Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp206374ybi; Tue, 2 Jul 2019 19:11:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqzUwih2YdkHbZcKKQgokGf0TbINwfcFPIL9WhSlZE2DUaAG5/Dz53oel492jWAbU8J+kUn4 X-Received: by 2002:a65:4505:: with SMTP id n5mr3335650pgq.301.1562119904045; Tue, 02 Jul 2019 19:11:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562119904; cv=none; d=google.com; s=arc-20160816; b=tJIfyWBEZRZeFo1nvB4n2+CYY35xGIUSgR32YNlE+FdMnBVKhNzt+u0X13O/xfQ6HK mYvtAhmvVRRTFpvwO3VGiVsUxaXbMBc+TfwibD+HUKlZHKKZpOQDfYuPl+HHrLiq/nzA 10nF6wi2WtOeiFuHT21KpPspQUjm5fatOux65GCztn64OHrjrZ2kIYdvsy+Fmi2+sk9J g8Uhhrbifl6Ji6anvX+PvaIGXuViAHrwWgYBYWG0lyGaWV8T1TLBJoUSskYWyGU9/WU1 0sDFs6WB4nOqbd+rnKR/lxN/cUMOctiJArTaduCi16a3rv4I7R9hYyaSvZbdcY+jLhFr wNOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:date:message-id:subject:from:cc:to; bh=Oje90dWvd+Ub1uUftc2fzYXYZ/0kk0GCN4l3Pr1rxyU=; b=tFo2N3iw/kS1kqEc2iby05LHa6oRZL7EAP9ffNz04RF3uFFfTpoPHvApShy69Sjt/W eZ1kcd6XAE28/3BJ/5jy3oFQEGqWkNLH7sd5F0FXWOTVVfVVLGl5qjTb0+FQRkmgysoa iAuuuZ/6prsw+dFQTFAQr5O1+CuVeVFDgmnIdqt1UU7kaTbMIbO6bJIyqR7NJaoigR1d aKjSPyMZm49OJg7VJMHQldGukcr1JKNrjWgYRD8kYFIKiE5PCO1s5bHITxPgVUb0Yq13 +a7zjQp2qaeY4zkZnnaWXvcFwtj0/Rnv6YqbPTkFU481oh2MWZcSdTslpkgXWyvqVM1c 8yqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x21si585054pln.192.2019.07.02.19.11.27; Tue, 02 Jul 2019 19:11:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727220AbfGCCLC (ORCPT + 99 others); Tue, 2 Jul 2019 22:11:02 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:8129 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726329AbfGCCLC (ORCPT ); Tue, 2 Jul 2019 22:11:02 -0400 Received: from DGGEMS408-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id BAAF3919EA66212C700B; Wed, 3 Jul 2019 10:10:59 +0800 (CST) Received: from [127.0.0.1] (10.184.225.177) by DGGEMS408-HUB.china.huawei.com (10.3.19.208) with Microsoft SMTP Server id 14.3.439.0; Wed, 3 Jul 2019 10:10:29 +0800 To: Jessica Yu , , , CC: LKML , , , Mingfangsen From: Zhiqiang Liu Subject: [PATCH v2] module: add usage links when calling ref_module func Message-ID: <4fec6c3b-03b8-dd57-4009-99431105a8a5@huawei.com> Date: Wed, 3 Jul 2019 10:09:51 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 MIME-Version: 1.0 Content-Type: text/plain; charset="gb18030" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.184.225.177] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhiqiang Liu Users can call ref_module func in their modules to construct relationships with other modules. However, the holders '/sys/module//holders' of the target module donot include the users` module. So lsmod command misses detailed info of 'Used by'. When load module, the process is given as follows, load_module() -> mod_sysfs_setup() -> add_usage_links -> do_init_module -> mod->init() add_usage_links func creates holders of target modules linking to this module. If ref_module is called in mod->init() func, the usage links cannot be added. Here, we will add usage link of a to b's holder_dir. V1->V2: - remove incorrect Fixes tag - fix error handling of sysfs_create_link as suggested by Jessica Yu Signed-off-by: Zhiqiang Liu Suggested-by: Jessica Yu Reviewed-by: Kang Zhou --- kernel/module.c | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/kernel/module.c b/kernel/module.c index 80c7c09584cf..672abce2222c 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -837,25 +837,26 @@ static int already_uses(struct module *a, struct module *b) * 'b' can walk the list to see who sourced them), and of 'a' * targets (so 'a' can see what modules it targets). */ -static int add_module_usage(struct module *a, struct module *b) +static struct module_use *add_module_usage(struct module *a, struct module *b) { struct module_use *use; pr_debug("Allocating new usage for %s.\n", a->name); use = kmalloc(sizeof(*use), GFP_ATOMIC); if (!use) - return -ENOMEM; + return NULL; use->source = a; use->target = b; list_add(&use->source_list, &b->source_list); list_add(&use->target_list, &a->target_list); - return 0; + return use; } /* Module a uses b: caller needs module_mutex() */ int ref_module(struct module *a, struct module *b) { + struct module_use *use; int err; if (b == NULL || already_uses(a, b)) @@ -866,9 +867,18 @@ int ref_module(struct module *a, struct module *b) if (err) return err; - err = add_module_usage(a, b); + use = add_module_usage(a, b); + if (!use) { + module_put(b); + return -ENOMEM; + } + + err = sysfs_create_link(b->holders_dir, &a->mkobj.kobj, a->name); if (err) { module_put(b); + list_del(&use->source_list); + list_del(&use->target_list); + kfree(use); return err; } return 0; -- 2.19.1