From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f53.google.com (mail-wr1-f53.google.com [209.85.221.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DAB302609E3 for ; Sat, 18 Apr 2026 16:34:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.53 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776530051; cv=none; b=EMk8CyPhqhMsxteZcXBklVmW9qdTHqvhmXV7TL+6DpjD65otHTecysbSZfMvOJodlKnvA3ZCl0UBbS/n+0P9GemVwxoXhspWVjS2DOfbeysRMc6Mkj+pnIGaL+JwzwtO16vv/oCWRAfv7h84UZSKXfDd2RMGfWBnbYnWKECRxW8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776530051; c=relaxed/simple; bh=6QvEVYW5f4GGKfLSBni2M/b3/YC0yZF68ZHSWxTp5Eo=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=g8zWSYv5rRpQwPRrxxY4xSEL86SczKxdJQcO3FnxSFwTOol9XaZVe65JpvL89dtZuJf0L1djfGOslufmSRnhK343QewRIB+6Uk015pWfJz54gsgE8RiUGtk57fZwhkfMts7c6pebOkI1ygKaY/yhvbAqzFtH8z54TUrq6D5W/Xc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=YcL8zB5d; arc=none smtp.client-ip=209.85.221.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="YcL8zB5d" Received: by mail-wr1-f53.google.com with SMTP id ffacd0b85a97d-43fe3e22e33so1059124f8f.0 for ; Sat, 18 Apr 2026 09:34:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776530048; x=1777134848; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=I2DVRbVNhVeR4amNlP7a8lBCjg5uU0/n/18hy85E+D8=; b=YcL8zB5d6/Q2p95XCpdWPBXlzes/HAZvxEq100SQXBuoe4U5egZURKeGInK5zP3Fau tXmxoFXxVbsGhaiBaUzAz7nYdF6jx6tzjngZ4pyv3j29toGrMsFfL+8egSYxD2aGN6rP 8f1r+/2T9d3ysWYLQPSMsjzvPsJlQnZMyEcLpCew+tMn+iQRTBpmS6PX7ee2J/OyMSsr DpHKwYFuMkNG0uJLgcSD3sYTNEVciUcX63N56G7wefmMXtnq33CGhFzofTMr5Hk3q87p nnVUx7bPlb9dbxg8C8MHU+xrq27qMAPDGBcIIdoI2Bw2xTZiXZ/GhOsvB5dKTNCUjyR1 Ak8A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776530048; x=1777134848; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=I2DVRbVNhVeR4amNlP7a8lBCjg5uU0/n/18hy85E+D8=; b=FQxIxHjcGjbABaZBJb77R6e2a2ik5yHm37Puzrh6FYp4D/nKEFEJbkNUECT/2vD2Si cV2XBV4EKflZ+tUDshKK5DoDGubkpS/4aBZ7r6Xd5Immd4BHIP1/4duzIf0ZMg5tt65D BPvk4V+TzHKnG86U/KbTf6/UsLH2df7aqOg2QbYEl1VearE8vCcSs3wPWay/eqGXEtLh 9lCPCI3kar3kboqAEwuRbJC+fBCyajQnPhKfiwM/TQECDgwPAi03i3JUIaRibmySAv7Z d50+u2wKBck9SpxMsTZr6KmKK+gbLJpctpBl33/WBQxsxRj16HLJ0HkBjRdNjpLMqtGx M2zg== X-Forwarded-Encrypted: i=1; AFNElJ8jNNaeMK6qEXOdUeZg9LQKXpf/vtswNX4lQPVj+DfPYYuYsF/GV3s/xsHk+SfzGiQQJBcvtqNtcMHNh9U=@vger.kernel.org X-Gm-Message-State: AOJu0YwAUfjzgHh3K8vHonoFCyFIcIGeyaLihbn7VTW/EogG6LMVpwZy pV/Oyiv1P/knknC9qorWVEHf9H+Y9qyeV4CFYqCcYlOrEke/3bSk1Lgl X-Gm-Gg: AeBDietmM//34IcXbMkthqd9+XjxpiTjk99e40X+e5VBpTITsxUqJR3SIYNUjV21Gbc tmega4Eqnz9wnX0qsWp5VCLMsr1+EAYpVPeBAgHDwbzJ0jwyWqlaO/0JXjbAo8t3iryj2ttk4oI 9PmVIxb5TSQuXqzcEyxuysgjf+MyN8yabsu0XxA7/bEaibIx7jHNRO88O4gFMGyXJREJgc76gKJ YE0JQIWMyIRoE/SkD76+dwwW0eJf4vxJtgS80a9i8IZjBnfyLv1JbscuvV2Tb7XXuVvShhkTnxH vuN9UJRR9tugO+Z48fwyibe9dRoabX5hYZEryOQcx3BEjmtuHR9plfBd9rYJp2QYBuWikEtNFip v3A82HqpEKgT+x+e4B9zq3zK1ztyDQkW+huYhETIuh+e06rWiHtyxM1QtIIZsS5cSoioDEQpLhT WjUl+r4go7lSoqT/eOxx+VlcdM9wcpzqf9AjPFxCjPsTXPuSK5qQ== X-Received: by 2002:a05:6000:24c3:b0:43d:7868:21db with SMTP id ffacd0b85a97d-43fe3dcc11amr11095356f8f.18.1776530047970; Sat, 18 Apr 2026 09:34:07 -0700 (PDT) Received: from localhost ([2a01:4b00:d036:ae00:e054:93f2:97bf:84c6]) by smtp.gmail.com with UTF8SMTPSA id ffacd0b85a97d-43fe4e3a79esm16403029f8f.17.2026.04.18.09.34.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 18 Apr 2026 09:34:07 -0700 (PDT) From: luca.boccassi@gmail.com To: kexec@lists.infradead.org Cc: linux-mm@kvack.org, graf@amazon.com, rppt@kernel.org, pasha.tatashin@soleen.com, pratyush@kernel.org, brauner@kernel.org, linux-kernel@vger.kernel.org, Luca Boccassi Subject: [PATCH v8 0/6] liveupdate: new ioctl, change session inode type, bug fixes Date: Sat, 18 Apr 2026 17:28:17 +0100 Message-ID: <20260418163358.2304490-1-luca.boccassi@gmail.com> X-Mailer: git-send-email 2.47.3 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Luca Boccassi A series of patches matured while implementing LUO support in userspace in systemd. - reject session names that are either empty strings or too long - change inode type of session FDs to a new singleton magic number, so that userspace can immediately identify them without string parsing in procfs - add new ioctl to retrieve session name from FD, so that userspace can query it without string parsing in procfs All changes come with a follow-up patch add test coverage via the existing selftest. v2: apply one fix from bot review about cleanup on error path: https://sashiko.dev/#/patchset/20260415184536.1155220-1-luca.boccassi%40gmail.com the other comments are invalid: luo is not a kmod, and the write hooks are not set up v3: add test case to liveupdate selftest v4: split test case in separate follow-up patch v5: add r-b tag, merge series with LIVEUPDATE_SESSION_GET_NAME ioctl as they both change the same unit test source file, to avoid merge conflicts add '__u32 reserved' to the UAPI struct v6: add more test cases as suggested more verbose commit message fix docstring v7: apply suggestion from review bot to stub out setattr ops, like it was done in 22bdf3d6581a v8: add new patches to reject session names that are empty or too long Luca Boccassi (6): liveupdate: reject LIVEUPDATE_IOCTL_CREATE_SESSION with invalid name length selftests/liveupdate: add test cases for LIVEUPDATE_IOCTL_CREATE_SESSION calls with invalid length liveupdate: add LUO_SESSION_MAGIC magic inode type selftests/liveupdate: add test case for LUO_SESSION_MAGIC liveupdate: add LIVEUPDATE_SESSION_GET_NAME ioctl selftests/liveupdate: add test cases for LIVEUPDATE_SESSION_GET_NAME include/uapi/linux/liveupdate.h | 21 +++ include/uapi/linux/magic.h | 1 + kernel/liveupdate/luo_core.c | 10 +- kernel/liveupdate/luo_internal.h | 2 + kernel/liveupdate/luo_session.c | 106 +++++++++++- .../testing/selftests/liveupdate/liveupdate.c | 153 ++++++++++++++++++ 6 files changed, 287 insertions(+), 6 deletions(-) -- 2.47.3