Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 Jun 2003 12:29:19 +0400 (MSD)
From:      Varshavchick Alexander <alex@metrocom.ru>
To:        Lev Walkin <vlm@netli.lan>
Cc:        freebsd-hackers@FreeBSD.ORG
Subject:   Re: How to delete unix socket entries
Message-ID:  <Pine.GSO.4.33.0306251225020.27984-100000@apache.metrocom.ru>
In-Reply-To: <3EF95AF9.3040708@netli.lan>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 25 Jun 2003, Lev Walkin wrote:

> > The problem is that the process which opened them was already killed long
> > time ago, these entries resembles zombi because they seem to exist
> > by themselves, not connected with any file or process.
>
> Either these processes are running, or they're dead. In the former case,
> they could not be zombies by definition. If they're dead, then the process
> which spawned them is NOT killed. Otherwise, init(8) would have taken them
> as parent and wait(2)'ed them so they would be destroyed completely along
> with their traces in ps(1).
>
> So, the only sane method of removing them would be to find the parent of
> these processes and kill -9 it, as suggested by Terry.

But we're talking not about process, but about data structures which
netstat reports to be active and connected with the above mentioned stream
socket file:

> netstat -f unix

b65d6280 stream     17      0        0        0        0        0 /var/run/daemon.sock
b65d7700 stream     17      0        0        0        0        0 /var/run/daemon.sock
.....

I meant that these addresses behave like zombies, not processes.

----
Alexander Varshavchick, Metrocom Joint Stock Company
Phone: (812)118-3322, 118-3115(fax)





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.33.0306251225020.27984-100000>