Question

Unix: Do zombie processes remain in the system forever? Explain         

Unix: Do zombie processes remain in the system forever? Explain         

Homework Answers

Answer #1

Solution:-

1. In linux we have what called zombie processes, it is a process that has completed its execution.

2. Even if the the process has been executed via the exit system call but is still has the entitty in the process table but in a Terminated state.

3. Zombie process is usually occur for child process as the parent process still needs to read its child exit status.

4. The system keeps this zombie process to keep the exit status for the parent to collect. If the status is collected by the parent using the wait system call then only the zombie process is completely eleminated from the process table.

5. If the parent does not collect the exit status then the zombie processes will stay around forever, So yes the zombie processes can remain in the system forever.

6. If few of these un-collected zombie process is their in the process table then it is ok of the system if their comes more zombie processes then that will create a bug in the UNIX leading to shottage of process table entries.

7. How ever the zombie processes can be eleminated from the system by using the SIGCHLD signal to the parent.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
With UNIX, what is Bash and why do it?
With UNIX, what is Bash and why do it?
In the 1974 paper The UNIX Time-Sharing System, Dennis Ritchie and Ken Thompson of Bell Laboratories...
In the 1974 paper The UNIX Time-Sharing System, Dennis Ritchie and Ken Thompson of Bell Laboratories describe the original implementation of forking processes as follows: Except while UNIX is bootstrapping itself into operation, a new process can come into existence only by use of the fork system call: processid = fork(label) When fork is executed by a process, it splits into two independently executing processes. The two processes have independent copies of the original core image, and share any open...
Do these processes result in a positive or negative change in entropy of the system? Explain...
Do these processes result in a positive or negative change in entropy of the system? Explain qualitatively without looking up any standard thermodynamic values. (Thanks! I promise to rate!) a. S8(s) + 8O2(g) → 8SO2(g) b. 4KO2(s) + 2CO2(g) → 2K2CO3(s) + 3O2(g) c. 4Fe(s) + 3O2(g) → 2Fe2O3(s) d. AgNO3(aq) + NaCl(aq) → NaNO3(aq) + AgCl(s)
We are interested in the implementation of a Unix/Linux system utility for the concatenation of a...
We are interested in the implementation of a Unix/Linux system utility for the concatenation of a list of n text files. In order to do that we are going to consider the following syntax below where the concatenation of n text files are written in the output file all.txt or on the console if the output text file is not specified. In C       $./mycat file_1.txt file_2.txt   . . .   file_n.txt > all.txt Attach your solution, named mycat.c, here
Define each term Federal Home Loan (FHL) Bank System Zombie Institutions Resolution Trust Corporation Nonprofit financial...
Define each term Federal Home Loan (FHL) Bank System Zombie Institutions Resolution Trust Corporation Nonprofit financial institutions
(4 pts) See the following directory entry for a file named “application” on a Unix system....
(4 pts) See the following directory entry for a file named “application” on a Unix system. -rwsr-xr-- 3 root sys 73748 Nov 2 2005 /usr/bin/application What permissions related to this file do members of the “sys” group possess? Say that a user with the username alicec who has permission to execute this program runs it. Whose permissions will the program possess when it runs?
It was stated that the inclusion of the salt in the UNIX password scheme increases the...
It was stated that the inclusion of the salt in the UNIX password scheme increases the difficulty of guessing. Let’s use a case to explain why it is asserted that the salt increases security although the salt is stored in plaintext in the same entry as the corresponding ciphertext password. Let’s assume that (1) a computing system adopts the traditional UNIX password scheme (password length: up to 8 characters) and (2) the adversary has obtained a password file containing 4000...
1. Make at least one additional assumption about how the zombie virus spreads, and add thisto...
1. Make at least one additional assumption about how the zombie virus spreads, and add thisto the basic model. Examples might be(a) Maybe, once bitten, a human doesn’t become infectious for a short period. Called thelatent period. (b) Maybe humans don’t always turn into zombies when they die, only with a certainprobability. (c) Zombies might have a natural death rate, unrelated to having their heads blown apartby humans. (d) Maybe zombies could fall in love with humans and reproduce to...
How do search engines aid in decision-making and negotiation processes? Explain your answer.  
How do search engines aid in decision-making and negotiation processes? Explain your answer.  
Linux commands in terminal What processes are running? In the previous task ("Command Based") you were...
Linux commands in terminal What processes are running? In the previous task ("Command Based") you were already familiar with the command "ps" which shows some or all of the processes that are running. When you run "ps", you start a new process and you can see the actual process in the output. Later in this task you will use "ps" more. The "top" command also shows an overview of the processes that exist on the system but it the overview...