From nobody Mon Feb 9 11:07:57 2026 Received: from mail-yx1-f50.google.com (mail-yx1-f50.google.com [74.125.224.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7086A2D6E53 for ; Tue, 23 Dec 2025 20:15:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.224.50 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766520914; cv=none; b=MZPlmqpDx0vRiLbBGhaxA7tipCdDjsMm4f8VL9ucviZk9btf/zT6Ajih+QyNeAXj31wQv8fRplnILQ8R2/pUhQZPX/Kj8aGgFZR68+y6CSfF9lafRuAnFgOaRlgpSmsTx8UZ9JC4x85lDmOyoOFywoaqY7u0tAle5ooBNHzn4EU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1766520914; c=relaxed/simple; bh=4idhp06eY83LsCFQTcnLmVATmsPcCDqZ3VVbWax6sxA=; h=From:To:Subject:Date:Message-ID:MIME-Version; b=Zv53ibCSRuBjWPRV7GwV1BdmdXzax9k467wDWyKPLIs8l/JHKHQHYOQsUMNx5O/DIn+pkKmeKt8DBm6giYTb58ls9st2B47lOM5IetEH9bK83JxGehZN+Q++cE3ucxb6e7ExIETaJEp8Jo2yzMzzlo+zgzYQ4wNt5FF+F9s+nN4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=soleen.com; spf=pass smtp.mailfrom=soleen.com; dkim=pass (2048-bit key) header.d=soleen.com header.i=@soleen.com header.b=jReZuFSk; arc=none smtp.client-ip=74.125.224.50 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=soleen.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=soleen.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=soleen.com header.i=@soleen.com header.b="jReZuFSk" Received: by mail-yx1-f50.google.com with SMTP id 956f58d0204a3-6446c1a7a1cso4565824d50.3 for ; Tue, 23 Dec 2025 12:15:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=soleen.com; s=google; t=1766520911; x=1767125711; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=VlLs7P9pgO4eKILsAhoNSySRcyvhRmXbFz4fdi2tBV4=; b=jReZuFSkV9AiTq7EgZIuRshcnrjtTAnFZaXrEtj1EFHX1ph7FTAOX2xLneBJ0MFxdx qdbbbu/Y6vbEC0eoySOATqUXJmNhnvOnGQVwjyews8il7bnfI/BfHRCmJ64ZIXf6UY54 OZPDhr/JuUbeQ9dfIhP+IQhzVl/Q9KE6Vc0didL486hFPZ18Jxx7/KXI/M1JR2we+wSZ PdSGhF40pKXf+p+4cDrii/KyGrLKwJdth1lirCZHI/RyFqIlJN5qK/4LrQjV43euJXBB VYhbNYy5ijM0wZMaVqESWiUJtEecl82x/J1d1xQ/H/cN5U1CqjN9X5wlWugnp1xdwnXW 9JSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766520911; x=1767125711; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=VlLs7P9pgO4eKILsAhoNSySRcyvhRmXbFz4fdi2tBV4=; b=quSCqRpVXkXYTWfdYm2VaplO/3DCit0x3W2DtzcOqvApXFoefGD1Kctk0z7piZ9Kbi N3PhWbQGMuj7i9nmbWm9tKfN+rGMW4a9KNUVY5e7Blg3KG4usmMPIM6jKN577u5Uq5TT efvmIT2ouFFrLw3aldxnU3r8onPDfcwox6Y5lWvX59ikFTCXvpro6vBbZq9iGSKOfy5t LOAuUpQDFvqczKs8rtEr3de8lyYFcZArryLK7eH11jX6fEVmKKhMJfw0zX4b/Q7uyAfT Ez3W4TPHKwtoXxvfYOx01u1ntUfnht7iupZMM1aaaCfhR6YSOc9CACBwTEnZgJ5JqYve VcFg== X-Forwarded-Encrypted: i=1; AJvYcCVpjx2yhG9ko43Hxc/iZ0K/5HaB0ezuRTzjKh90pdOMb+YpblykIfs22GANLPeIlEsqaFru/lOsEA+5PQc=@vger.kernel.org X-Gm-Message-State: AOJu0YwKEclfGeZGJA5M/iT+cpcTBYbzC9htuHgxwyfkCLtvldRJ5vz3 KPd75Yoh1pQAfD7nKDfUpvmpHktR0AGD9VYx8u7URsCdV/n3R9opkAkbN/LjCvFemhvE4Fxi4Vg gw3kz X-Gm-Gg: AY/fxX4luD63Lr1L8bzME5Bgbs5waradgAE3015GYXq77vE4tYXq/VzG2KQucm5ujBD cRSN6+JJT+PVlWYooRZBtYCi4uNFz8y61GNITk6sp7KbViunuWqznq5CPYvtZ6SghYnoEBRm+Cb PbpPEaUSuXsud2/Fu+gWX1x9/97fOuz0fr6+BcPNOeLS190pdYQudy6DhP2gxE7xhJk0QaRguke Dc6GiutgJiPOQd+DiFlMCphIeatVDbHu2JPs+CNkTc1yyeni7pW72Uvdo0EOZho3n7OmXv3nnhy 8FF8D6NMZEEbW1aLdKO5YidAFOCLZ25Fem9ubfSkQEKFgpmIZprnpUa/K/ODaoEmGGeebbzVZyR LgBNo7dHWZUUgRQPfZDQuxzi5tyFmeYJ7UMkyOfGauJTI0Vwmx9FAAHbQMsABJCMui97hy2Eaxw E1PEmmLxdLXkQApFtpVDlpQ8UKArFipFlaCtHSuFxG1YLc4KDPFYyQJddZxwhSf30Jd+zvQTMcI JAhQrbXwG+E3AHJan2oMGoiPNicaPGxoNDu8w== X-Google-Smtp-Source: AGHT+IE9hkWfg/wdg+y79EHOSLumqYhte+VdlGUYNiXwnb13zkCzLpIQx0sZj2VsFDL0IjdRdTFEQA== X-Received: by 2002:a05:690e:130d:b0:63f:bf9d:e530 with SMTP id 956f58d0204a3-6466a86bd2emr13280316d50.29.1766520911203; Tue, 23 Dec 2025 12:15:11 -0800 (PST) Received: from soleen.c.googlers.com.com (182.221.85.34.bc.googleusercontent.com. [34.85.221.182]) by smtp.gmail.com with ESMTPSA id 00721157ae682-78fb44f0d57sm57949307b3.31.2025.12.23.12.15.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Dec 2025 12:15:10 -0800 (PST) From: Pasha Tatashin To: akpm@linux-foundation.org, pasha.tatashin@soleen.com, rppt@kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, pratyush@kernel.org Subject: [PATCH v1] liveupdate: separate memfd support into LIVEUPDATE_MEMFD Date: Tue, 23 Dec 2025 15:15:06 -0500 Message-ID: <20251223201506.2334991-1-pasha.tatashin@soleen.com> X-Mailer: git-send-email 2.52.0.351.gbe84eed79e-goog Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Decouple memfd preservation support from the core Live Update Orchestrator configuration. Previously, enabling CONFIG_LIVEUPDATE forced a dependency on CONFIG_SHMEM and unconditionally compiled memfd_luo.o. However, Live Update may be used for purposes that do not require memfd-backed memory preservation. Introduce CONFIG_LIVEUPDATE_MEMFD to gate memfd_luo.o. This moves the SHMEM and MEMFD_CREATE dependencies to the specific feature that needs them, allowing the base LIVEUPDATE option to be selected independently of shared memory support. Signed-off-by: Pasha Tatashin Reviewed-by: Pratyush Yadav --- kernel/liveupdate/Kconfig | 16 +++++++++++++++- mm/Makefile | 2 +- 2 files changed, 16 insertions(+), 2 deletions(-) diff --git a/kernel/liveupdate/Kconfig b/kernel/liveupdate/Kconfig index d2aeaf13c3ac..9a1a8cdcf16c 100644 --- a/kernel/liveupdate/Kconfig +++ b/kernel/liveupdate/Kconfig @@ -54,7 +54,6 @@ config KEXEC_HANDOVER_ENABLE_DEFAULT config LIVEUPDATE bool "Live Update Orchestrator" depends on KEXEC_HANDOVER - depends on SHMEM help Enable the Live Update Orchestrator. Live Update is a mechanism, typically based on kexec, that allows the kernel to be updated @@ -73,4 +72,19 @@ config LIVEUPDATE =20 If unsure, say N. =20 +config LIVEUPDATE_MEMFD + bool "Live update support for memfd" + depends on LIVEUPDATE + depends on MEMFD_CREATE + depends on SHMEM + help + Enable live update support for memfd regions. This allows preserving + memfd-backed memory across kernel live updates. + + This can be used to back VM memory with memfds, allowing the guest + memory to persist, or for other user workloads needing to preserve + pages. + + If unsure, say N. + endmenu diff --git a/mm/Makefile b/mm/Makefile index 9175f8cc6565..798f04233d71 100644 --- a/mm/Makefile +++ b/mm/Makefile @@ -100,7 +100,7 @@ obj-$(CONFIG_NUMA) +=3D memory-tiers.o obj-$(CONFIG_DEVICE_MIGRATION) +=3D migrate_device.o obj-$(CONFIG_TRANSPARENT_HUGEPAGE) +=3D huge_memory.o khugepaged.o obj-$(CONFIG_PAGE_COUNTER) +=3D page_counter.o -obj-$(CONFIG_LIVEUPDATE) +=3D memfd_luo.o +obj-$(CONFIG_LIVEUPDATE_MEMFD) +=3D memfd_luo.o obj-$(CONFIG_MEMCG_V1) +=3D memcontrol-v1.o obj-$(CONFIG_MEMCG) +=3D memcontrol.o vmpressure.o ifdef CONFIG_SWAP base-commit: cc3aa43b44bdb43dfbac0fcb51c56594a11338a8 --=20 2.52.0.351.gbe84eed79e-goog