Sounds sort of related to the bug you mentioned in your release notes but this was a clean install not an upgrade. <br><br>Regards<br>Charlie<br><br>------------------------------------------------------------------------------------------------------------------------------------------<br>
<br>FYI<br><br>SELinux is preventing /usr/sbin/ns-slapd from read access on the lnk_file /var/lock.<br><br>***** Plugin restorecon (94.8 confidence) suggests *************************<br><br>If you want to fix the label. <br>
/var/lock default label should be var_lock_t.<br>Then you can run restorecon.<br>Do<br># /sbin/restorecon -v /var/lock<br><br>***** Plugin catchall_labels (5.21 confidence) suggests ********************<br><br>If you want to allow ns-slapd to have read access on the lock lnk_file<br>
Then you need to change the label on /var/lock<br>Do<br># semanage fcontext -a -t FILE_TYPE '/var/lock'<br>where FILE_TYPE is one of the following: abrt_t, lib_t, root_t, device_t, ld_so_t, proc_t, textrel_shlib_t, rpm_script_tmp_t, dirsrv_t, var_lock_t, cert_t, usr_t, device_t, devlog_t, var_run_t, locale_t, etc_t, proc_t, dirsrv_config_t, var_run_t, var_run_t. <br>
Then execute: <br>restorecon -v '/var/lock'<br><br><br>***** Plugin catchall (1.44 confidence) suggests ***************************<br><br>If you believe that ns-slapd should be allowed read access on the lock lnk_file by default.<br>
Then you should report this as a bug.<br>You can generate a local policy module to allow this access.<br>Do<br>allow this access for now by executing:<br># grep ns-slapd /var/log/audit/audit.log | audit2allow -M mypol<br>
# semodule -i mypol.pp<br><br>Additional Information:<br>Source Context unconfined_u:system_r:dirsrv_t:s0<br>Target Context system_u:object_r:var_t:s0<br>Target Objects /var/lock [ lnk_file ]<br>
Source ns-slapd<br>Source Path /usr/sbin/ns-slapd<br>Port <Unknown><br>Host <a href="http://f15.test.net">f15.test.net</a><br>
Source RPM Packages 389-ds-base-1.2.10-0.4.a4.fc15<br>Target RPM Packages filesystem-2.4.41-1.fc15<br>Policy RPM selinux-policy-3.9.16-24.fc15<br>Selinux Enabled True<br>
Policy Type targeted<br>Enforcing Mode Enforcing<br>Host Name <a href="http://f15.test.net">f15.test.net</a><br>Platform Linux <a href="http://f15.test.net">f15.test.net</a> 2.6.38.6-27.fc15.x86_64 #1 SMP<br>
Sun May 15 17:23:28 UTC 2011 x86_64 x86_64<br>Alert Count 3<br>First Seen Fri 21 Oct 2011 01:28:21 AM BST<br>Last Seen Fri 21 Oct 2011 07:29:38 AM BST<br>
Local ID <br><br>Raw Audit Messages<br>type=AVC msg=audit(1319178578.723:176): avc: denied { read } for pid=26931 comm="ns-slapd" name="lock" dev=dm-1 ino=1281 scontext=unconfined_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=lnk_file<br>
<br><br>type=SYSCALL msg=audit(1319178578.723:176): arch=x86_64 syscall=open success=no exit=EACCES a0=7fff9b184460 a1=c2 a2=1a4 a3=0 items=0 ppid=1 pid=26931 auid=500 uid=492 gid=490 euid=492 suid=492 fsuid=492 egid=490 sgid=490 fsgid=490 tty=(none) ses=4 comm=ns-slapd exe=/usr/sbin/ns-slapd subj=unconfined_u:system_r:dirsrv_t:s0 key=(null)<br>
<br>Hash: ns-slapd,dirsrv_t,var_t,lnk_file,read<br><br>audit2allow<br><br>#============= dirsrv_t ==============<br>allow dirsrv_t var_t:lnk_file read;<br><br>audit2allow -R<br><br>#============= dirsrv_t ==============<br>
allow dirsrv_t var_t:lnk_file read;<br><br><br>