[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20201008155209.18025-110-ap420073@gmail.com>
Date: Thu, 8 Oct 2020 15:52:02 +0000
From: Taehee Yoo <ap420073@...il.com>
To: davem@...emloft.net, kuba@...nel.org, netdev@...r.kernel.org
Cc: ap420073@...il.com, linux-wireless@...r.kernel.org,
wil6210@....qualcomm.com, b43-dev@...ts.infradead.org,
linux-bluetooth@...r.kernel.org
Subject: [PATCH net 110/117] Bluetooth: set use_debug_keys_fops.owner to THIS_MODULE
If THIS_MODULE is not set, the module would be removed while debugfs is
being used.
It eventually makes kernel panic.
Fixes: 0886aea6acd2 ("Bluetooth: Expose debug keys usage setting via debugfs")
Signed-off-by: Taehee Yoo <ap420073@...il.com>
---
net/bluetooth/hci_debugfs.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/net/bluetooth/hci_debugfs.c b/net/bluetooth/hci_debugfs.c
index 5e8af2658e44..cdf19e494c31 100644
--- a/net/bluetooth/hci_debugfs.c
+++ b/net/bluetooth/hci_debugfs.c
@@ -284,6 +284,7 @@ static const struct file_operations use_debug_keys_fops = {
.open = simple_open,
.read = use_debug_keys_read,
.llseek = default_llseek,
+ .owner = THIS_MODULE,
};
static ssize_t sc_only_mode_read(struct file *file, char __user *user_buf,
--
2.17.1
Powered by blists - more mailing lists