From owner-freebsd-hackers@FreeBSD.ORG Tue Feb 26 15:17:28 2008 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id E8B841065673 for ; Tue, 26 Feb 2008 15:17:28 +0000 (UTC) (envelope-from tevans.uk@googlemail.com) Received: from fk-out-0910.google.com (fk-out-0910.google.com [209.85.128.188]) by mx1.freebsd.org (Postfix) with ESMTP id 7DDD613C46A for ; Tue, 26 Feb 2008 15:17:28 +0000 (UTC) (envelope-from tevans.uk@googlemail.com) Received: by fk-out-0910.google.com with SMTP id b27so2785919fka.11 for ; Tue, 26 Feb 2008 07:17:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:received:received:subject:from:to:cc:in-reply-to:references:content-type:date:message-id:mime-version:x-mailer; bh=2PUOa3MOT4GKj7VEqNZri3tUV5JV21jrNWtUmWwN7Bo=; b=bk7AJMffuSy1KvZFHpljwNDv1VhHXxZo8e0Vv0BgDJd2TUIBMELhklpx8tT/VoYJjHDHm3sDIJ7Y+jNQHhq70GkRLn3AY7vaenwMYzPkdv31H+VLHLLTv7GR6be4sJAagCy6ckIpSAemvSyC8FN6GaRvcUT9iFPsksg0TCITDx0= DomainKey-Signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=subject:from:to:cc:in-reply-to:references:content-type:date:message-id:mime-version:x-mailer; b=nyFHgs+5LPeb5ojl8n6H238i2dTeg4u7DUtshxriVBjc/8GY68Pojai4iouSnyKnt5p3hG8FELfbGDEGC8OVnolzASs22wK8cQp3xfgGGWEeKhev+oYvGPqOL2nUbOFy+tJi2XG/9ZNjyzxM8OLFSW0oJSRzE3KlP8LXRInoccc= Received: by 10.82.162.14 with SMTP id k14mr9131265bue.35.1204039046766; Tue, 26 Feb 2008 07:17:26 -0800 (PST) Received: from ?127.0.0.1? ( [217.206.187.79]) by mx.google.com with ESMTPS id q9sm5390964gve.10.2008.02.26.07.17.24 (version=SSLv3 cipher=RC4-MD5); Tue, 26 Feb 2008 07:17:25 -0800 (PST) From: Tom Evans To: cali clarke In-Reply-To: <5a08be760802241042x2cd93d63of5787a744e745fe5@mail.gmail.com> References: <5a08be760802241042x2cd93d63of5787a744e745fe5@mail.gmail.com> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="=-eBeptl1kAAvBW3kBvHaW" Date: Tue, 26 Feb 2008 15:17:24 +0000 Message-Id: <1204039044.2126.121.camel@localhost> Mime-Version: 1.0 X-Mailer: Evolution 2.10.2 FreeBSD GNOME Team Port Cc: freebsd-hackers@freebsd.org Subject: Re: Anybody have a patch for pdksh derivatives, for jails? X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Feb 2008 15:17:29 -0000 --=-eBeptl1kAAvBW3kBvHaW Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Sun, 2008-02-24 at 19:42 +0100, cali clarke wrote: > Hi. >=20 > pdksh and derivatives (openbsd ksh, mirbsd mksh etc) all have > the same "bug" with regards to jails. On all of my systems, trying > to start *ksh in a jail results in a message that /dev/tty could > not be opened (device busy) and that the shell will not have > job control. For some reason, this makes pretty much any > curses or screen editor fail to run. >=20 > Note that also, this problem does NOT occur if you use ssh > to enter the jail as I believe ssh handles tty allocation in > advance. >=20 > I wondered if anybody had patched their *ksh to workaround > this problem? >=20 > I've had a look at the sources myself and... ugh. The insides > of a unix shell are not something I particularly want to spend > much time examining... Running something like 'jexec 1 /bin/sh' won't allow you to allocate a tty. If instead you enable sshd inside the jail, and ssh into the jail, sshd will allocate you a tty, and everything will work normally. HTH --=-eBeptl1kAAvBW3kBvHaW Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (FreeBSD) iD8DBQBHxC2BlcRvFfyds/cRAqgnAJ4lIDQGbxMN2eG58bR7mYA8F0WbYQCghwCK 0G7CqZ4VyPoqJLfxrEoYS3w= =FLJ0 -----END PGP SIGNATURE----- --=-eBeptl1kAAvBW3kBvHaW--