NanoPi R2S the eth1 network sometimes hangs!

[30433.611690] br-lan: port 1(eth1) entered disabled state
[30434.234865] device eth1 left promiscuous mode
[30434.235245] br-lan: port 1(eth1) entered disabled state
[30435.161206] br-lan: port 1(eth1) entered blocking state
[30435.161220] br-lan: port 1(eth1) entered disabled state
[30435.161622] device eth1 entered promiscuous mode
[30435.163299] br-lan: port 1(eth1) entered blocking state
[30435.163319] br-lan: port 1(eth1) entered forwarding state
[30435.164686] r8152 4-1:1.0 eth1: Promiscuous mode enabled
[30435.164952] r8152 4-1:1.0 eth1: carrier on

Hi were you able to solve this issue? I was also able to replicate this issue on the latest stable release..

Wed May  4 15:16:13 2022 kern.warn kernel: [63692.261631] ------------[ cut here ]------------
Wed May  4 15:16:13 2022 kern.info kernel: [63692.262101] NETDEV WATCHDOG: eth1 (r8152): transmit queue 0 timed out
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.262778] WARNING: CPU: 2 PID: 0 at net/sched/sch_generic.c:473 0xffff8000106aeb7c
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.263465] Modules linked in: pppoe ppp_async iptable_nat xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack ipt_REJECT xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG usbnet slhc r8152 nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables crc_ccitt nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 gpio_button_hotplug
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.267792] CPU: 2 PID: 0 Comm: swapper/2 Not tainted 5.4.188 #0
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.268326] Hardware name: FriendlyElec NanoPi R2S (DT)
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.268799] pstate: 20000005 (nzCv daif -PAN -UAO)
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.269225] pc : 0xffff8000106aeb7c
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.269541] lr : 0xffff8000106aeb7c
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.269856] sp : ffff800010013da0
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.270154] x29: ffff800010013da0 x28: ffff00003cbf3a80
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.270631] x27: 0000000000000004 x26: 0000000000000140
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.271108] x25: 00000000ffffffff x24: 0000000000000002
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.271587] x23: ffff00003dbfa45c x22: ffff00003dbfa000
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.272067] x21: ffff00003dbfa480 x20: ffff800010b46000
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.272546] x19: 0000000000000000 x18: 0000000000000000
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.273022] x17: 0000000000000000 x16: 0000000000000000
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.273500] x15: 0000000000000000 x14: ffff800010bd90d2
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.273980] x13: 0000000000000000 x12: ffff800010bd8000
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.274459] x11: ffff800010b5a000 x10: 0000000000000010
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.274938] x9 : 0000000000000000 x8 : 656d697420302065
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.275418] x7 : 756575712074696d x6 : ffff00003f59e720
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.275896] x5 : ffff00003f59e720 x4 : 0000000000000004
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.276375] x3 : 0000000000000000 x2 : 0000000000000004
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.276854] x1 : ffff00003d8d9780 x0 : 0000000000000039
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.277335] Call trace:
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.277564]  0xffff8000106aeb7c
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.277848]  0xffff800010114110
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.278135]  0xffff8000101146fc
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.278418]  0xffff800010081374
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.278705]  0xffff8000100ac810
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.278988]  0xffff8000100fa70c
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.279275]  0xffff8000100810a0
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.279561]  0xffff800010082cb8
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.279845]  0xffff8000100887d0
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.280131]  0xffff8000100d7b9c
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.280417]  0xffff8000100d7d44
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.280701]  0xffff8000100953fc
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.280989] ---[ end trace b9a614f65943965c ]---
Wed May  4 15:16:13 2022 kern.warn kernel: [63692.281504] r8152 4-1:1.0 eth1: Tx timeout
Wed May  4 15:16:15 2022 kern.warn kernel: [63694.342717] r8152 4-1:1.0 eth1: Tx status -2
Wed May  4 15:16:15 2022 kern.warn kernel: [63694.343207] r8152 4-1:1.0 eth1: Tx status -2
Wed May  4 15:16:15 2022 kern.warn kernel: [63694.343659] r8152 4-1:1.0 eth1: Tx status -2
Wed May  4 15:16:15 2022 kern.warn kernel: [63694.344122] r8152 4-1:1.0 eth1: Tx status -2
Wed May  4 15:16:16 2022 kern.info kernel: [63695.025254] usb 4-1: reset SuperSpeed Gen 1 USB device number 2 using xhci-hcd
Wed May  4 15:16:16 2022 kern.err kernel: [63695.057548] r8152 4-1:1.0 eth1: Invalid ether addr 00:00:00:00:00:00
Wed May  4 15:16:16 2022 kern.info kernel: [63695.058145] r8152 4-1:1.0 eth1: Random ether addr 4a:bf:7b:d4:e0:ee
Wed May  4 15:16:16 2022 kern.notice kernel: [63695.061053] r8152 4-1:1.0 eth1: Promiscuous mode enabled
Wed May  4 15:18:52 2022 authpriv.info dropbear[4140]: Exit (root) from <192.168.1.15:60420>: Exited normally

Looks like this might be related or even the same thing
https://bugzilla.kernel.org/show_bug.cgi?id=198931

this patch could have actually fixed that