Current-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Killing a zombie process?



Still trying to track this down....

A modified version of ps(1) shows that the process state is clearly LSZOMB and not LSDEAD. Furthermore, "ps -s" doesn't show any LWP for the zombie process, so it would seem that process clean up has progressed relatively far.

I was able to use "ps axl -O paddr" to get the address of the process's struct proc, but I don't seem to be able to examine it with gdb.

#  ps axl -O paddr | grep Z
 UID   PID            PADDR  PPID   CPU PRI NI     VSZ    RSS WCHAN   STAT TTY      TIME COMMAND
1000 25032 fffffe810f45ea40  2214     0  43  0    2240     48 -       R+   pts/1 0:00.00 grep Z
   0 21120 fffffe81f578ba70     1     0   0  0       0      0 -       Z    pts/2 0:00.00 (sh)
#  gdb /dev/mem
GNU gdb (GDB) 7.9.1
...
This GDB was configured as "x86_64--netbsd".
...
(gdb) symbol-file /netbsd.gdb
Reading symbols from /netbsd.gdb...done.
(gdb) print (struct proc *) 0xfffffe81f578ba70
warning: value truncated
$1 = (struct proc *) 0xfffffe81f578ba70
(gdb)


Any clue on how to properly access kernel memory here, without having the address truncated to 32-bits?

TIA


+------------------+--------------------------+-------------------------+
| Paul Goyette     | PGP Key fingerprint:     | E-mail addresses:       |
| (Retired)        | FA29 0E3B 35AF E8AE 6651 | paul at whooppee.com    |
| Kernel Developer | 0786 F758 55DE 53BA 7731 | pgoyette at netbsd.org  |
+------------------+--------------------------+-------------------------+


Home | Main Index | Thread Index | Old Index