# # dump.sh killall: netdump: no process killed listening on port 7000 listening on port 7002 listening on port 7004 listening on port 7007 listening on port 7001 listening on port 7005 listening on port 7008 listening on port 7003 listening on port 7009 listening on port 7011 listening on port 7006 listening on port 7012 listening on port 7010 # listening on port 7013 listening on port 7015 listening on port 7014 got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client hwts fsl-gianfar ff724000.ethernet: DMA-API: device driver frees DMA memory with wrong function [device address=0x000000001e93d750] [size=1448 bytes] [mapped as page] [unmapped as single] ------------[ cut here ]------------ WARNING: at lib/dma-debug.c:1116 Modules linked in: CPU: 1 PID: 1573 Comm: hwts Tainted: G W 4.4.235 #13 task: df9dbe80 ti: de8aa000 task.ti: de8aa000 NIP: c030f5c0 LR: c030f5c0 CTR: c0367c44 REGS: de8abc20 TRAP: 0700 Tainted: G W (4.4.235) MSR: 00021000 CR: 28002822 XER: 20000000 GPR00: c030f5c0 de8abcd0 df9dbe80 000000b6 dffd12f0 dffd2e0c 1f85f000 de8aa000 GPR08: 00000007 c0772d4c 1f85f000 00000214 42002844 100192ac 00000000 00000000 GPR16: 00000000 dd9fc43c 00000002 dd9fc420 00000000 dc309c00 00000000 dd9fc000 GPR24: 00029000 c07a8314 c07fa1e8 c07b0000 c07d9ec0 de8abd28 c0808e20 d9f04ae0 NIP [c030f5c0] check_unmap+0x948/0xa90 LR [c030f5c0] check_unmap+0x948/0xa90 Call Trace: [de8abcd0] [c030f5c0] check_unmap+0x948/0xa90 (unreliable) [de8abd20] [c030f7a4] debug_dma_unmap_page+0x9c/0xb0 [de8abda0] [c03eeb70] free_skb_resources+0xf4/0x3e4 [de8abdf0] [c03f354c] reset_gfar+0x68/0x9c [de8abe00] [c03f378c] gfar_ioctl+0x20c/0x210 [de8abe30] [c04a2d14] dev_ifsioc+0x308/0x31c [de8abe60] [c04a2f94] dev_ioctl+0x1c0/0x624 [de8abec0] [c014b4d0] do_vfs_ioctl+0x38c/0x6b4 [de8abf20] [c014b844] SyS_ioctl+0x4c/0x80 [de8abf40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xff40194 LR = 0xffed0a8 Instruction dump: 554a103a 7c69402e 7cc9502e 811d001c 813d0020 815d0024 90610008 3c60c06b 90c1000c 3863b7a8 4cc63182 482c99b9 <0fe00000> 4bfffa60 3c80c06b 3884b0f8 ---[ end trace cf107938c5443943 ]--- Mapped at: [] gfar_start_xmit+0x888/0x9f0 [] dev_hard_start_xmit+0x27c/0x47c [] sch_direct_xmit+0xe4/0x278 [] __qdisc_run+0x94/0x1dc [] net_tx_action+0x1c0/0x2c0 driver changed our HWTSTAMP options tx_type got 1 wanted 1 rx_filter got 1 wanted 12 sending 0 sendto 319: 44; Success # hwts 32 driver changed our HWTSTAMP options tx_type got 1 wanted 1 rx_filter got 1 wanted 12 sending 0 sendto 319: 44; Success sending 1 sendto 319: 44; Success sending 2 sendto 319: 44; Success sending 3 sendto 319: 44; Success sending 4 sendto 319: 44; Success sending 5 sendto 319: 44; Success sending 6 sendto 319: 44; Success BUG: Bad page state in process swapper/0 pfn:1ecd8 BUG: Bad page state in process swapper/1 pfn:1ecd8 page:de517b00 count:0 mapcount:-127 mapping: (null) index:0x0 flags: 0x0() page dumped because: nonzero mapcount Modules linked in: CPU: 1 PID: 0 Comm: swapper/1 Tainted: G W 4.4.235 #13 Call Trace: [dffe3a90] [c05daf48] dump_stack+0x94/0xc0 (unreliable) [dffe3aa0] [c00f41cc] bad_page+0xcc/0x118 [dffe3ac0] [c00f442c] free_pages_prepare+0x214/0x310 [dffe3b00] [c00f6cdc] free_hot_cold_page+0x38/0x1a8 [dffe3b30] [c0477fe4] skb_shift+0x1fc/0x42c [dffe3b80] [c04d66e4] tcp_sacktag_walk+0x2c8/0x484 [dffe3be0] [c04d6c3c] tcp_sacktag_write_queue+0x39c/0x950 [dffe3c50] [c04d7ed0] tcp_ack+0x758/0x10a4 [dffe3cf0] [c04d8ed8] tcp_rcv_established+0x168/0x764 [dffe3d30] [c04e2818] tcp_v4_do_rcv+0x17c/0x264 [dffe3d50] [c04e57b4] tcp_v4_rcv+0xbf0/0xcc8 [dffe3da0] [c04bc914] ip_local_deliver+0x248/0x33c [dffe3dc0] [c04837e8] __netif_receive_skb_core+0x4e8/0x8e0 [dffe3e20] [c0486f54] netif_receive_skb_internal+0x5c/0xf0 [dffe3e50] [c0487b64] napi_gro_receive+0xd0/0x160 [dffe3e70] [c03f3b78] gfar_clean_rx_ring+0x3bc/0x744 [dffe3f00] [c03f4120] gfar_poll_rx_sq+0x48/0xb8 [dffe3f20] [c048754c] net_rx_action+0x1dc/0x330 [dffe3f80] [c004308c] __do_softirq+0xe8/0x35c [dffe3fe0] [c0043510] irq_exit+0xb8/0xdc [dffe3ff0] [c000f534] call_do_irq+0x24/0x3c [d9cf3e70] [c0005614] do_IRQ+0xac/0x14c [d9cf3ea0] [c00116d0] ret_from_except+0x0/0x18 --- interrupt: 501 at arch_cpu_idle+0x30/0x68 LR = arch_cpu_idle+0x30/0x68 [d9cf3f60] [c0095114] rcu_idle_enter+0xa8/0xac (unreliable) [d9cf3f70] [c008190c] cpu_startup_entry+0x204/0x2f8 [d9cf3fd0] [c00130a0] start_secondary+0x23c/0x240 [d9cf3ff0] [c00022dc] __secondary_start+0x7c/0xc8 Disabling lock debugging due to kernel taint page:de517b00 count:0 mapcount:0 mapping: (null) index:0x0 BUG: Unable to handle kernel data access at 0x3c393e44 Faulting instruction address: 0xc01320c4 Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=2 P2020 RDB Modules linked in: CPU: 1 PID: 1440 Comm: klogd Tainted: G B W 4.4.235 #13 task: d9e5d780 ti: dfb06000 task.ti: dfb06000 NIP: c01320c4 LR: c0132064 CTR: c0538434 REGS: dfb07bd0 TRAP: 0300 Tainted: G B W (4.4.235) MSR: 00029000 CR: 28002284 XER: 20000000 DEAR: 3c393e44 ESR: 00000000 GPR00: c0132064 dfb07c80 d9e5d780 c07d9d4c 024106c0 c047418c dffd61b0 dfb06000 GPR08: 1f85f000 00000000 c07d9d4c 00000004 28008248 100e227e 00000000 00000000 GPR16: 00000000 00000000 00000000 00000059 00000000 024000c0 dfb07db0 00000000 GPR24: 00000000 c00811f4 00005b8c c047418c 024106c0 00000120 d9c01b00 3c393e44 NIP [c01320c4] __kmalloc_track_caller+0x94/0x23c LR [c0132064] __kmalloc_track_caller+0x34/0x23c Call Trace: [dfb07c80] [c0132064] __kmalloc_track_caller+0x34/0x23c (unreliable) [dfb07ca0] [c04740ac] __kmalloc_reserve.isra.48+0x3c/0x9c [dfb07cc0] [c047418c] __alloc_skb+0x80/0x244 [dfb07cf0] [c04743a4] alloc_skb_with_frags+0x54/0x1d4 [dfb07d30] [c046cf88] sock_alloc_send_pskb+0x20c/0x230 [dfb07d90] [c0538588] unix_dgram_sendmsg+0x154/0x66c [dfb07e20] [c046829c] sock_sendmsg+0x2c/0x4c [dfb07e30] [c046a7f8] SyS_sendto+0xc8/0xfc [dfb07f10] [c046b3f8] SyS_socketcall+0x1b8/0x230 [dfb07f40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xfec3d30 LR = 0xfec3d0c Instruction dump: 7d0a402e 39290004 7f49402e 81270004 5529103a 7d0a482e 813e0000 7cc94214 7fe9402e 2f9f0000 419e008c 813e0014 <7d3f482e> 7c0000a6 7c000146 80c70004 ---[ end trace cf107938c5443944 ]--- BUG: Unable to handle kernel data access at 0x3c393e44 Faulting instruction address: 0xc01320c4 Oops: Kernel access of bad area, sig: 11 [#2] SMP NR_CPUS=2 P2020 RDB Modules linked in: CPU: 1 PID: 1 Comm: init Tainted: G B D W 4.4.235 #13 task: d9cd0000 ti: d9c8a000 task.ti: d9c8a000 NIP: c01320c4 LR: c0132064 CTR: c0538434 REGS: d9c8bbd0 TRAP: 0300 Tainted: G B D W (4.4.235) MSR: 00029000 CR: 24002444 XER: 20000000 DEAR: 3c393e44 ESR: 00000000 GPR00: c0132064 d9c8bc80 d9cd0000 c07d9d4c 024106c0 c047418c dffd61b0 d9c8a000 GPR08: 1f85f000 00000000 c07d9d4c 1f85f000 24008448 100e227e 00000000 00000000 GPR16: 00000000 00000000 00000000 00000059 00000000 024000c0 d9c8bdb0 00000000 GPR24: 00000000 c00811f4 00005b8c c047418c 024106c0 00000120 d9c01b00 3c393e44 NIP [c01320c4] __kmalloc_track_caller+0x94/0x23c LR [c0132064] __kmalloc_track_caller+0x34/0x23c Call Trace: [d9c8bc80] [c0132064] __kmalloc_track_caller+0x34/0x23c (unreliable) [d9c8bca0] [c04740ac] __kmalloc_reserve.isra.48+0x3c/0x9c [d9c8bcc0] [c047418c] __alloc_skb+0x80/0x244 [d9c8bcf0] [c04743a4] alloc_skb_with_frags+0x54/0x1d4 [d9c8bd30] [c046cf88] sock_alloc_send_pskb+0x20c/0x230 [d9c8bd90] [c0538588] unix_dgram_sendmsg+0x154/0x66c [d9c8be20] [c046829c] sock_sendmsg+0x2c/0x4c [d9c8be30] [c046a7f8] SyS_sendto+0xc8/0xfc [d9c8bf10] [c046b3f8] SyS_socketcall+0x1b8/0x230 [d9c8bf40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xfec3d30 LR = 0xfec3d0c Instruction dump: 7d0a402e 39290004 7f49402e 81270004 5529103a 7d0a482e 813e0000 7cc94214 7fe9402e 2f9f0000 419e008c 813e0014 <7d3f482e> 7c0000a6 7c000146 80c70004 ---[ end trace cf107938c5443945 ]--- BUG: Unable to handle kernel data access at 0x3c393e44 Faulting instruction address: 0xc01320c4 Oops: Kernel access of bad area, sig: 11 [#3] SMP NR_CPUS=2 P2020 RDB Modules linked in: CPU: 1 PID: 1 Comm: init Tainted: G B D W 4.4.235 #13 task: d9cd0000 ti: d9c8a000 task.ti: d9c8a000 NIP: c01320c4 LR: c0132064 CTR: c04b7cc0 REGS: d9c8b790 TRAP: 0300 Tainted: G B D W (4.4.235) MSR: 00029000 CR: 24004424 XER: 20000000 DEAR: 3c393e44 ESR: 00000000 GPR00: c0132064 d9c8b840 d9cd0000 c07d9d4c 02090220 c047418c dffd61b0 d9c8a000 GPR08: 1f85f000 00000000 c07d9d4c 1f85f000 44002422 100e227e c07e0000 db89eb30 GPR16: dffd1840 dffd1740 1f85f000 c07e0000 d9c8b9e8 c0772320 c07d90a4 00000000 GPR24: d9c8a000 c07d0000 00005b8c c047418c 02090220 000001a0 d9c01b00 3c393e44 NIP [c01320c4] __kmalloc_track_caller+0x94/0x23c LR [c0132064] __kmalloc_track_caller+0x34/0x23c Call Trace: [d9c8b840] [c0132064] __kmalloc_track_caller+0x34/0x23c (unreliable) [d9c8b860] [c04740ac] __kmalloc_reserve.isra.48+0x3c/0x9c [d9c8b880] [c047418c] __alloc_skb+0x80/0x244 [d9c8b8b0] [c04ce100] sk_stream_alloc_skb+0x58/0x184 [d9c8b8d0] [c04db7a0] tcp_fragment+0x94/0x454 [d9c8b900] [c04def54] __tcp_retransmit_skb+0x248/0x67c [d9c8b950] [c04df60c] tcp_retransmit_skb+0x28/0xd8 [d9c8b960] [c04e12c4] tcp_retransmit_timer+0x414/0x7d0 [d9c8b980] [c04e1740] tcp_write_timer_handler+0xc0/0x264 [d9c8b9b0] [c04e19b8] tcp_write_timer+0xd4/0xdc [d9c8b9c0] [c009c0b4] call_timer_fn+0x50/0x194 [d9c8b9e0] [c009c408] run_timer_softirq+0x1e8/0x2bc [d9c8ba50] [c004308c] __do_softirq+0xe8/0x35c [d9c8bab0] [c0043510] irq_exit+0xb8/0xdc [d9c8bac0] [c000b464] timer_interrupt+0xb4/0xd8 [d9c8bae0] [c00116d0] ret_from_except+0x0/0x18 --- interrupt: 901 at udelay+0x2c/0x3c LR = die+0x1d4/0x2c0 [d9c8bba0] [c000bd68] die+0x194/0x2c0 (unreliable) [d9c8bbc0] [c0011520] handle_page_fault+0x7c/0x80 --- interrupt: 300 at __kmalloc_track_caller+0x94/0x23c LR = __kmalloc_track_caller+0x34/0x23c [d9c8bca0] [c04740ac] __kmalloc_reserve.isra.48+0x3c/0x9c [d9c8bcc0] [c047418c] __alloc_skb+0x80/0x244 [d9c8bcf0] [c04743a4] alloc_skb_with_frags+0x54/0x1d4 [d9c8bd30] [c046cf88] sock_alloc_send_pskb+0x20c/0x230 [d9c8bd90] [c0538588] unix_dgram_sendmsg+0x154/0x66c [d9c8be20] [c046829c] sock_sendmsg+0x2c/0x4c [d9c8be30] [c046a7f8] SyS_sendto+0xc8/0xfc [d9c8bf10] [c046b3f8] SyS_socketcall+0x1b8/0x230 [d9c8bf40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xfec3d30 LR = 0xfec3d0c Instruction dump: 7d0a402e 39290004 7f49402e 81270004 5529103a 7d0a482e 813e0000 7cc94214 7fe9402e 2f9f0000 419e008c 813e0014 <7d3f482e> 7c0000a6 7c000146 80c70004 ---[ end trace cf107938c5443946 ]--- flags: 0x0() page dumped because: nonzero mapcount Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B D W 4.4.235 #13 Call Trace: [dffe7dc0] [c05daf48] dump_stack+0x94/0xc0 (unreliable) [dffe7dd0] [c00f41cc] bad_page+0xcc/0x118 [dffe7df0] [c00f442c] free_pages_prepare+0x214/0x310 [dffe7e30] [c00f6cdc] free_hot_cold_page+0x38/0x1a8 [dffe7e60] [c0470ed8] skb_release_data+0x8c/0x120 [dffe7e80] [c04711d0] consume_skb+0x58/0x120 [dffe7e90] [c03ef40c] gfar_clean_tx_ring+0x224/0x410 [dffe7f00] [c03ef76c] gfar_poll_tx_sq+0x54/0xa8 [dffe7f20] [c048754c] net_rx_action+0x1dc/0x330 [dffe7f80] [c004308c] __do_softirq+0xe8/0x35c [dffe7fe0] [c0043510] irq_exit+0xb8/0xdc [dffe7ff0] [c000f534] call_do_irq+0x24/0x3c [c07d5e60] [c0005614] do_IRQ+0xac/0x14c [c07d5e90] [c00116d0] ret_from_except+0x0/0x18 --- interrupt: 501 at cpu_startup_entry+0x144/0x2f8 LR = cpu_startup_entry+0x204/0x2f8 [c07d5fb0] [c0713a08] start_kernel+0x3b4/0x3cc [c07d5ff0] [c00003d8] set_ivor+0x140/0x17c Kernel panic - not syncing: Fatal exception in interrupt Rebooting in 60 seconds..