All
Enclosed are the minutes of this weeks meeting
regards
Andrew
________​​


Minutes of the 8th January 2026 Teleconference    Austin-1475 Page 1 of 1
Submitted by Andrew Josey, The Open Group.        9th January 2026

Attendees:
    Andrew Josey, The Open Group (partial)
    Haelwenn Monnier, The Open Group
    Nick Stoughton, USENIX, ISO/IEC JTC 1/SC 22 OR
    Geoff Clare, The Open Group
    Eric Ackermann, CISPA
    Eric Blake, Red Hat, The Open Group OR
    Mark Brown

* General business

We confirmed the calendar for upcoming meetings, the next meeting
is January 15th , 2026

Andrew noted that he has an IEEE MSC meeting coming up and had
submitted a status report to it, however he had failed to mention
the vacancy for the IEEE Organizational representative.
Andrew will raise it verbally in the meeting, that we are looking
for a representative noting that we are looking for someone with
technical expertise to represent IEEE.


* Carried Forward

Bug 1927: Add sponge utility
https://www.austingroupbugs.net/view.php?id=1927

[Action to Eric B] Start a 30-day request for comments on whether The Open 
Group should sponsor the addition of this interface.

glibc realloc() behavior

[Action to Eric B] - respond to the thread and invite Alejandro to
open a bug against POSIX if we still need to address wording issues

Update 2025-06-26: discussion on mailing lists is still ongoing;
EricB or Alejandro will open a bug soon

Bug 1941: Add widely-implemented options to grep
https://www.austingroupbugs.net/view.php?id=1941

We understand Mirabilos runs a custom distribution of BSD:
http://www.mirbsd.org/about.htm

http://www.mirbsd.org/htman/i386/man1/grep.htm
ACTION: David Wheeler to do more research and update the bug before
next meeting

* New Business

Bug 1960: fcntl(): add F_DUPFD_CLOFORKEXEC flag OPEN
https://www.austingroupbugs.net/view.php?id=1960

This issue was discussed in the Jan 8, 2026 teleconference and the
consensus was that this is a valid way to resolve the noted potential
race condition; however we are unclear that there is enough existing
practice to validate adding this change to the standard at the
current time. The attendees also recommended that a better name
than "CLOBOTH" be used, as it implies only two conditions when there
may be more in the future. Perhaps "CLOCOMPLETE" would work. Another
approach might be to add "F_DUPFD_SETFLAGS" which takes as a fourth
argument a bitmask of FD_xxx flags to set.


Bug 1961: assert.h lacks static_assert macro
https://www.austingroupbugs.net/view.php?id=1961
Accepted as marked, interp required, tc1-2024 tag

Interpretation response:
The standard clearly states "This volume of POSIX.1-2024 defers to
the ISO C standard" on the <assert.h> page (and elsewhere), and
conforming implementations must conform to this.

Rationale:
Omission of the static_assert macro was an oversight in Austin Group
Defect 1302. However, because the standard defers to C17 on the
contents of the <assert.h> header, conforming implementations are
required to define static_assert as described in C17.

Notes to the Editor (not part of this interpretation):
After line 7988 add a new paragraph:

    The <assert.h> header shall define the static_assert macro which
    shall expand to _Static_assert.

Action: Andrew to start the interpretation timer
Completed after the meeting.


Bug 1963: sccs create should use get
https://www.austingroupbugs.net/view.php?id=1963
Accept as marked, Interpretation required, tc1-2024 tag

Interpretation response:
The standard does not speak to this issue, and as such no conformance
distinction can be made between alternative implementations based
on this. This is being referred to the sponsor.

Rationale:
Although the standard does not specify what should happen after a
new file is created in SCCS, all known implementations perform a
"get".

Notes to the Editor (not part of this interpretation):

Change p3351, lines 113921-113924 from
    Create an SCCS file, taking the initial contents from the file
    of the same name. Any options to admin are accepted. If the
    creation is successful, the original files shall be renamed by
    prefixing the basenames with a comma. These renamed files should
    be removed after it has been verified that the SCCS files have
    been created successfully.
to:
    Create SCCS files, taking the initial contents from each of the
    filename operands of the same name. Any options to admin shall
    be accepted. If the creation is successful, the original files
    shall be renamed by prefixing the basenames with a comma and
    get shall be used to generate new versions. The renamed files
    should be removed after it has been verified that the SCCS files
    have been created successfully.

ACTION: Andrew Josey to start interp timer.
Completed after the meeting./

Bug 1964: <aio.h> doesn't seem to need pthread_attr_t.
https://www.austingroupbugs.net/view.php?id=1964
Rejected, closed

struct sigevent (which <aio.h> is required to define) has a member of type 
pthread_attr_t.


Bug 1965: Why isn't pthread_equal async-signal safe? OPEN
https://www.austingroupbugs.net/view.php?id=1965


* Next Steps

We will start at bug 1965 next time.

Bugs to return to,  bugs  1949, 1616, 1941.

The next call is on
    Thu 2026-01-15 (WEBEX meeting - general bugs)

Apologies in advance:
        Geoff Clare 2026-01-29

The calls are for 90 minutes

Calls are anchored on US time. (8am Pacific)


Please check the calendar invites for dial in details.

Bugs are at:
https://austingroupbugs.net

An etherpad is usually up for the meeting, with a URL using the date
format as below:

https://posix.rhansen.org/p/20xx-mm-dd

(For write access this uses The Open Group single sign on,
for those individuals with gitlab.opengroup.org accounts.
Please contact Andrew if you need to be setup)





--------

Andrew Josey                  The Open Group
Austin Group Chair
Email: [email protected]<mailto:[email protected]>
Apex Plaza, Forbury Road,Reading,Berks.RG1 1AX,England

To learn how we maintain your privacy, please review The Open Group Privacy 
Statement at http://www.opengroup.org/privacy.
To unsubscribe/opt-out from this mailing list login to The Open Group 
collaboration portal at
https://collaboration.opengroup.org/operational/portal.php?action=unsub&listid=2481



Reply via email to