RE: [PATCH] soc: fsl: dpio: protect smp_processor_id when get processor id

2021-10-15 Thread Li, Meng
; linux-arm- > ker...@lists.infradead.org > Subject: Re: [PATCH] soc: fsl: dpio: protect smp_processor_id when get > processor id > > [Please note: This e-mail is from an EXTERNAL e-mail address] > > On 2021-10-15 07:36, meng...@windriver.com wrote: > > From: Meng Li > >

[PATCH] soc: fsl: dpio: protect smp_processor_id when get processor id

2021-10-15 Thread Meng . Li
From: Meng Li When enable debug kernel configs,there will be calltrace as below: BUG: using smp_processor_id() in preemptible [] code: swapper/0/1 caller is debug_smp_processor_id+0x20/0x30 CPU: 6 PID: 1 Comm: swapper/0 Not tainted 5.10.63-yocto-standard #1 Hardware name: NXP Layerscape

Re: [PATCH] soc: fsl: dpio: protect smp_processor_id when get processor id

2021-10-15 Thread Robin Murphy
On 2021-10-15 07:36, meng...@windriver.com wrote: From: Meng Li When enable debug kernel configs,there will be calltrace as below: BUG: using smp_processor_id() in preemptible [] code: swapper/0/1 caller is debug_smp_processor_id+0x20/0x30 CPU: 6 PID: 1 Comm: swapper/0 Not tainted 5.10