Bug 162844

Summary: vipw and vigw are unusable, and complain about terminal input/output error
Product: [Fedora] Fedora Reporter: Gravis <philippe.lafoucriere>
Component: utempterAssignee: Mike A. Harris <mharris>
Status: CLOSED DUPLICATE QA Contact: David Lawrence <dkl>
Severity: medium Docs Contact:
Priority: medium    
Version: 4CC: ctilburg
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-07-28 15:26:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Gravis 2005-07-10 10:09:20 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050524 Fedora/1.0.4-4 Firefox/1.0.4

Description of problem:


I can't edit my password or group files using vigw and vipw.

Version-Release number of selected component (if applicable):
2.12p-9.5

How reproducible:
Always

Steps to Reproduce:
1. run vipw or vigw
2.
3.
  

Actual Results:  Vim: Warning: Output is not to a terminal
Vim: Warning: Input is not from a terminal

and all vim commands don't work :

/mysearch prints "/mysearch" and override text in file !
lucky :q works :)

Expected Results:  editing file with vim

Additional info:

also broken on a fresh install

Comment 1 Charles C. Van Tilburg 2005-07-28 13:38:42 UTC
selinux may have something to do with this as well... from messages:

Jul 28 08:13:41 beast kernel: audit(1122552821.987:3): avc:  denied  { search }
for  pid=2512 comm="vipw" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:41 beast kernel: audit(1122552821.988:4): avc:  denied  { search }
for  pid=2512 comm="vipw" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:41 beast kernel: audit(1122552821.988:5): avc:  denied  { search }
for  pid=2512 comm="vipw" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:42 beast kernel: audit(1122552822.190:6): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:42 beast kernel: audit(1122552822.192:7): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:42 beast kernel: audit(1122552822.193:8): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:42 beast kernel: audit(1122552822.193:9): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.196:10): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.196:11): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.197:12): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.197:13): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.197:14): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.198:15): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.199:16): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.199:17): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.199:18): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.200:19): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.201:20): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:44 beast kernel: audit(1122552824.217:21): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:44 beast kernel: audit(1122552824.217:22): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:44 beast kernel: audit(1122552824.218:23): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.218:24): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:45 beast kernel: audit(1122552825.240:25): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file


Comment 2 Charles C. Van Tilburg 2005-07-28 13:46:42 UTC
setenforce 0 causes vipw to work just fine...

Comment 3 Charles C. Van Tilburg 2005-07-28 14:59:06 UTC
bug 163303 deals with this as well...

Comment 4 Karel Zak 2005-07-28 15:26:37 UTC

*** This bug has been marked as a duplicate of 163303 ***