The standard way to demonize a process is to do a double fork and
close the file handles .... so I just speculated that this was a case
of unintentionally doing that, as soon as you 'loose the parent' or
don't have any resources to it, the process will be attached to init's
PID , so check the parent of the 'zombies' parent PID.

 As for my contorted use of the english language, 'No forking way !' .....

 ( Sorry for my bad english ... )

 / regards, Lars Segerlund.

2012/9/4 Kent A. Reed <[email protected]>:
> On 9/3/2012 4:31 PM, Lars Segerlund wrote:
>>   Is there by any chance two forks involved ? :-D ....
>>
>>   / Lars.
>
> Undoubtedly, but why do I feel like Yogi Berra just walked in? (Widely
> quoted because of his tortured use of the English language, while giving
> directions this American baseballer once advised a friend "when you come
> to a fork in the road, take it.")
>
> Regards,
> Kent
>
>> 2012/9/3 Kent A. Reed <[email protected]>:
>>> Gentle persons:
>>>
>>> I've been experimenting with the results of the hard work of Charles
>>> Steinkuehler, John Morris (and others whose names I confess I've
>>> forgotten at the moment) to get LinuxCNC running over the preempt_rt kernel.
>>>
>>> I seem to be able to create a zombie hal configuration.
>>>
>>> <...>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Emc-developers mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/emc-developers

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-developers mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-developers

Reply via email to