Fuser Command In Linux: A Beginners Guide With Examples
Mar 17, 2025 am 10:17 AMThe Linux fuser
command is a powerful command-line utility for identifying processes currently using specific files, directories, sockets, or filesystems. "Fuser" is short for "file user." It provides detailed process information, including the owning user, process ID (PID), access type, and the command itself.
fuser
is invaluable for troubleshooting file locking, process management, and system resource issues. Its uses include:
- Identifying file-using processes: Determine which processes are accessing a specific file or directory, crucial for unmounting filesystems or deleting files in use.
- Identifying network socket users: Identify processes using network sockets, aiding in network troubleshooting.
-
Killing processes: After identifying processes using a file or socket, the
-k
option allows for their termination.
Table of Contents
-
fuser
Command Syntax- Options
-
fuser
Command Examples-
- Listing Processes Accessing a File
-
- Finding Processes Accessing a Directory
-
- Finding Processes Accessing a Filesystem
-
- Killing Processes Using a File or Socket
-
- Viewing Processes Using a Port
-
- Listing Signals
-
- Sending a Signal to Processes
-
- Getting Help
-
- Practical Example: Unmounting a Busy Filesystem
- Conclusion
fuser
Command Syntax
The basic syntax is:
fuser [options] file|directory|socket
Options
Key options:
-
-v
or--verbose
: Detailed output (user, PID, access type, command). -
-a
or--all
: Display all specified files. -
-k
or--kill
: Kills processes accessing the specified resource. -
-i
or--interactive
: Prompts for confirmation before killing. -
-l
or--list-signals
: Lists available signal names. -
-m
or--mount
: Shows processes accessing a filesystem or block device. -
-n
or--namespace
: Specifies the namespace (e.g.,tcp
,udp
,file
). -
-u
or--user
: Appends the username to each PID. -
-c
: Displays the command name for each process. -
-4
or--ipv4
: Searches only for IPv4 sockets. -
-6
or--ipv6
: Searches only for IPv6 sockets.
fuser
Command Examples
1. Listing Processes Accessing a File
Find processes using /path/to/file
:
fuser -v /path/to/file
Example: Processes using /usr/bin/firefox-esr
:
fuser --verbose /usr/bin/firefox-esr
The output shows PIDs, users, access types, and commands. Access types (e.g., e
for execute, c
for current working directory) are explained in the original text.
2. Finding Processes Accessing a Directory
Find processes accessing the current directory:
fuser -v .
3. Finding Processes Accessing a Filesystem
Find processes accessing a filesystem mounted at /path/to/mountpoint
:
fuser -v -m /path/to/mountpoint
Example: Processes accessing /boot/efi
:
fuser -v -m /boot/efi/
4. Killing Processes Using a File or Socket
Kill processes using a file or socket (use with caution!):
sudo fuser -k /path/to/file # or socket
Example: Killing processes using port 8006:
sudo fuser -k 8006/tcp
5. Viewing Processes Using a Port
Find processes using TCP port 8006:
sudo fuser -v -n tcp 8006
6. Listing Signals
List available signals:
fuser -l
7. Sending a Signal to Processes
Send the SIGHUP
signal:
sudo fuser -k -HUP /path/to/file
8. Getting Help
View the fuser
manual page:
man fuser
Practical Example: Unmounting a Busy Filesystem
If unmounting a filesystem fails due to processes using it, use fuser -v -m /mnt/data
to identify those processes. Then, try sudo fuser -km /mnt/data
(SIGTERM) or sudo fuser -ki /mnt/data
(SIGKILL) if necessary. Remember that SIGKILL
forcefully terminates processes.
Conclusion
fuser
is a vital command-line tool for Linux system administration and troubleshooting, providing crucial insights into process resource usage and enabling controlled process termination.
The above is the detailed content of Fuser Command In Linux: A Beginners Guide With Examples. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Linux administrators should be familiar with the command-line environment. Since GUI (Graphical User Interface) mode in Linux servers is not commonly installed.SSH may be the most popular protocol to enable Linux administrators to manage the servers

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

R is a widely-used programming language and software environment designed for developing statistical and graphical computing tools within data science. It closely resembles the S programming language and environment, with R serving as an alternative

Firefox browser is the default browser for most modern Linux distributions such as Ubuntu, Mint, and Fedora. Initially, its performance might be impressive, however, with the passage of time, you might notice that your browser is not as fast and resp

Clear Linux OS is the ideal operating system for people – ahem system admins – who want to have a minimal, secure, and reliable Linux distribution. It is optimized for the Intel architecture, which means that running Clear Linux OS on AMD sys

The key steps for creating a self-signed SSL certificate are as follows: 1. Generate the private key, use the command opensslgenrsa-outselfsigned.key2048 to generate a 2048-bit RSA private key file, optional parameter -aes256 to achieve password protection; 2. Create a certificate request (CSR), run opensslreq-new-keyselfsigned.key-outselfsigned.csr and fill in the relevant information, especially the "CommonName" field; 3. Generate the certificate by self-signed, and use opensslx509-req-days365-inselfsigned.csr-signk

Do you sometimes share your Linux desktop with family, friends, or coworkers? If so, you may want to hide some personal files and folders. The challenge is figuring out how to conceal these files on a Linux system.In this guide, we will walk through

Decompress the .zip file on Windows, you can right-click to select "Extract All", while the .tar.gz file needs to use tools such as 7-Zip or WinRAR; on macOS and Linux, the .zip file can be double-clicked or unzip commanded, and the .tar.gz file can be decompressed by tar command or double-clicked directly. The specific steps are: 1. Windows processing.zip file: right-click → "Extract All"; 2. Windows processing.tar.gz file: Install third-party tools → right-click to decompress; 3. macOS/Linux processing.zip file: double-click or run unzipfilename.zip; 4. macOS/Linux processing.tar
