Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1444531ybp; Fri, 11 Oct 2019 14:30:06 -0700 (PDT) X-Received: by 2002:a17:906:80cd:: with SMTP id a13mr16283618ejx.12.1570829166302; Fri, 11 Oct 2019 14:26:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqyvMWG11Pu9fp9nxCqWOPvWnAFSgAbDnJWd80wa53lrZd3fnlD2M9d7XvoOHFHpICf55S9s X-Received: by 2002:a17:906:80cd:: with SMTP id a13mr16283443ejx.12.1570829164502; Fri, 11 Oct 2019 14:26:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570829164; cv=none; d=google.com; s=arc-20160816; b=RJo820yX5yBYXAeN+cpj83p0Jtx022xFjsi1MbfEmpenjtXFlQEpkXlEH174y/Zjva vsfunawIBgVnvaM9ogS/t6/HLtQ/OnJoZcZLbaYxP3+GezokqAaw+sgKgXEB5WRG1TBj 7uRp+HBi/aPbrSgqNZ33AtZB1uwoMeXNieY4qTFA+tzcWSaXlewQPHheEvJIPD4IrWYT tuGmnMURlGt63Fi/dONNoV3kB1VzARtfAwyBLRAMMyMcQezyk4ZCNlsMlzvWkiAmszP1 91bFiCrwz8+R0XAOc9jpmsF+v9hyO0wELFOwpP4juYmfAWQNHZOdfVre4rmy4WgEumZ4 Fpbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject :from:to:cc:dkim-signature; bh=V5ajZ38hOut9b0P+xkh01BJ673dSZ4kdFVeJ1B8BNl0=; b=RU+uaJbPXmCwmcR8qHqt4co9UiMpXuefFt4GFSevJguNYSxV2DStYNeqL8VVSWpiUg 7N7m24K81uhJIYWVl6xtTzo6E4wF5oN2flT5Mm2XXfUkxfWqQGnkW+hyTZ4lW7513L/u K4urJiWsKsAzQZRCw/vJOF+t+j3fsCKl95UE6v27iERBM8aWJZgxq0ctdAbubrHM1oKr Qit+Q9Wcvo/YgQqxRFbKeXPw9k1d+Vg/WadFS4mq9J/nFmLs4vjrRJJj+uW31LX9Ub2t e5jp3ni3kmNICUPnGv2a9uBlUANtKo7i5Q924RTlhKMhDNd06x4RAtzINhiVX9Rs9RMU tmGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Q/q67Kmc"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d1si5947300edr.446.2019.10.11.14.25.38; Fri, 11 Oct 2019 14:26:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Q/q67Kmc"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728545AbfJKVXZ (ORCPT + 99 others); Fri, 11 Oct 2019 17:23:25 -0400 Received: from mail-wr1-f53.google.com ([209.85.221.53]:39557 "EHLO mail-wr1-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726843AbfJKVXZ (ORCPT ); Fri, 11 Oct 2019 17:23:25 -0400 Received: by mail-wr1-f53.google.com with SMTP id r3so13359332wrj.6 for ; Fri, 11 Oct 2019 14:23:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=cc:to:from:subject:message-id:date:user-agent:mime-version :content-language:content-transfer-encoding; bh=V5ajZ38hOut9b0P+xkh01BJ673dSZ4kdFVeJ1B8BNl0=; b=Q/q67KmceKy0NX2fm0ooIV0VMcL30di58a04UZo1MKmk4DS2czyAiZOn7jyalYXAH1 zekcUlrnGkUqV2GMnBVUelwbZIhZ5q4m1AfHX56YwMM7rkNg8MaRShWUqGBdA+CUhpJW Laut4NYsvOSASgemmKKyqWLFGyZXKoLR4bXHnJv3NsydYT9vV17wE2rR72jiPPLePgGa 5M4wAsMZnUhasKNIMS2v1/kkJRfpEtRwzw7itqbGkGKxjaVoESOg3s8GITB1bBEvuagn 3REZFejmLhYxgJdxtH1ToYWKi1+ZTl7m5VImgbOsSynNnt6pbJg7FVGjGTYZLGsl9ZQ0 8nsg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:cc:to:from:subject:message-id:date:user-agent :mime-version:content-language:content-transfer-encoding; bh=V5ajZ38hOut9b0P+xkh01BJ673dSZ4kdFVeJ1B8BNl0=; b=lChZohhYscTuTPz6PRw3NstjYkQ5lkOm79syQ39iaPU7XPm1yz+Zw8NF8gbgOvsrrB IIj5SOOmD2xQbcc9cYddnk0EyKaZonQFYEgp7ne2Y6nz+T5nw/FjdRMUCtnSyPvOb4mb Mno57k8KT2mvVYmLpbo9AG/F4tt9CnqZiXFWwgMALd15DjFYxXsmhlMRLE+lnkPJx3mQ BMfMkaU42mPa1TXeVwMzENG94F3TUC2HdNeugE19f0iURGHMDlB1E5bhyFcPEdBmG1BO GiHKXFYt4iPfWmQRsv8eXSnvn5uJm9Re35L8VF+EzHRjhlLWys9uh05O9kb2/Bx+xgs6 YK/g== X-Gm-Message-State: APjAAAUuyt/zh7BbQE6fc1zuKpwB6QRVaJF5DaJmiv397BGgMAnoidIQ WgykrfQCGX4dcCD8gVRmbNc= X-Received: by 2002:adf:fe12:: with SMTP id n18mr3071630wrr.114.1570829002841; Fri, 11 Oct 2019 14:23:22 -0700 (PDT) Received: from ?IPv6:2001:a61:3a5c:9a01:fb47:94a9:abbd:4835? ([2001:a61:3a5c:9a01:fb47:94a9:abbd:4835]) by smtp.gmail.com with ESMTPSA id a10sm10135644wrm.52.2019.10.11.14.23.21 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 11 Oct 2019 14:23:21 -0700 (PDT) Cc: mtk.manpages@gmail.com To: lkml From: "Michael Kerrisk (man-pages)" Subject: man-pages-5.03 is released Message-ID: <797361b7-cf6c-d3b4-c6a7-1ab2da7f4f42@gmail.com> Date: Fri, 11 Oct 2019 23:23:21 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Gidday, The Linux man-pages maintainer proudly announces: man-pages-5.03 - man pages for Linux This release resulted from patches, bug reports, reviews, and comments from 45 people, with over 200 commits making changes to around 80 pages. Tarball download: http://www.kernel.org/doc/man-pages/download.html Git repository: https://git.kernel.org/cgit/docs/man-pages/man-pages.git/ Online changelog: http://man7.org/linux/man-pages/changelog.html#release_5.03 A short summary of the release is blogged at: https://linux-man-pages.blogspot.com/2019/10/man-pages-503-is-released.html The current version of the pages is browsable at: http://man7.org/linux/man-pages/ A selection of changes in this release that may be of interest to readers of LKML is shown below. Cheers, Michael ==================== Changes in man-pages-5.03 ==================== New and rewritten pages ----------------------- pidfd_open.2 Michael Kerrisk [Christian Brauner, Florian Weimer, Daniel Colascione] New page documenting pidfd_open(2) pidfd_send_signal.2 Michael Kerrisk [Florian Weimer, Christian Brauner] New page documenting pidfd_send_signal(2) pivot_root.2 Michael Kerrisk [Eric W. Biederman, Reid Priedhorsky, Philipp Wendler] This page has been completely rewritten, adding a lot of missing details (including the use of pivot_root(".", ".")) and an example program. In addition, the text prevaricating on whether or not pivot_root() might change the root and current working directories has been eliminated, and replaced with a simple description of the behavior of the system call, which has not changed for 19 years, and will not change in the future. Many longstanding errors in the old version of the page have also been corrected. ipc_namespaces.7 Michael Kerrisk New page with content migrated from namespaces(7) uts_namespaces.7 Michael Kerrisk New page with content migrated from namespaces(7) Newly documented interfaces in existing pages --------------------------------------------- clone.2 Christian Brauner, Michael Kerrisk Document CLONE_PIDFD Add an entry for CLONE_PIDFD. This flag is available starting with kernel 5.2. If specified, a process file descriptor ("pidfd") referring to the child process will be returned in the ptid argument. fanotify_mark.2 Jakub Wilk Document FAN_MOVE_SELF ptrace.2 Dmitry V. Levin [Michael Kerrisk] Document PTRACE_GET_SYSCALL_INFO regex.3 Rob Landley Document REG_STARTEND Changes to individual pages --------------------------- mmap.2 Nikola Forró Fix EINVAL conditions Since introduction of MAP_SHARED_VALIDATE, in case flags contain both MAP_PRIVATE and MAP_SHARED, mmap() doesn't fail with EINVAL, it succeeds. The reason for that is that MAP_SHARED_VALIDATE is in fact equal to MAP_PRIVATE | MAP_SHARED. mount.2 Michael Kerrisk [Reid Priedhorsky] Describe the concept of "parent mounts" rt_sigqueueinfo.2 Michael Kerrisk Note that 'si_code' can't be specified as SI_KERNEL Michael Kerrisk The rules for 'si_code' don't apply when sending a signal to oneself The restriction on what values may be specified in 'si_code' apply only when sending a signal to a process other than the caller itself. signalfd.2 Andrew Clayton, Michael Kerrisk Note about interactions with epoll & fork mount_namespaces.7 Michael Kerrisk Explain how a namespace's mount point list is initialized Provide a more detailed explanation of the initialization of the mount point list in a new mount namespace. Michael Kerrisk [Eric W. Biederman] Clarify description of "less privileged" mount namespaces signal.7 Michael Kerrisk Enhance the text on process-directed and thread-directed signals clone(2) has a good description of these concepts; borrow from it liberally. user_namespaces.7 Michael Kerrisk Improve explanation of meaning of ownership of nonuser namespaces -- Michael Kerrisk Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ Linux/UNIX System Programming Training: http://man7.org/training/