Mike Frysinger | 22 Aug 10:36 2014
Picon

[PATCH] getpwnam(3): fix wrapped arg alignment

Signed-off-by: Mike Frysinger <vapier@...>
---
 man3/getpwnam.3 | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/man3/getpwnam.3 b/man3/getpwnam.3
index 5b63f1e..50886e9 100644
--- a/man3/getpwnam.3
+++ b/man3/getpwnam.3
 <at>  <at>  -48,11 +48,11  <at>  <at>  getpwnam, getpwnam_r, getpwuid, getpwuid_r \- get password file entry
 .sp
 .BI "int getpwnam_r(const char *" name ", struct passwd *" pwd ,
 .br
-.BI "            char *" buf ", size_t " buflen ", struct passwd **" result );
+.BI "               char *" buf ", size_t " buflen ", struct passwd **" result );
 .sp
 .BI "int getpwuid_r(uid_t " uid ", struct passwd *" pwd ,
 .br
-.BI "            char *" buf ", size_t " buflen ", struct passwd **" result );
+.BI "               char *" buf ", size_t " buflen ", struct passwd **" result );
 .fi
 .sp
 .in -4n
--

-- 
2.0.0

--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@...
More majordomo info at  http://vger.kernel.org/majordomo-info.html
(Continue reading)

bugzilla | 22 Aug 10:31 2014

[Bug 82841] sendfile doesn't work with O_APPEND

https://bugzilla.kernel.org/show_bug.cgi?id=82841

--- Comment #3 from Alan <alan@...> ---
sendfile is just a wrapper around splice()

Whether it could therefore support O_APPEND is a good question - but one that
would need asking and discussing on the lists not here, and someone to
contribute the patches to do so.

In the meantime we ought to get the man page fixed.

--

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@...
More majordomo info at  http://vger.kernel.org/majordomo-info.html

bugzilla | 22 Aug 04:18 2014

[Bug 82841] sendfile doesn't work with O_APPEND

https://bugzilla.kernel.org/show_bug.cgi?id=82841

--- Comment #2 from Jason Newton <nevion@...> ---
(In reply to Alan from comment #1)
> O_APPEND is not supported for sendfile().
> 
> It's documented in the splice() manual page but not for sendfile so I've
> moved this to a documentation bug

OK so this quirk was not out in the open in documentation - before I opened
this bug report I read a few years old discussion:
http://fixunix.com/kernel/543017-splice-vs-o_append.html

Most of what they're talking about is splice, not sendfile.  They might use the
same implementation but sendfile should be O_APPEND safe as there is no
specifiable offset in the output filedescriptor.  Is there a reason to not
support it?

--

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@...
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Simon Paillard | 21 Aug 22:14 2014
Picon

[PATCH] iconv.1: document gconv path for debian-based os

---
 man1/iconv.1 | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/man1/iconv.1 b/man1/iconv.1
index 54e2655..fd14f0a 100644
--- a/man1/iconv.1
+++ b/man1/iconv.1
 <at>  <at>  -171,6 +171,9  <at>  <at>  directories.
 .I /usr/lib/gconv
 Usual default gconv module path.
 .TP
+.I /usr/lib/$(dpkg-architecture -qDEB_HOST_MULTIARCH)/gconv
+Default gconv module path on recent systems based on Debian.
+.TP
 .I /usr/lib/gconv/gconv-modules
 Usual system default gconv module configuration file.
 .TP
--

-- 
2.1.0.rc1

--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@...
More majordomo info at  http://vger.kernel.org/majordomo-info.html

bugzilla | 21 Aug 21:05 2014

[Bug 82531] Nondumpable processes that are sandboxed with CLONE_NEWUSER can be ptraced from outside.

https://bugzilla.kernel.org/show_bug.cgi?id=82531

Alan <alan@...> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
          Component|Other                       |man-pages
           Assignee|other_other@... |documentation_man-pages <at> ker
                   |l.org                       |nel-bugs.osdl.org
            Product|Other                       |Documentation

--- Comment #3 from Alan <alan@...> ---
If I am outside the sandbox then I can equally patch the kernel if I have all
the rights I need.

You either need everything sandboxed or you need a trusted element (TPM,
smartcard etc) to do the crunching and keep the secrets.

I don't think the docs are unclear but I'll move it to man pages

--

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@...
More majordomo info at  http://vger.kernel.org/majordomo-info.html

bugzilla | 21 Aug 17:22 2014

[Bug 82841] sendfile doesn't work with O_APPEND

https://bugzilla.kernel.org/show_bug.cgi?id=82841

Alan <alan@...> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |alan@...
          Component|Other                       |man-pages
           Assignee|io_other@... |documentation_man-pages <at> ker
                   |rg                          |nel-bugs.osdl.org
            Product|IO/Storage                  |Documentation

--- Comment #1 from Alan <alan@...> ---
O_APPEND is not supported for sendfile().

It's documented in the splice() manual page but not for sendfile so I've moved
this to a documentation bug

--

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@...
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Michael Kerrisk | 21 Aug 15:28 2014
Picon

man-pages-3.71 released

Gidday,

The Linux man-pages maintainer proudly announces:

    man-pages-3.71 - man pages for Linux

Tarball download:
    http://www.kernel.org/doc/man-pages/download.html
Git repository:
    https://git.kernel.org/cgit/docs/man-pages/man-pages.git/
Online changelog:
    http://man7.org/linux/man-pages/changelog.html#release_3.71

A short summary of the release is blogged at:
http://linux-man-pages.blogspot.com/2014/08/man-pages-371-is-released.html

The current version of the pages is browsable at:
http://man7.org/linux/man-pages/

You are receiving this message either because:

a) You contributed to the content of this release.

b) You are subscribed to linux-man@...

c) I have information (possibly inaccurate) that you are the maintainer
   of a translation of the manual pages, or are the maintainer of the
   manual pages set in a particular distribution, or have expressed
   interest in helping with man-pages maintenance, or have otherwise
   expressed interest in being notified about man-pages releases.
(Continue reading)

Michael Kerrisk (man-pages | 21 Aug 01:36 2014
Picon

For review: user_namespace(7) man page

Hello Eric et al.,

For various reasons, my work on the namespaces man pages 
fell off the table a while back. Nevertheless, the pages have
been close to completion for a while now, and I recently restarted,
in an effort to finish them. As you also noted to me f2f, there have
been recently been some small namespace changes that you may affect
the content of the pages. Therefore, I'll take the opportunity to
send the namespace-related pages out for further (final?) review.

So, here, I start with the user_namespaces(7) page, which is shown 
in rendered form below, with source attached to this mail. I'll
send various other pages in follow-on mails.

Review comments/suggestions for improvements / bug fixes welcome.

Cheers,

Michael

==

NAME
       user_namespaces - overview of Linux user_namespaces

DESCRIPTION
       For an overview of namespaces, see namespaces(7).

       User   namespaces   isolate   security-related   identifiers  and
       attributes, in particular, user IDs and group  IDs  (see  creden‐
(Continue reading)

Rusty Russell | 19 Aug 15:57 2014
Picon

[PATCH] poll.2, select.2: fix erroneous description of "available for write".

POSIX says: "POLLOUT Normal data may be written without blocking.".
This is "may" is misleading, see the POSIX write page:

  Write requests to a pipe or FIFO shall be handled in the same way as a regular file with the following exceptions:
...
	If the O_NONBLOCK flag is clear, a write request may cause the thread to block, but on normal completion it
shall return nbyte.

...
  When attempting to write to a file descriptor (other than a pipe or FIFO) that supports non-blocking writes
and cannot accept the data immediately:

    If the O_NONBLOCK flag is clear, write() shall block the calling thread until the data can be accepted.

    If the O_NONBLOCK flag is set, write() shall not block the thread. If some data can be written without
blocking the thread, write() shall write what it can and return the number of bytes written. Otherwise, it
shall return -1 and set errno to [EAGAIN].

The net result is that write() of more than 1 byte on a socket, pipe or FIFO
which is "ready" may block: write() (unlike read!) will attempt to write
the entire buffer and only return a short write under exceptional
circumstances.

Indeed, this is the behaviour we see in Linux:

https://github.com/rustyrussell/ccan/commit/897626152d12d7fd13a8feb36989eb5c8c1f3485
https://plus.google.com/103188246877163594460/posts/BkTGTMHDFgZ

Signed-off-by: Rusty Russell <rusty@...>

(Continue reading)

Peng Haitao | 19 Aug 05:22 2014

[PATCH] siginterrupt.3: Reformat thread-safety information

Signed-off-by: Peng Haitao <penght@...>
---
 man3/siginterrupt.3 | 14 ++++++++++----
 1 file changed, 10 insertions(+), 4 deletions(-)

diff --git a/man3/siginterrupt.3 b/man3/siginterrupt.3
index 5e409d2..adcdf76 100644
--- a/man3/siginterrupt.3
+++ b/man3/siginterrupt.3
 <at>  <at>  -85,11 +85,17  <at>  <at>  set to indicate the cause of the error.
 .B EINVAL
 The specified signal number is invalid.
 .SH ATTRIBUTES
-.SS Multithreading (see pthreads(7))
-The
+For an explanation of the terms used in this section, see
+.BR attributes (7).
+.TS
+allbox;
+lb lb lb
+l l l.
+Interface	Attribute	Value
+T{
 .BR siginterrupt ()
-function uses a global variable that is not protected,
-so it is not thread-safe.
+T}	Thread safety	MT-Unsafe
+.TE
 .SH CONFORMING TO
 4.3BSD, POSIX.1-2001.
(Continue reading)

Peng Haitao | 19 Aug 05:14 2014

[PATCH] signbit.3: Reformat thread-safety information

Signed-off-by: Peng Haitao <penght@...>
---
 man3/signbit.3 | 13 ++++++++++---
 1 file changed, 10 insertions(+), 3 deletions(-)

diff --git a/man3/signbit.3 b/man3/signbit.3
index 3c72bd2..f213d6a 100644
--- a/man3/signbit.3
+++ b/man3/signbit.3
 <at>  <at>  -59,10 +59,17  <at>  <at>  is negative; otherwise it returns zero.
 .SH ERRORS
 No errors occur.
 .SH ATTRIBUTES
-.SS Multithreading (see pthreads(7))
-The
+For an explanation of the terms used in this section, see
+.BR attributes (7).
+.TS
+allbox;
+lb lb lb
+l l l.
+Interface	Attribute	Value
+T{
 .BR signbit ()
-macro is thread-safe.
+T}	Thread safety	MT-Safe
+.TE
 .SH CONFORMING TO
 C99, POSIX.1-2001.
 This function is defined in IEC 559 (and the appendix with
(Continue reading)


Gmane