* Waiting for vrf to become free on rmmod of bridge...
@ 2019-02-06 23:20 Ben Greear
2019-02-07 1:50 ` David Ahern
0 siblings, 1 reply; 3+ messages in thread
From: Ben Greear @ 2019-02-06 23:20 UTC (permalink / raw)
To: netdev
Hello,
I just saw this warning on a system running a hacked 4.20.2+ kernel. Any known bugs
of this nature in this (upstream) kernel? The command that is blocked is:
'rmmod bridge llc'
[17069.299135] unregister_netdevice: waiting for _vrf13 to become free. Usage count = 1
[17079.306438] unregister_netdevice: waiting for _vrf13 to become free. Usage count = 1
[17089.314656] unregister_netdevice: waiting for _vrf13 to become free. Usage count = 1
[17099.322870] unregister_netdevice: waiting for _vrf13 to become free. Usage count = 1
Thanks,
Ben
--
Ben Greear <greearb@candelatech.com>
Candela Technologies Inc http://www.candelatech.com
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Waiting for vrf to become free on rmmod of bridge...
2019-02-06 23:20 Waiting for vrf to become free on rmmod of bridge Ben Greear
@ 2019-02-07 1:50 ` David Ahern
2019-02-08 18:12 ` Ben Greear
0 siblings, 1 reply; 3+ messages in thread
From: David Ahern @ 2019-02-07 1:50 UTC (permalink / raw)
To: Ben Greear, netdev
On 2/6/19 3:20 PM, Ben Greear wrote:
> Hello,
>
> I just saw this warning on a system running a hacked 4.20.2+ kernel.
> Any known bugs
> of this nature in this (upstream) kernel? The command that is blocked is:
> 'rmmod bridge llc'
>
> [17069.299135] unregister_netdevice: waiting for _vrf13 to become free.
> Usage count = 1
> [17079.306438] unregister_netdevice: waiting for _vrf13 to become free.
> Usage count = 1
> [17089.314656] unregister_netdevice: waiting for _vrf13 to become free.
> Usage count = 1
> [17099.322870] unregister_netdevice: waiting for _vrf13 to become free.
> Usage count = 1
>
> Thanks,
> Ben
>
No known refcount issues with vrf.
I use namespaces for testing which creates devices, adds routes, runs
traffic and deletes the device and namespace. That series in the tests
has been known to trigger refcount problems in the past.
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Waiting for vrf to become free on rmmod of bridge...
2019-02-07 1:50 ` David Ahern
@ 2019-02-08 18:12 ` Ben Greear
0 siblings, 0 replies; 3+ messages in thread
From: Ben Greear @ 2019-02-08 18:12 UTC (permalink / raw)
To: David Ahern, netdev
On 2/6/19 5:50 PM, David Ahern wrote:
> On 2/6/19 3:20 PM, Ben Greear wrote:
>> Hello,
>>
>> I just saw this warning on a system running a hacked 4.20.2+ kernel.
>> Any known bugs
>> of this nature in this (upstream) kernel? The command that is blocked is:
>> 'rmmod bridge llc'
>>
>> [17069.299135] unregister_netdevice: waiting for _vrf13 to become free.
>> Usage count = 1
>> [17079.306438] unregister_netdevice: waiting for _vrf13 to become free.
>> Usage count = 1
>> [17089.314656] unregister_netdevice: waiting for _vrf13 to become free.
>> Usage count = 1
>> [17099.322870] unregister_netdevice: waiting for _vrf13 to become free.
>> Usage count = 1
>>
>> Thanks,
>> Ben
>>
>
> No known refcount issues with vrf.
>
> I use namespaces for testing which creates devices, adds routes, runs
> traffic and deletes the device and namespace. That series in the tests
> has been known to trigger refcount problems in the past.
I'm not using namespaces in my test, but it is fairly convoluted. If I
figure out how to reproduce the issue I'll let you know.
Thanks,
Ben
--
Ben Greear <greearb@candelatech.com>
Candela Technologies Inc http://www.candelatech.com
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2019-02-08 18:12 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-02-06 23:20 Waiting for vrf to become free on rmmod of bridge Ben Greear
2019-02-07 1:50 ` David Ahern
2019-02-08 18:12 ` Ben Greear
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.