Mageia Bugzilla – Attachment 8338 Details for
Bug 19103
Plasma screen locker does not let non-local users unlock screen (PAM issue?)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
Log In
[x]
|
New Account
|
Forgot Password
ltrace -f -o kcheckpass.out /usr/lib64/kde4/libexec/kcheckpass on Mageia 5
kcheckpass.out (text/plain), 2.64 KB, created by
David Walser
on 2016-08-12 18:35:54 CEST
(
hide
)
Description:
ltrace -f -o kcheckpass.out /usr/lib64/kde4/libexec/kcheckpass on Mageia 5
Filename:
MIME Type:
Creator:
David Walser
Created:
2016-08-12 18:35:54 CEST
Size:
2.64 KB
patch
obsolete
>11666 __libc_start_main(0x555bcfca06d0, 1, 0x7ffe1735f718, 0x555bcfca1650 <unfinished ...> >11666 fcntl(1, 3, 0x7ffe1735f728, 0x555bcfca1650) = 0x8002 >11666 fcntl(2, 3, 0x7ffe1735f728, 0x7f063aa39b87) = 0x8002 >11666 isatty(0) = 1 >11666 getopt(1, 0x7ffe1735f718, "hc:m:U:S:") = -1 >11666 getenv("KDE_PAM_ACTION") = nil >11666 getenv("KCHECKPASS_USER") = nil >11666 getuid() = 326005117 >11666 getenv("LOGNAME") = "dwalser" >11666 getpwnam("dwalser") = 0x7f063ad03120 >11666 __strdup(0x555bd1673010, 0x7f063aacdbff, -112, 0x7ffe1735f4b0) = 0x555bd1675120 >11666 geteuid() = 326005117 >11666 openlog("kcheckpass", 1, 32) = <void> >11666 pam_start(0x555bcfca1af8, 0x555bd1675120, 0x555bcfea31c0, 0x7ffe1735f4b0) = 0 >11666 ttyname(0) = "/dev/pts/1" >11666 pam_set_item(0x555bd1675190, 3, 0x555bd1687150, 0x7f063aa38fd5) = 0 >11666 pam_set_item(0x555bd1675190, 10, 0x555bcfca1260, 0x312f7374702f76) = 0 >11666 pam_authenticate(0x555bd1675190, 0, 0x555bcfca1260, 0x7f063ad0c3f8 <unfinished ...> >11666 calloc(1, 16) = 0x555bd1690ea0 >11666 getpass("Password: ") = "password" >11666 __strdup(0x555bd1692190, 0, 0x7f063ad00d18, 0) = 0x555bd1691f50 >11666 strlen("password") = 8 >11666 memset(0x555bd1692190, '\0', 8) = 0x555bd1692190 >11669 --- Called exec() --- >11669 __libc_start_main(0x400a70, 1, 0x7ffe12f1b348, 0x400fb0 <unfinished ...> >11669 openlog("tcb_chkpwd", 3, 32) = <void> >11669 isatty(0) = 0 >11669 isatty(1) = 0 >11669 read(0, "nullok", 8) = 8 >11669 strcmp("nullok", "nullok") = 0 >11669 read(0, "dwalser", 255) = 17 >11669 read(0, "", 238) = 0 >11669 getpwnam("dwalser") = 0x7ff96ad20120 >11669 endpwent() = <void> >11669 getuid() = 326005117 >11669 strcmp("*", "*NP*") = -78 >11669 __strdup(0x1458018, 0x4010c1, 1, 78) = 0x145a120 >11669 free(0x145a120) = <void> >11669 write(1, "\001", 4) = 4 >11669 +++ exited (status 1) +++ >11666 --- SIGCHLD (Child exited) --- >11666 <... pam_authenticate resumed> ) = 3 >11666 pam_end(0x555bd1675190, 3, 0x136e717d, 0x7f063aa39db0) = 0 >11666 __cxa_finalize(0x555bcfea31a8, 0, 0, 1) = 0x7f063ad022b0 >11666 +++ exited (status 2) +++
11666 __libc_start_main(0x555bcfca06d0, 1, 0x7ffe1735f718, 0x555bcfca1650 <unfinished ...> 11666 fcntl(1, 3, 0x7ffe1735f728, 0x555bcfca1650) = 0x8002 11666 fcntl(2, 3, 0x7ffe1735f728, 0x7f063aa39b87) = 0x8002 11666 isatty(0) = 1 11666 getopt(1, 0x7ffe1735f718, "hc:m:U:S:") = -1 11666 getenv("KDE_PAM_ACTION") = nil 11666 getenv("KCHECKPASS_USER") = nil 11666 getuid() = 326005117 11666 getenv("LOGNAME") = "dwalser" 11666 getpwnam("dwalser") = 0x7f063ad03120 11666 __strdup(0x555bd1673010, 0x7f063aacdbff, -112, 0x7ffe1735f4b0) = 0x555bd1675120 11666 geteuid() = 326005117 11666 openlog("kcheckpass", 1, 32) = <void> 11666 pam_start(0x555bcfca1af8, 0x555bd1675120, 0x555bcfea31c0, 0x7ffe1735f4b0) = 0 11666 ttyname(0) = "/dev/pts/1" 11666 pam_set_item(0x555bd1675190, 3, 0x555bd1687150, 0x7f063aa38fd5) = 0 11666 pam_set_item(0x555bd1675190, 10, 0x555bcfca1260, 0x312f7374702f76) = 0 11666 pam_authenticate(0x555bd1675190, 0, 0x555bcfca1260, 0x7f063ad0c3f8 <unfinished ...> 11666 calloc(1, 16) = 0x555bd1690ea0 11666 getpass("Password: ") = "password" 11666 __strdup(0x555bd1692190, 0, 0x7f063ad00d18, 0) = 0x555bd1691f50 11666 strlen("password") = 8 11666 memset(0x555bd1692190, '\0', 8) = 0x555bd1692190 11669 --- Called exec() --- 11669 __libc_start_main(0x400a70, 1, 0x7ffe12f1b348, 0x400fb0 <unfinished ...> 11669 openlog("tcb_chkpwd", 3, 32) = <void> 11669 isatty(0) = 0 11669 isatty(1) = 0 11669 read(0, "nullok", 8) = 8 11669 strcmp("nullok", "nullok") = 0 11669 read(0, "dwalser", 255) = 17 11669 read(0, "", 238) = 0 11669 getpwnam("dwalser") = 0x7ff96ad20120 11669 endpwent() = <void> 11669 getuid() = 326005117 11669 strcmp("*", "*NP*") = -78 11669 __strdup(0x1458018, 0x4010c1, 1, 78) = 0x145a120 11669 free(0x145a120) = <void> 11669 write(1, "\001", 4) = 4 11669 +++ exited (status 1) +++ 11666 --- SIGCHLD (Child exited) --- 11666 <... pam_authenticate resumed> ) = 3 11666 pam_end(0x555bd1675190, 3, 0x136e717d, 0x7f063aa39db0) = 0 11666 __cxa_finalize(0x555bcfea31a8, 0, 0, 1) = 0x7f063ad022b0 11666 +++ exited (status 2) +++
View Attachment As Raw
Actions:
View
Attachments on
bug 19103
:
8337
| 8338