]> git.ipfire.org Git - thirdparty/man-pages.git/blame - Changes
Start of man-pages-4.16: updating .Announce and .lsm files
[thirdparty/man-pages.git] / Changes
CommitLineData
157fe4e3 1==================== Changes in man-pages-4.15 ====================
5346e714 2
4a208837 3Released: 2018-02-02, Palo Alto
5346e714
MK
4
5
125baa35
MK
6Contributors
7------------
26c33493 8
5fb27aeb 9The following people contributed patches/fixes or (noted in brackets
808daa68 10in the changelog below) reports, notes, and ideas that have been
5fb27aeb 11incorporated in changes in this release:
b0aca9e9 12
4a208837
MK
13Adam Liddell <ml+kernel.org@aliddell.com>
14Andrea Parri <parri.andrea@gmail.com>
15Andries E. Brouwer <Andries.Brouwer@cwi.nl>
16Elie Roudninski <xademax@gmail.com>
17Eric Benton <erbenton@comcast.net>
18Florian Weimer <fweimer@redhat.com>
19G. Branden Robinson <g.branden.robinson@gmail.com>
20Jakub Wilk <jwilk@jwilk.net>
21Joel Williamson <jwilliamson@carnegietechnologies.com>
22John Hubbard <jhubbard@nvidia.com>
23Jorgen Hansen <jhansen@vmware.com>
24Keno Fischer <keno@juliacomputing.com>
25Michael Kerrisk <mtk.manpages@gmail.com>
26Michal Hocko <mhocko@kernel.org>
27NeilBrown <neilb@suse.com>
28Nikola Forró <nforro@redhat.com>
29Nikolay Borisov <nborisov@suse.com>
30Pradeep Kumar <pradeepsixer@gmail.com>
31QingFeng Hao <haoqf@linux.vnet.ibm.com>
32Ricardo Biehl Pasquali <pasqualirb@gmail.com>
33roblabla <man-pages@roblab.la>
34Roman Gushchin <guro@fb.com>
35Shawn Landden <slandden@gmail.com>
36Stefan Hajnoczi <stefanha@redhat.com>
37Stefan Raspl <raspl@linux.vnet.ibm.com>
38Tejun Heo <tj@kernel.org>
b3206068
MK
39
40Apologies if I missed anyone!
41
42
59ed2368
MK
43New and rewritten pages
44-----------------------
ed4e8a74 45
4a208837
MK
46s390_sthyi.2
47 QingFeng Hao [Michael Kerrisk]
48 New page for s390-specific s390_sthyi(2)
49
50network_namespaces.7
51 Michael Kerrisk
52 New page describing network namespaces
e6a23f30 53 Based on content moved from namespaces(7)
4a208837
MK
54
55vsock.7
56 Stefan Hajnoczi [Jorgen Hansen, Michael Kerrisk]
57 Document the VSOCK socket address family
58
37f34385 59
59ed2368
MK
60Newly documented interfaces in existing pages
61---------------------------------------------
ed4e8a74 62
4a208837
MK
63cgroups.7
64 Michael Kerrisk [Tejun Heo]
65 Document cgroups v2 "thread mode"
66 Michael Kerrisk [Tejun Heo]
67 Document cgroup v2 delegation via the 'nsdelegate' mount option
68 Michael Kerrisk
69 Document the cgroup.max.depth and cgroup.max.descendants files
70 Michael Kerrisk
71 Document 'release_agent' mount option
72 Michael Kerrisk [Roman Gushchin]
73 Document /sys/kernel/cgroup/delegate
74 Michael Kerrisk [Roman Gushchin]
75 Document /sys/kernel/cgroup/features
76 Michael Kerrisk [Roman Gushchin]
77 Document cgroups v2 cgroup.stat file
ed4e8a74 78
ed4e8a74 79
59ed2368
MK
80Global changes
81--------------
ed4e8a74 82
4a208837
MK
83Various pages
84 G. Branden Robinson
85 Standardize on "nonzero"
86 Also add this term to the style guide in man-pages(7).
87
ed4e8a74 88
59ed2368
MK
89Changes to individual pages
90---------------------------
8859b93d 91
4a208837
MK
92bpf.2
93 Nikolay Borisov
94 Sync list of supported map types with 4.14 kernel
95
96copy_file_range.2
97 Michael Kerrisk
98 Library support was added in glibc 2.27
99 Shawn Landden
e6a23f30 100 glibc provides a user-space emulation where the system call is absent
4a208837
MK
101 Florian Weimer
102 EFBIG errors are possible, similar to write(2)
103 Michael Kerrisk
104 ERRORS: add EISDIR
105 Michael Kerrisk
106 Order ERRORS alphabetically
107 Michael Kerrisk
108 Add comment to code example explaining use of syscall(2)
109
110fcntl.2
111read.2
112write.2
113 NeilBrown
114 Document "Lost locks" as cause for EIO.
115 If an advisory lock is lost, then read/write requests on any
116 affected file descriptor can return EIO - for NFSv4 at least.
117
118memfd_create.2
119 Michael Kerrisk
120 glibc support for memfd_create() was added in version 2.27
121
122mlock.2
123 Michael Kerrisk
124 Make details for MLOCK_ONFAULT a little more explicit
125 Michael Kerrisk
126 glibc support for mlock2() is added in version 2.27
127
128mmap.2
129 John Hubbard [Michael Hocko]
130 MAP_FIXED is no longer discouraged
131 MAP_FIXED has been widely used for a very long time, yet the man
132 page still claims that "the use of this option is discouraged".
133 John Hubbard
134 MAP_FIXED updated documentation
135 -- Expand the documentation to discuss the hazards in
136 enough detail to allow avoiding them.
137
138 -- Mention the upcoming MAP_FIXED_SAFE flag.
139
140 -- Enhance the alignment requirement slightly.
141
142mount.2
143 Keno Fischer [Michael Kerrisk]
144 Add EINVAL error condition when MS_BINDing MNT_LOCKED submounts
145
146mprotect.2
147pkey_alloc.2
148 Michael Kerrisk
149 Glibc support for memory protection keys was added in version 2.27
150
151perf_event_open.2
152 Michael Kerrisk
153 SEE ALSO: add perf(1)
154
155pkey_alloc.2
156 Michael Kerrisk
157 Clarify description of pkey_alloc() 'flags' argument
158
159prctl.2
160 Michael Kerrisk
161 Defer to capabilities(7) for discussion of the "keep capabilities" flag
162
163recvmmsg.2
164sendmmsg.2
165 Nikola Forró
166 Point out that error handling is unreliable
167
168seccomp.2
169 Michael Kerrisk
170 Clarify that SECCOMP_RET_TRAP SIGSYS signal is thread-directed
171
172syscalls.2
173 Michael Kerrisk
174 Add s390-specific s390_sthyi(2) to syscall list
175
176unshare.2
177 Michael Kerrisk
178 Clarify the EUSERS occurred only until kernel 4.8
179
180errno.3
181 Michael Kerrisk
182 'errno -s' can be used to search for errors by string in description
183 Michael Kerrisk
184 Add Linux error text corresponding to ENOMEM
185
186fgetpwent.3
187 Michael Kerrisk
188 Add missing ATTRIBUTES preamble
189
190fts.3
191 Michael Kerrisk [Pradeep Kumar]
192 fts_pathlen = strlen(fts_path) + strlen(fts_name)
193
194fuse.4
195 Michael Kerrisk
196 Places errors in alphabetical order (no content changes)
197
198veth.4
199 Michael Kerrisk
200 Add network_namespaces(7)
201
202sysfs.5
203 Michael Kerrisk
204 Refer to cgroups(7) for information about files in /sys/kernel/cgroup
205
206capabilities.7
207 Michael Kerrisk
208 Note which capability sets are affected by SECBIT_NO_SETUID_FIXUP
209 Note explicitly that SECBIT_NO_SETUID_FIXUP is relevant for
210 the permitted, effective, and ambient capability sets.
211 Michael Kerrisk
212 Deemphasize the ancient prctl(2) PR_SET_KEEPCAPS command
213 The modern approach is SECBITS_KEEP_CAPS.
214 Michael Kerrisk
215 Clarify effect of CAP_SETFCAP
216 Make it clear that CAP_SETFCAP allows setting arbitrary
217 capabilities on a file.
218 Michael Kerrisk
219 Clarify which capability sets are effected by SECBIT_KEEP_CAPS
220 This flag has relevance only for the process permitted and
221 effective sets.
222 Michael Kerrisk
223 Rephrase CAP_SETPCAP description
224 * Mention kernel versions.
225 * Place current kernel behavior first
226 Michael Kerrisk
227 SECBIT_KEEP_CAPS is ignored if SECBIT_NO_SETUID_FIXUP is set
228 Michael Kerrisk
229 Ambient set is also cleared when UIDs are set to nonzero value
230
231cgroups.7
232 Michael Kerrisk
233 Add a more complete description of cgroup v1 named hierarchies
234 Michael Kerrisk
235 Add a section on unmounting cgroup v1 filesystems
236 Michael Kerrisk
237 Add subsection describing cgroups v2 subtree delegation
238 Michael Kerrisk
239 Mention ENOENT error that can occur when writing to subtree_control file
240 Michael Kerrisk
241 Add list of currently available version 2 controllers
242 Nikolay Borisov
243 Add information about RDMA controller
244 Michael Kerrisk
245 Rewrite the description of cgroup v2 subtree control
246 Michael Kerrisk [Tejun Heo]
247 Note Linux 4.11 changes to cgroup v2 delegation containment rules
248 Michael Kerrisk
249 systemd(1) nowadays automatically mounts the cgroup2 filesystem
250 Michael Kerrisk
251 Clarify that cgroup.controllers is read-only
252 Michael Kerrisk
253 Elaborate a little on problems of splitting threads across cgroups in v1
254 Michael Kerrisk [Tejun Heo]
255 Tweak the description of delegation of cgroup.subtree_control
256
257ip.7
258 Ricardo Biehl Pasquali
259 INADDR_* values cannot be assigned directly to 's_addr'
260 Michael Kerrisk
261 s/INADDR_ANY/INADDR_LOOPBACK/ in discussion of htonl()
262 INADDR_LOOPBACK is a better example, since it is not
263 byte-order neutral.
264
265namespaces.7
266network_namespaces.7
267 Michael Kerrisk
268 Move content from namespaces(7) to network_namespaces(7)
269
270pid_namespaces.7
271 Michael Kerrisk
272 SEE ALSO: add mount_namespaces(7)
273
274sched.7
275 Michael Kerrisk [Andrea Parri]
276 Correctly describe effect of priority changes for RT threads
277 The placement of a thread in the run queue for its new
278 priority depends on the direction of movement in priority.
279 (This appears to contradict POSIX, except in the case of
280 pthread_setschedprio().)
281
282user_namespaces.7
283 Michael Kerrisk
284 Mention NS_GET_OWNER_UID ioctl() operation