]> git.ipfire.org Git - thirdparty/man-pages.git/blob - Changes
Ready for 4.03
[thirdparty/man-pages.git] / Changes
1 ==================== Changes in man-pages-4.03 ====================
2
3 Released: 2015-12-05, Munich
4
5
6 Contributors
7 ------------
8
9 The following people contributed patches/fixes or (noted in brackets
10 in the changelog below) reports, notes, and ideas that have been
11 incorporated in changes in this release:
12
13 Alexander Shishkin <alexander.shishkin@linux.intel.com>
14 Alexei Starovoitov <ast@plumgrid.com>
15 Andy Lutomirski <luto@kernel.org>
16 Arto Bendiken <arto@bendiken.net>
17 Carlos O'Donell <carlos@redhat.com>
18 Casper Ti. Vector <caspervector@gmail.com>
19 Daniel Borkmann <daniel@iogearbox.net>
20 David Drysdale <drysdale@google.com>
21 Eric B Munson <emunson@akamai.com>
22 Florian Weimer <fweimer@redhat.com>
23 Gabriel F. T. Gomes <gftg@linux.vnet.ibm.com>
24 Heinrich Schuchardt <xypron.glpk@gmx.de>
25 Ingo Molnar <mingo@kernel.org>
26 Jakub Wilk <jwilk@jwilk.net>
27 Johannes Stüttgen <Johannes.Stuettgen@gmail.com>
28 Jonathan Wakely <jwakely@redhat.com>
29 Jonny Grant <jg@jguk.org>
30 Kees Cook <keescook@chromium.org>
31 Maria Guseva <m.guseva@samsung.com>
32 Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
33 Meikun Wang <alikewmk@gmail.com>
34 Michael Kerrisk <mtk.manpages@gmail.com>
35 Michal Hocko <mhocko@suse.com>
36 Mike Frysinger <vapier@gentoo.org>
37 Namhyung Kim <namhyung@gmail.com>
38 Nikola Forró <nforro@redhat.com>
39 Olivier TARTROU <olivier.tartrou@gmail.com>
40 Peter Hurley <peter@hurleysoftware.com>
41 Peter Zijlstra (Intel) <peterz@infradead.org>
42 Ross Zwisler <ross.zwisler@linux.intel.com>
43 Serge Hallyn <serge.hallyn@canonical.com>
44 Silvan Jegen <s.jegen@gmail.com>
45 Stefan Tauner <tauner@technikum-wien.at>
46 Steven Rostedt <rostedt@goodmis.org>
47 Tobias Stoeckmann <tobias@stoeckmann.org>
48 Tycho Andersen <tycho.andersen@canonical.com>
49 Ville Skyttä <ville.skytta@iki.fi>
50 Vince Weaver <vincent.weaver@maine.edu>
51 Zeng Linggang <zenglg.jy@cn.fujitsu.com>
52
53 Apologies if I missed anyone!
54
55
56 Newly documented interfaces in existing pages
57 ---------------------------------------------
58
59 perf_event_open.2
60 Vince Weaver
61 4.1 adds AUX sample support
62 Vince Weaver
63 4.1 data_offset and data_size fields
64 Vince Weaver [Alexander Shishkin]
65 Document aux_{head,tail,offset,size} support
66 Vince Weaver
67 4.0 update rdpmc documentation
68 Vince Weaver
69 4.1 adds PERF_RECORD_ITRACE_START
70 Vince Weaver
71 Document 4.1 clockid support
72 Vince Weaver [Steven Rostedt, Masami Hiramatsu]
73 4.1 PERF_EVENT_IOC_SET_BPF support
74 Vince Weaver
75 4.1 adds AUX_FLAG_OVERWRITE support
76 Vince Weaver
77 4.1 PERF_SAMPLE_BRANCH_CALL_STACK
78 Vince Weaver
79 4.1 adds aux_watermark
80 Vince Weaver
81 Add possibility of EBUSY error
82
83 prctl.2
84 Andy Lutomirski [Kees Cook, Serge Hallyn]
85 Document operations for ambient capabilities
86 Michael Kerrisk
87 Rework PR_CAP_AMBIENT text
88 Note that arg4 and arg5 must be zero for CAP_AMBIENT
89 RETURN VALUE: Add PR_CAP_AMBIENT + PR_CAP_AMBIENT_IS_SET case
90 ERRORS: document PR_CAP_AMBIENT error cases
91
92 __ppc_set_ppr_med.3
93 Gabriel F. T. Gomes
94 Document PPC functions providing access to PPR
95 GNU C Library commit 1747fcda4902a3b46183d93fb16ed9b436b2608b
96 extends the priorities that can be set to the Program Priority
97 Register (PPR), with the functions: __ppc_set_ppr_very_low(3)
98 and __ppc_set_ppr_med_high(3).
99
100 capabilities.7
101 Andy Lutomirski [Kees Cook, Serge Hallyn]
102 Document ambient capabilities
103 Michael Kerrisk
104 Various additions and reworkings for ambient capability text
105
106
107 New and changed links
108 ---------------------
109
110 __ppc_set_ppr_med_high.3
111 Gabriel F. T. Gomes
112 New link to __ppc_set_ppr_med.3
113
114 __ppc_set_ppr_very_low.3
115 Gabriel F. T. Gomes
116 New link to __ppc_set_ppr_med.3
117
118
119 Changes to individual pages
120 ---------------------------
121
122 mremap.2
123 Eric B Munson [Michal Hocko]
124 Add note about mremap() with locked areas
125 When mremap() is used to move or expand a mapping that is locked
126 with mlock() or equivalent it will attempt to populate the new
127 area. However, like mmap(MAP_LOCKED), mremap() will not fail if
128 the area cannot be populated. Also like mmap(MAP_LOCKED) this
129 might come as a surprise to users and should be noted.
130 open.2
131 Michael Kerrisk [David Drysdale]
132 Remove accidental mention of O_TTY_INIT
133 An earlier edit mentioned O_TTY_INIT as a file creation flag.
134 That's true, according POSIX, but Linux does not implement
135 this flag, so remove mention of it.
136
137 pipe.2
138 Michael Kerrisk
139 SEE ALSO: add splice(2)
140
141 prctl.2
142 Michael Kerrisk
143 Reorder options alphabetically
144 Employ a pseudo-alphabetical order, ordering options after removal
145 of any "PR_", "PR_SET_", or "PR_GET" prefix.
146 Michael Kerrisk
147 Fix alphabetical misplacements in ERRORS
148
149 ptrace.2
150 Tycho Andersen
151 Document PTRACE_O_SUSPEND_SECCOMP flag
152 Michael Kerrisk
153 Document /proc/sys/kernel/yama/ptrace_scope
154 Michael Kerrisk
155 Note that PTRACE_ATTACH cannot be applied to nondumpable processes
156 Michael Kerrisk
157 SEE ALSO: add prctl(2)
158
159 reboot.2
160 Casper Ti. Vector
161 1-argument reboot() is also provided by alternative libc
162
163 seccomp.2
164 Michael Kerrisk
165 Describe use of 'instruction_pointer' data field
166 Michael Kerrisk [Kees Cook]
167 Note why all filters in a set are executed even after SECCOMP_RET_KILL
168
169 signalfd.2
170 Michael Kerrisk
171 Describe semantics with respect to SCM_RIGHTS
172
173 syscalls.2
174 Michael Kerrisk
175 Add mlock(2)
176 Michael Kerrisk
177 Add userfaultfd()
178
179 daemon.3
180 Michael Kerrisk [Johannes Stüttgen]
181 Note that daemon() is buggy with respect to controlling tty acquisition
182
183 dirfd.3
184 Jonathan Wakely
185 Remove outdated NOTES
186 As stated in the SYNOPSIS, since glibc 2.10 this function is also
187 declared by the relevant X/Open and POSIX macros.
188
189 dlopen.3
190 Michael Kerrisk
191 Make it more explicit that LD_BIND_NOW overrides RTLD_LAZY
192 Michael Kerrisk [Florian Weimer]
193 Correct the pathname used in EXAMPLE
194 Quoting Florian:
195
196 This does not work because libm.so can be a linker script:
197
198 handle = dlopen("libm.so", RTLD_LAZY);
199
200 The proper way to do this is to include <gnu/lib-names.h>
201 and use LIBM_SO.
202
203 See https://bugzilla.kernel.org/show_bug.cgi?id=108821
204 Michael Kerrisk
205 Include a shell session showing build/run in EXAMPLE
206 Michael Kerrisk
207 Change arguments to main() to "void" in EXAMPLE
208
209 fgetgrent.3
210 Zeng Linggang
211 ATTRIBUTES: Note function that is not thread-safe
212
213 fgetpwent.3
214 Zeng Linggang
215 ATTRIBUTES: Note function that is not thread-safe
216
217 getauxval.3
218 Michael Kerrisk
219 Add some details for AT_SECURE
220
221 getspnam.3
222 Zeng Linggang
223 ATTRIBUTES: Note functions that are/aren't thread-safe
224
225 mallinfo.3
226 Zeng Linggang
227 ATTRIBUTES: Note function that is not thread-safe
228
229 mallopt.3
230 Carlos O'Donell
231 Document M_ARENA_TEST and M_ARENA_MAX
232
233 posix_fallocate.3
234 Michael Kerrisk
235 Clarify text relating to MT-safety
236 Carlos O'Donell
237 Mention glibc emulation caveats
238
239 termios.3
240 Olivier TARTROU
241 Add missing details on behaviour of PARMRK
242 For a serial terminal, with a specific configuration, input bytes
243 with value 0377 are passed to the program as two bytes, 0377 0377.
244
245 tty_ioctl.4
246 Michael Kerrisk [Peter Hurley]
247 Note that TIOCTTYGSTRUCT went away in Linux 2.5.67
248
249 core.5
250 Ross Zwisler
251 Add info about DAX coredump filtering flags
252 Kernel 4.4 added two new core dump filtering flags,
253 MMF_DUMP_DAX_PRIVATE and MMF_DUMP_DAX_SHARED.
254
255 These flags allow us to explicitly filter DAX mappings.
256 This is desirable because DAX mappings, like hugetlb
257 mappings, have the potential to be very large.
258
259 nsswitch.conf.5
260 Nikola Forró
261 Add list of files being read when "files" service is used
262 This is not mentioned anywhere. Users can assume that the file
263 being read is something like /etc/$DATABASE, but that's not
264 always the case. It's better to explicitly specify which
265 file is read for each respective database. The list of
266 files was acquired from glibc source code.
267
268 proc.5
269 Heinrich Schuchardt [Michael Kerrisk]
270 Add details for threads-max
271 Add detail information for threads-max.
272 The checks for minimum and maximum values exist since kernel 4.1.
273 https://lkml.org/lkml/2015/3/15/96
274 Heinrich Schuchardt
275 /proc/sys: Describe whitespace characters
276 Michael Kerrisk
277 Document 'CapAmb' in /proc/PID/status
278 Michael Kerrisk
279 Add reference to ptrace(2) for /proc/sys/kernel/yama/ptrace_scope
280
281 aio.7
282 Michael Kerrisk [Meikun Wang]
283 Add missing include file, <fcntl.h>, to example program
284
285 mq_overview.7
286 Michael Kerrisk [Arto Bendiken]
287 Document QSIZE bug that appeared in 3.5 and was fixed in 4.2
288
289 path_resolution.7
290 Michael Kerrisk
291 Clarify recursive resolution of symlinks and note limits
292
293 pipe.7
294 Michael Kerrisk
295 SEE ALSO: add splice(2)
296
297 rtld-audit.7
298 Namhyung Kim
299 Fix (typo) error in la_pltenter() description
300 s/la_pltenter()/la_pltexit()/
301
302 la_pltenter() is called regardless of the value of
303 framesizep but la_pltexit() is called only if la_pltenter()
304 returns with non-zero framesizep set. I spent long time to
305 figure out why la_pltexit() is not called at all.
306
307 signal.7
308 Michael Kerrisk [Michael Hocko]
309 Note async-signal-safe functions added by POSIX.1-2008 TC1
310
311 tcp.7
312 Daniel Borkmann [Michael Kerrisk]
313 Improve paragraphs on tcp_ecn and add tcp_ecn_fallback bullet
314 Improve description of tcp_ecn, fix the RFC number and it's
315 not a boolean anymore since long time, and add a description
316 for tcp_ecn_fallback.
317
318 See also kernel doc under Documentation/networking/ip-sysctl.txt
319 on tcp_ecn and tcp_ecn_fallback.
320
321 ld.so.8
322 Michael Kerrisk
323 LD_POINTER_GUARD has been removed in glibc 2.23
324 Michael Kerrisk
325 Describe secure-execution mode
326 Michael Kerrisk [Maria Guseva]
327 Replace mentions of set-UID/set-GID programs with secure-execution mode
328 Inspired by a patch from Maria Guseva.
329 Maria Guseva [Silvan Jegen]
330 LD_DEBUG is effective in secure-execution mode if /etc/suid-debug exists