-==================== Changes in man-pages-4.15 ====================
+==================== Changes in man-pages-5.02 ====================
-Released: ????-??-??, Munich
+Released: 2019-08-02, Munich
Contributors
in the changelog below) reports, notes, and ideas that have been
incorporated in changes in this release:
+Alan Stern <stern@rowland.harvard.edu>
+Alexey Izbyshev <izbyshev@ispras.ru>
+Amir Goldstein <amir73il@gmail.com>
+Cyrill Gorcunov <gorcunov@gmail.com>
+Eric Sanchis <eric.sanchis@iut-rodez.fr>
+Eugene Syromyatnikov <evgsyr@gmail.com>
+Finn O'Leary <finnoleary@inventati.org>
+Florian Weimer <fweimer@redhat.com>
+G. Branden Robinson <g.branden.robinson@gmail.com>
+Guillaume Laporte <guillaume.laporte.adm@gmail.com>
+Jakub Wilk <jwilk@jwilk.net>
+Jan Kara <jack@suse.cz>
+Kumar Chaudhary, Naveen <naveen.kumar.chaudhary@intel.com>
+Mark Wielaard <mark@klomp.org>
+Matthew Bobrowski <mbobrowski@mbobrowski.org>
+Matthew Kenigsberg <matthewkenigsberg@gmail.com>
+Matthias Hertel <Matthias.Hertel@rohde-schwarz.com>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Michal Sekletar <msekleta@redhat.com>
+Oleg Nesterov <oleg@redhat.com>
+Palmer Dabbelt <palmer@sifive.com>
+Petr Vaněk <arkamar@atlas.cz>
+Sami Kerola <kerolasa@iki.fi>
+Shawn Landden <shawn@git.icu>
+Thorsten Glaser <tg@mirbsd.de>
+Tobias Klauser <tklauser@distanz.ch>
+Tomas Skäre <tomas.skare@gmail.com>
+Yang Xu <xuyang2018.jy@cn.fujitsu.com>
Apologies if I missed anyone!
-New and rewritten pages
------------------------
-
-
Newly documented interfaces in existing pages
---------------------------------------------
+fanotify.7
+fanotify_init.2
+fanotify_mark.2
+ Matthew Bobrowski [Amir Goldstein, Jan Kara]
+ Document FAN_REPORT_FID and directory modification events
+
+vdso.7
+ Tobias Klauser [Palmer Dabbelt]
+ Document vDSO for RISCV
+
+Renamed pages
+-------------
+
+sysvipc.7
+ svipc(7) is renamed to sysvipc(7).
+ The name sysvipc is a bit more natural, and is the name used in
+ /proc/sysvipc.
New and changed links
---------------------
+svipc.7
+ Michael Kerrisk
+ Add old name of sysvipc(7) page as a link
+
Global changes
--------------
+Various pages
+ Michael Kerrisk
+ Change reference to svipc(7) to sysvipc(7)
+
Changes to individual pages
---------------------------
+pldd.1
+ G. Branden Robinson [Michael Kerrisk]
+ Document glibc's unbreakage of tool
+ After a longstanding breakage, pldd now works again (glibc 2.30).
+
+bpf.2
+ Michael Kerrisk
+ Correct kernel version for JIT support on s390
+
+chdir.2
+ Michael Kerrisk
+ Add ENOTDIR error for fchdir()
+
+execve.2
+ Michael Kerrisk [Eugene Syromyatnikov]
+ Since Linux 5.1, the limit on the #! line is 255 chars (rather than 127)
+ Shawn Landden [Michael Kerrisk]
+ Add more detail about Shebangs
+ Michael Kerrisk
+ Linux is not alone in ignoring the set-UID and set-GID bits for scripts
+
+mount.2
+ Michael Kerrisk
+ ERRORS: Add a couple of EINVAL errors for MS_MOVE
+ Michael Kerrisk
+ SEE ALSO: add chroot(2) and pivot_root(2)
+
+mprotect.2
+ Mark Wielaard
+ pkey_mprotect() acts like mprotect() if pkey is set to -1, not 0
+
+mprotect.2
+pkey_alloc.2
+ Mark Wielaard [Florian Weimer]
+ _GNU_SOURCE is required for the pkey functions.
+
+pivot_root.2
+ Michael Kerrisk
+ ERRORS: EINVAL occurs if 'new_root' or its parent has shared propagation
+ Michael Kerrisk
+ 'new_root' must be a mount point
+ It appears that 'new_root' may not have needed to be a mount
+ point on ancient kernels, but already in Linux 2.4.5 this changed.
+ Michael Kerrisk
+ 'put_old' can't be a mount point with MS_SHARED propagation
+ Michael Kerrisk
+ SEE ALSO: add mount(2)
+
+poll.2
+ Michael Kerrisk [Alan Stern]
+ Note that poll() equivalent code for ppoll() is not quite equivalent
+
+prctl.2
+ Yang Xu [Cyrill Gorcunov]
+ Correct some details for PR_SET_TIMERSLACK
+
+setxattr.2
+ Finn O'Leary [Michael Kerrisk]
+ Add ERANGE to 'ERRORS' section
+
+tkill.2
+ Michael Kerrisk
+ glibc 2.30 provides a wrapper for tgkill()
+
+dlopen.3
+ Michael Kerrisk
+ Clarify the rules for symbol resolution in a dlopen'ed object
+ The existing text wrongly implied that symbol look up first
+ occurred in the object and then in main, and did not mention
+ whether dependencies of main where used for symbol resolution.
+ Michael Kerrisk
+ Clarify when an executable's symbols can be used for symbol resolution
+ The --export-dynamic linker option is not the only way that main's
+ global symbols may end up in the dynamic symbol table and thus be
+ used to satisfy symbol reference in a shared object. A symbol
+ may also be placed into the dynamic symbol table if ld(1)
+ notices a dependency in another object during the static link.
+ Michael Kerrisk
+ An object opened with RTLD_LOCAL can be promoted to RTLD_GLOBAL
+ Michael Kerrisk
+ Note that symbol use might keep a dlclose'd object in memory
+ My earlier commit was in error:
+ Michael Kerrisk
+ On dlclose(), destructors are called when reference count falls to 0
+ Michael Kerrisk
+ Make it clear that RTLD_NODELETE also affects global variables
+ Michael Kerrisk
+ Clarify that constructors are called only when library is first loaded
+
+exec.3
+ Matthew Kenigsberg
+ Explain function groupings
+ I've found the exec man page quite difficult to read when trying
+ to find the behavior for a specific function. Since the names of
+ the functions are inline and the order of the descriptions isn't
+ clear, it's hard to find which paragraphs apply to each function.
+ I thought it would be much easier to read if the grouping based on
+ letters is stated.
+
+getutent.3
+ Michael Kerrisk [Thorsten Glaser]
+ Fix missing include file in EXAMPLE
+ See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932382
+
+on_exit.3
+ Michael Kerrisk [Sami Kerola]
+ Stack variables may be out of scope when exit handler is invoked
+
+strcat.3
+ Michael Kerrisk [Eric Sanchis]
+ Fix off-by-one error in example code
+
+cpuid.4
+ Michael Kerrisk
+ SEE ALSO: add cpuid(1)
+
+elf.5
+ Michael Kerrisk
+ SEE ALSO: add ld.so(8)
+
+proc.5
+ Michael Kerrisk
+ Correct description of /proc/PID/status 'ShdPnd' and 'SigPnd' fields
+ These fields are signal masks, not counters.
+ Michael Kerrisk
+ Clarify that various mask fields in /proc/PID/status are in hexadecimal
+
+capabilities.7
+ Michael Kerrisk
+ Add a note about using strace on binaries that have capabilities
+ Michael Kerrisk
+ Add pivot_root(2) to CAP_SYS_ADMIN list
+ Michael Kerrisk
+ CAP_FOWNER also allows modifying user xattrs on sticky directories
+
+cgroup_namespaces.7
+ Michael Kerrisk
+ Some wording fixes to improve clarity
+ Michael Kerrisk
+ In the example shell session, give second shell a different prompt
+
+credentials.7
+ Michael Kerrisk
+ Note that /proc/PID/status shows a process's credentials
+ Michael Kerrisk
+ SEE ALSO: add tcgetsid(3)
+
+fanotify.7
+ Matthew Bobrowski
+ Reword FAN_REPORT_FID data structure inclusion semantics
+ Michael Kerrisk
+ Clarify logic in ESTALE check
+ Michael Kerrisk
+ Reorder text in EXAMPLE
+ Michael Kerrisk
+ Reformat program output to fit in 80 columns
+
+mount_namespaces.7
+ Michael Kerrisk
+ Clarify implications for other NS if mount point is removed in one NS
+ If a mount point is deleted or renamed or removed in one mount
+ namespace, this will cause an object that is mounted at that
+ location in another mount namespace to be unmounted (as verified
+ by experiment). This was implied by the existing text, but it is
+ better to make this detail explicit.
+ Michael Kerrisk
+ SEE ALSO: add pivot_root(2), pivot_root(8)
+
+namespaces.7
+ Michael Kerrisk
+ Note initial values of hostname and domainname in a new UTS namespace
+
+sched.7
+ Michael Kerrisk
+ SEE ALSO: add pthread_getschedparam(3)
+
+signal.7
+ Michal Sekletar [Oleg Nesterov, Michael Kerrisk]
+ Clarify that siginfo_t isn't changed on coalescing
+ Michael Kerrisk
+ Various fields in /proc/PID/status show signal-related information
+ Michael Kerrisk
+ Add subsection on queuing and delivery semantics for standard signals
+
+socket.7
+ Michael Kerrisk
+ select()/poll()/epoll honor SO_RCVLOWAT since Linux 2.6.28
+
+unix.7
+ Michael Kerrisk
+ Note SCM_RIGHTS interaction with RLIMIT_NOFILE
+ If the file descriptors received in SCM_RIGHTS would cause
+ the process to its exceed RLIMIT_NOFILE limit, the excess
+ FDs are discarded.
+
+user_namespaces.7
+ Michael Kerrisk
+ Describe the effect of file-related capabilities inside use namespaces
+ Michael Kerrisk
+ Describe how kernel treats UIDs/GIDs when a process accesses files
+
+vdso.7
+ Tobias Klauser
+ Mention removal of Blackfin port in Linux 4.17
+
+ld.so.8
+ Michael Kerrisk [Matthias Hertel]
+ Note some further details of secure-execution mode
+ Note some further details of the treatment of environment
+ variables in secure execution mode. In particular (as noted by
+ Matthias Hertel), note that ignored environment variables are also
+ stripped from the environment. Furthermore, there are some other
+ variables, not used by the dynamic linker itself, that are also
+ treated in this way (see the glibc source file
+ sysdeps/generic/unsecvars.h).