Minutes of the 2nd Dec 2010 Teleconference Austin-506 Page 1 of 1 Submitted by Andrew Josey, The Open Group. December 5 , 2010 Attendees Andrew Josey, The Open Group Don Cragun, PASC OR Mark Brown, IBM, TOG OR Jim Pugsley, Oracle Geoff Clare, The Open Group Eric Blake, Red Hat Nick Stoughton, USENIX, ISO/IEC OR We discussed the status of the PASC Chair. We still need to check who the voting members of the SEC are. Once we have determined that its likely we need to issue a call for nominations. * We picked up on regular Bug processing Bug 346 ceil and floor OPEN http://austingroupbugs.net/view.php?id=346 Eric requested to leave this item open for now, so he can rewrite a proposed resolution. Bug 343 ftok cleanups Accepted as marked http://austingroupbugs.net/view.php?id=343 An interpretation is required, also the item is tagged for TC1-2008. Interpretation response The standard is unclear on this issue, and no conformance distinction can be made between alternative implementations based on this. This is being referred to the sponsor. Rationale: None. Notes to the Editor (not part of this interpretation): At line 32087 [XSH ftok DESCRIPTION], change "existing file that the process is able to stat()" to: existing file that the process is able to stat(), with the exception that if stat() would fail with EOVERFLOW due to file size, ftok() shall still succeed. After line 32100 [XSH ftok ERRORS], add a new paragraph: [EIO] An error occurred while reading from the file system. Delete lines 32119-32128 [XSH ftok EXAMPLES] (the body of the first example, and the title of the second), leaving just the second example under the title "Getting an IPC Key". Bug 351 certain shell special built-ins should expand arguments in assignment context OPEN http://austingroupbugs.net/view.php?id=351 We need to add a summary of the latest discussions on the mailing list. For now this item is left open. Bug 354 limit on the number of owned robust mutexes OPEN http://austingroupbugs.net/view.php?id=354 The view was that adding an error EAGAIN as a shall fail , but not a system limit would be a possible future enhancement. This would not be a TC1 item. Action: Mark Brown will write up a proposal. Bug 355 header descriptions say sockaddr structures must be cast (instead of pointers) Accept http://austingroupbugs.net/view.php?id=355 This has been tagged for TC1-2008 Bug 338 Standardization on useful make macros Reject http://austingroupbugs.net/view.php?id=338 The Working Group discussed and considered this proposal, but ultimately felt that there was no consensus for standardization. Implementations are free to add these functions as extensions, if desired. Bug 337 Add standard support for "!=" (macro shell assignment) in make OPEN http://austingroupbugs.net/view.php?id=337 This issue was discussed, but consensus was that issue 0000330 must be resolved first before this issue can be resolved. Some notes were added to the bug to reflect key discussions from the mailing list. Bug 336 Add recursive variable indirection in makefiles Accepted http://austingroupbugs.net/view.php?id=336 An interpretation is required. This item also should be considered for TC1-2008 if the interpretation is approved. Interpretation response The standard clearly states that the results are unspecified, and conforming applications must conform to this. Rationale: All known implementations have implemented the proposed action, and therefore this interpretation is being considered for TC1. Notes to the Editor (not part of this interpretation): See desired action. If this interpretation is approved without objection, the editor is encouraged to include this action in the next published Technical Corrigendum. Next Steps ---------- The next call will be on Dec 2nd at 09:00 Pacific and will continue processing defect reports. This call will be for the regular 90 minutes. http://austingroupbugs.net See the calendar for the list of dialup numbers. An IRC channel will be available for the meeting irc://irc.freestandards.org #austin ICAL: http://www.google.com/calendar/ical/nvctqtstkuni3fab9k3jqtrt4g@group.calendar.google.com/public/basic XML: http://www.google.com/calendar/feeds/nvctqtstkuni3fab9k3jqtrt4g@group.calendar.google.com/public/basic