# dump.sh killall: netdump: no process killed listening on port 7002 listening on port 7000 listening on port 7006 listening on port 7003 listening on port 7007 listening on port 7001 listening on port 7004 listening on port 7008 listening on port 7005 listening on port 7009 listening on port 7011 # listening on port 7010 listening on port 7014 listening on port 7012 listening on port 7013 listening on port 7015 got new client got new client got new client got new client got new client got new client got new clientrandom: nonblocking pool is initialized got new client got new client got new client got new client got new client got new client got new client got new client got new client # hwts 32 fsl-gianfar ff724000.ethernet: DMA-API: device driver frees DMA memory with wrong function [device address=0x000000001e860c48] [size=1448 bytes] [mapped as page] [unmapped as single] ------------[ cut here ]------------ WARNING: at lib/dma-debug.c:1116 Modules linked in: CPU: 1 PID: 1573 Comm: hwts Tainted: G W 4.4.235 #13 task: d9d4f080 ti: db948000 task.ti: db948000 NIP: c030f5c0 LR: c030f5c0 CTR: c0367c44 REGS: db949c20 TRAP: 0700 Tainted: G W (4.4.235) MSR: 00021000 CR: 28002822 XER: 20000000 GPR00: c030f5c0 db949cd0 d9d4f080 000000b6 dffd12f0 dffd2e0c 1f85f000 db948000 GPR08: 00000007 c0772d4c 1f85f000 00000218 42002844 100192ac 00000000 00000000 GPR16: 00000000 dd9fc43c 00000002 dd9fc420 00000000 df89fd00 00000064 dd9fc000 GPR24: 00029000 c07a8314 c07f9428 c07b0000 c07d9ec0 db949d28 c0808e20 d9fb55a0 NIP [c030f5c0] check_unmap+0x948/0xa90 LR [c030f5c0] check_unmap+0x948/0xa90 Call Trace: [db949cd0] [c030f5c0] check_unmap+0x948/0xa90 (unreliable) [db949d20] [c030f7a4] debug_dma_unmap_page+0x9c/0xb0 [db949da0] [c03eeb70] free_skb_resources+0xf4/0x3e4 [db949df0] [c03f354c] reset_gfar+0x68/0x9c [db949e00] [c03f378c] gfar_ioctl+0x20c/0x210 [db949e30] [c04a2d14] dev_ifsioc+0x308/0x31c [db949e60] [c04a2f94] dev_ioctl+0x1c0/0x624 [db949ec0] [c014b4d0] do_vfs_ioctl+0x38c/0x6b4 [db949f20] [c014b844] SyS_ioctl+0x4c/0x80 [db949f40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xff40194 LR = 0xffed0a8 Instruction dump: 554a103a 7c69402e 7cc9502e 811d001c 813d0020 815d0024 90610008 3c60c06b 90c1000c 3863b7a8 4cc63182 482c99b9 <0fe00000> 4bfffa60 3c80c06b 3884b0f8 ---[ end trace bb1cc7cb5013e953 ]--- Mapped at: [] gfar_start_xmit+0x888/0x9f0 [] dev_hard_start_xmit+0x27c/0x47c [] sch_direct_xmit+0xe4/0x278 [] __qdisc_run+0x94/0x1dc [] net_tx_action+0x1c0/0x2c0 driver changed our HWTSTAMP options tx_type got 1 wanted 1 rx_filter got 1 wanted 12 sending 0 sendto 319: 44; Success sending 1 sendto 319: 44; Success sending 2 sendto 319: 44; Success sending 3 sendto 319: 44; Success sending 4 sendto 319: 44; Success sending 5 sendto 319: 44; Success sending 6 sendto 319: 44; Success sending 7 sendto 319: 44; Success sending 8 sendto 319: 44; Success sending 9 sendto 319: 44; Success sending 10 sendto 319: 44; Success sending 11 sendto 319: 44; Success sending 12 sendto 319: 44; Success sending 13 sendto 319: 44; Success sending 14 sendto 319: 44; Success sending 15 sendto 319: 44; Success sending 16 sendto 319: 44; Success sending 17 sendto 319: 44; Success sending 18 sendto 319: 44; Success sending 19 sendto 319: 44; Success sending 20 sendto 319: 44; Success sending 21 sendto 319: 44; Success sending 22 sendto 319: 44; Success sending 23 sendto 319: 44; Success sending 24 sendto 319: 44; Success sending 25 sendto 319: 44; Success sending 26 sendto 319: 44; Success sending 27 sendto 319: 44; Success sending 28 sendto 319: 44; Success sending 29 sendto 319: 44; Success sending 30 sendto 319: 44; Success sending 31 sendto 319: 44; Success # # hwts 32 driver changed our HWTSTAMP options tx_type got 1 wanted 1 rx_filter got 1 wanted 12 sending 0 sendto 319: 44; Success sending 1 sendto 319: 44; Success sending 2 sendto 319: 44; Success sending 3 sendto 319: 44; Success sending 4 sendto 319: 44; Success sending 5 sendto 319: 44; Success sending 6 sendto 319: 44; Success sending 7 sendto 319: 44; Success sending 8 sendto 319: 44; Success sending 9 sendto 319: 44; Success sending 10 sendto 319: 44; Success sending 11 sendto 319: 44; Success sending 12 sendto 319: 44; Success sending 13 sendto 319: 44; Success sending 14 sendto 319: 44; Success sending 15 sendto 319: 44; Success sending 16 sendto 319: 44; Success sending 17 sendto 319: 44; Success sending 18 sendto 319: 44; Success sending 19 sendto 319: 44; Success sending 20 sendto 319: 44; Success sending 21 sendto 319: 44; Success sending 22 sendto 319: 44; Success sending 23 sendto 319: 44; Success sending 24 sendto 319: 44; Success sending 25 sendto 319: 44; Success sending 26 sendto 319: 44; Success sending 27 sendto 319: 44; Success INFO: rcu_sched detected stalls on CPUs/tasks: 0-...: (1 GPs behind) idle=ecd/1/0 softirq=1422/1422 fqs=15001 (detected by 1, t=15002 jiffies, g=168, c=167, q=152) Call Trace: [c07d5e40] [c00b0b04] tick_program_event+0x88/0xd8 (unreliable) [c07d5e60] [c07d4000] 0xc07d4000 [c07d5e90] [c07d5f40] 0xc07d5f40 BUG: Unable to handle kernel data access at 0x3c31313e Faulting instruction address: 0xc01320c4 Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=2 P2020 RDB Modules linked in: CPU: 1 PID: 1440 Comm: klogd Tainted: G W 4.4.235 #13 task: df8b2580 ti: dfb4a000 task.ti: dfb4a000 NIP: c01320c4 LR: c0132064 CTR: c0538434 REGS: dfb4bbd0 TRAP: 0300 Tainted: G W (4.4.235) MSR: 00029000 CR: 28002244 XER: 20000000 DEAR: 3c31313e ESR: 00000000 GPR00: c0132064 dfb4bc80 df8b2580 c07d9d4c 024106c0 c047418c dffd61b0 dfb4a000 GPR08: 1f85f000 00000000 c07d9d4c 1f85f000 28008248 100e227e 00000000 00000000 GPR16: 00000000 00000000 00000000 00000052 00000000 024000c0 dfb4bdb0 00000000 GPR24: 00000000 c00811f4 000023eb c047418c 024106c0 00000120 d9c01b00 3c31313e NIP [c01320c4] __kmalloc_track_caller+0x94/0x23c LR [c0132064] __kmalloc_track_caller+0x34/0x23c Call Trace: [dfb4bc80] [c0132064] __kmalloc_track_caller+0x34/0x23c (unreliable) [dfb4bca0] [c04740ac] __kmalloc_reserve.isra.48+0x3c/0x9c [dfb4bcc0] [c047418c] __alloc_skb+0x80/0x244 [dfb4bcf0] [c04743a4] alloc_skb_with_frags+0x54/0x1d4 [dfb4bd30] [c046cf88] sock_alloc_send_pskb+0x20c/0x230 [dfb4bd90] [c0538588] unix_dgram_sendmsg+0x154/0x66c [dfb4be20] [c046829c] sock_sendmsg+0x2c/0x4c [dfb4be30] [c046a7f8] SyS_sendto+0xc8/0xfc [dfb4bf10] [c046b3f8] SyS_socketcall+0x1b8/0x230 [dfb4bf40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xfec3d30 LR = 0xfec3d0c Instruction dump: 7d0a402e 39290004 7f49402e 81270004 5529103a 7d0a482e 813e0000 7cc94214 7fe9402e 2f9f0000 419e008c 813e0014 <7d3f482e> 7c0000a6 7c000146 80c70004 ---[ end trace bb1cc7cb5013e954 ]--- BUG: Unable to handle kernel data access at 0x3c31313e Faulting instruction address: 0xc01320c4 Oops: Kernel access of bad area, sig: 11 [#2] SMP NR_CPUS=2 P2020 RDB Modules linked in: CPU: 1 PID: 1382 Comm: klogd Tainted: G D W 4.4.235 #13 task: df8b5780 ti: dfa66000 task.ti: dfa66000 NIP: c01320c4 LR: c0132064 CTR: c0538434 REGS: dfa67bd0 TRAP: 0300 Tainted: G D W (4.4.235) MSR: 00029000 CR: 28002244 XER: 20000000 DEAR: 3c31313e ESR: 00000000 GPR00: c0132064 dfa67c80 df8b5780 c07d9d4c 024106c0 c047418c dffd61b0 dfa66000 GPR08: 1f85f000 00000000 c07d9d4c 1f85f000 28008248 100e227e 00000000 00000000 GPR16: 00000000 00000000 00000000 00000051 00000000 024000c0 dfa67db0 00000000 GPR24: 00000000 c00811f4 000023eb c047418c 024106c0 00000120 d9c01b00 3c31313e NIP [c01320c4] __kmalloc_track_caller+0x94/0x23c LR [c0132064] __kmalloc_track_caller+0x34/0x23c Call Trace: [dfa67c80] [c0132064] __kmalloc_track_caller+0x34/0x23c (unreliable) [dfa67ca0] [c04740ac] __kmalloc_reserve.isra.48+0x3c/0x9c [dfa67cc0] [c047418c] __alloc_skb+0x80/0x244 [dfa67cf0] [c04743a4] alloc_skb_with_frags+0x54/0x1d4 [dfa67d30] [c046cf88] sock_alloc_send_pskb+0x20c/0x230 [dfa67d90] [c0538588] unix_dgram_sendmsg+0x154/0x66c [dfa67e20] [c046829c] sock_sendmsg+0x2c/0x4c [dfa67e30] [c046a7f8] SyS_sendto+0xc8/0xfc [dfa67f10] [c046b3f8] SyS_socketcall+0x1b8/0x230 [dfa67f40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xfec3d30 LR = 0xfec3d0c Instruction dump: 7d0a402e 39290004 7f49402e 81270004 5529103a 7d0a482e 813e0000 7cc94214 7fe9402e 2f9f0000 419e008c 813e0014 <7d3f482e> 7c0000a6 7c000146 80c70004 ---[ end trace bb1cc7cb5013e955 ]--- sending 28 sendto 319: 44; Success sending 29 sendto 319: 44; Success sending 30 sendto 319: 44; Success sending 31 sendto 319: 44; Success # # reboot # unmounting /etc/config BUG: Kernel NULL pointer dereference at 0x00000004 Faulting instruction address: 0xc0140c90 Oops: Kernel access of bad area, sig: 11 [#3] SMP NR_CPUS=2 P2020 RDB Modules linked in: CPU: 1 PID: 1587 Comm: run Tainted: G D W 4.4.235 #13 task: d9d49f40 ti: dea20000 task.ti: dea20000 NIP: c0140c90 LR: c0140e24 CTR: c00723c0 REGS: dea21da0 TRAP: 0300 Tainted: G D W (4.4.235) MSR: 00029000 CR: 24044484 XER: 20000000 DEAR: 00000004 ESR: 00000000 GPR00: c0140e24 dea21e50 d9d49f40 dfbf7180 dedd8200 def43f50 00000000 00000001 GPR08: dea20000 00000000 00000000 00021000 0000003c 100e227e 00000000 00000001 GPR16: dedd8200 100ddc10 00000000 dfbf7198 dfbf71d0 dea21ec8 00000000 dea239c0 GPR24: 00000080 00000000 00000000 00000000 00000001 dea21f18 dfbf7180 dedd8200 NIP [c0140c90] pipe_read+0x80/0x330 LR [c0140e24] pipe_read+0x214/0x330 Call Trace: [dea21e50] [c0140e24] pipe_read+0x214/0x330 (unreliable) [dea21ea0] [c0137654] __vfs_read+0xcc/0x130 [dea21ef0] [c0137f38] vfs_read+0x90/0x13c [dea21f10] [c013897c] SyS_read+0x64/0xf0 [dea21f40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xfeb28c0 LR = 0x1000816c Instruction dump: 2f9c0000 419e0174 833e0028 7fc3f378 821e0054 57292834 573b1838 7f7b4850 7ff0da14 825f000c 7fe4fb78 813f0008 <81520004> 7f984840 7fa9c75e 7d4903a6 ---[ end trace bb1cc7cb5013e956 ]--- # reboot #