[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-12-15 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-xilinx-
zynqmp/5.4.0-1020.24 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-focal' to 'verification-
done-focal'. If the problem still exists, change the tag 'verification-
needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-focal-linux-xilinx-zynqmp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Focal:
  Fix Released

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-12-13 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-azure/5.4.0-1100.106
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-focal' to 'verification-done-focal'. If the
problem still exists, change the tag 'verification-needed-focal' to
'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags removed: verification-done-focal
** Tags added: kernel-spammed-focal-linux-azure verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Focal:
  Fix Released

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-11-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-132.148

---
linux (5.4.0-132.148) focal; urgency=medium

  * CVE-2022-42719
- mac80211: mlme: find auth challenge directly
- wifi: mac80211: don't parse mbssid in assoc response
- wifi: mac80211: fix MBSSID parsing use-after-free

  * iavf: SR-IOV VFs error with no traffic flow when MTU greater than 1500
(LP: #1983656)
- iavf: Fix set max MTU size with port VLAN and jumbo frames
- i40e: Fix VF set max MTU size

  * fib_nexthop_nongw.sh from ubuntu_kernel_selftests failed on B-5.4
(LP: #1990800)
- SAUCE: selftests/net: skipping tests for older ip command releases

  * CVE-2022-29901
- Revert "x86/speculation: Add RSB VM Exit protections"
- Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- x86/devicetable: Move x86 specific macro out of generic code
- x86/cpu: Add consistent CPU match macros
- x86/cpu: Add a steppings field to struct x86_cpu_id
- x86/kvm/vmx: Make noinstr clean
- x86/cpufeatures: Move RETPOLINE flags to word 11
- x86/bugs: Report AMD retbleed vulnerability
- x86/bugs: Add AMD retbleed= boot parameter
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- x86/entry: Remove skip_r11rcx
- x86/entry: Add kernel IBRS implementation
- x86/bugs: Optimize SPEC_CTRL MSR writes
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- x86/bugs: Split spectre_v2_select_mitigation() and
  spectre_v2_user_select_mitigation()
- x86/bugs: Report Intel retbleed vulnerability
- intel_idle: Disable IBRS during long idle
- x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- x86/speculation: Fix firmware entry SPEC_CTRL handling
- x86/speculation: Fix SPEC_CTRL write on SMT state change
- x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- x86/speculation: Remove x86_spec_ctrl_mask
- KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
- KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
- KVM: VMX: Flatten __vmx_vcpu_run()
- KVM: VMX: Convert launched argument to flags
- KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- KVM: VMX: Fix IBRS handling after vmexit
- x86/speculation: Fill RSB on vmexit for IBRS
- x86/common: Stamp out the stepping madness
- x86/cpu/amd: Enumerate BTC_NO
- x86/bugs: Add Cannon lake to RETBleed affected CPU list
- x86/speculation: Disable RRSBA behavior
- x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
- x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- x86/speculation: Add RSB VM Exit protections

  * ACPI: processor idle: Practically limit "Dummy wait" workaround to old Intel
systems (LP: #1990985)
- ACPI: processor_idle: Skip dummy wait if kernel is in guest
- ACPI: processor idle: Practically limit "Dummy wait" workaround to old 
Intel
  systems

  * cgroup: all controllers mounted when using 'cgroup_no_v1=' (LP: #1988584)
- cgroup-v1: add disabled controller check in cgroup1_parse_param()

  * Focal update: v5.4.212 upstream stable release (LP: #1991156)
- audit: fix potential double free on error path from 
fsnotify_add_inode_mark
- parisc: Fix exception handler for fldw and fstw instructions
- kernel/sys_ni: add compat entry for fadvise64_64
- usb: cdns3: Fix issue for clear halt endpoint
- pinctrl: amd: Don't save/restore interrupt status and wake status bits
- sched/deadline: Unthrottle PI boosted threads while enqueuing
- sched/deadline: Fix stale throttling on de-/boosted tasks
- sched/deadline: Fix priority inheritance with multiple scheduling classes
- kernel/sched: Remove dl_boosted flag comment
- xfrm: fix refcount leak in __xfrm_policy_check()
- SUNRPC: RPC level errors should set task->tk_rpc_status
- rose: check NULL rose_loopback_neigh->loopback
- net/mlx5e: Properly disable vlan strip on non-UL reps
- net: moxa: get rid of asymmetry in DMA mapping/unmapping
- bonding: 802.3ad: fix no transmission of LACPDUs
- net: ipvtap - add __init/__exit annotations to module init/exit funcs
- netfilter: ebtables: reject blobs that don't provide all entry points
- bnxt_en: fix NQ resource accounting during vf creation on 57500 chips
- netfilter: nft_payload: report ERANGE for too long offset and length
- netfilter: nft_payload: do not truncate csum_offset and csum_type
- netfilter: nft_osf: restrict osf to ipv4, ipv6 and inet families
- netfilter: nft_tunnel: restrict it to netdev family
- net: Fix data-races around weight_p and dev_weight_[rt]x_bias.
- net: Fix data-races around netdev_tstamp_prequeue.
- ratelimit: Fix data-races in ___ratelimit().
- net: Fix a data-race around sysctl_tstamp_allow_data.
- net: Fix a data-race 

[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-10-26 Thread Nicolas Dichtel
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Focal:
  Fix Committed

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-10-24 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux/5.4.0-132.148 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-focal' to 'verification-done-focal'. If the problem
still exists, change the tag 'verification-needed-focal' to
'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Focal:
  Fix Committed

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-10-05 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Focal:
  Fix Committed

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-09-15 Thread Stefan Bader
** Changed in: linux (Ubuntu)
   Status: Incomplete => Fix Released

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Focal:
  In Progress

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-09-02 Thread Luke Nowakowski-Krijger
** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Focal)
 Assignee: (unassigned) => Luke Nowakowski-Krijger (lukenow)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Focal:
  Confirmed

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988584] Re: cgroup: all controllers mounted when using 'cgroup_no_v1='

2022-09-02 Thread Nicolas Dichtel
** Summary changed:

- cgroup: all controller mounted when using 'cgroup_no_v1='
+ cgroup: all controllers mounted when using 'cgroup_no_v1='

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988584

Title:
  cgroup: all controllers mounted when using 'cgroup_no_v1='

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]

  When mounting a cgroup hierarchy with disabled controller in cgroup v1,
  all available controllers will be attached.
  For example, boot with cgroup_no_v1=cpu or cgroup_disable=cpu, and then
  mount with "mount -t cgroup -ocpu cpu /sys/fs/cgroup/cpu", then all
  enabled controllers will be attached except cpu.

  This exists since linux v5.1 and fixed in linux v5.11 with this commit:
  61e960b07b63 cgroup-v1: add disabled controller check in cgroup1_parse_param()

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=61e960b07b637

  [Test Case]

  root@dut-vm:~# kexec -l /boot/vmlinuz-5.4.0-122-generic 
--initrd=/boot/initrd.img-5.4.0-122-generic --command-line="$(cat 
/proc/cmdline) cgroup_no_v1=net_prio,net_cls"
  root@dut-vm:~# systemctl kexec
  root@dut-vm:~# mount | grep cgroup
  tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
  cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
  cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
  cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset,cpu,cpuacct,blkio,memory,devices,freezer,perf_event,hugetlb,pids,rdma)

  
  => All controllers are associated to /sys/fs/cgroup/net_cls,net_prio.
  Note that several reboots may be needed to reproduce the problem (it fails 
only when systemd tries to mount 'net_cls,net_prio' first, but the order is 
random).

  [Regression Potential]

  The patch is located in cgroup1_parse_param(), the potential
  regressions are low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988584/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp