Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp189840imw; Fri, 8 Jul 2022 00:41:08 -0700 (PDT) X-Google-Smtp-Source: AGRyM1ttL6vruSBYqKjiwt3ZCcf9WKlHADFR4ayQYj+wQhc4Tta72LsOeRJxbOBDGEpyfINp5LLr X-Received: by 2002:a63:1318:0:b0:412:9381:a72b with SMTP id i24-20020a631318000000b004129381a72bmr2141323pgl.143.1657266068402; Fri, 08 Jul 2022 00:41:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657266068; cv=none; d=google.com; s=arc-20160816; b=p4/cLa7yQYTWsVy4ZwSls1wDXtsD6XF7nfzSzdQycs8Z+yAHVqRRNqs9UeugiWcwdu wXdMA5mIhKKBinpECbPeYMicjDSZhExkACEGPcL8jm4J8bNIn327KoGiqbRnE25V8ram KdsbDxa3xKwi9llYt+yjGpm+UW+62QK8BscJa6Gb1/omWS0HfH4C0TiC/1P6ebnUstRp SMQTr0ZFo4q7dRQlnzcwDkS2QvWn/g0Y6cVI2Vvc4V30Jgl9J7TqWTugRT6YZ5aVBImc vTT/nj/ddcXDsAZzTWJs1hEShXyLdfGiW+MKjowVjg9pQIA1kp9FuOIQBJGof0TnZSqg 52HQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=4w+Z0kDD9OaEjQfVyr0I3H8dEPw25SlUV1KJB3d9RC8=; b=Mysw6S1tOezRXoCunPkGTSKChrKRLTIQoBRMe6GtgSQbkYz1Bup1cR81owu4awG9t5 wPtryLswK6Etck/n1aCpUUhkPNbiS7yNokWg3zTzCNnbj/IFhaswTsW7fM3Fn6SRWqRq RF2HRa9a4YHCV69BpJF51QF1hwJzJK1WuiAcsdKlZPOnS10IPrkBYINIrpemkPQKULK/ ySa8ae69At9K0B6KtSgkIGSQHAvdaEiouGup8uLAAgalpT3nlI0DhL77ly4n68vjLAMW x5/CitjR1Myh6Ktbjc9JhRdlfyRfqb4z4SqCDZ+5k4E37jgHt95TMNTPcG3/oIqYl6W4 cJew== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z11-20020aa7948b000000b0052542fa57d5si49263011pfk.297.2022.07.08.00.40.53; Fri, 08 Jul 2022 00:41:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237585AbiGHHb6 (ORCPT + 99 others); Fri, 8 Jul 2022 03:31:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43536 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237115AbiGHHb5 (ORCPT ); Fri, 8 Jul 2022 03:31:57 -0400 Received: from out30-132.freemail.mail.aliyun.com (out30-132.freemail.mail.aliyun.com [115.124.30.132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 52B6B7B379 for ; Fri, 8 Jul 2022 00:31:56 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04400;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=5;SR=0;TI=SMTPD_---0VIij5CL_1657265513; Received: from localhost(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VIij5CL_1657265513) by smtp.aliyun-inc.com; Fri, 08 Jul 2022 15:31:53 +0800 From: Xianting Tian To: palmer@dabbelt.com Cc: linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, guoren@kernel.org, Xianting Tian Subject: [RESEND PATCH V5 0/2] Two fixups for 5.19-rcx Date: Fri, 8 Jul 2022 15:31:48 +0800 Message-Id: <20220708073150.352830-1-xianting.tian@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Palmer, The 2 patches are some obviously fixups, could you please have a look? Recently, I finished the development of Crash-utility for RISCV64, I will submit the patches soon. We expect we can normally use Kdump & Crash for 5.19-rcx. thanks. Xianting Tian (2): RISC-V: Fixup fast call of crash_kexec() RISC-V: use __smp_processor_id() instead of smp_processor_id() arch/riscv/kernel/machine_kexec.c | 2 +- arch/riscv/kernel/traps.c | 4 ++++ 2 files changed, 5 insertions(+), 1 deletion(-) -- 2.17.1