The standard way to demonize a process is to do a double fork and close the file handles .... so I just speculated that this was a case of unintentionally doing that, as soon as you 'loose the parent' or don't have any resources to it, the process will be attached to init's PID , so check the parent of the 'zombies' parent PID.
As for my contorted use of the english language, 'No forking way !' ..... ( Sorry for my bad english ... ) / regards, Lars Segerlund. 2012/9/4 Kent A. Reed <[email protected]>: > On 9/3/2012 4:31 PM, Lars Segerlund wrote: >> Is there by any chance two forks involved ? :-D .... >> >> / Lars. > > Undoubtedly, but why do I feel like Yogi Berra just walked in? (Widely > quoted because of his tortured use of the English language, while giving > directions this American baseballer once advised a friend "when you come > to a fork in the road, take it.") > > Regards, > Kent > >> 2012/9/3 Kent A. Reed <[email protected]>: >>> Gentle persons: >>> >>> I've been experimenting with the results of the hard work of Charles >>> Steinkuehler, John Morris (and others whose names I confess I've >>> forgotten at the moment) to get LinuxCNC running over the preempt_rt kernel. >>> >>> I seem to be able to create a zombie hal configuration. >>> >>> <...> > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Emc-developers mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/emc-developers ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-developers mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/emc-developers
