* [Bug 84701] New: execve(2) manual page ".sh" usage exposes implementation detail
@ 2014-09-17 0:15 bugzilla-daemon-590EEB7GvNiWaY/ihj7yzEB+6BGkLq7r
[not found] ` <bug-84701-11311-3bo0kxnWaOQUvHkbgXJLS5sdmw4N0Rt+2LY78lusg7I@public.gmane.org/>
0 siblings, 1 reply; 2+ messages in thread
From: bugzilla-daemon-590EEB7GvNiWaY/ihj7yzEB+6BGkLq7r @ 2014-09-17 0:15 UTC (permalink / raw)
To: linux-man-u79uwXL29TY76Z2rM5mHXA
https://bugzilla.kernel.org/show_bug.cgi?id=84701
Bug ID: 84701
Summary: execve(2) manual page ".sh" usage exposes
implementation detail
Product: Documentation
Version: unspecified
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P1
Component: man-pages
Assignee: documentation_man-pages-ztI5WcYan/vQLgFONoPN62D2FQJk+8+b@public.gmane.org
Reporter: erlkonig-kJfcqb9dmRFg9hUCZPvPmw@public.gmane.org
Regression: No
This content:
We can also use these programs to demonstrate the use of a script
interpreter. To do this we create a script whose "interpreter" is our
myecho program:
$ cat > script.sh
#! ./myecho script-arg
^D
$ chmod +x script.sh
We can then use our program to exec the script:
$ ./execve ./script.sh
argv[0]: ./myecho
argv[1]: script-arg
argv[2]: ./script.sh
argv[3]: hello
argv[4]: world
Should probably instead read:
We can also use these programs to demonstrate the use of a script
interpreter. To do this we create a script whose "interpreter" is our
myecho program:
$ cat > script
#!./myecho script-arg
^D
$ chmod +x script
We can then use our program to exec the script:
$ ./execve ./script
argv[0]: ./myecho
argv[1]: script-arg
argv[2]: ./script
argv[3]: hello
argv[4]: world
Rationale:
1) Command name extensions considered harmful: Adding ".sh", or any other
unneeded extension, unnecessarily duplicates meta information already present
in the interpreter directive, exposing an implementation detail that then ends
up explicitly part of other programs running this one. Later, when such a
script is replaced with a new version in Python, C, etc., the useless ".sh" has
to be retained to avoid breaking those other programs' calls to this one, and
now has a stark antifunction of lying about the script's content and
occasionally causing admins to run undefined experiments as root (like "bash
-x ./reallyperlscript.sh"). Such extensions, while fine in DOS which ignores
extensions explicitly, is a serious flaw in Unix-targeted script writing.
Canonical documentation from the Linux manual should not support such a flawed
idiom - recommending against it would be preferred.
A more extensive rant against them can be found at:
http://www.talisman.org/~erlkonig/documents/commandname-extensions-considered-harmful
2) The space after "#!" in the interpreter directive is minor - and the
kernel's fs/binfmt_script.c specifically allows for it - but versions of unix
have length limits from ~30 characters to linux's 127 or so (if that number's
correct) so the space does have a cost. Most scripts I've seen lack that
space, and there's no real reason to encourage it.
--
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2014-09-23 4:23 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-09-17 0:15 [Bug 84701] New: execve(2) manual page ".sh" usage exposes implementation detail bugzilla-daemon-590EEB7GvNiWaY/ihj7yzEB+6BGkLq7r
[not found] ` <bug-84701-11311-3bo0kxnWaOQUvHkbgXJLS5sdmw4N0Rt+2LY78lusg7I@public.gmane.org/>
2014-09-23 4:23 ` [Bug 84701] " bugzilla-daemon-590EEB7GvNiWaY/ihj7yzEB+6BGkLq7r
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).