Date: Mon, 24 Apr 2006 06:30:53 GMT From: Alex Kozlov <spam@rm-rf.kiev.ua> To: freebsd-gnats-submit@FreeBSD.org Subject: bin/96248: vipw fail on RO /etc Message-ID: <200604240630.k3O6Ur01040436@www.freebsd.org> Resent-Message-ID: <200604240640.k3O6eBaR016325@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 96248 >Category: bin >Synopsis: vipw fail on RO /etc >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Apr 24 06:40:10 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Alex Kozlov >Release: FreeBSD 6.1-RC >Organization: private >Environment: FreeBSD localhost 6.1-RC FreeBSD i386 >Description: if rootfs mount as read-only, vipw fall to execute witch vipw: pw_tmp(): Read-only file system error. >How-To-Repeat: #mount |grep -w / /dev/da0s1 on / (ufs, local, read-only) #vipw vipw: pw_tmp(): Read-only file system >Fix: Change temporary file patch in pw_tmp() from if (snprintf(tempname, sizeof(tempname), "%.*spw.XXXXXX", (int)(p - masterpasswd), masterpasswd) >= (int)sizeof(tempname)) { to more appropriate? >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200604240630.k3O6Ur01040436>