[ale] Em

jj at spiderentertainment.com jj at spiderentertainment.com
Fri Oct 8 15:47:34 EDT 1999


Ok I sent earlier message in regards to kernel message, now I really
need some help.

My system info

Dual PII Xion 512 MB
MegaRaid, Raid-5(hardware)

RH5.2 Kernel 2.0.36 SMP is NOT enabled.


message from /var/messages
Oct  8 15:42:54 spiderone kernel: Unable to handle kernel paging request
at virtual address 401f4000
Oct  8 15:42:54 spiderone kernel: current->tss.cr3 = 0b2fe000, `r3 =
0b2fe000
Oct  8 15:42:54 spiderone kernel: *pde = 17bb8067
Oct  8 15:42:54 spiderone kernel: *pte = 00000000
Oct  8 15:42:54 spiderone kernel: Oops: 0000
Oct  8 15:42:54 spiderone kernel: CPU:    0
Oct  8 15:42:54 spiderone kernel: EIP:    0010:[random_read+84/344]
Oct  8 15:42:54 spiderone kernel: EFLAGS: 00010283
Oct  8 15:42:54 spiderone kernel: eax: 8255c29d   ebx: c06628d8   ecx:
0000002c   edx: 000005b4
Oct  8 15:42:54 spiderone kernel: esi: 401f3fe5   edi: 1c058080   ebp:
06150e34   esp: 06150ddc
Oct  8 15:42:54 spiderone kernel: ds: 0018   es: 0018   fs: 002b   gs:
002b   ss: 0018
Oct  8 15:42:54 spiderone kernel: Process httpd (pid: 11806, process nr:
356, stackpage=06150000)
Oct  8 15:42:54 spiderone kernel: Stack: 1c058668 000005b4 401f3fc5
0014bafa 401f3fc5 1c058060 000005b4 0000000
0
Oct  8 15:42:54 spiderone kernel:        12fca414 ffffffea 00004475
00000400 1c05804c 00000000 0000008f 1c05866
8
Oct  8 15:42:54 spiderone kernel:        000005b4 000005b4 401f3fc5
000016d5 00002da0 001b9e48 00000000 0014bbf
9
Oct  8 15:42:54 spiderone kernel: Call Trace:
[tcp_conn_request_fake+210/1284] [tcp_conn_request_fake+465/1284]
 [ip_fw_chk+1585/1948] [block_read+574/1464] [block_read+1030/1464]
[elf_core_dump+2196/2616] [load_aout_binary
+263/1520]
Oct  8 15:42:54 spiderone kernel:        [sys_swapoff+33/736]
[block_read+1435/1464] [get_cpuinfo+173/752]
Oct  8 15:42:54 spiderone kernel: Code: 64 8b 5e 18 11 d8 89 5f 18 64 8b
5e 1c 11 d8 89 5f 1c 8d 76

here's a cut from dmesg

4070429 659a92d1 c51f9c3e 00000000 36393731 3536203a
       32394139 303a3144 20303530 46313543 45334339 3234303a 37302041
30303020
Call Trace: [<00130050>] [<0014722f>] [<001462e9>] [<00162611>]
[<00112d65>] [<00129a10>] [<00110b05>]
       [<0011002b>]
Code: 8b 40 04 89 44 24 14 8b 54 24 14 52 31 c0 85 f6 74 06 8b 83
Aiee, killing interrupt handler
general protection: 0000
CPU:    0
EIP:    0010:[<0014616a>]
EFLAGS: 00010202
eax: 64736f2f   ebx: 0f670414   ecx: 00000000   edx: 00000000
esi: 00000000   edi: 00000180   ebp: 00000000   esp: 0cef7e78
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process netstat (pid: 32276, process nr: 541, stackpage=0cef7000)
Stack: 0be97000 0019de04 1d438374 00000400 ffffffff 00000000 0cef7eb0
00038580
       00000709 00130050 1a9e0429 659a92d1 c51f9c3e 00000000 30303831
3536203a
       32394139 303a3144 20303530 46313543 45334339 3234303a 37302041
30303020
Call Trace: [<00130050>] [<0014722f>] [<001462e9>] [<00162611>]
[<00129a10>] [<00110b05>] [<0011002b>]
Code: 8b 40 04 89 44 24 14 8b 54 24 14 52 31 c0 85 f6 74 06 8b 83
Aiee, killing interrupt handler
general protection: 0000
CPU:    0
EIP:    0010:[<0014616a>]
EFLAGS: 00010202
eax: 64736f2f   ebx: 0f670414   ecx: 00000000   edx: 00000000
esi: 00000000   edi: 00000200   ebp: 00000000   esp: 0ccece78
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process netstat (pid: 32279, process nr: 541, stackpage=0ccec000)
Stack: 0ceec000 0019de04 1af81044 00000400 ffffffff 00000000 0cceceb0
00038280
       00000703 00130050 14070429 659a92d1 c51f9c3e 00000000 34393731
3536203a
       32394139 303a3144 20303530 46313543 45334339 3234303a 37302041
30303020
Call Trace: [<00130050>] [<0014722f>] [<001462e9>] [<00162611>]
[<00129a10>] [<00110b05>] [<0011002b>]
Code: 8b 40 04 89 44 24 14 8b 54 24 14 52 31 c0 85 f6 74 06 8b 83
Aiee, killing interrupt handler
general protection: 0000
CPU:    0
EIP:    0010:[<0014616a>]
EFLAGS: 00010202
eax: 64736f2f   ebx: 0f670414   ecx: 00000000   edx: 00000000
esi: 00000000   edi: 00000380   ebp: 00000000   esp: 095eee78
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process netstat (pid: 32281, process nr: 541, stackpage=095ee000)
Stack: 0ce37000 0019de04 1e84a61c 00000400 ffffffff 00000000 095eeeb0
00038400
       00000706 00130050 15ac0429 659a92d1 c51f9c3e 00000000 37393731
3536203a
       32394139 303a3144 20303530 46313543 45334339 3234303a 37302041
30303020
Call Trace: [<00130050>] [<0014722f>] [<001462e9>] [<00162611>]
[<00129a10>] [<00110b05>] [<0011002b>]
Code: 8b 40 04 89 44 24 14 8b 54 24 14 52 31 c0 85 f6 74 06 8b 83
Aiee, killing interrupt handler
Unable to handle kernel paging request at virtual address 401f9000
current->tss.cr3 = 109fb000, %cr3 = 109fb000
*pde = 10a04067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<0019729b>]
EFLAGS: 00010292
eax: d50f4f62   ebx: 413e676e   ecx: 00000007   edx: 00000218
esi: 401f8ffc   edi: 0693a180   ebp: 109f9ed4   esp: 109f9e7c
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process httpd (pid: 1112, process nr: 676, stackpage=109f9000)
Stack: 0693a2c8 00000218 401f8edc 0014bafa 401f8edc 0693a060 00000218
00000000
       1e530810 ffffffea 000079a3 1d8d583c 0693a04c 00000000 00000000
0693a2c8
       00000218 00000218 401f8edc 00004ac7 00002edc 001b9e48 00000000
0014bbf9
Call Trace: [<0014bafa>] [<0014bbf9>] [<00156a5d>] [<0013c2ce>]
[<00129b8b>] [<00110b05>] [<0011002b>]
Code: 64 8b 5e 04 11 d8 89 5f 04 64 8b 5e 08 11 d8 89 5f 08 64 8b
Unable to handle kernel paging request at virtual address 401e1000
current->tss.cr3 = 1c209000, %cr3 = 1c209000
*pde = 17039067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<001972b6>]
EFLAGS: 00010a92
eax: 9ccc9801   ebx: 73e05472   ecx: 00000027   edx: 000004f5
esi: 401e0ff0   edi: 1f600060   ebp: 11ce2e34   esp: 11ce2ddc
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process httpd (pid: 29299, process nr: 330, stackpage=11ce2000)
Stack: 1f6006e8 000004f5 401e0ff0 0014bafa 401e0ff0 1f600060 000004f5
00000000
       0d8f1810 ffffffea 00001611 00000400 1f60004c 00000001 0000008f
1f6006e8
       000005b4 000004f5 401e0ff0 000004f5 0000111c 001b9e48 00000000
0014bbf9
Call Trace: [<0014bafa>] [<0014bbf9>] [<00156a5d>] [<00129c7e>]
[<00129e46>] [<00131b5c>] [<0013230f>]
       [<00121b79>] [<00129fdb>] [<00110b05>] [<0011002b>]
Code: 64 8b 5e 10 11 d8 89 5f 10 64 8b 5e 14 11 d8 89 5f 14 64 8b
Warning: possible SYN flood from 165.236.189.200 on 209.146.154.101:80.
Sending cookies.
Warning: possible SYN flood from 205.150.58.100 on 209.146.154.103:80.
Sending cookies.
Warning: possible SYN flood from 208.140.0.138 on 209.146.154.101:80.
Sending cookies.
Warning: possible SYN flood from 216.154.47.110 on 209.146.154.98:80.
Sending cookies.
Warning: possible SYN flood from 208.142.14.158 on 209.146.154.72:80.
Sending cookies.
Warning: possible SYN flood from 209.214.162.180 on 209.146.154.119:80.
Sending cookies.
Warning: possible SYN flood from 209.103.35.185 on 209.146.154.150:80.
Sending cookies.
Warning: possible SYN flood from 165.236.189.200 on 209.146.154.105:80.
Sending cookies.
Warning: possible SYN flood from 195.186.45.6 on 209.146.154.110:80.
Sending cookies.
Warning: possible SYN flood from 63.10.191.184 on 209.146.154.112:80.
Sending cookies.
Warning: possible SYN flood from 148.235.185.106 on 209.146.154.98:80.
Sending cookies.
Warning: possible SYN flood from 151.189.0.117 on 209.146.154.200:80.
Sending cookies.
Warning: possible SYN flood from 163.29.208.253 on 209.146.154.200:80.
Sending cookies.
Warning: possible SYN flood from 151.196.212.3 on 209.146.154.104:111.
Sending cookies.
Warning: possible SYN flood from 151.196.212.3 on 209.146.154.68:111.
Sending cookies.
Unable to handle kernel paging request at virtual address 401fc000
current->tss.cr3 = 022ae000, %cr3 = 022ae000
*pde = 1f8a3067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<00197294>]
EFLAGS: 00010206
eax: c471aa28   ebx: 12a28bf8   ecx: 00000017   edx: 000005b4
esi: 401fbfff   edi: 0a316b18   ebp: 1243ded4   esp: 1243de7c
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process httpd (pid: 5647, process nr: 256, stackpage=1243d000)
Stack: 0a316e60 000005b4 401fbd3f 0014bafa 401fbd3f 0a316858 000005b4
00000000
       00f11018 ffffffea 00007fac 058fc220 0a316844 00000000 00000000
0a316e60
       000005b4 000005b4 401fbd3f 0000226d 00005d3f 001b9e48 00000000
0014bbf9
Call Trace: [<0014bafa>] [<0014bbf9>] [<00156a5d>] [<0013c2ce>]
[<00129b8b>] [<00110b05>] [<0011002b>]
Code: 64 8b 1e 11 d8 89 1f 64 8b 5e 04 11 d8 89 5f 04 64 8b 5e 08
Warning: possible SYN flood from 193.192.100.100 on 209.146.154.72:80.
Sending cookies.
Warning: possible SYN flood from 63.22.174.204 on 209.146.154.180:80.
Sending cookies.
Unable to handle kernel paging request at virtual address 401f4000
current->tss.cr3 = 0b2fe000, %cr3 = 0b2fe000
*pde = 17bb8067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<001972c8>]
EFLAGS: 00010283
eax: 8255c29d   ebx: c06628d8   ecx: 0000002c   edx: 000005b4
esi: 401f3fe5   edi: 1c058080   ebp: 06150e34   esp: 06150ddc
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process httpd (pid: 11806, process nr: 356, stackpage=06150000)
Stack: 1c058668 000005b4 401f3fc5 0014bafa 401f3fc5 1c058060 000005b4
00000000
       12fca414 ffffffea 00004475 00000400 1c05804c 00000000 0000008f
1c058668
       000005b4 000005b4 401f3fc5 000016d5 00002da0 001b9e48 00000000
0014bbf9
Call Trace: [<0014bafa>] [<0014bbf9>] [<00156a5d>] [<00129c7e>]
[<00129e46>] [<00131b5c>] [<0013230f>]
       [<00121b79>] [<00129fdb>] [<00110b05>]
Code: 64 8b 5e 18 11 d8 89 5f 18 64 8b 5e 1c 11 d8 89 5f 1c 8d 76
Warning: possible SYN flood from 62.252.5.66 on 209.146.154.68:80.
Sending cookies.

any idea what this is in regards to ?






More information about the Ale mailing list