In the Linux kernel, the following vulnerability has been resolved: spi: spi-dw-dma: fix print error log when wait finish transaction If an error occurs, the device may not have a current message. In this case, the system will crash. In this case, it's better to use dev from the struct ctlr (struct spi_controller*).
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2026042458-CVE-2026-31560-9e2c@gregkh/T