I did the test on the rpi3B+ board, scp a 3.3G size file from host
machine to the rpi3B+ board (mmc card), there is no any errors, and
there is no calltrace in the dmesg of the rpi3B+ board.


log on the host machine:
hwang4@hwang4-Vostro-5390:~/Downloads$ scp 
dell-bto-bionic-beaver-osp1-shireen-X44-20200103-22.iso 
ubuntu@192.168.2.103:~/test/
The authenticity of host '192.168.2.103 (192.168.2.103)' can't be established.
ECDSA key fingerprint is SHA256:HbfQtMzTnE9Bl6sg20Y95s6Ruf21ybTJ6T7npMl0Ex4.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.2.103' (ECDSA) to the list of known hosts.
ubuntu@192.168.2.103's password: 
dell-bto-bionic-beaver-osp1-shireen-X44-20200103-22.iso                         
                                                                                
          100% 3389MB 641.5KB/s 1:30:09    


log on the rpi3B+ board:
ubuntu@ubuntu:~/test$ uname -a
Linux ubuntu 5.3.0-1017-raspi2 #19+otg SMP Wed Jan 29 12:45:11 CST 2020 aarch64 
aarch64 aarch64 GNU/Linux
ubuntu@ubuntu:~/test$ ls -la
total 3470028
drwxrwxr-x 2 ubuntu ubuntu       4096 Feb  7 11:53 .
drwxr-xr-x 7 ubuntu ubuntu       4096 Feb  7 11:51 ..
-rw-rw-r-- 1 ubuntu ubuntu 3553296384 Feb  7 13:23 
dell-bto-bionic-beaver-osp1-shireen-X44-20200103-22.iso

dmesg:
....
[   22.099395] audit: type=1400 audit(1581076194.463:10): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lsb_release" pid=1132 
comm="apparmor_parser"
[   22.114632] audit: type=1400 audit(1581076194.479:11): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=1131 
comm="apparmor_parser"
[   27.603378] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[  112.486200] kauditd_printk_skb: 18 callbacks suppressed
[  112.486207] audit: type=1400 audit(1581076328.080:30): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.activate" 
pid=1678 comm="apparmor_parser"
[  112.507068] audit: type=1400 audit(1581076328.104:31): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.buginfo" 
pid=1680 comm="apparmor_parser"
[  112.543622] audit: type=1400 audit(1581076328.140:32): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.benchmark" 
pid=1679 comm="apparmor_parser"
[  112.684646] audit: type=1400 audit(1581076328.280:33): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.check-kernel" 
pid=1681 comm="apparmor_parser"
[  113.298782] audit: type=1400 audit(1581076328.896:34): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.hook.install" 
pid=1684 comm="apparmor_parser"
[  113.474537] audit: type=1400 audit(1581076329.072:35): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.lxc" pid=1685 
comm="apparmor_parser"
[  113.522045] audit: type=1400 audit(1581076329.116:36): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.hook.configure" 
pid=1683 comm="apparmor_parser"
[  113.551776] audit: type=1400 audit(1581076329.148:37): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.daemon" 
pid=1682 comm="apparmor_parser"
[  113.962890] audit: type=1400 audit(1581076329.560:38): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.lxd" pid=1686 
comm="apparmor_parser"
[  114.104891] audit: type=1400 audit(1581076329.700:39): apparmor="STATUS" 
operation="profile_replace" profile="unconfined" name="snap.lxd.migrate" 
pid=1687 comm="apparmor_parser"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1861936

Title:
  Raspberry Pi 3 network dies shortly after a burst of SD card IO and
  network load ((lan78xx): transmit queue 0 timed out)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-raspi2/+bug/1861936/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to