lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <797361b7-cf6c-d3b4-c6a7-1ab2da7f4f42@gmail.com>
Date:   Fri, 11 Oct 2019 23:23:21 +0200
From:   "Michael Kerrisk (man-pages)" <mtk.manpages@...il.com>
To:     lkml <linux-kernel@...r.kernel.org>
Cc:     mtk.manpages@...il.com
Subject: man-pages-5.03 is released

Gidday,

The Linux man-pages maintainer proudly announces:

    man-pages-5.03 - man pages for Linux

This release resulted from patches, bug reports, reviews, and
comments from 45 people, with over 200 commits making changes
to around 80 pages.

Tarball download:
    http://www.kernel.org/doc/man-pages/download.html
Git repository:
    https://git.kernel.org/cgit/docs/man-pages/man-pages.git/
Online changelog:
    http://man7.org/linux/man-pages/changelog.html#release_5.03

A short summary of the release is blogged at:
https://linux-man-pages.blogspot.com/2019/10/man-pages-503-is-released.html

The current version of the pages is browsable at:
http://man7.org/linux/man-pages/

A selection of changes in this release that may be of interest
to readers of LKML is shown below.

Cheers,

Michael

==================== Changes in man-pages-5.03 ====================


New and rewritten pages
-----------------------

pidfd_open.2
    Michael Kerrisk  [Christian Brauner, Florian Weimer, Daniel Colascione]
        New page documenting pidfd_open(2)

pidfd_send_signal.2
    Michael Kerrisk  [Florian Weimer, Christian Brauner]
        New page documenting pidfd_send_signal(2)

pivot_root.2
    Michael Kerrisk  [Eric W. Biederman, Reid Priedhorsky, Philipp Wendler]
        This page has been completely rewritten, adding a lot of missing
        details (including the use of pivot_root(".", ".")) and an example
        program.  In addition, the text prevaricating on whether or not
        pivot_root() might change the root and current working directories has
        been eliminated, and replaced with a simple description of the behavior
        of the system call, which has not changed for 19 years, and will not
        change in the future.  Many longstanding errors in the old version of
        the page have also been corrected.

ipc_namespaces.7
    Michael Kerrisk
        New page with content migrated from namespaces(7)

uts_namespaces.7
    Michael Kerrisk
        New page with content migrated from namespaces(7)


Newly documented interfaces in existing pages
---------------------------------------------

clone.2
    Christian Brauner, Michael Kerrisk
        Document CLONE_PIDFD
            Add an entry for CLONE_PIDFD. This flag is available starting
            with kernel 5.2. If specified, a process file descriptor
            ("pidfd") referring to the child process will be returned in
            the ptid argument.

fanotify_mark.2
    Jakub Wilk
        Document FAN_MOVE_SELF

ptrace.2
    Dmitry V. Levin  [Michael Kerrisk]
        Document PTRACE_GET_SYSCALL_INFO

regex.3
    Rob Landley
        Document REG_STARTEND


Changes to individual pages
---------------------------

mmap.2
    Nikola Forró
        Fix EINVAL conditions
            Since introduction of MAP_SHARED_VALIDATE, in case flags contain
            both MAP_PRIVATE and MAP_SHARED, mmap() doesn't fail with EINVAL,
            it succeeds.

            The reason for that is that MAP_SHARED_VALIDATE is in fact equal
            to MAP_PRIVATE | MAP_SHARED.

mount.2
    Michael Kerrisk  [Reid Priedhorsky]
        Describe the concept of "parent mounts"

rt_sigqueueinfo.2
    Michael Kerrisk
        Note that 'si_code' can't be specified as SI_KERNEL
    Michael Kerrisk
        The rules for 'si_code' don't apply when sending a signal to oneself
            The restriction on what values may be specified in 'si_code'
            apply only when sending a signal to a process other than the
            caller itself.
signalfd.2
    Andrew Clayton, Michael Kerrisk
        Note about interactions with epoll & fork

mount_namespaces.7
    Michael Kerrisk
        Explain how a namespace's mount point list is initialized
            Provide a more detailed explanation of the initialization of
            the mount point list in a new mount namespace.
    Michael Kerrisk  [Eric W. Biederman]
        Clarify description of "less privileged" mount namespaces

signal.7
    Michael Kerrisk
        Enhance the text on process-directed and thread-directed signals
            clone(2) has a good description of these concepts; borrow
            from it liberally.

user_namespaces.7
    Michael Kerrisk
        Improve explanation of  meaning of ownership of nonuser namespaces


-- 
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ