This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1886859

Title:
  memory is leaked when tasks are moved to net_prio

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed

Bug description:
  [Impact]
  In some container scenarios, there will be a memory leak, leading to OOM.

  [Test case]
  Run the following:

  while true ; do mkdir net_prio/a unified/a ; bash -c 'echo $$ >
  unified/a/cgroup.procs ; echo $$ > net_prio/a/tasks ; ping -c 1
  localhost > /dev/null' ; rmdir net_prio/a unified/a ; done

  Or the attached program cgroup_leak.c, which is faster. A leak would
  be produced without the fix, while there should be no constant leak
  with the fix applied.

  [Potential regression]
  This patch has also caused breakage with BPF cgroup in the past, when racing 
with its disabling, when one attachs a process to netprio cgroup. Similar 
breakage could happen.


  ---------------------------------

  
  When net_prio is used without setting ifpriomap and BFP cgroup is used, 
memory may be leaked. This was fixed by upstream commit 
090e28b229af92dc5b40786ca673999d59e73056, but it had to be reverted to fix LP 
#1886668.

  When a real fix for this cgroup BFP crash lands, this patch should be
  reinstated.

  Cascardo.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1886859/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to