I did the test on the rpi3B+ board, scp a 3.3G size file from host
machine to the rpi3B+ board (mmc card), there is no any errors, and
there is no calltrace in the dmesg of the rpi3B+ board.


log on the host machine:
hwang4@hwang4-Vostro-5390:~/Downloads$ scp 
dell-bto-bionic-beaver-osp1-shireen-X44-20200103-22.iso 
ubuntu@192.168.2.103:~/test/
The authenticity of host '192.168.2.103 (192.168.2.103)' can't be established.
ECDSA key fingerprint is SHA256:HbfQtMzTnE9Bl6sg20Y95s6Ruf21ybTJ6T7npMl0Ex4.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.2.103' (ECDSA) to the list of known hosts.
ubuntu@192.168.2.103's password: 
dell-bto-bionic-beaver-osp1-shireen-X44-20200103-22.iso                         
                                                                                
          100% 3389MB 641.5KB/s 1:30:09    


log on the rpi3B+ board:
ubuntu@ubuntu:~/test$ uname -a
Linux ubuntu 5.3.0-1017-raspi2 #19+otg SMP Wed Jan 29 12:45:11 CST 2020 aarch64 
aarch64 aarch64 GNU/Linux
ubuntu@ubuntu:~/test$ ls -la
total 3470028
drwxrwxr-x 2 ubuntu ubuntu       4096 Feb  7 11:53 .
drwxr-xr-x 7 ubuntu ubuntu       4096 Feb  7 11:51 ..
-rw-rw-r-- 1 ubuntu ubuntu 3553296384 Feb  7 13:23 
dell-bto-bionic-beaver-osp1-shireen-X44-20200103-22.iso

dmesg:
....
[   22.099395] audit: type=1400 audit(1581076194.463:10): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lsb_release" pid=1132 
comm="apparmor_parser"
[   22.114632] audit: type=1400 audit(1581076194.479:11): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=1131 
comm="apparmor_parser"
[   27.603378] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[  112.486200] kauditd_printk_skb: 18 callbacks suppressed
[  112.486207] audit: type=1400 audit(1581076328.080:30): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.activate" 
pid=1678 comm="apparmor_parser"
[  112.507068] audit: type=1400 audit(1581076328.104:31): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.buginfo" 
pid=1680 comm="apparmor_parser"
[  112.543622] audit: type=1400 audit(1581076328.140:32): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.benchmark" 
pid=1679 comm="apparmor_parser"
[  112.684646] audit: type=1400 audit(1581076328.280:33): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.check-kernel" 
pid=1681 comm="apparmor_parser"
[  113.298782] audit: type=1400 audit(1581076328.896:34): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.hook.install" 
pid=1684 comm="apparmor_parser"
[  113.474537] audit: type=1400 audit(1581076329.072:35): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.lxc" pid=1685 
comm="apparmor_parser"
[  113.522045] audit: type=1400 audit(1581076329.116:36): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.hook.configure" 
pid=1683 comm="apparmor_parser"
[  113.551776] audit: type=1400 audit(1581076329.148:37): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.daemon" 
pid=1682 comm="apparmor_parser"
[  113.962890] audit: type=1400 audit(1581076329.560:38): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.lxd" pid=1686 
comm="apparmor_parser"
[  114.104891] audit: type=1400 audit(1581076329.700:39): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.migrate" 
pid=1687 comm="apparmor_parser"

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1861936

Title:
  Raspberry Pi 3 network dies shortly after a burst of SD card IO and
  network load ((lan78xx): transmit queue 0 timed out)

Status in linux-raspi2 package in Ubuntu:
  Incomplete

Bug description:
  Raspberry Pi 3 network dies shortly after a burst of SD card IO (writes) and 
network load. Happened a few times (every time) when I tried to download a 
gparted zip release (~350 MiB) directly to the SD card, and then finally when I 
tried to scp the finished download from a desktop onto RPi's card.
  Didn't collect information when it happened, but kept a copy of kern.log. 
Here's the relevant part:

  Feb  4 23:42:59 rpi3 kernel: [  571.878359] ------------[ cut here 
]------------
  Feb  4 23:42:59 rpi3 kernel: [  571.878420] NETDEV WATCHDOG: eth0 (lan78xx): 
transmit queue 0 timed out
  Feb  4 23:42:59 rpi3 kernel: [  571.878550] WARNING: CPU: 3 PID: 0 at 
net/sched/sch_generic.c:447 dev_watchdog+0x324/0x330
  Feb  4 23:42:59 rpi3 kernel: [  571.878557] Modules linked in: sit tunnel4 
ip_tunnel bridge stp llc ip6table_filter ip6_tables xt_tcpudp xt_conntrack 
nf_conntrack iptable_filter bpfilter nls_ascii dm_multipath scsi_dh_rdac 
scsi_dh_emc scsi_dh_alua btsdio bluetooth ecdh_generic ecc brcmfmac brcmutil 
cfg80211 bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) input_leds vc_sm_cma(CE) 
v4l2_common videobuf2_vmalloc spidev videobuf2_memops videobuf2_v4l2 
raspberrypi_hwmon videobuf2_common videodev mc uio_pdrv_genirq uio sch_fq_codel 
jool(OE) jool_common(OE) nf_defrag_ipv6 nf_defrag_ipv4 ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 
multipath linear hid_generic usbhid crct10dif_ce sdhci_iproc phy_generic fixed 
aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
  Feb  4 23:42:59 rpi3 kernel: [  571.878774] CPU: 3 PID: 0 Comm: swapper/3 
Tainted: G         C OE     5.3.0-1017-raspi2 #19-Ubuntu
  Feb  4 23:42:59 rpi3 kernel: [  571.878781] Hardware name: Raspberry Pi 3 
Model B Plus Rev 1.3 (DT)
  Feb  4 23:42:59 rpi3 kernel: [  571.878789] pstate: 60400005 (nZCv daif +PAN 
-UAO)
  Feb  4 23:42:59 rpi3 kernel: [  571.878800] pc : dev_watchdog+0x324/0x330
  Feb  4 23:42:59 rpi3 kernel: [  571.878807] lr : dev_watchdog+0x324/0x330
  Feb  4 23:42:59 rpi3 kernel: [  571.878812] sp : ffff00001001bd60
  Feb  4 23:42:59 rpi3 kernel: [  571.878817] x29: ffff00001001bd60 x28: 
0000000000000140
  Feb  4 23:42:59 rpi3 kernel: [  571.878827] x27: 00000000ffffffff x26: 
0000000000000000
  Feb  4 23:42:59 rpi3 kernel: [  571.878836] x25: ffff8ecbefa4e000 x24: 
ffff305e0f529018
  Feb  4 23:42:59 rpi3 kernel: [  571.878845] x23: 0000000000000000 x22: 
0000000000000001
  Feb  4 23:42:59 rpi3 kernel: [  571.878853] x21: ffff8ecbefa4e480 x20: 
ffff305e0f807000
  Feb  4 23:42:59 rpi3 kernel: [  571.878862] x19: 0000000000000000 x18: 
0000000000000000
  Feb  4 23:42:59 rpi3 kernel: [  571.878871] x17: ffff000010fd8218 x16: 
ffff305e0e30efb8
  Feb  4 23:42:59 rpi3 kernel: [  571.878879] x15: ffff8ecbf922a290 x14: 
ffffffffffffffff
  Feb  4 23:42:59 rpi3 kernel: [  571.878888] x13: 0000000000000000 x12: 
ffff305e0f944000
  Feb  4 23:42:59 rpi3 kernel: [  571.878897] x11: ffff305e0f82d000 x10: 
0000000000000000
  Feb  4 23:42:59 rpi3 kernel: [  571.878905] x9 : 0000000000000004 x8 : 
000000000000017f
  Feb  4 23:42:59 rpi3 kernel: [  571.878913] x7 : 0000000000000000 x6 : 
0000000000000001
  Feb  4 23:42:59 rpi3 kernel: [  571.878921] x5 : 0000000000000000 x4 : 
0000000000000008
  Feb  4 23:42:59 rpi3 kernel: [  571.878929] x3 : ffff305e0ee15750 x2 : 
0000000000000004
  Feb  4 23:42:59 rpi3 kernel: [  571.878937] x1 : 6abb42c67c954600 x0 : 
0000000000000000
  Feb  4 23:42:59 rpi3 kernel: [  571.878946] Call trace:
  Feb  4 23:42:59 rpi3 kernel: [  571.878955]  dev_watchdog+0x324/0x330
  Feb  4 23:42:59 rpi3 kernel: [  571.878967]  call_timer_fn+0x3c/0x178
  Feb  4 23:42:59 rpi3 kernel: [  571.878977]  __run_timers.part.0+0x200/0x330
  Feb  4 23:42:59 rpi3 kernel: [  571.878985]  run_timer_softirq+0x40/0x78
  Feb  4 23:42:59 rpi3 kernel: [  571.878995]  __do_softirq+0x168/0x384
  Feb  4 23:42:59 rpi3 kernel: [  571.879007]  irq_exit+0xb0/0xe8
  Feb  4 23:42:59 rpi3 kernel: [  571.879020]  __handle_domain_irq+0x70/0xc0
  Feb  4 23:42:59 rpi3 kernel: [  571.879028]  
bcm2836_arm_irqchip_handle_irq+0x74/0xe0
  Feb  4 23:42:59 rpi3 kernel: [  571.879037]  el1_irq+0x108/0x200
  Feb  4 23:42:59 rpi3 kernel: [  571.879050]  arch_cpu_idle+0x3c/0x1c8
  Feb  4 23:42:59 rpi3 kernel: [  571.879069]  default_idle_call+0x24/0x48
  Feb  4 23:42:59 rpi3 kernel: [  571.879081]  do_idle+0x210/0x2a0
  Feb  4 23:42:59 rpi3 kernel: [  571.879091]  cpu_startup_entry+0x28/0x30
  Feb  4 23:42:59 rpi3 kernel: [  571.879102]  
secondary_start_kernel+0x154/0x1c8
  Feb  4 23:42:59 rpi3 kernel: [  571.879108] ---[ end trace 349744d60a20e77a 
]---

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: linux-image-5.3.0-1017-raspi2 5.3.0-1017.19
  ProcVersionSignature: Ubuntu 5.3.0-1017.19-raspi2 5.3.13
  Uname: Linux 5.3.0-1017-raspi2 aarch64
  ApportVersion: 2.20.11-0ubuntu8.2
  Architecture: arm64
  Date: Tue Feb  4 23:49:19 2020
  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
   LANG=C.UTF-8
   SHELL=/bin/bash
  SourcePackage: linux-raspi2
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-raspi2/+bug/1861936/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to