From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C616DC3ABDD for ; Thu, 15 May 2025 18:23:57 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B94648D0006; Thu, 15 May 2025 14:23:41 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B6B788D0001; Thu, 15 May 2025 14:23:41 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 999D38D0006; Thu, 15 May 2025 14:23:41 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 796B88D0001 for ; Thu, 15 May 2025 14:23:41 -0400 (EDT) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 3597C803DC for ; Thu, 15 May 2025 18:23:42 +0000 (UTC) X-FDA: 83445965484.03.2D7C61E Received: from mail-qk1-f180.google.com (mail-qk1-f180.google.com [209.85.222.180]) by imf12.hostedemail.com (Postfix) with ESMTP id 9387E40007 for ; Thu, 15 May 2025 18:23:40 +0000 (UTC) Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=soleen-com.20230601.gappssmtp.com header.s=20230601 header.b=ps3NlHlR; spf=pass (imf12.hostedemail.com: domain of pasha.tatashin@soleen.com designates 209.85.222.180 as permitted sender) smtp.mailfrom=pasha.tatashin@soleen.com; dmarc=pass (policy=none) header.from=soleen.com ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=soleen-com.20230601.gappssmtp.com header.s=20230601 header.b=ps3NlHlR; spf=pass (imf12.hostedemail.com: domain of pasha.tatashin@soleen.com designates 209.85.222.180 as permitted sender) smtp.mailfrom=pasha.tatashin@soleen.com; dmarc=pass (policy=none) header.from=soleen.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1747333420; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=fncEWK+MZKkah5dMCpMCDEnPbBrReOK9LaFvpIbRDZQ=; b=rnNFq5PWULv42RvpTFYSJmMC8vnUmzcnpuLXI9c2/xd1vCz7oxM6wh5o29MpKIO098ufnI 52r+uSpjYKk7mLYcTMJtFfre+rw7dpaN60yBoAjON5G8Hbq3Vzm9BwQwo+QoDsFBu6mMCt lvgAmovIUwTFrv7Dt1YMKiZG+J7q6o0= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1747333420; a=rsa-sha256; cv=none; b=6+cHp0U0jqN0264jy6kwl73Axq0djYUsvdMOfLqR8CqjuIkTLIl2rWNa8szTfaMMhuCc6T ECFxaTYmdnvTOUNWTL38SoXjmLBYRn15jjMVcs95xIMLYzdUPiRH1kuCkUXcci1MfO8hTS 3u+Cs73ADfk4QNvrweMBOBXWJ6uTt4g= Received: by mail-qk1-f180.google.com with SMTP id af79cd13be357-7c5ba363f1aso166858785a.0 for ; Thu, 15 May 2025 11:23:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=soleen-com.20230601.gappssmtp.com; s=20230601; t=1747333420; x=1747938220; darn=kvack.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=fncEWK+MZKkah5dMCpMCDEnPbBrReOK9LaFvpIbRDZQ=; b=ps3NlHlRpbb11WGdckpUcpYzu3gPBXX3E9lfTzR7xK+DMdVwK30TtxsIZXb54bK4tQ OnZiTfc+1707/SCEXmZ1A4CdqUtvbq/r+2IgYMUfs9Nx9m4NsUxgJhbK7Zqf6nfiWzMv eYHzz10qLV4cNhrrNQKoM4uRfCfppWeleai+fnR8iz2NI9Z3+L3LyN5zF/T9fbhJzmx0 VwxMvhWc1joifxxe89MsdyfC40A3y6OkU+2NA+y3UK/bKG4CmrTM9bmC9d2TjTZpncrS Ly8Eu6mEm/XE+AKcUgaBJwAuwd87cQ3L7APNhWP2E8ne9WK134pT7ybXx701hJ7lxhlI ZPdg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1747333420; x=1747938220; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=fncEWK+MZKkah5dMCpMCDEnPbBrReOK9LaFvpIbRDZQ=; b=Axs7I8pygWp9PD84yIsJ4po6Enl/gqvpGufxtZVq0ZV31NhQiXAQAs4necT49BqkaM EWw2VRUF9JKjXVhroDdkYcLgCI+uEzbaOy+yfd7JNC+0Nd4ieExpOR/TaFyxB5n2+wTx VBvkWPTpMK1IsYz8GRFAuinbYauHPAMiuJvixEpwuYR4vGx8v9bXLEt4VY+zpxUEdsvJ 7jU08wrgBMCSmQbCP6BfvKzDYrMtSgzJTavfefNWbPTCv5hekhbEUNusSC+RCYFIWWTV 9otUahdg6C1qkal/xZD+Kk1QD88dKhe69wTmCaRaPinabnhfNiN5vIOgOvUvzTa9IfJU UdBg== X-Forwarded-Encrypted: i=1; AJvYcCWTpQM8I/OhHW2XXr4rnhDlqBmx/Kv5d0Gq9UJUIgPOxfYNczwbnzd3u4P3F7efQy5SociPv2uBcw==@kvack.org X-Gm-Message-State: AOJu0YyCJu354x60S9+inHfj5MisAfb0oL2HCgj/ECpeTX2iKVoYdQT4 +1brkXyfVgaEeHCz+6zM7iMNZoVzmBHO1UomziKRjRIvUJ8qTI6z7QjgItTZj+c1Tz8= X-Gm-Gg: ASbGncvqequeweJtSDFJeo8LIUQJPMxzH+O7SRbcb8//LG6942RR+I7iV/AoKMJVngx S3vpZ0/nSNiO8lgfiWTkY/ahx9cesXWkUBsQww9eYjQIVjHRceeaP9FW09xuY1ZVVDSHkusMTa2 3zszo4MdWIgN8Lc8xrh9ymAcYxPJ69p8cUaaFVmS9u5HcrJUo4EuIOlQDw7p1J8nFkIyQaKZppJ 2Oe0hK+Df5932Lv6xpA8BeNEo7IhwvrqjffijDPatYx1iT279ms8DTGEeZA7QBQkqOiE9NQautJ 0DwDOGPoq0weVZbSX9S8EYgNQ6/iIMYfVFq6ek20a6uyJKa0698I516QnDTVWF5iL8VhxsL41aR RpIEXoEr+lpR2AKCXI/V6hlmAR7YCnmRK8LEXc5uAo47/CHBRthVXFBM= X-Google-Smtp-Source: AGHT+IF6BdiwFI8/g0r4fDQt5wq8NzbRLR+StKi364/jhbEBEOuKAsf85B0QaQPF6JgbzPbIYHnMjA== X-Received: by 2002:a05:620a:24d6:b0:7c5:562d:ccfa with SMTP id af79cd13be357-7cd46792d1dmr78474085a.36.1747333419419; Thu, 15 May 2025 11:23:39 -0700 (PDT) Received: from soleen.c.googlers.com.com (138.200.150.34.bc.googleusercontent.com. [34.150.200.138]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7cd466fc2afsm18218685a.0.2025.05.15.11.23.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 15 May 2025 11:23:39 -0700 (PDT) From: Pasha Tatashin To: pratyush@kernel.org, jasonmiu@google.com, graf@amazon.com, changyuanl@google.com, pasha.tatashin@soleen.com, rppt@kernel.org, dmatlack@google.com, rientjes@google.com, corbet@lwn.net, rdunlap@infradead.org, ilpo.jarvinen@linux.intel.com, kanie@linux.alibaba.com, ojeda@kernel.org, aliceryhl@google.com, masahiroy@kernel.org, akpm@linux-foundation.org, tj@kernel.org, yoann.congal@smile.fr, mmaurer@google.com, roman.gushchin@linux.dev, chenridong@huawei.com, axboe@kernel.dk, mark.rutland@arm.com, jannh@google.com, vincent.guittot@linaro.org, hannes@cmpxchg.org, dan.j.williams@intel.com, david@redhat.com, joel.granados@kernel.org, rostedt@goodmis.org, anna.schumaker@oracle.com, song@kernel.org, zhangguopeng@kylinos.cn, linux@weissschuh.net, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, gregkh@linuxfoundation.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, rafael@kernel.org, dakr@kernel.org, bartosz.golaszewski@linaro.org, cw00.choi@samsung.com, myungjoo.ham@samsung.com, yesanishhere@gmail.com, Jonathan.Cameron@huawei.com, quic_zijuhu@quicinc.com, aleksander.lobakin@intel.com, ira.weiny@intel.com, andriy.shevchenko@linux.intel.com, leon@kernel.org, lukas@wunner.de, bhelgaas@google.com, wagi@kernel.org, djeffery@redhat.com, stuart.w.hayes@gmail.com, ptyadav@amazon.de Subject: [RFC v2 09/16] luo: luo_files: implement file systems callbacks Date: Thu, 15 May 2025 18:23:13 +0000 Message-ID: <20250515182322.117840-10-pasha.tatashin@soleen.com> X-Mailer: git-send-email 2.49.0.1101.gccaa498523-goog In-Reply-To: <20250515182322.117840-1-pasha.tatashin@soleen.com> References: <20250515182322.117840-1-pasha.tatashin@soleen.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 9387E40007 X-Stat-Signature: 6od55mmt4kt655gjdux1cc7g4ynrqdhm X-Rspam-User: X-HE-Tag: 1747333420-703380 X-HE-Meta: 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 mmdiU0eT 0YzUaac1QcxTPj7b9oYSzn4xD1xl8nZqy0ReWtddJJsnFSiL+FOe8jfwdQ7VHzi9VbDZPmI+U7QYXbtrz2YU0GmT9QR53AfY2StWWCa1dA0ljK62Ap2j9N6rvpatQYzxY8GXdi7kwdrAvnx+C2U+ExyDB0P72jO/XVLr8qwLAOQf8DPSD7644ZNbF2YTXoownz9Y0C2Nlx4mcAuU= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Implements the core logic within luo_files.c to invoke the prepare, reboot, finish, and cancel callbacks for preserved file instances, replacing the previous stub implementations. It also handles the persistence and retrieval of the u64 data payload associated with each file via the LUO FDT. This completes the core mechanism enabling registered filesystem handlers to actively manage file state across the live update transition using the LUO framework. Signed-off-by: Pasha Tatashin --- drivers/misc/liveupdate/luo_files.c | 105 +++++++++++++++++++++++++++- 1 file changed, 103 insertions(+), 2 deletions(-) diff --git a/drivers/misc/liveupdate/luo_files.c b/drivers/misc/liveupdate/luo_files.c index 953fc40db3d7..091bf07e051a 100644 --- a/drivers/misc/liveupdate/luo_files.c +++ b/drivers/misc/liveupdate/luo_files.c @@ -272,6 +272,48 @@ int luo_files_fdt_setup(void *fdt) return -ENOSPC; } +static void __luo_do_files_cancel_calls(struct luo_file *boundary_file) +{ + unsigned long token; + struct luo_file *h; + + xa_for_each(&luo_files_xa_out, token, h) { + if (h == boundary_file) + break; + + if (h->fs->cancel) { + h->fs->cancel(h->file, h->fs->arg, h->private_data); + h->private_data = 0; + } + } +} + +static int luo_files_commit_data_to_fdt(void) +{ + int files_node_offset, node_offset, ret; + unsigned long token; + char token_str[19]; + struct luo_file *h; + + files_node_offset = fdt_subnode_offset(luo_fdt_out, 0, + LUO_FILES_NODE_NAME); + xa_for_each(&luo_files_xa_out, token, h) { + snprintf(token_str, sizeof(token_str), "%#0llx", (u64)token); + node_offset = fdt_subnode_offset(luo_fdt_out, + files_node_offset, + token_str); + ret = fdt_setprop(luo_fdt_out, node_offset, "data", + &h->private_data, sizeof(h->private_data)); + if (ret < 0) { + pr_err("Failed to set data property for token %s: %s\n", + token_str, fdt_strerror(ret)); + return -ENOSPC; + } + } + + return 0; +} + /** * luo_do_files_prepare_calls - Calls prepare callbacks and updates FDT * if all prepares succeed. Handles cancellation on failure. @@ -287,7 +329,29 @@ int luo_files_fdt_setup(void *fdt) */ int luo_do_files_prepare_calls(void) { - return 0; + unsigned long token; + struct luo_file *h; + int ret; + + xa_for_each(&luo_files_xa_out, token, h) { + if (h->fs->prepare) { + ret = h->fs->prepare(h->file, h->fs->arg, + &h->private_data); + if (ret < 0) { + pr_err("Prepare failed for file token %#0llx handler '%s' [%d]\n", + (u64)token, h->fs->compatible, ret); + __luo_do_files_cancel_calls(h); + + return ret; + } + } + } + + ret = luo_files_commit_data_to_fdt(); + if (ret) + __luo_do_files_cancel_calls(NULL); + + return ret; } /** @@ -305,7 +369,29 @@ int luo_do_files_prepare_calls(void) */ int luo_do_files_freeze_calls(void) { - return 0; + unsigned long token; + struct luo_file *h; + int ret; + + xa_for_each(&luo_files_xa_out, token, h) { + if (h->fs->freeze) { + ret = h->fs->freeze(h->file, h->fs->arg, + &h->private_data); + if (ret < 0) { + pr_err("Freeze callback failed for file token %#0llx handler '%s' [%d]\n", + (u64)token, h->fs->compatible, ret); + __luo_do_files_cancel_calls(h); + + return ret; + } + } + } + + ret = luo_files_commit_data_to_fdt(); + if (ret) + __luo_do_files_cancel_calls(NULL); + + return ret; } /** @@ -316,7 +402,20 @@ int luo_do_files_freeze_calls(void) */ void luo_do_files_finish_calls(void) { + unsigned long token; + struct luo_file *h; + luo_files_recreate_luo_files_xa_in(); + xa_for_each(&luo_files_xa_in, token, h) { + mutex_lock(&h->mutex); + if (h->state == LIVEUPDATE_STATE_UPDATED && h->fs->finish) { + h->fs->finish(h->file, h->fs->arg, + h->private_data, + h->reclaimed); + h->state = LIVEUPDATE_STATE_NORMAL; + } + mutex_unlock(&h->mutex); + } } /** @@ -330,6 +429,8 @@ void luo_do_files_finish_calls(void) */ void luo_do_files_cancel_calls(void) { + __luo_do_files_cancel_calls(NULL); + luo_files_commit_data_to_fdt(); } /** -- 2.49.0.1101.gccaa498523-goog