Sponsored Content
Top Forums Shell Programming and Scripting How to find the corresponding command for a existing PID? Post 302947272 by Skrynesaver on Wednesday 17th of June 2015 03:01:46 AM
Old 06-17-2015
PIDs get recycled, they point to an entry in the process table rather than a specific event.

How did you get the PID of the completed process?
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

How to find a hanging pid

I am trying to write a simple shell script to find a hanging pid and kill it.Any idea how to find a hanging pid?? (6 Replies)
Discussion started by: Ravi Kanth
6 Replies

2. UNIX for Advanced & Expert Users

Find PID's

I have a script which spawns multiple compilations. Sometimes due to some errors i have to terminate that script. Now comes the main part, how do I do that? I can see the individual compilations via ps -ef | grep compiler and also kill them via kill -9 pid But the scirpt continues: ... (2 Replies)
Discussion started by: vibhor_agarwali
2 Replies

3. HP-UX

To find pid from port number

Hi, I am working on HP-UX Release 11i. I want to find the process id (PID) of the process running on a particular port. lsof command fuser does not work on this system. Please suggest some alternative. Thanks (6 Replies)
Discussion started by: gmat
6 Replies

4. Shell Programming and Scripting

how to find only PID value

When I run ps -aef | grep aaa.exe it gives out put user 5091 5518 0 10:13:25 pts/1 0:00 grep aaa.exe user 4647 2479 0 09:26:31 ? 0:25 /kk/zzz/user/xxx/bin/aaa.exe user1 1111 2222 0 08:26:31 ? 0:25 /kk/zzz/user1/xxx/bin/aaa.exe I need Only PID value ie... (5 Replies)
Discussion started by: madhusmita
5 Replies

5. Shell Programming and Scripting

KSH 88 - Can I find the PID for an IP connection?

Hi, If I use this command netstat | grep "1268" it shows me all IP addresses connected via port 1268, which is half of what I want. I would like to be able to then map these against a PID on the system, and also thereby get the userid. I have done a couple of days google bashing but... (3 Replies)
Discussion started by: gcraill
3 Replies

6. Shell Programming and Scripting

Find PID for a process

I want to kill a process run by a user of another group. How do I do that..? (3 Replies)
Discussion started by: Haimanti
3 Replies

7. UNIX for Dummies Questions & Answers

Find PID for a port

Hi, I need to find the PID for a given port on the below system. HP-UX mymachine B.11.31 U ia64 3223107173 unlimited-user license How can I ? (4 Replies)
Discussion started by: mohtashims
4 Replies

8. HP-UX

Find port for Pid

Hi, Is this the most appropriate way of finding the listen port number given the pid is "16659" ? lsof -Pan -i tcp -i udp | grep 16659 | grep -i "listen"If so, how can I extract "7001" and assign it to a variable say myport=7001 from the below output which happens to be actual port number? ... (1 Reply)
Discussion started by: mohtashims
1 Replies

9. UNIX for Advanced & Expert Users

Find PID using a Port?

Hi, I do not have root user credentials nor do I have the functional id of the process that uses port 80. How can I find the pid of the process using the port number 80 ? Operating System: Linux (6 Replies)
Discussion started by: mohtashims
6 Replies
SECON(1)								NSA								  SECON(1)

NAME
secon - See an SELinux context, from a file, program or user input. SYNOPSIS
secon [-hVurtscmPRfLp] [CONTEXT] [--file] FILE [--link] FILE [--pid] PID DESCRIPTION
See a part of a context. The context is taken from a file, pid, user input or the context in which secon is originally executed. -V, --version shows the current version of secon -h, --help shows the usage information for secon -P, --prompt outputs data in a format suitable for a prompt -u, --user show the user of the security context -r, --role show the role of the security context -t, --type show the type of the security context -s, --sensitivity show the sensitivity level of the security context -c, --clearance show the clearance level of the security context -m, --mls-range show the sensitivity level and clearance, as a range, of the security context -R, --raw outputs the sensitivity level and clearance in an untranslated format. -f, --file gets the context from the specified file FILE -L, --link gets the context from the specified file FILE (doesn't follow symlinks) -p, --pid gets the context from the specified process PID --pid-exec gets the exec context from the specified process PID --pid-fs gets the fscreate context from the specified process PID --current, --self gets the context from the current process --current-exec, --self-exec gets the exec context from the current process --current-fs, --self-fs gets the fscreate context from the current process --parent gets the context from the parent of the current process --parent-exec gets the exec context from the parent of the current process --parent-fs gets the fscreate context from the parent of the current process Additional argument CONTEXT may be provided and will be used if no options have been specified to make secon get it's context from another source. If that argument is - then the context will be read from stdin. If there is no arugment, secon will try reading a context from stdin, if that is not a tty, otherwise secon will act as though --self had been passed. If none of --user, --role, --type, --level or --mls-range is passed. Then all of them will be output. SEE ALSO
chcon (1) AUTHORS
James Antill (james.antill@redhat.com) Security Enhanced Linux April 2006 SECON(1)
All times are GMT -4. The time now is 08:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy