From mboxrd@z Thu Jan 1 00:00:00 1970 From: bugzilla-daemon-590EEB7GvNiWaY/ihj7yzEB+6BGkLq7r@public.gmane.org Subject: [Bug 84701] execve(2) manual page ".sh" usage exposes implementation detail Date: Tue, 23 Sep 2014 04:23:32 +0000 Message-ID: References: Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: Sender: linux-man-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: linux-man-u79uwXL29TY76Z2rM5mHXA@public.gmane.org List-Id: linux-man@vger.kernel.org https://bugzilla.kernel.org/show_bug.cgi?id=84701 Michael Kerrisk changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org Resolution|--- |CODE_FIX --- Comment #1 from Michael Kerrisk --- Alex, thanks for the detailed report. I've applied the patch below. Cheers, Michael diff --git a/man2/execve.2 b/man2/execve.2 index 0b06974..dfa933b 100644 --- a/man2/execve.2 +++ b/man2/execve.2 @@ -729,10 +729,10 @@ program: .in +4n .nf -.RB "$" " cat > script.sh" -.B #! ./myecho script-arg +.RB "$" " cat > script" +.B #!./myecho script-arg .B ^D -.RB "$" " chmod +x script.sh" +.RB "$" " chmod +x script" .fi .in @@ -740,10 +740,10 @@ We can then use our program to exec the script: .in +4n .nf -.RB "$" " ./execve ./script.sh" +.RB "$" " ./execve ./script" argv[0]: ./myecho argv[1]: script-arg -argv[2]: ./script.sh +argv[2]: ./script argv[3]: hello argv[4]: world .fi -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-man" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html