Hi Yiping,
Sorry for late reply.
Actually, this issue is not so complicated.
It is not triggered by applications, it is triggered by the enable of CONFIG_DEBUG_PREEMPT.
When the config CONFIG_DEBUG_PREEMPT enabled in kernel config, the calltrace will show as users to use the dpaa2 ethernet ports.
I find it in LSDK20.04, but I think it is a generic issue.
The followings give the relation of function trace.
dpaa2_io_query_fq_count()
-->service_select() (inline func)
-->service_select_by_cpu() (inline func)
-->smp_processor_id() ( == debug_smp_processor_id when CONFIG_DEBUG_PREEMPT enabled)
debug_smp_processor_id() will check wether in preemptable environment for current task, if it is preemptable,
the calltrace will show.
Thanks,
Zhantao