The Linux Kernel Mailing List
 help / color / mirror / Atom feed
From: Pratyush Yadav <pratyush@kernel.org>
To: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: linux-kselftest@vger.kernel.org,  rppt@kernel.org,
	 shuah@kernel.org, akpm@linux-foundation.org,
	 linux-mm@kvack.org, linux-kernel@vger.kernel.org,
	 dmatlack@google.com, kexec@lists.infradead.org,
	 pratyush@kernel.org,  skhawaja@google.com, graf@amazon.com
Subject: Re: [PATCH 2/5] liveupdate: Remove limit on the number of files per session
Date: Tue, 12 May 2026 15:58:23 +0200	[thread overview]
Message-ID: <2vxzwlx8afwg.fsf@kernel.org> (raw)
In-Reply-To: <20260414200237.444170-3-pasha.tatashin@soleen.com> (Pasha Tatashin's message of "Tue, 14 Apr 2026 20:02:34 +0000")

On Tue, Apr 14 2026, Pasha Tatashin wrote:

> To remove the fixed limit on the number of preserved files per session,
> transition the file metadata serialization from a single contiguous memory
> block to a chain of linked blocks.

Same comment as previous patch about a general linked block data
structure here.

>
> ABI Changes:
> - Define 'struct luo_file_header_ser' to manage linked blocks in preserved
>   memory.
> - Update 'struct luo_file_set_ser' to point to the head of the block chain.
> - Bump the session ABI version to 'luo-session-v4' to reflect these breaking
>   changes.
>
> Signed-off-by: Pasha Tatashin <pasha.tatashin@soleen.com>
> ---
>  include/linux/kho/abi/luo.h      |  35 ++++-
>  kernel/liveupdate/luo_file.c     | 226 ++++++++++++++++++++-----------
>  kernel/liveupdate/luo_internal.h |  17 ++-
>  3 files changed, 189 insertions(+), 89 deletions(-)
>
> diff --git a/include/linux/kho/abi/luo.h b/include/linux/kho/abi/luo.h
> index f5732958545e..a15f6a0f3d93 100644
> --- a/include/linux/kho/abi/luo.h
> +++ b/include/linux/kho/abi/luo.h
> @@ -84,8 +84,13 @@
>   *
>   *   - struct luo_session_ser:
>   *     Metadata for a single session, including its name and a physical pointer
> - *     to another preserved memory block containing an array of
> - *     `struct luo_file_ser` for all files in that session.
> + *     to the first `struct luo_file_header_ser` for all files in that session.
> + *     Multiple blocks are linked via the `next` field in the header.
> + *
> + *   - struct luo_file_header_ser:
> + *     Header for the file data block. Contains the physical address of the
> + *     next file data block and the number of `struct luo_file_ser` entries
> + *     that follow this header in the current block.
>   *
>   *   - struct luo_file_ser:
>   *     Metadata for a single preserved file. Contains the `compatible` string to
> @@ -134,11 +139,29 @@ struct luo_file_ser {
>  	u64 token;
>  } __packed;
>  
> +/**
> + * struct luo_file_header_ser - Header for the serialized file data block.
> + * @next:  Physical address of the next struct luo_file_header_ser.
> + * @count: The number of `struct luo_file_ser` entries that immediately
> + *         follow this header in the memory block.
> + *
> + * This structure is located at the beginning of a block of
> + * physical memory preserved across the kexec. It provides the necessary
> + * metadata to interpret the array of file entries that follow.
> + *
> + * If this structure is modified, `LUO_FDT_SESSION_COMPATIBLE` must be updated.
> + */
> +struct luo_file_header_ser {

Nit: Same as before, can we rename it to make it clear that this is a
block header?

> +	u64 next;
> +	u64 count;
> +} __packed;
> +
>  /**
>   * struct luo_file_set_ser - Represents the serialized metadata for file set
> - * @files:   The physical address of a contiguous memory block that holds
> - *           the serialized state of files (array of luo_file_ser) in this file
> - *           set.
> + * @files:   The physical address of the first `struct luo_file_header_ser`.
> + *           This structure is the header for a block of memory containing
> + *           an array of `struct luo_file_ser` entries. Multiple blocks are
> + *           linked via the `next` field in the header.
>   * @count:   The total number of files that were part of this session during
>   *           serialization. Used for iteration and validation during
>   *           restoration.
> @@ -154,7 +177,7 @@ struct luo_file_set_ser {
>   *                          luo_session_header_ser
>   */
>  #define LUO_FDT_SESSION_NODE_NAME	"luo-session"
> -#define LUO_FDT_SESSION_COMPATIBLE	"luo-session-v3"
> +#define LUO_FDT_SESSION_COMPATIBLE	"luo-session-v4"
>  #define LUO_FDT_SESSION_HEADER		"luo-session-header"
>  
>  /**
> diff --git a/kernel/liveupdate/luo_file.c b/kernel/liveupdate/luo_file.c
> index dedbb8d02e6a..20a2d776cff4 100644
> --- a/kernel/liveupdate/luo_file.c
> +++ b/kernel/liveupdate/luo_file.c
> @@ -119,10 +119,12 @@ static LIST_HEAD(luo_file_handler_list);
>  /* Keep track of files being preserved by LUO */
>  static DEFINE_XARRAY(luo_preserved_files);
>  
> -/* 2 4K pages, give space for 128 files per file_set */
> +/* 2 4K pages, give space for 127 files per block */
>  #define LUO_FILE_PGCNT		2ul
> -#define LUO_FILE_MAX							\
> -	((LUO_FILE_PGCNT << PAGE_SHIFT) / sizeof(struct luo_file_ser))
> +#define LUO_FILE_BLOCK_MAX					\
> +	(((LUO_FILE_PGCNT << PAGE_SHIFT) -			\
> +	  sizeof(struct luo_file_header_ser)) /			\
> +	 sizeof(struct luo_file_ser))
>  
>  /**
>   * struct luo_file - Represents a single preserved file instance.
> @@ -158,7 +160,7 @@ static DEFINE_XARRAY(luo_preserved_files);
>   * and the serialized state handle returned by the handler's .preserve()
>   * operation.
>   *
> - * These instances are tracked in a per-file_set list. The @serialized_data
> + * These structures are tracked in a per-file_set list. The @serialized_data
>   * field, which holds a handle to the file's serialized state, may be updated
>   * during the .freeze() callback before being serialized for the next kernel.
>   * After reboot, these structures are recreated by luo_file_deserialize() and
> @@ -175,37 +177,68 @@ struct luo_file {
>  	u64 token;
>  };
>  
> -static int luo_alloc_files_mem(struct luo_file_set *file_set)
> +static int luo_file_add_block(struct luo_file_set *file_set,
> +			      struct luo_file_header_ser *ser)
>  {
> -	size_t size;
> -	void *mem;
> +	struct luo_file_block *block;
>  
> -	if (file_set->files)
> -		return 0;
> -
> -	WARN_ON_ONCE(file_set->count);
> +	if (file_set->nblocks >= LUO_MAX_BLOCKS)
> +		return -ENOSPC;
>  
> -	size = LUO_FILE_PGCNT << PAGE_SHIFT;
> -	mem = kho_alloc_preserve(size);
> -	if (IS_ERR(mem))
> -		return PTR_ERR(mem);
> +	block = kzalloc_obj(*block);
> +	if (!block)
> +		return -ENOMEM;
>  
> -	file_set->files = mem;
> +	block->ser = ser;
> +	list_add_tail(&block->list, &file_set->blocks);
> +	file_set->nblocks++;
>  
>  	return 0;
>  }
>  
> -static void luo_free_files_mem(struct luo_file_set *file_set)
> +static int luo_file_create_ser_block(struct luo_file_set *file_set)
>  {
> -	/* If file_set has files, no need to free preservation memory */
> -	if (file_set->count)
> -		return;
> +	struct luo_file_block *last = NULL;
> +	struct luo_file_header_ser *ser;
> +	int err;
>  
> -	if (!file_set->files)
> -		return;
> +	ser = kho_alloc_preserve(LUO_FILE_PGCNT << PAGE_SHIFT);
> +	if (IS_ERR(ser))
> +		return PTR_ERR(ser);
> +
> +	if (!list_empty(&file_set->blocks))
> +		last = list_last_entry(&file_set->blocks, struct luo_file_block, list);
> +
> +	err = luo_file_add_block(file_set, ser);
> +	if (err)
> +		goto err_unpreserve;
> +
> +	if (last)
> +		last->ser->next = virt_to_phys(ser);

Same comments as last patch about list_last_entry_or_null() and moving
this to luo_file_add_block().

> +
> +	return 0;
>  
> -	kho_unpreserve_free(file_set->files);
> -	file_set->files = NULL;
> +err_unpreserve:
> +	kho_unpreserve_free(ser);
> +	return err;
> +}
> +
> +static void luo_file_destroy_ser_blocks(struct luo_file_set *file_set,
> +					bool unpreserve)
> +{
> +	struct luo_file_block *block, *tmp;
> +
> +	list_for_each_entry_safe(block, tmp, &file_set->blocks, list) {
> +		if (block->ser) {

Same here. block is always created with its ser, so why have this check?

> +			if (unpreserve)
> +				kho_unpreserve_free(block->ser);
> +			else
> +				kho_restore_free(block->ser);

And same comment about the nastiness here, but once again I have nothing
better to offer.

> +		}
> +		list_del(&block->list);
> +		kfree(block);
> +		file_set->nblocks--;
> +	}
>  }
>  
>  static unsigned long luo_get_id(struct liveupdate_file_handler *fh,
> @@ -247,7 +280,9 @@ static bool luo_token_is_used(struct luo_file_set *file_set, u64 token)
>   * 3. Iterates through registered handlers, calling can_preserve() to find one
>   *    compatible with the given @fd.
>   * 4. Calls the handler's .preserve() operation, which saves the file's state
> - *    and returns an opaque private data handle.
> + *    and returns an opaque u64 handle. This is typically performed while the
> + *    workload is still active to minimize the downtime during the
> + *    actual reboot transition.
>   * 5. Adds the new instance to the file_set's internal list.
>   *
>   * On success, LUO takes a reference to the 'struct file' and considers it
> @@ -277,17 +312,16 @@ int luo_preserve_file(struct luo_file_set *file_set, u64 token, int fd)
>  	if (luo_token_is_used(file_set, token))
>  		return -EEXIST;
>  
> -	if (file_set->count == LUO_FILE_MAX)
> -		return -ENOSPC;
> +	if (file_set->count == file_set->nblocks * LUO_FILE_BLOCK_MAX) {
> +		err = luo_file_create_ser_block(file_set);
> +		if (err)
> +			return err;
> +	}
>  
>  	file = fget(fd);
>  	if (!file)
>  		return -EBADF;
>  
> -	err = luo_alloc_files_mem(file_set);
> -	if (err)
> -		goto  err_fput;
> -
>  	err = -ENOENT;
>  	down_read(&luo_register_rwlock);
>  	list_private_for_each_entry(fh, &luo_file_handler_list, list) {
> @@ -301,7 +335,7 @@ int luo_preserve_file(struct luo_file_set *file_set, u64 token, int fd)
>  
>  	/* err is still -ENOENT if no handler was found */
>  	if (err)
> -		goto err_free_files_mem;
> +		goto err_fput;
>  
>  	/* safe to use fh because its module is pinned */
>  	err = xa_insert(&luo_preserved_files, luo_get_id(fh, file),
> @@ -345,8 +379,6 @@ int luo_preserve_file(struct luo_file_set *file_set, u64 token, int fd)
>  	xa_erase(&luo_preserved_files, luo_get_id(fh, file));
>  err_module_put:
>  	module_put(fh->ops->owner);
> -err_free_files_mem:
> -	luo_free_files_mem(file_set);
>  err_fput:
>  	fput(file);
>  
> @@ -399,7 +431,7 @@ void luo_file_unpreserve_files(struct luo_file_set *file_set)
>  		kfree(luo_file);
>  	}
>  
> -	luo_free_files_mem(file_set);
> +	luo_file_destroy_ser_blocks(file_set, true);
>  }
>  
>  static int luo_file_freeze_one(struct luo_file_set *file_set,
> @@ -446,6 +478,7 @@ static void __luo_file_unfreeze(struct luo_file_set *file_set,
>  				struct luo_file *failed_entry)
>  {
>  	struct list_head *files_list = &file_set->files_list;
> +	struct luo_file_block *block;
>  	struct luo_file *luo_file;
>  
>  	list_for_each_entry(luo_file, files_list, list) {
> @@ -455,7 +488,11 @@ static void __luo_file_unfreeze(struct luo_file_set *file_set,
>  		luo_file_unfreeze_one(file_set, luo_file);
>  	}
>  
> -	memset(file_set->files, 0, LUO_FILE_PGCNT << PAGE_SHIFT);
> +	list_for_each_entry(block, &file_set->blocks, list) {
> +		block->ser->count = 0;
> +		memset(block->ser + 1, 0,
> +		       (LUO_FILE_PGCNT << PAGE_SHIFT) - sizeof(*block->ser));
> +	}
>  }
>  
>  /**
> @@ -494,7 +531,8 @@ static void __luo_file_unfreeze(struct luo_file_set *file_set,
>  int luo_file_freeze(struct luo_file_set *file_set,
>  		    struct luo_file_set_ser *file_set_ser)
>  {
> -	struct luo_file_ser *file_ser = file_set->files;
> +	struct luo_file_block *block;
> +	struct luo_file_ser *file_ser;
>  	struct luo_file *luo_file;
>  	int err;
>  	int i;
> @@ -502,11 +540,18 @@ int luo_file_freeze(struct luo_file_set *file_set,
>  	if (!file_set->count)
>  		return 0;
>  
> -	if (WARN_ON(!file_ser))
> -		return -EINVAL;
> +	block = list_first_entry(&file_set->blocks, struct luo_file_block, list);
> +	file_ser = (void *)(block->ser + 1);
>  
>  	i = 0;
>  	list_for_each_entry(luo_file, &file_set->files_list, list) {
> +		if (i == LUO_FILE_BLOCK_MAX) {
> +			block->ser->count = i;
> +			block = list_next_entry(block, list);
> +			file_ser = (void *)(block->ser + 1);
> +			i = 0;
> +		}
> +
>  		err = luo_file_freeze_one(file_set, luo_file);
>  		if (err < 0) {
>  			pr_warn("Freeze failed for token[%#0llx] handler[%s] err[%pe]\n",
> @@ -521,10 +566,13 @@ int luo_file_freeze(struct luo_file_set *file_set,
>  		file_ser[i].token = luo_file->token;
>  		i++;
>  	}
> +	block->ser->count = i;
>  
>  	file_set_ser->count = file_set->count;
> -	if (file_set->files)
> -		file_set_ser->files = virt_to_phys(file_set->files);
> +	if (!list_empty(&file_set->blocks)) {
> +		block = list_first_entry(&file_set->blocks, struct luo_file_block, list);
> +		file_set_ser->files = virt_to_phys(block->ser);
> +	}
>  
>  	return 0;
>  
> @@ -746,10 +794,7 @@ int luo_file_finish(struct luo_file_set *file_set)
>  		kfree(luo_file);
>  	}
>  
> -	if (file_set->files) {
> -		kho_restore_free(file_set->files);
> -		file_set->files = NULL;
> -	}
> +	luo_file_destroy_ser_blocks(file_set, false);
>  
>  	return 0;
>  }
> @@ -782,8 +827,10 @@ int luo_file_finish(struct luo_file_set *file_set)
>  int luo_file_deserialize(struct luo_file_set *file_set,
>  			 struct luo_file_set_ser *file_set_ser)
>  {
> -	struct luo_file_ser *file_ser;
> -	u64 i;
> +	struct luo_file_header_ser *header_ser;
> +	struct luo_file_block *block;
> +	u64 header_ser_pa;
> +	int err;
>  
>  	if (!file_set_ser->files) {
>  		WARN_ON(file_set_ser->count);
> @@ -791,7 +838,15 @@ int luo_file_deserialize(struct luo_file_set *file_set,
>  	}
>  
>  	file_set->count = file_set_ser->count;
> -	file_set->files = phys_to_virt(file_set_ser->files);
> +	header_ser_pa = file_set_ser->files;
> +
> +	while (header_ser_pa) {
> +		header_ser = phys_to_virt(header_ser_pa);
> +		err = luo_file_add_block(file_set, header_ser);
> +		if (err)
> +			return err;
> +		header_ser_pa = header_ser->next;
> +	}
>  
>  	/*
>  	 * Note on error handling:
> @@ -808,42 +863,51 @@ int luo_file_deserialize(struct luo_file_set *file_set,
>  	 * userspace to detect the failure and trigger a reboot, which will
>  	 * reliably reset devices and reclaim memory.
>  	 */
> -	file_ser = file_set->files;
> -	for (i = 0; i < file_set->count; i++) {
> -		struct liveupdate_file_handler *fh;
> -		bool handler_found = false;
> -		struct luo_file *luo_file;
> -
> -		down_read(&luo_register_rwlock);
> -		list_private_for_each_entry(fh, &luo_file_handler_list, list) {
> -			if (!strcmp(fh->compatible, file_ser[i].compatible)) {
> -				if (try_module_get(fh->ops->owner))
> -					handler_found = true;
> -				break;
> -			}
> -		}
> -		up_read(&luo_register_rwlock);
> +	list_for_each_entry(block, &file_set->blocks, list) {
> +		struct luo_file_ser *file_ser = (void *)(block->ser + 1);
>  
> -		if (!handler_found) {
> -			pr_warn("No registered handler for compatible '%.*s'\n",
> -				(int)sizeof(file_ser[i].compatible),
> -				file_ser[i].compatible);
> -			return -ENOENT;
> +		if (block->ser->count > LUO_FILE_BLOCK_MAX) {
> +			pr_warn("File block contains too many entries: %llu\n",
> +				block->ser->count);
> +			return -EINVAL;
>  		}
>  
> -		luo_file = kzalloc_obj(*luo_file);
> -		if (!luo_file) {
> -			module_put(fh->ops->owner);
> -			return -ENOMEM;
> -		}
> +		for (int i = 0; i < block->ser->count; i++) {
> +			struct liveupdate_file_handler *fh;
> +			bool handler_found = false;
> +			struct luo_file *luo_file;
> +
> +			down_read(&luo_register_rwlock);
> +			list_private_for_each_entry(fh, &luo_file_handler_list, list) {
> +				if (!strcmp(fh->compatible, file_ser[i].compatible)) {
> +					if (try_module_get(fh->ops->owner))
> +						handler_found = true;
> +					break;
> +				}
> +			}
> +			up_read(&luo_register_rwlock);
>  
> -		/* safe to use fh because its module is pinned */
> -		luo_file->fh = fh;
> -		luo_file->file = NULL;
> -		luo_file->serialized_data = file_ser[i].data;
> -		luo_file->token = file_ser[i].token;
> -		mutex_init(&luo_file->mutex);
> -		list_add_tail(&luo_file->list, &file_set->files_list);
> +			if (!handler_found) {
> +				pr_warn("No registered handler for compatible '%.*s'\n",
> +					(int)sizeof(file_ser[i].compatible),
> +					file_ser[i].compatible);
> +				return -ENOENT;
> +			}
> +
> +			luo_file = kzalloc_obj(*luo_file);
> +			if (!luo_file) {
> +				module_put(fh->ops->owner);
> +				return -ENOMEM;
> +			}
> +
> +			/* safe to use fh because its module is pinned */
> +			luo_file->fh = fh;
> +			luo_file->file = NULL;
> +			luo_file->serialized_data = file_ser[i].data;
> +			luo_file->token = file_ser[i].token;
> +			mutex_init(&luo_file->mutex);
> +			list_add_tail(&luo_file->list, &file_set->files_list);
> +		}

Nit: this diff is very hard to read. Perhaps splitting this into helper
functions would help?

>  	}
>  
>  	return 0;
> @@ -852,12 +916,14 @@ int luo_file_deserialize(struct luo_file_set *file_set,
>  void luo_file_set_init(struct luo_file_set *file_set)
>  {
>  	INIT_LIST_HEAD(&file_set->files_list);
> +	INIT_LIST_HEAD(&file_set->blocks);
>  }
>  
>  void luo_file_set_destroy(struct luo_file_set *file_set)
>  {
>  	WARN_ON(file_set->count);
>  	WARN_ON(!list_empty(&file_set->files_list));
> +	WARN_ON(!list_empty(&file_set->blocks));
>  }
>  
>  /**
> diff --git a/kernel/liveupdate/luo_internal.h b/kernel/liveupdate/luo_internal.h
> index a73f42069301..a92aaa9c073d 100644
> --- a/kernel/liveupdate/luo_internal.h
> +++ b/kernel/liveupdate/luo_internal.h
> @@ -50,19 +50,30 @@ static inline int luo_ucmd_respond(struct luo_ucmd *ucmd,
>   */
>  #define luo_restore_fail(__fmt, ...) panic(__fmt, ##__VA_ARGS__)
>  
> +/**
> + * struct luo_file_block - Internal representation of a file serialization block.
> + * @list: List head for linking blocks in memory.
> + * @ser:  Pointer to the serialized header in preserved memory.
> + */
> +struct luo_file_block {
> +	struct list_head list;
> +	struct luo_file_header_ser *ser;
> +};
> +
>  /**
>   * struct luo_file_set - A set of files that belong to the same sessions.
>   * @files_list: An ordered list of files associated with this session, it is
>   *              ordered by preservation time.
> - * @files:      The physically contiguous memory block that holds the serialized
> - *              state of files.
> + * @blocks:     The list of serialization blocks (struct luo_file_block).
>   * @count:      A counter tracking the number of files currently stored in the
>   *              @files_list for this session.
> + * @nblocks:    The number of allocated serialization blocks.
>   */
>  struct luo_file_set {
>  	struct list_head files_list;
> -	struct luo_file_ser *files;
> +	struct list_head blocks;
>  	long count;
> +	long nblocks;
>  };
>  
>  /**

-- 
Regards,
Pratyush Yadav

  parent reply	other threads:[~2026-05-12 13:58 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20260414200237.444170-1-pasha.tatashin@soleen.com>
     [not found] ` <20260414200237.444170-2-pasha.tatashin@soleen.com>
2026-05-12 13:35   ` [PATCH 1/5] liveupdate: Remove limit on the number of sessions Pratyush Yadav
2026-05-12 15:55     ` Pasha Tatashin
     [not found] ` <20260414200237.444170-3-pasha.tatashin@soleen.com>
2026-05-12 13:58   ` Pratyush Yadav [this message]
2026-05-12 20:06     ` [PATCH 2/5] liveupdate: Remove limit on the number of files per session Pasha Tatashin
     [not found] ` <20260414200237.444170-4-pasha.tatashin@soleen.com>
2026-05-12 14:04   ` [PATCH 3/5] selftests/liveupdate: Test session and file limit removal Pratyush Yadav
2026-05-12 20:13     ` Pasha Tatashin
     [not found] ` <20260414200237.444170-5-pasha.tatashin@soleen.com>
2026-05-12 14:09   ` [PATCH 4/5] selftests/liveupdate: Add stress-sessions kexec test Pratyush Yadav
2026-05-12 20:41     ` Pasha Tatashin
     [not found] ` <20260414200237.444170-6-pasha.tatashin@soleen.com>
2026-05-12 14:10   ` [PATCH 5/5] selftests/liveupdate: Add stress-files " Pratyush Yadav

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2vxzwlx8afwg.fsf@kernel.org \
    --to=pratyush@kernel.org \
    --cc=akpm@linux-foundation.org \
    --cc=dmatlack@google.com \
    --cc=graf@amazon.com \
    --cc=kexec@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-kselftest@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=pasha.tatashin@soleen.com \
    --cc=rppt@kernel.org \
    --cc=shuah@kernel.org \
    --cc=skhawaja@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox