Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Apr 2006 06:30:53 GMT
From:      Alex Kozlov <spam@rm-rf.kiev.ua>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   bin/96248: vipw fail on RO /etc
Message-ID:  <200604240630.k3O6Ur01040436@www.freebsd.org>
Resent-Message-ID: <200604240640.k3O6eBaR016325@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         96248
>Category:       bin
>Synopsis:       vipw fail on RO /etc
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon Apr 24 06:40:10 GMT 2006
>Closed-Date:
>Last-Modified:
>Originator:     Alex Kozlov
>Release:        FreeBSD 6.1-RC
>Organization:
private
>Environment:
FreeBSD localhost 6.1-RC FreeBSD i386
>Description:
if rootfs mount as read-only, vipw fall to execute witch vipw: pw_tmp(): Read-only file system error.
>How-To-Repeat:
#mount |grep -w /
/dev/da0s1 on / (ufs, local, read-only)

#vipw
vipw: pw_tmp(): Read-only file system
>Fix:
Change temporary file patch in pw_tmp() from

if (snprintf(tempname, sizeof(tempname), "%.*spw.XXXXXX",
        (int)(p - masterpasswd), masterpasswd) >= (int)sizeof(tempname)) {

to more appropriate?
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200604240630.k3O6Ur01040436>