[Bug 2856] key-options.sh fails when pty /dev/ttyp1 is not owned by testing user
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Sun Aug 26 23:07:53 AEST 2018
https://bugzilla.mindrot.org/show_bug.cgi?id=2856
Taketo Kabe <openssh at vega.pgw.jp> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |---
--- Comment #4 from Taketo Kabe <openssh at vega.pgw.jp> ---
Tried out the OpenSSH-7.8;
I'm still bitten by this bug/feature.
Steps to reproduce: make t-exec
Workaround: Do "ssh localhost", logout, then run the tests
The longer output of the regress/failed-sshd.log:
====
debug3: receive packet: type 98
debug1: server_input_channel_req: channel 0 request pty-req reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: Allocating pty.
debug3: mm_request_send entering: type 28
debug3: mm_request_receive entering
debug3: monitor_read: checking request 28
debug3: mm_answer_pty entering
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
chown(/dev/ttyp2, 901, 4) failed: Operation not permitted
====
The pty_setowner() is called from monitor.c:mm_answer_pty() route.
I have found out that my OS do have openpty(3), so the
test exclusion fix wasn't working.
I get some feeling that this couldn't be easily fixed, so
I will use the workaround for now.
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list