Bug 162844
Summary: | vipw and vigw are unusable, and complain about terminal input/output error | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Gravis <philippe.lafoucriere> |
Component: | utempter | Assignee: | Mike A. Harris <mharris> |
Status: | CLOSED DUPLICATE | QA Contact: | David Lawrence <dkl> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 4 | CC: | ctilburg |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-07-28 15:26:37 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Gravis
2005-07-10 10:09:20 UTC
selinux may have something to do with this as well... from messages: Jul 28 08:13:41 beast kernel: audit(1122552821.987:3): avc: denied { search } for pid=2512 comm="vipw" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:41 beast kernel: audit(1122552821.988:4): avc: denied { search } for pid=2512 comm="vipw" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:41 beast kernel: audit(1122552821.988:5): avc: denied { search } for pid=2512 comm="vipw" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:42 beast kernel: audit(1122552822.190:6): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:42 beast kernel: audit(1122552822.192:7): avc: denied { search } for pid=2512 comm="vi" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:42 beast kernel: audit(1122552822.193:8): avc: denied { search } for pid=2512 comm="vi" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:42 beast kernel: audit(1122552822.193:9): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.196:10): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.196:11): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.197:12): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.197:13): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.197:14): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.198:15): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.199:16): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.199:17): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.199:18): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.200:19): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.201:20): avc: denied { search } for pid=2512 comm="vi" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:44 beast kernel: audit(1122552824.217:21): avc: denied { search } for pid=2512 comm="vi" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:44 beast kernel: audit(1122552824.217:22): avc: denied { search } for pid=2512 comm="vi" name="/" dev=hda3 ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t tclass=dir Jul 28 08:13:44 beast kernel: audit(1122552824.218:23): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:44 beast kernel: audit(1122552824.218:24): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file Jul 28 08:13:45 beast kernel: audit(1122552825.240:25): avc: denied { ioctl } for pid=2512 comm="vi" name="0" dev=devpts ino=2 scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t tclass=chr_file setenforce 0 causes vipw to work just fine... bug 163303 deals with this as well... |