]>
Commit | Line | Data |
---|---|---|
157fe4e3 | 1 | ==================== Changes in man-pages-4.15 ==================== |
5346e714 | 2 | |
4a208837 | 3 | Released: 2018-02-02, Palo Alto |
5346e714 MK |
4 | |
5 | ||
125baa35 MK |
6 | Contributors |
7 | ------------ | |
26c33493 | 8 | |
5fb27aeb | 9 | The following people contributed patches/fixes or (noted in brackets |
808daa68 | 10 | in the changelog below) reports, notes, and ideas that have been |
5fb27aeb | 11 | incorporated in changes in this release: |
b0aca9e9 | 12 | |
4a208837 MK |
13 | Adam Liddell <ml+kernel.org@aliddell.com> |
14 | Andrea Parri <parri.andrea@gmail.com> | |
15 | Andries E. Brouwer <Andries.Brouwer@cwi.nl> | |
16 | Elie Roudninski <xademax@gmail.com> | |
17 | Eric Benton <erbenton@comcast.net> | |
18 | Florian Weimer <fweimer@redhat.com> | |
19 | G. Branden Robinson <g.branden.robinson@gmail.com> | |
20 | Jakub Wilk <jwilk@jwilk.net> | |
21 | Joel Williamson <jwilliamson@carnegietechnologies.com> | |
22 | John Hubbard <jhubbard@nvidia.com> | |
23 | Jorgen Hansen <jhansen@vmware.com> | |
24 | Keno Fischer <keno@juliacomputing.com> | |
25 | Michael Kerrisk <mtk.manpages@gmail.com> | |
26 | Michal Hocko <mhocko@kernel.org> | |
27 | NeilBrown <neilb@suse.com> | |
28 | Nikola Forró <nforro@redhat.com> | |
29 | Nikolay Borisov <nborisov@suse.com> | |
30 | Pradeep Kumar <pradeepsixer@gmail.com> | |
31 | QingFeng Hao <haoqf@linux.vnet.ibm.com> | |
32 | Ricardo Biehl Pasquali <pasqualirb@gmail.com> | |
33 | roblabla <man-pages@roblab.la> | |
34 | Roman Gushchin <guro@fb.com> | |
35 | Shawn Landden <slandden@gmail.com> | |
36 | Stefan Hajnoczi <stefanha@redhat.com> | |
37 | Stefan Raspl <raspl@linux.vnet.ibm.com> | |
38 | Tejun Heo <tj@kernel.org> | |
b3206068 MK |
39 | |
40 | Apologies if I missed anyone! | |
41 | ||
42 | ||
59ed2368 MK |
43 | New and rewritten pages |
44 | ----------------------- | |
ed4e8a74 | 45 | |
4a208837 MK |
46 | s390_sthyi.2 |
47 | QingFeng Hao [Michael Kerrisk] | |
48 | New page for s390-specific s390_sthyi(2) | |
49 | ||
50 | network_namespaces.7 | |
51 | Michael Kerrisk | |
52 | New page describing network namespaces | |
e6a23f30 | 53 | Based on content moved from namespaces(7) |
4a208837 MK |
54 | |
55 | vsock.7 | |
56 | Stefan Hajnoczi [Jorgen Hansen, Michael Kerrisk] | |
57 | Document the VSOCK socket address family | |
58 | ||
37f34385 | 59 | |
59ed2368 MK |
60 | Newly documented interfaces in existing pages |
61 | --------------------------------------------- | |
ed4e8a74 | 62 | |
4a208837 MK |
63 | cgroups.7 |
64 | Michael Kerrisk [Tejun Heo] | |
65 | Document cgroups v2 "thread mode" | |
66 | Michael Kerrisk [Tejun Heo] | |
67 | Document cgroup v2 delegation via the 'nsdelegate' mount option | |
68 | Michael Kerrisk | |
69 | Document the cgroup.max.depth and cgroup.max.descendants files | |
70 | Michael Kerrisk | |
71 | Document 'release_agent' mount option | |
72 | Michael Kerrisk [Roman Gushchin] | |
73 | Document /sys/kernel/cgroup/delegate | |
74 | Michael Kerrisk [Roman Gushchin] | |
75 | Document /sys/kernel/cgroup/features | |
76 | Michael Kerrisk [Roman Gushchin] | |
77 | Document cgroups v2 cgroup.stat file | |
ed4e8a74 | 78 | |
ed4e8a74 | 79 | |
59ed2368 MK |
80 | Global changes |
81 | -------------- | |
ed4e8a74 | 82 | |
4a208837 MK |
83 | Various pages |
84 | G. Branden Robinson | |
85 | Standardize on "nonzero" | |
86 | Also add this term to the style guide in man-pages(7). | |
87 | ||
ed4e8a74 | 88 | |
59ed2368 MK |
89 | Changes to individual pages |
90 | --------------------------- | |
8859b93d | 91 | |
4a208837 MK |
92 | bpf.2 |
93 | Nikolay Borisov | |
94 | Sync list of supported map types with 4.14 kernel | |
95 | ||
96 | copy_file_range.2 | |
97 | Michael Kerrisk | |
98 | Library support was added in glibc 2.27 | |
99 | Shawn Landden | |
e6a23f30 | 100 | glibc provides a user-space emulation where the system call is absent |
4a208837 MK |
101 | Florian Weimer |
102 | EFBIG errors are possible, similar to write(2) | |
103 | Michael Kerrisk | |
104 | ERRORS: add EISDIR | |
105 | Michael Kerrisk | |
106 | Order ERRORS alphabetically | |
107 | Michael Kerrisk | |
108 | Add comment to code example explaining use of syscall(2) | |
109 | ||
110 | fcntl.2 | |
111 | read.2 | |
112 | write.2 | |
113 | NeilBrown | |
114 | Document "Lost locks" as cause for EIO. | |
115 | If an advisory lock is lost, then read/write requests on any | |
116 | affected file descriptor can return EIO - for NFSv4 at least. | |
117 | ||
118 | memfd_create.2 | |
119 | Michael Kerrisk | |
120 | glibc support for memfd_create() was added in version 2.27 | |
121 | ||
122 | mlock.2 | |
123 | Michael Kerrisk | |
124 | Make details for MLOCK_ONFAULT a little more explicit | |
125 | Michael Kerrisk | |
126 | glibc support for mlock2() is added in version 2.27 | |
127 | ||
128 | mmap.2 | |
129 | John Hubbard [Michael Hocko] | |
130 | MAP_FIXED is no longer discouraged | |
131 | MAP_FIXED has been widely used for a very long time, yet the man | |
132 | page still claims that "the use of this option is discouraged". | |
133 | John Hubbard | |
134 | MAP_FIXED updated documentation | |
135 | -- Expand the documentation to discuss the hazards in | |
136 | enough detail to allow avoiding them. | |
137 | ||
138 | -- Mention the upcoming MAP_FIXED_SAFE flag. | |
139 | ||
140 | -- Enhance the alignment requirement slightly. | |
141 | ||
142 | mount.2 | |
143 | Keno Fischer [Michael Kerrisk] | |
144 | Add EINVAL error condition when MS_BINDing MNT_LOCKED submounts | |
145 | ||
146 | mprotect.2 | |
147 | pkey_alloc.2 | |
148 | Michael Kerrisk | |
149 | Glibc support for memory protection keys was added in version 2.27 | |
150 | ||
151 | perf_event_open.2 | |
152 | Michael Kerrisk | |
153 | SEE ALSO: add perf(1) | |
154 | ||
155 | pkey_alloc.2 | |
156 | Michael Kerrisk | |
157 | Clarify description of pkey_alloc() 'flags' argument | |
158 | ||
159 | prctl.2 | |
160 | Michael Kerrisk | |
161 | Defer to capabilities(7) for discussion of the "keep capabilities" flag | |
162 | ||
163 | recvmmsg.2 | |
164 | sendmmsg.2 | |
165 | Nikola Forró | |
166 | Point out that error handling is unreliable | |
167 | ||
168 | seccomp.2 | |
169 | Michael Kerrisk | |
170 | Clarify that SECCOMP_RET_TRAP SIGSYS signal is thread-directed | |
171 | ||
172 | syscalls.2 | |
173 | Michael Kerrisk | |
174 | Add s390-specific s390_sthyi(2) to syscall list | |
175 | ||
176 | unshare.2 | |
177 | Michael Kerrisk | |
178 | Clarify the EUSERS occurred only until kernel 4.8 | |
179 | ||
180 | errno.3 | |
181 | Michael Kerrisk | |
182 | 'errno -s' can be used to search for errors by string in description | |
183 | Michael Kerrisk | |
184 | Add Linux error text corresponding to ENOMEM | |
185 | ||
186 | fgetpwent.3 | |
187 | Michael Kerrisk | |
188 | Add missing ATTRIBUTES preamble | |
189 | ||
190 | fts.3 | |
191 | Michael Kerrisk [Pradeep Kumar] | |
192 | fts_pathlen = strlen(fts_path) + strlen(fts_name) | |
193 | ||
194 | fuse.4 | |
195 | Michael Kerrisk | |
196 | Places errors in alphabetical order (no content changes) | |
197 | ||
198 | veth.4 | |
199 | Michael Kerrisk | |
200 | Add network_namespaces(7) | |
201 | ||
202 | sysfs.5 | |
203 | Michael Kerrisk | |
204 | Refer to cgroups(7) for information about files in /sys/kernel/cgroup | |
205 | ||
206 | capabilities.7 | |
207 | Michael Kerrisk | |
208 | Note which capability sets are affected by SECBIT_NO_SETUID_FIXUP | |
209 | Note explicitly that SECBIT_NO_SETUID_FIXUP is relevant for | |
210 | the permitted, effective, and ambient capability sets. | |
211 | Michael Kerrisk | |
212 | Deemphasize the ancient prctl(2) PR_SET_KEEPCAPS command | |
213 | The modern approach is SECBITS_KEEP_CAPS. | |
214 | Michael Kerrisk | |
215 | Clarify effect of CAP_SETFCAP | |
216 | Make it clear that CAP_SETFCAP allows setting arbitrary | |
217 | capabilities on a file. | |
218 | Michael Kerrisk | |
219 | Clarify which capability sets are effected by SECBIT_KEEP_CAPS | |
220 | This flag has relevance only for the process permitted and | |
221 | effective sets. | |
222 | Michael Kerrisk | |
223 | Rephrase CAP_SETPCAP description | |
224 | * Mention kernel versions. | |
225 | * Place current kernel behavior first | |
226 | Michael Kerrisk | |
227 | SECBIT_KEEP_CAPS is ignored if SECBIT_NO_SETUID_FIXUP is set | |
228 | Michael Kerrisk | |
229 | Ambient set is also cleared when UIDs are set to nonzero value | |
230 | ||
231 | cgroups.7 | |
232 | Michael Kerrisk | |
233 | Add a more complete description of cgroup v1 named hierarchies | |
234 | Michael Kerrisk | |
235 | Add a section on unmounting cgroup v1 filesystems | |
236 | Michael Kerrisk | |
237 | Add subsection describing cgroups v2 subtree delegation | |
238 | Michael Kerrisk | |
239 | Mention ENOENT error that can occur when writing to subtree_control file | |
240 | Michael Kerrisk | |
241 | Add list of currently available version 2 controllers | |
242 | Nikolay Borisov | |
243 | Add information about RDMA controller | |
244 | Michael Kerrisk | |
245 | Rewrite the description of cgroup v2 subtree control | |
246 | Michael Kerrisk [Tejun Heo] | |
247 | Note Linux 4.11 changes to cgroup v2 delegation containment rules | |
248 | Michael Kerrisk | |
249 | systemd(1) nowadays automatically mounts the cgroup2 filesystem | |
250 | Michael Kerrisk | |
251 | Clarify that cgroup.controllers is read-only | |
252 | Michael Kerrisk | |
253 | Elaborate a little on problems of splitting threads across cgroups in v1 | |
254 | Michael Kerrisk [Tejun Heo] | |
255 | Tweak the description of delegation of cgroup.subtree_control | |
256 | ||
257 | ip.7 | |
258 | Ricardo Biehl Pasquali | |
259 | INADDR_* values cannot be assigned directly to 's_addr' | |
260 | Michael Kerrisk | |
261 | s/INADDR_ANY/INADDR_LOOPBACK/ in discussion of htonl() | |
262 | INADDR_LOOPBACK is a better example, since it is not | |
263 | byte-order neutral. | |
264 | ||
265 | namespaces.7 | |
266 | network_namespaces.7 | |
267 | Michael Kerrisk | |
268 | Move content from namespaces(7) to network_namespaces(7) | |
269 | ||
270 | pid_namespaces.7 | |
271 | Michael Kerrisk | |
272 | SEE ALSO: add mount_namespaces(7) | |
273 | ||
274 | sched.7 | |
275 | Michael Kerrisk [Andrea Parri] | |
276 | Correctly describe effect of priority changes for RT threads | |
277 | The placement of a thread in the run queue for its new | |
278 | priority depends on the direction of movement in priority. | |
279 | (This appears to contradict POSIX, except in the case of | |
280 | pthread_setschedprio().) | |
281 | ||
282 | user_namespaces.7 | |
283 | Michael Kerrisk | |
284 | Mention NS_GET_OWNER_UID ioctl() operation |