# dump.sh killall: netdump: no process killed listening on port 7000 listening on port 7004 listening on port 7002 listening on port 7005 listening on port 7003 listening on port 7001 listening on port 7007 listening on port 7006 listening on port 7008 listening on port 7010 listening on port 7012 listening on port 7009 listening on port 7013 listening on port 7011 # listening on port 7014 listening on port 7015 # got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client got new client # hwts 32 fsl-gianfar ff724000.ethernet: DMA-API: device driver frees DMA memory with wrong function [device address=0x000000001ecaac78] [size=1448 bytes] [mapped as page] [unmapped as single] ------------[ cut here ]------------ WARNING: at lib/dma-debug.c:1116 Modules linked in: CPU: 1 PID: 1581 Comm: hwts Tainted: G W 4.4.235 #13 task: d9f7b200 ti: d9cea000 task.ti: d9cea000 NIP: c030f5c0 LR: c030f5c0 CTR: c0367c44 REGS: d9cebc20 TRAP: 0700 Tainted: G W (4.4.235) MSR: 00021000 CR: 28002822 XER: 20000000 GPR00: c030f5c0 d9cebcd0 d9f7b200 000000b6 dffd12f0 dffd2e0c 1f85f000 d9cea000 GPR08: 00000007 c0772d4c 1f85f000 00000217 44002844 100192ac 00000000 00000000 GPR16: 00000000 d9d5e43c 00000002 d9d5e420 00000000 df817600 0000000d d9d5e000 GPR24: 00029000 c07a8314 c07fd8c8 c07b0000 c07d9ec0 d9cebd28 c0808e20 d9faf8a0 NIP [c030f5c0] check_unmap+0x948/0xa90 LR [c030f5c0] check_unmap+0x948/0xa90 Call Trace: [d9cebcd0] [c030f5c0] check_unmap+0x948/0xa90 (unreliable) [d9cebd20] [c030f7a4] debug_dma_unmap_page+0x9c/0xb0 [d9cebda0] [c03eeb70] free_skb_resources+0xf4/0x3e4 [d9cebdf0] [c03f354c] reset_gfar+0x68/0x9c [d9cebe00] [c03f378c] gfar_ioctl+0x20c/0x210 [d9cebe30] [c04a2d14] dev_ifsioc+0x308/0x31c [d9cebe60] [c04a2f94] dev_ioctl+0x1c0/0x624 [d9cebec0] [c014b4d0] do_vfs_ioctl+0x38c/0x6b4 [d9cebf20] [c014b844] SyS_ioctl+0x4c/0x80 [d9cebf40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xff40194 LR = 0xffed0a8 Instruction dump: 554a103a 7c69402e 7cc9502e 811d001c 813d0020 815d0024 90610008 3c60c06b 90c1000c 3863b7a8 4cc63182 482c99b9 <0fe00000> 4bfffa60 3c80c06b 3884b0f8 ---[ end trace ea5146baa6365e30 ]--- Mapped at: [] gfar_start_xmit+0x888/0x9f0 [] dev_hard_start_xmit+0x27c/0x47c [] sch_direct_xmit+0xe4/0x278 [] __qdisc_run+0x94/0x1dc [] net_tx_action+0x1c0/0x2c0 driver changed our HWTSTAMP options tx_type got 1 wanted 1 rx_filter got 1 wanted 12 sending 0 sendto 319: 44; Success sending 1 sendto 319: 44; Success sending 2 sendto 319: 44; Success sending 3 sendto 319: 44; Success BUG: Bad page state in process netdump pfn:1b810 page:de4ae200 count:-6 mapcount:0 mapping: (null) index:0x0 flags: 0x0() ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:2733! Oops: Exception in kernel mode, sig: 5 [#1] SMP NR_CPUS=2 P2020 RDB Modules linked in: CPU: 1 PID: 1569 Comm: netdump Tainted: G W 4.4.235 #13 task: dfa792c0 ti: dffe2000 task.ti: dea50000 NIP: c0478054 LR: c0477ee4 CTR: 00000000 REGS: dffe3a80 TRAP: 0700 Tainted: G W (4.4.235) MSR: 00029000 CR: 22224422 XER: 20000000 GPR00: c0477ee4 dffe3b30 dfa792c0 00000000 db88e780 00003890 00003890 00000000 GPR08: def5e740 def5e740 00000011 00000000 82222428 10018fb0 b83f1792 00000001 GPR16: 00003890 0000000a 000005a8 df0ba780 00000000 00000000 00003890 00000000 GPR24: ffffffff 00000001 00003890 df0ba780 def5e740 db88e780 deb6b180 00000000 NIP [c0478054] skb_shift+0x26c/0x42c LR [c0477ee4] skb_shift+0xfc/0x42c Call Trace: [dffe3b30] [c0477ee4] skb_shift+0xfc/0x42c (unreliable) [dffe3b80] [c04d66e4] tcp_sacktag_walk+0x2c8/0x484 [dffe3be0] [c04d6c3c] tcp_sacktag_write_queue+0x39c/0x950 [dffe3c50] [c04d7ed0] tcp_ack+0x758/0x10a4 [dffe3cf0] [c04d8ed8] tcp_rcv_established+0x168/0x764 [dffe3d30] [c04e2818] tcp_v4_do_rcv+0x17c/0x264 [dffe3d50] [c04e57b4] tcp_v4_rcv+0xbf0/0xcc8 [dffe3da0] [c04bc914] ip_local_deliver+0x248/0x33c [dffe3dc0] [c04837e8] __netif_receive_skb_core+0x4e8/0x8e0 [dffe3e20] [c0486f54] netif_receive_skb_internal+0x5c/0xf0 [dffe3e50] [c0487b64] napi_gro_receive+0xd0/0x160 [dffe3e70] [c03f3b78] gfar_clean_rx_ring+0x3bc/0x744 [dffe3f00] [c03f4120] gfar_poll_rx_sq+0x48/0xb8 [dffe3f20] [c048754c] net_rx_action+0x1dc/0x330 [dffe3f80] [c004308c] __do_softirq+0xe8/0x35c [dffe3fe0] [c0043510] irq_exit+0xb8/0xdc [dffe3ff0] [c000f534] call_do_irq+0x24/0x3c [dea51a40] [c0005614] do_IRQ+0xac/0x14c [dea51a70] [c00116d0] ret_from_except+0x0/0x18 --- interrupt: 501 at console_unlock+0x4fc/0x590 LR = console_unlock+0x4f8/0x590 [dea51b80] [c008986c] vprintk_emit+0x2f4/0x4e4 [dea51bd0] [c05d8ff8] printk+0x84/0x94 [dea51c10] [c01143c0] dump_page_badflags+0x58/0xc4 [dea51c30] [c00f41c4] bad_page+0xc4/0x118 [dea51c50] [c00f800c] get_page_from_freelist+0x310/0x8d0 [dea51ce0] [c00f86bc] __alloc_pages_nodemask+0xf0/0x874 [dea51d80] [c046dfb0] skb_page_frag_refill+0xa4/0x130 [dea51da0] [c046e068] sk_page_frag_refill+0x2c/0x9c [dea51db0] [c04ce9fc] tcp_sendmsg+0x228/0xad4 [dea51e20] [c046829c] sock_sendmsg+0x2c/0x4c [dea51e30] [c046a7f8] SyS_sendto+0xc8/0xfc [dea51f10] [c046b3f8] SyS_socketcall+0x1b8/0x230 [dea51f40] [c0011004] ret_from_syscall+0x0/0x3c --- interrupt: c01 at 0xff49d30 LR = 0xff49d0c Instruction dump: 9149000c 811d0098 89280000 7f89f800 419dffc4 54e7063e 98e80000 40910014 813d0098 8b290000 7f390034 5739d97e <0f190000> 813b0064 38c00003 7f43d378 ---[ end trace ea5146baa6365e31 ]--- Kernel panic - not syncing: Fatal exception in interrupt Rebooting in 60 seconds..