[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
$ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 $ echo $? 0 $ uname -a Linux moe 5.6.0-1053-oem #57-Ubuntu SMP Fri Apr 9 16:13:57 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux ** Changed in: ubuntu-kernel-tests Status: In Progress => Fix Released ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: Fix Released Status in linux-oem-5.6 package in Ubuntu: Invalid Status in linux-oem-5.6 source package in Focal: Fix Released Bug description: [Impact] While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 seconds. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [Fix] * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()") We have this patch in all of our generic kernels and OEM-5.10, thus for now I can see just OEM-5.6 is affected. For which this patch can be cherry-picked. [Test Case] This can tested with the l2tp.sh script in the kernel tree: # sh ./tools/testing/selftests/net/l2tp.sh With the patched kernel, it won't get
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
This bug was fixed in the package linux-oem-5.6 - 5.6.0-1053.57 --- linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium * focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042) * Packaging resync (LP: #1786013) - update dkms package versions * LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key (LP: #1918134) - [Packaging] sync dkms-build et al from LRMv4 * CVE-2021-29154 - SAUCE: bpf, x86: Validate computation of branch displacements for x86-64 - SAUCE: bpf, x86: Validate computation of branch displacements for x86-32 * xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub- cases (LP: #1909647) - selftests: xfrm: fix test return value override issue in xfrm_policy.sh * ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255 on F-oem-5.6 (LP: #1919147) - selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support * l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 (LP: #1919277) - l2tp: remove skb_dst_set() from l2tp_xmit_skb() * CVE-2020-0466 - epoll: Keep a reference on files added to the check list - do_epoll_ctl(): clean the failure exits up a bit - fix regression in "epoll: Keep a reference on files added to the check list" * CVE-2021-3178 - nfsd4: readdirplus shouldn't return parent of export * CVE-2020-25285 - mm/hugetlb: fix a race between hugetlb sysctl handlers * CVE-020-10781 - Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()" * CVE-2020-14351 - perf/core: Fix race in the perf_mmap_close() function * CVE-2020-25669 - Input: sunkbd - avoid use-after-free in teardown paths * CVE-2020-14390 - fbcon: remove soft scrollback code * CVE-2021-3411 - x86/kprobes: Fix optprobe to detect INT3 padding correctly * CVE-2020-0423 - binder: fix UAF when releasing todo list * CVE-2020-27830 - speakup: Reject setting the speakup line discipline outside of speakup * CVE-2020-0465 - HID: core: Correctly handle ReportSize being zero - HID: core: Sanitize event code and type when mapping input * CVE-2020-25645 - geneve: add transport ports in route lookup for geneve * CVE-2021-20194 - bpf, cgroup: Fix optlen WARN_ON_ONCE toctou - bpf, cgroup: Fix problematic bounds check * CVE-2020-36158 - mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start -- Stefan Bader Fri, 09 Apr 2021 16:43:44 +0200 ** Changed in: linux-oem-5.6 (Ubuntu Focal) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0423 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0465 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0466 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14351 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14390 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25285 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25645 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25669 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27830 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-36158 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-20194 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29154 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3178 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3411 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: In Progress Status in linux-oem-5.6 package in Ubuntu: Invalid Status in linux-oem-5.6 source package in Focal: Fix Released Bug description: [Impact] While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 seconds. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel -
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verification-needed-focal' to 'verification-failed-focal'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: In Progress Status in linux-oem-5.6 package in Ubuntu: Invalid Status in linux-oem-5.6 source package in Focal: Fix Committed Bug description: [Impact] While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 seconds. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [Fix] * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()") We have this patch in all of our generic kernels and OEM-5.10, thus for now I can see just OEM-5.6 is affected. For which this patch can be cherry-picked. [Test Case] This can tested with the l2tp.sh script in the kernel tree: # sh ./tools/testing/selftests/net/l2tp.sh With the patched kernel, it won't get flooded with that unregister_netdevice message anymore. Also, I have it tested with ubuntu_stress_smoke_tests as well, to ensure the sctp stressor won't trigger any issue like in bug 1854968. A test kernel can be found here: https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/ [Where problems could occur] This change is testable. A quick search didn't show any know issue regarding this patch. And with the same fix running in different generic kernel for a while I think the regression potential can be considered as low. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage:
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
** Changed in: linux-oem-5.6 (Ubuntu Focal) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: In Progress Status in linux-oem-5.6 package in Ubuntu: Invalid Status in linux-oem-5.6 source package in Focal: Fix Committed Bug description: [Impact] While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 seconds. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [Fix] * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()") We have this patch in all of our generic kernels and OEM-5.10, thus for now I can see just OEM-5.6 is affected. For which this patch can be cherry-picked. [Test Case] This can tested with the l2tp.sh script in the kernel tree: # sh ./tools/testing/selftests/net/l2tp.sh With the patched kernel, it won't get flooded with that unregister_netdevice message anymore. Also, I have it tested with ubuntu_stress_smoke_tests as well, to ensure the sctp stressor won't trigger any issue like in bug 1854968. A test kernel can be found here: https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/ [Where problems could occur] This change is testable. A quick search didn't show any know issue regarding this patch. And with the same fix running in different generic kernel for a while I think the regression potential can be considered as low. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage: linux-signed-oem-5.6 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
Patch V2 https://lists.ubuntu.com/archives/kernel-team/2021-March/118467.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: In Progress Status in linux-oem-5.6 package in Ubuntu: Invalid Status in linux-oem-5.6 source package in Focal: In Progress Bug description: [Impact] While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 seconds. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [Fix] * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()") We have this patch in all of our generic kernels and OEM-5.10, thus for now I can see just OEM-5.6 is affected. For which this patch can be cherry-picked. [Test Case] This can tested with the l2tp.sh script in the kernel tree: # sh ./tools/testing/selftests/net/l2tp.sh With the patched kernel, it won't get flooded with that unregister_netdevice message anymore. Also, I have it tested with ubuntu_stress_smoke_tests as well, to ensure the sctp stressor won't trigger any issue like in bug 1854968. A test kernel can be found here: https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/ [Where problems could occur] This change is testable. A quick search didn't show any know issue regarding this patch. And with the same fix running in different generic kernel for a while I think the regression potential can be considered as low. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage: linux-signed-oem-5.6 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
https://lists.ubuntu.com/archives/kernel-team/2021-March/118103.html ** Description changed: [Impact] - While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause dmesg on Focal OEM 5.6 kernel flooded on with: + While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" - for about every 10 secondes. + for about every 10 seconds. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg Message from syslogd@glameow at Mar 16 05:01:40 ... kernel:[ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [Fix] * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()") We have this patch in our generic kernels F/G/H and OEM-5.10, thus for now I can see just OEM-5.6 is affected. For which this patch can be cherry-picked. [Test Case] This can tested with the l2tp.sh script in the kernel tree: # sh ./tools/testing/selftests/net/l2tp.sh With the patched kernel, it won't get flooded with that unregister_netdevice message anymore. Also, I have it tested with ubuntu_stress_smoke_tests as well, to make sure the sctp stressor won't trigger any issue like in bug 1854968. Test kernel can be found here: https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/ [Where problems could occur] - This change is testable. A quick search didn't show any know issue about this patch. And with the same fix running in generic kernel for a while I think the regression potential is minor. - + This change is testable. A quick search didn't show any know issue regarding this patch. And with the same fix running in generic kernel for a while I think the regression potential is low. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage: linux-signed-oem-5.6 UpgradeStatus: No upgrade log present (probably fresh install) ** Description changed: [Impact] While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 seconds. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST:
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
** Description changed: - Issue found with 5.6.0-1048-oem - - While debugging bug 1880631, I found that this test will cause dmesg flooded with: + [Impact] + While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause dmesg on Focal OEM 5.6 kernel flooded on with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 secondes. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg Message from syslogd@glameow at Mar 16 05:01:40 ... - kernel:[ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 + kernel:[ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 + [Fix] + * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()") + + We have this patch in our generic kernels F/G/H and OEM-5.10, thus for + now I can see just OEM-5.6 is affected. For which this patch can be + cherry-picked. + + [Test Case] + This can tested with the l2tp.sh script in the kernel tree: + # sh ./tools/testing/selftests/net/l2tp.sh + + With the patched kernel, it won't get flooded with that + unregister_netdevice message anymore. + + Also, I have it tested with ubuntu_stress_smoke_tests as well, to make + sure the sctp stressor won't trigger any issue like in bug 1854968. + + Test kernel can be found here: + https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/ + + [Where problems could occur] + This change is testable. A quick search didn't show any know issue about this patch. And with the same fix running in generic kernel for a while I think the regression potential is minor. + + ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage: linux-signed-oem-5.6 UpgradeStatus: No upgrade log present (probably fresh install) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: In Progress Status in linux-oem-5.6 package in Ubuntu: New Status in linux-oem-5.6 source package in Focal: In Progress Bug description: [Impact] While debugging bug 1880631, I found that this l2tp.sh test from kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with: "unregister_netdevice: waiting
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
** Changed in: ubuntu-kernel-tests Status: New => In Progress ** Also affects: linux-oem-5.6 (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: linux-oem-5.6 (Ubuntu Focal) Status: New => In Progress ** Changed in: linux-oem-5.6 (Ubuntu Focal) Assignee: (unassigned) => Po-Hsu Lin (cypressyew) ** Changed in: ubuntu-kernel-tests Assignee: (unassigned) => Po-Hsu Lin (cypressyew) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: In Progress Status in linux-oem-5.6 package in Ubuntu: New Status in linux-oem-5.6 source package in Focal: In Progress Bug description: Issue found with 5.6.0-1048-oem While debugging bug 1880631, I found that this test will cause dmesg flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 secondes. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg Message from syslogd@glameow at Mar 16 05:01:40 ... kernel:[ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage: linux-signed-oem-5.6 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
I believe this is the fix https://github.com/torvalds/linux/commit/27d53323664c549b5bb2dfaaf6f7ad6e0376a64e ** Package changed: linux-signed-oem-5.6 (Ubuntu) => linux-oem-5.6 (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-signed-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: New Status in linux-oem-5.6 package in Ubuntu: New Bug description: Issue found with 5.6.0-1048-oem While debugging bug 1880631, I found that this test will cause dmesg flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 secondes. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg Message from syslogd@glameow at Mar 16 05:01:40 ... kernel:[ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage: linux-signed-oem-5.6 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6
** Also affects: ubuntu-kernel-tests Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-signed-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919277 Title: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 Status in ubuntu-kernel-tests: New Status in linux-signed-oem-5.6 package in Ubuntu: New Bug description: Issue found with 5.6.0-1048-oem While debugging bug 1880631, I found that this test will cause dmesg flooded with: "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" for about every 10 secondes. Test log: $ sudo ./l2tp.sh TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel[ OK ] TEST: IPv6 route through L2TP tunnel[ OK ] TEST: IPv4 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv4 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel[ OK ] TEST: IPv4 route through L2TP tunnel[ OK ] TEST: IPv6 basic L2TP tunnel - with IPsec [ OK ] TEST: IPv6 route through L2TP tunnel - with IPsec [ OK ] TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ] TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ] Tests passed: 16 Tests failed: 0 dmesg output: $ dmesg Message from syslogd@glameow at Mar 16 05:01:40 ... kernel:[ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 708.560589] eth1: renamed from tmp [ 708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready [ 708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.616950] eth2: renamed from tmp [ 708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 708.687057] l2tp_core: L2TP core driver, V2.0 [ 708.689380] l2tp_netlink: L2TP netlink interface [ 708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3) [ 708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3) [ 708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3) [ 708.788973] Initializing XFRM netlink socket [ 719.448364] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 729.528359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 [ 739.608359] unregister_netdevice: waiting for eth0 to become free. Usage count = 1 ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52 ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19 Uname: Linux 5.6.0-1048-oem x86_64 ApportVersion: 2.20.11-0ubuntu27.16 Architecture: amd64 CasperMD5CheckResult: skip Date: Tue Mar 16 05:20:45 2021 SourcePackage: linux-signed-oem-5.6 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp