Commit Graph

17497 Commits

Author SHA1 Message Date
Jakub Wilk bc4cb520a4 Changes.old: tfix
Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-04 15:23:17 +13:00
Michael Kerrisk bd741e0f3e signal.7: SIGXFSZ: add reference to setrlimit(2)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:09:11 +01:00
Michael Kerrisk eb8e63a9d0 signal.7: SIGXCPU: add reference to setrlimit(2)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:09:11 +01:00
Michael Kerrisk 0288ee4c59 signal.7: SIGSYS: add reference to seccomp(2)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:09:11 +01:00
Michael Kerrisk 9af4022a02 signal.7: SIGPIPE: add reference to pipe(7)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:09:11 +01:00
Michael Kerrisk daf5983b11 signal.7: Add a name for SIGEMT
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:09:11 +01:00
Michael Kerrisk fc635dd8ae pkeys.7, signal.7: tfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:09:11 +01:00
Michael Kerrisk 453de2aa45 signal.7: Change description of SIGSYS to "Bad system call"
This is the more typical definition.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:09:11 +01:00
Michael Kerrisk 30e2a22aa6 inotify_add_watch.2: Note "inode" as a synonym for "filesystem object"
Consistent with clarifications just made in inotify(7).

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-02 20:08:40 +01:00
Michael Kerrisk 7954e55207 inotify.7: Point out that inotify monitoring is inode based
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-01-01 23:18:51 +01:00
Michael Kerrisk 2b1d26d40e recv.2: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-31 21:24:12 +01:00
Omar Sandoval 14d6e62f12 ptrace.2: clarify PTRACE_O_EXITKILL
The description in the man page is confusing; it makes it sound like
setting the PTRACE_O_EXITKILL flag on any tracee makes it so that all
tracees are killed if the tracer exits. The description from kernel
commit 992fb6e170639b that introduced PTRACE_O_EXITKILL offers a
different explanation: "If the tracer exits it sends SIGKILL to every
tracee which has this bit set".

Cc: Oleg Nesterov <oleg@redhat.com>
Signed-off-by: Omar Sandoval <osandov@osandov.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-31 20:39:16 +01:00
Omar Sandoval 81ff736099 cgroups.7: tfix
Signed-off-by: Omar Sandoval <osandov@osandov.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-31 20:34:50 +01:00
Michael Kerrisk 3e1ac86ee8 recv.2: Remove duplicate paragraph
man-pages-1.34 included changes that duplicated an existing
paragraph. Remove that duplicate.

Reported-by: Vincent Bernat <vincent@bernat.im>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-31 20:32:31 +01:00
Michael Kerrisk 70bdb9b539 ioctl_fat.2, ioctl_ficlonerange.2, ioctl_fideduperange.2, perfmonctl.2, sched_rr_get_interval.2: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-30 13:41:37 +01:00
Michael Kerrisk 4026f8ba5b pid_namespaces.7: Minor fixes to Keno Fischer's patch
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-29 10:45:18 +01:00
Keno Fischer e9fcae0f6c pid_namespaces.7: CLONE_SIGHAND|CLONE_VM|CLONE_NEWPID is no longer disallowed
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-28 15:31:30 +01:00
Michael Kerrisk 49a93479b6 __ppc_set_ppr_med.3: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-28 11:44:41 +01:00
Wainer dos Santos Moschetta 831f5b9a38 __ppc_set_ppr_med.3: Note need for _ARCH_PWR8 macro
The _ARCH_PWR8 macro must be defined to get the
 __ppc_set_ppr_very_low() and __ppc_set_ppr_med_high()
definitions.

Signed-off-by: Wainer dos Santos Moschetta <wainersm@linux.vnet.ibm.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-28 11:42:42 +01:00
Michael Kerrisk 41f90bb7eb prctl.2: Minor fixes to Keno's patch
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-28 11:13:38 +01:00
Keno Fischer 27ce08bf1d prctl.2: Be more precise in what causes dumpable to reset
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-28 11:10:28 +01:00
Michael Kerrisk f8dcca844a poll.2i, select.2: ffix + srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 21:09:07 +01:00
Nicolas B f25ea51b98 poll.2, select.2: Add a reference to the sigset discussion in sigprocmask(2)
A little while back, I added a note to sigprocmask.2 that
discussed the difference between the libc's and the kernel's
sigset_t structures.  I added that note, because I saw this being
done wrong in a tool tracing system calls (causing subtle bugs).
As it turns out, the same bugs existed for ppoll and pselect, for
the same reason. I'm hoping by adding the reference here, future
writers of similar tools will find that discussion and not make
the same mistake.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 21:05:48 +01:00
Keno Fischer 8e6578f85f cgroups.7: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 21:04:05 +01:00
Nicolas B 5cfdbcf07e sched.7: wfix
Reported-by: Nicolas Biscos <nicolas.biscos+man7@gmail.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 17:43:34 +01:00
Jann Horn a2db5b9d18 getline.3: Document ENOMEM error case
see the error handling in libio/iogetdelim.c

Signed-off-by: Jann Horn <jannh@google.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 17:40:56 +01:00
Michael Kerrisk baecfd79dc man_show_fixme.sh: Fix rendering issue
If a single quote falls at the start of a line, then the rest of
the line is treated as a comment. Therefore, escape single quotes.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 64dd3b717a keyctl.2: srcfix: update FIXME
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 60be6628fa keyctl.2: KEYCTL_SET_REQKEY_KEYRING also has an effect for request_key(2)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 0978f70669 add_key.2: srcfix: Update FIXMEs
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 5834768eaf request_key.2: srcfix: FIXME
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk c69490ae43 keyctl.2: Improve a KEYCTL_SET_REQKEY_KEYRING detail
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 5e0d5def6c request_key.2: Improve description of default keyring when dest_keyring is zero
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 6dfb4dda6e request_key.2: Minor wording fixes
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Eugene Syromyatnikov 2bcf858070 request_key.2: Add information regarding default keyring
Notes from Eugene:

Based on linux v4.9-rc6 (9c763584):

 * security/keys/keyctl.c, SYSCALL_DEFINE4(request_key, ...), line 158:
  * Assume that call is performed with with destringid == 0:
  * We skip check on line 196, so dest_ref remains NULL
  * On line 213, request_key_and_link is called with key_ref_to_ptr(dest_ref)
   * key_ref_to_ptr() itself just zeroes lower bit which is used for
     indication that key reference in the possession of the current
     context.
 * security/keys/request_key.c, request_key_and_link, line 508:
  * On line 543, we try to search process keyrings for the key (we
    fill ctx at hte beginning of the function and then pass it to
    search_process_keyrings)
  * If key is found (key_ref is not erroneous), we convert key_ref to
    ptr on line 546 and skip the following block on line 547 since
    dest_keyring is 0.
  * If key is not found and error is not EAGAIN, then
    construct_key_and_link is called on line 566 with dest_keyring ==
    NULL.
 * security/keys/request_key.c, construct_key_and_link, line 430:
  * On line 450, construct_get_dest_keyring is called with dest_keyring
    == NULL.
 * security/keys/request_key.c, construct_get_dest_keyring, line 253:
  * The argument here (which is pointer to pointer to struct key) is
    named _dest_keyring, but on line 257 it is dereferenced to local
    variable dest_keyring (so it stores NULL now).
  * We re going to the "else" branch (starting from line 266) of check
    on line 262
  * Now we are switching against cred->jit_keyring with the behavour
    described in the patch.
 * git grep jit_keyring security/keys reveals that it is assigned inside
   keyctl_set_reqkey_keyring, security/keys/keyctl.c, line 1257.
 * keyctl_set_reqkey_keyring is called from SYSCALL_DEFINE5(keyctl,
   ...), when option passed to keyctl is KEYCTL_SET_REQKEY_KEYRING (line
   1652).
 * Default value for jit_keyring is sort of difficult to find out, since
   it is inherited, but overall it is explicitly set to
   KEY_REQKEY_DEFL_THREAD_KEYRING or copied from zeroed-out structures
   (so it is equal to KEY_REQKEY_DEFL_DEFAULT) which leads to the same
   behaviour in case the process has not been upcalled by request_key
   construction.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 34795036d1 keyrings.7: Number the fields in /proc/keys for easy reference in discussion
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:23 +01:00
Michael Kerrisk 1704100353 keyrings.7: srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 8a141d6b8f keyrings.7: wfix
Reported-by: David Howells <dhowells@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk b51c7752ea keyrings.7: Fixes after feedback from David Howells
Reported-by: David Howells <dhowells@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 805aa46622 keyrings.7: wfix
Reported-by: David Howells <dhowells@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 7c5c6f2c9e keyrings.7: Add a little more detail on the encryption of the big_key payload
Reported-by: Eugene Syromyatnikov <evgsyr@gmail.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 790ba8ccf8 keyrings.7: ff
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk e8722fc5a2 keyrings.7: Rework 'big_key' text a little
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 23e10faf7b keyrings.7: Fixes after review by David Howells
Reported-by: David Howells <dhowells@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 9fd70ffaf6 keyrings.7: Reorder list of key types
Place "keyring" first.

Reported-by: David Howells <dhowells@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 1d452eeca3 add_key.2: Various fixes after review by David Howells
Reported-by: David Howells <dhowells@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk eebdcb80a8 add_key.2: Reorder list of key tpes (pace keyrings first)
Reported-by: David Howells <dhowells@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 6cf27f3f8c keyrings.7: Add a note on the unimplemented group keyring
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk dc26e4994b keyrings.7: Note the special keyring IDs used in add_key()/request_key()/keyctl()
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00
Michael Kerrisk 46d584ecbb keyrings.7: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2016-12-27 09:36:22 +01:00