Lsof Readme and Quick Start for Lsof(1,2,3)

来源:互联网 发布:行知中学老师 编辑:程序博客网 时间:2024/05/20 05:05

======================================1======================================



                Information About This Lsof Distribution




What You Have
=============


If you got this far without being confused, then you are probably
familiar with the construction of the lsof distribution or you have
read RELEASE.SUMMARY_4.76.  If either is the case, please skip to
the Inventory section.  If you haven't read RELEASE.SUMMARY_4.76,
I suggest you do it now, because it explains how the lsof distribution
is constructed and other useful things about lsof, including a
summary of changes for the past few lsof revisions.


Even though you may have thought you were getting lsof.tar.bz2,
lsof.tar.gz or lsof.tar.Z with ftp, you really got lsof_4.76.tar.bz2,
lsof_4.76.tar.gz or lsof_4.76.tar.Z.  That's because the triplet of
lsof.tar.* files are symbolic links to their longer-named counterparts.


The bzip2'd, gzip'd or compressed tar files with lsof_, followed by a
number, are wrapper archives, designed to package the lsof source
archive, this file, other documentation files, and a GPG authentication
certificate together.


The number, 4.76, is the lsof revision number.  When you bunzip2'd,
gunzip'd or uncompressed lsof_4.76.tar.* and used tar to unpack
lsof_4.76.tar, you got: 00.README.FIRST_4.76, describing the contents
of lsof_4.76; README.lsof_4.76; lsof_4.76_src.tar; and
lsof_4.76_src.tar.sig.  All are identified with the revision number.
You're reading README.lsof_4.76.  lsof_4.76_src.tar.sig is a GPG
certificate that authenticates the lsof source archive,
lsof_4.76_src.tar.


After you read the Inventory and Security sections, and hopefully
after you check the GPG certificate, unpack the lsof_4.76_src.tar
source archive and you will get a sub-directory, named lsof_4.76_src,
that contains the lsof 4.76 source distribution.




Inventory
=========


Once you have unpacked lsof_4.76_src.tar.tar, you can check
lsof_4.76_src for completeness by changing to that sub-directory
and running the Inventory script.  The lsof_4.76_src/Configure
script runs the Inventory script, too.  The Configure script also
calls a customization script, called Customize.  You can direct
Configure to avoid calling Inventory and Customize with the -n
option.


See the Distribution Contents section of the 00DIST file and The
Inventory Script section of the 00README file for more information
on the contents of the lsof distribution, and the Configure,
Customize and Inventory scripts.  The 00DIST and 00README files
will be found in the lsof_4.76_src sub-directory you just created.




Security
========


The md5 checksum for lsof_4.76_src.tar is:


  MD5 (lsof_4.76_src.tar) = 69a115ae1b85b369fe565dd353c04652


The md5 checksum tool may be obtained from:


  ftp://ftp.cerias.purdue.edu/pub/tools/unix/crypto/md5


The old-style sum(1) checksum for lsof_4.76_src.tar (Please read
the next paragraph if you don't get this value.) is:


  07171   7790 lsof_4.76/lsof_4.76_src.tar


If your dialect's sum(1) program defaults to the new style algorithm
(e.g., Solaris), you may have to use its -r option (or use the
Solaris /usr/ucb/sum).  If your Unix dialect doesn't have a sum(1)
program (e.g., FreeBSD, or NetBSD), use its cksum(1) program with
the -o1 option to get an old-style checksum.  You may also need to
ignore the block count, depending on the block size used on your
your system (i.e., 512 or 1,024).  The sum(1) that produced the
above checksum considers block size to be 512; in contrast the BSD
cksum(1) programs' -o1 option considers block size to be 1,024.


lsof_4.76_src.tar.sig is a GPG certificate file, using my public
key.  My key may be available on some public key servers under the
names:


    Victor A. Abell <abe@cc.purdue.edu>
 or
    Victor A. Abell <abe@purdue.edu>


You will also find it at:


  ftp://lsof.itap.purdue.edu/pub/tools/unix/lsof/Victor_A_Abell.gpg


Get my key and install it in your public key ring.


Once my key is installed, use this command to check the certificate
of lsof_4.76_src.tar:


    gpg --verify lsof_4.76_src.tar.sig lsof_4.76_src.tar


If the certificate check isn't good, lsof_4.76_src.tar is suspect.
Report the problem to me via e-mail at <abe@purdue.edu>.


If you don't have GPG, you can compare the md5 checksum of
lsof_4.76_src.tar to the value listed in this file.  However, that
is a less reliable authentication method, since it can't detect
changes to both lsof_4.76_src.tar and the md5 checksum value listed
in this tile.


Other Security
==============


Signature information for the distribution file that contains
this file may be found in the CHECKSUMS file that is located
where the distribution file was found.




Victor A. Abell <abe@purdue.edu>
Tue Aug 30 14:50:23 EST 2005

======================================2======================================

Now that you have the lsof distribution, I suggest:



*  If you're unfamiliar with lsof, read 00README for information on
   Configuring and building lsof, 00QUICKSTART for tips on using lsof.


   If you're too impatient for that, do this:


      $ ./Configure <put your UNIX dialect's abbreviation here>
        (Do the inventory step, as you prefer.)
        (Do the customization step, as you prefer.)
      $ make
      $ ./lsof -h


   To get a list of UNIX dialect abbreviations:


      $ Configure -h


   Please don't be impatient -- read the documentation first.


*  Read the current distribution's details in 00DIST.


*  If you want technical details, read 00DCACHE and 00PORTING.


*  If you want to cross-configure, read 00XCONFIG.


*  Use the test suite, described in 00TEST, by:


$ cd tests
$ make


   and possibly:


$ make opt


*  If you're having trouble, read 00FAQ.  (Please read 00FAQ before
   you send a bug report.)


*  Lsof contributors may find their names in 00CREDITS.  (Thanks, again.)


*  Read the lsof.man page file.  Its nroff source is in lsof.8.


*  Consider subscribing to the lsof-l mailing list -- read 00LSOF-L
   for details.




Vic Abell <abe@purdue.edu>
April 19, 2002
======================================3======================================
A Quick Start for Lsof


1.  Introduction
================


  Agreed, the lsof man page is dense and lsof has a plethora of
  options.  There are examples, but the manual page format buries
  them at the end.  How does one get started with lsof?


  This file is an attempt to answer that question.  It plunges
  immediately into examples of lsof use to solve problems that
  involve looking at the open files of Unix processes.




   Contents


   1.  Introduction
   2.  Finding Uses of a Specific Open File
   3.  Finding Open Files Filling a File System
a.  Finding an Unlinked Open File
   4.  Finding Processes Blocking Umount
   5.  Finding Listening Sockets
   6.  Finding a Particular Network Connection
   7.  Identifying a Netstat Connection
   8.  Finding Files Open to a Named Command
   9.  Deciphering the Remote Login Trail
a.  The Fundamentals
b.  The idrlogin.perl[5] Scripts
   10. Watching an Ftp or Rcp Transfer
   11. Listing Open NFS Files
   12. Listing Files Open by a Specific Login
a.  Ignoring a Specific Login
   13. Listing Files Open to a Specific Process Group
   14. When Lsof Seems to Hang
a.  Kernel lstat(), readlink(), and stat() Blockages
b.  Problems with /dev or /devices
c.  Host and Service Name Lookup Hangs
d.  UID to Login Name Conversion Delays
   15. Output for Other Programs
   16. The Lsof Exit Code and Shell Scripts


Options


   A.  Selection Options
   B.  Output Options
   C.  Precautionary Options
   D.  Miscellaneous Lsof Options




2.  Finding Uses of a Specific Open File
========================================


  Often you're interested in knowing who is using a specific file.
  You know the path to it and you want lsof to tell you the processes
  that have open references to it.


  Simple -- execute lsof and give it the path name of the file of
  interest -- e.g.,


  $ lsof /etc/passwd


  Caveat: this only works if lsof has permission to get the status
  (via stat(2)) of the file at the named path.  Unless the lsof
  process has enough authority  -- e.g., it is being run with a
  real User ID (UID) of root -- this AIX example won't work:


  Further caveat: this use of lsof will fail if the stat(2) kernel
  syscall returns different file parameters -- particularly device
  and inode numbers -- than lsof finds in kernel node structures.
  This condition is rare and is usually documented in the 00FAQ
  file of this lsof distribution.


  $ lsof /etc/security/passwd
  lsof: status error on /etc/security/passwd: Permission denied




3.  Finding Open Files Filling a File System
============================================


  Oh! Oh!  /tmp is filling and ls doesn't show that any large files
  are being created.  Can lsof help?


  Maybe.  If there's a process that is writing to a file that has
  been unlinked, lsof may be able to discover the process for you.
  You ask it to list all open files on the file system where /tmp
  is located.


  Sometimes /tmp is a file system by itself.  In that case,


  $ lsof /tmp


  is the appropriate command.  If, however, /tmp is part of another
  file system, typically /, then you may have to ask lsof to list
  all files open on the containing file system and locate the
  offending file and its process by inspection -- e.g.,


    $ lsof / | more
  or
    $ lsof / | grep ...


  Caveat: there must be a file open to a for the lsof search to
  succeed.  Sometimes the kernel may cause a file reference to
  persist, even where there's no file open to a process.  (Can you
  say kernel bug?  Maybe.)  In any event, lsof won't be able to
  help in this case.


  a.  Finding an Unlinked Open File
  =================================


  A pesky variant of a file that is filling a file system is an
  unlinked file to which some process is still writing.  When a
  process opens a file and then unlinks it, the file's resources
  remain in use by the process, but the file's directory entries
  are removed.  Hence, even when you know the directory where the
  file once resided, you can't detect it with ls.


  This can be an administrative problem when the unlinked file is
  large, and the process that holds it open continues to write to
  it.  Only when the process closes the file will its resources,
  particularly disk space, be released.


  Lsof can help you find unlinked files on local disks.  It has an
  option, +L, that will list the link counts of open files.  That
  helps because an unlinked file on a local disk has a zero link
  count.  Note: this is NOT true for NFS files, accessed from a
  remote server.


  You could use the option to list all files and look for a zero
  link count in the NLINK column -- e.g.,


    $lsof +L
    COMMAND   PID USER   FD  TYPE DEVICE SIZE/OFF NLINK  NODE NAME
    ...
    less    25366  abe  txt  VREG    6,0    40960     1 76319 /usr/...
    ...
  > less    25366  abe    3r VREG    6,0    17360     0 98768 / (/dev/sd0a)


  Better yet, you can specify an upper bound to the +L option, and
  lsof will select only files that have a link count less than the
  upper bound.  For example:


    $ lsof +L1
    COMMAND   PID USER   FD   TYPE DEVICE SIZE/OFF NLINK  NODE NAME
    less    25366  abe    3r  VREG    6,0    17360     0 98768 / (/dev/sd0a)


  You can use lsof's -a (AND) option to narrow the link count search
  to a particular file system.  For example, to look for zero link
  counts on the /home file system, use:


    $ lsof -a +L1 /home


  CAUTION: lsof can't always report link counts for all file types
  -- e.g., it may not report them for FIFOs, pipes, or sockets.
  Remember also that link counts for NFS files on an NFS client
  host don't behave as do link counts for files on local disks.




4.  Finding Processes Blocking Umount
=====================================


  When you need to unmount a file system with the umount command,
  you may find the operation blocked by a process that has a file
  open on the file systems.  Lsof may be able to help you find the
  process.  In response to:


  $ lsof <file_system_name>


  Lsof will display all open files on the named file system.  It
  will also set its exit code zero when it finds some open files
  and non-zero when it doesn't, making this type of lsof call
  useful in shell scripts.  (See section 16.)


  Consult the output of the df command for file system names.


  See the caveat in the preceding section about file references
  that persist in the kernel without open file traces.  That
  situation may hamper lsof's ability to help with umount, too.




5.  Finding Listening Sockets
=============================


  Sooner or later you may wonder if someone has installed a network
  server that you don't know about.  Lsof can list for you all the
  network socket files open on your machine with:


    $ lsof -i


  The -i option without further qualification lists all open Internet
  socket files.  You can add network names or addresses, protocol
  names, and service names or port numbers to the -i option to
  refine the search.  (See the next section.)




6.  Finding a Particular Network Connection
===========================================


  When you know the source or destination of a network connection
  whose open files and process you'd like to identify, the -i option
  may help.


  If, for example, you want to know what process has a connection
  open to or from the Internet host named aaa.bbb.ccc, you can ask
  lsof to search for it with:


  $ lsof -i@aaa.bbb.ccc


  If you're interested in a particular protocol -- TCP or UDP --
  and a specific port number or service name, you can add those
  discriminators to the -i information:


  $ lsof -iTCP@aaa.bbb.ccc:ftp-data


  If you're interested in a particular IP version -- IPv4 or IPv6
  -- and your UNIX dialect supports both (It does if "IPv[46]"
  appears in the lsof -h output.), you can add the '4' or '6'
  selector immediately after -i:


  $ lsof -i4
  $ lsof -i6




7.  Identifying a Netstat Connection
====================================


  How do I identify the process that has a network connection
  described in netstat output?  For example, if netstat says:


  Proto Recv-Q Send-Q  Local Address          Foreign Address        (state)
  tcp        0      0  vic.1023               ipscgate.login         ESTABLISHED


  What process is connected to service name ``login'' on ipscgate?


  Use lsof's -i option:


  $lsof -iTCP@ipscgate:login
  COMMAND     PID     USER   FD   TYPE     DEVICE   SIZE/OFF  INODE NAME
  rlogin    25023      abe    3u  inet 0x10144168      0t184    TCP lsof.itap.purdue.edu:1023->ipscgate.cc.purdue.edu:login
  ...


  There's another way.  Notice the 0x10144168 in the DEVICE column
  of the lsof output?  That's the protocol control block (PCB)
  address.  Many netstat applications will display it when given
  the -A option:


  $ netstat -A
  PCB      Proto Recv-Q Send-Q  Local Address      Foreign Address    (state)
  10144168 tcp        0      0  vic.1023           ipscgate.login     ESTABLISHED
  ...


  Using the PCB address, lsof, and grep, you can find the process this
  way, too:


  $ lsof -i | grep 10144168
  rlogin    25023      abe    3u  inet 0x10144168      0t184    TCP lsof.itap.purdue.edu:1023->ipscgate.cc.purdue.edu:login
  ...




8.  Finding Files Open to a Named Command
=========================================


  When you want to look at the files open to a particular command,
  you can look up the PID of the process running the command and
  use lsof's -p option to specify it.


  $ lsof -p <PID>


  However, there's a quicker way, using lsof's -c option, provided
  you don't mind seeing output for every process running the named
  command.


  $ lsof -c <first_characters_of_command_name_that_interest_you>


  The lsof -c option is useful when you want to see how many instances
  of a given command are executing and what their open files are.
  One useful example is for the sendmail command.


  $ lsof -c sendmail




9.  Deciphering the Remote Login Trail
======================================


  If the network connection you're interested in tracing has been
  initiated externally and is connected to an rlogind, sshd, or
  telnetd process, asking lsof to identify that process might not
  give a wholly satisfying answer.  The report may be that the
  connection exists, but to a process owned by root.


  a.  The Fundamentals
  ====================


    How do you get from there to the login name really using the
    connection?  You have to know a little about how real and pseudo
    ttys are paired in your system, and then use several lsof probes
    to identify the login.


    This example comes from a Solaris 2.4 system, named klaatu.cc.
    I've logged on to it via rlogin from lsof.itap.  The first lsof
    probe,


    $ lsof -i@lsof.itap


    yields (among other things):


    COMMAND     PID     USER   FD   TYPE     DEVICE   SIZE/OFF  INODE NAME
    in.rlogin  7362     root    0u  inet 0xfc0193b0      0t242    TCP klaatu.cc.purdue.edu:login->lsof.itap.purdue.edu:1023
    ...


    This confirms that a connection exists.  A second lsof probe
    shows:


    $ lsof -p7362
    COMMAND     PID     USER   FD   TYPE     DEVICE   SIZE/OFF  INODE NAME
    ...
    in.rlogin  7362     root    0u  inet 0xfc0193b0      0t242    TCP klaatu.cc.purdue.edu:login->lsof.itap.purdue.edu:1023
    ...
    in.rlogin  7362     root    3u  VCHR    23,   0       0t66  52928 /devices/pseudo/clone@0:ptmx->pckt->ptm


    7362 is the Process ID (PID) of the in.rlogin process, discovered
    in the first lsof probe.  (I've abbreviated the output to simplify
    the example.)  Now comes a need to understand Solaris pseudo-ttys.
    The key indicator is in the DEVICE column for FD 3, the major/minor
    device number of 23,0.  This translates to /dev/pts/0, so a third
    lsof probe,


    $ lsof /dev/pts/0
    COMMAND     PID     USER   FD   TYPE     DEVICE   SIZE/OFF  INODE NAME
    ksh        7364      abe    0u  VCHR    24,   0     0t2410  53410 /dev/pts/../../devices/pseudo/pts@0:0


    shows in part that login abe has a ksh process on /dev/pts/0.
    (The NAME that lsof shows is not /dev/pts/0 but the full expansion
    of the symbolic link that lsof finds at /dev/pts/0.)


    Here's a second example, done on an HP-UX 9.01 host named ghg.ecn.
    Again, I've logged on to it from lsof.itap, so I start with:


    $ lsof -i@lsof.itap
    COMMAND     PID     USER   FD   TYPE       DEVICE   SIZE/OFF  INODE NAME
    rlogind   10214     root    0u  inet   0x041d5f00     0t1536    TCP ghg.ecn.purdue.edu:login->lsof.itap.purdue.edu:1023
    ...


    Then,


    $ lsof -p10214
    COMMAND     PID     USER   FD   TYPE       DEVICE   SIZE/OFF  INODE NAME
    ...
    rlogind   10214     root    0u  inet   0x041d5f00     0t2005    TCP ghg.ecn.purdue.edu:login->lsof.itap.purdue.edu:1023
    ...
    rlogind   10214     root    3u  VCHR  16,0x000030     0t2037  24642 /dev/ptym/ptys0


    Here the key is the NAME /dev/ptym/ptys0.  In HP-UX 9.01 tty and
    pseudo tty devices are paired with the names like /dev/ptym/ptys0
    and /dev/pty/ttys0, so the following lsof probe is the final step.


    $ lsof /dev/pty/ttys0
    COMMAND     PID     USER   FD   TYPE       DEVICE   SIZE/OFF  INODE NAME
    ksh       10215      abe    0u  VCHR  17,0x000030     0t3399  22607 /dev/pty/ttys0
    ...


    Here's a third example for an AIX 4.1.4 system.  I've used telnet
    to connect to it from lsof.itap.purdue.edu.  I start with:


    $ lsof -i@lsof.itap.purdue.edu
    COMMAND     PID     USER   FD   TYPE     DEVICE   SIZE/OFF      INODE NAME
    ...
    telnetd   15616     root    0u  inet 0x05a93400     0t5156        TCP cloud.cc.purdue.edu:telnet->lsof.itap.purdue.edu:3369


    Then I look at the telnetd process:


    $ lsof -p15616
    COMMAND     PID     USER   FD   TYPE     DEVICE   SIZE/OFF      INODE NAME
    ...
    telnetd   15616     root    0u  inet 0x05a93400     0t5641        TCP cloud.cc.purdue.edu:telnet->lsof.itap.purdue.edu:3369
    ...
    telnetd   15616     root    3u  VCHR    25,   0     0t5493        103 /dev/ptc/0


    Here the key is /dev/ptc/0.  In AIX it's paired with /dev/pts/0.
    The last probe for that shows:


    $ lsof /dev/pts/0
    COMMAND     PID     USER   FD   TYPE     DEVICE   SIZE/OFF      INODE NAME
    ...
    ksh       16642      abe    0u  VCHR    26,   0     0t6461        360 /dev/pts/0


  b.  The idrlogin.perl[5] Scripts
  ================================


    There's another, perhaps easier way, to go about the job of
    tracing a network connection.  The lsof distribution contains
    two Perl scripts, idrlogin.perl (Perl 4) and idrlogin.perl5
    (Perl 5), that use lsof field output to display values for
    shells that are parented by rlogind, sshd, or telnetd, or
    connected directly to TCP sockets.  The lsof test suite contains
    a C library that can be adapted for use with C programs that
    need to call lsof and process its field output.


    The two Perl scripts use the lsof -R option; it causes the
    paRent process ID (PPID) to be listed in the lsof output.  The
    scripts identify all shell processes -- e.g., ones whose command
    names end in ``sh'' -- and determine if: 1) the ultimate ancestor
    process before a PID greater than 2 (e.g., init's PID is 1) is
    rlogind, sshd, or telnetd; or 2) the shell process has open
    TCP socket files.


    Here's an example of output from idlogin.perl on a Solaris 2.4
    system:


    centurion: 1 = cd src/lsof4/scripts
    centurion: 2 = ./idrlogin.perl
    Login    Shell       PID Via           PID TTY        From
    oboyle   ksh       12640 in.telnetd  12638 pts/5      opal.cc.purdue.edu
    icdtest  ksh       15158 in.rlogind  15155 pts/6      localhost
    sh       csh       18207 in.rlogind  18205 pts/1      babylon5.cc.purdue.edu
    root     csh       18242 in.rlogind  18205 pts/1      babylon5.cc.purdue.edu
    trouble  ksh       19208 in.rlogind  18205 pts/1      babylon5.cc.purdue.edu
    abe      ksh       21334 in.rlogind  21332 pts/2      lsof.itap.purdue.edu


    The scripts assume that its parent directory contains an
    executable lsof.  If you decide to use one of the scripts, you
    may want to customize it for your local lsof and perl paths.


    Note that processes executing as remote shells are also
    identified.


    Here's another example from a UnixWare 7.1.0 system.


    tweeker: 1 = cd src/lsof4/scripts
    tweeker: 9 = ./idrlogin.perl
    Login    Shell       PID Via           PID TTY        From
    abe      ksh        9438 in.telnetd   9436 pts/3      lsof.itap.purdue.edu




10. Watching an Ftp or Rcp Transfer
===================================


  The nature of the Internet being one of unpredictable performance
  at times, occasionally you want to know if a file transfer, being
  done by ftp or rcp, is making any progress.


  To use lsof for watching a file transfer, you need to know the
  PID of the file transfer process.  You can use ps to find that.
  Then use lsof,


  $ lsof -p<PID>


  to examine the files open to the transfer process.  Usually the
  ftp files or interest are at file descriptors 9 and 10 or 10 and
  11; for rcp, 3 and 4.  They describe the network socket file and
  the local data file.


  If you want to watch only those file descriptors as the file
  transfer progresses, try these lsof forms (for ftp in the example):


    $ lsof -p<PID> -ad9,10 -r
  or
    $ lsof -p<PID> -ad10,11 -r


  Some options need explaining:


    -p<PID> specifies that lsof is to restrict its attention
to the process whose ID is <PID>.  You can specify
a set of PIDs by separating them with commas.


   $ lsof -p 1234,5678,9012


    -a specifies that lsof is to AND its tests together.
The two tests that are specified are tests on the
PID and tests on file descriptions (``d9,10'').


    d9,10 specifies that lsof is to test only file descriptors
9 and 10.  Note that the `-' is absent, since ``-a''
is a unary option and can be followed immediately
by another lsof option.


    -r          tells lsof to list the requested open file information,
sleep for a default 15 seconds, then list the open
file information again.  You can specify a different
time (in seconds) after -r and override the default.
Lsof issues a short line of equal signs between
each set of output to distinguish it.


  For an rcp transfer, the above example becomes:


  $ lsof -p<PID> -ad3,4 -r




11. Listing Open NFS Files
==========================


  Lsof will list all files open on remote file systems, supported
  by an NFS server.  Just use:


  $ lsof -N


  Note, however, that when run on an NFS server, lsof will not list
  files open to the server from one of its clients.  That's because
  lsof can only examine the processes running on the machine where
  it is called -- i.e., on the NFS server.


  If you run lsof on the NFS client, using the -N option, it will
  list files open by processes on the client that are on remote
  NFS file systems.




12. Listing Files Open by a Specific Login
==========================================


  If you're interested in knowing what files the processes owned
  by a particular login name have open, lsof can help.


    $ lsof -u<login>
  or
    $ lsof -u<User ID number>


  You can specify either the login name or the UID associated with
  it.  You can specify multiple login names and UID numbers, mixed
  together, by separating them with commas.


  $ lsof -u548,abe


  On the subject of login names and UIDs, it's worth noting that
  lsof can be told to report either.  By default it reports login
  names; the -l option switches reporting to UIDs.  You might want
  to use -l if login name lookup is slow for some reason.


  a.  Ignoring a Specific Login
  =============================


    The -u option can also be used to direct lsof to ignore a
    specific login name or UID, or a list of them.  Simply prefix
    the login names or UIDs with a `^' character, as you might do
    in a regular expression.  The `^' prefix is useful, for example,
    when you want to have lsof ignore the files open to system
    processes, owned by the root (UID 0) login.  Try:


      $ lsof -u ^root
    or
      $ lsof -u ^0




13. Listing Files Open to a Specific Process Group
==================================================


  There's a Unix collection of processes called a process group.
  The name indicates that the processes of the group have a common
  association and are grouped so that a signal sent to one (e.g.,
  a keyboard kill stroke) is delivered to all.


  This causes Unix to create a two element process group:


  $ lsof | less


  You can use lsof to look at the open files of all members of a
  process group, if you know the process group ID number.  Assuming
  that it is 12717 for the above example, this lsof command:


  $ lsof -g12717 -adcwd


  would produce on a Solaris 8 system:


  $ lsof -g12717 -adcwd
  COMMAND   PID  PGID USER  FD TYPE DEVICE SIZE/OFF    NODE NAME
  sshd    11369 12717 root cwd VDIR    0,2      189 1449175 /tmp (swap)
  sshd    12717 12717 root cwd VDIR  136,0     1024       2 /


  The ``-g12717'' option specifies the process group ID of interest;
  the ``-adcwd'' option specifies that options are to be ANDed and
  that lsof should limit file output to information about current
  working directory (``cwd'') files.




14. When Lsof Seems to Hang
===========================


  On occasion when you run lsof it seems to hang and produce no
  output.  This may result from system conditions beyond the control
  of lsof.  Lsof has a number of options that may allow you to
  bypass the blockage.


  a.  Kernel lstat(), readlink(), and stat() Blockages
  ====================================================


    Lsof uses the kernel (system) calls lstat(), readlink(), and
    stat() to locate mounted file system information.  When a file
    system has been mounted from an NFS server and that server is
    temporarily unavailable, the calls lsof uses may block in the
    kernel.


    Lsof will announce that it is being blocked with warning messages
    (unless they have been suppressed by the lsof builder), but
    only after a default waiting period of fifteen seconds has
    expired for each file system whose server is unavailable.  If
    you have a number of such file systems, the total wait may be
    unacceptably long.


    You can do two things to shorten your suffering: 1) reduce the
    wait time with the -S option; or 2) tell lsof to avoid the
    kernel calls that might block by specifying the -b option.


      $ lsof -S 5
    or
      $ lsof -b


    Avoiding the kernel calls that might block may result in the
    lack of some information that lsof needs to know about mounted
    file systems.  Thus, when you use -b, lsof warns that it might
    lack important information.


    The warnings that result from using -b (unless suppressed by
    the lsof builder) can themselves be annoying.  You can suppress
    them by adding the -w option.  (Of course, if you do, you won't
    know what warning messages lsof might have issued.)


    $ lsof -bw


    Note: if the lsof builder suppressed warning message issuance,
    you don't need to use -w to suppress them.  You can tell what
    the default state of message warning issuance is by looking at
    the -h (help) output.  If it says ``-w enable warnings'' then
    warnings are disabled by default; ``-w disable warnings'', they
    are enabled by default.


  b.  Problems with /dev or /devices
  ==================================


    Lsof scans the /dev or /devices branch of your file system to
    obtain information about your system's devices.  (The scan isn't
    necessary when a device cache file exists.)


    Sometimes that scan can take a very long time, especially if
    you have a large number of devices, and if your kernel is
    relatively slow to process the stat() system call on device
    nodes.  You can't do anything about the stat() system call
    speed.


    However, you can make sure that lsof is allowed to use its
    device cache file feature.  When lsof can use a device cache
    file, it retains information it gleans via the stat() calls
    on /dev or /devices in a separate file for later, faster
    access.


    The device cache file feature is described in the lsof man
    page.  See the DEVICE CACHE FILE, LSOF PERMISSIONS THAT AFFECT
    DEVICE CACHE FILE ACCESS, DEVICE CACHE FILE PATH FROM THE -D
    OPTION, DEVICE CACHE PATH FROM AN ENVIRONMENT VARIABLE,
    SYSTEM-WIDE DEVICE CACHE PATH, PERSONAL DEVICE CACHE PATH
    (DEFAULT), and MODIFIED PERSONAL DEVICE CACHE PATH sections.


    There is also a separate file in the lsof distribution, named
    00DCACHE, that describes the device cache file in detail,
    including information about possible security problems.


    One final observation: don't overlook the possibility that your
    /dev or /devices tree might be damaged.  See if


      $ ls -R /dev
    or
      $ ls -R /devices


    completes or hangs.  If it hangs, then lsof will probably hang,
    too, and you should try to discover why ls hangs.


    c.  Host and Service Name Lookup Hangs
    ======================================


    Lsof can hang up when it tries to convert an Internet dot-form
    address to a host name, or a port number to a service name.  Both
    hangs are caused by the lookup functions of your system.


    An independent check for both types of hangs can be made with
    the netstat program.  Run it without arguments.  If it hangs,
    then it is probably having lookup difficulties.  When you run
    it with -n it shouldn't hang and should report network and port
    numbers instead of names.


    Lsof has two options that serve the same purpose as netstat's
    -n option.  The lsof -n option tells it to avoid host name
    lookups; and -P, service name lookups.  Try those options when
    you suspect lsof may be hanging because of lookup problems.


      $ lsof -n
    or
      $ lsof -P
    or
      $ lsof -nP


    d.  UID to Login Name Conversion Delays
    =======================================


    By default lsof converts User IDentification (UID) numbers to
    login names when it produces output.  That conversion process
    may sometimes hang because of system problems or interlocks.


    You can tell lsof to skip the lookup with the -l option; it
    will then report UIDs in the USER column.


    $ lsof -l




15. Output for Other Programs
=============================


  The -F option allows you to specify that lsof should describe
  open files with a special form of output, called field output,
  that can be parsed easily by a subsequent program.  The lsof
  distribution comes with sample AWK, Perl 4, and Perl 5 scripts
  that post-process field output.  The lsof test suite has a C
  library that could be adapted for use by C programs that want to
  process lsof field output from an in-bound pipe.


  The lsof manual page describes field output in detail in its
  OUTPUT FOR OTHER PROGRAMS section.  A quick look at a sample
  script in the scripts/ subdirectory of the lsof distribution will
  also give you an idea how field output works.


  The most important thing about field output is that it is relatively
  homogeneous across Unix dialects.  Thus, if you write a script
  to post-process field output for AIX, it probably will work for
  HP-UX, Solaris, and Ultrix as well.




16. The Lsof Exit Code and Shell Scripts
========================================


  When lsof exits successfully it returns an exit code based on
  the result of its search for specified files.  (If no files were
  specified, then the successful exit code is 0 (zero).)


  If lsof was asked to search for specific files, including any
  files on specified file systems, it returns an exit code of 0
  (zero) if it found all the specified files and at least one file
  on each specified file system.  Otherwise it returns a 1 (one).


  If lsof detects an error and makes an unsuccessful exit, it
  returns an exit code of 1 (one).


  You can use the exit code in a shell script to search for files
  on a file system and take action based on the result -- e.g.,


    #!/bin/sh
    lsof <file_system_name> > /dev/null 2>&1
    if test $? -eq 0
    then
      echo "<file_system_name> has some users."
    else
      echo "<file_system_name> may have no users."
    fi




Options
=======


  The following appendices describe the lsof options in detail.




A.  Selection Options
====================


  Lsof has a rich set of options for selecting the files to be
  displayed.  These include:


-a tells lsof to AND the set of selection options that
are specified.  Normally lsof ORs them.

For example, if you specify the -p<PID> and -u<UID>
options, lsof will display all files for the
specified PID or for the specified UID.


By adding -a, you specify that the listed files
should be limited to PIDs owned by the specified
UIDs -- i.e., they match the PIDs *and* the UIDs.


   $ lsof -p1234 -au 5678


-c specifies that lsof should list files belonging
to processes having the associated command name.


Hint: if you want to select files based on more than
one command name, use multiple -c<name> specifications.


   $ lsof -clsof -cksh


-d      tells lsof to select by the associated file descriptor
(FD) set.  An FD set is a comma-separated list of
numbers and the names lsof normally displays in
its FD column:  cwd, Lnn, ltx, <number>, etc.  See
the OUTPUT section of the lsof man page for the
complete list of possible file descriptors.  Example:


   $ lsof -dcwd,0,1,2


-g      tells lsof to select by the associated process
group ID (PGID) set.  The PGID set is a comma-separated
list of PGID numbers.  When -g is specified, it also
enables the display of PGID numbers.


Note: when -g isn't followed by a PGID set, it
simply selects the listing of PGID for all processes.
Examples:


   $ lsof -g
   $ lsof -g1234,5678


-i tells lsof to display Internet socket files.  If no
protocol/address/port specification follows -i,
lsof lists all Internet socket files.


If a specification follows -i, lsof lists only the
socket files whose Internet addresses match the
specification.


Hint: multiple addresses may be specified with
multiple -i options.  Examples:


   $ lsof -iTCP
   $ lsof -i@lsof.itap.purdue.edu:sendmail


-N selects the listing of files mounted on NFS devices.


-U selects the listing of socket files in the Unix
domain.




B.  Output Options
==================


  Lsof has these options to control its output format:


-F produce output that can be parsed by a subsequent
program.


-g print process group (PGID) IDs.


-l list UID numbers instead of login names.


-n list network numbers instead of host names.


-o always list file offset.


-P list port numbers instead of port service names.


-s always list file size.




C.  Precautionary Options
=========================


  Lsof uses system functions that can block or take a long time,
  depending on the health of the Unix dialect supporting it.  These
  include:


-b directs lsof to avoid system functions -- e.g.,
lstat(2), readlink(2), stat(2) -- that might block
in the kernel.  See the BLOCKS AND TIMEOUTS
section of the lsof man page.


You might want to use this option when you have
a mount from an NFS server that is not responding.


-C tells lsof to ignore the kernel's name cache.  As
a precaution this option will have little effect on
lsof performance, but might be useful if the kernel's
name cache is scrambled.  (I've never seen that
happen.)


-D might be used to direct lsof to ignore an existing
device cache file and generate a new one from /dev
(and /devices).  This might be useful if you have
doubts about the integrity of an existing device
cache file.


-l      tells lsof to list UID numbers instead of login
names -- this is useful when UID to login name
conversion is slow or inoperative.


-n tells lsof to avoid converting Internet addresses
to host numbers.  This might be useful when your
host name lookup (e.g., DNS) is inoperative.


-O      tells lsof to avoid its strategy of forking to
perform potentially blocking kernel operations.
While the forking allows lsof to detect that a
block has occurred (and possibly break it), the
fork operation is a costly one.  Use the -O option
with care, lest your lsof be blocked.


-P      directs lsof to list port numbers instead of trying
to convert them to port service names.  This might
be useful if port to service name lookups (e.g.,
via NIS) are slow or failing.


-S      can be used to change the lstat/readlink/stat
timeout interval that governs how long lsof waits
for response from the kernel.  This might be useful
when an NFS server is slow or unresponsive.  When
lsof times out of a kernel function, it may have
less information to display.  Example:


   $ lsof -S2


-w tells lsof to avoid issuing warning messages, if
they are enabled by default, or enable them if they
are disabled by default.  Check the -h (help) output
to determine their status.  If it says ``-w enable
warnings'', then warning messages are disabled by
default; ``-w disable warnings'', they are enabled
by default.


This may be a useful option, for example, when you
specify -b, if warning messages are enabled, because
it will suppress the warning messages lsof issues
about avoiding functions that might block in the
kernel.




D.  Miscellaneous Lsof Options
==============================


  There are some lsof options that are hard to classify, including:


-? these options select help output.
-h


-F      selects field output.  Field output is a mode where
lsof produces output that can be parsed easily by
subsequent programs -- e.g., AWK or Perl scripts.
See ``15. Output for Other Programs'' for more
information.


-k specifies an alternate kernel symbol file -- i.e.,
where nlist() will get its information.  Example:


   $ lsof -k/usr/crash/vmunix.1


-m specifies an alternate kernel memory file from
which lsof will read kernel structures in place
of /dev/kmem or kvm_read().  Example:


   $ lsof -m/usr/crash/vmcore.n


-r tells lsof to repeat its scan every 15 seconds (the
default when no associated value is specified).  A
repeat time, different from the default, can follow
-r.  Example:


   $ lsof -r30


-v displays information about the building of the
lsof executable.


--      The double minus sign option may be used to
signal the end of options.  It's particularly useful
when arguments to the last option are optional and
you want to supply a file path that could be confused
for arguments to the last option.  Example:


   $ lsof -g -- 1

Where `1' is a file path, not PGID ID 1.




Vic Abell <abe@purdue.edu>

March 25, 2003


下载参见: lsof download address:   http://download.chinaunix.net/download/0007000/6300.shtml


参见1:  http://club.topsage.com/thread-234763-1-1.html

  1. # lsof |grep /var/log/messages
  2. syslogd 1283 root 2w REG 3,3 5381017 1773647 /var/log/messages (deleted)


参见2: http://www.loveunix.net/thread-131440-1-1.html





原创粉丝点击
热门问题 老师的惩罚 人脸识别 我在镇武司摸鱼那些年 重生之率土为王 我在大康的咸鱼生活 盘龙之生命进化 天生仙种 凡人之先天五行 春回大明朝 姑娘不必设防,我是瞎子 虚拟物品被骗了怎么办 网络选修课挂了怎么办 美团商家退出怎么办 卖家版运费险太贵了怎么办 美瞳没有客源怎么办 购物车满了怎么办 手机程序无响应怎么办 三星手机无响应怎么办 游戏无响应了怎么办 手机百度无响应怎么办 新手机响应慢怎么办 vivo手机无响应怎么办 vivo软件无响应怎么办 退货商家不处理怎么办 淘宝页面变小了怎么办 淘宝卖家让微信交易被骗怎么办 苹果下载特别慢怎么办 淘宝没有支付宝怎么办 淘宝买东西限购怎么办 淘宝被别人登录怎么办 淘宝被厂家投诉怎么办 买家退货说是假货怎么办 同行给差评怎么办 被买家举报了怎么办 淘宝商品被屏蔽怎么办 电脑处于离线状态怎么办 计算机处于离线状态怎么办 交易猫安全提醒怎么办 网吧进游戏代码怎么办 车票冲突买不了怎么办 苹果8淘宝打不开怎么办 我的淘宝打不开怎么办 福袋不支持退货怎么办 不支持跨区下单怎么办 支付宝被占用怎么办 淘宝东西失效了怎么办 访客突然下降了怎么办 淘宝店铺广告违规怎么办 苹果手机网速差怎么办 支付宝账号忘记怎么办 支付宝无法登录怎么办