"#!" scripts, kernel patches, and Xenix

Mark Zenier markz at ssc.UUCP
Fri Sep 16 03:00:16 AEST 1988


In article <405 at pigs.UUCP>, haugj at pigs.UUCP (The Beach Bum) writes:
> In article <858 at viscous> rosso at sco.COM (Ross Oliver) writes:
> >In article <161 at tessera.UUCP> jtc at tessera.UUCP (J.T. Conklin) writes:
> >>Has anyone patched the kernel exec routine to execute interpreter
> >>files ("#!" scripts)?
> >
> >The exec() function executes binaries only.  If exec() fails (which
> >it does on a shell script), then it is up to your shell to decide
> >what to do.
> 

Isn't the shell script check implemented in the library routine that
is linked in, and not the kernel.  This is what Rochkind says in
"Advanced Unix Programming".  This sounds much easier than disassembling
half of the kernel.

Mark Zenier	uunet!pilchuck!ssc!markz		
"He did decide, though, that with more time and a great deal of mental effort,
he could probably turn the activity into an acceptable perversion"-Mick Farren



More information about the Comp.unix.xenix mailing list