[root@test opt]# find / | grep gitlab | xargs rm -rf
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
[root@test opt]# find / | grep gitlab
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]# ps -aux | grep gitlab
root 9215 0.0 0.0 112660 968 pts/2 S+ 17:11 0:00 grep --color=auto gitlab
root 15857 0.0 0.0 4336 496 ? Ss 09:47 0:00 runsvdir -P /opt/gitlab/service log: does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitla/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist
root 16163 0.0 0.0 4184 444 ? Ss 09:48 0:00 runsv gitlab-workhorse
root 16414 0.0 0.0 4184 444 ? Ss 09:49 0:00 runsv gitlab-monitor
root 16594 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/postgresql
root 16595 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/redis
root 16599 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/sidekiq
root 16609 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitlab-workhorse
root 16613 0.0 0.0 4328 540 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/nginx
root 16614 0.0 0.0 4328 540 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/logrotate
root 16629 0.0 0.0 4328 556 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/node-exporter
root 16634 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitaly
root 16646 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/unicorn
root 16651 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitlab-monitor
root 16652 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/redis-exporter
root 16669 0.0 0.0 4328 556 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/prometheus
root 16688 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/alertmanager
root 16739 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/postgres-exporter
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15
9217
15857
16163
16414
16594
16595
16599
16609
16613
16614
16629
16634
16646
16651
16652
16669
16688
16739
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15 | xargs kill -9
kill: sending signal to 9220 failed: No such process
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15 | xargs kill -9
kill: sending signal to 9234 failed: No such process
[root@test opt]# ps -aux | grep gitlab
root 9239 0.0 0.0 112660 968 pts/2 S+ 17:11 0:00 grep --color=auto gitlab
[root@test opt]# find / | grep gitlab
[root@test opt]# find / | grep gitlab
[root@test opt]#

root无权限删除 原因 进程 占用 文件的更多相关文章

  1. 以管理员身份运行 cmd 删除无权限删除的文件夹

    rd 文件夹 PS:删除空文件夹 rd /s 文件夹 PS:删除文件夹,及所有子目录和文件 rd /s/q 文件夹 PS:强制删除文件夹,及所有子目录和文件,不需要提示

  2. 删除Vue中无权限的【node_modules】文件

    npm install rimraf -g rimraf node_modules

  3. Windows下查看什么进程占用文件

    任务管理器→性能Tab→资源管理器→CPU→关联的句柄后面的检索框中录入文件名(关键文件夹即可). 比如我的是在删除tomcat下面的WEB-INF文件出现问题:就输入WEB-INF:mygod,发现 ...

  4. 如何删除google流氓扩展(强制安装,并且无权限删除)

    chrome现在也是流氓遍地跑, 没比IE安全到哪里. TubeAdblocKer 这个流氓扩展,强制安装,无法删除.google了一大堆方法,全部无效.祭出了filelocator这个神器之后,终于 ...

  5. linux文件权限总结(创建root不可以删除文件、只可追加的日志文件等)

    文件类型 对于文件和目录的访问权力是根据读访问,写访问,和执行访问来定义的. 我们来看一下 ls 命令的输出结果 [root@iZ28dr6w0qvZ test]# ls -l 总用量 72 -rw- ...

  6. 解决root用户下都无权限操作的问题

    问题现象: 有时系统设置了一种文件,无法编辑其所有权​ sudo chown users:username {filename} 或者root用户下执行 chown users:username {f ...

  7. PHP CGI 进程占用CPU过高导致CPU使用达到100%的另类原因

    由于使用的华为云的CDN加速,结果发现我的阿里云服务器突然卡顿,网页打开极慢.登陆华为云CDN管理后台发现最高带宽占用30M,流量短时间内达到10GB以上,这么大的流量我的服务器肯定扛不住啊.于是还跟 ...

  8. Linux下进程的文件访问权限

    本文转自 http://blog.csdn.net/chosen0ne/article/details/10581883 对进程校验文件访问权限包括两个部分,一是确定进程的角色(属于哪个用户或者组), ...

  9. 利用lsof恢复进程占用的文件

    说明:经常会遇到这种情况,没有使用正确的方式清理进程占用的文件,比如日志.导致空间并没有释放.也有的时候需要恢复进程占用的文件. 解决方式 lsof |grep del # 找出自己要恢复的文件名称. ...

随机推荐

  1. 转 Python执行系统命令的方法

    传送门 Python执行系统命令的方法 http://www.linux-field.com/?p=15 Python中执行系统命令常见方法有两种: 两者均需 import os (1) os.sys ...

  2. Manjaro中源码安装gcc7.1

    刚刚gcc 7.1也出来了,想在使用熟悉的linux下试试,特记录如下: 准备必要的系统环境:(升级系统到最新,安装必要的工具) pacman -Syyu                        ...

  3. POJ - 2391 最大流

    题目链接:http://poj.org/problem?id=2391 今天掉坑多次. 做了几道题,发现从源点出来的边和进入汇点的边都在题目中出来过. POJ真是坑,交G++一直wa,检查代码检查了好 ...

  4. Win10下安装Docker及tensorflow(cpu版)

    1.准备工作: 1)64为操作系统,win7或者更高 2)支持“ Hardware Virtualization Technology”,并且,“virtualization ”可用(可进入任务管理器 ...

  5. 详解JavaScript变量提升

    变量在程序中随处可见.它们是一些始终在相互影响,相互作用的的数据和逻辑.正是这些互动使应用程序活了起来. 在JavaScript中使用变量很重要的一方面就是变量的提升 —— 它决定了一个变量何时可以被 ...

  6. Linux 端口防火墙

    举例: 开放10000端口的解决步骤如下: 1.修改/etc/sysconfig/iptables文件,增加如下一行: -A RH-Firewall-1-INPUT -m state --state ...

  7. 奇酷手机显示Log

    1.在桌面点击拨号,在拨号盘输入“*20121220#”,进入工程模式;2.看到日志输出等级,点进去 Log print enable 选 enable Java log level 选 LOGV C ...

  8. Go -- LRU算法(缓存淘汰算法)(转)

    1. LRU1.1. 原理 LRU(Least recently used,最近最少使用)算法根据数据的历史访问记录来进行淘汰数据,其核心思想是“如果数据最近被访问过,那么将来被访问的几率也更高”. ...

  9. Lazarus安装使用

    Lazarus安装使用 最后还是安装了Lazarus: 安装之后,新建了项目,还引入了Unit,就可以跑了: 学习:http://tieba.baidu.com/p/3164001113 progra ...

  10. [LeedCode OJ]#85 Maximal Rectangle

     [ 声明:版权全部,转载请标明出处.请勿用于商业用途. 联系信箱:libin493073668@sina.com] 题目链接:https://leetcode.com/problems/maxima ...