diff options
author | 2025-05-09 09:09:49 -0700 | |
---|---|---|
committer | 2025-05-09 09:09:49 -0700 | |
commit | 29fe5d50dfa6b61043e2e89206389ae56b5596eb (patch) | |
tree | e95dce47fd34d42d7f37e9aa1fad40358e2019bb | |
parent | x86/mm: Eliminate window where TLB flushes may be inadvertently skipped (diff) | |
parent | module: ensure that kobject_put() is safe for module type kobjects (diff) | |
download | wireguard-linux-29fe5d50dfa6b61043e2e89206389ae56b5596eb.tar.xz wireguard-linux-29fe5d50dfa6b61043e2e89206389ae56b5596eb.zip |
Merge tag 'modules-6.15-rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/modules/linux
Pull modules fix from Petr Pavlu:
"A single fix to prevent use of an uninitialized completion pointer
when releasing a module_kobject in specific situations.
This addresses a latent bug exposed by commit f95bbfe18512 ("drivers:
base: handle module_kobject creation")"
* tag 'modules-6.15-rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/modules/linux:
module: ensure that kobject_put() is safe for module type kobjects
Diffstat (limited to '')
-rw-r--r-- | kernel/params.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/kernel/params.c b/kernel/params.c index e668fc90b83e..b92d64161b75 100644 --- a/kernel/params.c +++ b/kernel/params.c @@ -943,7 +943,9 @@ struct kset *module_kset; static void module_kobj_release(struct kobject *kobj) { struct module_kobject *mk = to_module_kobject(kobj); - complete(mk->kobj_completion); + + if (mk->kobj_completion) + complete(mk->kobj_completion); } const struct kobj_type module_ktype = { |