From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96052C77B7C for ; Wed, 25 Jun 2025 23:18:47 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3996B8D0003; Wed, 25 Jun 2025 19:18:47 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 3713C8D0001; Wed, 25 Jun 2025 19:18:47 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 286E68D0003; Wed, 25 Jun 2025 19:18:47 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 15A3B8D0001 for ; Wed, 25 Jun 2025 19:18:47 -0400 (EDT) Received: from smtpin19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 3A43BB835F for ; Wed, 25 Jun 2025 23:18:46 +0000 (UTC) X-FDA: 83595489852.19.0854133 Received: from mail-yb1-f178.google.com (mail-yb1-f178.google.com [209.85.219.178]) by imf23.hostedemail.com (Postfix) with ESMTP id 7B9E9140011 for ; Wed, 25 Jun 2025 23:18:44 +0000 (UTC) Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=soleen-com.20230601.gappssmtp.com header.s=20230601 header.b=v3vP5N4P; spf=pass (imf23.hostedemail.com: domain of pasha.tatashin@soleen.com designates 209.85.219.178 as permitted sender) smtp.mailfrom=pasha.tatashin@soleen.com; dmarc=pass (policy=none) header.from=soleen.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1750893524; a=rsa-sha256; cv=none; b=7luV+V2Q1+pJYAoXZNHV1rKKm5NhH/sw0s8063Lo/sSAnV6bUl+hsyShUv3Dvp7vnGCWdC pnQKc0lJb7CnvcwptXfPYr6K+Z1hNZCR0hym4erv6bPJ2mmW6GmL1b9cMywBP0/tcj6y3u DGt3zgS7LcuiyUxgfPku4bZQf+qbhQA= ARC-Authentication-Results: i=1; imf23.hostedemail.com; dkim=pass header.d=soleen-com.20230601.gappssmtp.com header.s=20230601 header.b=v3vP5N4P; spf=pass (imf23.hostedemail.com: domain of pasha.tatashin@soleen.com designates 209.85.219.178 as permitted sender) smtp.mailfrom=pasha.tatashin@soleen.com; dmarc=pass (policy=none) header.from=soleen.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1750893524; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=VHX9EXA6F2qxSiI8OqBQ3C55jxt3DE5W2Xg0VoRe03U=; b=uAGeOyLTu04DfswwLLAZdGM1gxtLVmMA8LnN5a1eUHYw3B6bqD9RI8uLD7ghj5ETS0Ize5 PR4ZAv/G+eDNmc7tdmtOrZUHLxfbya8EycDy7jD2wCoE4baH5+kPYlq1p19810IJpdG4p4 IIm//IVp3wFRSEBwO+zrVcheQZ70+kI= Received: by mail-yb1-f178.google.com with SMTP id 3f1490d57ef6-e84207a8aa3so236622276.3 for ; Wed, 25 Jun 2025 16:18:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=soleen-com.20230601.gappssmtp.com; s=20230601; t=1750893523; x=1751498323; darn=kvack.org; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=VHX9EXA6F2qxSiI8OqBQ3C55jxt3DE5W2Xg0VoRe03U=; b=v3vP5N4P1DHy4MaGXUPZvbJqRKrzt0OSIpm0/ideXTdSMEsQl6YsfJ5vP8wcQrfjUI /yQdX4p16EJ9Ok6F4Rw75BMg1uJ9bzq2Rj4lZy6UBVVY58cKWrto4qJF/lm7TKH8ZmDR OOexd3VC6mB1cKafXdOR+dNa9en9+z66Cm8PdOCoXkb9AuPihgqnVn1EDETqsVzKzGlv 5yC42YUcLCCBo4hf9zmompjoYxbXEv3/YMi12omafApEQhKHQgqJRvoZexSBWZvScpEp wAPUg/BrSOW8msRzZXxlob642jamzTI8Igl6Xb/0juFhgbMZdbW3glr/9QRAelHBtdKc WbOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1750893523; x=1751498323; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=VHX9EXA6F2qxSiI8OqBQ3C55jxt3DE5W2Xg0VoRe03U=; b=NoSUjS0azDDFMDonzqtrtCjozywjg3oj4F6GIeEqKIpOYnssISVPWJBdh8zMNeM5nm aTXDQs4A5okKZ0CLbEuzc+KiJJKdM6jr/l4Mulht/U+X/2bVIyxp3N1nYYRZsq5vV+mt fUNGJvSmGPyzdlU43TvgZKpXnhzSEdXdQxk05biIz8gp2YXuiiO6DY+9q8wBsSwZ8/Wi IQd11REzaPY/ygfCS4wKhp/zyW8u4xBmjmtcVZlw6vZdCYOvSNGm/NBOHnvqCrCGr2rt qaWcHi7ORaFlMJpZRpeN0gIdEXqGiSMM0NG/i9KQmMFztm6fyuPcpDPsl8TO6xm2Ip2Z xJ6w== X-Forwarded-Encrypted: i=1; AJvYcCUw/VSyUVzWOow05wGUceHOjcKYfmxVgcO+/Uq+TEYEIkZ4+WgaSBvpWkulv4YMnkH79DOeBUhfyQ==@kvack.org X-Gm-Message-State: AOJu0Yz0YsvRr/G8RQkMWRICQJSBrUs6EfnzFlGg/b2XaLg136IqHXKJ ktIEs4lTBU/RwdBW8VqJd+vZzx4JdUK/0yni3pXuLVS4lWL0gRx/6bDCm/femfXbgv0= X-Gm-Gg: ASbGncvYORq+EpaxrLxCvC5SR53g+yVrkUsanalGns+khdsqnd8KivZ9If6EfSkg157 G2rTfHlQr0kD+Fz6SaPFTNlrKgwnVkqmYOV+BdYG9N3N4OnlADmCOBYBAFxXSWTLdKtSI66h7vJ s05mNsWR4AsmTGINWq7W+j/1qQuHW4DMp89BHgZG8VRFL/d6r1DxfcZInlU1KbHnos9orFbSKNp oAAufU8o4M2HuRNqkctVJOJ/cXA9AqlRqrtXOllutaPcQClgZlgNjmIYU8oOJ32nhxiYwYKMDpJ cQSvT4vwQqB4Ifjl6FJldOnIRTYbcMt+leoJxUWBTlQoO9xn4oP6kSrKd3cWUvLP3XFjiu6mNGN ZwxC/DT9XgiIaxN2qPlGOTOg2eTjLeuQIKf96e8m/z+jYBGxU6+G0 X-Google-Smtp-Source: AGHT+IEk36JM8FAwjTDQiH8mzNlLEvNw7Ex5deckOFxvJks1MR0+qIMLz9Zj+oPMn2p4k67rJ+5s5g== X-Received: by 2002:a05:6902:1702:b0:e81:d7c8:1208 with SMTP id 3f1490d57ef6-e860176b5cbmr6432043276.6.1750893523270; Wed, 25 Jun 2025 16:18:43 -0700 (PDT) Received: from soleen.c.googlers.com.com (64.167.245.35.bc.googleusercontent.com. [35.245.167.64]) by smtp.gmail.com with ESMTPSA id 3f1490d57ef6-e842ac5c538sm3942684276.33.2025.06.25.16.18.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 Jun 2025 16:18:42 -0700 (PDT) From: Pasha Tatashin To: pratyush@kernel.org, jasonmiu@google.com, graf@amazon.com, changyuanl@google.com, pasha.tatashin@soleen.com, rppt@kernel.org, dmatlack@google.com, rientjes@google.com, corbet@lwn.net, rdunlap@infradead.org, ilpo.jarvinen@linux.intel.com, kanie@linux.alibaba.com, ojeda@kernel.org, aliceryhl@google.com, masahiroy@kernel.org, akpm@linux-foundation.org, tj@kernel.org, yoann.congal@smile.fr, mmaurer@google.com, roman.gushchin@linux.dev, chenridong@huawei.com, axboe@kernel.dk, mark.rutland@arm.com, jannh@google.com, vincent.guittot@linaro.org, hannes@cmpxchg.org, dan.j.williams@intel.com, david@redhat.com, joel.granados@kernel.org, rostedt@goodmis.org, anna.schumaker@oracle.com, song@kernel.org, zhangguopeng@kylinos.cn, linux@weissschuh.net, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, gregkh@linuxfoundation.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, rafael@kernel.org, dakr@kernel.org, bartosz.golaszewski@linaro.org, cw00.choi@samsung.com, myungjoo.ham@samsung.com, yesanishhere@gmail.com, Jonathan.Cameron@huawei.com, quic_zijuhu@quicinc.com, aleksander.lobakin@intel.com, ira.weiny@intel.com, andriy.shevchenko@linux.intel.com, leon@kernel.org, lukas@wunner.de, bhelgaas@google.com, wagi@kernel.org, djeffery@redhat.com, stuart.w.hayes@gmail.com, ptyadav@amazon.de, lennart@poettering.net, brauner@kernel.org, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: [PATCH v1 00/32] Live Update Orchestrator Date: Wed, 25 Jun 2025 23:17:47 +0000 Message-ID: <20250625231838.1897085-1-pasha.tatashin@soleen.com> X-Mailer: git-send-email 2.50.0.727.gbf7dc18ff4-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Stat-Signature: 537zzg7tw4i9ffazcperesyuk5ujmsrs X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 7B9E9140011 X-Rspam-User: X-HE-Tag: 1750893524-623930 X-HE-Meta: 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 Qk+IGpNP 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: This series introduces the LUO, a kernel subsystem designed to facilitate live kernel updates with minimal downtime, particularly in cloud delplyoments aiming to update without fully disrupting running virtual machines. This series builds upon KHO framework by adding programmatic control over KHO's lifecycle and leveraging KHO for persisting LUO's own metadata across the kexec boundary. The git branch for this series can be found at: https://github.com/googleprodkernel/linux-liveupdate/tree/luo/v1 Changelog from rfc-v2: - Addressed review comments from Mike Rapoport, Pratyush Yadav, David Matlack - Moved everything under kernel/liveupdate including KHO. - Added a number fixes to KHO that were discovered. - luo_files is not a registred as a subsystem. - Added sessions support to preserved files. - Added support for memfd (Pratyush Yadav) - Added libluo (proposed as RFC) (Pratyush Yadav) - Removed notifiers from KHO (Mike Rapoport) What is Live Update? Live Update is a kexec based reboot process where selected kernel resources (memory, file descriptors, and eventually devices) are kept operational or their state preserved across a kernel transition. For certain resources, DMA and interrupt activity might continue with minimal interruption during the kernel reboot. LUO provides a framework for coordinating live updates. It features: State Machine: Manages the live update process through states: NORMAL, PREPARED, FROZEN, UPDATED. KHO Integration: LUO programmatically drives KHO's finalization and abort sequences. KHO's debugfs interface is now optional configured via CONFIG_KEXEC_HANDOVER_DEBUG. LUO preserves its own metadata via KHO's kho_add_subtree and kho_preserve_phys() mechanisms. Subsystem Participation: A callback API liveupdate_register_subsystem() allows kernel subsystems (e.g., KVM, IOMMU, VFIO, PCI) to register handlers for LUO events (PREPARE, FREEZE, FINISH, CANCEL) and persist a u64 payload via the LUO FDT. File Descriptor Preservation: Infrastructure liveupdate_register_filesystem, luo_register_file, luo_retrieve_file to allow specific types of file descriptors (e.g., memfd, vfio) to be preserved and restored. Handlers for specific file types can be registered to manage their preservation and restoration, storing a u64 payload in the LUO FDT. User-space Interface: ioctl (/dev/liveupdate): The primary control interface for triggering LUO state transitions (prepare, freeze, finish, cancel) and managing the preservation/restoration of file descriptors. Access requires CAP_SYS_ADMIN. sysfs (/sys/kernel/liveupdate/state): A read-only interface for monitoring the current LUO state. This allows userspace services to track progress and coordinate actions. Selftests: Includes kernel-side hooks and userspace selftests to verify core LUO functionality, particularly subsystem registration and basic state transitions. LUO State Machine and Events: NORMAL: Default operational state. PREPARED: Initial preparation complete after LIVEUPDATE_PREPARE event. Subsystems have saved initial state. FROZEN: Final "blackout window" state after LIVEUPDATE_FREEZE event, just before kexec. Workloads must be suspended. UPDATED: Next kernel has booted via live update. Awaiting restoration and LIVEUPDATE_FINISH. Events: LIVEUPDATE_PREPARE: Prepare for reboot, serialize state. LIVEUPDATE_FREEZE: Final opportunity to save state before kexec. LIVEUPDATE_FINISH: Post-reboot cleanup in the next kernel. LIVEUPDATE_CANCEL: Abort prepare or freeze, revert changes. RFC v1: https://lore.kernel.org/all/20250320024011.2995837-1-pasha.tatashin@soleen.com RFC v2: https://lore.kernel.org/all/20250515182322.117840-1-pasha.tatashin@soleen.com/ Changyuan Lyu (1): kho: add interfaces to unpreserve folios and physical memory ranges Mike Rapoport (Microsoft) (1): kho: drop notifiers Pasha Tatashin (22): kho: init new_physxa->phys_bits to fix lockdep kho: mm: Don't allow deferred struct page with KHO kho: warn if KHO is disabled due to an error kho: allow to drive kho from within kernel kho: make debugfs interface optional kho: don't unpreserve memory during abort liveupdate: kho: move to kernel/liveupdate liveupdate: luo_core: Live Update Orchestrator liveupdate: luo_core: integrate with KHO liveupdate: luo_subsystems: add subsystem registration liveupdate: luo_subsystems: implement subsystem callbacks liveupdate: luo_files: add infrastructure for FDs liveupdate: luo_files: implement file systems callbacks liveupdate: luo_ioctl: add ioctl interface liveupdate: luo_sysfs: add sysfs state monitoring reboot: call liveupdate_reboot() before kexec liveupdate: luo_files: luo_ioctl: session-based file descriptor tracking kho: move kho debugfs directory to liveupdate liveupdate: add selftests for subsystems un/registration selftests/liveupdate: add subsystem/state tests docs: add luo documentation MAINTAINERS: add liveupdate entry Pratyush Yadav (8): mm: shmem: use SHMEM_F_* flags instead of VM_* flags mm: shmem: allow freezing inode mapping mm: shmem: export some functions to internal.h luo: allow preserving memfd docs: add documentation for memfd preservation via LUO tools: introduce libluo libluo: introduce luoctl libluo: add tests .../ABI/testing/sysfs-kernel-liveupdate | 51 + Documentation/admin-guide/index.rst | 1 + Documentation/admin-guide/liveupdate.rst | 16 + Documentation/core-api/index.rst | 1 + Documentation/core-api/kho/concepts.rst | 2 +- Documentation/core-api/liveupdate.rst | 57 ++ Documentation/mm/index.rst | 1 + Documentation/mm/memfd_preservation.rst | 138 +++ Documentation/userspace-api/index.rst | 1 + .../userspace-api/ioctl/ioctl-number.rst | 2 + Documentation/userspace-api/liveupdate.rst | 25 + MAINTAINERS | 20 +- include/linux/kexec_handover.h | 53 +- include/linux/liveupdate.h | 235 +++++ include/linux/shmem_fs.h | 23 + include/uapi/linux/liveupdate.h | 265 +++++ init/Kconfig | 2 + kernel/Kconfig.kexec | 14 - kernel/Makefile | 2 +- kernel/liveupdate/Kconfig | 90 ++ kernel/liveupdate/Makefile | 13 + kernel/{ => liveupdate}/kexec_handover.c | 556 +++++----- kernel/liveupdate/kexec_handover_debug.c | 222 ++++ kernel/liveupdate/kexec_handover_internal.h | 45 + kernel/liveupdate/luo_core.c | 525 ++++++++++ kernel/liveupdate/luo_files.c | 946 ++++++++++++++++++ kernel/liveupdate/luo_internal.h | 47 + kernel/liveupdate/luo_ioctl.c | 192 ++++ kernel/liveupdate/luo_selftests.c | 344 +++++++ kernel/liveupdate/luo_selftests.h | 84 ++ kernel/liveupdate/luo_subsystems.c | 420 ++++++++ kernel/liveupdate/luo_sysfs.c | 92 ++ kernel/reboot.c | 4 + mm/Makefile | 1 + mm/internal.h | 6 + mm/memblock.c | 56 +- mm/memfd_luo.c | 501 ++++++++++ mm/shmem.c | 46 +- tools/lib/luo/LICENSE | 165 +++ tools/lib/luo/Makefile | 45 + tools/lib/luo/README.md | 166 +++ tools/lib/luo/cli/.gitignore | 1 + tools/lib/luo/cli/Makefile | 18 + tools/lib/luo/cli/luoctl.c | 178 ++++ tools/lib/luo/include/libluo.h | 128 +++ tools/lib/luo/include/liveupdate.h | 265 +++++ tools/lib/luo/libluo.c | 203 ++++ tools/lib/luo/tests/.gitignore | 1 + tools/lib/luo/tests/Makefile | 18 + tools/lib/luo/tests/test.c | 848 ++++++++++++++++ tools/testing/selftests/Makefile | 1 + tools/testing/selftests/liveupdate/.gitignore | 1 + tools/testing/selftests/liveupdate/Makefile | 7 + tools/testing/selftests/liveupdate/config | 6 + .../testing/selftests/liveupdate/liveupdate.c | 356 +++++++ 55 files changed, 7091 insertions(+), 415 deletions(-) create mode 100644 Documentation/ABI/testing/sysfs-kernel-liveupdate create mode 100644 Documentation/admin-guide/liveupdate.rst create mode 100644 Documentation/core-api/liveupdate.rst create mode 100644 Documentation/mm/memfd_preservation.rst create mode 100644 Documentation/userspace-api/liveupdate.rst create mode 100644 include/linux/liveupdate.h create mode 100644 include/uapi/linux/liveupdate.h create mode 100644 kernel/liveupdate/Kconfig create mode 100644 kernel/liveupdate/Makefile rename kernel/{ => liveupdate}/kexec_handover.c (74%) create mode 100644 kernel/liveupdate/kexec_handover_debug.c create mode 100644 kernel/liveupdate/kexec_handover_internal.h create mode 100644 kernel/liveupdate/luo_core.c create mode 100644 kernel/liveupdate/luo_files.c create mode 100644 kernel/liveupdate/luo_internal.h create mode 100644 kernel/liveupdate/luo_ioctl.c create mode 100644 kernel/liveupdate/luo_selftests.c create mode 100644 kernel/liveupdate/luo_selftests.h create mode 100644 kernel/liveupdate/luo_subsystems.c create mode 100644 kernel/liveupdate/luo_sysfs.c create mode 100644 mm/memfd_luo.c create mode 100644 tools/lib/luo/LICENSE create mode 100644 tools/lib/luo/Makefile create mode 100644 tools/lib/luo/README.md create mode 100644 tools/lib/luo/cli/.gitignore create mode 100644 tools/lib/luo/cli/Makefile create mode 100644 tools/lib/luo/cli/luoctl.c create mode 100644 tools/lib/luo/include/libluo.h create mode 100644 tools/lib/luo/include/liveupdate.h create mode 100644 tools/lib/luo/libluo.c create mode 100644 tools/lib/luo/tests/.gitignore create mode 100644 tools/lib/luo/tests/Makefile create mode 100644 tools/lib/luo/tests/test.c create mode 100644 tools/testing/selftests/liveupdate/.gitignore create mode 100644 tools/testing/selftests/liveupdate/Makefile create mode 100644 tools/testing/selftests/liveupdate/config create mode 100644 tools/testing/selftests/liveupdate/liveupdate.c -- 2.50.0.727.gbf7dc18ff4-goog