Found it. We are calling sock_sendmsg, which is definitely a call that can block! The receive side is done in a thread (which does no floating point ;), but the send was called directly from the "evil FP thread".
It looks like under light load, you tend to get away with it, so our trivial testing did not catch it. And most of our warp users do RTP via asterisk, so this RTP path was not really tested. I really appreciate the input, the comments convinced me I was going in the wrong direction and forced me to look harder. I am going to back out the two patches I sent and fix this properly instead. Cheers, Sean _______________________________________________ Linuxppc-dev mailing list Linuxppc-dev@lists.ozlabs.org https://lists.ozlabs.org/listinfo/linuxppc-dev