Date: Wed, 25 Jun 2003 12:29:19 +0400 (MSD) From: Varshavchick Alexander <alex@metrocom.ru> To: Lev Walkin <vlm@netli.lan> Cc: freebsd-hackers@FreeBSD.ORG Subject: Re: How to delete unix socket entries Message-ID: <Pine.GSO.4.33.0306251225020.27984-100000@apache.metrocom.ru> In-Reply-To: <3EF95AF9.3040708@netli.lan>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 25 Jun 2003, Lev Walkin wrote: > > The problem is that the process which opened them was already killed long > > time ago, these entries resembles zombi because they seem to exist > > by themselves, not connected with any file or process. > > Either these processes are running, or they're dead. In the former case, > they could not be zombies by definition. If they're dead, then the process > which spawned them is NOT killed. Otherwise, init(8) would have taken them > as parent and wait(2)'ed them so they would be destroyed completely along > with their traces in ps(1). > > So, the only sane method of removing them would be to find the parent of > these processes and kill -9 it, as suggested by Terry. But we're talking not about process, but about data structures which netstat reports to be active and connected with the above mentioned stream socket file: > netstat -f unix b65d6280 stream 17 0 0 0 0 0 /var/run/daemon.sock b65d7700 stream 17 0 0 0 0 0 /var/run/daemon.sock ..... I meant that these addresses behave like zombies, not processes. ---- Alexander Varshavchick, Metrocom Joint Stock Company Phone: (812)118-3322, 118-3115(fax)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.33.0306251225020.27984-100000>