Minutes of the 16th May 2019 Teleconference Austin-933 Page 1 of 1 Submitted by Andrew Josey, The Open Group. 16th May 2019 Attendees: Andrew Josey, The Open Group Nick Stoughton, USENIX, ISO/IEC JTC 1/SC 22 OR Don Cragun, IEEE PASC OR Geoff Clare, The Open Group Joerg Schilling, FOKUS Fraunhofer Eric Blake, Red Hat, The Open Group OR Mark Ziegast, SHware Systems Dev. Apologies: None. * General news A reminder that there is no meeting on the 27th May as its a holiday in the US and UK. Andrew took an action to invite Joe Gwinn to the 23rd May meeting Andrew took an action to email the draft PAR and PMC criteria to the PASC SEC. * Outstanding actions (Please note that this section has been flushed to shorten the minutes - to locate the previous set of outstanding actions, look to the minutes from 9 March 2018 and earlier) Bug 1077: Recommend support for wide-character regcomp and regexec and/or specify multi-byte behavior OPEN http://austingroupbugs.net/bug_view_page.php?bug_id=1077 Andrew has completed the action to ping his Apple contact and is awaiting a reply. Bug 1122: POSIX should include gettext() and friends OPEN http://austingroupbugs.net/view.php?id=1122 Left open as an action is still in progress to flesh out a complete proposal. Bug 1218: Add reallocarray() OPEN http://austingroupbugs.net/view.php?id=1218 Action: Eric to ask if The Open Group is willing to sponsor this interface. A full set of changes would need to be developed. Bug 1219: snprintf requirement to fail when n > INT_MAX conflicts with C OPEN http://austingroupbugs.net/view.php?id=1219 Action: Nick (on his return) to ask C committee for guidance, whether an n > INT_MAX but less than SIZE_MAX, where SIZE_MAX is between, inclusively, INT_MAX+1 and UINT_MAX (or higher on 64-bit architectures) may be a preemptive reason to fail the interface, without examining any other arguments. Bug 1220: Add an API to query the name of a locale category of a locale object OPEN http://austingroupbugs.net/view.php?id=1220 Action: Eric to ask if The Open Group is willing to sponsor this interface. * Current Business Bug 1226: shell can not test if a file is text Accepted as Marked http://austingroupbugs.net/bug_view_page.php?bug_id=1226 This item is tagged for TC3-2008. An interpretation is required. The issue of whether the shell should permit non-text files as input has been split into the separate 0001250 Interpretation response: The standard is unclear on this issue, and no conformance distinction can be made between alternative implementations based on this. This is being referred to the sponsor. Rationale: The shell Input File definition states "The input file shall be a text file, except that line lengths shall be unlimited." This conflicts with the requirements stated here. Some current implementations do not make any check here, others use a simple heuristic to determine if the file may be a script. Notes to the Editor (not part of this interpretation): At page 2368 line 75615, replace: If the executable file is not a text file, the shell may bypass this command execution. with The shell may apply a heuristic check to determine if the file to be executed could be a script and may bypass this command execution if it determines that the file cannot be a script. In this case, it shall write an error message, and shall return an exit status of 126. Note: A common heuristic for rejecting files that cannot be a script is locating a NUL byte prior to a byte within a fixed-length prefix of the file. Since sh is required to accept input files with unlimited line lengths, the heuristic check cannot be based on line length. Next Steps ---------- The next calls are on: May 20 2019 (Monday) This call will be for 60 minutes. May 23 2019 (Thursday) This call will be for 90 minutes. Calls are anchored on US time. (8am Pacific) Please check the calendar invites for new dial in details. Apologies in advance: None http://austingroupbugs.net An etherpad is usually up for the meeting, with a URL using the date format as below: https://posix.rhansen.org/p/201x-mm-dd username=posix password=2115756#