Oracle Binary ($ORACLE_HOME/bin/oracle) Group Ownership DBAs normally don't worry about the oracle binary's group ownership. Either oinstall or dba is fine. But beginning with a certain version (maybe 12c), on servers using ASM for storage, Oracle starts to enforce some role separation even against your willingness, and the group ownership now matters. If the group ownership is messed up, launching certain tools, notably DBCA, DBUA (for upgrade) and "srvctl start", will change the group ownership of DB_HOME/bin/oracle, *with absolutely no regard to* a running instance; an instance that is running this oracle binary will hang, with this error in alert.log: ORA-27140: attach to post/wait facility failed ORA-27300: OS system dependent operation:invalid_egid failed with status: 1 ORA-27301: OS failure message: Operation not permitted ORA-27302: failure occurred at: skgpwinit6 ORA-27303: additional information: startup egid = 1001 (oinstall), current egid = 1002 (dba) The clean solution is to bounce the instance, or instances if multiple. But as a temporary workaround in emergency, you can manually run `chgrp' to change the group back immediately, e.g.: chgrp 1001 oracle #"startup egid" in alert.log, or if not in alert.log yet, run `grep ^Gid /proc//status' where is pid of a process such as pmon chmod 6751 oracle #chgrp will remove setgid and setuid bits, so put them back on with this command, or `chmod u+s oracle; chmod g+s oracle' ls -l oracle #should show mode -rwsr-s--x If you apply the above emergency workaround, remember to change group ownership to the correct one (1002 in the example, or the result of the first command shown below) when you have a chance to shut down the instance (instances) in the future. I have developed two commands to check for this vulnerability on databases that use ASM as storage: grep "define SS_ASM_GRP" $(awk -F: '/^+ASM/{print $2}' /etc/oratab)/rdbms/lib/config.c | cut -d" " -f3 for i in $(egrep -v '^#|+ASM|+APX|-MGMTDB' /etc/oratab | awk -F: '/:/{print $2}' | sort | uniq); do ls -l $i/bin/oracle; done The first command checks the defined group for GI (i.e. GRID) ownership. The second command checks the group ownership of all the DB_Home/bin/oracle binaries. The rule is that the first and second checks must match. Otherwise, when you next run DBCA, DBUA, or `srvctl start' database or instance (but not stop or any other action of srvctl), the tool will change the DB oracle binary's group to match the GI group. You can grep setasmgidwrap in the tool's log files in e.g. $ORACLE_BASE/cfgtoollogs/dbca//trace.log* $ORACLE_BASE/cfgtoollogs/dbua/upgrade