Sponsored Content
Full Discussion: lspath output interpretation
Operating Systems AIX lspath output interpretation Post 302600778 by petervg on Wednesday 22nd of February 2012 04:39:24 AM
Old 02-22-2012
lspath output interpretation

On my VIo I see the following for my disks:
Code:
$ lspath | grep hdisk6
Enabled hdisk6 fscsi0 200600a0b82193f7,4000000000000
Enabled hdisk6 fscsi0 200700a0b82193f7,4000000000000
Enabled hdisk6 fscsi2 200600a0b82193f8,4000000000000
Failed hdisk6 fscsi2 200700a0b82193f8,4000000000000
 
$ lspath | grep hdisk7
Enabled hdisk7  fscsi0 200600a0b82193f7,5000000000000
Enabled hdisk7  fscsi0 200700a0b82193f7,5000000000000
Failed  hdisk7  fscsi2 200600a0b82193f8,5000000000000
Failed  hdisk7  fscsi2 200700a0b82193f8,5000000000000
 
$ lspath | grep hdisk23
Enabled hdisk23 fscsi0 200600a0b82193f7,14000000000000
Enabled hdisk23 fscsi0 200700a0b82193f7,14000000000000
Enabled hdisk23 fscsi2 200600a0b82193f8,14000000000000
Enabled hdisk23 fscsi2 200700a0b82193f8,14000000000000

Is see that some disks have a failed path on fscsi2. Other disks are just running fine with a path over fscsi2.

May I conclude that the hardware is working and that ther is a problem with the zoning of the SAN? Or could HW still be a problemen? All LUNS are provided from the same SAN storage box meaning that if hdisk23 is available on all paths, the cables between the SAN box and the server are correct.


--Peter
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

shell interpretation

I executed the following command in the korn shell: $ variable1="qwerty" ls | sort and the shell executed the 'ls | sort' command. I would have expected an error message from the shell, but instead of that the shell ran the 'ls | sort' command and didn't realize the variable assignement. ... (1 Reply)
Discussion started by: PhilippeCrokaer
1 Replies

2. UNIX for Advanced & Expert Users

SAR -b interpretation

I have used SAR -b to get some Unix cache / buffer metrics and the results are confusing me a bit. The pread/s & pwrit/s are showing 0. However the lread/s and lwrit/s are showing figures. I note also that the bread/s and bwrit/s are showing figures. I believe that pread/s and pwrit/s is not... (3 Replies)
Discussion started by: jimthompson
3 Replies

3. AIX

interpretation of sar

hello with a sar i have this result: System configuration: lcpu=48 ent=4.00 14:06:37 %usr %sys %wio %idle physc %entc 14:06:39 26 9 3 62 1.63 40.7 14:06:41 26 9 3 63 1.58 39.4 14:06:43 ... (0 Replies)
Discussion started by: pascalbout
0 Replies

4. IP Networking

DNS ENUM RR interpretation

Hi Guys, This is really really urgent. Am looking out for some quick answers. I'm developing a DNS Resolver client that interprets DNS Query repsonses & pass on the needful to DNS applications. When an ENUM query(modified to an nslookup naptr query) is issued & an NAPTR RR(Resource Record)... (1 Reply)
Discussion started by: smanu
1 Replies

5. Shell Programming and Scripting

Weird Interpretation by Awk

Hi, I am not sure what I am doing wrong but I am messing up some logic here. The input file is something like this: *___String Type A Here___String Type B Here___123 *___ ___String Type B Here___123 *___ ___String Type B Here___123 *___ ... (6 Replies)
Discussion started by: Legend986
6 Replies

6. AIX

SDD SDDPCM MPIO lspath Jargon

Can anyone recommend me some reading material surrounding how AIX handles LUNs: - with and without MPIO installed - with and without SDD or SDDPCM installed Where does lspath sit in all of this (MPIO layer?). Can a system be built with just MPIO software? Is MPIO software even needed? I guess... (0 Replies)
Discussion started by: apra143
0 Replies

7. Solaris

solaris versions interpretation

Hi What means Solaris 10 5/09 and Solaris 10 10/09, I mean the suffix 5/09 and 10/09 ? thx for help. (1 Reply)
Discussion started by: presul
1 Replies

8. Shell Programming and Scripting

Negating shell interpretation

I'm writing a Korn script but am having trouble because the shell interprets the asterisk in this case. Can anyone tell me if there is a way to fix this so that grep takes in STDIN without the interpretation? line="30 09 * * 1-4 /home/user01/bin/start" echo "$line" | grep 'start' (16 Replies)
Discussion started by: sprucio
16 Replies

9. UNIX for Advanced & Expert Users

Truss output interpretation

hi, anyone can help on this piece of truss output? 8094: 0.7028 write(4, 0x0043BE90, 236) = 236 8094: T S H \0\0\0EC020101\0\0\0\0\0\0\0\0\0 "02\0\0 303\0\0 I D 8094: \f %\0\0\0\0 2\0F67F\0\0\0\0 @06FFC99A ; 8094: L D6\0 303 8094: ... (6 Replies)
Discussion started by: ghostdog74
6 Replies
samba_unconfined_net_selinux(8) 			SELinux Policy samba_unconfined_net			   samba_unconfined_net_selinux(8)

NAME
samba_unconfined_net_selinux - Security Enhanced Linux Policy for the samba_unconfined_net processes DESCRIPTION
Security-Enhanced Linux secures the samba_unconfined_net processes via flexible mandatory access control. The samba_unconfined_net processes execute with the samba_unconfined_net_t SELinux type. You can check if you have these processes running by executing the ps command with the -Z qualifier. For example: ps -eZ | grep samba_unconfined_net_t ENTRYPOINTS
The samba_unconfined_net_t SELinux type can be entered via the unlabeled_t, proc_type, file_type, mtrr_device_t, filesystem_type, sysctl_type, samba_net_exec_t file types. The default entrypoint paths for the samba_unconfined_net_t domain are the following: all files on the system, /dev/cpu/mtrr, /usr/bin/net PROCESS TYPES
SELinux defines process types (domains) for each process running on the system You can see the context of a process using the -Z option to ps Policy governs the access confined processes have to files. SELinux samba_unconfined_net policy is very flexible allowing users to setup their samba_unconfined_net processes in as secure a method as possible. The following process types are defined for samba_unconfined_net: samba_unconfined_net_t Note: semanage permissive -a samba_unconfined_net_t can be used to make the process type samba_unconfined_net_t permissive. SELinux does not deny access to permissive process types, but the AVC (SELinux denials) messages are still generated. BOOLEANS
SELinux policy is customizable based on least access required. samba_unconfined_net policy is extremely flexible and has several booleans that allow you to manipulate the policy and run samba_unconfined_net with the tightest access possible. If you want to deny user domains applications to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla, you must turn on the deny_execmem boolean. Enabled by default. setsebool -P deny_execmem 1 If you want to deny any process from ptracing or debugging any other processes, you must turn on the deny_ptrace boolean. Enabled by default. setsebool -P deny_ptrace 1 If you want to allow all domains to use other domains file descriptors, you must turn on the domain_fd_use boolean. Enabled by default. setsebool -P domain_fd_use 1 If you want to allow all domains to have the kernel load modules, you must turn on the domain_kernel_load_modules boolean. Disabled by default. setsebool -P domain_kernel_load_modules 1 If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default. setsebool -P fips_mode 1 If you want to enable reading of urandom for all domains, you must turn on the global_ssp boolean. Disabled by default. setsebool -P global_ssp 1 If you want to control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr, you must turn on the mmap_low_allowed boolean. Disabled by default. setsebool -P mmap_low_allowed 1 If you want to disable kernel module loading, you must turn on the secure_mode_insmod boolean. Enabled by default. setsebool -P secure_mode_insmod 1 If you want to boolean to determine whether the system permits loading policy, setting enforcing mode, and changing boolean values. Set this to true and you have to reboot to set it back, you must turn on the secure_mode_policyload boolean. Enabled by default. setsebool -P secure_mode_policyload 1 If you want to allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla, you must turn on the selin- uxuser_execheap boolean. Disabled by default. setsebool -P selinuxuser_execheap 1 If you want to allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t, you must turn on the selinuxuser_execmod boolean. Enabled by default. setsebool -P selinuxuser_execmod 1 If you want to allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla, you must turn on the selin- uxuser_execstack boolean. Enabled by default. setsebool -P selinuxuser_execstack 1 If you want to support X userspace object manager, you must turn on the xserver_object_manager boolean. Enabled by default. setsebool -P xserver_object_manager 1 If you want to allow ZoneMinder to run su/sudo, you must turn on the zoneminder_run_sudo boolean. Disabled by default. setsebool -P zoneminder_run_sudo 1 MANAGED FILES
The SELinux process type samba_unconfined_net_t can manage files labeled with the following file types. The paths listed are the default paths for these file types. Note the processes UID still need to have DAC permissions. file_type all files on the system COMMANDS
semanage fcontext can also be used to manipulate default file context mappings. semanage permissive can also be used to manipulate whether or not a process type is permissive. semanage module can also be used to enable/disable/install/remove policy modules. semanage boolean can also be used to manipulate the booleans system-config-selinux is a GUI tool available to customize SELinux policy settings. AUTHOR
This manual page was auto-generated using sepolicy manpage . SEE ALSO
selinux(8), samba_unconfined_net(8), semanage(8), restorecon(8), chcon(1), sepolicy(8) , setsebool(8) samba_unconfined_net 14-06-10 samba_unconfined_net_selinux(8)
All times are GMT -4. The time now is 08:23 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy