[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



I'm reasonably sure it's not a trojaned kernel - building a new kernel from 
another machine was one of the first tests (though I didn't put it on a CD, 
but installed it on the hard drive, I admit...)

> Run memtest and rule out that. Then copy a kernel from a CD distribution
> and set lilo/grub to use that kernel. Then boot to single user, touch
> utmp, reboot back to single user with the same CD kernel and watch the
> top process. If there is still the problem, drop in an other hard drive,
> make it the /var partition, and try again.
>

When you say "memtest", you're referring to the shell-script that does lots of 
tarring/untarring?

> If all that fails, get a Geiger counter and start looking for a
> radiation source that can cause bit flips :)
>
> > > On Fri, 2004-04-23 at 17:37, David Corbin wrote:
> > > > I tried it with the "safe" version of top.  It shows nothing that
> > > > isn't in my regular top.  However, I did try "vmstat" which was
> > > > there.  It shows that the free memory is disappear as the "buffers"
> > > > is growing.
> > > >
> > > > Does that help any?
> > > >
> > > > On Monday 19 April 2004 20:35, James P. Kinney III wrote:
> > > > > I put up a page with the binaries and source on it :
> > > > >
&gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.localnetsolutions.com/tools/";>http://www.localnetsolutions.com/tools/</a>
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; Note: the procps page on sourceforge did not have an md5 checksum.
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; On Mon, 2004-04-19 at 20:02, David Corbin wrote:
&gt; &gt; &gt; &gt; &gt; &gt; On Monday 19 April 2004 15:01, James P. Kinney III wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; If it is a cracked machine, running a statically linked top
&gt; &gt; &gt; &gt; &gt; &gt; &gt; from a CD will gain access to the real top data. Top is a
&gt; &gt; &gt; &gt; &gt; &gt; &gt; common binary to fiddle with with a root kit.
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; Sounds reasonable.  Can you point me at such, or if not that,
&gt; &gt; &gt; &gt; &gt; &gt; anybody got any idea where the source to top is and I'll build my
&gt; &gt; &gt; &gt; &gt; &gt; own.
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; It is certainly possible to _add_ a module or _remove_ a
&gt; &gt; &gt; &gt; &gt; &gt; &gt; module, but change out the kernel with out a reboot (unless
&gt; &gt; &gt; &gt; &gt; &gt; &gt; 2-kernel-monte is available, I have not been able to find this
&gt; &gt; &gt; &gt; &gt; &gt; &gt; :(  ). So the actual data stream for top is not tamper-able
&gt; &gt; &gt; &gt; &gt; &gt; &gt; easily. Thus a known good statically-linked top would give
&gt; &gt; &gt; &gt; &gt; &gt; &gt; access to the running system and show the _real_ processes that
&gt; &gt; &gt; &gt; &gt; &gt; &gt; are running.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; If top shows no malicious files, it's time to take some
&gt; &gt; &gt; &gt; &gt; &gt; &gt; snapshots over time to plot which app is failing.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; #!/bin/sh
&gt; &gt; &gt; &gt; &gt; &gt; &gt; echo date &gt;&gt; /tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; &gt; top -b -n 1 -c &gt;&gt; /tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; &gt; echo &quot;###############&quot; &gt;&gt;/tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; &gt; echo &gt;&gt;/tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; &gt; echo &gt;&gt;/tmp/top.txt
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; Run as a cron every minute for an hour.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; If you want, you can now mash/mangle the data into a nice plot
&gt; &gt; &gt; &gt; &gt; &gt; &gt; using some perl and gnplot (or a spreadsheet).
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; On Mon, 2004-04-19 at 11:56, Geoffrey wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Dow Hurst wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; How can we find the process that is soaking the memory? 
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; How do you manipulate /proc to find out the originating
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; process that owns the memory being used?  I know IRIX had
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; tools to look at memory and see which processes owned what
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; part of memory.  Does Linux?
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Seems if you knew what was leaking you would have a major
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; part of the battle won.
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; I believe we mentioned top, but he noted that doesn't give
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; him anything. That's what concerns me.  If it doesn't show,
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; is it being hidden for a reason???
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; &gt;
&gt; &gt; _______________________________________________
&gt; &gt; Ale mailing list
&gt; &gt; Ale at ale.org
&gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>


</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<ul><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><a name="01108" href="msg01108.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> jkinney at localnetsolutions.com (James P. Kinney III)</li></ul></li>
</ul></li></ul>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00645" href="msg00645.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
<li><strong><a name="01060" href="msg01060.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
<li><strong><a name="01071" href="msg01071.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> jkinney at localnetsolutions.com (James P. Kinney III)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg01104.html">[ale] Linux Security</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg01106.html">[ale] Free USB Drive</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg01071.html">[ale] diagnosis</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg01108.html">[ale] diagnosis</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#01105"><strong>Date</strong></a></li>
<li><a href="threads.html#01105"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>