crypt.3
mtk, after a Fedora downstream patch
Describe additional encryption algorithms.
- See also: https://bugzilla.redhat.com/show_bug.cgi?id=428280.
+ See also: https://bugzilla.redhat.com/show_bug.cgi?id=428280.
errno.3
mtk
Michael Kerrisk
Linux now imposes a floor on the ARG_MAX limit
Starting with Linux 2.6.23, the ARG_MAX limit became
- settable via (1/4 of) RLIMIT_STACK. This broke ABI
- compatibility if RLIMIT_STACK was set such that ARG_MAX
- was < 32 pages. Document the fact that since 2.6.25
- Linux imposes a floor on ARG_MAX, so that the old limit
- of 32 pages is guaranteed.
+ settable via (1/4 of) RLIMIT_STACK. This broke ABI
+ compatibility if RLIMIT_STACK was set such that ARG_MAX
+ was < 32 pages. Document the fact that since 2.6.25
+ Linux imposes a floor on ARG_MAX, so that the old limit
+ of 32 pages is guaranteed.
For some background on the changes to ARG_MAX in
- kernels 2.6.23 and 2.6.25, see:
+ kernels 2.6.23 and 2.6.25, see:
http://sourceware.org/bugzilla/show_bug.cgi?id=5786
http://bugzilla.kernel.org/show_bug.cgi?id=10095
http://thread.gmane.org/gmane.linux.kernel/646709/focus=648101,
checked into 2.6.25 as
- commit a64e715fc74b1a7dcc5944f848acc38b2c4d4ee2.
+ commit a64e715fc74b1a7dcc5944f848acc38b2c4d4ee2.
Also some reordering/rewording of the discussion of ARG_MAX.
Michael Kerrisk
Note lack of glibc wrapper; caller must use syscall(2)
Glibc doesn't (and quite probably won't) include a
- wrapper for this system call. Therefore, point out that
- potential callers will need to use syscall(2), and rewrite
- the RETURN VALUE text to show things as they would be if
- syscall() is used.
+ wrapper for this system call. Therefore, point out that
+ potential callers will need to use syscall(2), and rewrite
+ the RETURN VALUE text to show things as they would be if
+ syscall() is used.
Michael Kerrisk
Refer reader to posix_fallocate(3) for portable interface
Add a para to start of page that points out that this is the
low-level, Linux-specific API, and point the reader to
- posix_fallocate(3) for the portable API.
+ posix_fallocate(3) for the portable API.
getdents.2
readdir.3
Michael Kerrisk
s/dirent/linux_dirent/
The structure isn't currently defined in glibc headers,
- and the kernel name of the structure is 'linux_dirent' (as
+ and the kernel name of the structure is 'linux_dirent' (as
was already used in some, but not all, places in this page).
getrlimit.2
Michael Kerrisk
Split umount*() out into a separate page
The length of this page means that it's becoming difficult
- to parse which info is specific to mount() versus
- umount()/umount2(), so split the umount material out into
- its own page.
+ to parse which info is specific to mount() versus
+ umount()/umount2(), so split the umount material out into
+ its own page.
pause.2
Michael Kerrisk
Michael Kerrisk
s/dirent/old_linux_dirent/
Nowadays, this is the name of the structure in the
- kernel sources.
+ kernel sources.
Michael Kerrisk
Remove words "which may change"
These words are slightly bogus: although the interface
- is obsolete, for ABI-compatibility reasons, the kernel folk
- should never be changing this interface.
+ is obsolete, for ABI-compatibility reasons, the kernel folk
+ should never be changing this interface.
Michael Kerrisk
Remove header files from SYNOPSIS
glibc doesn't provide any support for readdir(2),
Michael Kerrisk
Explain how thread's pending signal set is defined
The pending set is the union of per-thread pending signals
- and process-wide pending signals.
+ and process-wide pending signals.
sigprocmask.2
Michael Kerrisk
hsearch.3
André Goddard Rosa
Call hdestroy() after using hash table created by hcreate(),
- for the sake of completeness
+ for the sake of completeness
mq_getattr.3
Michael Kerrisk
added. (strerror() was already in the list in POSIX.1-2001.)
Michael Kerrisk
Tweak text on sigpause() cancellation point
- In POSIX.1-2009, this function moves from the "must be"
+ In POSIX.1-2008, this function moves from the "must be"
to the "may be" list.
Michael Kerrisk
Add ref to signal(7) for further info on use of real-time signals
fstatat.2
Michael Kerrisk [David Howells]
Document AT_NO_AUTOMOUNT
- This flag was added in Linux 2.6.38.
+ This flag was added in Linux 2.6.38.
lseek.2
Michael Kerrisk [Eric Blake, Sunil Mushran]
Neil Horman
Document the SO_RXQ_OVFL socket option
Michael Kerrisk
- Add kernel version number for SO_RXQ_OVFL
+ Add kernel version number for SO_RXQ_OVFL
New and changed links
"fileutils", which long ago become coreutils, and the
piece under NOTES note some behavior of sync(2)
that ceased to be true many years ago. The man-pages
- project generally focuses on only Linux kernel and
+ project generally focuses on only Linux kernel and
(g)libc interfaces, so this sync(8) page doesn't really
- belong. Furthermore, coreutils has a sync(1) page which
- covers the same command. After discussions on the
- coreutils list, I've decided to retire this page from
- man-pages.
+ belong. Furthermore, coreutils has a sync(1) page which
+ covers the same command. After discussions on the
+ coreutils list, I've decided to retire this page from
+ man-pages.
Changes to individual pages
---------------------------
Michael Kerrisk
Remove mention of the obsolete _POSIX_SOURCE macro from SYNOPSIS
_POSIX_SOURCE was a POSIX.1-1990 creation that was soon made
- obsolete bu _POSIX_C_SOURCE. Retaining mention of it
+ obsolete by _POSIX_C_SOURCE. Retaining mention of it
in the feature test macro requirements section of the
SYNOPSIS doesn't contain important information, and may
mislead readers into actually trying to use this macro.
unicode.7
Eugene Syromyatnikov
Update pointer to in-kernel Unicode terminal support documentation
+
+
+==================== Changes in man-pages-4.14 ====================
+
+Released: 2017-11-27, Paris
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Adhemerval Zanella <adhemerval.zanella@linaro.org>
+Adrian Bunk <bunk@kernel.org>
+Ahmad Fatoum <ahmad@a3f.at>
+Andrea Arcangeli <aarcange@redhat.com>
+Bastien Roucaries <roucaries.bastien@gmail.com>
+Breno Leitao <leitao@debian.org>
+Carlos O'Donell <carlos@redhat.com>
+Christian Brauner <christian.brauner@ubuntu.com>
+Christoph Hellwig <hch@lst.de>
+Colm MacCárthaigh <colm@allcosts.net>
+Craig Ringer <craig.ringer@2ndquadrant.com>
+Cristian Rodríguez <crrodriguez@opensuse.org>
+David Eckardt <david.eckardt@sociomantic.com>
+Don Brace <don.brace@microsemi.com>
+Elliot Hughes <enh@google.com>
+Eric W. Biederman <ebiederm@xmission.com>
+Fabio Scotoni <fabio@esse.ch>
+Fangrui Song <i@maskray.me>
+Florian Weimer <fweimer@redhat.com>
+G. Branden Robinson <g.branden.robinson@gmail.com>
+Goldwyn Rodrigues <rgoldwyn@suse.com>
+Grégory Vander Schueren <gregory.vanderschueren@tessares.net>
+Jakub Wilk <jwilk@jwilk.net>
+Jann Horn <jannh@google.com>
+Jeff Layton <jlayton@redhat.com>
+Jens Axboe <axboe@kernel.dk>
+Jonny Grant <jg@jguk.org>
+Julien Gomes <julien@arista.com>
+Kees Cook <keescook@chromium.org>
+Křištof Želechovski <giecrilj@stegny.2a.pl>
+Lennart Poettering <lennart@poettering.net>
+Lucas Werkmeister <mail@lucaswerkmeister.de>
+Marcus Folkesson <marcus.folkesson@gmail.com>
+Marin H. <mar-tSIEzQ@neutronstar.noip.me>
+Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
+Matthew Wilcox <willy@infradead.org>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Michal Hocko <mhocko@kernel.org>
+Michał Zegan <webczat_200@poczta.onet.pl>
+Mihir Mehta <mihir@cs.utexas.edu>
+Mike Frysinger <vapier@chromium.org>
+Mike Kravetz <mike.kravetz@oracle.com>
+Mike Rapoport <rppt@linux.vnet.ibm.com>
+Miklos Szeredi <mszeredi@redhat.com>
+NeilBrown <neilb@suse.com>
+Oliver Ebert <oe@outputenable.net>
+Pedro Alves <palves@redhat.com>
+Per Böhlin <Per.Bohlin@zenterio.com>
+Peter Zijlstra <peterz@infradead.org>
+Petr Malat <oss@malat.biz>
+Petr Uzel <petr.uzel@suse.cz>
+Prakash Sangappa <prakash.sangappa@oracle.com>
+Raghavendra D Prabhu <me@rdprabhu.com>
+Rahul Bedarkar <rpal143@gmail.com>
+Ram Pai <linuxram@us.ibm.com>
+Richard Knutsson <richard.knutsson@abelko.se>
+Rik van Riel <riel@redhat.com>
+Scott Vokes <vokes.s@gmail.com>
+Seonghun Lim <wariua@gmail.com>
+Stas Sergeev <stsp@list.ru>
+Stefan Puiu <stefan.puiu@gmail.com>
+Thomas Gleixner <tglx@linutronix.de>
+Tobias Klausmann <klausman@schwarzvogel.de>
+Tomas Pospisek <tpo@sourcepole.ch>
+Tyler Hicks <tyhicks@canonical.com>
+Victor Porton <porton@narod.ru>
+Walter Harms <wharms@bfs.de>
+Wesley Aptekar-Cassels <w.aptekar@gmail.com>
+Yubin Ruan <ablacktshirt@gmail.com>
+Zack Weinberg <zackw@panix.com>
+Дилян Палаузов <dilyan.palauzov@aegee.org>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+pthread_spin_init.3
+ Michael Kerrisk [Peter Zijlstra, Thomas Gleixner, Zack Weinberg,
+ Florian Weimer]
+ New page describing pthread_spin_init(3) and pthread_spin_destroy(3)
+
+pthread_spin_lock.3
+ Michael Kerrisk [Carlos O'Donell]
+ New page describing functions that lock and unlock spin locks
+ Add a page describing pthread_spin_lock(3), pthread_spin_unlock(3),
+ and pthread_spin_trylock(3).
+
+smartpqi.4
+ Don Brace [Michael Kerrisk, G. Branden Robinson]
+ Document the smartpqi SCSI driver
+
+veth.4
+ Tomáš Pospíšek, Eric Biederman, Michael Kerrisk
+ New page documenting veth virtual ethernet devices
+ Based on a page from Tomáš Pospíšek, with some clean-ups by mtk.
+
+
+Removed pages
+-------------
+
+infnan.3:
+ Michael Kerrisk
+ This function was in libc4 and libc5, but never part
+ of glibc. It ceased to be relevant nearly 20 years
+ ago. Time to remove the man page.
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+ioctl_userfaultfd.2
+userfaultfd.2
+ Prakash Sangappa [Andrea Arcangeli, Mike Rapoport]
+ Add description for UFFD_FEATURE_SIGBUS
+
+madvise.2
+ Rik van Riel [Colm MacCárthaigh, Michael Kerrisk]
+ Document MADV_WIPEONFORK and MADV_KEEPONFORK
+ Michael Kerrisk
+ Note fork() and execve() semantics for wipe-on-fork setting
+
+membarrier.2
+ Mathieu Desnoyers
+ Update membarrier manpage for 4.14
+ Add documentation for these new membarrier() commands:
+ MEMBARRIER_CMD_PRIVATE_EXPEDITED
+ MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED
+
+memfd_create.2
+ Mike Kravetz
+ Add description of MFD_HUGETLB (hugetlbfs) support
+ hugetlbfs support for memfd_create() was recently merged by Linus
+ and should be in the Linux 4.14 release. To request hugetlbfs
+ support a new memfd_create() flag (MFD_HUGETLB) was added.
+
+readv.2
+ Christoph Hellwig
+ Document RWF_NOWAIT added in Linux 4.14
+
+seccomp.2
+ Tyler Hicks
+ Document the SECCOMP_GET_ACTION_AVAIL operation added in Linux 4.14
+ Tyler Hicks
+ Document the SECCOMP_FILTER_FLAG_LOG flag added in Linux 4.14
+ Tyler Hicks
+ Document the SECCOMP_RET_LOG action added In Linux 4.14
+ Michael Kerrisk [Kees Cook]
+ Add description of SECCOMP_RET_KILL_PROCESS
+ Michael Kerrisk
+ Add SECCOMP_RET_KILL_THREAD description and rework SECCOMP_RET_KILL text
+ Michael Kerrisk
+ Document the seccomp audit logging feature added in Linux 4.14
+
+seccomp.2
+proc.5
+ Tyler Hicks
+ Document the seccomp /proc interfaces added in Linux 4.14
+ Document the seccomp /proc interfaces in Linux 4.14:
+ /proc/sys/kernel/seccomp/actions_avail and
+ /proc/sys/kernel/seccomp/actions_logged.
+
+sigaltstack.2
+ Michael Kerrisk [Stas Sergeev]
+ Document the SS_AUTODISARM flag added in Linux 4.7
+
+proc.5
+ Michael Kerrisk
+ Document /proc/locks
+ Oliver Ebert
+ Document /proc/kpagecgroup
+ Oliver Ebert
+ Add KPF_BALLOON, KPF_ZERO_PAGE, and KPF_IDLE for /proc/kpageflags
+
+pid_namespaces.7
+ Michael Kerrisk
+ Document /proc/sys/kernel/ns_last_pid
+
+
+New and changed links
+---------------------
+
+pthread_spin_destroy.3
+ Michael Kerrisk
+ New link to new pthread_spin_init.3 page
+
+pthread_spin_trylock.3
+pthread_spin_unlock.3
+ Michael Kerrisk
+ New links to new pthread_spin_lock.3 page
+
+
+Global changes
+--------------
+
+Various pages
+ Michael Kerrisk
+ Consistently use "x86-64", not "x86_64"
+ When referring to the architecture, consistently use "x86-64",
+ not "x86_64". Hitherto, there was a mixture of usages, with
+ "x86-64" predominant.
+
+Various pages
+ G. Branden Robinson
+ Replace incorrect uses of Latin abbreviation "cf.".
+ People seem to be using "cf." ("conferre"), which means "compare",
+ to mean "see" instead, for which the Latin abbreviation would be
+ "q.v." ("quod vide" -> "which see").
+
+ In some cases "cf." might actually be the correct term but it's
+ still not clear what specific aspects of a function/system call
+ one is supposed to be comparing.
+
+
+
+Changes to individual pages
+---------------------------
+
+capget.2
+ Michael Kerrisk
+ Clarify discussion of kernels that have no VFS capability support
+
+clock_getres.2
+ Michael Kerrisk
+ clock_gettime() may be implemented in the vDSO
+
+clone.2
+ Michael Kerrisk
+ Warn that the clone() wrapper modifies child_stack in the parent
+ Michael Kerrisk
+ Rework the discussion of the historical CLONE_PID for clarity
+ Michael Kerrisk
+ Add NOTES heading
+ Michael Kerrisk
+ Add a reference to new veth(4) page
+ Michael Kerrisk
+ Eliminate some redundant phrasing in discussion of "fn()"
+ Michael Kerrisk
+ Combine redundant paragraphs describing child_stack==NULL
+ Michael Kerrisk
+ Note that child_stack can be NULL when using the raw system call
+ Michael Kerrisk
+ Remove a redundant paragraph
+
+connect.2
+ Michael Kerrisk
+ Clarify that ECONNREFUSED is for stream sockets
+
+fcntl.2
+ Michael Kerrisk [Jens Axboe]
+ Inode read-write hints persist only until the filesystem is unmounted
+
+flock.2
+ Michael Kerrisk
+ Move NFS details to a headed subsection
+ Michael Kerrisk [Petr Uzel]
+ Placing an exclusive lock over NFS requires the file is open for writing
+
+fork.2
+ Rik van Riel [Colm MacCárthaigh, Michael Kerrisk]
+ Document effect of MADV_WIPEONFORK
+
+fork.2
+getsid.2
+setpgid.2
+setsid.2
+ Ahmad Fatoum
+ Include <sys/types.h> in SYNOPSIS to obtain declaration of pid_t
+
+fsync.2
+ Craig Ringer
+ ERRORS: add ENOSPC
+
+getcpu.2
+ Michael Kerrisk
+ getcpu() may have an implementation in the vDSO
+
+getpid.2
+ Michael Kerrisk
+ Mention that PID == TGID, and note contrast with TID
+ Michael Kerrisk
+ SEE ALSO: add gettid(2)
+
+getrandom.2
+ Michael Kerrisk [Fabio Scotoni]
+ ERRORS: add ENOSYS
+
+getrlimit.2
+ Michael Kerrisk [Scott Vokes]
+ Make it clear RLIMIT_NPROC is a limit on current number of processes
+ https://twitter.com/silentbicycle/status/893849097903505409
+
+gettid.2
+ Michael Kerrisk
+ SEE ALSO: add getpid(2)
+
+gettimeofday.2
+ Michael Kerrisk
+ Note that gettimeofday() may be implemented in the vDSO
+
+ioctl_userfaultfd.2
+ Michael Kerrisk
+ Rework version information for feature bits
+
+io_submit.2
+ Goldwyn Rodrigues
+ Add iocb details to io_submit
+ Add more information about the iocb structure. Explains the
+ fields of the I/O control block structure which is passed to the
+ io_submit() call.
+ Michael Kerrisk
+ Add cross-reference to io_getevents(2)
+ Michael Kerrisk
+ Cross reference pwritev(2) in discussion of RWF_SYNC and RWF_DSYNC
+
+membarrier.2
+ Mathieu Desnoyers
+ Update example to take TSO into account
+ The existing example given specifically states that it focus on
+ x86 (TSO memory model), but gives a read-read vs write-write
+ ordering example, even though this scenario does not require
+ explicit barriers on TSO.
+
+ So either we change the example architecture to a weakly-ordered
+ architecture, or we change the example to a scenario requiring
+ barriers on x86.
+
+ Let's stay on x86, but provide a Dekker as example instead.
+ Mathieu Desnoyers
+ Adapt the MEMBARRIER_CMD_SHARED return value documentation to
+ reflect that it now returns -EINVAL when issued on a system
+ configured for nohz_full.
+
+memfd_create.2
+ Michael Kerrisk
+ Note the limit for size of 'name'
+
+mkdir.2
+ Michael Kerrisk [Raghavendra D Prabhu]
+ ERRORS: document EINVAL error for invalid filename
+
+mmap.2
+ Michael Kerrisk
+ Add explicit text noting that 'length' must be greater than 0
+ Currently, this detail is hidden in ERRORS. Make it clear in
+ the main text.
+ Michael Kerrisk
+ SEE ALSO: add ftruncate(2)
+
+mremap.2
+ Mike Kravetz [Florian Weimer, Jann Horn]
+ Add description of old_size == 0 functionality
+ Since at least the 2.6 time frame, mremap() would create a new
+ mapping of the same pages if 'old_size == 0'. It would also leave
+ the original mapping. This was used to create a 'duplicate
+ mapping'.
+
+ A recent change was made to mremap() so that an attempt to create a
+ duplicate a private mapping will fail.
+ Michael Kerrisk [Michal Hocko, Mike Kravetz]
+ BUGS: describe older behavior for old_size==0 on private mappings
+ Explain the older behavior, and why it changed. This is a
+ follow-up to Mike Kravetz's patch documenting the behavior
+ for old_size==0 with shared mappings.
+ Michael Kerrisk
+ Reformat EINVAL errors as a list
+
+open.2
+ Michael Kerrisk
+ By contrast with O_RDONLY, no file permissions are required for O_PATH
+ Note one of the significant advantages of O_PATH: many of the
+ operations applied to O_PATH file descriptors don't require
+ read permission, so there's no reason why the open() itself
+ should require read permission.
+ Michael Kerrisk
+ Note use of O_PATH to provide O_EXEC functionality
+ Michael Kerrisk
+ Mention O_PATH file descriptor use with fexecve(3)
+ Michael Kerrisk
+ ERRORS: document EINVAL error for invalid filename
+ Michael Kerrisk
+ Clarify that O_TMPFILE creates a *regular* file
+ Michael Kerrisk
+ Make it explicit that O_CREAT creates a regular file
+ Michael Kerrisk
+ Since glibc 2.26, the open() wrapper always uses the openat() syscall
+ Michael Kerrisk
+ Change pathname used in discussion of rationale for openat()
+ /path/to/file is a little confusing as a pathname
+ Michael Kerrisk
+ Make the purpose of open() a little clearer at the start of the page
+
+open_by_handle_at.2
+ NeilBrown
+ Clarifications needed due to NFS reexport
+ NeilBrown [Lennart Poettering]
+ Clarify MAX_HANDLE_SZ
+ As hinted in the kernel source, MAX_HANDLE_SZ is a hint
+ rather than a promise.
+
+pipe.2
+ Michael Kerrisk [Marin H.]
+ Since Linux 4.5, fcntl() can be used to set O_DIRECT for a pipe
+ See https://bugzilla.kernel.org/show_bug.cgi?id=197917
+
+pivot_root.2
+ Michael Kerrisk
+ SEE ALSO: add switch_root(8)
+
+pkey_alloc.2
+ Breno Leitao
+ Fix argument order
+ Currently pkey_alloc() syscall has two arguments, and the very
+ first argument is still not supported and should be set to zero.
+ The second argument is the one that should specify the
+ page access rights.
+
+ptrace.2
+ Michael Kerrisk
+ SEE ALSO: add ltrace(1)
+
+reboot.2
+ Michael Kerrisk [Michał Zegan]
+ Fix bogus description of reboot() from non-initial PID namespace
+ The current text was confused (mea culpa). No signal is sent to
+ the init() process. Rather, depending on the 'cmd' given to
+ reboot(), the 'group_exit_code' value will set to either SIGHUP or
+ SIGINT, with the effect that one of those signals is reported to
+ wait() in the parent process.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=195899
+ Michael Kerrisk
+ SEE ALSO: remove reboot(8) (synonym for halt(8)); add shutdown(8)
+ Michael Kerrisk
+ SEE ALSO: add systemctl(1), systemd(1)
+
+recvmmsg.2
+sendmmsg.2
+ Elliot Hughes
+ Type fixes in SYNOPSIS
+ [mtk: The raw system calls use "unsigned int", but the glibc
+ wrappers have "int" for the 'flags' argument.]
+
+sched_setaffinity.2
+ Michael Kerrisk
+ SEE ALSO: add numactl(8)
+
+sched_yield.2
+ Michael Kerrisk [Peter Zijlstra]
+ sched_yield() is intended for use with real-time scheduling policies
+
+seccomp.2
+ Michael Kerrisk [Adhemerval Zanella, Florian Weimer, Kees Cook]
+ Add some Caveats regarding the use of seccomp filters
+ Michael Kerrisk
+ Document the "default" filter return action
+ The kernel defaults to either SECCOMP_RET_KILL_PROCESS
+ or SECCOMP_RET_KILL_THREAD for unrecognized filter
+ return action values.
+ Michael Kerrisk [Kees Cook]
+ Change SECCOMP_RET_ACTION to SECCOMP_RET_ACTION_FULL
+ In Linux 4.14, the action component of the return value
+ switched from being 15 bits to being 16 bits. A new macro,
+ SECCOMP_RET_ACTION_FULL, that masks the 16 bits was added,
+ to replace the older SECCOMP_RET_ACTION.
+ Michael Kerrisk
+ Explicitly note that other threads survive SECCOMP_RET_KILL_THREAD
+ Michael Kerrisk
+ SEE ALSO: add strace(1)
+
+send.2
+ Grégory Vander Schueren
+ Add EALREADY to ERRORS
+
+setns.2
+ Michael Kerrisk
+ SEE ALSO: add nsenter(1)
+
+shmop.2
+ Yubin Ruan
+ Note that return value of shmat() is page-aligned
+
+sigaction.2
+ Michael Kerrisk
+ Rework discussion of SA_SIGINFO handler arguments
+ Expand and rework the text a little, in particular adding
+ a reference to sigreturn(2) as a source of further
+ information about the ucontext argument.
+ Michael Kerrisk
+ Mention that libc sets the act.sa_restorer field
+
+sigaltstack.2
+ Michael Kerrisk [Walter Harms]
+ Reword BUGS text to be a little clearer
+ Michael Kerrisk
+ Add explicit error handling to example code
+ Michael Kerrisk
+ Add use of sigaction() to example code
+
+sigreturn.2
+ Michael Kerrisk
+ Make it a little clearer that a stack frame is created by the kernel
+ Michael Kerrisk
+ glibc has a simple wrapper for sigreturn() that returns ENOSYS
+
+splice.2
+ Michael Kerrisk
+ Since Linux 2.6.31,'fd_in' and 'fd_out' may both refer to pipes
+
+stat.2
+ Michael Kerrisk [Richard Knutsson]
+ Use lstat() instead of stat()
+ It's more logical to use lstat() in the example code,
+ since one can then experiment with symbolic links, and
+ also the S_IFLNK case can also occur.
+ NeilBrown
+ Correct AT_NO_AUTOMOUNT text and general revisions
+ Expand on the relationship between fstatat() and the other three
+ functions, and improve the description of AT_NO_AUTOMOUNT.
+ Specifically, both stat() and lstat() act the same way with
+ respect to automounts, and that behavior matches fstatat() with
+ the AT_NO_AUTOMOUNT flag.
+
+statfs.2
+ Michael Kerrisk
+ Add some comments noting filesystems that are no longer current
+ Michael Kerrisk
+ Add comments describing a few filesystem types
+
+time.2
+ Michael Kerrisk
+ Note that time() may be implemented in the vDSO
+ Michael Kerrisk [Victor Porton]
+ Language fix-up: clarify that "tasks" means "work"
+ See https://bugzilla.kernel.org/show_bug.cgi?id=197183
+
+userfaultfd.2
+ Mike Rapoport
+ BUGS: document spurious UFFD_EVENT_FORK
+
+write.2
+fsync.2
+close.2
+ NeilBrown [Jeff Layton]
+ Update description of error codes
+ Since 4.13, errors from writeback are more reliably reported
+ to all file descriptors that might be relevant.
+
+ Add notes to this effect, and also add detail about ENOSPC and
+ EDQUOT which can be delayed in a similar many to EIO - for NFS
+ in particular.
+
+abort.3
+ Michael Kerrisk
+ Starting with glibc 2.27, abort() does not attempt to flush streams
+ Michael Kerrisk
+ SEE ALSO: add assert(3)
+
+backtrace_symbols_fd(3)
+ Stefan Puiu [Walter Harms]
+ backtrace_symbols_fd() can trigger a call to malloc()
+
+daemon.3
+ Michael Kerrisk
+ SEE ALSO: add daemon(7), logrotate(8)
+
+errno.3
+ Michael Kerrisk
+ Note use of errno(1) to look up error names and numbers
+ Michael Kerrisk
+ Update error list for POSIX.1-2008
+ POSIX.1-2008 specified a couple of new errors not present in
+ POSIX.1-2001.
+ Michael Kerrisk [Walter Harms]
+ Note the use of perror(3) and strerror(3)
+ Michael Kerrisk
+ Recast the advice against manually declaring 'errno'
+ Recast the advice against manually declaring 'errno' to
+ a more modern perspective. It's 13 years since the original
+ text was added, and even then it was describing old behavior.
+ Cast the description to be about behavior further away in
+ time, and note more clearly that manual declaration will
+ cause problems with modern C libraries.
+ Michael Kerrisk
+ Add some missing errors
+ Michael Kerrisk
+ Error numbers are positive values (rather than nonzero values)
+ POSIX.1-2008 noted the explicitly the change (to align with
+ the C standards) that error numbers are positive, rather
+ than nonzero.
+ Michael Kerrisk
+ Reorganize the text and add some subheadings
+ Restructure the text and add some subheadings for better
+ readability. No (intentional) content changes.
+ Michael Kerrisk [Wesley Aptekar-Cassels]
+ Note that error numbers vary somewhat across architectures
+ Added after a patch from Wesley Aptekar-Cassels that proposed
+ to add error numbers to the text.
+ Michael Kerrisk
+ Note the <errno.h> also provides the symbolic error names
+ Michael Kerrisk [Walter Harms]
+ Explicitly note that error numbers vary also across UNIX systems
+
+exec.3
+ Michael Kerrisk
+ glibc 2.24 dropped CWD from the default path
+ Document the glibc 2.24 change that dropped CWD from the default
+ search path employed by execlp(), execvp() and execvpe() when
+ PATH is not defined.
+
+fexecve.3
+ Michael Kerrisk
+ O_PATH file descriptors are also usable with fexecve()
+ Cristian Rodríguez
+ fexecve() is now implemented with execveat(2), where available
+ Michael Kerrisk
+ Add some detail on the glibc implementation of fexecve() via execveat(2)
+
+ffs.3
+ Michael Kerrisk
+ glibc 2.27 relaxes the FTM requirements for ffsl() and ffsll()
+
+get_nprocs_conf.3
+ Michael Kerrisk
+ SEE ALSO: add nproc(1)
+
+lround.3
+ Michael Kerrisk [David Eckardt]
+ Clarify that lround() rounds *halfway cases" away from zero
+ See https://bugzilla.kernel.org/show_bug.cgi?id=194601
+
+makedev.3
+ Adrian Bunk
+ glibc has deprecated exposing the definitions via <sys/types.h>
+
+mallinfo.3
+ Jakub Wilk
+ Fix the example
+ Remove reference to non-standard "tlpi_hdr.h" and replace calls to
+ functions that were declared in this header.
+
+malloc.3
+ Michael Kerrisk
+ SEE ALSO: add valgrind(1)
+
+popen.3
+ Michael Kerrisk
+ Add a cross reference to Caveats in system(3)
+ All of the same risks regarding system() also apply to popen().
+
+pthread_detach.3
+ Michael Kerrisk [Rahul Bedarkar]
+ Improve sentence describing freeing of resources on process termination
+ As reported by Rahul, the existing sentence could be read as
+ meaning that resources of joined and terminated detached
+ threads are freed only at process termination. Eliminate
+ that possible misreading.
+
+pthread_yield.3
+ Michael Kerrisk [Peter Zijlstra]
+ pthread_yield() is intended for use with real-time scheduling policies
+
+setlocale.3
+ Michael Kerrisk [Křištof Želechovski]
+ The standards do not specify all of the locale categories
+
+sockatmark.3
+ Seonghun Lim
+ Fix cruft in code example
+
+stdio.3
+ Michael Kerrisk
+ Use proper section cross references in function list
+ Michael Kerrisk
+ Remove crufty reference to pc(1)
+
+sysconf.3
+ Michael Kerrisk
+ Mention get_nprocs_conf(3)
+ Mention get_nprocs_conf(3) in discussion of _SC_NPROCESSORS_CONF
+ and _SC_NPROCESSORS_ONLN.
+
+system.3
+ Michael Kerrisk [Bastien Roucaries]
+ Create a "Caveats" subsection to hold warnings about the use of system()
+ See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882222
+ Michael Kerrisk [Bastien Roucaries]
+ Mention PATH explicitly in discussion of system() and set-UID programs
+ Michael Kerrisk [Bastien Roucaries]
+ Note that user input for system() should be carefully sanitized
+ Michael Kerrisk
+ Mention file capabilities in discussion of privileged programs
+ Michael Kerrisk
+ Correctly note which shell Debian uses as (noninteractive) /bin/sh
+
+core.5
+ Michael Kerrisk
+ Add some notes on systemd and core dumps
+ Michael Kerrisk
+ Dumps are not produced if core_pattern is empty and core_uses_pid is 0
+ Michael Kerrisk [Per Böhlin]
+ RLIMIT_CORE is not enforced when piping core dump to a program
+ Michael Kerrisk
+ SEE ALSO: add systemd-coredump(8)
+ Michael Kerrisk
+ SEE ALSO: add coredumpctl(1)
+
+filesystems.5
+ Michael Kerrisk [Jonny Grant]
+ Replace crufty URL reference for 'smb' with up-to-date URL
+ Michael Kerrisk [Jonny Grant]
+ Refer to VFAT as an extended FAT (not DOS) filesystem
+
+proc.5
+ Michael Kerrisk [Miklos Szered, Ram Pai]
+ Correct the description of the parent mount ID for /proc/PID/mountinfo
+ Oliver Ebert
+ Add mmap-exclusive bit for /proc/[pid]/pagemap
+ Marcus Folkesson
+ Update description of /proc/<pid>/oom_score
+ Lucas Werkmeister
+ Clarify permissions in /proc/[pid]/fd/
+ Michael Kerrisk
+ Add reference to pid_namespaces(7) for /proc/sys/kernel/ns_last_pid
+
+shells.5
+ Michael Kerrisk
+ SEE ALSO: add pam_shells(8)
+
+sysfs.5
+ Michael Kerrisk
+ Add a brief explanation of /sys/kernel
+ Michael Kerrisk
+ Add a brief description of /sys/class/net
+ Michael Kerrisk
+ Add a brief description of /sys/kernel/mm
+ Michael Kerrisk
+ Add brief description of /sys/kernel/debug/tracing
+ Michael Kerrisk
+ Add a description of /sys/kernel/mm/hugepages
+
+arp.7
+ Michael Kerrisk
+ SEE ALSO: add arpd(8)
+
+capabilities.7
+ Michael Kerrisk
+ Add a reference to xattr(7) in the discussion of extended attributes
+ Michael Kerrisk
+ SEE ALSO: add captest(8)
+
+epoll.7
+ Michael Kerrisk
+ Note existence of kcmp() KCMP_EPOLL_TFD operation
+
+fifo.7
+ Michael Kerrisk
+ Refer reader to pipe(7) for details of I/O semantics of FIFOs
+
+hier.7
+ Michael Kerrisk
+ SEE ALSO: add file-hierarchy(7)
+
+icmp.7
+ Michael Kerrisk
+ SEE ALSO: add rdisc(8)
+
+man-pages.7
+ Michael Kerrisk
+ Note that "x86-64" is generally preferred over "x86_64"
+ G. Branden Robinson
+ Add a use case for real minus character
+
+namespaces.7
+ Michael Kerrisk
+ Add a reference to new veth(4) page
+ Michael Kerrisk
+ EXAMPLE: refer also to example in clone(2)
+
+pid_namespaces.7
+ Michael Kerrisk
+ SEE ALSO: add reboot(2)
+ Add because reboot(2) has special semantics for non-initial
+ PID namespaces.
+
+pthreads.7
+ Michael Kerrisk
+ SEE ALSO: add pthread_spin_init(3) and pthread_spin_lock(3)
+
+socket.7
+ Michael Kerrisk [Petr Malat, Tobias Klausmann]
+ Correct the description of SO_RXQ_OVFL
+
+standards.7
+ Michael Kerrisk
+ SEE ALSO: add getconf(1), confstr(3), pathconf(3), sysconf(3)
+
+user_namespaces.7
+ Christian Brauner [Michael Kerrisk]
+ Document new 340 line idmap limit
+
+ld.so.8
+ Michael Kerrisk [Yubin Ruan]
+ Simplify language around conferring capabilities
+ The statement "conferring permitted or effective capabilities"
+ to the process is somewhat redundant. Binaries with capabilities
+ confer capabilities only to those process capability sets, so it's
+ simpler to just say "confers capabilities to the process".
+
+
+==================== Changes in man-pages-4.15 ====================
+
+Released: 2018-02-02, Palo Alto
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Adam Liddell <ml+kernel.org@aliddell.com>
+Andrea Parri <parri.andrea@gmail.com>
+Andries E. Brouwer <Andries.Brouwer@cwi.nl>
+Elie Roudninski <xademax@gmail.com>
+Eric Benton <erbenton@comcast.net>
+Florian Weimer <fweimer@redhat.com>
+G. Branden Robinson <g.branden.robinson@gmail.com>
+Jakub Wilk <jwilk@jwilk.net>
+Joel Williamson <jwilliamson@carnegietechnologies.com>
+John Hubbard <jhubbard@nvidia.com>
+Jorgen Hansen <jhansen@vmware.com>
+Keno Fischer <keno@juliacomputing.com>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Michal Hocko <mhocko@kernel.org>
+NeilBrown <neilb@suse.com>
+Nikola Forró <nforro@redhat.com>
+Nikolay Borisov <nborisov@suse.com>
+Pradeep Kumar <pradeepsixer@gmail.com>
+QingFeng Hao <haoqf@linux.vnet.ibm.com>
+Ricardo Biehl Pasquali <pasqualirb@gmail.com>
+roblabla <man-pages@roblab.la>
+Roman Gushchin <guro@fb.com>
+Shawn Landden <slandden@gmail.com>
+Stefan Hajnoczi <stefanha@redhat.com>
+Stefan Raspl <raspl@linux.vnet.ibm.com>
+Tejun Heo <tj@kernel.org>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+s390_sthyi.2
+ QingFeng Hao [Michael Kerrisk]
+ New page for s390-specific s390_sthyi(2)
+
+network_namespaces.7
+ Michael Kerrisk
+ New page describing network namespaces
+ Based on content moved from namespaces(7)
+
+vsock.7
+ Stefan Hajnoczi [Jorgen Hansen, Michael Kerrisk]
+ Document the VSOCK socket address family
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+cgroups.7
+ Michael Kerrisk [Tejun Heo]
+ Document cgroups v2 "thread mode"
+ Michael Kerrisk [Tejun Heo]
+ Document cgroup v2 delegation via the 'nsdelegate' mount option
+ Michael Kerrisk
+ Document the cgroup.max.depth and cgroup.max.descendants files
+ Michael Kerrisk
+ Document 'release_agent' mount option
+ Michael Kerrisk [Roman Gushchin]
+ Document /sys/kernel/cgroup/delegate
+ Michael Kerrisk [Roman Gushchin]
+ Document /sys/kernel/cgroup/features
+ Michael Kerrisk [Roman Gushchin]
+ Document cgroups v2 cgroup.stat file
+
+
+Global changes
+--------------
+
+Various pages
+ G. Branden Robinson
+ Standardize on "nonzero"
+ Also add this term to the style guide in man-pages(7).
+
+
+Changes to individual pages
+---------------------------
+
+bpf.2
+ Nikolay Borisov
+ Sync list of supported map types with 4.14 kernel
+
+copy_file_range.2
+ Michael Kerrisk
+ Library support was added in glibc 2.27
+ Shawn Landden
+ glibc provides a user-space emulation where the system call is absent
+ Florian Weimer
+ EFBIG errors are possible, similar to write(2)
+ Michael Kerrisk
+ ERRORS: add EISDIR
+ Michael Kerrisk
+ Order ERRORS alphabetically
+ Michael Kerrisk
+ Add comment to code example explaining use of syscall(2)
+
+fcntl.2
+read.2
+write.2
+ NeilBrown
+ Document "Lost locks" as cause for EIO.
+ If an advisory lock is lost, then read/write requests on any
+ affected file descriptor can return EIO - for NFSv4 at least.
+
+memfd_create.2
+ Michael Kerrisk
+ glibc support for memfd_create() was added in version 2.27
+
+mlock.2
+ Michael Kerrisk
+ Make details for MLOCK_ONFAULT a little more explicit
+ Michael Kerrisk
+ glibc support for mlock2() is added in version 2.27
+
+mmap.2
+ John Hubbard [Michael Hocko]
+ MAP_FIXED is no longer discouraged
+ MAP_FIXED has been widely used for a very long time, yet the man
+ page still claims that "the use of this option is discouraged".
+ John Hubbard
+ MAP_FIXED updated documentation
+ -- Expand the documentation to discuss the hazards in
+ enough detail to allow avoiding them.
+
+ -- Mention the upcoming MAP_FIXED_SAFE flag.
+
+ -- Enhance the alignment requirement slightly.
+
+mount.2
+ Keno Fischer [Michael Kerrisk]
+ Add EINVAL error condition when MS_BINDing MNT_LOCKED submounts
+
+mprotect.2
+pkey_alloc.2
+ Michael Kerrisk
+ Glibc support for memory protection keys was added in version 2.27
+
+perf_event_open.2
+ Michael Kerrisk
+ SEE ALSO: add perf(1)
+
+pkey_alloc.2
+ Michael Kerrisk
+ Clarify description of pkey_alloc() 'flags' argument
+
+prctl.2
+ Michael Kerrisk
+ Defer to capabilities(7) for discussion of the "keep capabilities" flag
+
+recvmmsg.2
+sendmmsg.2
+ Nikola Forró
+ Point out that error handling is unreliable
+
+seccomp.2
+ Michael Kerrisk
+ Clarify that SECCOMP_RET_TRAP SIGSYS signal is thread-directed
+
+syscalls.2
+ Michael Kerrisk
+ Add s390-specific s390_sthyi(2) to syscall list
+
+unshare.2
+ Michael Kerrisk
+ Clarify that EUSERS occurred only until kernel 4.8
+
+errno.3
+ Michael Kerrisk
+ 'errno -s' can be used to search for errors by string in description
+ Michael Kerrisk
+ Add Linux error text corresponding to ENOMEM
+
+fgetpwent.3
+ Michael Kerrisk
+ Add missing ATTRIBUTES preamble
+
+fts.3
+ Michael Kerrisk [Pradeep Kumar]
+ fts_pathlen = strlen(fts_path) + strlen(fts_name)
+
+fuse.4
+ Michael Kerrisk
+ Places errors in alphabetical order (no content changes)
+
+veth.4
+ Michael Kerrisk
+ Add network_namespaces(7)
+
+sysfs.5
+ Michael Kerrisk
+ Refer to cgroups(7) for information about files in /sys/kernel/cgroup
+
+capabilities.7
+ Michael Kerrisk
+ Note which capability sets are affected by SECBIT_NO_SETUID_FIXUP
+ Note explicitly that SECBIT_NO_SETUID_FIXUP is relevant for
+ the permitted, effective, and ambient capability sets.
+ Michael Kerrisk
+ Deemphasize the ancient prctl(2) PR_SET_KEEPCAPS command
+ The modern approach is SECBITS_KEEP_CAPS.
+ Michael Kerrisk
+ Clarify effect of CAP_SETFCAP
+ Make it clear that CAP_SETFCAP allows setting arbitrary
+ capabilities on a file.
+ Michael Kerrisk
+ Clarify which capability sets are effected by SECBIT_KEEP_CAPS
+ This flag has relevance only for the process permitted and
+ effective sets.
+ Michael Kerrisk
+ Rephrase CAP_SETPCAP description
+ * Mention kernel versions.
+ * Place current kernel behavior first
+ Michael Kerrisk
+ SECBIT_KEEP_CAPS is ignored if SECBIT_NO_SETUID_FIXUP is set
+ Michael Kerrisk
+ Ambient set is also cleared when UIDs are set to nonzero value
+
+cgroups.7
+ Michael Kerrisk
+ Add a more complete description of cgroup v1 named hierarchies
+ Michael Kerrisk
+ Add a section on unmounting cgroup v1 filesystems
+ Michael Kerrisk
+ Add subsection describing cgroups v2 subtree delegation
+ Michael Kerrisk
+ Mention ENOENT error that can occur when writing to subtree_control file
+ Michael Kerrisk
+ Add list of currently available version 2 controllers
+ Nikolay Borisov
+ Add information about RDMA controller
+ Michael Kerrisk
+ Rewrite the description of cgroup v2 subtree control
+ Michael Kerrisk [Tejun Heo]
+ Note Linux 4.11 changes to cgroup v2 delegation containment rules
+ Michael Kerrisk
+ systemd(1) nowadays automatically mounts the cgroup2 filesystem
+ Michael Kerrisk
+ Clarify that cgroup.controllers is read-only
+ Michael Kerrisk
+ Elaborate a little on problems of splitting threads across cgroups in v1
+ Michael Kerrisk [Tejun Heo]
+ Tweak the description of delegation of cgroup.subtree_control
+
+ip.7
+ Ricardo Biehl Pasquali
+ INADDR_* values cannot be assigned directly to 's_addr'
+ Michael Kerrisk
+ s/INADDR_ANY/INADDR_LOOPBACK/ in discussion of htonl()
+ INADDR_LOOPBACK is a better example, since it is not
+ byte-order neutral.
+
+namespaces.7
+network_namespaces.7
+ Michael Kerrisk
+ Move content from namespaces(7) to network_namespaces(7)
+
+pid_namespaces.7
+ Michael Kerrisk
+ SEE ALSO: add mount_namespaces(7)
+
+sched.7
+ Michael Kerrisk [Andrea Parri]
+ Correctly describe effect of priority changes for RT threads
+ The placement of a thread in the run queue for its new
+ priority depends on the direction of movement in priority.
+ (This appears to contradict POSIX, except in the case of
+ pthread_setschedprio().)
+
+user_namespaces.7
+ Michael Kerrisk
+ Mention NS_GET_OWNER_UID ioctl() operation
+
+
+==================== Changes in man-pages-4.16 ====================
+
+Released: 2018-04-30, Munich
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Adam Borowski <kilobyte@angband.pl>
+Andy Owen <andrew.owen@dolby.com>
+Carlos O'Donell <carlos@redhat.com>
+Carsten Grohmann <carstengrohmann@gmx.de>
+Elvira Khabirova <lineprinter@altlinux.org>
+Enrique Garcia <cquike@arcor.de>
+Frederic Brault <fbrault@xyalis.com>
+Heinrich Schuchardt <xypron.glpk@gmx.de>
+Howard Johnson <hwj@BridgeportContractor.com>
+Jakub Wilk <jwilk@jwilk.net>
+Jan Kara <jack@suse.cz>
+Jann Horn <jannh@google.com>
+John Hubbard <jhubbard@nvidia.com>
+Jürg Billeter <j@bitron.ch>
+Konstantin Grinemayer <cdlscpmv@gmail.com>
+Konstantin Khlebnikov <khlebnikov@yandex-team.ru>
+Martin Mares <mj@ucw.cz>
+Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
+Mattias Andrée <maandree@kth.se>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Michal Hocko <mhocko@suse.com>
+Mike Frysinger <vapier@gentoo.org>
+Nikos Mavrogiannopoulos <nmavrogi@redhat.com>
+Robin Kuzmin <kuzmin.robin@gmail.com>
+Ross Zwisler <ross.zwisler@linux.intel.com>
+Rusty Russell <rusty@rustcorp.com.au>
+Serge E. Hallyn <serge@hallyn.com>
+Song Liu <songliubraving@fb.com>
+Tomi Salminen <tsalminen@forcepoint.com>
+
+Apologies if I missed anyone!
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+membarrier.2
+ Mathieu Desnoyers [Michael Kerrisk]
+ Document new membarrier commands introduced in Linux 4.16
+ Document the following membarrier commands introduced in
+ Linux 4.16:
+
+ MEMBARRIER_CMD_GLOBAL_EXPEDITED
+ (the old enum label MEMBARRIER_CMD_SHARED is now an
+ alias to preserve header backward compatibility)
+ MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED
+ MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE
+ MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE
+
+mmap.2
+ Jan Kara [Ross Zwisler, Michael Kerrisk]
+ Add description of MAP_SHARED_VALIDATE and MAP_SYNC
+ Michal Hocko [John Hubbard, Michael Kerrisk, Jann Horn]
+ Document new MAP_FIXED_NOREPLACE flag
+ 4.17+ kernels offer a new MAP_FIXED_NOREPLACE flag which allows
+ the caller to atomically probe for a given address range.
+
+readv.2
+io_submit.2
+ Jürg Billeter
+ Document RWF_APPEND added in Linux 4.16
+
+capabilities.7
+ Michael Kerrisk
+ Describe file capability versioning
+ Michael Kerrisk [Serge E. Hallyn]
+ Document namespaced-file capabilities
+ [There's still more work to be done on this new text]
+
+
+Changes to individual pages
+---------------------------
+
+bpf.2
+ Michael Kerrisk
+ Update list of architectures that support JITed eBPF
+ And note kernel version numbers where support is added.
+ Michael Kerrisk
+ Kernel 4.15 added CONFIG_BPF_JIT_ALWAYS_ON
+ This causes the JIT compiler to be always on and
+ forces bpf_jit_enable to 1.
+
+execve.2
+ Michael Kerrisk
+ Note that describing execve as "executing a new process" is misleading
+ This misdescription is so common that it's worth calling it out
+ explicitly.
+ Michael Kerrisk
+ More explicitly describe effect of execve() in the opening paragraph
+
+fallocate.2
+ Michael Kerrisk
+ Since Linux 4.16, Btrfs supports FALLOC_FL_ZERO_RANGE
+
+getrlimit.2
+ Michael Kerrisk
+ CAP_SYS_RESOURCE capability is required in *initial user namespace*
+
+io_submit.2
+ Michael Kerrisk
+ Add kernel version numbers for various 'aio_rw_flags' flags
+ Michael Kerrisk
+ Place 'aio_rw_flags' in alphabetical order
+
+mmap.2
+ Jann Horn
+ MAP_FIXED is okay if the address range has been reserved
+ Clarify that MAP_FIXED is appropriate if the specified address
+ range has been reserved using an existing mapping, but shouldn't
+ be used otherwise.
+ Michael Kerrisk
+ Move the text on MAP_FIXED to NOTES
+ This text has become rather long, making it somewhat
+ unwieldy in the discussion of the mmap() flags. Therefore,
+ move it to NOTES, with a pointer in DESCRIPTION referring
+ the reader to NOTES.
+ Michael Kerrisk [Heinrich Schuchardt]
+ Clarify that when addr==NULL, address chosen by kernel is page-aligned
+ Michael Kerrisk
+ Add a little historical detail on the obsolete MAP_DENYWRITE
+
+mount.2
+ Michael Kerrisk
+ ERRORS: add EBUSY for the case of trying to stack same mount twice
+ Michael Kerrisk
+ Remove a couple of obsolete EBUSY errors
+ As far as I can tell, these EBUSY errors disappeared
+ with the addition of stackable mounts in Linux 2.4.
+
+msgget.2
+semget.2
+shmget.2
+ Michael Kerrisk
+ The purpose of "flags" == 0 is to obtain ID of an existing IPC object
+ This was implied in these pages, but the meaning of "flags" == 0
+ could be more explicit, as indicated by questions such as
+ https://stackoverflow.com/questions/49833569/flag-value-of-semget-function
+
+open.2
+ Jann Horn
+ Document more -ETXTBSY conditions
+ Jakub Wilk
+ Add missing argument for snprintf() in example code
+
+perf_event_open.2
+ Song Liu
+ Add type kprobe and uprobe
+ Two new types kprobe and uprobe are being added to
+ perf_event_open(), which allow creating kprobe or
+ uprobe with perf_event_open. This patch adds
+ information about these types.
+
+ptrace.2
+ Jann Horn
+ Copy retval info for SECCOMP_GET_FILTER to right section
+ The "RETURN VALUE" section made a claim that was incorrect for
+ PTRACE_SECCOMP_GET_FILTER. Explicitly describe the behavior of
+ PTRACE_SECCOMP_GET_FILTER in the "RETURN VALUE" section (as
+ usual), but leave the now duplicate description in the section
+ describing PTRACE_SECCOMP_GET_FILTER, since the
+ PTRACE_SECCOMP_GET_FILTER section would otherwise probably become
+ harder to understand.
+
+readv.2
+ Michael Kerrisk
+ Remove redundant sentence
+
+seccomp.2
+ Michael Kerrisk
+ Note that execve() may change syscall numbers during life of process
+ On a multiarch/multi-ABI platform such as modern x86, each
+ architecture/ABI (x86-64, x32, i386)has its own syscall numbers,
+ which means a seccomp() filter may see different syscall numbers
+ over the life of the process if that process uses execve() to
+ execute programs that has a different architectures/ABIs.
+ Michael Kerrisk
+ Note which architectures support seccomp BPF
+ Michael Kerrisk
+ In EXAMPLE, clearly note that x32 syscalls are >= X32_SYSCALL_BIT
+
+shutdown.2
+ Carsten Grohmann
+ SEE ALSO: add close(2)
+
+syscall.2
+ Adam Borowski
+ Add riscv
+
+wait.2
+ Michael Kerrisk [Robin Kuzmin]
+ wait() and waitpid() block the calling thread (not process)
+
+wait4.2
+ Michael Kerrisk [Martin Mares]
+ Soften the warning against the use of wait3()/wait4()
+ These functions are nonstandard, but there is no replacement.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=199215
+
+crypt.3
+encrypt.3
+ Carlos O'Donell [Michael Kerrisk]
+ Add notes about _XOPEN_CRYPT
+ The distribution may choose not to support _XOPEN_CRYPT in the
+ case that the distribution has transitioned from glibc crypt to
+ libxcrypt.
+
+fseek.3
+ Michael Kerrisk [Andy Owen]
+ ERRORS: EBADF should be ESPIPE
+ Michael Kerrisk
+ Improve EPIPE error text
+
+getcwd.3
+ Carlos O'Donell
+ Mention that "(unreachable)" is no longer returned for glibc >= 2.27.
+
+makedev.3
+ Michael Kerrisk
+ Since glibc 2.28, <sys/types.h> no longer defines these macros
+
+pthread_create.3
+ Frederic Brault
+ Note default thread stack size for several architectures
+
+tsearch.3
+ Jann Horn
+ Clarify items vs nodes
+ The manpage claimed that tsearch() returns a pointer to a data
+ item. This is incorrect; tsearch() returns a pointer to the
+ corresponding tree node, which can also be interpreted as a
+ pointer to a pointer to the data item.
+
+ Since this API is quite unintuitive, also add a clarifying
+ sentence.
+ Jann Horn
+ tdelete() can return dangling pointers
+ POSIX says that deleting the root node must cause tdelete() to
+ return some unspecified non-NULL pointer. Glibc implements it by
+ returning a dangling pointer to the (freed) root node.
+ Therefore, explicitly note that tdelete() may return bad pointers
+ that must not be accessed.
+
+elf.5
+ Michael Kerrisk
+ SEE ALSO: add patchelf(1)
+
+filesystems.5
+ Michael Kerrisk
+ Add an entry for tmpfs(5)
+
+group.5
+ Michael Kerrisk
+ SEE ALSO: add vigr(8)
+
+passwd.5
+ Michael Kerrisk
+ SEE ALSO: add vipw(8)
+
+sysfs.5
+ Michael Kerrisk
+ Add brief note on /sys/fs/smackfs
+
+tmpfs.5
+ Mike Frysinger
+ Document current mount options
+ Some of this content is moved from the mount(8) man page.
+ Style was based on proc(5) sections.
+ Michael Kerrisk
+ Remove reference to mount(8) for discussion of mount options
+ The mount options are now described in this page.
+ Michael Kerrisk
+ SEE ALSO: add Documentation/vm/transhuge.txt
+ Michael Kerrisk
+ Reformat 'huge' and 'mpol' mount option values as lists
+ Michael Kerrisk
+ Describe 'mpol' mount options
+ Based on text from Documentation/filesystems/tmpfs.txt.
+ Michael Kerrisk
+ Document 'huge' mount options
+ Based on text from Documentation/vm/transhuge.txt.
+ Michael Kerrisk
+ SEE ALSO: add set_mempolicy(2)
+ Michael Kerrisk
+ Document mpol=local mount option
+
+capabilities.7
+ Michael Kerrisk
+ Remove redundant mention of PTRACE_SECCOMP_GET_FILTER
+
+cgroups.7
+ Michael Kerrisk
+ cgroup.events transitions generate POLLERR as well as POLLPRI
+
+mount_namespaces.7
+ Michael Kerrisk
+ Note another case where shared "peer groups" are formed
+
+namespaces.7
+ Michael Kerrisk [Konstantin Khlebnikov]
+ Mention that device ID should also be checked when comparing NS symlinks
+ When comparing two namespaces symlinks to see if they refer to
+ the same namespace, both the inode number and the device ID
+ should be compared. This point was already made clear in
+ ioctl_ns(2), but was missing from this page.
+ Michael Kerrisk
+ Note an idiosyncrasy of /proc/[pid]/ns/pid_for_children
+ /proc/[pid]/ns/pid_for_children has a value only after first
+ child is created in PID namespace. Verified by experiment.
+
+network_namespaces.7
+ Michael Kerrisk
+ Network namespaces isolate the UNIX domain abstract socket namespace
+ Michael Kerrisk
+ Add cross reference to unix(7)
+ For further information on UNIX domain abstract sockets.
+
+posixoptions.7
+ Carlos O'Donell
+ Expand XSI Options groups
+ We define in detail the X/Open System Interfaces i.e. _XOPEN_UNIX
+ and all of the X/Open System Interfaces (XSI) Options Groups.
+
+ The XSI options groups include encryption, realtime, advanced
+ realtime, realtime threads, advanced realtime threads, tracing,
+ streams, and legacy interfaces.
+ Michael Kerrisk
+ Use a more consistent, less cluttered layout for option lists
+ Michael Kerrisk
+ Make function lists more consistent and less cluttered
+ Use more consistent layout for lists of functions, and
+ remove punctuation from the lists to make them less cluttered.
+
+socket.7
+ Michael Kerrisk [Tomi Salminen]
+ Fix error in SO_INCOMING_CPU code snippet
+ The last argument is passed by value, not reference.
+
+time.7
+ Michael Kerrisk [Enrique Garcia]
+ Mention clock_gettime()/clock_settime() rather than [gs]ettimeofday()
+ gettimeofday() is declared obsolete by POSIX. Mention instead
+ the modern APIs for working with the realtime clock.
+
+ See https://bugzilla.kernel.org/show_bug.cgi?id=199049
+
+unix.7
+ Michael Kerrisk [Rusty Russell]
+ ERRORS: add EBADF for sending closed file descriptor with SCM_RIGHTS
+
+vdso.7
+ Michael Kerrisk
+ VDSO symbols (system calls) are not visible to seccomp(2) filters
+
+xattr.7
+ Michael Kerrisk
+ SEE ALSO: add selinux(8)
+
+ld.so.8
+ Mike Frysinger
+ Make lack of separator escaping explicit
+ Make it clear that the delimiters in LD_PRELOAD, LD_LIBRARY_PATH,
+ and LD_AUDIT cannot be escaped so people don't try various methods
+ (such as \:) to workaround it.
+ Michael Kerrisk
+ Remove unneeded mention of PATH in discussion of LD_LIBRARY_PATH
+ This brief sentence doesn't add value to the text.