On Fri, Oct 15, 2010 at 9:51 AM, Ben Greear <greearb@xxxxxxxxxxxxxxx> wrote: > On 10/14/2010 04:48 PM, Luis R. Rodriguez wrote: >> >> On Thu, Oct 14, 2010 at 04:39:45PM -0700, Luis R. Rodriguez wrote: >>> >>> On Thu, Oct 14, 2010 at 4:30 PM, Ben Greear<greearb@xxxxxxxxxxxxxxx> >>> Âwrote: >>>> >>>> On 10/14/2010 04:19 PM, Luis R. Rodriguez wrote: >>>>> >>>>> Ok please try this patch, it cures it for me. >>>> >>>> Well, it got a lot further than normal, but it still >>>> hit the poison check after a few minutes. >>>> >>>> Current test case is my app loading 130 or so stations, each running >>>> wpa_supplicant. ÂAll were created, and quite a few had associated >>>> when the poison check hit. >>>> >>>> So, it definitely looks like a step in the right direction, but >>>> not fully fixed yet. >>>> >>>> I'll do some more testing with this patch applied and using just my >>>> perl script to make sure the problem is reproducible outside of my >>>> application. >>> >>> Ok, whatever userspace does it should not corrupt to kernel, unless >>> its poking /dev/mem >> >> Can also try this one instead, it will prevent any other instances >> we would not have caught on stopping and starting RX here. > > It ran longer than before any of your locking patches (about 3 minutes), but > it did hit the poison check. > > Before it did, I had a bunch of OOM errors trying to allocate > skbs. ÂI have 2GB of RAM on this system, but maybe it's not tuned > properly, and not all of that can be used for networking on 32-bit > kernels.... > > I have Felix's 3 ani patches from ~3 days ago applied, running 130 stations > in WPA mode. > > I'm going to try running fewer to dodge the OOM case, > but I have a few other things to take care of first. Thanks for testing. So now I cannot reproduce the poison anymore, any other ideas what I can try? Does the perl script still give you poison or just with your Ãber proprietary application? Luis -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html