root无权限删除 原因 进程 占用 文件
[root@test opt]# find / | grep gitlab | xargs rm -rf
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs’: Operation not permitted
rm: cannot remove ‘/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks’: Operation not permitted
[root@test opt]# find / | grep gitlab
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.list
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.deny
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/devices.allow
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.clone_children
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.event_control
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/notify_on_release
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/cgroup.procs
/sys/fs/cgroup/devices/system.slice/gitlab-runsvdir.service/tasks
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.clone_children
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.event_control
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/notify_on_release
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/cgroup.procs
/sys/fs/cgroup/systemd/system.slice/gitlab-runsvdir.service/tasks
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]# ps -aux | grep gitlab
root 9215 0.0 0.0 112660 968 pts/2 S+ 17:11 0:00 grep --color=auto gitlab
root 15857 0.0 0.0 4336 496 ? Ss 09:47 0:00 runsvdir -P /opt/gitlab/service log: does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitla/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist runsvdir /opt/gitlab/service: warning: unable to stat /opt/gitlab/service: file does not exist
root 16163 0.0 0.0 4184 444 ? Ss 09:48 0:00 runsv gitlab-workhorse
root 16414 0.0 0.0 4184 444 ? Ss 09:49 0:00 runsv gitlab-monitor
root 16594 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/postgresql
root 16595 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/redis
root 16599 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/sidekiq
root 16609 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitlab-workhorse
root 16613 0.0 0.0 4328 540 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/nginx
root 16614 0.0 0.0 4328 540 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/logrotate
root 16629 0.0 0.0 4328 556 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/node-exporter
root 16634 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitaly
root 16646 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/unicorn
root 16651 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/gitlab-monitor
root 16652 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/redis-exporter
root 16669 0.0 0.0 4328 556 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/prometheus
root 16688 0.0 0.0 4328 564 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/alertmanager
root 16739 0.0 0.0 4328 560 ? S 09:49 0:00 svlogd -tt /var/log/gitlab/postgres-exporter
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15
9217
15857
16163
16414
16594
16595
16599
16609
16613
16614
16629
16634
16646
16651
16652
16669
16688
16739
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15 | xargs kill -9
kill: sending signal to 9220 failed: No such process
[root@test opt]#
[root@test opt]#
[root@test opt]#
[root@test opt]# ps -aux | grep gitlab | cut -c 10-15 | xargs kill -9
kill: sending signal to 9234 failed: No such process
[root@test opt]# ps -aux | grep gitlab
root 9239 0.0 0.0 112660 968 pts/2 S+ 17:11 0:00 grep --color=auto gitlab
[root@test opt]# find / | grep gitlab
[root@test opt]# find / | grep gitlab
[root@test opt]#
root无权限删除 原因 进程 占用 文件的更多相关文章
- 以管理员身份运行 cmd 删除无权限删除的文件夹
rd 文件夹 PS:删除空文件夹 rd /s 文件夹 PS:删除文件夹,及所有子目录和文件 rd /s/q 文件夹 PS:强制删除文件夹,及所有子目录和文件,不需要提示
- 删除Vue中无权限的【node_modules】文件
npm install rimraf -g rimraf node_modules
- Windows下查看什么进程占用文件
任务管理器→性能Tab→资源管理器→CPU→关联的句柄后面的检索框中录入文件名(关键文件夹即可). 比如我的是在删除tomcat下面的WEB-INF文件出现问题:就输入WEB-INF:mygod,发现 ...
- 如何删除google流氓扩展(强制安装,并且无权限删除)
chrome现在也是流氓遍地跑, 没比IE安全到哪里. TubeAdblocKer 这个流氓扩展,强制安装,无法删除.google了一大堆方法,全部无效.祭出了filelocator这个神器之后,终于 ...
- linux文件权限总结(创建root不可以删除文件、只可追加的日志文件等)
文件类型 对于文件和目录的访问权力是根据读访问,写访问,和执行访问来定义的. 我们来看一下 ls 命令的输出结果 [root@iZ28dr6w0qvZ test]# ls -l 总用量 72 -rw- ...
- 解决root用户下都无权限操作的问题
问题现象: 有时系统设置了一种文件,无法编辑其所有权 sudo chown users:username {filename} 或者root用户下执行 chown users:username {f ...
- PHP CGI 进程占用CPU过高导致CPU使用达到100%的另类原因
由于使用的华为云的CDN加速,结果发现我的阿里云服务器突然卡顿,网页打开极慢.登陆华为云CDN管理后台发现最高带宽占用30M,流量短时间内达到10GB以上,这么大的流量我的服务器肯定扛不住啊.于是还跟 ...
- Linux下进程的文件访问权限
本文转自 http://blog.csdn.net/chosen0ne/article/details/10581883 对进程校验文件访问权限包括两个部分,一是确定进程的角色(属于哪个用户或者组), ...
- 利用lsof恢复进程占用的文件
说明:经常会遇到这种情况,没有使用正确的方式清理进程占用的文件,比如日志.导致空间并没有释放.也有的时候需要恢复进程占用的文件. 解决方式 lsof |grep del # 找出自己要恢复的文件名称. ...
随机推荐
- XML 增、删、改和查的实例【转】
原文发布时间为:2008-08-10 -- 来源于本人的百度文章 [由搬家工具导入] 原文地址:http://www.cnblogs.com/skylaugh/archive/2006/12/18/5 ...
- 前端开发 CSS中你所不知道的伪类与伪元素的区别--摘抄
做过前端开发的人都熟悉伪类与伪元素,而真正能够彻底了解这二者的区别的人并不多.伪类与伪元素确实很容易混淆. 伪元素主要是用来创建一些不存在原有dom结构树种的元素,例如:用::before和::aft ...
- PHP读取APK的包信息,包括包名,应用名,权限,LOGO等
[转]PHP读取APK的包信息,包括包名,应用名,权限,LOGO等 声明本文转自: 原文链接:https://www.jb51.net/article/53780.htm: 感谢分享! <?ph ...
- java string中indexOf()常用用法
Java中字符串中子串的查找共有四种方法,如下: 1.int indexOf(String str) :返回第一次出现的指定子字符串在此字符串中的索引. 2.int indexOf(String st ...
- 大视野 1016: [JSOI2008]最小生成树计数(最小生成树)
总结:此类题需要耐心观察规律,大胆猜想,然后证明猜想,得到有用的性质,然后解答. 简单的说:找隐含性质. 传送门:http://61.187.179.132/JudgeOnline/problem.p ...
- 彻底删除node_modules文件
npm install rimraf -g rimraf node_modules
- python笔记3:注释命名风格
6.注释: 行注释采用 # 开头,多行注释使用三个单引号 (''') 或三个双引号 ("' '"),注释不需要对齐 三引号让程序员从引号和特殊字符串的泥潭里面解脱出来,自始至终保 ...
- 【java】深入分析Java ClassLoader原理
一.什么是ClassLoader? 大家都知道,当我们写好一个Java程序之后,不是管是CS还是BS应用,都是由若干个.class文件组织而成的一个完整的Java应用程序,当程序在运行时,即会调用该程 ...
- DevExpress控件GridControl使用 z
设置选中行的背景色.而不改变前景色. EnableAppearanceFocusedCell = False, EnableAppearanceFocusedRow = False private v ...
- Android 你应该注意的开发规范
本文由Blankj投稿. Blankjd的博客地址: http://www.jianshu.com/u/46702d5c6978 为了利于项目维护以及规范开发,促进成员之间Code Review的效率 ...