Mercurial > repos > shellac > sam_consensus_v3
comparison env/lib/python3.9/site-packages/psutil/_pssunos.py @ 0:4f3585e2f14b draft default tip
"planemo upload commit 60cee0fc7c0cda8592644e1aad72851dec82c959"
| author | shellac |
|---|---|
| date | Mon, 22 Mar 2021 18:12:50 +0000 |
| parents | |
| children |
comparison
equal
deleted
inserted
replaced
| -1:000000000000 | 0:4f3585e2f14b |
|---|---|
| 1 # Copyright (c) 2009, Giampaolo Rodola'. All rights reserved. | |
| 2 # Use of this source code is governed by a BSD-style license that can be | |
| 3 # found in the LICENSE file. | |
| 4 | |
| 5 """Sun OS Solaris platform implementation.""" | |
| 6 | |
| 7 import errno | |
| 8 import functools | |
| 9 import os | |
| 10 import socket | |
| 11 import subprocess | |
| 12 import sys | |
| 13 from collections import namedtuple | |
| 14 from socket import AF_INET | |
| 15 | |
| 16 from . import _common | |
| 17 from . import _psposix | |
| 18 from . import _psutil_posix as cext_posix | |
| 19 from . import _psutil_sunos as cext | |
| 20 from ._common import AccessDenied | |
| 21 from ._common import AF_INET6 | |
| 22 from ._common import debug | |
| 23 from ._common import get_procfs_path | |
| 24 from ._common import isfile_strict | |
| 25 from ._common import memoize_when_activated | |
| 26 from ._common import NoSuchProcess | |
| 27 from ._common import sockfam_to_enum | |
| 28 from ._common import socktype_to_enum | |
| 29 from ._common import usage_percent | |
| 30 from ._common import ZombieProcess | |
| 31 from ._compat import b | |
| 32 from ._compat import FileNotFoundError | |
| 33 from ._compat import PermissionError | |
| 34 from ._compat import ProcessLookupError | |
| 35 from ._compat import PY3 | |
| 36 | |
| 37 | |
| 38 __extra__all__ = ["CONN_IDLE", "CONN_BOUND", "PROCFS_PATH"] | |
| 39 | |
| 40 | |
| 41 # ===================================================================== | |
| 42 # --- globals | |
| 43 # ===================================================================== | |
| 44 | |
| 45 | |
| 46 PAGE_SIZE = cext_posix.getpagesize() | |
| 47 AF_LINK = cext_posix.AF_LINK | |
| 48 IS_64_BIT = sys.maxsize > 2**32 | |
| 49 | |
| 50 CONN_IDLE = "IDLE" | |
| 51 CONN_BOUND = "BOUND" | |
| 52 | |
| 53 PROC_STATUSES = { | |
| 54 cext.SSLEEP: _common.STATUS_SLEEPING, | |
| 55 cext.SRUN: _common.STATUS_RUNNING, | |
| 56 cext.SZOMB: _common.STATUS_ZOMBIE, | |
| 57 cext.SSTOP: _common.STATUS_STOPPED, | |
| 58 cext.SIDL: _common.STATUS_IDLE, | |
| 59 cext.SONPROC: _common.STATUS_RUNNING, # same as run | |
| 60 cext.SWAIT: _common.STATUS_WAITING, | |
| 61 } | |
| 62 | |
| 63 TCP_STATUSES = { | |
| 64 cext.TCPS_ESTABLISHED: _common.CONN_ESTABLISHED, | |
| 65 cext.TCPS_SYN_SENT: _common.CONN_SYN_SENT, | |
| 66 cext.TCPS_SYN_RCVD: _common.CONN_SYN_RECV, | |
| 67 cext.TCPS_FIN_WAIT_1: _common.CONN_FIN_WAIT1, | |
| 68 cext.TCPS_FIN_WAIT_2: _common.CONN_FIN_WAIT2, | |
| 69 cext.TCPS_TIME_WAIT: _common.CONN_TIME_WAIT, | |
| 70 cext.TCPS_CLOSED: _common.CONN_CLOSE, | |
| 71 cext.TCPS_CLOSE_WAIT: _common.CONN_CLOSE_WAIT, | |
| 72 cext.TCPS_LAST_ACK: _common.CONN_LAST_ACK, | |
| 73 cext.TCPS_LISTEN: _common.CONN_LISTEN, | |
| 74 cext.TCPS_CLOSING: _common.CONN_CLOSING, | |
| 75 cext.PSUTIL_CONN_NONE: _common.CONN_NONE, | |
| 76 cext.TCPS_IDLE: CONN_IDLE, # sunos specific | |
| 77 cext.TCPS_BOUND: CONN_BOUND, # sunos specific | |
| 78 } | |
| 79 | |
| 80 proc_info_map = dict( | |
| 81 ppid=0, | |
| 82 rss=1, | |
| 83 vms=2, | |
| 84 create_time=3, | |
| 85 nice=4, | |
| 86 num_threads=5, | |
| 87 status=6, | |
| 88 ttynr=7, | |
| 89 uid=8, | |
| 90 euid=9, | |
| 91 gid=10, | |
| 92 egid=11) | |
| 93 | |
| 94 | |
| 95 # ===================================================================== | |
| 96 # --- named tuples | |
| 97 # ===================================================================== | |
| 98 | |
| 99 | |
| 100 # psutil.cpu_times() | |
| 101 scputimes = namedtuple('scputimes', ['user', 'system', 'idle', 'iowait']) | |
| 102 # psutil.cpu_times(percpu=True) | |
| 103 pcputimes = namedtuple('pcputimes', | |
| 104 ['user', 'system', 'children_user', 'children_system']) | |
| 105 # psutil.virtual_memory() | |
| 106 svmem = namedtuple('svmem', ['total', 'available', 'percent', 'used', 'free']) | |
| 107 # psutil.Process.memory_info() | |
| 108 pmem = namedtuple('pmem', ['rss', 'vms']) | |
| 109 pfullmem = pmem | |
| 110 # psutil.Process.memory_maps(grouped=True) | |
| 111 pmmap_grouped = namedtuple('pmmap_grouped', | |
| 112 ['path', 'rss', 'anonymous', 'locked']) | |
| 113 # psutil.Process.memory_maps(grouped=False) | |
| 114 pmmap_ext = namedtuple( | |
| 115 'pmmap_ext', 'addr perms ' + ' '.join(pmmap_grouped._fields)) | |
| 116 | |
| 117 | |
| 118 # ===================================================================== | |
| 119 # --- memory | |
| 120 # ===================================================================== | |
| 121 | |
| 122 | |
| 123 def virtual_memory(): | |
| 124 """Report virtual memory metrics.""" | |
| 125 # we could have done this with kstat, but IMHO this is good enough | |
| 126 total = os.sysconf('SC_PHYS_PAGES') * PAGE_SIZE | |
| 127 # note: there's no difference on Solaris | |
| 128 free = avail = os.sysconf('SC_AVPHYS_PAGES') * PAGE_SIZE | |
| 129 used = total - free | |
| 130 percent = usage_percent(used, total, round_=1) | |
| 131 return svmem(total, avail, percent, used, free) | |
| 132 | |
| 133 | |
| 134 def swap_memory(): | |
| 135 """Report swap memory metrics.""" | |
| 136 sin, sout = cext.swap_mem() | |
| 137 # XXX | |
| 138 # we are supposed to get total/free by doing so: | |
| 139 # http://cvs.opensolaris.org/source/xref/onnv/onnv-gate/ | |
| 140 # usr/src/cmd/swap/swap.c | |
| 141 # ...nevertheless I can't manage to obtain the same numbers as 'swap' | |
| 142 # cmdline utility, so let's parse its output (sigh!) | |
| 143 p = subprocess.Popen(['/usr/bin/env', 'PATH=/usr/sbin:/sbin:%s' % | |
| 144 os.environ['PATH'], 'swap', '-l'], | |
| 145 stdout=subprocess.PIPE) | |
| 146 stdout, stderr = p.communicate() | |
| 147 if PY3: | |
| 148 stdout = stdout.decode(sys.stdout.encoding) | |
| 149 if p.returncode != 0: | |
| 150 raise RuntimeError("'swap -l' failed (retcode=%s)" % p.returncode) | |
| 151 | |
| 152 lines = stdout.strip().split('\n')[1:] | |
| 153 if not lines: | |
| 154 raise RuntimeError('no swap device(s) configured') | |
| 155 total = free = 0 | |
| 156 for line in lines: | |
| 157 line = line.split() | |
| 158 t, f = line[3:4] | |
| 159 total += int(int(t) * 512) | |
| 160 free += int(int(f) * 512) | |
| 161 used = total - free | |
| 162 percent = usage_percent(used, total, round_=1) | |
| 163 return _common.sswap(total, used, free, percent, | |
| 164 sin * PAGE_SIZE, sout * PAGE_SIZE) | |
| 165 | |
| 166 | |
| 167 # ===================================================================== | |
| 168 # --- CPU | |
| 169 # ===================================================================== | |
| 170 | |
| 171 | |
| 172 def cpu_times(): | |
| 173 """Return system-wide CPU times as a named tuple""" | |
| 174 ret = cext.per_cpu_times() | |
| 175 return scputimes(*[sum(x) for x in zip(*ret)]) | |
| 176 | |
| 177 | |
| 178 def per_cpu_times(): | |
| 179 """Return system per-CPU times as a list of named tuples""" | |
| 180 ret = cext.per_cpu_times() | |
| 181 return [scputimes(*x) for x in ret] | |
| 182 | |
| 183 | |
| 184 def cpu_count_logical(): | |
| 185 """Return the number of logical CPUs in the system.""" | |
| 186 try: | |
| 187 return os.sysconf("SC_NPROCESSORS_ONLN") | |
| 188 except ValueError: | |
| 189 # mimic os.cpu_count() behavior | |
| 190 return None | |
| 191 | |
| 192 | |
| 193 def cpu_count_physical(): | |
| 194 """Return the number of physical CPUs in the system.""" | |
| 195 return cext.cpu_count_phys() | |
| 196 | |
| 197 | |
| 198 def cpu_stats(): | |
| 199 """Return various CPU stats as a named tuple.""" | |
| 200 ctx_switches, interrupts, syscalls, traps = cext.cpu_stats() | |
| 201 soft_interrupts = 0 | |
| 202 return _common.scpustats(ctx_switches, interrupts, soft_interrupts, | |
| 203 syscalls) | |
| 204 | |
| 205 | |
| 206 # ===================================================================== | |
| 207 # --- disks | |
| 208 # ===================================================================== | |
| 209 | |
| 210 | |
| 211 disk_io_counters = cext.disk_io_counters | |
| 212 disk_usage = _psposix.disk_usage | |
| 213 | |
| 214 | |
| 215 def disk_partitions(all=False): | |
| 216 """Return system disk partitions.""" | |
| 217 # TODO - the filtering logic should be better checked so that | |
| 218 # it tries to reflect 'df' as much as possible | |
| 219 retlist = [] | |
| 220 partitions = cext.disk_partitions() | |
| 221 for partition in partitions: | |
| 222 device, mountpoint, fstype, opts = partition | |
| 223 if device == 'none': | |
| 224 device = '' | |
| 225 if not all: | |
| 226 # Differently from, say, Linux, we don't have a list of | |
| 227 # common fs types so the best we can do, AFAIK, is to | |
| 228 # filter by filesystem having a total size > 0. | |
| 229 try: | |
| 230 if not disk_usage(mountpoint).total: | |
| 231 continue | |
| 232 except OSError as err: | |
| 233 # https://github.com/giampaolo/psutil/issues/1674 | |
| 234 debug("skipping %r: %r" % (mountpoint, err)) | |
| 235 continue | |
| 236 maxfile = maxpath = None # set later | |
| 237 ntuple = _common.sdiskpart(device, mountpoint, fstype, opts, | |
| 238 maxfile, maxpath) | |
| 239 retlist.append(ntuple) | |
| 240 return retlist | |
| 241 | |
| 242 | |
| 243 # ===================================================================== | |
| 244 # --- network | |
| 245 # ===================================================================== | |
| 246 | |
| 247 | |
| 248 net_io_counters = cext.net_io_counters | |
| 249 net_if_addrs = cext_posix.net_if_addrs | |
| 250 | |
| 251 | |
| 252 def net_connections(kind, _pid=-1): | |
| 253 """Return socket connections. If pid == -1 return system-wide | |
| 254 connections (as opposed to connections opened by one process only). | |
| 255 Only INET sockets are returned (UNIX are not). | |
| 256 """ | |
| 257 cmap = _common.conn_tmap.copy() | |
| 258 if _pid == -1: | |
| 259 cmap.pop('unix', 0) | |
| 260 if kind not in cmap: | |
| 261 raise ValueError("invalid %r kind argument; choose between %s" | |
| 262 % (kind, ', '.join([repr(x) for x in cmap]))) | |
| 263 families, types = _common.conn_tmap[kind] | |
| 264 rawlist = cext.net_connections(_pid) | |
| 265 ret = set() | |
| 266 for item in rawlist: | |
| 267 fd, fam, type_, laddr, raddr, status, pid = item | |
| 268 if fam not in families: | |
| 269 continue | |
| 270 if type_ not in types: | |
| 271 continue | |
| 272 # TODO: refactor and use _common.conn_to_ntuple. | |
| 273 if fam in (AF_INET, AF_INET6): | |
| 274 if laddr: | |
| 275 laddr = _common.addr(*laddr) | |
| 276 if raddr: | |
| 277 raddr = _common.addr(*raddr) | |
| 278 status = TCP_STATUSES[status] | |
| 279 fam = sockfam_to_enum(fam) | |
| 280 type_ = socktype_to_enum(type_) | |
| 281 if _pid == -1: | |
| 282 nt = _common.sconn(fd, fam, type_, laddr, raddr, status, pid) | |
| 283 else: | |
| 284 nt = _common.pconn(fd, fam, type_, laddr, raddr, status) | |
| 285 ret.add(nt) | |
| 286 return list(ret) | |
| 287 | |
| 288 | |
| 289 def net_if_stats(): | |
| 290 """Get NIC stats (isup, duplex, speed, mtu).""" | |
| 291 ret = cext.net_if_stats() | |
| 292 for name, items in ret.items(): | |
| 293 isup, duplex, speed, mtu = items | |
| 294 if hasattr(_common, 'NicDuplex'): | |
| 295 duplex = _common.NicDuplex(duplex) | |
| 296 ret[name] = _common.snicstats(isup, duplex, speed, mtu) | |
| 297 return ret | |
| 298 | |
| 299 | |
| 300 # ===================================================================== | |
| 301 # --- other system functions | |
| 302 # ===================================================================== | |
| 303 | |
| 304 | |
| 305 def boot_time(): | |
| 306 """The system boot time expressed in seconds since the epoch.""" | |
| 307 return cext.boot_time() | |
| 308 | |
| 309 | |
| 310 def users(): | |
| 311 """Return currently connected users as a list of namedtuples.""" | |
| 312 retlist = [] | |
| 313 rawlist = cext.users() | |
| 314 localhost = (':0.0', ':0') | |
| 315 for item in rawlist: | |
| 316 user, tty, hostname, tstamp, user_process, pid = item | |
| 317 # note: the underlying C function includes entries about | |
| 318 # system boot, run level and others. We might want | |
| 319 # to use them in the future. | |
| 320 if not user_process: | |
| 321 continue | |
| 322 if hostname in localhost: | |
| 323 hostname = 'localhost' | |
| 324 nt = _common.suser(user, tty, hostname, tstamp, pid) | |
| 325 retlist.append(nt) | |
| 326 return retlist | |
| 327 | |
| 328 | |
| 329 # ===================================================================== | |
| 330 # --- processes | |
| 331 # ===================================================================== | |
| 332 | |
| 333 | |
| 334 def pids(): | |
| 335 """Returns a list of PIDs currently running on the system.""" | |
| 336 return [int(x) for x in os.listdir(b(get_procfs_path())) if x.isdigit()] | |
| 337 | |
| 338 | |
| 339 def pid_exists(pid): | |
| 340 """Check for the existence of a unix pid.""" | |
| 341 return _psposix.pid_exists(pid) | |
| 342 | |
| 343 | |
| 344 def wrap_exceptions(fun): | |
| 345 """Call callable into a try/except clause and translate ENOENT, | |
| 346 EACCES and EPERM in NoSuchProcess or AccessDenied exceptions. | |
| 347 """ | |
| 348 @functools.wraps(fun) | |
| 349 def wrapper(self, *args, **kwargs): | |
| 350 try: | |
| 351 return fun(self, *args, **kwargs) | |
| 352 except (FileNotFoundError, ProcessLookupError): | |
| 353 # ENOENT (no such file or directory) gets raised on open(). | |
| 354 # ESRCH (no such process) can get raised on read() if | |
| 355 # process is gone in meantime. | |
| 356 if not pid_exists(self.pid): | |
| 357 raise NoSuchProcess(self.pid, self._name) | |
| 358 else: | |
| 359 raise ZombieProcess(self.pid, self._name, self._ppid) | |
| 360 except PermissionError: | |
| 361 raise AccessDenied(self.pid, self._name) | |
| 362 except OSError: | |
| 363 if self.pid == 0: | |
| 364 if 0 in pids(): | |
| 365 raise AccessDenied(self.pid, self._name) | |
| 366 else: | |
| 367 raise | |
| 368 raise | |
| 369 return wrapper | |
| 370 | |
| 371 | |
| 372 class Process(object): | |
| 373 """Wrapper class around underlying C implementation.""" | |
| 374 | |
| 375 __slots__ = ["pid", "_name", "_ppid", "_procfs_path", "_cache"] | |
| 376 | |
| 377 def __init__(self, pid): | |
| 378 self.pid = pid | |
| 379 self._name = None | |
| 380 self._ppid = None | |
| 381 self._procfs_path = get_procfs_path() | |
| 382 | |
| 383 def _assert_alive(self): | |
| 384 """Raise NSP if the process disappeared on us.""" | |
| 385 # For those C function who do not raise NSP, possibly returning | |
| 386 # incorrect or incomplete result. | |
| 387 os.stat('%s/%s' % (self._procfs_path, self.pid)) | |
| 388 | |
| 389 def oneshot_enter(self): | |
| 390 self._proc_name_and_args.cache_activate(self) | |
| 391 self._proc_basic_info.cache_activate(self) | |
| 392 self._proc_cred.cache_activate(self) | |
| 393 | |
| 394 def oneshot_exit(self): | |
| 395 self._proc_name_and_args.cache_deactivate(self) | |
| 396 self._proc_basic_info.cache_deactivate(self) | |
| 397 self._proc_cred.cache_deactivate(self) | |
| 398 | |
| 399 @wrap_exceptions | |
| 400 @memoize_when_activated | |
| 401 def _proc_name_and_args(self): | |
| 402 return cext.proc_name_and_args(self.pid, self._procfs_path) | |
| 403 | |
| 404 @wrap_exceptions | |
| 405 @memoize_when_activated | |
| 406 def _proc_basic_info(self): | |
| 407 if self.pid == 0 and not \ | |
| 408 os.path.exists('%s/%s/psinfo' % (self._procfs_path, self.pid)): | |
| 409 raise AccessDenied(self.pid) | |
| 410 ret = cext.proc_basic_info(self.pid, self._procfs_path) | |
| 411 assert len(ret) == len(proc_info_map) | |
| 412 return ret | |
| 413 | |
| 414 @wrap_exceptions | |
| 415 @memoize_when_activated | |
| 416 def _proc_cred(self): | |
| 417 return cext.proc_cred(self.pid, self._procfs_path) | |
| 418 | |
| 419 @wrap_exceptions | |
| 420 def name(self): | |
| 421 # note: max len == 15 | |
| 422 return self._proc_name_and_args()[0] | |
| 423 | |
| 424 @wrap_exceptions | |
| 425 def exe(self): | |
| 426 try: | |
| 427 return os.readlink( | |
| 428 "%s/%s/path/a.out" % (self._procfs_path, self.pid)) | |
| 429 except OSError: | |
| 430 pass # continue and guess the exe name from the cmdline | |
| 431 # Will be guessed later from cmdline but we want to explicitly | |
| 432 # invoke cmdline here in order to get an AccessDenied | |
| 433 # exception if the user has not enough privileges. | |
| 434 self.cmdline() | |
| 435 return "" | |
| 436 | |
| 437 @wrap_exceptions | |
| 438 def cmdline(self): | |
| 439 return self._proc_name_and_args()[1].split(' ') | |
| 440 | |
| 441 @wrap_exceptions | |
| 442 def environ(self): | |
| 443 return cext.proc_environ(self.pid, self._procfs_path) | |
| 444 | |
| 445 @wrap_exceptions | |
| 446 def create_time(self): | |
| 447 return self._proc_basic_info()[proc_info_map['create_time']] | |
| 448 | |
| 449 @wrap_exceptions | |
| 450 def num_threads(self): | |
| 451 return self._proc_basic_info()[proc_info_map['num_threads']] | |
| 452 | |
| 453 @wrap_exceptions | |
| 454 def nice_get(self): | |
| 455 # Note #1: getpriority(3) doesn't work for realtime processes. | |
| 456 # Psinfo is what ps uses, see: | |
| 457 # https://github.com/giampaolo/psutil/issues/1194 | |
| 458 return self._proc_basic_info()[proc_info_map['nice']] | |
| 459 | |
| 460 @wrap_exceptions | |
| 461 def nice_set(self, value): | |
| 462 if self.pid in (2, 3): | |
| 463 # Special case PIDs: internally setpriority(3) return ESRCH | |
| 464 # (no such process), no matter what. | |
| 465 # The process actually exists though, as it has a name, | |
| 466 # creation time, etc. | |
| 467 raise AccessDenied(self.pid, self._name) | |
| 468 return cext_posix.setpriority(self.pid, value) | |
| 469 | |
| 470 @wrap_exceptions | |
| 471 def ppid(self): | |
| 472 self._ppid = self._proc_basic_info()[proc_info_map['ppid']] | |
| 473 return self._ppid | |
| 474 | |
| 475 @wrap_exceptions | |
| 476 def uids(self): | |
| 477 try: | |
| 478 real, effective, saved, _, _, _ = self._proc_cred() | |
| 479 except AccessDenied: | |
| 480 real = self._proc_basic_info()[proc_info_map['uid']] | |
| 481 effective = self._proc_basic_info()[proc_info_map['euid']] | |
| 482 saved = None | |
| 483 return _common.puids(real, effective, saved) | |
| 484 | |
| 485 @wrap_exceptions | |
| 486 def gids(self): | |
| 487 try: | |
| 488 _, _, _, real, effective, saved = self._proc_cred() | |
| 489 except AccessDenied: | |
| 490 real = self._proc_basic_info()[proc_info_map['gid']] | |
| 491 effective = self._proc_basic_info()[proc_info_map['egid']] | |
| 492 saved = None | |
| 493 return _common.puids(real, effective, saved) | |
| 494 | |
| 495 @wrap_exceptions | |
| 496 def cpu_times(self): | |
| 497 try: | |
| 498 times = cext.proc_cpu_times(self.pid, self._procfs_path) | |
| 499 except OSError as err: | |
| 500 if err.errno == errno.EOVERFLOW and not IS_64_BIT: | |
| 501 # We may get here if we attempt to query a 64bit process | |
| 502 # with a 32bit python. | |
| 503 # Error originates from read() and also tools like "cat" | |
| 504 # fail in the same way (!). | |
| 505 # Since there simply is no way to determine CPU times we | |
| 506 # return 0.0 as a fallback. See: | |
| 507 # https://github.com/giampaolo/psutil/issues/857 | |
| 508 times = (0.0, 0.0, 0.0, 0.0) | |
| 509 else: | |
| 510 raise | |
| 511 return _common.pcputimes(*times) | |
| 512 | |
| 513 @wrap_exceptions | |
| 514 def cpu_num(self): | |
| 515 return cext.proc_cpu_num(self.pid, self._procfs_path) | |
| 516 | |
| 517 @wrap_exceptions | |
| 518 def terminal(self): | |
| 519 procfs_path = self._procfs_path | |
| 520 hit_enoent = False | |
| 521 tty = wrap_exceptions( | |
| 522 self._proc_basic_info()[proc_info_map['ttynr']]) | |
| 523 if tty != cext.PRNODEV: | |
| 524 for x in (0, 1, 2, 255): | |
| 525 try: | |
| 526 return os.readlink( | |
| 527 '%s/%d/path/%d' % (procfs_path, self.pid, x)) | |
| 528 except FileNotFoundError: | |
| 529 hit_enoent = True | |
| 530 continue | |
| 531 if hit_enoent: | |
| 532 self._assert_alive() | |
| 533 | |
| 534 @wrap_exceptions | |
| 535 def cwd(self): | |
| 536 # /proc/PID/path/cwd may not be resolved by readlink() even if | |
| 537 # it exists (ls shows it). If that's the case and the process | |
| 538 # is still alive return None (we can return None also on BSD). | |
| 539 # Reference: http://goo.gl/55XgO | |
| 540 procfs_path = self._procfs_path | |
| 541 try: | |
| 542 return os.readlink("%s/%s/path/cwd" % (procfs_path, self.pid)) | |
| 543 except FileNotFoundError: | |
| 544 os.stat("%s/%s" % (procfs_path, self.pid)) # raise NSP or AD | |
| 545 return None | |
| 546 | |
| 547 @wrap_exceptions | |
| 548 def memory_info(self): | |
| 549 ret = self._proc_basic_info() | |
| 550 rss = ret[proc_info_map['rss']] * 1024 | |
| 551 vms = ret[proc_info_map['vms']] * 1024 | |
| 552 return pmem(rss, vms) | |
| 553 | |
| 554 memory_full_info = memory_info | |
| 555 | |
| 556 @wrap_exceptions | |
| 557 def status(self): | |
| 558 code = self._proc_basic_info()[proc_info_map['status']] | |
| 559 # XXX is '?' legit? (we're not supposed to return it anyway) | |
| 560 return PROC_STATUSES.get(code, '?') | |
| 561 | |
| 562 @wrap_exceptions | |
| 563 def threads(self): | |
| 564 procfs_path = self._procfs_path | |
| 565 ret = [] | |
| 566 tids = os.listdir('%s/%d/lwp' % (procfs_path, self.pid)) | |
| 567 hit_enoent = False | |
| 568 for tid in tids: | |
| 569 tid = int(tid) | |
| 570 try: | |
| 571 utime, stime = cext.query_process_thread( | |
| 572 self.pid, tid, procfs_path) | |
| 573 except EnvironmentError as err: | |
| 574 if err.errno == errno.EOVERFLOW and not IS_64_BIT: | |
| 575 # We may get here if we attempt to query a 64bit process | |
| 576 # with a 32bit python. | |
| 577 # Error originates from read() and also tools like "cat" | |
| 578 # fail in the same way (!). | |
| 579 # Since there simply is no way to determine CPU times we | |
| 580 # return 0.0 as a fallback. See: | |
| 581 # https://github.com/giampaolo/psutil/issues/857 | |
| 582 continue | |
| 583 # ENOENT == thread gone in meantime | |
| 584 if err.errno == errno.ENOENT: | |
| 585 hit_enoent = True | |
| 586 continue | |
| 587 raise | |
| 588 else: | |
| 589 nt = _common.pthread(tid, utime, stime) | |
| 590 ret.append(nt) | |
| 591 if hit_enoent: | |
| 592 self._assert_alive() | |
| 593 return ret | |
| 594 | |
| 595 @wrap_exceptions | |
| 596 def open_files(self): | |
| 597 retlist = [] | |
| 598 hit_enoent = False | |
| 599 procfs_path = self._procfs_path | |
| 600 pathdir = '%s/%d/path' % (procfs_path, self.pid) | |
| 601 for fd in os.listdir('%s/%d/fd' % (procfs_path, self.pid)): | |
| 602 path = os.path.join(pathdir, fd) | |
| 603 if os.path.islink(path): | |
| 604 try: | |
| 605 file = os.readlink(path) | |
| 606 except FileNotFoundError: | |
| 607 hit_enoent = True | |
| 608 continue | |
| 609 else: | |
| 610 if isfile_strict(file): | |
| 611 retlist.append(_common.popenfile(file, int(fd))) | |
| 612 if hit_enoent: | |
| 613 self._assert_alive() | |
| 614 return retlist | |
| 615 | |
| 616 def _get_unix_sockets(self, pid): | |
| 617 """Get UNIX sockets used by process by parsing 'pfiles' output.""" | |
| 618 # TODO: rewrite this in C (...but the damn netstat source code | |
| 619 # does not include this part! Argh!!) | |
| 620 cmd = "pfiles %s" % pid | |
| 621 p = subprocess.Popen(cmd, shell=True, stdout=subprocess.PIPE, | |
| 622 stderr=subprocess.PIPE) | |
| 623 stdout, stderr = p.communicate() | |
| 624 if PY3: | |
| 625 stdout, stderr = [x.decode(sys.stdout.encoding) | |
| 626 for x in (stdout, stderr)] | |
| 627 if p.returncode != 0: | |
| 628 if 'permission denied' in stderr.lower(): | |
| 629 raise AccessDenied(self.pid, self._name) | |
| 630 if 'no such process' in stderr.lower(): | |
| 631 raise NoSuchProcess(self.pid, self._name) | |
| 632 raise RuntimeError("%r command error\n%s" % (cmd, stderr)) | |
| 633 | |
| 634 lines = stdout.split('\n')[2:] | |
| 635 for i, line in enumerate(lines): | |
| 636 line = line.lstrip() | |
| 637 if line.startswith('sockname: AF_UNIX'): | |
| 638 path = line.split(' ', 2)[2] | |
| 639 type = lines[i - 2].strip() | |
| 640 if type == 'SOCK_STREAM': | |
| 641 type = socket.SOCK_STREAM | |
| 642 elif type == 'SOCK_DGRAM': | |
| 643 type = socket.SOCK_DGRAM | |
| 644 else: | |
| 645 type = -1 | |
| 646 yield (-1, socket.AF_UNIX, type, path, "", _common.CONN_NONE) | |
| 647 | |
| 648 @wrap_exceptions | |
| 649 def connections(self, kind='inet'): | |
| 650 ret = net_connections(kind, _pid=self.pid) | |
| 651 # The underlying C implementation retrieves all OS connections | |
| 652 # and filters them by PID. At this point we can't tell whether | |
| 653 # an empty list means there were no connections for process or | |
| 654 # process is no longer active so we force NSP in case the PID | |
| 655 # is no longer there. | |
| 656 if not ret: | |
| 657 # will raise NSP if process is gone | |
| 658 os.stat('%s/%s' % (self._procfs_path, self.pid)) | |
| 659 | |
| 660 # UNIX sockets | |
| 661 if kind in ('all', 'unix'): | |
| 662 ret.extend([_common.pconn(*conn) for conn in | |
| 663 self._get_unix_sockets(self.pid)]) | |
| 664 return ret | |
| 665 | |
| 666 nt_mmap_grouped = namedtuple('mmap', 'path rss anon locked') | |
| 667 nt_mmap_ext = namedtuple('mmap', 'addr perms path rss anon locked') | |
| 668 | |
| 669 @wrap_exceptions | |
| 670 def memory_maps(self): | |
| 671 def toaddr(start, end): | |
| 672 return '%s-%s' % (hex(start)[2:].strip('L'), | |
| 673 hex(end)[2:].strip('L')) | |
| 674 | |
| 675 procfs_path = self._procfs_path | |
| 676 retlist = [] | |
| 677 try: | |
| 678 rawlist = cext.proc_memory_maps(self.pid, procfs_path) | |
| 679 except OSError as err: | |
| 680 if err.errno == errno.EOVERFLOW and not IS_64_BIT: | |
| 681 # We may get here if we attempt to query a 64bit process | |
| 682 # with a 32bit python. | |
| 683 # Error originates from read() and also tools like "cat" | |
| 684 # fail in the same way (!). | |
| 685 # Since there simply is no way to determine CPU times we | |
| 686 # return 0.0 as a fallback. See: | |
| 687 # https://github.com/giampaolo/psutil/issues/857 | |
| 688 return [] | |
| 689 else: | |
| 690 raise | |
| 691 hit_enoent = False | |
| 692 for item in rawlist: | |
| 693 addr, addrsize, perm, name, rss, anon, locked = item | |
| 694 addr = toaddr(addr, addrsize) | |
| 695 if not name.startswith('['): | |
| 696 try: | |
| 697 name = os.readlink( | |
| 698 '%s/%s/path/%s' % (procfs_path, self.pid, name)) | |
| 699 except OSError as err: | |
| 700 if err.errno == errno.ENOENT: | |
| 701 # sometimes the link may not be resolved by | |
| 702 # readlink() even if it exists (ls shows it). | |
| 703 # If that's the case we just return the | |
| 704 # unresolved link path. | |
| 705 # This seems an incosistency with /proc similar | |
| 706 # to: http://goo.gl/55XgO | |
| 707 name = '%s/%s/path/%s' % (procfs_path, self.pid, name) | |
| 708 hit_enoent = True | |
| 709 else: | |
| 710 raise | |
| 711 retlist.append((addr, perm, name, rss, anon, locked)) | |
| 712 if hit_enoent: | |
| 713 self._assert_alive() | |
| 714 return retlist | |
| 715 | |
| 716 @wrap_exceptions | |
| 717 def num_fds(self): | |
| 718 return len(os.listdir("%s/%s/fd" % (self._procfs_path, self.pid))) | |
| 719 | |
| 720 @wrap_exceptions | |
| 721 def num_ctx_switches(self): | |
| 722 return _common.pctxsw( | |
| 723 *cext.proc_num_ctx_switches(self.pid, self._procfs_path)) | |
| 724 | |
| 725 @wrap_exceptions | |
| 726 def wait(self, timeout=None): | |
| 727 return _psposix.wait_pid(self.pid, timeout, self._name) |
