From farmdua!dog!dk@crocodil.monolit.kiev.ua  Sat Dec 16 17:07:55 1995
Received: from relay5.UU.NET (relay5.UU.NET [192.48.96.15])
          by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id RAA15103
          for <FreeBSD-gnats-submit@freebsd.org>; Sat, 16 Dec 1995 17:07:54 -0800 (PST)
Received: from uucp4.UU.NET by relay5.UU.NET with SMTP 
	id QQzuky21337; Sat, 16 Dec 1995 20:07:52 -0500 (EST)
Received: from uanet.UUCP by uucp4.UU.NET with UUCP/RMAIL
        ; Sat, 16 Dec 1995 20:07:52 -0500
Received: by crocodil.monolit.kiev.ua; Sun, 17 Dec 95 03:05:41 +0200
Received: (from dk@localhost) by dog.farm.org (8.6.11/dk#3) id CAA04377; Sun, 17 Dec 1995 02:29:19 +0200
Message-Id: <199512170029.CAA04377@dog>
Date: Sun, 17 Dec 1995 02:29:19 +0200
From: Dmitry Kohmanyuk <dk@dog.farm.org>
Reply-To: dk@farm.org
To: FreeBSD-gnats-submit@freebsd.org
Subject: cannot watch the slattach'ed tty
X-Send-Pr-Version: 3.2

>Number:         897
>Category:       kern
>Synopsis:       cannot watch(1) the slattach(1)'ed tty
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          closed
>Quarter:
>Keywords:
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sat Dec 16 17:10:01 PST 1995
>Closed-Date:    Tue Feb 6 18:23:44 PST 1996
>Last-Modified:  Tue Feb  6 18:25:03 PST 1996
>Originator:     Dmitry Kohmanyuk
>Release:        FreeBSD 2.0-BUILT-19950603 i386
>Organization:
FARM Computing Association
>Environment:

	

uname -a:
FreeBSD dog.farm.org 2.0.5-RELEASE FreeBSD 2.0.5-RELEASE #20: Sat Dec  2 14:58:22 EET 1995     dk@dog.farm.org:/usr/src/sys/compile/FARM  i386

	V.32bis external modem.
	PCI board, ISA serial card, no FIFO.
	real SLIP connection (no slip emulator)

>Description:

	

the watch(1) over a line used by slattach cannot be run; syslog diagnostics:

Dec 17 02:19:27 dog /kernel: Snoop: bad attached tty data.


>How-To-Repeat:

	

# script to start slip:
HOST=monolit
PORT=/dev/cuaa1
export HOST PORT

slattach -c -h -s 38400 -z -r "/etc/slip/slipchat $PORT $HOST" \
	 $PORT 

# slipchat script:
# usage: $0 port host
port=$1
host=$2
logger -t slipchat -p kern.notice slipchat to $host on $port

iport=`echo $port | sed -e 's/\([a-z][0-9]*\)$/i\1/'`
stty <$iport cs8 -istrip -parenb cread crtscts
chat -v -f /etc/slip/chat/$host <$port >$port && \
 /etc/slip/config/$host 0 0 

# chat script:
(not shown, hopefully irrelevant)

# slip/config script:
:
# called as: $0 old-sl# new-sl#
#SRC=193.124.54.195
#DEST=193.124.54.227
SRC=193.124.48.230
DEST=193.124.48.241
NETMASK=0xffffffe0
logger -p kern.notice -t slip-config "slip sl$1 connected ($SRC -> $DEST)"
ifconfig sl$1 down
ifconfig sl$2 inet $SRC $DEST netmask $NETMASK
ifconfig sl$2 up
route add default $DEST

>Fix:
	
	I don't know.
	

>Release-Note:
>Audit-Trail:

From: Bruce Evans <bde@zeta.org.au>
To: FreeBSD-gnats-submit@freebsd.org, dk@dog.farm.org
Cc:  Subject: Re: kern/897: cannot watch the slattach'ed tty
Date: Sun, 17 Dec 1995 17:05:58 +1100

 >>Description:
 
 >the watch(1) over a line used by slattach cannot be run; syslog diagnostics:
 
 >Dec 17 02:19:27 dog /kernel: Snoop: bad attached tty data.
 
 Snooping is only implemented for the standard line discipline.
 
 Bruce
State-Changed-From-To: open->closed 
State-Changed-By: pst 
State-Changed-When: Tue Feb 6 18:23:44 PST 1996 
State-Changed-Why:  
There are currently no plans to implement snooping of ttys with 
non-standard line disciplines. 
>Unformatted:
