<div dir="ltr"><div><div>I have done chmod 777 to /dev, /dev/pty*, /dev/pts and /dev/pts/* and it didn't help. Must be something different from file access permits. Anybody has a clue of what run_erl does and requires?.<br></div>Thank you,<br></div>Ivan<br></div><div class="gmail_extra"><br><div class="gmail_quote">2014-09-25 10:41 GMT+02:00 Iván Martínez <span dir="ltr"><<a href="mailto:ivan.martinez@iberlang.com" target="_blank">ivan.martinez@iberlang.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Thank you. Looks like SELinux has nothing to do with the issue:<br><div><br>$ setenforce 0<br>setenforce: SELinux is disabled<br><br></div></div><div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">2014-09-25 3:21 GMT+02:00 zxq9 <span dir="ltr"><<a href="mailto:zxq9@zxq9.com" target="_blank">zxq9@zxq9.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div>On Wednesday 24 September 2014 21:00:32 Iván Martínez wrote:<br>
> Hello all,<br>
> Does anyone know why I'm having the following issue with a CentOS 7 system<br>
> with kernel 3.10.23?:<br>
><br>
> $ run_erl priv/ log "erl"<br>
> run_erl:187 [6505] Wed Sep 24 18:42:39 2014<br>
> errno=1 'Operation not permitted'<br>
> Could not open pty master<br>
><br>
> It works as super user. It also works in a Fedora 20 system with kernel<br>
> 3.16. I couldn't find any difference in user groups or /dev file permits<br>
> between both systems. Starting with a user with UID above or below UID_MIN<br>
> doesn't make any difference. I don't think it matters, but the only<br>
> difference I could find is that the CentOS has many /dev/pty* files already<br>
> created, while the Fedora doesn't have any.<br>
<br>
</div></div>You might be running into SELinux permission issues. To find out try doing<br>
"setenforce 0" and then running it again. If that works, use a tool like<br>
audit2allow or audit2why to create a policy that will permit the actions you<br>
require to run your program. I haven't kept up with the Fedora/RHEL world<br>
since 7 came out, but Dan Walsh's blog and Red Hat's SELinux docs have been<br>
good resources on this in the past.<br>
<br>
Of course, you might have a totally different issue, but SELinux booleans and<br>
audit logs are the first thing I check on a Fedora-type distro when something<br>
doesn't work but looks like it should.<br>
_______________________________________________<br>
erlang-questions mailing list<br>
<a href="mailto:erlang-questions@erlang.org" target="_blank">erlang-questions@erlang.org</a><br>
<a href="http://erlang.org/mailman/listinfo/erlang-questions" target="_blank">http://erlang.org/mailman/listinfo/erlang-questions</a><br>
</blockquote></div><br></div>
</div></div></blockquote></div><br></div>