pass cgroup2 mount options to the kernel#2040
Conversation
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request addresses a critical bug where cgroup v2 mount options were not being propagated to the kernel, leading to ignored VFS options. By modifying the core cgroup mounting functions to correctly accept and pass the Highlights
🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console. Changelog
Activity
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request addresses an issue where cgroup v2 mount options were being ignored. The changes correctly propagate the mount data from process_single_mount down to do_mount_cgroup_v2, ensuring that options like nsdelegate are passed to the kernel. The fix is implemented by adding a data parameter to do_mount_cgroup and do_mount_cgroup_v2. A new test case has been added, which validates the change by confirming that an invalid mount option now correctly results in a mount failure. The implementation appears correct and the test effectively verifies the intended behavior.
02548ba to
fe6c591
Compare
|
Ephemeral COPR build failed. @containers/packit-build please check. |
|
TMT tests failed. @containers/packit-build please check. |
|
/packit retest-failed |
|
@kolyshkin are you fine with the last version? |
|
Ty for feedback, I can address these before merging, will take a look tomorrow |
When mounting the cgroup v2 filesystem, VFS options such as "nsdelegate" were previously ignored because the mount data argument was hardcoded to NULL in do_mount_cgroup_v2(). This commit updates do_mount_cgroup() and do_mount_cgroup_v2() to accept and pass the `data` parameter from process_single_mount(), ensuring that custom cgroup mount options are successfully propagated to the kernel. A new test case has been added to verify this behavior by intentionally passing an invalid mount option and checking for the expected mount failure. Signed-off-by: Chris Henzie <chrishenzie@gmail.com> Assisted-by: gemini-cli
fe6c591 to
52b7016
Compare
When mounting the cgroup v2 filesystem, VFS options such as "nsdelegate" were previously ignored because the mount data argument was hardcoded to
NULLindo_mount_cgroup_v2().This commit updates
do_mount_cgroup()anddo_mount_cgroup_v2()to accept and pass thedataparameter fromprocess_single_mount(), ensuring that custom cgroup mount options are successfully propagated to the kernel.A new test case has been added to verify this behavior by intentionally passing an invalid mount option and checking for the expected mount failure.
Assisted-by: gemini-cli
@samuelkarp @Divya063