Russell, On the latest ARM kernel(v2.6.32-rc4),I have observed a BUG() dump when PREEMPT is enabled. Attached is the detailed log for your reference. <snip> ********************************************************** BUG: using smp_processor_id() in preemptible [00000000] code: init/1 caller is flush_tlb_mm+0x44/0x70 Backtrace: [<c00225c4>] (dump_backtrace+0x0/0x110) from [<c01713a0>] (dump_stack+0x18/0x1c) r7:00000000 r6:c00234f0 r5:00000001 r4:c7828000 [<c0171388>] (dump_stack+0x0/0x1c) from [<c0135364>] (debug_smp_processor_id+0xc0/0xf0) [<c01352a4>] (debug_smp_processor_id+0x0/0xf0) from [<c00234f0>] (flush_tlb_mm+0x44/0x70) r7:00000000 r6:c60b41a0 r5:c60b4154 r4:00000001 [<c00234ac>] (flush_tlb_mm+0x0/0x70) from [<c0039568>] (dup_mm+0x304/0x38c) r5:c1f09058 r4:00000000 [<c0039264>] (dup_mm+0x0/0x38c) from [<c0039de4>] (copy_process+0x7b8/0xeb0) [<c003962c>] (copy_process+0x0/0xeb0) from [<c003a638>] (do_fork+0x15c/0x29c) [<c003a4dc>] (do_fork+0x0/0x29c) from [<c0021df0>] (sys_clone+0x34/0x3c) [<c0021dbc>] (sys_clone+0x0/0x3c) from [<c001efa0>] (ret_fast_syscall+0x0/0x2c) ************************************************************** As evident from the log " smp_processor_id " is used in preemptible code. This gets triggered from flush_tlb_mm() --> local_flush_tlb_mm() { if (cpu_isset(smp_processor_id(), vma->vm_mm->cpu_vm_mask)) ^^ } This can be guuarded using "get_cpu/put_cpu" pair which can make it preemption safe but I am not sure whether that is the right fix. Let me know your remarks !! Regards, Santosh
Attachment:
preempt.log
Description: preempt.log