[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-04-14 Thread Po-Hsu Lin
$ sudo ./l2tp.sh 
TEST: IPv4 basic L2TP tunnel[ OK ]
TEST: IPv4 route through L2TP tunnel[ OK ]
TEST: IPv6 basic L2TP tunnel[ OK ]
TEST: IPv6 route through L2TP tunnel[ OK ]
TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
TEST: IPv4 basic L2TP tunnel[ OK ]
TEST: IPv4 route through L2TP tunnel[ OK ]
TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

Tests passed:  16
Tests failed:   0
$ echo $?
0
$ uname -a
Linux moe 5.6.0-1053-oem #57-Ubuntu SMP Fri Apr 9 16:13:57 UTC 2021 x86_64 
x86_64 x86_64 GNU/Linux


** Changed in: ubuntu-kernel-tests
   Status: In Progress => Fix Released

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  Fix Released
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux-oem-5.6 source package in Focal:
  Fix Released

Bug description:
  [Impact]
  While debugging bug 1880631, I found that this l2tp.sh test from
  kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel
  flooded with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 seconds.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

  Tests passed:  16
  Tests failed:   0

  dmesg output:
  $ dmesg
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1

  [Fix]
  * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()")

  We have this patch in all of our generic kernels and OEM-5.10, thus
  for now I can see just OEM-5.6 is affected. For which this patch can
  be cherry-picked.

  [Test Case]
  This can tested with the l2tp.sh script in the kernel tree:
  # sh ./tools/testing/selftests/net/l2tp.sh

  With the patched kernel, it won't get 

[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-04-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-oem-5.6 - 5.6.0-1053.57

---
linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042)

  * Packaging resync (LP: #1786013)
- update dkms package versions

  * LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
(LP: #1918134)
- [Packaging] sync dkms-build et al from LRMv4

  * CVE-2021-29154
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-32

  * xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub-
cases (LP: #1909647)
- selftests: xfrm: fix test return value override issue in xfrm_policy.sh

  * ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255
on F-oem-5.6 (LP: #1919147)
- selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support

  * l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
"unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on
F-OEM-5.6 (LP: #1919277)
- l2tp: remove skb_dst_set() from l2tp_xmit_skb()

  * CVE-2020-0466
- epoll: Keep a reference on files added to the check list
- do_epoll_ctl(): clean the failure exits up a bit
- fix regression in "epoll: Keep a reference on files added to the check 
list"

  * CVE-2021-3178
- nfsd4: readdirplus shouldn't return parent of export

  * CVE-2020-25285
- mm/hugetlb: fix a race between hugetlb sysctl handlers

  * CVE-020-10781
- Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()"

  * CVE-2020-14351
- perf/core: Fix race in the perf_mmap_close() function

  * CVE-2020-25669
- Input: sunkbd - avoid use-after-free in teardown paths

  * CVE-2020-14390
- fbcon: remove soft scrollback code

  * CVE-2021-3411
- x86/kprobes: Fix optprobe to detect INT3 padding correctly

  * CVE-2020-0423
- binder: fix UAF when releasing todo list

  * CVE-2020-27830
- speakup: Reject setting the speakup line discipline outside of speakup

  * CVE-2020-0465
- HID: core: Correctly handle ReportSize being zero
- HID: core: Sanitize event code and type when mapping input

  * CVE-2020-25645
- geneve: add transport ports in route lookup for geneve

  * CVE-2021-20194
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
- bpf, cgroup: Fix problematic bounds check

  * CVE-2020-36158
- mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start

 -- Stefan Bader   Fri, 09 Apr 2021 16:43:44
+0200

** Changed in: linux-oem-5.6 (Ubuntu Focal)
   Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0423

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0465

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0466

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14351

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14390

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25285

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25645

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25669

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27830

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-36158

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-20194

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29154

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3178

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3411

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux-oem-5.6 source package in Focal:
  Fix Released

Bug description:
  [Impact]
  While debugging bug 1880631, I found that this l2tp.sh test from
  kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel
  flooded with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 seconds.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - 

[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-04-09 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux-oem-5.6 source package in Focal:
  Fix Committed

Bug description:
  [Impact]
  While debugging bug 1880631, I found that this l2tp.sh test from
  kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel
  flooded with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 seconds.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

  Tests passed:  16
  Tests failed:   0

  dmesg output:
  $ dmesg
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1

  [Fix]
  * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()")

  We have this patch in all of our generic kernels and OEM-5.10, thus
  for now I can see just OEM-5.6 is affected. For which this patch can
  be cherry-picked.

  [Test Case]
  This can tested with the l2tp.sh script in the kernel tree:
  # sh ./tools/testing/selftests/net/l2tp.sh

  With the patched kernel, it won't get flooded with that
  unregister_netdevice message anymore.

  Also, I have it tested with ubuntu_stress_smoke_tests as well, to
  ensure the sctp stressor won't trigger any issue like in bug 1854968.

  A test kernel can be found here:
  https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/

  [Where problems could occur]
  This change is testable. A quick search didn't show any know issue
  regarding this patch. And with the same fix running in different
  generic kernel for a while I think the regression potential can be
  considered as low.

  
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: 

[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-04-05 Thread Tim Gardner
** Changed in: linux-oem-5.6 (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux-oem-5.6 source package in Focal:
  Fix Committed

Bug description:
  [Impact]
  While debugging bug 1880631, I found that this l2tp.sh test from
  kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel
  flooded with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 seconds.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

  Tests passed:  16
  Tests failed:   0

  dmesg output:
  $ dmesg
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1

  [Fix]
  * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()")

  We have this patch in all of our generic kernels and OEM-5.10, thus
  for now I can see just OEM-5.6 is affected. For which this patch can
  be cherry-picked.

  [Test Case]
  This can tested with the l2tp.sh script in the kernel tree:
  # sh ./tools/testing/selftests/net/l2tp.sh

  With the patched kernel, it won't get flooded with that
  unregister_netdevice message anymore.

  Also, I have it tested with ubuntu_stress_smoke_tests as well, to
  ensure the sctp stressor won't trigger any issue like in bug 1854968.

  A test kernel can be found here:
  https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/

  [Where problems could occur]
  This change is testable. A quick search didn't show any know issue
  regarding this patch. And with the same fix running in different
  generic kernel for a while I think the regression potential can be
  considered as low.

  
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-03-25 Thread Po-Hsu Lin
Patch V2
https://lists.ubuntu.com/archives/kernel-team/2021-March/118467.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux-oem-5.6 source package in Focal:
  In Progress

Bug description:
  [Impact]
  While debugging bug 1880631, I found that this l2tp.sh test from
  kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel
  flooded with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 seconds.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

  Tests passed:  16
  Tests failed:   0

  dmesg output:
  $ dmesg
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1

  [Fix]
  * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()")

  We have this patch in all of our generic kernels and OEM-5.10, thus
  for now I can see just OEM-5.6 is affected. For which this patch can
  be cherry-picked.

  [Test Case]
  This can tested with the l2tp.sh script in the kernel tree:
  # sh ./tools/testing/selftests/net/l2tp.sh

  With the patched kernel, it won't get flooded with that
  unregister_netdevice message anymore.

  Also, I have it tested with ubuntu_stress_smoke_tests as well, to
  ensure the sctp stressor won't trigger any issue like in bug 1854968.

  A test kernel can be found here:
  https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/

  [Where problems could occur]
  This change is testable. A quick search didn't show any know issue
  regarding this patch. And with the same fix running in different
  generic kernel for a while I think the regression potential can be
  considered as low.

  
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-03-16 Thread Po-Hsu Lin
https://lists.ubuntu.com/archives/kernel-team/2021-March/118103.html

** Description changed:

  [Impact]
- While debugging bug 1880631, I found that this l2tp.sh test from 
kselftest/net will cause dmesg on Focal OEM 5.6 kernel flooded on with:
+ While debugging bug 1880631, I found that this l2tp.sh test from 
kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
- for about every 10 secondes.
+ for about every 10 seconds.
  
  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]
  
  Tests passed:  16
  Tests failed:   0
  
  dmesg output:
  $ dmesg
  Message from syslogd@glameow at Mar 16 05:01:40 ...
   kernel:[  739.608359] unregister_netdevice: waiting for eth0 to become free. 
Usage count = 1
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  
  [Fix]
  * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()")
  
  We have this patch in our generic kernels F/G/H and OEM-5.10, thus for
  now I can see just OEM-5.6 is affected. For which this patch can be
  cherry-picked.
  
  [Test Case]
  This can tested with the l2tp.sh script in the kernel tree:
  # sh ./tools/testing/selftests/net/l2tp.sh
  
  With the patched kernel, it won't get flooded with that
  unregister_netdevice message anymore.
  
  Also, I have it tested with ubuntu_stress_smoke_tests as well, to make
  sure the sctp stressor won't trigger any issue like in bug 1854968.
  
  Test kernel can be found here:
  https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/
  
  [Where problems could occur]
- This change is testable. A quick search didn't show any know issue about this 
patch. And with the same fix running in generic kernel for a while I think the 
regression potential is minor.
- 
+ This change is testable. A quick search didn't show any know issue regarding 
this patch. And with the same fix running in generic kernel for a while I think 
the regression potential is low. 
  
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

** Description changed:

  [Impact]
  While debugging bug 1880631, I found that this l2tp.sh test from 
kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 seconds.
  
  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: 

[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-03-16 Thread Po-Hsu Lin
** Description changed:

- Issue found with 5.6.0-1048-oem
- 
- While debugging bug 1880631, I found that this test will cause dmesg flooded 
with:
+ [Impact]
+ While debugging bug 1880631, I found that this l2tp.sh test from 
kselftest/net will cause dmesg on Focal OEM 5.6 kernel flooded on with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 secondes.
  
  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]
  
  Tests passed:  16
  Tests failed:   0
  
  dmesg output:
  $ dmesg
  Message from syslogd@glameow at Mar 16 05:01:40 ...
-  kernel:[  739.608359] unregister_netdevice: waiting for eth0 to become free. 
Usage count = 1
+  kernel:[  739.608359] unregister_netdevice: waiting for eth0 to become free. 
Usage count = 1
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  
+ [Fix]
+ * 27d53323664c54 ("l2tp: remove skb_dst_set() from l2tp_xmit_skb()")
+ 
+ We have this patch in our generic kernels F/G/H and OEM-5.10, thus for
+ now I can see just OEM-5.6 is affected. For which this patch can be
+ cherry-picked.
+ 
+ [Test Case]
+ This can tested with the l2tp.sh script in the kernel tree:
+ # sh ./tools/testing/selftests/net/l2tp.sh
+ 
+ With the patched kernel, it won't get flooded with that
+ unregister_netdevice message anymore.
+ 
+ Also, I have it tested with ubuntu_stress_smoke_tests as well, to make
+ sure the sctp stressor won't trigger any issue like in bug 1854968.
+ 
+ Test kernel can be found here:
+ https://people.canonical.com/~phlin/kernel/lp-1919277-l2tp/
+ 
+ [Where problems could occur]
+ This change is testable. A quick search didn't show any know issue about this 
patch. And with the same fix running in generic kernel for a while I think the 
regression potential is minor.
+ 
+ 
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-oem-5.6 package in Ubuntu:
  New
Status in linux-oem-5.6 source package in Focal:
  In Progress

Bug description:
  [Impact]
  While debugging bug 1880631, I found that this l2tp.sh test from 
kselftest/net will cause the dmesg output on Focal OEM 5.6 kernel flooded with:
  "unregister_netdevice: waiting 

[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-03-16 Thread Po-Hsu Lin
** Changed in: ubuntu-kernel-tests
   Status: New => In Progress

** Also affects: linux-oem-5.6 (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-5.6 (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux-oem-5.6 (Ubuntu Focal)
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

** Changed in: ubuntu-kernel-tests
 Assignee: (unassigned) => Po-Hsu Lin (cypressyew)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-oem-5.6 package in Ubuntu:
  New
Status in linux-oem-5.6 source package in Focal:
  In Progress

Bug description:
  Issue found with 5.6.0-1048-oem

  While debugging bug 1880631, I found that this test will cause dmesg flooded 
with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 secondes.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

  Tests passed:  16
  Tests failed:   0

  dmesg output:
  $ dmesg
  Message from syslogd@glameow at Mar 16 05:01:40 ...
   kernel:[  739.608359] unregister_netdevice: waiting for eth0 to become free. 
Usage count = 1
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-03-16 Thread Po-Hsu Lin
I believe this is the fix
https://github.com/torvalds/linux/commit/27d53323664c549b5bb2dfaaf6f7ad6e0376a64e

** Package changed: linux-signed-oem-5.6 (Ubuntu) => linux-oem-5.6
(Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  New
Status in linux-oem-5.6 package in Ubuntu:
  New

Bug description:
  Issue found with 5.6.0-1048-oem

  While debugging bug 1880631, I found that this test will cause dmesg flooded 
with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 secondes.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

  Tests passed:  16
  Tests failed:   0

  dmesg output:
  $ dmesg
  Message from syslogd@glameow at Mar 16 05:01:40 ...
   kernel:[  739.608359] unregister_netdevice: waiting for eth0 to become free. 
Usage count = 1
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1919277] Re: l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6

2021-03-16 Thread Po-Hsu Lin
** Also affects: ubuntu-kernel-tests
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919277

Title:
  l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
  "unregister_netdevice: waiting for eth0 to become free. Usage count =
  1" on F-OEM-5.6

Status in ubuntu-kernel-tests:
  New
Status in linux-signed-oem-5.6 package in Ubuntu:
  New

Bug description:
  Issue found with 5.6.0-1048-oem

  While debugging bug 1880631, I found that this test will cause dmesg flooded 
with:
  "unregister_netdevice: waiting for eth0 to become free. Usage count = 1"
  for about every 10 secondes.

  Test log:
  $ sudo ./l2tp.sh
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel[ OK ]
  TEST: IPv6 route through L2TP tunnel[ OK ]
  TEST: IPv4 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel[ OK ]
  TEST: IPv4 route through L2TP tunnel[ OK ]
  TEST: IPv6 basic L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv6 route through L2TP tunnel - with IPsec   [ OK ]
  TEST: IPv4 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv4 route through L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 basic L2TP tunnel - after IPsec teardown [ OK ]
  TEST: IPv6 route through L2TP tunnel - after IPsec teardown [ OK ]

  Tests passed:  16
  Tests failed:   0

  dmesg output:
  $ dmesg
  Message from syslogd@glameow at Mar 16 05:01:40 ...
   kernel:[  739.608359] unregister_netdevice: waiting for eth0 to become free. 
Usage count = 1
  [  708.560589] eth1: renamed from tmp
  [  708.587396] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
  [  708.587472] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.616950] eth2: renamed from tmp
  [  708.643341] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  [  708.687057] l2tp_core: L2TP core driver, V2.0
  [  708.689380] l2tp_netlink: L2TP netlink interface
  [  708.695479] l2tp_ip: L2TP IP encapsulation support (L2TPv3)
  [  708.700061] l2tp_eth: L2TP ethernet pseudowire support (L2TPv3)
  [  708.726295] l2tp_ip6: L2TP IP encapsulation support for IPv6 (L2TPv3)
  [  708.788973] Initializing XFRM netlink socket
  [  719.448364] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  729.528359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1
  [  739.608359] unregister_netdevice: waiting for eth0 to become free. Usage 
count = 1

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1048-oem 5.6.0-1048.52
  ProcVersionSignature: User Name 5.6.0-1048.52-oem 5.6.19
  Uname: Linux 5.6.0-1048-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Mar 16 05:20:45 2021
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919277/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp