-
Notifications
You must be signed in to change notification settings - Fork 4
unregister_netdevice: waiting for tun11 to become free #6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for the report. Basically the "spam" starts when userspace requests the interface to be deleted, but its refcounter hasn't dropped to zero yet. Does it happen fairly often? |
I have seen it once, so can't say... (usually the machine crashed hard somewhere in the middle of the tests, not surviving so much interface+socket creation/deletion activity ;-) - but the crashes are gone with the "skb" patch). The one time I've seen it, userland logs are above - so a Who would be holding a reference to that interface anyway? It can only be userland and ovpn.ko, no? |
it's ovpn holding it, that due to some bug did not properly release it. |
However, the "skb" patch was still deemed somewhat racy, therefore it is being reworked. Ideally you could drop that one and apply these two:
both are in the development branch |
Testing with |
any luck reproducing this issue with the latest code? |
With Will re-test with the next development snapshot... |
Ubuntu 20.04 running some backported version of kernel DCO (20250505 + 4 patches) to test OpenVPN server side with DCO.
One of the servers is a "point to point tls-server" instance (11), which is known to upset things :-) - today it upset something reference counting, it seems. Every 10 seconds, I get
... even if that process isn't actually doing anything right now (waiting for an incoming connection).
There is an interface of this name, and it looks healthy (well, it's down, because no peer is connected, I think)
the spamming started at yesterday morning's test run - here are the last entries from the relevant process, and the first "unregister_netdevice" entries in syslog
And it seems that this also zombified the openvpn process (and we now have two of them)
ending the newer process will remove the "visible" tun11 interface, but the syslog spam still goes on, and the other process also is still stuck:
This does not happen on every run of the p2p tls server, and the machine did not crash, but is not exactly healthy either. I leave it running in case you want me to gather more info.
The text was updated successfully, but these errors were encountered: