[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



Well, utmp is a storage area for logins and usage info. It that file is
growing in single user mode with nothing else running, you have a
problem. The kernel should be what is generating the data for the utmp
file. Since the presence of utmp initiates the memory loss, I would
suspect that kernel is corrupted and is not flushing the write to utmp
and is instead buffering the write process and/or data. This may
indicate a bad hard drive, trojaned kernel or failing RAM.

Run memtest and rule out that. Then copy a kernel from a CD distribution
and set lilo/grub to use that kernel. Then boot to single user, touch
utmp, reboot back to single user with the same CD kernel and watch the
top process. If there is still the problem, drop in an other hard drive,
make it the /var partition, and try again.

If all that fails, get a Geiger counter and start looking for a
radiation source that can cause bit flips :)
> 
> > On Fri, 2004-04-23 at 17:37, David Corbin wrote:
> > > I tried it with the "safe" version of top.  It shows nothing that isn't
> > > in my regular top.  However, I did try "vmstat" which was there.  It
> > > shows that the free memory is disappear as the "buffers" is growing.
> > >
> > > Does that help any?
> > >
> > > On Monday 19 April 2004 20:35, James P. Kinney III wrote:
> > > > I put up a page with the binaries and source on it :
> > > >
&gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.localnetsolutions.com/tools/";>http://www.localnetsolutions.com/tools/</a>
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; Note: the procps page on sourceforge did not have an md5 checksum.
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; On Mon, 2004-04-19 at 20:02, David Corbin wrote:
&gt; &gt; &gt; &gt; &gt; On Monday 19 April 2004 15:01, James P. Kinney III wrote:
&gt; &gt; &gt; &gt; &gt; &gt; If it is a cracked machine, running a statically linked top from a
&gt; &gt; &gt; &gt; &gt; &gt; CD will gain access to the real top data. Top is a common binary to
&gt; &gt; &gt; &gt; &gt; &gt; fiddle with with a root kit.
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; Sounds reasonable.  Can you point me at such, or if not that, anybody
&gt; &gt; &gt; &gt; &gt; got any idea where the source to top is and I'll build my own.
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; It is certainly possible to _add_ a module or _remove_ a module,
&gt; &gt; &gt; &gt; &gt; &gt; but change out the kernel with out a reboot (unless 2-kernel-monte
&gt; &gt; &gt; &gt; &gt; &gt; is available, I have not been able to find this :(  ). So the
&gt; &gt; &gt; &gt; &gt; &gt; actual data stream for top is not tamper-able easily. Thus a known
&gt; &gt; &gt; &gt; &gt; &gt; good statically-linked top would give access to the running system
&gt; &gt; &gt; &gt; &gt; &gt; and show the _real_ processes that are running.
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; If top shows no malicious files, it's time to take some snapshots
&gt; &gt; &gt; &gt; &gt; &gt; over time to plot which app is failing.
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; #!/bin/sh
&gt; &gt; &gt; &gt; &gt; &gt; echo date &gt;&gt; /tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; top -b -n 1 -c &gt;&gt; /tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; echo &quot;###############&quot; &gt;&gt;/tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; echo &gt;&gt;/tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; echo &gt;&gt;/tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; Run as a cron every minute for an hour.
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; If you want, you can now mash/mangle the data into a nice plot
&gt; &gt; &gt; &gt; &gt; &gt; using some perl and gnplot (or a spreadsheet).
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; On Mon, 2004-04-19 at 11:56, Geoffrey wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; Dow Hurst wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; How can we find the process that is soaking the memory?  How do
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; you manipulate /proc to find out the originating process that
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; owns the memory being used?  I know IRIX had tools to look at
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; memory and see which processes owned what part of memory.  Does
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Linux?
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Seems if you knew what was leaking you would have a major part
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; of the battle won.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; I believe we mentioned top, but he noted that doesn't give him
&gt; &gt; &gt; &gt; &gt; &gt; &gt; anything. That's what concerns me.  If it doesn't show, is it
&gt; &gt; &gt; &gt; &gt; &gt; &gt; being hidden for a reason???
&gt; &gt; &gt;
&gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; _______________________________________________
&gt; Ale mailing list
&gt; Ale at ale.org
&gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
-- 
James P. Kinney III          \Changing the mobile computing world/
CEO &amp; Director of Engineering \          one Linux user         /
Local Net Solutions,LLC        \           at a time.          /
770-493-8244                    \.___________________________./
<a  rel="nofollow" href="http://www.localnetsolutions.com";>http://www.localnetsolutions.com</a>

GPG ID: 829C6CA7 James P. Kinney III (M.S. Physics)
&lt;jkinney at localnetsolutions.com&gt;
Fingerprint = 3C9E 6366 54FC A3FE BA4D 0659 6190 ADC3 829C 6CA7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part



</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<ul><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><a name="01105" href="msg01105.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
</ul></li></ul>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00645" href="msg00645.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
<li><strong><a name="01037" href="msg01037.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
<li><strong><a name="01047" href="msg01047.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> jkinney at localnetsolutions.com (James P. Kinney III)</li></ul></li>
<li><strong><a name="01060" href="msg01060.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg01070.html">[ale] QoS Question</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg01072.html">[ale] diagnosis</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg01060.html">[ale] diagnosis</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg01105.html">[ale] diagnosis</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#01071"><strong>Date</strong></a></li>
<li><a href="threads.html#01071"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>