Rod,
    Thanks for the quick reply. I have asked the
customer to make sure crle is not being invoked
in a startup script. If the file is being modified,
should they be able to ls -l on the file before
the shutdown and then ls -l (or something similar)
and compare to demonstrate the file is being
manipulated. Is there a way to track or identify who/what
may be modifying the file?

    Thanks,
    Dennis


On 09/11/08 11:17, Rod Evans wrote:
> Dennis P Van Eron wrote:
>> Hi ,
>> Please reply directly to me as I am not on this alias.
>> I have a customer that executes the following crle command
>>
>> crle -l /lib:/usr/lib:/usr/sfw/lib -s /opt/iplanet/ims-6.2/lib -u ?v
>> and when he excutes crle command he sees the following
>> # crle
>> Command line:
>> crle -c /var/ld/ld.config -l /lib:/usr/lib:/usr/sfw/lib -s
>> /lib/secure:/usr/lib/secure:/opt/iplanet/ims-6.2/lib
>>
>> So all looks ok?
>>
>> The he reboots the system and executes the crle command again
>> # crle
>> Command line:
>> crle -c /var/ld/ld.config -l /lib:/usr/lib:/usr/sfw/lib
>>
>> So it seems that the -s (Specify a new trusted directory)
>> works but is not persistent through a reboot.
>> Should it be?
>> Is this a bug?
>> Or is he executing the crle utility incorrectly.
>
> The only time a configuration file will change is when someone
> uses crle(1) to do it.  And, there's nothing in a standard
> Solaris reboot (that I'm aware of) that would reset, or alter
> a configuration file.
>
> Are you sure someone hasn't added to a startup script a crle
> command that is simply setting /usr/sfw/lib and thus "overriding"
> your changes?
>
>


Reply via email to