diff --git a/sdk_container/src/third_party/coreos-overlay/changelog/updates/2023-01-15-linux-5.15.88-update.md b/sdk_container/src/third_party/coreos-overlay/changelog/updates/2023-01-15-linux-5.15.88-update.md new file mode 100644 index 0000000000..6e5c0e1cb7 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/changelog/updates/2023-01-15-linux-5.15.88-update.md @@ -0,0 +1 @@ +- Linux ([5.15.88](https://lwn.net/Articles/920012) (includes [5.15.87](https://lwn.net/Articles/919793))) diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-5.15.86.ebuild b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-5.15.88.ebuild similarity index 100% rename from sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-5.15.86.ebuild rename to sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-kernel/coreos-kernel-5.15.88.ebuild diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-5.15.86.ebuild b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-5.15.88.ebuild similarity index 100% rename from sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-5.15.86.ebuild rename to sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-modules/coreos-modules-5.15.88.ebuild diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest index 0e95c776eb..a4986aa051 100644 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest +++ b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/Manifest @@ -1,2 +1,2 @@ DIST linux-5.15.tar.xz 121913744 BLAKE2B 3921274b23f7938abdf3ed9334534b4581e13d7484303d3a5280eddb038999aaa8b836666a487472d9c4a219af0f06b9fecccaf348fb5510ab8762f4ef4b7e83 SHA512 d25ad40b5bcd6a4c6042fd0fd84e196e7a58024734c3e9a484fd0d5d54a0c1d87db8a3c784eff55e43b6f021709dc685eb0efa18d2aec327e4f88a79f405705a -DIST patch-5.15.86.xz 3367720 BLAKE2B 669d633a4540188761e991fa680236853ac01ebece18868b4dfc5607ad281c9ecfa9d9cad3ffcc156ae858ae1961965ab4ec0c799db873a8a356b9d183ef6e9d SHA512 c1552ed1c10a44cbfd6e6d995f05adbaa62554460e4f8bae124eaf30efd49972bc1f5ece5c6bcc20c4f21fd1ff05a3d7b662b3d98cd8e2f3a3a7e186f3aba53b +DIST patch-5.15.88.xz 3438680 BLAKE2B 6f5aa9332b97a279ae59dfea4b3554ca6efeeef01a11c5dec72f84f94cd3116029b800aea02bbad1aa3d1c72a8f14415819fe7473946c249c6451fb465fab339 SHA512 f15d1a9b286505f4423a47d23bc5d9a84966132683ce04c6a03b090c392496b9f665c27e32b28785c38bc13f920d2888b10d5b7e6428891a11f4c3d5b795d7ed diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-5.15.86.ebuild b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-5.15.88.ebuild similarity index 96% rename from sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-5.15.86.ebuild rename to sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-5.15.88.ebuild index bd7c48f629..e9a1883c76 100644 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-5.15.86.ebuild +++ b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/coreos-sources-5.15.88.ebuild @@ -42,5 +42,4 @@ UNIPATCH_LIST=" ${PATCH_DIR}/z0005-Drivers-hv-vmbus-Propagate-VMbus-coherence-to-each-V.patch \ ${PATCH_DIR}/z0006-PCI-hv-Avoid-the-retarget-interrupt-hypercall-in-irq.patch \ ${PATCH_DIR}/z0007-PCI-hv-Remove-unused-hv_set_msi_entry_from_desc.patch \ - ${PATCH_DIR}/z0008-ext4-Fix-deadlock-due-to-mbcache-en.patch \ " diff --git a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/5.15/z0008-ext4-Fix-deadlock-due-to-mbcache-en.patch b/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/5.15/z0008-ext4-Fix-deadlock-due-to-mbcache-en.patch deleted file mode 100644 index d82de52260..0000000000 --- a/sdk_container/src/third_party/coreos-overlay/sys-kernel/coreos-sources/files/5.15/z0008-ext4-Fix-deadlock-due-to-mbcache-en.patch +++ /dev/null @@ -1,129 +0,0 @@ -From e7ec42e181c6213d1fd71b946196f05af601ba5c Mon Sep 17 00:00:00 2001 -From: Jan Kara -Date: Mon, 21 Nov 2022 15:44:10 +0100 -Subject: [PATCH] ext4: Fix deadlock due to mbcache entry corruption - -When manipulating xattr blocks, we can deadlock infinitely looping -inside ext4_xattr_block_set() where we constantly keep finding xattr -block for reuse in mbcache but we are unable to reuse it because its -reference count is too big. This happens because cache entry for the -xattr block is marked as reusable (e_reusable set) although its -reference count is too big. When this inconsistency happens, this -inconsistent state is kept indefinitely and so ext4_xattr_block_set() -keeps retrying indefinitely. - -The inconsistent state is caused by non-atomic update of e_reusable bit. -e_reusable is part of a bitfield and e_reusable update can race with -update of e_referenced bit in the same bitfield resulting in loss of one -of the updates. Fix the problem by using atomic bitops instead. - -[jeremi: backport from here https://lore.kernel.org/linux-ext4/20221122174807.GA9658@linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net/] -CC: stable@vger.kernel.org -Fixes: 6048c64b2609 ("mbcache: add reusable flag to cache entries") -Reported-by: Jeremi Piotrowski -Reported-by: Thilo Fromm -Signed-off-by: Jan Kara ---- - fs/ext4/xattr.c | 4 ++-- - fs/mbcache.c | 14 ++++++++------ - include/linux/mbcache.h | 9 +++++++-- - 3 files changed, 17 insertions(+), 10 deletions(-) - -diff --git a/fs/ext4/xattr.c b/fs/ext4/xattr.c -index 533216e80fa2..22700812a4d3 100644 ---- a/fs/ext4/xattr.c -+++ b/fs/ext4/xattr.c -@@ -1281,7 +1281,7 @@ ext4_xattr_release_block(handle_t *handle, struct inode *inode, - ce = mb_cache_entry_get(ea_block_cache, hash, - bh->b_blocknr); - if (ce) { -- ce->e_reusable = 1; -+ set_bit(MBE_REUSABLE_B, &ce->e_flags); - mb_cache_entry_put(ea_block_cache, ce); - } - } -@@ -2042,7 +2042,7 @@ ext4_xattr_block_set(handle_t *handle, struct inode *inode, - } - BHDR(new_bh)->h_refcount = cpu_to_le32(ref); - if (ref == EXT4_XATTR_REFCOUNT_MAX) -- ce->e_reusable = 0; -+ clear_bit(MBE_REUSABLE_B, &ce->e_flags); - ea_bdebug(new_bh, "reusing; refcount now=%d", - ref); - ext4_xattr_block_csum_set(inode, new_bh); -diff --git a/fs/mbcache.c b/fs/mbcache.c -index 2010bc80a3f2..ac07b50ea3df 100644 ---- a/fs/mbcache.c -+++ b/fs/mbcache.c -@@ -94,8 +94,9 @@ int mb_cache_entry_create(struct mb_cache *cache, gfp_t mask, u32 key, - atomic_set(&entry->e_refcnt, 1); - entry->e_key = key; - entry->e_value = value; -- entry->e_reusable = reusable; -- entry->e_referenced = 0; -+ entry->e_flags = 0; -+ if (reusable) -+ set_bit(MBE_REUSABLE_B, &entry->e_flags); - head = mb_cache_entry_head(cache, key); - hlist_bl_lock(head); - hlist_bl_for_each_entry(dup, dup_node, head, e_hash_list) { -@@ -155,7 +156,8 @@ static struct mb_cache_entry *__entry_find(struct mb_cache *cache, - while (node) { - entry = hlist_bl_entry(node, struct mb_cache_entry, - e_hash_list); -- if (entry->e_key == key && entry->e_reusable) { -+ if (entry->e_key == key && -+ test_bit(MBE_REUSABLE_B, &entry->e_flags)) { - atomic_inc(&entry->e_refcnt); - goto out; - } -@@ -325,7 +327,7 @@ EXPORT_SYMBOL(mb_cache_entry_delete_or_get); - void mb_cache_entry_touch(struct mb_cache *cache, - struct mb_cache_entry *entry) - { -- entry->e_referenced = 1; -+ set_bit(MBE_REFERENCED_B, &entry->e_flags); - } - EXPORT_SYMBOL(mb_cache_entry_touch); - -@@ -350,8 +352,8 @@ static unsigned long mb_cache_shrink(struct mb_cache *cache, - while (nr_to_scan-- && !list_empty(&cache->c_list)) { - entry = list_first_entry(&cache->c_list, - struct mb_cache_entry, e_list); -- if (entry->e_referenced || atomic_read(&entry->e_refcnt) > 2) { -- entry->e_referenced = 0; -+ if (test_bit(MBE_REFERENCED_B, &entry->e_flags) || atomic_read(&entry->e_refcnt) > 2) { -+ clear_bit(MBE_REFERENCED_B, &entry->e_flags); - list_move_tail(&entry->e_list, &cache->c_list); - continue; - } -diff --git a/include/linux/mbcache.h b/include/linux/mbcache.h -index 8eca7f25c432..62927f7e2588 100644 ---- a/include/linux/mbcache.h -+++ b/include/linux/mbcache.h -@@ -10,6 +10,12 @@ - - struct mb_cache; - -+/* Cache entry flags */ -+enum { -+ MBE_REFERENCED_B = 0, -+ MBE_REUSABLE_B -+}; -+ - struct mb_cache_entry { - /* List of entries in cache - protected by cache->c_list_lock */ - struct list_head e_list; -@@ -18,8 +24,7 @@ struct mb_cache_entry { - atomic_t e_refcnt; - /* Key in hash - stable during lifetime of the entry */ - u32 e_key; -- u32 e_referenced:1; -- u32 e_reusable:1; -+ unsigned long e_flags; - /* User provided value - stable during lifetime of the entry */ - u64 e_value; - }; --- -2.25.1 -