Bug 162844 - vipw and vigw are unusable, and complain about terminal input/output error
vipw and vigw are unusable, and complain about terminal input/output error
Status: CLOSED DUPLICATE of bug 163303
Product: Fedora
Classification: Fedora
Component: utempter (Show other bugs)
4
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Mike A. Harris
David Lawrence
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-07-10 06:09 EDT by Gravis
Modified: 2007-11-30 17:11 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-07-28 11:26:37 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Gravis 2005-07-10 06:09:20 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050524 Fedora/1.0.4-4 Firefox/1.0.4

Description of problem:


I can't edit my password or group files using vigw and vipw.

Version-Release number of selected component (if applicable):
2.12p-9.5

How reproducible:
Always

Steps to Reproduce:
1. run vipw or vigw
2.
3.
  

Actual Results:  Vim: Warning: Output is not to a terminal
Vim: Warning: Input is not from a terminal

and all vim commands don't work :

/mysearch prints "/mysearch" and override text in file !
lucky :q works :)

Expected Results:  editing file with vim

Additional info:

also broken on a fresh install
Comment 1 Charles C. Van Tilburg 2005-07-28 09:38:42 EDT
selinux may have something to do with this as well... from messages:

Jul 28 08:13:41 beast kernel: audit(1122552821.987:3): avc:  denied  { search }
for  pid=2512 comm="vipw" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:41 beast kernel: audit(1122552821.988:4): avc:  denied  { search }
for  pid=2512 comm="vipw" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:41 beast kernel: audit(1122552821.988:5): avc:  denied  { search }
for  pid=2512 comm="vipw" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:42 beast kernel: audit(1122552822.190:6): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:42 beast kernel: audit(1122552822.192:7): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:42 beast kernel: audit(1122552822.193:8): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:42 beast kernel: audit(1122552822.193:9): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.196:10): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.196:11): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.197:12): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.197:13): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.197:14): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.198:15): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.199:16): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.199:17): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.199:18): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.200:19): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.201:20): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:44 beast kernel: audit(1122552824.217:21): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:44 beast kernel: audit(1122552824.217:22): avc:  denied  { search }
for  pid=2512 comm="vi" name="/" dev=hda3 ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=system_u:object_r:home_root_t
tclass=dir
Jul 28 08:13:44 beast kernel: audit(1122552824.218:23): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:44 beast kernel: audit(1122552824.218:24): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Jul 28 08:13:45 beast kernel: audit(1122552825.240:25): avc:  denied  { ioctl }
for  pid=2512 comm="vi" name="0" dev=devpts ino=2
scontext=root:system_r:sysadm_passwd_t tcontext=root:object_r:devpts_t
tclass=chr_file
Comment 2 Charles C. Van Tilburg 2005-07-28 09:46:42 EDT
setenforce 0 causes vipw to work just fine...
Comment 3 Charles C. Van Tilburg 2005-07-28 10:59:06 EDT
bug 163303 deals with this as well...
Comment 4 Karel Zak 2005-07-28 11:26:37 EDT

*** This bug has been marked as a duplicate of 163303 ***

Note You need to log in before you can comment on or make changes to this bug.