From owner-freebsd-hackers@FreeBSD.ORG Wed Nov 16 12:26:12 2011 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 7AC841065672 for ; Wed, 16 Nov 2011 12:26:12 +0000 (UTC) (envelope-from slonoman2011@yandex.ru) Received: from forward11.mail.yandex.net (forward11.mail.yandex.net [IPv6:2a02:6b8:0:801::1]) by mx1.freebsd.org (Postfix) with ESMTP id AD39C8FC0C for ; Wed, 16 Nov 2011 12:26:11 +0000 (UTC) Received: from web143.yandex.ru (web143.yandex.ru [95.108.130.11]) by forward11.mail.yandex.net (Yandex) with ESMTP id 29D2CE84DC3 for ; Wed, 16 Nov 2011 16:26:10 +0400 (MSK) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1321446370; bh=LWY7FTUmLzZ99RrHqmHyIA/eYnuOtY30lbneTSEwqlo=; h=From:To:In-Reply-To:References:Subject:MIME-Version:Message-Id: Date:Content-Transfer-Encoding:Content-Type; b=w4DwSPHU0rBxFWIahXvQFfqT9Hp61b6/Qf/DnCLY7QyiIZilJe38GWkKcBSM3W0H1 EpcKvyDirhLLHhpc/ToZ5g3FCfj25GtCFXn94Jb6zeV1GBVHMlAk4XCYBn36AMk36W HXTz8vs9nMiUG+aw88q5NlSaEXT0bQsnL2EVFor0= Received: from localhost (localhost.localdomain [127.0.0.1]) by web143.yandex.ru (Yandex) with ESMTP id 0F7FF3980030 for ; Wed, 16 Nov 2011 16:26:10 +0400 (MSK) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1321446370; bh=LWY7FTUmLzZ99RrHqmHyIA/eYnuOtY30lbneTSEwqlo=; h=From:To:In-Reply-To:References:Subject:MIME-Version:Message-Id: Date:Content-Transfer-Encoding:Content-Type; b=w4DwSPHU0rBxFWIahXvQFfqT9Hp61b6/Qf/DnCLY7QyiIZilJe38GWkKcBSM3W0H1 EpcKvyDirhLLHhpc/ToZ5g3FCfj25GtCFXn94Jb6zeV1GBVHMlAk4XCYBn36AMk36W HXTz8vs9nMiUG+aw88q5NlSaEXT0bQsnL2EVFor0= X-Yandex-Spam: 1 Received: from nat140-249-205-109.tvoe.tv (nat140-249-205-109.tvoe.tv [109.205.249.140]) by web143.yandex.ru with HTTP; Wed, 16 Nov 2011 16:26:09 +0400 From: Slono Slono To: freebsd-hackers@freebsd.org In-Reply-To: References: MIME-Version: 1.0 Message-Id: <37971321446369@web143.yandex.ru> Date: Wed, 16 Nov 2011 16:26:09 +0400 X-Mailer: Yamail [ http://yandex.ru ] 5.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain X-Mailman-Approved-At: Wed, 16 Nov 2011 12:31:35 +0000 Subject: Re: The zombie has involved into /dev/null X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Nov 2011 12:26:12 -0000 On Wednesday 16 November 2011 14:35:04 Ivan Voras wrote: > So, if I understand you correctly, you are reporting a bug in which a > jailed process is holding (the jailed instance of) /dev/null open and > "umount -f" doesn't work on the jailed /dev ? Hello, Yes, correct. > > On 14/11/2011 23:52, Slono Slono wrote: > > On one of servers where installed cacti in jail there is strange enough > > situation. Sometimes processes poller.php haven't time to successful > > complete until to beginning of the following session (absence of lock is > > other problem - its ok) therefore processes breed yet won't begin them > > kill. During such moments appear zombie processes. However, these zombie > > show that keep devfs the device. Possibly because are started as > > > > php /poller.php 2>/dev/null 2>&1 > > > > Sending of any signals (SIGCHILD too) changes nothing. Strange that with > > -f (force) optons through a umount command is impossible to unmount > > devfs with which worked as the zombie. > > > > ps axf shows: > > .. > > > > 99551 ?? DsJ 0:00.12 /usr/local/bin/php > > /usr/local/share/cacti/poller.php 99554 ?? ZJ 0:00.02 > > . > > > > lsof -p 99551 > > COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME > > php 99551 root cwd VBAD > > (revoked) php 99551 root rtd VDIR 225,1035534442 3 > > 678909 /usr/jails/jails/mon php 99551 root jld VDIR > > 225,1035534442 3 678909 /usr/jails/jails/mon php 99551 root > > txt VREG 225,1035534442 3261754 1620922 > > /usr/jails/jails-data/mon-data/usr/local/bin/php php 99551 root txt > > VREG 225,1035534442 246776 626780 > > /usr/jails/jails-data/mon-data/libexec/ld-elf.so.1 php 99551 root > > txt VREG 225,1035534442 33600 626862 > > /usr/jails/jails-data/mon-data/lib/libcrypt.so.5 php 99551 root txt > > VREG 225,1035534442 377814 1267501 > > /usr/jails/jails-data/mon-data/usr/local/lib/libpcre.so.0 php 99551 > > root txt VREG 225,1035534442 150656 626861 > > /usr/jails/jails-data/mon-data/lib/libm.so.5 php 99551 root txt > > VREG 225,1035534442 1495740 649173 > > /usr/jails/jails-data/mon-data/usr/local/lib/libxml2.so.5 php 99551 > > root txt VREG 225,1035534442 84848 626828 > > /usr/jails/jails-data/mon-data/lib/libz.so.5 php 99551 root txt > > VREG 225,1035534442 1074175 649584 > > /usr/jails/jails-data/mon-data/usr/local/lib/libiconv.so.3 php 99551 > > root txt VREG 225,1035534442 1270640 626857 > > /usr/jails/jails-data/mon-data/lib/libc.so.7 php 99551 root txt > > VREG 225,1035534442 74189 636259 > > /usr/jails/jails-data/mon-data/usr/local/lib/php/20090626/session.so php > > 99551 root txt VREG 225,1035534442 63195 637380 > > /usr/jails/jails-data/mon-data/usr/local/lib/php/20090626/xml.so php > > 99551 root txt VREG 225,1035534442 40650 638507 > > /usr/jails/jails-data/mon-data/usr/local/lib/php/20090626/snmp.so php > > 99551 root txt VREG 225,1035534442 337128 665903 > > /usr/jails/jails-data/mon-data/usr/lib/libssl.so.6 php 99551 root > > txt VREG 225,1035534442 730269 8050234 > > /usr/jails/jails-data/mon-data/usr/local/lib/libnetsnmp.so.30 php > > 99551 root txt VREG 225,1035534442 35264 626850 > > /usr/jails/jails-data/mon-data/lib/libkvm.so.5 php 99551 root txt > > VREG 225,1035534442 19720 626858 > > /usr/jails/jails-data/mon-data/lib/libdevstat.so.7 php 99551 root > > txt VREG 225,1035534442 1693344 626824 > > /usr/jails/jails-data/mon-data/lib/libcrypto.so.6 php 99551 root > > txt VREG 225,1035534442 105904 666224 > > /usr/jails/jails-data/mon-data/usr/lib/libelf.so.1 php 99551 root > > txt VREG 225,1035534442 61034 635955 > > /usr/jails/jails-data/mon-data/usr/local/lib/php/20090626/mysql.so php > > 99551 root txt VREG 225,1035534442 54114 637132 > > /usr/jails/jails-data/mon-data/usr/local/lib/php/20090626/sockets.so php > > 99551 root 0u PIPE 0xfffffe07514ab5b0 16384 > > ->0xfffffe07514ab708 php 99551 root 1w VCHR 0,27 > > 0t0 27 /usr/jails/jails/mon/dev (devfs) (like character special > > /dev/null) php 99551 root 2w VCHR 0,27 0t0 > > 27 /usr/jails/jails/mon/dev (devfs) (like character special /dev/null) > > php 99551 root 3u unix 0xfffffe074ad832a8 0t0 > > ->(none) php 99551 root 5u PIPE 0xfffffe043c62fcb8 0 > > ->0xfffffe043c62fb60 > > > > mount -t devfs |grep mon > > devfs on /usr/jails/jails/mon/dev (devfs, local, multilabel) > > > > umount -f /usr/jails/jails/mon/dev > > umount: unmount of /usr/jails/jails/mon/dev failed: Device busy > > > > However apparently devfs is unmount when executed jail stop: > > > > ls -la /usr/jails/jails/mon/dev > > total 5 > > drwxr-xr-x 2 root wheel 2 Nov 14 22:36 . > > drwxr-xr-x 3 root wheel 3 Nov 14 22:36 .. > > > > As can be that zombie blocks devfs or that in system there is an > > information on active mount when the file system isn't present > > > > PS: FreeBSD 9.0-RC2 amd64 > > > > _______________________________________________ > > freebsd-hackers@freebsd.org mailing list > > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > > To unsubscribe, send any mail to > > "freebsd-hackers-unsubscribe@freebsd.org"