KERNEL: assertion (newsk->state...) failed
Possible Security Violations
=-=-=-=-=-=-=-=-=-=
Feb 16 16:11:34 server kernel: KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
Feb 16 16:11:34 server kernel: KERNEL: assertion ((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed at
+af_inet.c(689)
Feb 16 16:11:34 server kernel: KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
Feb 16 16:11:34 server kernel: KERNEL: assertion ((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed at
+af_inet.c(689)
Feb 16 16:11:34 server kernel: KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
Feb 16 16:11:34 server kernel: KERNEL: assertion ((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed at
+af_inet.c(689)
i've seen a handful of these in the past week or two. which
manpage talks about how to decode this stuff? (is it just a
network snafu or is something serious going on?)
--
I use Debian/GNU Linux version 3.0;
Linux server 2.4.20-k6 #1 Mon Jan 13 23:49:14 EST 2003 i586 unknown
DEBIAN NEWBIE TIP #94 from Joost Kooij <joost@topaz.mdcc.cx>
:
How do you RESTORE THE DEFAULT PERMISSIONS back on the / tree?
If you have a clean host with very similar filesystem contents,
try this:
ssh root@okayhost "find / -regex '/\(mnt\|proc\|tmp\)/.*' -prune -or \
-not -type l -not -type s -printf '%04.4m %u %g %p\n' " \
| while read mode user group path
do
chown $user.$group $path
chmod $mode $path
done
Alternatively, create a huge script like this:
find / -regex '/\(mnt\|proc\|tmp\)/.*' -prune -or \
-not -type l -not -type s -printf 'chown %u.%g %p\nchmod %m %p\n' \
> fixperms.sh
And copy that to the broken machine and run "sh fixperms".
It might not fix all files, unless the two hosts are nearly
equal, but enough to let you find the missing ones to fix by
hand. Maybe /home/* will need special care.
Also see http://newbieDoc.sourceForge.net/ ...
Reply to: