linux - How to explicitly free EADDRINUSE port for binding it again?
2014-04
$ testOnDemandRTSPServer
... Play this stream using the URL "rtsp://192.168.90.2:8554 ...
^C
$ testOnDemandRTSPServer
Failed to create RTSP server: bind() error (port number: 8554): Address already in use
How to manually explicitly free up the port after a non-REUSEADDR program?
I don't want to wait or change port every time...
Unfortunately, on Linux there's nothing you can do (other than fixing the code to set SO_REUSEADDR
). From man 7 socket
:
Linux will only allow port reuse with the SO_REUSEADDR option when this
option was set both in the previous program that performed a bind(2) to
the port and in the program that wants to reuse the port. This differs
from some implementations (e.g., FreeBSD) where only the later program
needs to set the SO_REUSEADDR option. Typically this difference is invisible,
since, for example, a server program is designed to always set this option.
I want to close an open port which is in listening mode between my client and server application.
Is there any manual command line option in Linux to close a port ??
NOTE: I came to know that "only the application which owns the connected socket should close it, which will happen when the application terminates."
I dont understand why it is only possible by the application which opens it ... But still eager to know if there is any another way to do it ??
You're kind of asking the wrong question here. It isn't really possible to simply "close a port" from outside the application that opened the socket listening on it. The only way to do this is to completely kill the process that owns the port. Then, in about a minute or two, the port will become available again for use. Here's what's going on (if you don't care, skip to the end where I show you how to kill the process owning a particular port):
Ports are resources allocated by the OS to different processes. This is similar to asking the OS for a file pointer. However, unlike file pointers, only ONE process at a time may own a port. Through the BSD socket interface, processes can make a request to listen on a port, which the OS will then grant. The OS will also make sure no other process gets the same port. At any point, the process can release the port by closing the socket. The OS will then reclaim the port. Alternatively, if the process ends without releasing the port, the OS will eventually reclaim the port (though it won't happen immediately: it'll take a few minutes).
Now, what you want to do (simply close the port from the command-line), isn't possible for two reasons. First, if it were possible, it would mean one process could simply steal away another process's resource (the port). This would be bad policy, unless restricted to privileged processes. The second reason is it is unclear what would happen to the process that owned the port if we let it continue running. The process's code is written assuming that it owns this resource. If we simply took it away, it would end up crashing on it's own, so OS's don't let you do this, even if you're a privileged process. Instead, you must simply kill them.
Anyway, here's how to kill a process that owns a particular port:
sudo netstat -ap | grep :<port_number>
That will output the line corresponding to the process holding port . Then, look in the last column, you'll see /. Then execute this:
kill <pid>
If that doesn't work (you can check by re-running the netstat command). Do this:
kill -9 <pid>
In general, it's better to avoid sending SIGKILL if you can. This is why I tell you to try kill
before kill -9
. Just using kill
sends the gentler SIGTERM.
Like I said, it will still take a few minutes for the port to re-open if you do this. I don't know a way to speed this up. If someone else does, I'd love to hear it.
I had same problem, the process must keep alive but the socket must close. Closing a socket in a running process is not impossible but difficult: 1) locate the process :
netstat -np
You get a source/destination ip:port portstate pid/processname map
2) locate the the socket's file descriptor in the process
lsof -np $pid
You get a list: process name, pid, user,fileDescriptor, ... a connection string.
Locate the matching fileDescriptor number for the connection.
Now connect the process:
gdb -p $pid
3) Now close the socket:
call close($fileDescritor)
//does not need ; at end.
Than detach:
quit
And the socket is closed.
You could alternatively use iptables:
iptables -I INPUT -p tcp --dport 80 -j DROP
It basically accomplishes what you want. This will drop all TCP traffic to port 80.
netstat -anp | grep 80
It should tell you, if you're running apache, "httpd" (this is just an example, use the port your application is using instead of 80)
pkill -9 httpd
or
killall -9 httpd
You could write a script which modified the iptables and restarts them. One script for adding a rule dropping all packets on the port, another script for removing said rule.
The other answers have shown you how to kill the process bound to the port - this may not be what you want. If you want the server to keep running, but to prevent connections from clients then you want to block the port, not stop the process.
You could probably just find out what process opened the socket that the port is associated with, and kill that process.
But, you would have to realize that unless that process has a handler that de-initializes all the stuff that it was using (open files, sockets, forks, stuff that can linger unless it's closed properly upon termination) then you would have created that drag on system performance. Plus, the socket will remain open until the kernel realizes that that the process has been killed. That usually just takes about a minute.
I suppose the better question would be: What port (belonging to what process) do you want to stop?
If you are trying to put an end to a backdoor or virus that you found, then you should at least learn what data is going back and forth before you terminate it. (wireshark is good for this) (And the process' executable name so you can delete it and prevent it from coming back on reboot) or, if it's something you installed (like HTTPD or FTPD or something) then you should already have access to the process itself.
Usually it will have a control program (HTTPD stop|start or something). Or, if it's a system thing, you probably should not mess with it. Anyway, i thought that since everyone else is giving you the "how-to" angle, i should give you the caveats.
One more issue: sometime the kernel owns ports themselves. I know NAT routing holds some ports open for NAT use. You can not kill a process for this, this is a kernel, and a reconfiguration and a reboot is required.