On Tue, Jul 17, 2018 at 04:23:10PM +0200, Alexandre Belloni wrote: > It is possible to get an interrupt as soon as it is requested. dw_spi_irq > does spi_controller_get_devdata(master) and expects it to be different than > NULL. However, spi_controller_set_devdata() is called after request_irq(), > resulting in the following crash: > > CPU 0 Unable to handle kernel paging request at virtual address 00000030, epc == 8058e09c, ra == 8018ff90 > [...] > Call Trace: > [<8058e09c>] dw_spi_irq+0x8/0x64 > [<8018ff90>] __handle_irq_event_percpu+0x70/0x1d4 > [<80190128>] handle_irq_event_percpu+0x34/0x8c > [<801901c4>] handle_irq_event+0x44/0x80 > [<801951a8>] handle_level_irq+0xdc/0x194 > [<8018f580>] generic_handle_irq+0x38/0x50 > [<804c6924>] ocelot_irq_handler+0x104/0x1c0 > [<8018f580>] generic_handle_irq+0x38/0x50 Please think hard before including complete backtraces in upstream reports, they are very large and contain almost no useful information relative to their size so often obscure the relevant content in your message. If part of the backtrace is usefully illustrative then it's usually better to pull out the relevant sections.
Attachment:
signature.asc
Description: PGP signature