?
Solved

An alarm in Redhat Linux

Posted on 2004-04-27
4
Medium Priority
?
330 Views
Last Modified: 2010-04-22
I have installed Redhat 9 in my machine. ( AMD Athlon 2200+ ,MSI Motherboard ).
nowadays frequently an alarm is produced in my machine, few minutes after my linux is loaded. sometimes it automatically stops or i have to reboot my machine. Any solutions.....
0
Comment
Question by:udaikumar
  • 2
4 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 375 total points
ID: 10935592
Is CPU temperature monitoring and alarm a feature of your motherboard? And if so is it enabled?

If the answers to both are yes the CPU cooling fan may be inadaquate and the kernel's use of the machine resources may be overheating the CPU.
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 10939065
Is there a specfic message?
0
 
LVL 40

Expert Comment

by:jlevie
ID: 10940126
No. If the system BIOS is doing this Linux won't know anything about it.

Another possibility that just occured to me is that something might be "not quite standard" with the chipset or sound implementation. It would then be possible for odd things to happen when the kernel was "doing its thing" and that might cause the speaker or sound card to do something wierd.
0
 

Author Comment

by:udaikumar
ID: 11517488
thank you,
        the prob. is the CPU temperature monitoring alarm is enabled.

                   
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses
Course of the Month14 days, 14 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question