iio: pressure: bmp280: Tolerate IRQ before registering
authorAndy Shevchenko <andriy.shevchenko@linux.intel.com>
Mon, 23 Mar 2020 10:41:25 +0000 (12:41 +0200)
committerJonathan Cameron <Jonathan.Cameron@huawei.com>
Sun, 19 Apr 2020 15:56:18 +0000 (16:56 +0100)
With DEBUG_SHIRQ enabled we have a kernel crash

[  116.482696] BUG: kernel NULL pointer dereference, address: 0000000000000000

...

[  116.606571] Call Trace:
[  116.609023]  <IRQ>
[  116.611047]  complete+0x34/0x50
[  116.614206]  bmp085_eoc_irq+0x9/0x10 [bmp280]

because DEBUG_SHIRQ mechanism fires an IRQ before registration and drivers
ought to be able to handle an interrupt happening before request_irq() returns.

Fixes: aae953949651 ("iio: pressure: bmp280: add support for BMP085 EOC interrupt")
Signed-off-by: Andy Shevchenko <andriy.shevchenko@linux.intel.com>
Acked-by: Linus Walleij <linus.walleij@linaro.org>
Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>
drivers/iio/pressure/bmp280-core.c

index 29c209c..2540e7c 100644 (file)
@@ -713,7 +713,7 @@ static int bmp180_measure(struct bmp280_data *data, u8 ctrl_meas)
        unsigned int ctrl;
 
        if (data->use_eoc)
-               init_completion(&data->done);
+               reinit_completion(&data->done);
 
        ret = regmap_write(data->regmap, BMP280_REG_CTRL_MEAS, ctrl_meas);
        if (ret)
@@ -969,6 +969,9 @@ static int bmp085_fetch_eoc_irq(struct device *dev,
                        "trying to enforce it\n");
                irq_trig = IRQF_TRIGGER_RISING;
        }
+
+       init_completion(&data->done);
+
        ret = devm_request_threaded_irq(dev,
                        irq,
                        bmp085_eoc_irq,