Sponsored Content
Full Discussion: Run fsck from standard login
Operating Systems Solaris Run fsck from standard login Post 302151177 by Smiling Dragon on Thursday 13th of December 2007 06:21:04 PM
Old 12-13-2007
Do you mean you've chown'ed this new filesystem to the user?
If you want to allow them to fsck the volume, it'd suggest using sudo so they can mount, unmount and fsck the relevant device/mount point.

It's a little wierd needing to give user's this power though, if you turn on logging on the filesystem, you shouldn't need to run fsck ever really.

Edit:
Another option would be to write a setuid shell script that does the unmount, fsck and mount again for them. Set it to be owned by root, executable by users in a particular group (but not world) and add the user to that group. You'll have to be jolly careful with the script though - setuid root is always dangerous if you are not very thorough doing your taint checking

Last edited by Smiling Dragon; 12-13-2007 at 07:26 PM.. Reason: Another idea
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Standard login shell

Hello By default for root the login shell is /bin/sh. In the file /etc/passwd I changed it to /bin/bash. (/bin/bash does exists!) After I logged out and in again I still have /bin/sh as the shell and not /bin/bash. Are the more files to be edited? I am using SCO-Unix. I am thankfull for any... (4 Replies)
Discussion started by: Fwurm
4 Replies

2. UNIX for Dummies Questions & Answers

run fsck on swap slice?

Hi.. i am using sun solaris...and this is the filesystem information... you can see th slice(swap) c0t0d0s1 is giving some absord information......and during rebooting it is asking to run fsck mnually..when i run fsck manually it is giving error incorrect starting and end header...smthing like... (1 Reply)
Discussion started by: Prafulla
1 Replies

3. Solaris

fsck run

Hi, Can anybody tell me that is it the command "fsck" can be run by the root account only? Thanks. (2 Replies)
Discussion started by: efang
2 Replies

4. HP-UX

fsck! How to run Full File System Check

Dear all I am new for HP-UX. I have HP rp2470 running HP-UX 10.x When i run fsck in a root, the output is as below: #:root> fsck fsck: /dev/vg00/rlvol1: mounted file system continue (y/n)? y ** /dev/vg00/rlvol1 ** Last Mounted on /stand ** Phase 1 - Check Blocks and Sizes ** Phase... (3 Replies)
Discussion started by: hungevntelecom
3 Replies

5. UNIX for Dummies Questions & Answers

Having a run fsck manually problem...

so i am pretty dumb when it comes to unix. but i am in the navy and the system i work on is unix based. and we have come across this problem. COULD NOT FIX FILE SYSTEM WITH fsck -P, RUN fsck INTERACTIVELY! LOGGING IN AS root FOR MANUAL fsk, ENTER ^D WHEN FILE SYSTEM FIXED (in bcheckrc)# ... (4 Replies)
Discussion started by: afouts
4 Replies

6. HP-UX

fsck doesn't work - not even run?

Hi, please consider, I'm pretty new to HP-UX, thanks. Our server (rp7420 with HP-UX 11.31) has crashed due to disk write error (not boot partition). So I replaced damaged device with the new one of the same size and performed dd copy 1:1 to restore data - vxfs partition "/dev/vg01/lvol1"... (4 Replies)
Discussion started by: Morhoo
4 Replies

7. UNIX for Dummies Questions & Answers

Run fsck on root file system

If i run fsck on one filesystem and fsck need to repair some things then this partition must be unmounted correct ? So running fsck on root file system isn't possible within same OS ? correct ? What is the best way to do that, live cd ? BR, Jurif (5 Replies)
Discussion started by: jurif
5 Replies

8. Solaris

Not able to run fsck on root file system

I am trying to root disk mirroring on SunFire V210 Server. There are two disks on this server c1t0d0 and c1t1d0 . I completed all the steps and I updated the vfstab file too. After I have updated the vfstab file I run df -h command but could not see the changes i made in vfstab. Suddenly the server... (1 Reply)
Discussion started by: newbi8321
1 Replies

9. Solaris

unable to repair the / filesystem. Run fsck manually (fsck -F ufs /dev/rdsk/c1t0d0s0)

What can I fix this issue? I have ran below commands but everything is same.:confused: WARNING: Last shutdown is later than time on time-of-day chip: check date. The / file system (/dev/rdsk/c1t0d0s0) is being checked WARNING - unable to repair the / filesystem. Run fsck manually (fsck -F... (4 Replies)
Discussion started by: getrue
4 Replies

10. Solaris

Disk corruption? Cant run fsck....

NOTICE: /: unexpected free inode 45262, run fsck(1M) fsck: cannot open vfstab Looks like /etc/vfstab (and a few other files has gone) Any ideas? Boot from cd, mount disk and recreate vfstab so that I can run fsck? (1 Reply)
Discussion started by: psychocandy
1 Replies
ftpusers(4)															       ftpusers(4)

NAME
ftpusers - file listing users to be disallowed ftp login privileges SYNOPSIS
/etc/ftpd/ftpusers The ftpusers file lists users for whom ftp login privileges are disallowed. Each ftpuser entry is a single line of the form: name where name is the user's login name. The FTP Server, in.ftpd(1M), reads the ftpusers file. If the login name of the user matches one of the entries listed, it rejects the login attempt. The ftpusers file has the following default configuration entries: root daemon bin sys adm lp uccp nuucp smmsp listen nobody noaccess nobody4 These entries match the default instantiated entries from passwd(4). The list of default entries typically contains the superuser root and other administrative and system application identities. The root entry is included in the ftpusers file as a security measure since the default policy is to disallow remote logins for this iden- tity. This policy is also set in the default value of the CONSOLE entry in the /etc/default/login file. See login(1). If you allow root login privileges by deleting the root entry in ftpusers, you should also modify the security policy in /etc/default/login to reflect the site security policy for remote login access by root. Other default entries are administrative identities that are typically assumed by system applications but never used for local or remote login, for example sys and nobody. Since these entries do not have a valid password field instantiated in shadow(4), no login can be per- formed. If a site adds similar administrative or system application identities in passwd(4) and shadow(4), for example, majordomo, the site should consider including them in the ftpusers file for a consistent security policy. Lines that begin with # are treated as comment lines and are ignored. /etc/ftpd/ftpusers A file that lists users for whom ftp login privileges are disallowed. /etc/ftpusers See /etc/ftpd/ftpusers. This file is deprecated, although its use is still supported. /etc/default/login /etc/passwd password file /etc/shadow shadow password file See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWftpr | +-----------------------------+-----------------------------+ |Interface Stability |External | | | | | /etc/ftpd/ftpusers | | +-----------------------------+-----------------------------+ |Interface Stability |Obsolete | | | | | /etc/ftpusers | | +-----------------------------+-----------------------------+ login(1), in.ftpd(1M), ftpaccess(4), ftphosts(4), passwd(4), shadow(4), attributes(5), environ(5) 1 May 2003 ftpusers(4)
All times are GMT -4. The time now is 01:30 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy