bin/96248: vipw fail on RO /etc
Alex Kozlov
spam at rm-rf.kiev.ua
Mon Apr 24 06:40:12 UTC 2006
>Number: 96248
>Category: bin
>Synopsis: vipw fail on RO /etc
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Mon Apr 24 06:40:10 GMT 2006
>Closed-Date:
>Last-Modified:
>Originator: Alex Kozlov
>Release: FreeBSD 6.1-RC
>Organization:
private
>Environment:
FreeBSD localhost 6.1-RC FreeBSD i386
>Description:
if rootfs mount as read-only, vipw fall to execute witch vipw: pw_tmp(): Read-only file system error.
>How-To-Repeat:
#mount |grep -w /
/dev/da0s1 on / (ufs, local, read-only)
#vipw
vipw: pw_tmp(): Read-only file system
>Fix:
Change temporary file patch in pw_tmp() from
if (snprintf(tempname, sizeof(tempname), "%.*spw.XXXXXX",
(int)(p - masterpasswd), masterpasswd) >= (int)sizeof(tempname)) {
to more appropriate?
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-bugs
mailing list