Ludovic Courtès wrote:
Hi,

Dan McMahill <[EMAIL PROTECTED]> writes:

I'll bet thats whats going on with NetBSD as well.  My failed tests
are all inside a chroot environment.

Well, we *could* modify the file port write (i.e., `fport_print ()') so
that it doesn't fail when `ttyname' does, if that's a common problem.

Or you could set up a chroot jail where `/dev/pts/*' are visible, if
that's the source of the problem.


ok, I think this much smaller test case is instructive:

#include <stdio.h>
#include <unistd.h>

int main(int argc, char **argv)
{
        int fd = 0;
        char *n;

        printf ("isatty(%d) = %d\n", fd, isatty (fd));

        n = ttyname (fd);
        printf ("ttyname(%d) = \"%s\"\n", fd, n != NULL ? n : "unknown");

        return 0;
}


SunOS-5.9/sparc

chroot:

isatty(0) = 1
ttyname(0) = "unknown"

no chroot:

isatty(0) = 1
ttyname(0) = "/dev/pts/32"


NetBSD-2/alpha

chroot:

isatty(0) = 1
ttyname(0) = "unknown"

no chroot:

isatty(0) = 1
ttyname(0) = "/dev/ttyp2"

NetBSD-4/i386

chroot:

isatty(0) = 1
ttyname(0) = "/dev/ttyp2"

no chroot:

isatty(0) = 1
ttyname(0) = "/dev/ttyp1"


Wierd that the NetBSD-4 box doesn't seem to care about being in the chroot jail.




_______________________________________________
Guile-user mailing list
Guile-user@gnu.org
http://lists.gnu.org/mailman/listinfo/guile-user

Reply via email to