From: Pasha Tatashin <pasha.tatashin@soleen.com>
To: pratyush@kernel.org, jasonmiu@google.com, graf@amazon.com,
changyuanl@google.com, pasha.tatashin@soleen.com,
rppt@kernel.org, dmatlack@google.com, rientjes@google.com,
corbet@lwn.net, rdunlap@infradead.org,
ilpo.jarvinen@linux.intel.com, kanie@linux.alibaba.com,
ojeda@kernel.org, aliceryhl@google.com, masahiroy@kernel.org,
akpm@linux-foundation.org, tj@kernel.org, yoann.congal@smile.fr,
mmaurer@google.com, roman.gushchin@linux.dev,
chenridong@huawei.com, axboe@kernel.dk, mark.rutland@arm.com,
jannh@google.com, vincent.guittot@linaro.org, hannes@cmpxchg.org,
dan.j.williams@intel.com, david@redhat.com,
joel.granados@kernel.org, rostedt@goodmis.org,
anna.schumaker@oracle.com, song@kernel.org,
zhangguopeng@kylinos.cn, linux@weissschuh.net,
linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org,
linux-mm@kvack.org, gregkh@linuxfoundation.org,
tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com,
rafael@kernel.org, dakr@kernel.org,
bartosz.golaszewski@linaro.org, cw00.choi@samsung.com,
myungjoo.ham@samsung.com, yesanishhere@gmail.com,
Jonathan.Cameron@huawei.com, quic_zijuhu@quicinc.com,
aleksander.lobakin@intel.com, ira.weiny@intel.com,
andriy.shevchenko@linux.intel.com, leon@kernel.org,
lukas@wunner.de, bhelgaas@google.com, wagi@kernel.org,
djeffery@redhat.com, stuart.w.hayes@gmail.com, ptyadav@amazon.de,
lennart@poettering.net, brauner@kernel.org,
linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org,
saeedm@nvidia.com, ajayachandra@nvidia.com, jgg@nvidia.com,
parav@nvidia.com, leonro@nvidia.com, witu@nvidia.com,
hughd@google.com, skhawaja@google.com, chrisl@kernel.org,
steven.sistare@oracle.com
Subject: [PATCH v4 14/30] liveupdate: luo_session: Add ioctls for file preservation and state management
Date: Mon, 29 Sep 2025 01:03:05 +0000 [thread overview]
Message-ID: <20250929010321.3462457-15-pasha.tatashin@soleen.com> (raw)
In-Reply-To: <20250929010321.3462457-1-pasha.tatashin@soleen.com>
Introducing the userspace interface and internal logic required to
manage the lifecycle of file descriptors within a session. Previously, a
session was merely a container; this change makes it a functional
management unit.
The following capabilities are added:
A new set of ioctl commands are added, which operate on the file
descriptor returned by CREATE_SESSION. This allows userspace to:
- LIVEUPDATE_SESSION_PRESERVE_FD: Add a file descriptor to a session
to be preserved across the live update.
- LIVEUPDATE_SESSION_UNPRESERVE_FD: Remove a previously added file
descriptor from the session.
- LIVEUPDATE_SESSION_RESTORE_FD: Retrieve a preserved file in the
new kernel using its unique token.
A state machine for each individual session, distinct from the global
LUO state. This enables more granular control, allowing userspace to
prepare or freeze specific sessions independently. This is managed via:
- LIVEUPDATE_SESSION_SET_EVENT: An ioctl to send PREPARE, FREEZE,
CANCEL, or FINISH events to a single session.
- LIVEUPDATE_SESSION_GET_STATE: An ioctl to query the current state
of a single session.
The global subsystem callbacks (luo_session_prepare, luo_session_freeze)
are updated to iterate through all existing sessions. They now trigger
the appropriate per-session state transitions for any sessions that
haven't already been transitioned individually by userspace.
The session's .release handler is enhanced to be state-aware. When a
session's file descriptor is closed, it now correctly cancels or
finishes the session based on its current state before freeing all
associated file resources, preventing resource leaks.
Signed-off-by: Pasha Tatashin <pasha.tatashin@soleen.com>
---
include/uapi/linux/liveupdate.h | 164 ++++++++++++++++++
kernel/liveupdate/luo_session.c | 284 +++++++++++++++++++++++++++++++-
2 files changed, 446 insertions(+), 2 deletions(-)
diff --git a/include/uapi/linux/liveupdate.h b/include/uapi/linux/liveupdate.h
index 2e38ef3094aa..59a0f561d148 100644
--- a/include/uapi/linux/liveupdate.h
+++ b/include/uapi/linux/liveupdate.h
@@ -132,6 +132,16 @@ enum {
LIVEUPDATE_CMD_RETRIEVE_SESSION = 0x03,
};
+/* ioctl commands for session file descriptors */
+enum {
+ LIVEUPDATE_CMD_SESSION_BASE = 0x40,
+ LIVEUPDATE_CMD_SESSION_PRESERVE_FD = LIVEUPDATE_CMD_SESSION_BASE,
+ LIVEUPDATE_CMD_SESSION_UNPRESERVE_FD = 0x41,
+ LIVEUPDATE_CMD_SESSION_RESTORE_FD = 0x42,
+ LIVEUPDATE_CMD_SESSION_GET_STATE = 0x43,
+ LIVEUPDATE_CMD_SESSION_SET_EVENT = 0x44,
+};
+
/**
* struct liveupdate_ioctl_get_state - ioctl(LIVEUPDATE_IOCTL_GET_STATE)
* @size: Input; sizeof(struct liveupdate_ioctl_get_state)
@@ -293,4 +303,158 @@ struct liveupdate_ioctl_retrieve_session {
#define LIVEUPDATE_IOCTL_RETRIEVE_SESSION \
_IO(LIVEUPDATE_IOCTL_TYPE, LIVEUPDATE_CMD_RETRIEVE_SESSION)
+
+/* Session specific IOCTLs */
+
+/**
+ * struct liveupdate_session_preserve_fd - ioctl(LIVEUPDATE_SESSION_PRESERVE_FD)
+ * @size: Input; sizeof(struct liveupdate_session_preserve_fd)
+ * @fd: Input; The user-space file descriptor to be preserved.
+ * @token: Input; An opaque, unique token for preserved resource.
+ *
+ * Holds parameters for preserving Validate and initiate preservation for a file
+ * descriptor.
+ *
+ * User sets the @fd field identifying the file descriptor to preserve
+ * (e.g., memfd, kvm, iommufd, VFIO). The kernel validates if this FD type
+ * and its dependencies are supported for preservation. If validation passes,
+ * the kernel marks the FD internally and *initiates the process* of preparing
+ * its state for saving. The actual snapshotting of the state typically occurs
+ * during the subsequent %LIVEUPDATE_IOCTL_PREPARE execution phase, though
+ * some finalization might occur during freeze.
+ * On successful validation and initiation, the kernel uses the @token
+ * field with an opaque identifier representing the resource being preserved.
+ * This token confirms the FD is targeted for preservation and is required for
+ * the subsequent %LIVEUPDATE_SESSION_RESTORE_FD call after the live update.
+ *
+ * Return: 0 on success (validation passed, preservation initiated), negative
+ * error code on failure (e.g., unsupported FD type, dependency issue,
+ * validation failed).
+ */
+struct liveupdate_session_preserve_fd {
+ __u32 size;
+ __s32 fd;
+ __aligned_u64 token;
+};
+
+#define LIVEUPDATE_SESSION_PRESERVE_FD \
+ _IO(LIVEUPDATE_IOCTL_TYPE, LIVEUPDATE_CMD_SESSION_PRESERVE_FD)
+
+/**
+ * struct liveupdate_session_unpreserve_FD - ioctl(LIVEUPDATE_SESSION_UNPRESERVE_FD)
+ * @size: Input; sizeof(struct liveupdate_session_unpreserve_fd)
+ * @reserved: Must be zero.
+ * @token: Input; A token for resource to be unpreserved.
+ *
+ * Remove a file descriptor from the preservation list.
+ *
+ * Allows user space to explicitly remove a file descriptor from the set of
+ * items marked as potentially preservable. User space provides a @token that
+ * was previously used by a successful %LIVEUPDATE_SESSION_PRESERVE_FD call
+ * (potentially from a prior, possibly canceled, live update attempt). The
+ * kernel reads the token value from the provided user-space address.
+ *
+ * On success, the kernel removes the corresponding entry (identified by the
+ * token value read from the user pointer) from its internal preservation list.
+ * The provided @token (representing the now-removed entry) becomes invalid
+ * after this call.
+ *
+ * Return: 0 on success, negative error code on failure (e.g., -EBUSY or -EINVAL
+ * if bad address provided, invalid token value read, token not found).
+ */
+struct liveupdate_session_unpreserve_fd {
+ __u32 size;
+ __u32 reserved;
+ __aligned_u64 token;
+};
+
+#define LIVEUPDATE_SESSION_UNPRESERVE_FD \
+ _IO(LIVEUPDATE_IOCTL_TYPE, LIVEUPDATE_CMD_SESSION_UNPRESERVE_FD)
+
+/**
+ * struct liveupdate_session_restore_fd - ioctl(LIVEUPDATE_SESSION_RESTORE_FD)
+ * @size: Input; sizeof(struct liveupdate_session_restore_fd)
+ * @fd: Output; The new file descriptor representing the fully restored
+ * kernel resource.
+ * @token: Input; An opaque, token that was used to preserve the resource.
+ *
+ * Restore a previously preserved file descriptor.
+ *
+ * User sets the @token field to the value obtained from a successful
+ * %LIVEUPDATE_IOCTL_FD_PRESERVE call before the live update. On success,
+ * the kernel restores the state (saved during the PREPARE/FREEZE phases)
+ * associated with the token and populates the @fd field with a new file
+ * descriptor referencing the restored resource in the current (new) kernel.
+ * This operation must be performed *before* signaling completion via
+ * %LIVEUPDATE_IOCTL_FINISH.
+ *
+ * Return: 0 on success, negative error code on failure (e.g., invalid token).
+ */
+struct liveupdate_session_restore_fd {
+ __u32 size;
+ __s32 fd;
+ __aligned_u64 token;
+};
+
+#define LIVEUPDATE_SESSION_RESTORE_FD \
+ _IO(LIVEUPDATE_IOCTL_TYPE, LIVEUPDATE_CMD_SESSION_RESTORE_FD)
+
+/**
+ * struct liveupdate_session_get_state - ioctl(LIVEUPDATE_SESSION_GET_STATE)
+ * @size: Input; sizeof(struct liveupdate_session_get_state)
+ * @incoming: Input; If 1, query the state of a restored file from the incoming
+ * (previous kernel's) set. If 0, query a file being prepared for
+ * preservation in the current set.
+ * @reserved: Must be zero.
+ * @state: Output; The live update state of this FD.
+ *
+ * Query the current live update state of a specific preserved file descriptor.
+ *
+ * - %LIVEUPDATE_STATE_NORMAL: Default state
+ * - %LIVEUPDATE_STATE_PREPARED: Prepare callback has been performed on this FD.
+ * - %LIVEUPDATE_STATE_FROZEN: Freeze callback ahs been performed on this FD.
+ * - %LIVEUPDATE_STATE_UPDATED: The system has successfully rebooted into the
+ * new kernel.
+ *
+ * See the definition of &enum liveupdate_state for more details on each state.
+ *
+ * Return: 0 on success, negative error code on failure.
+ */
+struct liveupdate_session_get_state {
+ __u32 size;
+ __u8 incoming;
+ __u8 reserved[3];
+ __u32 state;
+};
+
+#define LIVEUPDATE_SESSION_GET_STATE \
+ _IO(LIVEUPDATE_IOCTL_TYPE, LIVEUPDATE_CMD_SESSION_GET_STATE)
+
+/**
+ * struct liveupdate_session_set_event - ioctl(LIVEUPDATE_SESSION_SET_EVENT)
+ * @size: Input; sizeof(struct liveupdate_session_set_event)
+ * @event: Input; The live update event.
+ *
+ * Notify a specific preserved file descriptor of an event, that causes a state
+ * transition for that file descriptor.
+ *
+ * Event, can be one of the following:
+ *
+ * - %LIVEUPDATE_PREPARE: Initiates the FD live update preparation phase.
+ * - %LIVEUPDATE_FREEZE: Initiates the FD live update freeze phase.
+ * - %LIVEUPDATE_CANCEL: Cancel the FD preparation or freeze phase.
+ * - %LIVEUPDATE_FINISH: FD Restoration completion and trigger cleanup.
+ *
+ * See the definition of &enum liveupdate_event for more details on each state.
+ *
+ * Return: 0 on success, negative error code on failure.
+ */
+struct liveupdate_session_set_event {
+ __u32 size;
+ __u32 event;
+};
+
+#define LIVEUPDATE_SESSION_SET_EVENT \
+ _IO(LIVEUPDATE_IOCTL_TYPE, LIVEUPDATE_CMD_SESSION_SET_EVENT)
+
#endif /* _UAPI_LIVEUPDATE_H */
diff --git a/kernel/liveupdate/luo_session.c b/kernel/liveupdate/luo_session.c
index 74dee42e24b7..966b68532d79 100644
--- a/kernel/liveupdate/luo_session.c
+++ b/kernel/liveupdate/luo_session.c
@@ -188,17 +188,66 @@ static void luo_session_remove(struct luo_session *session)
/* One session switches from the updated state to normal state */
static void luo_session_finish_one(struct luo_session *session)
{
+ scoped_guard(mutex, &session->mutex) {
+ if (session->state != LIVEUPDATE_STATE_UPDATED)
+ return;
+ luo_file_finish(session);
+ session->files = 0;
+ luo_file_unpreserve_unreclaimed_files(session);
+ session->state = LIVEUPDATE_STATE_NORMAL;
+ }
}
/* Cancel one session from frozen or prepared state, back to normal */
static void luo_session_cancel_one(struct luo_session *session)
{
+ guard(mutex)(&session->mutex);
+ if (session->state == LIVEUPDATE_STATE_FROZEN ||
+ session->state == LIVEUPDATE_STATE_PREPARED) {
+ luo_file_cancel(session);
+ session->state = LIVEUPDATE_STATE_NORMAL;
+ session->files = 0;
+ session->ser = NULL;
+ }
}
/* One session is changed from normal to prepare state */
static int luo_session_prepare_one(struct luo_session *session)
{
- return 0;
+ int ret;
+
+ guard(mutex)(&session->mutex);
+ if (session->state != LIVEUPDATE_STATE_NORMAL)
+ return -EBUSY;
+
+ ret = luo_file_prepare(session);
+ if (!ret)
+ session->state = LIVEUPDATE_STATE_PREPARED;
+
+ return ret;
+}
+
+/* One session is changed from prepared to frozen state */
+static int luo_session_freeze_one(struct luo_session *session)
+{
+ int ret;
+
+ guard(mutex)(&session->mutex);
+ if (session->state != LIVEUPDATE_STATE_PREPARED)
+ return -EBUSY;
+
+ ret = luo_file_freeze(session);
+
+ /*
+ * If fail, freeze is cancel, and as a side effect, we go back to normal
+ * state
+ */
+ if (!ret)
+ session->state = LIVEUPDATE_STATE_FROZEN;
+ else
+ session->state = LIVEUPDATE_STATE_NORMAL;
+
+ return ret;
}
static int luo_session_release(struct inode *inodep, struct file *filep)
@@ -220,6 +269,8 @@ static int luo_session_release(struct inode *inodep, struct file *filep)
session->state == LIVEUPDATE_STATE_FROZEN) {
luo_session_cancel_one(session);
}
+ scoped_guard(mutex, &session->mutex)
+ luo_file_unpreserve_all_files(session);
scoped_guard(rwsem_write, &luo_session_global.rwsem)
luo_session_remove(session);
@@ -228,9 +279,219 @@ static int luo_session_release(struct inode *inodep, struct file *filep)
return 0;
}
+static int luo_session_preserve_fd(struct luo_session *session,
+ struct luo_ucmd *ucmd)
+{
+ struct liveupdate_session_preserve_fd *argp = ucmd->cmd;
+ int ret;
+
+ guard(rwsem_read)(&luo_state_rwsem);
+ if (!liveupdate_state_normal() && !liveupdate_state_updated()) {
+ pr_warn("File can be preserved only in normal or updated state\n");
+ return -EBUSY;
+ }
+
+ guard(mutex)(&session->mutex);
+
+ if (session->state != LIVEUPDATE_STATE_NORMAL)
+ return -EBUSY;
+
+ ret = luo_preserve_file(session, argp->token, argp->fd);
+ if (ret)
+ return ret;
+
+ ret = luo_ucmd_respond(ucmd, sizeof(*argp));
+ if (ret)
+ pr_warn("The file was successfully preserved, but response to user failed\n");
+
+ return ret;
+}
+
+static int luo_session_unpreserve_fd(struct luo_session *session,
+ struct luo_ucmd *ucmd)
+{
+ struct liveupdate_session_unpreserve_fd *argp = ucmd->cmd;
+ int ret;
+
+ if (argp->reserved)
+ return -EOPNOTSUPP;
+
+ guard(rwsem_read)(&luo_state_rwsem);
+ if (!liveupdate_state_normal() && !liveupdate_state_updated()) {
+ pr_warn("File can be preserved only in normal or updated state\n");
+ return -EBUSY;
+ }
+
+ guard(mutex)(&session->mutex);
+
+ if (session->state != LIVEUPDATE_STATE_NORMAL)
+ return -EBUSY;
+
+ ret = luo_unpreserve_file(session, argp->token);
+ if (ret)
+ return ret;
+
+ ret = luo_ucmd_respond(ucmd, sizeof(*argp));
+ if (ret)
+ pr_warn("The file was successfully unpreserved, but response to user failed\n");
+
+ return ret;
+}
+
+static int luo_session_restore_fd(struct luo_session *session,
+ struct luo_ucmd *ucmd)
+{
+ struct liveupdate_session_restore_fd *argp = ucmd->cmd;
+ struct file *file;
+ int ret;
+
+ guard(rwsem_read)(&luo_state_rwsem);
+ if (!liveupdate_state_updated())
+ return -EBUSY;
+
+ argp->fd = get_unused_fd_flags(O_CLOEXEC);
+ if (argp->fd < 0)
+ return argp->fd;
+
+ guard(mutex)(&session->mutex);
+
+ /* Session might have already finished independatly from global state */
+ if (session->state != LIVEUPDATE_STATE_UPDATED)
+ return -EBUSY;
+
+ ret = luo_retrieve_file(session, argp->token, &file);
+ if (ret < 0) {
+ put_unused_fd(argp->fd);
+
+ return ret;
+ }
+
+ ret = luo_ucmd_respond(ucmd, sizeof(*argp));
+ if (ret)
+ return ret;
+
+ fd_install(argp->fd, file);
+
+ return 0;
+}
+
+static int luo_session_get_state(struct luo_session *session,
+ struct luo_ucmd *ucmd)
+{
+ struct liveupdate_session_get_state *argp = ucmd->cmd;
+
+ if (argp->reserved[0] | argp->reserved[1] | argp->reserved[2])
+ return -EOPNOTSUPP;
+
+ argp->state = READ_ONCE(session->state);
+
+ return luo_ucmd_respond(ucmd, sizeof(*argp));
+}
+
+static int luo_session_set_event(struct luo_session *session,
+ struct luo_ucmd *ucmd)
+{
+ struct liveupdate_session_set_event *argp = ucmd->cmd;
+ int ret = 0;
+
+ switch (argp->event) {
+ case LIVEUPDATE_PREPARE:
+ ret = luo_session_prepare_one(session);
+ break;
+ case LIVEUPDATE_FREEZE:
+ ret = luo_session_freeze_one(session);
+ break;
+ case LIVEUPDATE_FINISH:
+ luo_session_finish_one(session);
+ break;
+ case LIVEUPDATE_CANCEL:
+ luo_session_cancel_one(session);
+ break;
+ default:
+ ret = -EINVAL;
+ }
+
+ return ret;
+}
+
+union ucmd_buffer {
+ struct liveupdate_session_get_state state;
+ struct liveupdate_session_preserve_fd preserve;
+ struct liveupdate_session_restore_fd restore;
+ struct liveupdate_session_set_event event;
+ struct liveupdate_session_unpreserve_fd unpreserve;
+};
+
+struct luo_ioctl_op {
+ unsigned int size;
+ unsigned int min_size;
+ unsigned int ioctl_num;
+ int (*execute)(struct luo_session *session, struct luo_ucmd *ucmd);
+};
+
+#define IOCTL_OP(_ioctl, _fn, _struct, _last) \
+ [_IOC_NR(_ioctl) - LIVEUPDATE_CMD_SESSION_BASE] = { \
+ .size = sizeof(_struct) + \
+ BUILD_BUG_ON_ZERO(sizeof(union ucmd_buffer) < \
+ sizeof(_struct)), \
+ .min_size = offsetofend(_struct, _last), \
+ .ioctl_num = _ioctl, \
+ .execute = _fn, \
+ }
+
+static const struct luo_ioctl_op luo_session_ioctl_ops[] = {
+ IOCTL_OP(LIVEUPDATE_SESSION_GET_STATE, luo_session_get_state,
+ struct liveupdate_session_get_state, state),
+ IOCTL_OP(LIVEUPDATE_SESSION_PRESERVE_FD, luo_session_preserve_fd,
+ struct liveupdate_session_preserve_fd, token),
+ IOCTL_OP(LIVEUPDATE_SESSION_RESTORE_FD, luo_session_restore_fd,
+ struct liveupdate_session_restore_fd, token),
+ IOCTL_OP(LIVEUPDATE_SESSION_SET_EVENT, luo_session_set_event,
+ struct liveupdate_session_set_event, event),
+ IOCTL_OP(LIVEUPDATE_SESSION_UNPRESERVE_FD, luo_session_unpreserve_fd,
+ struct liveupdate_session_unpreserve_fd, token),
+};
+
+static long luo_session_ioctl(struct file *filep, unsigned int cmd,
+ unsigned long arg)
+{
+ struct luo_session *session = filep->private_data;
+ const struct luo_ioctl_op *op;
+ struct luo_ucmd ucmd = {};
+ union ucmd_buffer buf;
+ unsigned int nr;
+ int ret;
+
+ nr = _IOC_NR(cmd);
+ if (nr < LIVEUPDATE_CMD_SESSION_BASE || (nr - LIVEUPDATE_CMD_SESSION_BASE) >=
+ ARRAY_SIZE(luo_session_ioctl_ops)) {
+ return -EINVAL;
+ }
+
+ ucmd.ubuffer = (void __user *)arg;
+ ret = get_user(ucmd.user_size, (u32 __user *)ucmd.ubuffer);
+ if (ret)
+ return ret;
+
+ op = &luo_session_ioctl_ops[nr - LIVEUPDATE_CMD_SESSION_BASE];
+ if (op->ioctl_num != cmd)
+ return -ENOIOCTLCMD;
+ if (ucmd.user_size < op->min_size)
+ return -EINVAL;
+
+ ucmd.cmd = &buf;
+ ret = copy_struct_from_user(ucmd.cmd, op->size, ucmd.ubuffer,
+ ucmd.user_size);
+ if (ret)
+ return ret;
+
+ return op->execute(session, &ucmd);
+}
+
static const struct file_operations luo_session_fops = {
.owner = THIS_MODULE,
.release = luo_session_release,
+ .unlocked_ioctl = luo_session_ioctl,
};
static void luo_session_deserialize(void)
@@ -267,6 +528,7 @@ static void luo_session_deserialize(void)
session->state = LIVEUPDATE_STATE_UPDATED;
session->count = luo_session_global.ser[i].count;
session->files = luo_session_global.ser[i].files;
+ luo_file_deserialize(session);
}
}
@@ -501,7 +763,25 @@ static int luo_session_prepare(struct liveupdate_subsystem *h, u64 *data)
static int luo_session_freeze(struct liveupdate_subsystem *h, u64 *data)
{
- return 0;
+ struct luo_session *it;
+ int ret;
+
+ WARN_ON(!luo_session_global.fdt);
+
+ scoped_guard(rwsem_read, &luo_session_global.rwsem) {
+ list_for_each_entry(it, &luo_session_global.list, list) {
+ if (it->state == LIVEUPDATE_STATE_PREPARED) {
+ ret = luo_session_freeze_one(it);
+ if (ret)
+ break;
+ }
+ }
+ }
+
+ if (ret)
+ luo_session_cancel(h, 0);
+
+ return ret;
}
/*
--
2.51.0.536.g15c5d4f767-goog
next prev parent reply other threads:[~2025-09-29 1:04 UTC|newest]
Thread overview: 86+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-09-29 1:02 [PATCH v4 00/30] Live Update Orchestrator Pasha Tatashin
2025-09-29 1:02 ` [PATCH v4 01/30] kho: allow to drive kho from within kernel Pasha Tatashin
2025-09-29 1:02 ` [PATCH v4 02/30] kho: make debugfs interface optional Pasha Tatashin
2025-10-06 16:30 ` Pratyush Yadav
2025-10-06 18:02 ` Pasha Tatashin
2025-10-06 16:55 ` Pratyush Yadav
2025-10-06 17:23 ` Pasha Tatashin
2025-09-29 1:02 ` [PATCH v4 03/30] kho: drop notifiers Pasha Tatashin
2025-10-06 14:30 ` Pratyush Yadav
2025-10-06 16:17 ` Pasha Tatashin
2025-10-06 16:38 ` Pratyush Yadav
2025-10-06 17:01 ` Pratyush Yadav
2025-10-06 17:21 ` Pasha Tatashin
2025-10-07 12:09 ` Pratyush Yadav
2025-10-07 13:16 ` Pasha Tatashin
2025-10-07 13:30 ` Pratyush Yadav
2025-09-29 1:02 ` [PATCH v4 04/30] kho: add interfaces to unpreserve folios and page ranes Pasha Tatashin
2025-09-29 1:02 ` [PATCH v4 05/30] kho: don't unpreserve memory during abort Pasha Tatashin
2025-09-29 1:02 ` [PATCH v4 06/30] liveupdate: kho: move to kernel/liveupdate Pasha Tatashin
2025-09-29 1:02 ` [PATCH v4 07/30] liveupdate: luo_core: luo_ioctl: Live Update Orchestrator Pasha Tatashin
2025-09-29 1:02 ` [PATCH v4 08/30] liveupdate: luo_core: integrate with KHO Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 09/30] liveupdate: luo_subsystems: add subsystem registration Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 10/30] liveupdate: luo_subsystems: implement subsystem callbacks Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 11/30] liveupdate: luo_session: Add sessions support Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 12/30] liveupdate: luo_ioctl: add user interface Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 13/30] liveupdate: luo_file: implement file systems callbacks Pasha Tatashin
2025-09-29 1:03 ` Pasha Tatashin [this message]
2025-10-29 19:07 ` [PATCH v4 14/30] liveupdate: luo_session: Add ioctls for file preservation and state management Pratyush Yadav
2025-10-29 20:13 ` Pasha Tatashin
2025-10-29 20:43 ` David Matlack
2025-10-29 20:57 ` Pasha Tatashin
2025-10-29 21:13 ` David Matlack
2025-10-29 21:17 ` Pasha Tatashin
2025-10-29 22:00 ` Samiullah Khawaja
2025-10-30 14:45 ` Pasha Tatashin
2025-10-29 20:37 ` Pratyush Yadav
2025-10-29 20:58 ` Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 15/30] reboot: call liveupdate_reboot() before kexec Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 16/30] kho: move kho debugfs directory to liveupdate Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 17/30] liveupdate: add selftests for subsystems un/registration Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 18/30] selftests/liveupdate: add subsystem/state tests Pasha Tatashin
2025-10-03 23:17 ` Vipin Sharma
2025-10-04 2:08 ` Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 19/30] docs: add luo documentation Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 20/30] MAINTAINERS: add liveupdate entry Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 21/30] mm: shmem: use SHMEM_F_* flags instead of VM_* flags Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 22/30] mm: shmem: allow freezing inode mapping Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 23/30] mm: shmem: export some functions to internal.h Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 24/30] luo: allow preserving memfd Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 25/30] docs: add documentation for memfd preservation via LUO Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 26/30] selftests/liveupdate: Add multi-kexec session lifecycle test Pasha Tatashin
2025-10-03 22:51 ` Vipin Sharma
2025-10-04 2:07 ` Pasha Tatashin
2025-10-04 2:37 ` Pasha Tatashin
2025-10-09 22:57 ` Vipin Sharma
2025-09-29 1:03 ` [PATCH v4 27/30] selftests/liveupdate: Add multi-file and unreclaimed file test Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 28/30] selftests/liveupdate: Add multi-session workflow and state interaction test Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 29/30] selftests/liveupdate: Add test for unreclaimed resource cleanup Pasha Tatashin
2025-09-29 1:03 ` [PATCH v4 30/30] selftests/liveupdate: Add tests for per-session state and cancel cycles Pasha Tatashin
2025-10-07 17:10 ` [PATCH v4 00/30] Live Update Orchestrator Pasha Tatashin
2025-10-07 17:50 ` Jason Gunthorpe
2025-10-08 3:18 ` Pasha Tatashin
2025-10-08 7:03 ` Samiullah Khawaja
2025-10-08 16:40 ` Pasha Tatashin
2025-10-08 19:35 ` Jason Gunthorpe
2025-10-08 20:26 ` Pasha Tatashin
2025-10-09 14:48 ` Jason Gunthorpe
2025-10-09 15:01 ` Pasha Tatashin
2025-10-09 15:03 ` Pasha Tatashin
2025-10-09 16:46 ` Samiullah Khawaja
2025-10-09 17:39 ` Jason Gunthorpe
2025-10-09 18:37 ` Pasha Tatashin
2025-10-10 14:35 ` Jason Gunthorpe
2025-10-09 21:58 ` Samiullah Khawaja
2025-10-09 22:42 ` Pasha Tatashin
2025-10-10 14:42 ` Jason Gunthorpe
2025-10-10 14:58 ` Pasha Tatashin
2025-10-10 15:02 ` Jason Gunthorpe
2025-10-09 22:57 ` Pratyush Yadav
2025-10-09 23:50 ` Pasha Tatashin
2025-10-10 15:01 ` Jason Gunthorpe
2025-10-14 13:29 ` Pratyush Yadav
2025-10-20 14:29 ` Jason Gunthorpe
2025-10-27 11:37 ` Pratyush Yadav
2025-10-13 15:23 ` Pratyush Yadav
2025-10-10 12:45 ` Pasha Tatashin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250929010321.3462457-15-pasha.tatashin@soleen.com \
--to=pasha.tatashin@soleen.com \
--cc=Jonathan.Cameron@huawei.com \
--cc=ajayachandra@nvidia.com \
--cc=akpm@linux-foundation.org \
--cc=aleksander.lobakin@intel.com \
--cc=aliceryhl@google.com \
--cc=andriy.shevchenko@linux.intel.com \
--cc=anna.schumaker@oracle.com \
--cc=axboe@kernel.dk \
--cc=bartosz.golaszewski@linaro.org \
--cc=bhelgaas@google.com \
--cc=bp@alien8.de \
--cc=brauner@kernel.org \
--cc=changyuanl@google.com \
--cc=chenridong@huawei.com \
--cc=chrisl@kernel.org \
--cc=corbet@lwn.net \
--cc=cw00.choi@samsung.com \
--cc=dakr@kernel.org \
--cc=dan.j.williams@intel.com \
--cc=dave.hansen@linux.intel.com \
--cc=david@redhat.com \
--cc=djeffery@redhat.com \
--cc=dmatlack@google.com \
--cc=graf@amazon.com \
--cc=gregkh@linuxfoundation.org \
--cc=hannes@cmpxchg.org \
--cc=hpa@zytor.com \
--cc=hughd@google.com \
--cc=ilpo.jarvinen@linux.intel.com \
--cc=ira.weiny@intel.com \
--cc=jannh@google.com \
--cc=jasonmiu@google.com \
--cc=jgg@nvidia.com \
--cc=joel.granados@kernel.org \
--cc=kanie@linux.alibaba.com \
--cc=lennart@poettering.net \
--cc=leon@kernel.org \
--cc=leonro@nvidia.com \
--cc=linux-api@vger.kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=linux@weissschuh.net \
--cc=lukas@wunner.de \
--cc=mark.rutland@arm.com \
--cc=masahiroy@kernel.org \
--cc=mingo@redhat.com \
--cc=mmaurer@google.com \
--cc=myungjoo.ham@samsung.com \
--cc=ojeda@kernel.org \
--cc=parav@nvidia.com \
--cc=pratyush@kernel.org \
--cc=ptyadav@amazon.de \
--cc=quic_zijuhu@quicinc.com \
--cc=rafael@kernel.org \
--cc=rdunlap@infradead.org \
--cc=rientjes@google.com \
--cc=roman.gushchin@linux.dev \
--cc=rostedt@goodmis.org \
--cc=rppt@kernel.org \
--cc=saeedm@nvidia.com \
--cc=skhawaja@google.com \
--cc=song@kernel.org \
--cc=steven.sistare@oracle.com \
--cc=stuart.w.hayes@gmail.com \
--cc=tglx@linutronix.de \
--cc=tj@kernel.org \
--cc=vincent.guittot@linaro.org \
--cc=wagi@kernel.org \
--cc=witu@nvidia.com \
--cc=x86@kernel.org \
--cc=yesanishhere@gmail.com \
--cc=yoann.congal@smile.fr \
--cc=zhangguopeng@kylinos.cn \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox