Solved

logging in without /dev/ttyX? or general slackware question?

Posted on 1998-07-01
2
304 Views
Last Modified: 2013-12-05
while fixing the kernel to my laptop (slackware 3.5 <2.0.30>), i added the line "/sbin/depmod -a" to my /etc/rc.S file. the problem that i encountered was that i was using a precompiled version of microEMACS that (unknown) to me changed the permissions on rc.S to 700.

so now when i boot up linux can't find the rc.S file, and when i try and log on i get:
        unable to change tty '/dev/tty1' for user 'root'
        unable to change tty /dev/tty1: Bad file number

so is there a way to log into linux with using a tty device?
it is not networked, i was hoping to try sunglu user mode but that fails as well.

one solution that i've seen is that on somewhat related redhat problems, ths user can start a reinstall of the OS, but when asked to do so <ctrl-z> and mount the drive and fix the problem. so if there is not a way to boot into linux i guess i'll be giving that a try.

erik
0
Comment
Question by:errorik
2 Comments
 
LVL 2

Accepted Solution

by:
richrussell earned 70 total points
ID: 1637484
Yep, you should have a boot and a root floppy for Slackware. You can boot these, and ctrl-z out after you've chosen the location on your root partition. This will have mounted it for you, but not necessarily in an obvious place!

Now you should be able to use ls, cd, etc.. to find your broken file and fix it. You probably won't have any editors available beyond sed, but you can substitute the correct line for the duff one, or just remove it altogether.

I've done this (too) many times with an older version of Slackware, but I doubt they've changed the installer that much.

It's the same with RedHat 4.1, you wait until it says 'in second stage install' then dump out with ctrl-z
0
 

Author Comment

by:errorik
ID: 1637485
what i ended up doing was just loading the bootdisk, and when it asked for extra parameters i just had it mount my root partition.

ohterwise the fix that i applied (that caused the problem) didn't work so it was all for naught.

thanks, though.
erik
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Kali Linux store / persist wireless password 3 49
Mysql Crashing Intermittently 16 83
How to learn Linux? 10 44
Use CRON to save a copy of an open file 1 23
1. Introduction As many people are interested in Linux but not as many are interested or knowledgeable (enough) to install Linux on their system, here is a safe way to try out Linux on your existing (Windows) system. The idea is that you insta…
Fine Tune your automatic Updates for Ubuntu / Debian
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now