935873.025398970"}
Jan 17 21:37:53 Owners-iPhone-3 locationd[71] <Notice>: {"msg":"CLWifiPositioningSystemLogic::apply", "event":"elapsed", "begin_mach":6677404480228, "end_mach":6677404523844, "elapsed_s":"0.001817333", "event":"Motion::CoarseMovement", "now_s":"537935873.342646003"}
Jan 17 21:37:54 Owners-iPhone-3 CommCenter(libATCommandStudioDynamic.dylib)[88] <Notice>: QMI: Svc=0x03(NAS) Ind MsgId=0x0051 Bin=['01 1F 00 80 03 02 04 ED 71 51 00 13 00 14 06 00 BF F5 A3 FF 8C 00 A2 01 00 64 A4 03 00 01 64 00']
The request just reaches the web server but it returned with 401 error. Once app is killed and restarted it starts working again.
IBM Http Server logs
- - [17/Jan/2018:21:01:12 -0500] "GET /worklightconsole/201704051514/css/images/IBM_logo.png HTTP/1.1" 200 720
- - [17/Jan/2018:21:01:12 -0500] "GET /worklightconsole/201704051514/css/fonts/bold/helvetica-neue-bold.woff2 HTTP/1.1" 200 30804
- - [17/Jan/2018:21:11:48 -0500] "GET / HTTP/1.1" 302 283
- - [17/Jan/2018:21:34:20 -0500] "GET /MYProject/authorization/v1/authorization?client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&scope=-MYRealm&isAjaxRequest=true&x=0.275786186755855 HTTP/1.1" 200 -
- - [17/Jan/2018:21:34:20 -0500] "GET /MyProject/adapters/SecurityAdapter/security/login HTTP/1.1" 401 41
- - [17/Jan/2018:21:34:21 -0500] "GET /MyProject/authorization/v1/authorization?response_type=code&client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&redirect_uri=http%3A%2F%2Fmfpredirecturi&scope=MYRealm&isAjaxRequest=true&x=0.6627940373520301 HTTP/1.1" 200 25
- - [17/Jan/2018:21:34:22 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:34:22 -0500] "GET /analytics-service/data/administration/apps/worklight/getSettings HTTP/1.1" 200 1407
- - [17/Jan/2018:21:34:25 -0500] "POST /MyProject/apps/services/api/MYMobileApp/iphone/login HTTP/1.1" 401 166
- - [17/Jan/2018:21:34:26 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:36:38 -0500] "GET /MyProject/adapters/AnnouncementsAdapter/announcements/fetchannouncements HTTP/1.1" 401 41
- - [17/Jan/2018:21:36:40 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:36:40 -0500] "GET /analytics-service/data/administration/apps/worklight/getSettings HTTP/1.1" 200 1407
- - [17/Jan/2018:21:37:06 -0500] "GET /MyProject/authorization/v1/authorization?client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&scope=-MYRealm&isAjaxRequest=true&x=0.410883442826542 HTTP/1.1" 403 19
- - [17/Jan/2018:21:37:07 -0500] "GET /MyProject/adapters/SecurityAdapter/security/login HTTP/1.1" 401 41
- - [17/Jan/2018:21:37:08 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:37:44 -0500] "GET /MyProject/adapters/AnnouncementsAdapter/announcements/fetchannouncements HTTP/1.1" 401 41
- - [17/Jan/2018:21:37:44 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:37:44 -0500] "GET /analytics-service/data/administration/apps/worklight/getSettings HTTP/1.1" 200 1407
- - [17/Jan/2018:21:34:25 -0500] "POST /MyProject/apps/services/api/MYMobileApp/iphone/login HTTP/1.1" 504 315
- - [17/Jan/2018:21:34:25 -0500] "POST /MyProject/apps/services/my_custom_auth_request_url HTTP/1.1" 504 315
- - [17/Jan/2018:21:34:38 -0500] "POST /MyProject/apps/services/api/MYMobileApp/iphone/login HTTP/1.1" 504 315
- - [17/Jan/2018:21:34:38 -0500] "POST /MyProject/apps/services/my_custom_auth_request_url HTTP/1.1" 504 315
- - [17/Jan/2018:21:34:53 -0500] "POST /MyProject/apps/services/my_custom_auth_request_url HTTP/1.1" 504 315
- - [17/Jan/2018:21:34:53 -0500] "POST /MyProject/apps/services/api/MYMobileApp/iphone/login HTTP/1.1" 504 315
- - [17/Jan/2018:21:34:56 -0500] "GET /MyProject/authorization/v1/authorization?response_type=code&client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&redirect_uri=http%3A%2F%2Fmfpredirecturi&scope=MYRealm&isAjaxRequest=true&x=0.1482186844277551 HTTP/1.1" 504 315
- - [17/Jan/2018:21:40:04 -0500] "GET /MyProject/authorization/v1/authorization?client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&scope=-MYRealm&isAjaxRequest=true&x=0.5411687142084214 HTTP/1.1" 200 -
- - [17/Jan/2018:21:40:04 -0500] "GET /MyProject/adapters/SecurityAdapter/security/login HTTP/1.1" 401 41
- - [17/Jan/2018:21:40:06 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:40:06 -0500] "GET /analytics-service/data/administration/apps/worklight/getSettings HTTP/1.1" 200 1407
- - [17/Jan/2018:21:35:12 -0500] "POST /MyProject/apps/services/api/MYMobileApp/iphone/login HTTP/1.1" 504 315
- - [17/Jan/2018:21:35:24 -0500] "POST /MyProject/apps/services/my_custom_auth_request_url HTTP/1.1" 504 315
- - [17/Jan/2018:21:40:33 -0500] "GET /MyProject/adapters/AnnouncementsAdapter/announcements/fetchannouncements HTTP/1.1" 401 41
- - [17/Jan/2018:21:40:34 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:40:40 -0500] "GET /MyProject/adapters/AnnouncementsAdapter/announcements/fetchannouncements HTTP/1.1" 401 41
- - [17/Jan/2018:21:40:40 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
- - [17/Jan/2018:21:40:44 -0500] "GET /MyProject/authorization/v1/authorization?client_id=4bd3c60d412b36d16f4da069658c0c7fa226cad1&scope=-MYRealm&isAjaxRequest=true&x=0.9602466115384183 HTTP/1.1" 200 -
- - [17/Jan/2018:21:40:45 -0500] "GET /MyProject/adapters/SecurityAdapter/security/login HTTP/1.1" 401 41
- - [17/Jan/2018:21:40:46 -0500] "POST /analytics-service/data HTTP/1.1" 201 -
I am trying to connect SSL site https://link.bollore-logistics.com by using Java 6 and HTMLUnit, I have added more supported Ciphers by using Bouncy Castle. But still, I am receiving handshake failure. I cannot upgrade Java version due to production limitation. Please kindly help
Code of configuration:
HttpsURLConnection.setDefaultHostnameVerifier(new HostnameVerifier() {
public boolean verify(String hostname, SSLSession session) {
return true;
}
});
if (Security.getProvider("BC") == null){
logger.info("Bouncy Castle provider is NOT available");
}
else{
logger.info("Bouncy Castle provider is available");
}
Provider provider = new BouncyCastleProvider();
Security.addProvider(provider);
SSLContext context = SSLContext.getInstance("SSL");
context.init(null, new X509TrustManager[]{new X509TrustManager() {
#Override
public void checkClientTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
}
#Override
public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {
}
#Override
public X509Certificate[] getAcceptedIssuers() {
return null;
}
}}, new SecureRandom());
String[] scs = context.getSocketFactory().getSupportedCipherSuites();
Arrays.sort(scs);
for(String s : scs) {
System.out.println(s);
}
HttpsURLConnection.setDefaultSSLSocketFactory(context.getSocketFactory());
// Create all-trusting host name verifier
HostnameVerifier allHostsValid = new HostnameVerifier() {
public boolean verify(String hostname, SSLSession session) {
return true;
}
};
HttpsURLConnection.setDefaultHostnameVerifier(allHostsValid);
Code to make connection (HTMLUnit):
WebClient webClient = new WebClient(BrowserVersion.CHROME);
webClient.getOptions().setUseInsecureSSL(true);
webClient.getOptions().setRedirectEnabled(true);
webClient.getOptions().setThrowExceptionOnScriptError(false);
webClient.getOptions().setCssEnabled(false);
webClient.getOptions().setJavaScriptEnabled(true);
webClient.getPage(url);
Here is the error log:
2017-12-06 11:27:40 DEBUG WebClient:325 - Get page for window named '', using WebRequest[<url="http://link.bollore-logistics.com/Contact/SmartSearch/77707575", GET, EncodingType[name=application/x-www-form-urlencoded], [], {Accept-Encoding=gzip, deflate, Accept=*/*}, null>]
2017-12-06 11:27:40 DEBUG WebClient:1259 - Load response for GET http://link.bollore-logistics.com/Contact/SmartSearch/77707575
trigger seeding of SecureRandom
done seeding SecureRandom
2017-12-06 11:27:40 DEBUG RequestAddCookies:122 - CookieSpec selected: mine
2017-12-06 11:27:40 DEBUG RequestAuthCache:76 - Auth cache not set in the context
2017-12-06 11:27:40 DEBUG PoolingHttpClientConnectionManager:249 - Connection request: [route: {}->http://link.bollore-logistics.com:80][total kept alive: 0; route allocated: 0 of 6; total allocated: 0 of 20]
2017-12-06 11:27:40 DEBUG PoolingHttpClientConnectionManager:282 - Connection leased: [id: 0][route: {}->http://link.bollore-logistics.com:80][total kept alive: 0; route allocated: 1 of 6; total allocated: 1 of 20]
2017-12-06 11:27:40 DEBUG MainClientExec:234 - Opening connection {}->http://link.bollore-logistics.com:80
2017-12-06 11:27:40 DEBUG DefaultHttpClientConnectionOperator:131 - Connecting to link.bollore-logistics.com/195.101.158.66:80
2017-12-06 11:27:40 DEBUG DefaultHttpClientConnectionOperator:138 - Connection established 192.168.171.168:52556<->195.101.158.66:80
2017-12-06 11:27:40 DEBUG MainClientExec:255 - Executing request GET /Contact/SmartSearch/77707575 HTTP/1.1
2017-12-06 11:27:40 DEBUG MainClientExec:260 - Target auth state: UNCHALLENGED
2017-12-06 11:27:40 DEBUG MainClientExec:266 - Proxy auth state: UNCHALLENGED
2017-12-06 11:27:40 DEBUG headers:124 - http-outgoing-0 >> GET /Contact/SmartSearch/77707575 HTTP/1.1
2017-12-06 11:27:40 DEBUG headers:127 - http-outgoing-0 >> Host: link.bollore-logistics.com
2017-12-06 11:27:40 DEBUG headers:127 - http-outgoing-0 >> User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
2017-12-06 11:27:40 DEBUG headers:127 - http-outgoing-0 >> Accept-Language: en-US
2017-12-06 11:27:40 DEBUG headers:127 - http-outgoing-0 >> Accept-Encoding: gzip, deflate
2017-12-06 11:27:40 DEBUG headers:127 - http-outgoing-0 >> Accept: */*
2017-12-06 11:27:40 DEBUG headers:127 - http-outgoing-0 >> Connection: Keep-Alive
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "GET /Contact/SmartSearch/77707575 HTTP/1.1[\r][\n]"
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "Host: link.bollore-logistics.com[\r][\n]"
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36[\r][\n]"
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "Accept-Language: en-US[\r][\n]"
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "Accept-Encoding: gzip, deflate[\r][\n]"
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "Accept: */*[\r][\n]"
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "Connection: Keep-Alive[\r][\n]"
2017-12-06 11:27:40 DEBUG wire:72 - http-outgoing-0 >> "[\r][\n]"
2017-12-06 11:27:41 DEBUG wire:72 - http-outgoing-0 << "HTTP/1.0 302 Found[\r][\n]"
2017-12-06 11:27:41 DEBUG wire:72 - http-outgoing-0 << "Location: https://link.bollore-logistics.com/Contact/SmartSearch/77707575[\r][\n]"
2017-12-06 11:27:41 DEBUG wire:72 - http-outgoing-0 << "Server: BigIP[\r][\n]"
2017-12-06 11:27:41 DEBUG wire:72 - http-outgoing-0 << "Connection: Keep-Alive[\r][\n]"
2017-12-06 11:27:41 DEBUG wire:72 - http-outgoing-0 << "Content-Length: 0[\r][\n]"
2017-12-06 11:27:41 DEBUG wire:72 - http-outgoing-0 << "[\r][\n]"
2017-12-06 11:27:41 DEBUG headers:113 - http-outgoing-0 << HTTP/1.0 302 Found
2017-12-06 11:27:41 DEBUG headers:116 - http-outgoing-0 << Location: https://link.bollore-logistics.com/Contact/SmartSearch/77707575
2017-12-06 11:27:41 DEBUG headers:116 - http-outgoing-0 << Server: BigIP
2017-12-06 11:27:41 DEBUG headers:116 - http-outgoing-0 << Connection: Keep-Alive
2017-12-06 11:27:41 DEBUG headers:116 - http-outgoing-0 << Content-Length: 0
2017-12-06 11:27:41 DEBUG MainClientExec:284 - Connection can be kept alive indefinitely
2017-12-06 11:27:41 DEBUG PoolingHttpClientConnectionManager:314 - Connection [id: 0][route: {}->http://link.bollore-logistics.com:80] can be kept alive indefinitely
2017-12-06 11:27:41 DEBUG PoolingHttpClientConnectionManager:320 - Connection released: [id: 0][route: {}->http://link.bollore-logistics.com:80][total kept alive: 1; route allocated: 1 of 6; total allocated: 1 of 20]
2017-12-06 11:27:41 DEBUG WebClient:1349 - Got a redirect status code [302] new location = [https://link.bollore-logistics.com/Contact/SmartSearch/77707575]
2017-12-06 11:27:41 DEBUG WebClient:1259 - Load response for GET https://link.bollore-logistics.com/Contact/SmartSearch/77707575
2017-12-06 11:27:41 DEBUG RequestAddCookies:122 - CookieSpec selected: mine
2017-12-06 11:27:41 DEBUG RequestAuthCache:76 - Auth cache not set in the context
2017-12-06 11:27:41 DEBUG PoolingHttpClientConnectionManager:249 - Connection request: [route: {s}->https://link.bollore-logistics.com:443][total kept alive: 1; route allocated: 0 of 6; total allocated: 1 of 20]
2017-12-06 11:27:41 DEBUG PoolingHttpClientConnectionManager:282 - Connection leased: [id: 1][route: {s}->https://link.bollore-logistics.com:443][total kept alive: 1; route allocated: 1 of 6; total allocated: 2 of 20]
2017-12-06 11:27:41 DEBUG MainClientExec:234 - Opening connection {s}->https://link.bollore-logistics.com:443
2017-12-06 11:27:41 DEBUG DefaultHttpClientConnectionOperator:131 - Connecting to link.bollore-logistics.com/195.101.158.66:443
2017-12-06 11:27:41 DEBUG HtmlUnitSSLConnectionSocketFactory:335 - Connecting socket to link.bollore-logistics.com/195.101.158.66:443 with timeout 90000
2017-12-06 11:27:41 DEBUG HtmlUnitSSLConnectionSocketFactory:388 - Enabled protocols: [TLSv1]
2017-12-06 11:27:41 DEBUG HtmlUnitSSLConnectionSocketFactory:389 - Enabled cipher suites:[SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
2017-12-06 11:27:41 DEBUG HtmlUnitSSLConnectionSocketFactory:393 - Starting handshake
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1512530605 bytes = { 147, 117, 177, 152, 172, 87, 109, 103, 219, 130, 24, 140, 216, 108, 154, 3, 162, 211, 205, 89, 29, 221, 91, 103, 85, 39, 206, 187 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
***
[write] MD5 and SHA1 hashes: len = 161
0000: 01 00 00 9D 03 01 5A 27 63 AD 93 75 B1 98 AC 57 ......Z'c..u...W
0010: 6D 67 DB 82 18 8C D8 6C 9A 03 A2 D3 CD 59 1D DD mg.....l.....Y..
0020: 5B 67 55 27 CE BB 00 00 36 00 04 00 05 00 2F C0 [gU'....6...../.
0030: 02 C0 04 C0 0C C0 0E C0 07 C0 09 C0 11 C0 13 00 ................
0040: 33 00 32 00 0A C0 03 C0 0D C0 08 C0 12 00 16 00 3.2.............
0050: 13 00 09 00 15 00 12 00 03 00 08 00 14 00 11 01 ................
0060: 00 00 3E 00 0A 00 34 00 32 00 17 00 01 00 03 00 ..>...4.2.......
0070: 13 00 15 00 06 00 07 00 09 00 0A 00 18 00 0B 00 ................
0080: 0C 00 19 00 0D 00 0E 00 0F 00 10 00 11 00 02 00 ................
0090: 12 00 04 00 05 00 14 00 08 00 16 00 0B 00 02 01 ................
00A0: 00 .
http-bio-8080-exec-3, WRITE: TLSv1 Handshake, length = 161
[Raw write]: length = 166
0000: 16 03 01 00 A1 01 00 00 9D 03 01 5A 27 63 AD 93 ...........Z'c..
0010: 75 B1 98 AC 57 6D 67 DB 82 18 8C D8 6C 9A 03 A2 u...Wmg.....l...
0020: D3 CD 59 1D DD 5B 67 55 27 CE BB 00 00 36 00 04 ..Y..[gU'....6..
0030: 00 05 00 2F C0 02 C0 04 C0 0C C0 0E C0 07 C0 09 .../............
0040: C0 11 C0 13 00 33 00 32 00 0A C0 03 C0 0D C0 08 .....3.2........
0050: C0 12 00 16 00 13 00 09 00 15 00 12 00 03 00 08 ................
0060: 00 14 00 11 01 00 00 3E 00 0A 00 34 00 32 00 17 .......>...4.2..
0070: 00 01 00 03 00 13 00 15 00 06 00 07 00 09 00 0A ................
0080: 00 18 00 0B 00 0C 00 19 00 0D 00 0E 00 0F 00 10 ................
0090: 00 11 00 02 00 12 00 04 00 05 00 14 00 08 00 16 ................
00A0: 00 0B 00 02 01 00 ......
[Raw read]: length = 5
0000: 15 03 01 00 02 .....
[Raw read]: length = 2
0000: 02 28 .(
http-bio-8080-exec-3, READ: TLSv1 Alert, length = 2
http-bio-8080-exec-3, RECV TLSv1 ALERT: fatal, handshake_failure
http-bio-8080-exec-3, called closeSocket()
http-bio-8080-exec-3, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
2017-12-06 11:27:41 DEBUG DefaultManagedHttpClientConnection:87 - http-outgoing-1: Shutdown connection
2017-12-06 11:27:41 DEBUG MainClientExec:128 - Connection discarded
2017-12-06 11:27:41 DEBUG DefaultManagedHttpClientConnection:79 - http-outgoing-1: Close connection
2017-12-06 11:27:41 DEBUG PoolingHttpClientConnectionManager:320 - Connection released: [id: 1][route: {s}->https://link.bollore-logistics.com:443][total kept alive: 1; route allocated: 0 of 6; total allocated: 1 of 20]
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:174)
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:136)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:1694)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:939)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1120)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1147)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1131)
at org.apache.http.conn.ssl.SSLConnectionSocketFactory.createLayeredSocket(SSLConnectionSocketFactory.java:394)
at org.apache.http.conn.ssl.SSLConnectionSocketFactory.connectSocket(SSLConnectionSocketFactory.java:353)
at com.gargoylesoftware.htmlunit.HtmlUnitSSLConnectionSocketFactory.connectSocket(HtmlUnitSSLConnectionSocketFactory.java:155)
at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:134)
at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:353)
at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:380)
at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:236)
at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:184)
at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:88)
at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:184)
at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:71)
at com.gargoylesoftware.htmlunit.HttpWebConnection.getResponse(HttpWebConnection.java:178)
at com.gargoylesoftware.htmlunit.WebClient.loadWebResponseFromWebConnection(WebClient.java:1313)
at com.gargoylesoftware.htmlunit.WebClient.loadWebResponseFromWebConnection(WebClient.java:1371)
at com.gargoylesoftware.htmlunit.WebClient.loadWebResponse(WebClient.java:1230)
at com.gargoylesoftware.htmlunit.WebClient.getPage(WebClient.java:338)
at com.gargoylesoftware.htmlunit.WebClient.getPage(WebClient.java:407)
at com.gargoylesoftware.htmlunit.WebClient.getPage(WebClient.java:392)
at com.grabber.Grabber.accessWebpage(Grabber.java:204)
at com.grabber.Grabber.doGet(Grabber.java:53)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:624)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:218)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:506)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1087)
at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
at org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:316)
at java.util.concurrent.ThreadPoolExecutor$Worker.runTask(ThreadPoolExecutor.java:886)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:908)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.lang.Thread.run(Thread.java:619)
I had a similar problem (but not using HtmlUnit in that case. I used a directly a org.apache.http.impl.client.CloseableHttpClient).
It seams there is something wrong with the handshake until java 7 (no problem anymore in java 8). If you try to access a server providing "TLSv1.2" you might get the error reported by you.
If security is not that much of an issue in your case, you can try the to force usage of TLSv1.1 (as long as you have not yet switched to java 8).
This shoud be possible this way:
WebClientOptions webClientOptions= new WebClientOptions();
webClientOptions.setSSLClientProtocols(new String[]{"TLSv1.1"});
SSLConnectionSocketFactory.buildSSLSocketFactory(webClientOptions);
Assuming Sun/Oracle Java 6, since you didn't say IBM (which implements crypto differently):
Your problem is not ciphers (which BC-provider could fix only if the problem was lack of ECC ciphers), nor protocols. https://www.ssllabs.com/ssltest/analyze.html?d=link.bollore-logistics.com shows that server accepts ciphers and protocols that Java 6 could do without any augmentation.
Your problem is SNI (Server Name Indication). The ssllabs report shows that the only simulated clients that fail are the ones that don't send SNI (Android 2, Windows XP, Java 6) and a simple test with openssl confirms the server requires SNI. Java 6 JSSE did not implement SNI.
It might work to use the BC version of JSSE -- this is a separate jar bctls-jdk15on-$ver not bcprov-jdk15on-$ver and providername BCJSSE not BC. In the most recent versions (1.57 and 1.58) according to the source it appears to me the client should do SNI by default, if you connect using a domainname (not IPaddress or local alias). However I can't verify because I can't get BCJSSE to instantiate at all due to some problem with SecureRandom that I don't have time now to track down.
friends!
I have a problem with compiling modules for prebuilt kernel.
The problem is - compiled modules fails with Oops near "fill_super" function.
compile modules - OK
insmod modules - OK
Try to mount filesystem (ntfs/ext2/ext3/ext4) - got Oops :(
Sample trace here
Unable to handle kernel NULL pointer dereference at virtual address 00000008
pgd = c39e8000
[00000008] *pgd=83a72831, *pte=00000000, *ppte=00000000
Internal error: Oops: 17 [#2]
Modules linked in: ntfs ext3 jbd crc16 scsi_wait_scan hi3520D_adec(P) hi3520D_aenc(P) hi3520D_ao(P) hi3520D_ai(P) hi3520D_sio(P) hiwdt hi_ir hi_rtc fvideo gpioi2c hi3520D_hdmi(P) hi3520D_vfmw(P) hi3520D_vdec(P) hifb(P) vcmp(P) hi3520D_region(P) hi3520D_vpss(P) hi3520D_vou(P) hi3520D_viu(P) hi3520D_rc(P) hi3520D_h264e(P) hi3520D_chnl(P) hi3520D_group(P) hi3520D_venc(P) hi3520D_dsu(P) hi3520D_tde(P) hi3520D_sys(P) hi3520D_base(P) hiuser mmz
CPU: 0 Tainted: P D (3.0.8 #6)
PC is at __find_get_block_slow+0x10/0x13c
LR is at __find_get_block+0xec/0x500
pc : [<c00bb3a8>] lr : [<c00bb934>] psr: 68000013
sp : c39b5ca4 ip : c39b5cd4 fp : c39b5cd0
r10: 00000100 r9 : c39d3000 r8 : c39d3000
r7 : 00000000 r6 : 00000400 r5 : c03d2830 r4 : c53acb00
r3 : 00000100 r2 : 00000400 r1 : 00000000 r0 : 00000000
Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
Control: 10c53c7d Table: 839e8059 DAC: 00000015
PC: 0xc00bb328:
b328 e1a0c00d e92dd800 e24cb004 e5903000 e3130a02 13a00001 189da800 e30a0f14
b348 e34c0030 ebfde5bb e2700001 33a00000 e89da800 e1a0c00d e92dd810 e24cb004
b368 e24dd024 e1a04000 e24b1034 e5900020 eb009372 e1c421d0 e1a01000 e30309a8
b388 e34c0038 eb0924df e24bd010 e89da810 e1a0c00d e92ddbf0 e24cb004 e24dd008
b3a8 e5905008 e1a09003 e1a08002 e595e064 e59500b0 e26e400c e2641020 e1a0c432
b3c8 e18c2113 e2543020 41a01002 51a01339 ebfec239 e2504000 01a06004 0a000018
b3e8 e5940000 e3100b02 0a000012 e5946000 e3160b02 0a000030 e594700c e3a01001
b408 e1a06007 e5963000 e2132020 01a01002 0a000003 e1c621d0 e1530009 01520008
LR: 0xc00bb8b4:
b8b4 0a0000ae e5951014 e3510000 0a000002 e591c020 e150000c 0a0000b2 e5951018
b8d4 e3510000 0a000002 e591c020 e150000c 0a0000b6 e595101c e3510000 0a000002
b8f4 e591c020 e150000c 0a0000ba e5951020 e3510000 0a000002 e591c020 e150000c
b914 0a00008c e5951024 e3510000 0a000002 e5914020 e1500004 0a0000b8 ebfffe98
b934 e2504000 0a000076 e10f2000 e3120080 1a0000fa e5951008 e3023830 e34c303d
b954 e1540001 0a00006c e284e038 e19ecf9f e28cc001 e18e1f9c e3310000 1afffffa
b974 e593c008 e50b403c e154000c 150bc038 13a06002 0a0000da e595300c e1540003
b994 0a0000d4 e24b001c e0802106 e2866001 e5023020 e5953010 e1540003 0a0000dc
SP: 0xc39b5c24:
5c24 c39b5c40 c39b5c34 c00485ec c39b5cb8 c39b4000 ffffffff c39b5c8c 00000400
5c44 00000000 c39b5cd0 c39b5c58 c0024d8c c0024250 00000000 00000000 00000400
5c64 00000100 c53acb00 c03d2830 00000400 00000000 c39d3000 c39d3000 00000100
5c84 c39b5cd0 c39b5cd4 c39b5ca4 c00bb934 c00bb3a8 68000013 ffffffff 00000002
5ca4 c39b5e47 0000000a c53acb00 c03d2830 00000400 00000000 c39d3000 c39d3000
5cc4 c39b5d10 c39b5cd4 c00bb934 c00bb3a4 0000000a 0000ffff c39b5e64 0000ffff
5ce4 c39b5d90 c39b5cf4 c01909c0 c01903ac c53acb00 00000000 00000400 00000000
5d04 c39b5d78 c39b5d14 c00bbd70 c00bb854 00000000 00000000 c5c03c40 c39ed000
IP: 0xc39b5c54:
5c54 c0024250 00000000 00000000 00000400 00000100 c53acb00 c03d2830 00000400
5c74 00000000 c39d3000 c39d3000 00000100 c39b5cd0 c39b5cd4 c39b5ca4 c00bb934
5c94 c00bb3a8 68000013 ffffffff 00000002 c39b5e47 0000000a c53acb00 c03d2830
5cb4 00000400 00000000 c39d3000 c39d3000 c39b5d10 c39b5cd4 c00bb934 c00bb3a4
5cd4 0000000a 0000ffff c39b5e64 0000ffff c39b5d90 c39b5cf4 c01909c0 c01903ac
5cf4 c53acb00 00000000 00000400 00000000 c39b5d78 c39b5d14 c00bbd70 c00bb854
5d14 00000000 00000000 c5c03c40 c39ed000 00000400 00000000 c00c3264 c006d8d8
5d34 c39b5d50 c39b5d44 0000000a c5c03c40 c39b5d70 c39b5d54 c00c3f9c c53acb00
FP: 0xc39b5c50:
5c50 c0024d8c c0024250 00000000 00000000 00000400 00000100 c53acb00 c03d2830
5c70 00000400 00000000 c39d3000 c39d3000 00000100 c39b5cd0 c39b5cd4 c39b5ca4
5c90 c00bb934 c00bb3a8 68000013 ffffffff 00000002 c39b5e47 0000000a c53acb00
5cb0 c03d2830 00000400 00000000 c39d3000 c39d3000 c39b5d10 c39b5cd4 c00bb934
5cd0 c00bb3a4 0000000a 0000ffff c39b5e64 0000ffff c39b5d90 c39b5cf4 c01909c0
5cf0 c01903ac c53acb00 00000000 00000400 00000000 c39b5d78 c39b5d14 c00bbd70
5d10 c00bb854 00000000 00000000 c5c03c40 c39ed000 00000400 00000000 c00c3264
5d30 c006d8d8 c39b5d50 c39b5d44 0000000a c5c03c40 c39b5d70 c39b5d54 c00c3f9c
R4: 0xc53aca80:
ca80 c04b0b60 c04b0b80 c04b0ba0 c04b0bc0 c04b0be0 c04b0c00 c04b0c20 c04b0c40
caa0 c04b0c60 c04b0c80 c04b0ca0 c04b0cc0 c04b0ce0 c04b0d00 c04b0d20 c04b0d40
cac0 c04b0d60 c04b0d80 c04b0da0 c04b0dc0 00000000 00000000 00000000 00000000
cae0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
cb00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
cb20 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
cb40 00000001 00000000 00000000 00000000 00000000 00000000 00000000 00000000
cb60 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
R5: 0xc03d27b0:
27b0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
27d0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
27f0 00000000 00000000 00000000 00000000 00000001 00000000 00000001 c03a31a8
2810 00000023 00000032 00000012 00000000 c6180780 c5c02280 c6180780 c5c02280
2830 000013b9 000006fa 00000000 00000000 00000000 00000000 00000000 00000000
2850 00000000 00000000 00000001 c03d285c c03d285c 00000200 c03d2868 c03d2868
2870 c00c0978 c5cad214 c5c03214 c0383894 00000000 c00c2fd0 c00972c0 00000000
2890 c03d2a88 c6003490 c6003490 c03d289c c03d289c c612ff80 c612ff80 c00c905c
R8: 0xc39d2f80:
2f80 746f6e2e 6e672e65 75622e75 2d646c69 ff006469 ffffffff ffffffff ffffffff
2fa0 6d79732e 00626174 ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
2fc0 7274732e 00626174 ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
2fe0 74636573 736e6f69 ffffff00 ffffffff ffffffff ffffffff ffffffff ffffffff
3000 00000000 00000000 00000000 00000061 0000e0a5 00000003 00c1c540 00c1d540
3020 00c1c540 00c1c540 00c1c540 00c1c540 000b0850 00c1c4e4 0004f8b8 0004f8b0
3040 0004f884 0004f87c 00000000 00000000 00000000 00000000 00000002 00000000
3060 00000000 00000000 00000000 00001009 65646f6e 79730976 0a736673 65646f6e
R9: 0xc39d2f80:
2f80 746f6e2e 6e672e65 75622e75 2d646c69 ff006469 ffffffff ffffffff ffffffff
2fa0 6d79732e 00626174 ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
2fc0 7274732e 00626174 ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
2fe0 74636573 736e6f69 ffffff00 ffffffff ffffffff ffffffff ffffffff ffffffff
3000 00000000 00000000 00000000 00000061 0000e0a5 00000003 00c1c540 00c1d540
3020 00c1c540 00c1c540 00c1c540 00c1c540 000b0850 00c1c4e4 0004f8b8 0004f8b0
3040 0004f884 0004f87c 00000000 00000000 00000000 00000000 00000002 00000000
3060 00000000 00000000 00000000 00001009 65646f6e 79730976 0a736673 65646f6e
Process mount (pid: 790, stack limit = 0xc39b4268)
Stack: (0xc39b5ca4 to 0xc39b6000)
5ca0: c39b5e47 0000000a c53acb00 c03d2830 00000400 00000000 c39d3000
5cc0: c39d3000 c39b5d10 c39b5cd4 c00bb934 c00bb3a4 0000000a 0000ffff c39b5e64
5ce0: 0000ffff c39b5d90 c39b5cf4 c01909c0 c01903ac c53acb00 00000000 00000400
5d00: 00000000 c39b5d78 c39b5d14 c00bbd70 c00bb854 00000000 00000000 c5c03c40
5d20: c39ed000 00000400 00000000 c00c3264 c006d8d8 c39b5d50 c39b5d44 0000000a
5d40: c5c03c40 c39b5d70 c39b5d54 c00c3f9c c53acb00 c39ed000 00000400 00000000
5d60: c39d3000 c39d3000 00000001 c39b5d98 c39b5d7c c00bfd60 c00bbd54 00000000
5d80: c39b5d8c c00c403c c53acb00 c39b5e40 c39b5d9c bf3ee6c8 c00bfd50 00000000
5da0: c39b5db4 bf3f5a10 00000001 c0318714 c39b5e44 ff0a0210 ffffffff c39b5e20
5dc0: c39b5e44 00000002 c534cc00 c534cc0c c39ed000 c39d3000 c39d3000 c39b5e00
5de0: c39b5dec c019322c 00000001 c0096838 c39b5e08 c39b5e30 c39b5e0c c00e0120
5e00: c0193218 c03853cc c39ed14c c39d3000 00000000 00000000 c5c03c40 00000083
5e20: c5c03ca4 00008000 c39ed000 c39d3000 c39d3000 c39b5e88 c39b5e44 c0097a80
5e40: bf3ee5e8 32616473 c39b5e00 c0091ccc c39cd250 00000000 c39b5e84 c39b5e68
5e60: c0092a78 c39cd1e0 bf3f5a10 bf3f5a10 00008000 c39d3000 c39b5f38 c39b5e9c
5e80: c39b5e8c bf3eca7c c009792c bf3ee5dc c39b5ecc c39b5ea0 c0096888 bf3eca68
5ea0: c00aea60 c007cde0 bf3f5a10 c39cd1e0 bf3f5a10 c39ff9e0 c39d3000 c39d3000
5ec0: c39b5ef4 c39b5ed0 c00b02f8 c0096878 c39d3000 bf3f5a10 c39ffaa0 c39d3000
5ee0: c39ff9e0 00008000 c39b5f1c c39b5ef8 c00b038c c00b02ac c39d3000 00000000
5f00: c39ff9e0 00000020 c39ffaa0 00008000 c39b5f6c c39b5f20 c00b057c c00b035c
5f20: c39b4000 00008000 c39b5f44 c39b5f38 c0074058 c00739d0 c6180780 c5cbf800
5f40: c00af2c8 c56bf000 befd6f59 00000000 00008000 c0025324 c39b4000 00000000
5f60: c39b5fa4 c39b5f70 c00b0b98 c00b0430 c39d3000 00000000 fe300100 c39d3000
5f80: c39ff9e0 c39ffaa0 00c1c4d0 00c1c4d0 befd6f59 00000015 00000000 c39b5fa8
5fa0: c00251a0 c00b0b18 00c1c4d0 00c1c4d0 befd6f59 befd6f63 00c1d750 00008000
5fc0: 00c1c4d0 00c1c4d0 befd6f59 00000015 befd6f63 00c1c4e0 00c1d750 0006bcc8
5fe0: 00c1c498 befd6af4 00020618 000425e0 60000010 befd6f59 00000000 00000000
Backtrace:
[<c00bb398>] (__find_get_block_slow+0x0/0x13c) from [<c00bb934>] (__find_get_block+0xec/0x500)
r9:c39d3000 r8:c39d3000 r7:00000000 r6:00000400 r5:c03d2830
r4:c53acb00
[<c00bb848>] (__find_get_block+0x0/0x500) from [<c00bbd70>] (__getblk+0x28/0x2fc)
r7:00000000 r6:00000400 r5:00000000 r4:c53acb00
[<c00bbd48>] (__getblk+0x0/0x2fc) from [<c00bfd60>] (__bread+0x1c/0xdc)
[<c00bfd44>] (__bread+0x0/0xdc) from [<bf3ee6c8>] (ext3_fill_super+0xec/0x1734 [ext3])
r4:c53acb00
[<bf3ee5dc>] (ext3_fill_super+0x0/0x1734 [ext3]) from [<c0097a80>] (mount_bdev+0x160/0x18c)
[<c0097920>] (mount_bdev+0x0/0x18c) from [<bf3eca7c>] (ext3_mount+0x20/0x24 [ext3])
[<bf3eca5c>] (ext3_mount+0x0/0x24 [ext3]) from [<c0096888>] (mount_fs+0x1c/0xe0)
[<c009686c>] (mount_fs+0x0/0xe0) from [<c00b02f8>] (vfs_kern_mount+0x58/0x90)
r9:c39d3000 r8:c39d3000 r6:c39ff9e0 r5:bf3f5a10 r4:c39cd1e0
[<c00b02a0>] (vfs_kern_mount+0x0/0x90) from [<c00b038c>] (do_kern_mount+0x3c/0xd4)
r8:00008000 r7:c39ff9e0 r6:c39d3000 r5:c39ffaa0 r4:bf3f5a10
r3:c39d3000
[<c00b0350>] (do_kern_mount+0x0/0xd4) from [<c00b057c>] (do_mount+0x158/0x6e8)
r8:00008000 r7:c39ffaa0 r6:00000020 r5:c39ff9e0 r4:00000000
r3:c39d3000
[<c00b0424>] (do_mount+0x0/0x6e8) from [<c00b0b98>] (sys_mount+0x8c/0xcc)
[<c00b0b0c>] (sys_mount+0x0/0xcc) from [<c00251a0>] (ret_fast_syscall+0x0/0x30)
r7:00000015 r6:befd6f59 r5:00c1c4d0 r4:00c1c4d0
Code: e1a0c00d e92ddbf0 e24cb004 e24dd008 (e5905008)
---[ end trace b62a4323b2714208 ]---
Any ideas?