Mageia Bugzilla – Attachment 8337 Details for
Bug 19103
Plasma screen locker does not let non-local users unlock screen (PAM issue?)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
Log In
[x]
|
New Account
|
Forgot Password
ltrace -f /usr/libexec/kcheckpass on Cauldron
kcheckpass.out (text/plain), 1.54 KB, created by
David Walser
on 2016-08-12 18:33:39 CEST
(
hide
)
Description:
ltrace -f /usr/libexec/kcheckpass on Cauldron
Filename:
MIME Type:
Creator:
David Walser
Created:
2016-08-12 18:33:39 CEST
Size:
1.54 KB
patch
obsolete
>4596 __libc_start_main(0x4013b0, 1, 0x7ffe7838d928, 0x401f30 <unfinished ...> >4596 prctl(4, 0, 0x7ffe7838d938, 0) = 0 >4596 fcntl(1, 3, 0x7ffe7838d938, 0x7ff93ec6867a) = 0x8002 >4596 fcntl(2, 3, 0x7ffe7838d938, 0x7ff93ec57d47) = 0x8002 >4596 isatty(0) = 1 >4596 getopt(1, 0x7ffe7838d928, "hc:m:U:S:") = -1 >4596 getenv("KCHECKPASS_USER") = nil >4596 getuid() = 326005117 >4596 getenv("LOGNAME") = "dwalser" >4596 getpwnam("dwalser") = 0x7ff93ef21e00 >4596 __strdup(0xc31010, 0x7ff93ecec54e, -104, 0x7ffe7838d6d0) = 0xc33130 >4596 geteuid() = 326005117 >4596 getpwnam("dwalser") = 0x7ff93ef21e00 >4596 getspnam(0xc33130, 0x7ff93ecec54e, -104, 0x7ffe7838d6b0) = 0 >4596 getpass("Password: ") = "password" >4596 __strdup(0xc33810, 0, 0x7ff93ef1fb98, 0) = 0xc335e0 >4596 strlen("password") = 8 >4596 memset(0xc33810, '\0', 8) = 0xc33810 >4596 crypt("password", "*") = "*0" >4596 strcmp("*", "*0") = -48 >4596 free(0xc335e0) = <void> >4596 __vfprintf_chk(0x7ff93ef20560, 1, 0x402478, 0x7ffe7838d688) = 23 >4596 openlog("kcheckpass", 1, 32) = <void> >4596 __syslog_chk(5, 1, 0x402340, 0xc33130) = 0 >4596 +++ exited (status 1) +++
4596 __libc_start_main(0x4013b0, 1, 0x7ffe7838d928, 0x401f30 <unfinished ...> 4596 prctl(4, 0, 0x7ffe7838d938, 0) = 0 4596 fcntl(1, 3, 0x7ffe7838d938, 0x7ff93ec6867a) = 0x8002 4596 fcntl(2, 3, 0x7ffe7838d938, 0x7ff93ec57d47) = 0x8002 4596 isatty(0) = 1 4596 getopt(1, 0x7ffe7838d928, "hc:m:U:S:") = -1 4596 getenv("KCHECKPASS_USER") = nil 4596 getuid() = 326005117 4596 getenv("LOGNAME") = "dwalser" 4596 getpwnam("dwalser") = 0x7ff93ef21e00 4596 __strdup(0xc31010, 0x7ff93ecec54e, -104, 0x7ffe7838d6d0) = 0xc33130 4596 geteuid() = 326005117 4596 getpwnam("dwalser") = 0x7ff93ef21e00 4596 getspnam(0xc33130, 0x7ff93ecec54e, -104, 0x7ffe7838d6b0) = 0 4596 getpass("Password: ") = "password" 4596 __strdup(0xc33810, 0, 0x7ff93ef1fb98, 0) = 0xc335e0 4596 strlen("password") = 8 4596 memset(0xc33810, '\0', 8) = 0xc33810 4596 crypt("password", "*") = "*0" 4596 strcmp("*", "*0") = -48 4596 free(0xc335e0) = <void> 4596 __vfprintf_chk(0x7ff93ef20560, 1, 0x402478, 0x7ffe7838d688) = 23 4596 openlog("kcheckpass", 1, 32) = <void> 4596 __syslog_chk(5, 1, 0x402340, 0xc33130) = 0 4596 +++ exited (status 1) +++
View Attachment As Raw
Actions:
View
Attachments on
bug 19103
: 8337 |
8338