Open a cache of riches with lsof
With Great Power
Now imagine a scenario in which you've found a file in /tmp
and have no idea where this potentially dangerous file has come from. To find all the processes using this file, you could run the lsof
command in Listing 3.
Listing 3
Finding Processes
As requested, lsof quickly reports the results, as seen in Figure 9.
Around in circles you go: By looking up what lsof knows about PID 14332:
# lsof -p 14332
you reveal a mountain of information (too much to display) relating to the word processor LibreOffice. Therefore, it's most likely not a file to be worried about but instead a temporary copy of a document being written.
Open Up and Lock Down
Now I want to look for open files. I'm running my desktop off a loop disk [1], and I can query all the open files on that (filesystem) device with:
# lsof /dev/loop0
The resulting output scrolls up my screen for a full two seconds with screeds of information. I can also request to list only Unix sockets with:
# lsof -U
Although I've already looked at a specific network port, what about querying all open network ports? Try running this simple command:
# lsof -i
With that entered, my system reports some useful security issues (ports that can be closed down because they're not needed or in use at all), as well as full hostnames, not just IP addresses (listed using DNS so I can immediately tell what my system is connecting to as I type), and which user, which PID, and which commands are responsible for spawning the process to open that port. Figure 10 shows this concisely. You can also see the port that you're connecting to if you look closely. For example, the first ESTABLISHED connection shown (Figure 10, right-hand side near the bottom) is using the remote port 5228.
If that doesn't meet your needs, you can switch off DNS lookups with -n
and just show port numbers without the names with -P
:
# lsof -n -i -P
Checking everything, in the sense of all ports using any protocol, that a remote host is doing is one of my favorite lsof commands:
# lsof -i @another-chris-server.tld
Additional features just keep coming; you can mix up one host with multiple ports or, in this case, a range of ports:
# lsof -i @another-chris-server.tld::5228-6502
Also, you can gain visibility of which files use which file descriptors for every process,
# lsof -d 111,34,67
or simply comma-separate a list of descriptors for a more fine-grained output.
Belly of the Beast
A little more background might increase your understanding of how lsof achieves its powerful output. According to the man page, the magical lsof procures its power from four main files.
It draws information from both the kernel virtual memory device, /dev/kmem
(which isn't present on my desktop, although it appears in linux-headers
) and the physical memory device, /dev/mem
. According to the mem
man page, "The file kmem is the same as mem, except that the kernel virtual memory rather than physical memory is accessed."
The command lsof also references the system swap file, conveniently found at /dev/swap
, and a cache generated partly from a gethostname
lookup.
In other words, it's a busy little utility, and whereas other tools can claim to harvest much of the information held within these ever-changing system files there's certainly an argument that lsof pulls it altogether the most gracefully.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.
-
Fedora 41 Beta Available with Some Interesting Additions
If you're a Fedora fan, you'll be excited to hear the beta version of the latest release is now available for testing and includes plenty of updates.
-
AlmaLinux Unveils New Hardware Certification Process
The AlmaLinux Hardware Certification Program run by the Certification Special Interest Group (SIG) aims to ensure seamless compatibility between AlmaLinux and a wide range of hardware configurations.
-
Wind River Introduces eLxr Pro Linux Solution
eLxr Pro offers an end-to-end Linux solution backed by expert commercial support.
-
Juno Tab 3 Launches with Ubuntu 24.04
Anyone looking for a full-blown Linux tablet need look no further. Juno has released the Tab 3.