免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 4105 | 回复: 3
打印 上一主题 下一主题

[系统管理] 怎样知道某个php-cgi进程具体在执行哪个文件? [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2012-11-28 16:57 |只看该作者 |倒序浏览
debian系统最近负载比较高,用top命令看,有一个php-cgi进程(用spawn-fcgi管理的)运行时间很长(600:00:00),占用CPU70%以上,请问怎样才能知道这个进程具体在执行哪个php文件?

谢谢

论坛徽章:
0
2 [报告]
发表于 2012-11-28 16:59 |只看该作者
strace -p PID

论坛徽章:
0
3 [报告]
发表于 2012-11-28 16:59 |只看该作者
ll /proc/PID/fd

strace -p PID

lsof -p PID

论坛徽章:
0
4 [报告]
发表于 2012-11-28 21:09 |只看该作者
用strace -p得到以下结果,请问这些内容是什么意思?难道php-cgi被注入了?
stat64("/sys/class/mem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/random/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/urandom/subsystem/zero/subsystem/random/subsystem/full/dev", {st_mode=S_IFREG|0444, st_size=4096, ...}) = 0
stat64("/sys/class/mem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/random/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/urandom/subsystem/zero/subsystem/random/subsystem/full/subsystem", 0xbfaad034) = -1 ELOOP (Too many levels of symbolic links)
stat64("/sys/class/mem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/random/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/urandom/subsystem/zero/subsystem/random/subsystem/full/uevent", {st_mode=S_IFREG|0200, st_size=4096, ...}) = 0
stat64("/sys/class/mem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/random/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/urandom/subsystem/zero/subsystem/random/subsystem/null", {st_mode=S_IFDIR|0755, st_size=0, ...}) = 0
open("/sys/class/mem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/random/subsystem/full/subsystem/full/subsystem/full/subsystem/null/subsystem/urandom/subsystem/zero/subsystem/random/subsystem/null", O_RDONLY|O_NONBLOCK|O_LARGEFILE|O_DIRECTORY|0x80000) = 4
getdents64(4, /* 5 entries */, 3276   = 136
socket_subcall(0x4, 0xa72dc7b, 0xbfaadb80, 0, 0xb79fbff4, 0xbfaada08, 0xffffffda, 0x7b) = 0
getdents64(4, /* 0 entries */, 3276   = 0
close(4)                                = 0
……
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP