I\'d like to know if it\'s possible to find out the \"command\" that a PID is set to. When I say command, I mean what you see in the last column when you run the command \"t
PLEASE, do not use /proc
filesystem in production code. Instead, use well-defined POSIX interfaces, such as glibc calls and standard shell commands! Make the Linux world more standardized, it really needs to!
What you need is well achieved by invoking a shell command
ps -p <YOUR PID> -o cmd h
No parsing is needed!
Let alone that reading shell command output from python takes no more effort than reading from a file in /proc
. And this makes your program more portable, either!
This worked for me:
def filter_non_printable(str):
ret=""
for c in str:
if ord(c) > 31 or ord(c) == 9:
ret += c
else:
ret += " "
return ret
#
# Get /proc/<cpu>/cmdline information
#
def pid_name(pid):
try:
with open(os.path.join('/proc/', pid, 'cmdline'), 'r') as pidfile:
return filter_non_printable(pidfile.readline())
except Exception:
pass
return
An interesting Python package is psutil.
For example, to get the command for a specific PID:
import psutil
pid = 1234 # The pid whose info you're looking for
p = psutil.Process(pid)
print p.cmdline
The last line will print something like ['/usr/bin/python', 'main.py']
.
A more robust way to get this information, being careful if the pid represents a process no longer running:
import psutil
pid = 1234 # The pid whose info you're looking for
if pid in psutil.get_pid_list():
p = psutil.Process(pid)
print p.cmdline
/proc/$PID/cmdline
The proc filesystem exports this (and other) information. Look at the /proc/PID/cmd symlink.
Look in /proc/$PID/cmdline
, and then os.readlink() on /proc/$PID/exe
.
/proc/$PID/cmdline
is not necessarily going to be correct, as a program can change its argument vector or it may not contain a full path. Three examples of this from my current process list are:
avahi-daemon: chroot helper
qmgr -l -t fifo -u
/usr/sbin/postgrey --pidfile=/var/run/postgrey.pid --daemonize --inet=127.0.0.1:60000 --delay=55
That first one is obvious - it's not a valid path or program name. The second is just an executable with no path name. The third looks ok, but that whole command line is actually in argv[0]
, with spaces separating the arguments. Normally you should have NUL separated arguments.
All this goes to show that /proc/$PID/cmdline
(or the ps(1) output) is not reliable.
However, nor is /proc/$PID/exe
. Usually it is a symlink to the executable that is the main text segment of the process. But sometimes it has " (deleted)
" after it if the executable is no longer in the filesystem.
Also, the program that is the text segment is not always what you want. For instance, /proc/$PID/exe
from that /usr/sbin/postgrey
example above is /usr/bin/perl
. This will be the case for all interpretted scripts (#!).
I settled on parsing /proc/$PID/cmdline
- taking the first element of the vector, and then looking for spaces in that, and taking all before the first space. If that was an executable file - I stopped there. Otherwise I did a readlink(2) on /proc/$PID/exe
and removed any " (deleted)
" strings on the end. That first part will fail if the executable filename actually has spaces in it. There's not much you can do about that.
BTW. The argument to use ps(1) instead of /proc/$PID/cmdline
does not apply in this case, since you are going to fall back to /proc/$PID/exe
. You will be dependent on the /proc
filesystem, so you may as well read it with read(2) instead of pipe(2), fork(2), execve(2), readdir(3)..., write(2), read(2). While ps and /proc/$PID/cmdline
may be the same from the point of view of lines of python code, there's a whole lot more going on behind the scenes with ps.