From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wm1-f42.google.com (mail-wm1-f42.google.com [209.85.128.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 37C3E37CD24 for ; Fri, 17 Apr 2026 22:08:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.42 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776463725; cv=none; b=mZVMJVxAs99sUVvLNgkOFlj/yFVKz88UFrzjgE44ZybpuNazxqmqlD6UvNr1N2HzEvvZcoscY2u6Nqf5uhlYXYbZ8+2wi6uoPpAwGbM/rrBkv2IiOx5tOOXLB3HOh5LFS0NkwxcY3JH/SypHMQEvKzF91cOimJ9vjaM2jwRrNCA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776463725; c=relaxed/simple; bh=0bnljdhq2IycHhlZhf8HQgAKeGYfiPniBKpoVE94nu0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=WRcAjxTETNXBhjrw4YUAqsfAF/Rii+SFGGmxaahdhP6IEgc/YrxPajTFqofKx7z+ooHCMR/8UalXAg1gtffQDDi+Kfiomjgtc4f+VcmFSrb1UQRPotLhTf7V8enPQDY0pdswJt1QT9fYwM4461xOCMkD2OM37pZjL2HJNbRAgOU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=UZdHhDbY; arc=none smtp.client-ip=209.85.128.42 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="UZdHhDbY" Received: by mail-wm1-f42.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso13187125e9.2 for ; Fri, 17 Apr 2026 15:08:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776463718; x=1777068518; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=DQ9xlAPY+R/A3MFjqRDZTVfO9MTzDxB8518v8MGn3iM=; b=UZdHhDbYkM5R0bAphntV0GwYOxVW45GcuqbH8gIY02UbNwx2rAwVhQeqnFEabqsjfR pKSwmBzVaYernnshycqXNfzezTIsJ29vONxv0NUo9UkxXWZLorg1I2oz9GdfR6EUWQHo WySMNUMYEVy30ljnr8hu1N5t+Je0pd/nQYB+gJ3VRj29ey7+iRjLMAOq9h7tp4hjzqig tpYneCz0BkaHqtF0kLyYydJ4bvd2EpA+TgEbz/i3dNqCeKipruNG7aXu6HSo8rUxfuhO OQ8vdlXOQPX+6xzGdPKpMakWQZGltAqvlUDus90N/q0j0cSM3rQfzi95gqPlPewH9RKb bRyA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776463718; x=1777068518; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=DQ9xlAPY+R/A3MFjqRDZTVfO9MTzDxB8518v8MGn3iM=; b=muty4ziTjxo1zvTrd78qVGz9Ndc/PMm2vNX4iozPXs01eFoFgCdSKeKFKaFmS3Zz9u ylhSnORZwrOkzYh/1eFh7pxIc0yb74qqm6Ctg8m5DfXUO9DY6hw4dET2tI1sK7SImrIy r7El2tBurlC9ECBifrNwJw585AMiJLq0XVrf4NuY8VmY5jzzguTXT6hQyrRArv9lMZOt LHRPOnUaA1F3ONMWQFyvl/p74/eQC+iXFa/cYpaVHwx1PqmlbrJe8OoEeB3lX++r2qCN LDTvEetoXUhmsl8VH7VCpwl8gBpviigyCD+ftIFWI7pFHCaT+CU+KuQTDz7QdQW6E2Xj 0x2A== X-Forwarded-Encrypted: i=1; AFNElJ+T5AFGCYdb//rq6Yad4pJ17Ic7GXA4WuOQ7is8QI741vPAqbG5e33UAO6N+V1+ZErZE9zyWobkF33pjPA=@vger.kernel.org X-Gm-Message-State: AOJu0Yw7np6ZrJGDYSyLs/R2DrZZI9IZmG02m8toEmXuOe7RbDH1AZUN n8f3/a8/ZwuwYz9e4VORa6wsoekMDNJBUb7rEDWX/O/KNxpEAWrN8SsC X-Gm-Gg: AeBDieswT48rTK7Spoe9r38gYMlN0334PvwlxPSbIg5bk8fhw3LuxVh+HpOK5ax7/kQ zbLiiWV8Zt63sZGcNwZXO5kLhSUQ/CYns7dnThOV+2GOItVI6kcoyZFo2ItHhik4QnnpRIipyTo 7jQRUkxPYXeoJ72QBdfPhAX809iaOh3izGwVrlCqdWlhk3O3KLYuUrAWqvJCOBJzz3wo/MQLnqQ EAZsyAz9yDdi0Mlrhv9nyfn69ME+RuccLWKE2VUymeAKwE40LdIrlnf7SxxvHZHjISBbPaiN1aa rO2eLSYlMAIGiTxmzi99qLymMEMfWD3zjtYWQZzDcrjlMQEwbkI80K5AA3SzFUiBk5Ex+ZEX0Ct MLl920YmGLA4LQVs7B7HY1+UeXskaBhASfQUMWvrKH3q01Rz/yMXrKCDs+nENAoG97qofq4LwBw 9gNVYemtLymeE+k6icnbyU6SuyKWQK2D7KeA3EiU4= X-Received: by 2002:a05:600c:1c11:b0:488:9ed3:148f with SMTP id 5b1f17b1804b1-488fb782a93mr68816885e9.21.1776463717808; Fri, 17 Apr 2026 15:08:37 -0700 (PDT) Received: from localhost ([2a01:4b00:d036:ae00:9586:30a1:a0a6:f076]) by smtp.gmail.com with UTF8SMTPSA id 5b1f17b1804b1-4890009e759sm17946355e9.6.2026.04.17.15.08.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Apr 2026 15:08:37 -0700 (PDT) From: luca.boccassi@gmail.com To: kexec@lists.infradead.org Cc: linux-mm@kvack.org, graf@amazon.com, rppt@kernel.org, pasha.tatashin@soleen.com, pratyush@kernel.org, brauner@kernel.org, linux-kernel@vger.kernel.org, Luca Boccassi Subject: [PATCH v5 1/4] liveupdate: add LUO_SESSION_MAGIC magic inode type Date: Fri, 17 Apr 2026 23:05:42 +0100 Message-ID: <20260417220831.1934945-1-luca.boccassi@gmail.com> X-Mailer: git-send-email 2.47.3 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Luca Boccassi In userspace when managing LUO sessions we want to be able to identify a FD as a LUO session, in order to be able to do the special handling that they require in order to function as intended on kexec. Currently this requires scraping procfs and doing string matching on the prefix of the dname, which is not an ideal interface. Add a singleton inode type with a magic value, so that we can programmatically identify a fd as a LUO session via fstat(). Signed-off-by: Luca Boccassi Reviewed-by: Pasha Tatashin --- This was requested by Lennart and Christian when discussing integration with systemd for LUO management. v2: apply one fix from bot review about cleanup on error path: https://sashiko.dev/#/patchset/20260415184536.1155220-1-luca.boccassi%40gmail.com the other comments are invalid: luo is not a kmod, and the write hooks are not set up v3: add test case to liveupdate selftest v4: split test case in separate follow-up patch v5: add r-b tag, merge series with LIVEUPDATE_SESSION_GET_NAME ioctl as they both change the same unit test source file, to avoid merge conflicts include/uapi/linux/magic.h | 1 + kernel/liveupdate/luo_core.c | 10 ++++- kernel/liveupdate/luo_internal.h | 2 + kernel/liveupdate/luo_session.c | 73 +++++++++++++++++++++++++++++--- 4 files changed, 80 insertions(+), 6 deletions(-) diff --git a/include/uapi/linux/magic.h b/include/uapi/linux/magic.h index 4f2da935a76cc..4f51005522ffe 100644 --- a/include/uapi/linux/magic.h +++ b/include/uapi/linux/magic.h @@ -105,5 +105,6 @@ #define PID_FS_MAGIC 0x50494446 /* "PIDF" */ #define GUEST_MEMFD_MAGIC 0x474d454d /* "GMEM" */ #define NULL_FS_MAGIC 0x4E554C4C /* "NULL" */ +#define LUO_SESSION_MAGIC 0x4c554f53 /* "LUOS" */ #endif /* __LINUX_MAGIC_H__ */ diff --git a/kernel/liveupdate/luo_core.c b/kernel/liveupdate/luo_core.c index dda7bb57d421c..f1a63ebe4fa44 100644 --- a/kernel/liveupdate/luo_core.c +++ b/kernel/liveupdate/luo_core.c @@ -197,9 +197,17 @@ static int __init luo_late_startup(void) if (!liveupdate_enabled()) return 0; + err = luo_session_fs_init(); + if (err) { + luo_global.enabled = false; + return err; + } + err = luo_fdt_setup(); - if (err) + if (err) { + luo_session_fs_cleanup(); luo_global.enabled = false; + } return err; } diff --git a/kernel/liveupdate/luo_internal.h b/kernel/liveupdate/luo_internal.h index 8083d8739b093..d4ac7b4c58829 100644 --- a/kernel/liveupdate/luo_internal.h +++ b/kernel/liveupdate/luo_internal.h @@ -79,6 +79,8 @@ struct luo_session { int luo_session_create(const char *name, struct file **filep); int luo_session_retrieve(const char *name, struct file **filep); +int __init luo_session_fs_init(void); +void __init luo_session_fs_cleanup(void); int __init luo_session_setup_outgoing(void *fdt); int __init luo_session_setup_incoming(void *fdt); int luo_session_serialize(void); diff --git a/kernel/liveupdate/luo_session.c b/kernel/liveupdate/luo_session.c index 25ae704d77873..5e315cc0dfd52 100644 --- a/kernel/liveupdate/luo_session.c +++ b/kernel/liveupdate/luo_session.c @@ -50,7 +50,6 @@ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt -#include #include #include #include @@ -62,7 +61,10 @@ #include #include #include +#include +#include #include +#include #include #include #include @@ -363,18 +365,58 @@ static const struct file_operations luo_session_fops = { .unlocked_ioctl = luo_session_ioctl, }; +static struct vfsmount *luo_session_mnt __ro_after_init; +static struct inode *luo_session_inode __ro_after_init; + +static char *luo_session_dname(struct dentry *dentry, char *buffer, int buflen) +{ + return dynamic_dname(buffer, buflen, "luo_session:%s", + dentry->d_name.name); +} + +static const struct dentry_operations luo_session_dentry_operations = { + .d_dname = luo_session_dname, +}; + +static int luo_session_init_fs_context(struct fs_context *fc) +{ + struct pseudo_fs_context *ctx; + + ctx = init_pseudo(fc, LUO_SESSION_MAGIC); + if (!ctx) + return -ENOMEM; + + fc->s_iflags |= SB_I_NOEXEC; + fc->s_iflags |= SB_I_NODEV; + ctx->dops = &luo_session_dentry_operations; + return 0; +} + +static struct file_system_type luo_session_fs_type = { + .name = "luo_session", + .init_fs_context = luo_session_init_fs_context, + .kill_sb = kill_anon_super, +}; + /* Create a "struct file" for session */ static int luo_session_getfile(struct luo_session *session, struct file **filep) { - char name_buf[128]; + char name_buf[LIVEUPDATE_SESSION_NAME_LENGTH + 1]; struct file *file; lockdep_assert_held(&session->mutex); - snprintf(name_buf, sizeof(name_buf), "[luo_session] %s", session->name); - file = anon_inode_getfile(name_buf, &luo_session_fops, session, O_RDWR); - if (IS_ERR(file)) + + ihold(luo_session_inode); + + snprintf(name_buf, sizeof(name_buf), "%s", session->name); + file = alloc_file_pseudo(luo_session_inode, luo_session_mnt, name_buf, + O_RDWR, &luo_session_fops); + if (IS_ERR(file)) { + iput(luo_session_inode); return PTR_ERR(file); + } + file->private_data = session; *filep = file; return 0; @@ -649,3 +691,24 @@ void luo_session_resume(void) up_write(&luo_session_global.outgoing.rwsem); up_write(&luo_session_global.incoming.rwsem); } + +int __init luo_session_fs_init(void) +{ + luo_session_mnt = kern_mount(&luo_session_fs_type); + if (IS_ERR(luo_session_mnt)) + return PTR_ERR(luo_session_mnt); + + luo_session_inode = alloc_anon_inode(luo_session_mnt->mnt_sb); + if (IS_ERR(luo_session_inode)) { + kern_unmount(luo_session_mnt); + return PTR_ERR(luo_session_inode); + } + + return 0; +} + +void __init luo_session_fs_cleanup(void) +{ + iput(luo_session_inode); + kern_unmount(luo_session_mnt); +} -- 2.47.3