Skip to main content

What are File Descriptors in Linux?

 

What are File Descriptors in Linux?

A file descriptor is a positive integer that acts as a unique identifier (or handle) for “files” and other I/O resources, such as pipes, sockets, blocks, devices, or terminal I/O.

All the file descriptor records are kept in a file descriptor table in the kernel. When a file is opened, a new file descriptor (or integer value) is given to that file in the file descriptor table.

For example, if you open a “example_file1.txt” file (which is nothing but a process), it will be allocated with the available file descriptor (for example, 101), and a new entry will be created in the file descriptor table.

And when you open another file like “example_file2.txt“, it will be allocated to another available file descriptor like 102, and another entry will be created in the file descriptor table.

File DescriptorProcess
101example_file1.txt
102example_file2.txt

The file descriptor for the referenced file will be available for use by another process once you close the file.

Short Recap: A file descriptor is a unique, non-negative number that is given to each process or other I/O resource (when they make a successful request) in the kernel’s file descriptor table. Once the file is closed, the file descriptor can be given to another process.

So, when you open hundreds of files or other I/O resources in your Linux system, there will be 100 entries in the file descriptor table, and each entry will reference a unique file descriptor (or integer value like 100, 102, 103…) to identify the file.

What is the File Descriptor Table in Linux?

When a process or I/O device makes a successful request, the kernel returns a file descriptor to that process and keeps the list of current and all running process file descriptors in the file descriptor table, which is somewhere in the kernel.

Now, your process might depend on other system resources like input and output; as this event is also a process, it also has a file descriptor, which will be attached to your process in the file descriptor table.

Each file descriptor in the file descriptor table points to an entry in the kernel’s global file table. The file table entry maintains the record of file (or other I/O resource) modes like (r)ead, (w)rite, and (e)xecute.

Also Read: What is inode in Linux?

Also, the file table entry points to a third table known as the inode table that points to actual file information like size, modification date, pointer, etc.

Kernel table
Kernel table

Predefined File Descriptors

By default, three types of standard POSIX file descriptors exist in the file descriptor table, and you might already be familiar with them as data streams in Linux:

File DescriptorNameAbbreviation
0Standard Inputstdin
1Standard Outputstdout
2Standard Errorstderr

Apart from them, every other process has its own set of file descriptors, but few of them (except for some daemons) also utilize the above mentioned file descriptors to handle input, output, and errors for the process.

To make sure that the process is using the above file descriptor, just look for the above file descriptor (in integer format) under “/proc/PID/fd/“, where PID stands for “process identifier.”

For example, I’ve started the GEDIT editor on my system, which uses all of the file descriptors mentioned above, as shown.

Checking the predefined file descriptor for a process
Checking the predefined file descriptor for a process

List all of a Running Process’s File Descriptors

As you just learned, each running process in Linux has its own set of file descriptors, but it also uses others to identify the specific file when communicating with kernel space via system calls or library calls.

Find the Process ID (or PID)

First, find out your process identifier (or PID) using the ps command before viewing the file descriptors under it.

$ ps aux | grep gedit

Replace “gedit” with your running process name, or you can place “$$” to pass the current bash session.

Finding the PID for the referenced process
Finding the PID for the referenced process

Now, you have two ways to list the file descriptors under a specific process, followed by:

Using the ls command

List all of the file descriptors and the files they refer to under a certain PID by listing the content of the “/proc/PID/fd/” path, where PID is the process ID using the ls command.

Also Read: Everything About /proc File System in Linux

$ ls -la /proc/11472/fd/

Output:

Listing the process file descriptors using the ls command
Listing the process file descriptors using the ls command

Using the lsof command

The lsof command is used to list the information of running processes in the system and can also be used to list the file descriptor under a specific PID.

For that, use the “-d” flag to specify a range of file descriptors, with the “-p” option specifying the PID. To combine this selection, use the “-a” flag.

$ lsof -a -d 0-2147483647 -p 11472

Output:

Listing the process file descriptors using the lsof command
Listing the process file descriptors using the lsof command

What is the Purpose of File Descriptors in the First Place?

The file descriptor, along with the file table, keep track of each running process’s permissions in your system and maintain data integrity.

A running process can inherit the functionality of another process by inheriting its file descriptor, as you just learned in this article.

What Happens If You Run Out of File Descriptors?

This is crucial because a file descriptor is an integer value that the kernel returns to the process (or other I/O resource) after a successful attempt to open a file.

There is a limit to the number of file descriptors (or integer values) that can be given to a process. When that limit is reached, data can be lost.

In Linux, generally, there are two types of file descriptors: process-level file descriptors and system-level file descriptors.

Process-Level File Descriptor Limits

Check the current process-level file descriptor limit using the ulimit command.

$ ulimit -n

Output:

Checking the process-level file descriptor limits
Checking the process-level file descriptor limits

Reset the limit by adding a custom positive number after the command.

$ ulimit -n 3276800

Note that non-root users are also able to use the above command to change the process-level limits (<Kernel 2.4.x), but you need to add the following lines in “/etc/security/limits.conf” to assign the user modification permission:

soft nofile 2048
hard nofile 8192

System-Level File Descriptor Limits

Check the limit of the system-level descriptor using the cat command.

$ cat /proc/sys/fs/file-max

Output:

Checking the system-level file descriptor limits
Checking the system-level file descriptor limits

Modify the file with the new value by using the “>redirection symbol.

$ echo 90000 > /proc/sys/fs/file-max

After modifying the above file, modify the value in the “nr_open” file.

$ echo "50000" > /proc/sys/fs/nr_open

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...