Sponsored Content
Operating Systems Solaris LUn' unmapped from storage still showing on Solaris 10 Post 302947035 by TioTony on Monday 15th of June 2015 12:12:34 AM
Old 06-15-2015
The lsof output just means it found something (a process, file, etc) in use by a user with the UID of 1002 but that user is not listed in the /etc/passwd file. I've seen this happen two different ways, there may be more. 1) The user started some processes and was removed from the system, but the processes continue to run. 2) The user is an NIS user and something has gone horribly wrong with NIS (but I think I have maybe only seen this once).

Let's back up a bit. Can you provide more info about the circumstances leading up to the LUN being removed? For example, are you scraping an Oracle instance that was running on the system and removed the LUNs and User ID? What SAN are you using?

If there is some event matching this type of scenario then I would be confident UID 1002 still has some processes running that are using that LUN.

In that case you can run 'ps -u 1002' or 'ps -U 1002' and see if you can identify the process or processes. You can then try to stop them gracefully, kill -HUP them, or kill -9 them.

If you have some other scenario where UID 1002 may not have anything to do with the issue, please give some details and we can try to tackle it a different way.
 

8 More Discussions You Might Find Interesting

1. Solaris

command to scan Enterprise storage Lun disk in Solaris

I just installed IBMsdd on Solaris diver along with the patches recommended. I also installed 2 - 2Gigs qlogic fiber cards & the corresponding pkges for the cards. What command can I use to scan this LUN disks from my Soalris servers. Solaris doen't seem to be seeing this disks presented on it.... (2 Replies)
Discussion started by: Remi
2 Replies

2. Solaris

Solaris 9 or 10 LUN Limitations

Is there a limit to the number of LUNS that can be concatenated using Solaris Volume manager with Soft partitions? I have worked with some AIX admins in the past and there was such a limitation therefore limiting the size the filesystem could grow to. Is there such a limitation in Solaris 9... (6 Replies)
Discussion started by: BG_JrAdmin
6 Replies

3. Solaris

new attached lun in solaris 10

hi, what are the steps to detect and configure a new attached lun in Solaris 10. Is there any difference between cfgadm and luxadm command ? rgds, snjksh (5 Replies)
Discussion started by: snjksh
5 Replies

4. Solaris

How to get LUN WWN in Solaris?

How to get LUN WWN (i.e LUN mapped from a storage box say Symmetrix or clariion) in Solaris. fcinfo command does give the Target port wwn but what i'm looking for is the LUN WWN. Any help is appreciated. (2 Replies)
Discussion started by: Manish00712
2 Replies

5. Solaris

Solaris 10, adding new LUN from SAN storage

Hello to all, Actually, currently on my Solaris box, I've a LUN (5TB space) from a EMC storage which is working fine, and a partition with ZFS filesystem is created for that LUN. as further you'll see in the logs, the "c4t6006016053802E00E6A9196B6506E211d0s2" is the current configured LUN in the... (4 Replies)
Discussion started by: Anti_Evil
4 Replies

6. Solaris

Mpathadm showing no paths to 1 lun, others luns are fine

Hi, I've noticed that mpathadm states that one of our luns has no active paths: /dev/rdsk/c6t60000970000298700009533031324333d0s2 Total Path Count: 4 Operational Path Count: 4 /dev/rdsk/c6t60000970000298700009533031333037d0s2 ... (3 Replies)
Discussion started by: badoshi
3 Replies

7. Solaris

Luxadm display not showing a LUN as expected

Hi all, I have the following LUN which is showing OK with its two paths: DEVICE PROPERTIES for disk: /dev/rdsk/c23t500507630A3BC579d123s2 Vendor: IBM Product ID: 2107900 Revision: 3010 Serial Num: 75WB0114900 Unformatted capacity:... (13 Replies)
Discussion started by: ludiegu
13 Replies

8. Post Here to Contact Site Administrators and Moderators

AIX server do not detect LUN from HP storage

ssssssssssss (0 Replies)
Discussion started by: sampathenjoy
0 Replies
USER-SESSION-KEYRING(7) 				     Linux Programmer's Manual					   USER-SESSION-KEYRING(7)

NAME
user-session-keyring - per-user default session keyring DESCRIPTION
The user session keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own user session keyring that is shared by all processes with that UID. The user session keyring has a name (description) of the form _uid_ses.<UID> where <UID> is the user ID of the corresponding user. The user session keyring is associated with the record that the kernel maintains for the UID. It comes into existence upon the first attempt to access either the user session keyring, the user-keyring(7), or the session-keyring(7). The keyring remains pinned in existence so long as there are processes running with that real UID or files opened by those processes remain open. (The keyring can also be pinned indefinitely by linking it into another keyring.) The user session keyring is created on demand when a thread requests it or when a thread asks for its session-keyring(7) and that keyring doesn't exist. In the latter case, a user session keyring will be created and, if the session keyring wasn't to be created, the user ses- sion keyring will be set as the process's actual session keyring. The user session keyring is searched by request_key(2) if the actual session keyring does not exist and is ignored otherwise. A special serial number value, KEY_SPEC_USER_SESSION_KEYRING, is defined that can be used in lieu of the actual serial number of the call- ing process's user session keyring. From the keyctl(1) utility, '@us' can be used instead of a numeric key ID in much the same way. User session keyrings are independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2) excepting that the keyring is destroyed when the UID record is destroyed when the last process pinning it exits. If a user session keyring does not exist when it is accessed, it will be created. Rather than relying on the user session keyring, it is strongly recommended--especially if the process is running as root--that a session- keyring(7) be set explicitly, for example by pam_keyinit(8). NOTES
The user session keyring was added to support situations where a process doesn't have a session keyring, perhaps because it was created via a pathway that didn't involve PAM (e.g., perhaps it was a daemon started by inetd(8)). In such a scenario, the user session keyring acts as a substitute for the session-keyring(7). SEE ALSO
keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), thread-keyring(7), user-keyring(7) Linux 2017-03-13 USER-SESSION-KEYRING(7)
All times are GMT -4. The time now is 10:08 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy