root无权限删除 原因 进程 占用 文件
[root@test opt]# find / | grep gitlab | xargs rm -rf
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
[root@test opt]# find / | grep gitlab
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]# ps -aux | grep gitlab
root 9215 0.0 0.0 112660 968 pts/2 S+ 17:11 0:00 grep --color=auto gitlab
root 15857 0.0 0.0 4336 496 ? Ss 09:47 0:00 runsvdir -P /opt/gitlab/service log: does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitla/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist
root 16163 0.0 0.0 4184 444 ? Ss 09:48 0:00 runsv gitlab-workhorse
root 16414 0.0 0.0 4184 444 ? Ss 09:49 0:00 runsv gitlab-monitor
root 16594 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/postgresql
root 16595 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/redis
root 16599 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/sidekiq
root 16609 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitlab-workhorse
root 16613 0.0 0.0 4328 540 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/nginx
root 16614 0.0 0.0 4328 540 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/logrotate
root 16629 0.0 0.0 4328 556 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/node-exporter
root 16634 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitaly
root 16646 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/unicorn
root 16651 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitlab-monitor
root 16652 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/redis-exporter
root 16669 0.0 0.0 4328 556 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/prometheus
root 16688 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/alertmanager
root 16739 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/postgres-exporter
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15
9217
15857
16163
16414
16594
16595
16599
16609
16613
16614
16629
16634
16646
16651
16652
16669
16688
16739
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15 | xargs kill -9
kill: sending signal to 9220 failed: No such process
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15 | xargs kill -9
kill: sending signal to 9234 failed: No such process
[root@test opt]# ps -aux | grep gitlab
root 9239 0.0 0.0 112660 968 pts/2 S+ 17:11 0:00 grep --color=auto gitlab
[root@test opt]# find / | grep gitlab
[root@test opt]# find / | grep gitlab
[root@test opt]#
root无权限删除 原因 进程 占用 文件的更多相关文章
- 以管理员身份运行 cmd 删除无权限删除的文件夹
rd 文件夹 PS:删除空文件夹 rd /s 文件夹 PS:删除文件夹,及所有子目录和文件 rd /s/q 文件夹 PS:强制删除文件夹,及所有子目录和文件,不需要提示
- 删除Vue中无权限的【node_modules】文件
npm install rimraf -g rimraf node_modules
- Windows下查看什么进程占用文件
任务管理器→性能Tab→资源管理器→CPU→关联的句柄后面的检索框中录入文件名(关键文件夹即可). 比如我的是在删除tomcat下面的WEB-INF文件出现问题:就输入WEB-INF:mygod,发现 ...
- 如何删除google流氓扩展(强制安装,并且无权限删除)
chrome现在也是流氓遍地跑, 没比IE安全到哪里. TubeAdblocKer 这个流氓扩展,强制安装,无法删除.google了一大堆方法,全部无效.祭出了filelocator这个神器之后,终于 ...
- linux文件权限总结(创建root不可以删除文件、只可追加的日志文件等)
文件类型 对于文件和目录的访问权力是根据读访问,写访问,和执行访问来定义的. 我们来看一下 ls 命令的输出结果 [root@iZ28dr6w0qvZ test]# ls -l 总用量 72 -rw- ...
- 解决root用户下都无权限操作的问题
问题现象: 有时系统设置了一种文件,无法编辑其所有权 sudo chown users:username {filename} 或者root用户下执行 chown users:username {f ...
- PHP CGI 进程占用CPU过高导致CPU使用达到100%的另类原因
由于使用的华为云的CDN加速,结果发现我的阿里云服务器突然卡顿,网页打开极慢.登陆华为云CDN管理后台发现最高带宽占用30M,流量短时间内达到10GB以上,这么大的流量我的服务器肯定扛不住啊.于是还跟 ...
- Linux下进程的文件访问权限
本文转自 http://blog.csdn.net/chosen0ne/article/details/10581883 对进程校验文件访问权限包括两个部分,一是确定进程的角色(属于哪个用户或者组), ...
- 利用lsof恢复进程占用的文件
说明:经常会遇到这种情况,没有使用正确的方式清理进程占用的文件,比如日志.导致空间并没有释放.也有的时候需要恢复进程占用的文件. 解决方式 lsof |grep del # 找出自己要恢复的文件名称. ...
随机推荐
- RGB和YUV之比较【转】
转自:http://blog.csdn.net/qfnu08zzr/article/details/6763159 版权声明:本文为博主原创文章,未经博主允许不得转载. RGB 原理 RGB 是从颜色 ...
- (转):从内核代码聊聊pipe的实现
来源: http://luodw.cc/2016/07/09/pipeof/ 用linux也有两年多了,从命令,系统调用,到内核原理一路学过来,我发现我是深深喜欢上这个系统:使用起来就是一个字&quo ...
- java打包python到exe文件
最近想把写的python代码打包,以供没用安装python环境的同事使用,需求如下: 无python环境也可执行 文件尽量少,不要太乱 程序体积尽量小 如果需要更新的话重复类库不用更新 采用方案如下: ...
- Scrapy学习-14-验证码识别
3种实现方案 1. 编码实现 tesseract-ocr 谷歌开源的识别工具,自己实现代码编码,投入精力大,回馈低.且平台验证码更换周期短,编好的代码容易失效 2. 在线打码 在线平台提供,识别率 ...
- mkdir(): No such file or directory
mkdir(): No such file or directory php创建目录时提示没有文件或目录, (1)先检查目录权限: (2)细看mkdir()的用法: 定义和用法: mkdir() 函数 ...
- AJAX 是一种在无需重新加载整个网页的情况下,能够更新部分网页的技术。
AJAX = Asynchronous JavaScript and XML(异步的 JavaScript 和 XML). AJAX 不是新的编程语言,而是一种使用现有标准的新方法. AJAX 是与服 ...
- VUE之命令行报错:Component template should contain exactly one root element. If you are using v-if on multiple elements, use v-else-if to chain them instead 解决办法
Failed to compile. ./node_modules/vue-loader/lib/template-compiler?{"id":"data-v-5992 ...
- jvm类加载的过程
java类加载过程:加载-->验证-->准备-->解析-->初始化,之后类就可以被使用了.绝大部分情况下是按这 样的顺序来完成类的加载全过程的.但是是有例外的地方,解析也是可以 ...
- Java生成GUID的方法
其实在Java上已经换了一个说法,叫做UUID,方法如下: java.util.UUID.randomUUID()
- 临远的activiti教程
1. 简介 协议 下载 源码 必要的软件 JDK 6+ Eclipse Indigo 和 Juno 报告问题 试验性功能 内部实现类 2. 开始学习 一分钟入门 安装Activiti 安装Activi ...