From owner-freebsd-hackers@FreeBSD.ORG Wed Jun 25 01:29:23 2003 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id CB1D737B401 for ; Wed, 25 Jun 2003 01:29:23 -0700 (PDT) Received: from apache.metrocom.ru (apache.metrocom.ru [195.5.128.150]) by mx1.FreeBSD.org (Postfix) with ESMTP id C2ECE43FF5 for ; Wed, 25 Jun 2003 01:29:22 -0700 (PDT) (envelope-from alex@metrocom.ru) Received: from apache (apache [195.5.128.150]) by apache.metrocom.ru (8.12.9/8.12.9) with ESMTP id h5P8TJmm013248; Wed, 25 Jun 2003 12:29:19 +0400 (MSD) Date: Wed, 25 Jun 2003 12:29:19 +0400 (MSD) From: Varshavchick Alexander To: Lev Walkin In-Reply-To: <3EF95AF9.3040708@netli.lan> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Spam-Status: No, hits=-2.0 required=3.0 tests=EMAIL_ATTRIBUTION,IN_REP_TO,QUOTED_EMAIL_TEXT, REPLY_WITH_QUOTES,USER_AGENT_PINE version=2.55 X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp) cc: freebsd-hackers@FreeBSD.ORG Subject: Re: How to delete unix socket entries X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 25 Jun 2003 08:29:24 -0000 On Wed, 25 Jun 2003, Lev Walkin wrote: > > The problem is that the process which opened them was already killed long > > time ago, these entries resembles zombi because they seem to exist > > by themselves, not connected with any file or process. > > Either these processes are running, or they're dead. In the former case, > they could not be zombies by definition. If they're dead, then the process > which spawned them is NOT killed. Otherwise, init(8) would have taken them > as parent and wait(2)'ed them so they would be destroyed completely along > with their traces in ps(1). > > So, the only sane method of removing them would be to find the parent of > these processes and kill -9 it, as suggested by Terry. But we're talking not about process, but about data structures which netstat reports to be active and connected with the above mentioned stream socket file: > netstat -f unix b65d6280 stream 17 0 0 0 0 0 /var/run/daemon.sock b65d7700 stream 17 0 0 0 0 0 /var/run/daemon.sock ..... I meant that these addresses behave like zombies, not processes. ---- Alexander Varshavchick, Metrocom Joint Stock Company Phone: (812)118-3322, 118-3115(fax)