Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

lsof - no TCP/UDP/IP information available

552 views
Skip to first unread message

Egrama

unread,
May 28, 2008, 2:24:56 AM5/28/08
to
Hi all,

After patching a Solaris 10 SPARC box (now the kernel is
Generic_127111-09), lsof seems not able to show TCP related
information. I get a messages like this:
oracle 13757 oracle 14u IPv4 TCP no TCP/UDP/IP
information available

I insalled lsof 4.77 from sunfreeware.com, but the problem persists.
Anybody else ran into this ?
Any place I can download a newer binary build of lsof, or do I have to
compile it on my own ?

Regards,
Emil

Keith

unread,
May 28, 2008, 8:08:58 AM5/28/08
to

Egrama

unread,
May 28, 2008, 6:19:39 PM5/28/08
to

> Triedhttp://www.unix.ms/pcp?
>
> K


Thanks - I know about pfiles, but the script you pointed is more
useful.
Unfortunately we have some standard scripts on all servers which parse
the output of lsof and I would like to get a new lsof instead of
modifying those scripts


Message has been deleted

Dan McDonald

unread,
May 29, 2008, 10:41:08 AM5/29/08
to
In article <e6baaad3-7ce1-4afb...@e53g2000hsa.googlegroups.com>,

Egrama <egr...@gmail.com> wrote:
>Hi all,
>
>After patching a Solaris 10 SPARC box (now the kernel is
>Generic_127111-09), lsof seems not able to show TCP related
>information. I get a messages like this:
>oracle 13757 oracle 14u IPv4 TCP no TCP/UDP/IP
>information available
<SNIP!>

Kernel data structure changes mean you have to recompile utilities like lsof.

Have you tried using pfiles(1) on the oracle process? I believe even S10
pfiles(1) will show AF_INET{,6} socket information:

kebe(common/net)[1]% pfiles 5025
5025: ssh <REDACTED #1>
Current rlimit: 256 file descriptors
0: S_IFCHR mode:0620 dev:336,0 ino:42705677 uid:31063 gid:7 rdev:24,1
O_RDWR
/dev/pts/1
1: S_IFCHR mode:0620 dev:336,0 ino:42705677 uid:31063 gid:7 rdev:24,1
O_RDWR
/dev/pts/1
2: S_IFCHR mode:0620 dev:336,0 ino:42705677 uid:31063 gid:7 rdev:24,1
O_RDWR
/dev/pts/1
3: S_IFDOOR mode:0444 dev:345,0 ino:59 uid:0 gid:0 size:0
O_RDONLY|O_LARGEFILE FD_CLOEXEC door to nscd[139]
/var/run/name_service_door
4: S_IFSOCK mode:0666 dev:343,0 ino:13335 uid:0 gid:0 size:0
O_RDWR|O_NONBLOCK
SOCK_STREAM
SO_KEEPALIVE,SO_SNDBUF(1048576),SO_RCVBUF(1050624)
sockname: AF_INET <REDACTED #2> port: 45258
peername: AF_INET <REDACTED #3 == IP of REDACTED #1> port: 22
5: S_IFDOOR mode:0644 dev:345,0 ino:52 uid:0 gid:0 size:0
O_RDONLY FD_CLOEXEC door to keyserv[398]
/var/run/rpc_door/rpc_100029.1
6: S_IFCHR mode:0620 dev:336,0 ino:42705677 uid:31063 gid:7 rdev:24,1
O_RDWR
/dev/pts/1
7: S_IFCHR mode:0620 dev:336,0 ino:42705677 uid:31063 gid:7 rdev:24,1
O_RDWR
/dev/pts/1
8: S_IFCHR mode:0620 dev:336,0 ino:42705677 uid:31063 gid:7 rdev:24,1
O_RDWR
/dev/pts/1
--
Daniel L. McDonald - Solaris Security & Networking Engineering
Mail: dan...@sun.com | * MY OPINIONS ARE NOT NECESSARILY SUN'S! *
35 Network Drive Burlington, MA |"rising falling at force ten
http://blogs.sun.com/danmcd/ | we twist the world and ride the wind" - Rush

0 new messages