1 ==================== Changes in man-pages-4.15 ====================
3 Released: 2018-02-02, Palo Alto
9 The following people contributed patches/fixes or (noted in brackets
10 in the changelog below) reports, notes, and ideas that have been
11 incorporated in changes in this release:
13 Adam Liddell <ml+kernel.org@aliddell.com>
14 Andrea Parri <parri.andrea@gmail.com>
15 Andries E. Brouwer <Andries.Brouwer@cwi.nl>
16 Elie Roudninski <xademax@gmail.com>
17 Eric Benton <erbenton@comcast.net>
18 Florian Weimer <fweimer@redhat.com>
19 G. Branden Robinson <g.branden.robinson@gmail.com>
20 Jakub Wilk <jwilk@jwilk.net>
21 Joel Williamson <jwilliamson@carnegietechnologies.com>
22 John Hubbard <jhubbard@nvidia.com>
23 Jorgen Hansen <jhansen@vmware.com>
24 Keno Fischer <keno@juliacomputing.com>
25 Michael Kerrisk <mtk.manpages@gmail.com>
26 Michal Hocko <mhocko@kernel.org>
27 NeilBrown <neilb@suse.com>
28 Nikola Forró <nforro@redhat.com>
29 Nikolay Borisov <nborisov@suse.com>
30 Pradeep Kumar <pradeepsixer@gmail.com>
31 QingFeng Hao <haoqf@linux.vnet.ibm.com>
32 Ricardo Biehl Pasquali <pasqualirb@gmail.com>
33 roblabla <man-pages@roblab.la>
34 Roman Gushchin <guro@fb.com>
35 Shawn Landden <slandden@gmail.com>
36 Stefan Hajnoczi <stefanha@redhat.com>
37 Stefan Raspl <raspl@linux.vnet.ibm.com>
38 Tejun Heo <tj@kernel.org>
40 Apologies if I missed anyone!
43 New and rewritten pages
44 -----------------------
47 QingFeng Hao [Michael Kerrisk]
48 New page for s390-specific s390_sthyi(2)
52 New page describing network namespaces
53 Based on content moved from namespaces(7)
58 When a NW namespace is freed, veth devices are destroyed
61 Stefan Hajnoczi [Jorgen Hansen, Michael Kerrisk]
62 Document the VSOCK socket address family
65 Newly documented interfaces in existing pages
66 ---------------------------------------------
69 Michael Kerrisk [Tejun Heo]
70 Document cgroups v2 "thread mode"
71 Michael Kerrisk [Tejun Heo]
72 Document cgroup v2 delegation via the 'nsdelegate' mount option
74 Document the cgroup.max.depth and cgroup.max.descendants files
76 Document 'release_agent' mount option
77 Michael Kerrisk [Roman Gushchin]
78 Document /sys/kernel/cgroup/delegate
79 Michael Kerrisk [Roman Gushchin]
80 Document /sys/kernel/cgroup/features
81 Michael Kerrisk [Roman Gushchin]
82 Document cgroups v2 cgroup.stat file
90 Standardize on "nonzero"
91 Also add this term to the style guide in man-pages(7).
94 Changes to individual pages
95 ---------------------------
99 Sync list of supported map types with 4.14 kernel
103 Library support was added in glibc 2.27
105 glibc provides a user-space emulation where the system call is absent
107 EFBIG errors are possible, similar to write(2)
111 Order ERRORS alphabetically
113 Add comment to code example explaining use of syscall(2)
119 Document "Lost locks" as cause for EIO.
120 If an advisory lock is lost, then read/write requests on any
121 affected file descriptor can return EIO - for NFSv4 at least.
125 glibc support for memfd_create() was added in version 2.27
129 Make details for MLOCK_ONFAULT a little more explicit
131 glibc support for mlock2() is added in version 2.27
134 John Hubbard [Michael Hocko]
135 MAP_FIXED is no longer discouraged
136 MAP_FIXED has been widely used for a very long time, yet the man
137 page still claims that "the use of this option is discouraged".
139 MAP_FIXED updated documentation
140 -- Expand the documentation to discuss the hazards in
141 enough detail to allow avoiding them.
143 -- Mention the upcoming MAP_FIXED_SAFE flag.
145 -- Enhance the alignment requirement slightly.
148 Keno Fischer [Michael Kerrisk]
149 Add EINVAL error condition when MS_BINDing MNT_LOCKED submounts
154 Glibc support for memory protection keys was added in version 2.27
158 SEE ALSO: add perf(1)
162 Clarify description of pkey_alloc() 'flags' argument
166 Defer to capabilities(7) for discussion of the "keep capabilities" flag
171 Point out that error handling is unreliable
175 Clarify that SECCOMP_RET_TRAP SIGSYS signal is thread-directed
179 Add s390-specific s390_sthyi(2) to syscall list
183 Clarify the EUSERS occurred only until kernel 4.8
187 'errno -s' can be used to search for errors by string in description
189 Add Linux error text corresponding to ENOMEM
193 Add missing ATTRIBUTES preamble
196 Michael Kerrisk [Pradeep Kumar]
197 fts_pathlen = strlen(fts_path) + strlen(fts_name)
201 Places errors in alphabetical order (no content changes)
205 Add network_namespaces(7)
209 Refer to cgroups(7) for information about files in /sys/kernel/cgroup
213 Note which capability sets are affected by SECBIT_NO_SETUID_FIXUP
214 Note explicitly that SECBIT_NO_SETUID_FIXUP is relevant for
215 the permitted, effective, and ambient capability sets.
217 Deemphasize the ancient prctl(2) PR_SET_KEEPCAPS command
218 The modern approach is SECBITS_KEEP_CAPS.
220 Clarify effect of CAP_SETFCAP
221 Make it clear that CAP_SETFCAP allows setting arbitrary
222 capabilities on a file.
224 Clarify which capability sets are effected by SECBIT_KEEP_CAPS
225 This flag has relevance only for the process permitted and
228 Rephrase CAP_SETPCAP description
229 * Mention kernel versions.
230 * Place current kernel behavior first
232 SECBIT_KEEP_CAPS is ignored if SECBIT_NO_SETUID_FIXUP is set
234 Ambient set is also cleared when UIDs are set to nonzero value
238 Add a more complete description of cgroup v1 named hierarchies
240 Add a section on unmounting cgroup v1 filesystems
242 Add subsection describing cgroups v2 subtree delegation
244 Mention ENOENT error that can occur when writing to subtree_control file
246 Add list of currently available version 2 controllers
248 Add information about RDMA controller
250 Rewrite the description of cgroup v2 subtree control
251 Michael Kerrisk [Tejun Heo]
252 Note Linux 4.11 changes to cgroup v2 delegation containment rules
254 systemd(1) nowadays automatically mounts the cgroup2 filesystem
256 Clarify that cgroup.controllers is read-only
258 Elaborate a little on problems of splitting threads across cgroups in v1
259 Michael Kerrisk [Tejun Heo]
260 Tweak the description of delegation of cgroup.subtree_control
263 Ricardo Biehl Pasquali
264 INADDR_* values cannot be assigned directly to 's_addr'
266 s/INADDR_ANY/INADDR_LOOPBACK/ in discussion of htonl()
267 INADDR_LOOPBACK is a better example, since it is not
273 Move content from namespaces(7) to network_namespaces(7)
277 SEE ALSO: add mount_namespaces(7)
280 Michael Kerrisk [Andrea Parri]
281 Correctly describe effect of priority changes for RT threads
282 The placement of a thread in the run queue for its new
283 priority depends on the direction of movement in priority.
284 (This appears to contradict POSIX, except in the case of
285 pthread_setschedprio().)
289 Mention NS_GET_OWNER_UID ioctl() operation