[FS#2628] Kernel warning: eth0 (mtk_soc_eth): transmit queue 0 timed out

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Sun Sep 13 04:24:55 EDT 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#2628 - Kernel warning: eth0 (mtk_soc_eth): transmit queue 0 timed out
User who did this - Dmitry (Gektor)

----------
Same issue on MikroTik RBM33G
SoC Type: MediaTek MT7621 ver:1 eco:3
Linux OpenWrt 4.14.180 #0 SMP Sat May 16 18:32:20 2020 mips GNU/Linux
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='19.07.3'
DISTRIB_REVISION='r11063-85e04e9f46'
DISTRIB_TARGET='ramips/mt7621'
DISTRIB_ARCH='mipsel_24kc'
DISTRIB_DESCRIPTION='OpenWrt 19.07.3 r11063-85e04e9f46'
DISTRIB_TAINTS=''

[140121.189586] ------------[ cut here ]------------
[140121.194302] WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:320 0x8038ba10
[140121.201458] NETDEV WATCHDOG: eth0 (mtk_soc_eth): transmit queue 0 timed out
[140121.208487] Modules linked in: qcserial pppoe ppp_async option ath10k_pci ath10k_core ath usb_wwan qmi_wwan pppox ppp_generic nf_conntrack_ipv6 mac80211 iptable_nat ipt_REJECT ipt_MASQUERADE cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY usbserial usbnet slhc nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat cdc_wdm xt_set ip_set_list_set
[140121.279359]  ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 mii leds_gpio xhci_plat_hcd xhci_pci xhci_mtk xhci_hcd gpio_button_hotplug usbcore nls_base usb_common
[140121.323813] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.180 #0
[140121.329970] Stack : 00000000 00000000 00000000 8ff20a40 00000000 00000000 00000000 00000000
[140121.338393]         00000000 00000000 00000000 00000000 00000000 00000001 8fc09d60 ac07f5ad
[140121.346809]         8fc09df8 00000000 00000000 00007330 00000038 8049c0d8 00000008 00000000
[140121.355226]         00000000 80550000 0004f0e5 70617773 8fc09d40 00000000 00000000 8050ae44
[140121.363644]         8038ba10 00000140 00000000 8ff20a40 00000008 802accb0 00000000 806b0000
[140121.372061]         ...
[140121.374583] Call Trace:
[140121.374600] [] 0x8049c0d8
[140121.380668] [] 0x8038ba10
[140121.384223] [] 0x802accb0
[140121.387778] [] 0x8000c1a0
[140121.391334] [] 0x8000c1a8
[140121.394889] [] 0x80484f34
[140121.398443] [] 0x80071a90
[140121.402000] [] 0x8002e608
[140121.405556] [] 0x8038ba10
[140121.409111] [] 0x8002e690
[140121.412668] [] 0x8038ba10
[140121.416223] [] 0x80099940
[140121.419780] [] 0x8038b864
[140121.423334] [] 0x8008850c
[140121.426887] [] 0x8035ba9c
[140121.430444] [] 0x800887c8
[140121.433999] [] 0x800790f8
[140121.437556] [] 0x804a2ed8
[140121.441115] [] 0x80032fb4
[140121.444671] [] 0x8025a2f0
[140121.448227] [] 0x80007488
[140121.451780] 
[140121.453491] ---[ end trace ea6e6111189c7d38 ]---
[140121.458205] mtk_soc_eth 1e100000.ethernet eth0: transmit timed out
[140121.464502] mtk_soc_eth 1e100000.ethernet eth0: dma_cfg:80000065
[140121.470664] mtk_soc_eth 1e100000.ethernet eth0: tx_ring=0, base=0ec00000, max=0, ctx=2623, dtx=2623, fdx=2622, next=2623
[140121.481650] mtk_soc_eth 1e100000.ethernet eth0: rx_ring=0, base=0e2d0000, max=0, calc=3252, drx=3257
[140121.494774] mtk_soc_eth 1e100000.ethernet: 0x100 = 0x6060000c, 0x10c = 0x80818
[140121.509194] mtk_soc_eth 1e100000.ethernet: PPE started

----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=2628#comment8774

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list