lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20080307101309.GB4203@ff.dom.local>
Date:	Fri, 7 Mar 2008 10:13:09 +0000
From:	Jarek Poplawski <jarkao2@...il.com>
To:	Oleksandr Samoylyk <oleksandr@...oylyk.sumy.ua>
Cc:	netdev@...r.kernel.org
Subject: Re: pppd soft lockups under load

On 06-03-2008 21:43, Oleksandr Samoylyk wrote:
> Dear community,
> 
> I'm running a busy pptp-server which serves about 1500 users on about 80 
> Mbit/s (> 15000 packets/sec). I use poptop, traffic shaper and basic 
> firewall rules.
> 
> As for hardware it's a server on SuperMicro Server on X7DB8+ serverboard 
> server with 8 GB RAM on it running Ubuntu Server Edition.
> 
> As for problem, sometimes I get the following erors in logs:
> [    0.000000] BUG: soft lockup - CPU#3 stuck for 11s! [pppd:65437]
...
> root@vpn:~# cat /proc/interrupts
>            CPU0       CPU1       CPU2       CPU3       CPU4       CPU5 
>       CPU6       CPU7
...
> 2296:      76853      76976      76639      76692     248073     247957 
>     248079     248084   PCI-MSI-edge      eth1
> 2297:     266795     266672     267009     266956      93920      94035 
>      93914      93908   PCI-MSI-edge      eth0

Hi,

Maybe it doesn't matter here but I think you should rethink this
irq balancing for eths. Here is something interesting:

http://marc.info/?l=linux-netdev&m=120349568512423&w=2

Regards,
Jarek P.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ