In the Linux kernel, the following vulnerability has been resolved: spi: rockchip-sfc: Fix DMA-API usage Use DMA-API dmamapsingle() call for getting the DMA address of the transfer buffer instead of hacking with virttophys(). This fixes the following DMA-API debug warning: ------------[ cut here ]------------ DMA-API: rockchip-sfc fe300000.spi: device driver tries to sync DMA memory it has not allocated [device address=0x000000000cf70000] [size=288 bytes] WARNING: kernel/dma/debug.c:1106 at checksync+0x1d8/0x690, CPU#2: systemd-udevd/151 Modules linked in: ... Hardware name: Hardkernel ODROID-M1 (DT) pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : checksync+0x1d8/0x690 lr : checksync+0x1d8/0x690 .. Call trace: checksync+0x1d8/0x690 (P) debugdmasyncsingleforcpu+0x84/0x8c _dmasyncsingleforcpu+0x88/0x234 rockchipsfcexecmemop+0x4a0/0x798 [spirockchipsfc] spimemexecop+0x408/0x498 spinorreaddata+0x170/0x184 spinorreadsfdp+0x74/0xe4 spinorparsesfdp+0x120/0x11f0 spinorsfdpinitparamsdeprecated+0x3c/0x8c spinorscan+0x690/0xf88 spinorprobe+0xe4/0x304 spimemprobe+0x6c/0xa8 spiprobe+0x94/0xd4 really_probe+0xbc/0x298 ...