← Back to team overview

touch-packages team mailing list archive

[Bug 523896] Re: useradd: cannot lock /etc/passwd; try again later.

 

W: Failed to fetch
http://ppa.launchpad.net/bzr/ppa/ubuntu/dists/wily/main/source/Sources
404  Not Found

W: Failed to fetch
http://ppa.launchpad.net/bzr/ppa/ubuntu/dists/wily/main/binary-
amd64/Packages  404  Not Found

W: Failed to fetch
http://ppa.launchpad.net/bzr/ppa/ubuntu/dists/wily/main/binary-i386/Packages
404  Not Found

E: Some index files failed to download. They have been ignored, or old
ones used instead.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/523896

Title:
  useradd: cannot lock /etc/passwd; try again later.

Status in shadow package in Ubuntu:
  Fix Released
Status in shadow source package in Precise:
  Fix Released
Status in shadow source package in Quantal:
  Fix Released

Bug description:
  Binary package hint: postfix

  Ubuntu 9.10, via Update Manager.

  SOLUTION:

  Look for /etc/group.lock, /etc/passwd.lock and /etc/shadow.lock files
  and remove them.

  Be careful to only remove the files ending in 'lock' or else you might
  damage your system.

  Please do not add comments just containing "Me too", instead please provide any information that could indicate why the files were locked:
   * the list of locked files:
      ls /etc/passwd.lock /etc/shadow.lock /etc/group.lock /etc/gshadow.lock

   * check the /var/log/auth.log for any message that could indicate the
  failure of any other tool (prior to the failure which reported the
  locked file)

   * any abnormal operation on the machine (reset, shutdown while the
  computer is still running)

  == SRU template ==

  [IMPACT]

   * Locked files prevent adding/removing/modifying system users & groups
   * This can result in failure to upgrade/remove packages that use system user names
   * The applied fix is to clear the locks on booting.

  [TESTCASE]

   * $ sudo touch /etc/passwd.lock
   * $ sudo adduser testing523896
   * FAIL
   * Upgrade to new package
   * $ sudo adduser testing523896
   * FAIL
   * $ sudo reboot (or shutdown & poweron machine in any other way)
   * $ sudo adduser testing523896
   * PASS

   * Also you can touch the locks, check that they are there and run `$
  sudo start passwd` to clear them.

  [Regression Potential]

   * We are adding an extra job which will always run at boot, which will have a tiny impact  on boot performance
   
   * The new job can be mis-used directly via `$ sudo start passwd`, but root user could clear the locks in the exact same way as well, before introducing this upstart job.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/523896/+subscriptions