lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <83cfbc65-7524-5b26-11b3-6177b158c85d@gmail.com>
Date:   Mon, 2 Nov 2020 08:03:26 +0100
From:   "Michael Kerrisk (man-pages)" <mtk.manpages@...il.com>
To:     lkml <linux-kernel@...r.kernel.org>
Cc:     mtk.manpages@...il.com
Subject: man-pages-5.09 is released

Gidday,

The Linux man-pages maintainer proudly announces:

    man-pages-5.09 - man pages for Linux

This release resulted from patches, bug reports, reviews, and
comments from more than 40 people, with just over 500 commits making
changes to nearly 600 pages. Nine new pages have been added (six
of these are the result of splitting the rather unwieldy queue(3)
page into a number of small pieces). Special shout out to
Alejandro Colomar, who provided more than half (265!) of the commits.

Tarball download:
    http://www.kernel.org/doc/man-pages/download.html
Git repository:
    https://git.kernel.org/cgit/docs/man-pages/man-pages.git/
Online changelog:
    http://man7.org/linux/man-pages/changelog.html#release_5.09

A short summary of the release is blogged at:
https://linux-man-pages.blogspot.com/2020/11/man-pages-509-is-released.html

The current version of the pages is browsable at:
http://man7.org/linux/man-pages/

A selection of changes in this release that may be of interest
to readers of LKML is shown below.

Cheers,

Michael


==================== Changes in man-pages-5.09 ====================

New and rewritten pages
-----------------------

system_data_types.7
    Alejandro Colomar, Michael Kerrisk
        A new page documenting a wide range of system data types.

kernel_lockdown.7
    David Howells, Heinrich Schuchardt  [Michael Kerrisk]
        New page documenting the Kernel Lockdown feature


Newly documented interfaces in existing pages
---------------------------------------------

fanotify_init.2
fanotify.7
    Amir Goldstein  [Jan Kara, Matthew Bobrowski]
        Document FAN_REPORT_DIR_FID

fanotify_init.2
fanotify.7
    Amir Goldstein  [Jan Kara, Matthew Bobrowski]
        Document FAN_REPORT_NAME

statx.2
    Ira Weiny
        Add STATX_ATTR_DAX

strerror.3
    Michael Kerrisk
        Document strerrorname_np() and strerrordesc_np()

strsignal.3
    Michael Kerrisk
        Document sigabbrev_np() and sigdescr_np().

loop.4
    Yang Xu
        Document LOOP_CONFIGURE ioctl
    Yang Xu
        Document LO_FLAGS_DIRECT_IO flag

capabilities.7
    Michael Kerrisk
        Document the CAP_CHECKPOINT_RESTORE capability added in Linux 5.9

ip.7
    Stephen Smalley  [Paul Moore]
        Document IP_PASSSEC for UDP sockets

ip.7
socket.7
    Stephen Smalley
        Document SO_PEERSEC for AF_INET sockets
    Sridhar Samudrala
        Document SO_INCOMING_NAPI_ID

socket.7
unix.7
    Stephen Smalley  [Serge Hallyn, Simon McVittie]
        Add initial description for SO_PEERSEC


Changes to individual pages
---------------------------

clone.2
    Michael Kerrisk
        CAP_CHECKPOINT_RESTORE can now be used to employ 'set_tid'

epoll_ctl.2
    Michael Kerrisk
        epoll instances can be nested to a maximum depth of 5
            This limit appears to be an off-by-one count against
            EP_MAX_NESTS (4).
perf_event_open.2
    Alexey Budankov
        Update the man page with CAP_PERFMON related information

seccomp.2
    Michael Kerrisk  [Jann Horn]
        Warn reader that SECCOMP_RET_TRACE can be overridden
            Highlight to the reader that if another filter returns a
            higher-precedence action value, then the ptracer will not
            be notified.
    Michael Kerrisk  [Rich Felker]
        Warn against the use of SECCOMP_RET_KILL_THREAD
            Killing a thread with SECCOMP_RET_KILL_THREAD is very likely
            to leave the rest of the process in a broken state.

dlopen.3
    Michael Kerrisk
        Clarify DT_RUNPATH/DT_RPATH details
            It is the DT_RUNPATH/DT_RPATH of the calling object (not the
            executable) that is relevant for the library search. Verified
            by experiment.

loop.4
    Yang Xu
        Add some details about lo_flags

proc.5
    Michael Kerrisk
        Update capability requirements for accessing /proc/[pid]/map_files
    Jann Horn  [Mark Mossberg]
        Document inaccurate RSS due to SPLIT_RSS_COUNTING
    Michael Kerrisk
        Note "open file description" as (better) synonym for "file handle"

bpf-helpers.7
    Michael Kerrisk  [Jakub Wilk]
        Resync with current kernel source

capabilities.7
    Michael Kerrisk
        Under CAP_SYS_ADMIN, group "sub-capabilities" together
            CAP_BPF, CAP_PERFMON, and CAP_CHECKPOINT_RESTORE have all been
            added to split out the power of CAP_SYS_ADMIN into weaker pieces.
            Group all of these capabilities together in the list under
            CAP_SYS_ADMIN, to make it clear that there is a pattern to these
            capabilities.

fanotify.7
fanotify_mark.2
    Amir Goldstein  [Jan Kara, Matthew Bobrowski]
        Generalize documentation of FAN_REPORT_FID

-- 
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ