Hi all,
I recently committed a major @#&* up on my opensuse 42.2 box running kde 4.14, according to kde4-config. Intending to run
chmod -R 776 ./
as root, I ran
chmod -R 776 /
in error.
Once you’ve all finished rofl, some help recovering would be appreciated! I realised my error soon enough and caught it with Ctrl-C before it had got to e for /etc, but not before it had worked its way through /bin, /boot and /dev. By and large there seemed to have been no obviously calamitous consequences to this, but one odd side-effect is that I can no longer launch GUI apps as the root user. Specifically, I’m prompted for the root password as usual but it is not recognised.
As examples, in Konsole if I try to open a root tab I’m prompted for and enter a password, it hangs for a few seconds then the new tab disappears. With YaST, I get a Run As Root dialog box, this hangs for a few seconds then another dialog box appears including the text…
Permission denied.
Possibly incorrect password, please try again.
On some systems, you need to be in a special group (often: wheel) to use this program.
The same is true for any other GUI app that I attempt to run as root. I don’t know anything about the wheel group, but this has never been a problem prior to my, ahem, incident.
Fortunately, I can still access root by running
sudo su -
and the password is accepted, so I know the password itself is not the issue, and for this reason I suspect that I might have knocked out the executable bit on some helper app that acts as an agent for GUI programs but have no idea what that might be, or if I’m just plain wrong. I wondered if it might be kdesu, but I can still run this at the command line and I get the same Run as Root dialog box scenario described above.
So, I can work around a lot of things at the command line but not being able to access YaST is a severe handicap (YaST in text mode is not much fun). Does anyone have any ideas what I can do to fix this, or whether it would be fixed if I upgraded to 42.3?
Also worried about any other unseen consequences, vulnerabilities that might have been opened up etc. Any thoughts welcome.
Thanks
Rob