Re: [PATCH net] sctp: avoid running the sctp state machine recursively

2019-05-01 Thread David Miller
From: Xin Long Date: Mon, 29 Apr 2019 14:16:19 +0800 > Ying triggered a call trace when doing an asconf testing: ... > As it shows, the first sctp_do_sm() running under atomic context (NET_RX > softirq) invoked sctp_primitive_ASCONF() that uses GFP_KERNEL flag later, > and this flag is supposed

Re: [PATCH net] sctp: avoid running the sctp state machine recursively

2019-04-29 Thread Marcelo Ricardo Leitner
On Mon, Apr 29, 2019 at 02:16:19PM +0800, Xin Long wrote: > Ying triggered a call trace when doing an asconf testing: > > BUG: scheduling while atomic: swapper/12/0/0x1100 > Call Trace: > [] dump_stack+0x19/0x1b >[] __schedule_bug+0x64/0x72 >[] __schedule+0x9ba/0xa00 >[] _

Re: [PATCH net] sctp: avoid running the sctp state machine recursively

2019-04-29 Thread Neil Horman
On Mon, Apr 29, 2019 at 02:16:19PM +0800, Xin Long wrote: > Ying triggered a call trace when doing an asconf testing: > > BUG: scheduling while atomic: swapper/12/0/0x1100 > Call Trace: > [] dump_stack+0x19/0x1b >[] __schedule_bug+0x64/0x72 >[] __schedule+0x9ba/0xa00 >[] _

[PATCH net] sctp: avoid running the sctp state machine recursively

2019-04-28 Thread Xin Long
Ying triggered a call trace when doing an asconf testing: BUG: scheduling while atomic: swapper/12/0/0x1100 Call Trace: [] dump_stack+0x19/0x1b [] __schedule_bug+0x64/0x72 [] __schedule+0x9ba/0xa00 [] __cond_resched+0x26/0x30 [] _cond_resched+0x3a/0x50 [] kmem_cache_all