Date: Thu, 3 Apr 2014 14:16:37 +0100 From: RW <rwmaillists@googlemail.com> To: ports@freebsd.org Subject: Re: Spamd Message-ID: <20140403141637.4499770b@gumby.homeunix.com> In-Reply-To: <533D5899.20306@webrz.net> References: <533D1366.7030607@webrz.net> <20140403110103.0b51d9fc@laptop.minsk.domain> <533D5899.20306@webrz.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 03 Apr 2014 14:48:25 +0200 Jos Chrispijn wrote: > > Sergey V. Dyatko: > > use `sockstat -l4 -p783` instead. It show you what user-command-pid > > listen that port > > USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN > ADDRESS root perl 1404 5 tcp4 127.0.0.1:783 *:* > root perl 1403 5 tcp4 127.0.0.1:783 *:* > root perl 1402 5 tcp4 127.0.0.1:783 *:* > > Is this Perl itself or is this a program that uses Perl for this port? It'll be the spamassassin master process and default of two children. By the look of it the rc.d script couldn't find a spamassassin perl process that matched the PID in the pid file so couldn't shut the old version down before starting the new. This is commonly because the pid file isn't writeable, but using port 783 implies that it started as root. Check that the current pid file contains a correct value.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140403141637.4499770b>