summaryrefslogtreecommitdiffstats
path: root/Changes.old
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2018-02-02 07:50:23 +0100
committerMichael Kerrisk <mtk.manpages@gmail.com>2018-02-02 07:50:23 +0100
commit0c7e0c506d6ae6b58c6e1048ca95273bbc4b9282 (patch)
tree6fbf150a195186038db90eec7d0742eb4f092cf9 /Changes.old
parent9568b3cdde7653167b2c7b58e02194b5bd5a1239 (diff)
Start of man-pages-4.16: updating Changes and Changes.old
Diffstat (limited to 'Changes.old')
-rw-r--r--Changes.old286
1 files changed, 286 insertions, 0 deletions
diff --git a/Changes.old b/Changes.old
index 3256cd94f..8114db72c 100644
--- a/Changes.old
+++ b/Changes.old
@@ -47218,3 +47218,289 @@ ld.so.8
to the process is somewhat redundant. Binaries with capabilities
confer capabilities only to those process capability sets, so it's
simpler to just say "confers capabilities to the process".
+
+
+==================== Changes in man-pages-4.15 ====================
+
+Released: 2018-02-02, Palo Alto
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Adam Liddell <ml+kernel.org@aliddell.com>
+Andrea Parri <parri.andrea@gmail.com>
+Andries E. Brouwer <Andries.Brouwer@cwi.nl>
+Elie Roudninski <xademax@gmail.com>
+Eric Benton <erbenton@comcast.net>
+Florian Weimer <fweimer@redhat.com>
+G. Branden Robinson <g.branden.robinson@gmail.com>
+Jakub Wilk <jwilk@jwilk.net>
+Joel Williamson <jwilliamson@carnegietechnologies.com>
+John Hubbard <jhubbard@nvidia.com>
+Jorgen Hansen <jhansen@vmware.com>
+Keno Fischer <keno@juliacomputing.com>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Michal Hocko <mhocko@kernel.org>
+NeilBrown <neilb@suse.com>
+Nikola Forró <nforro@redhat.com>
+Nikolay Borisov <nborisov@suse.com>
+Pradeep Kumar <pradeepsixer@gmail.com>
+QingFeng Hao <haoqf@linux.vnet.ibm.com>
+Ricardo Biehl Pasquali <pasqualirb@gmail.com>
+roblabla <man-pages@roblab.la>
+Roman Gushchin <guro@fb.com>
+Shawn Landden <slandden@gmail.com>
+Stefan Hajnoczi <stefanha@redhat.com>
+Stefan Raspl <raspl@linux.vnet.ibm.com>
+Tejun Heo <tj@kernel.org>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+s390_sthyi.2
+ QingFeng Hao [Michael Kerrisk]
+ New page for s390-specific s390_sthyi(2)
+
+network_namespaces.7
+ Michael Kerrisk
+ New page describing network namespaces
+ Based on content moved from namespaces(7)
+
+vsock.7
+ Stefan Hajnoczi [Jorgen Hansen, Michael Kerrisk]
+ Document the VSOCK socket address family
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+cgroups.7
+ Michael Kerrisk [Tejun Heo]
+ Document cgroups v2 "thread mode"
+ Michael Kerrisk [Tejun Heo]
+ Document cgroup v2 delegation via the 'nsdelegate' mount option
+ Michael Kerrisk
+ Document the cgroup.max.depth and cgroup.max.descendants files
+ Michael Kerrisk
+ Document 'release_agent' mount option
+ Michael Kerrisk [Roman Gushchin]
+ Document /sys/kernel/cgroup/delegate
+ Michael Kerrisk [Roman Gushchin]
+ Document /sys/kernel/cgroup/features
+ Michael Kerrisk [Roman Gushchin]
+ Document cgroups v2 cgroup.stat file
+
+
+Global changes
+--------------
+
+Various pages
+ G. Branden Robinson
+ Standardize on "nonzero"
+ Also add this term to the style guide in man-pages(7).
+
+
+Changes to individual pages
+---------------------------
+
+bpf.2
+ Nikolay Borisov
+ Sync list of supported map types with 4.14 kernel
+
+copy_file_range.2
+ Michael Kerrisk
+ Library support was added in glibc 2.27
+ Shawn Landden
+ glibc provides a user-space emulation where the system call is absent
+ Florian Weimer
+ EFBIG errors are possible, similar to write(2)
+ Michael Kerrisk
+ ERRORS: add EISDIR
+ Michael Kerrisk
+ Order ERRORS alphabetically
+ Michael Kerrisk
+ Add comment to code example explaining use of syscall(2)
+
+fcntl.2
+read.2
+write.2
+ NeilBrown
+ Document "Lost locks" as cause for EIO.
+ If an advisory lock is lost, then read/write requests on any
+ affected file descriptor can return EIO - for NFSv4 at least.
+
+memfd_create.2
+ Michael Kerrisk
+ glibc support for memfd_create() was added in version 2.27
+
+mlock.2
+ Michael Kerrisk
+ Make details for MLOCK_ONFAULT a little more explicit
+ Michael Kerrisk
+ glibc support for mlock2() is added in version 2.27
+
+mmap.2
+ John Hubbard [Michael Hocko]
+ MAP_FIXED is no longer discouraged
+ MAP_FIXED has been widely used for a very long time, yet the man
+ page still claims that "the use of this option is discouraged".
+ John Hubbard
+ MAP_FIXED updated documentation
+ -- Expand the documentation to discuss the hazards in
+ enough detail to allow avoiding them.
+
+ -- Mention the upcoming MAP_FIXED_SAFE flag.
+
+ -- Enhance the alignment requirement slightly.
+
+mount.2
+ Keno Fischer [Michael Kerrisk]
+ Add EINVAL error condition when MS_BINDing MNT_LOCKED submounts
+
+mprotect.2
+pkey_alloc.2
+ Michael Kerrisk
+ Glibc support for memory protection keys was added in version 2.27
+
+perf_event_open.2
+ Michael Kerrisk
+ SEE ALSO: add perf(1)
+
+pkey_alloc.2
+ Michael Kerrisk
+ Clarify description of pkey_alloc() 'flags' argument
+
+prctl.2
+ Michael Kerrisk
+ Defer to capabilities(7) for discussion of the "keep capabilities" flag
+
+recvmmsg.2
+sendmmsg.2
+ Nikola Forró
+ Point out that error handling is unreliable
+
+seccomp.2
+ Michael Kerrisk
+ Clarify that SECCOMP_RET_TRAP SIGSYS signal is thread-directed
+
+syscalls.2
+ Michael Kerrisk
+ Add s390-specific s390_sthyi(2) to syscall list
+
+unshare.2
+ Michael Kerrisk
+ Clarify the EUSERS occurred only until kernel 4.8
+
+errno.3
+ Michael Kerrisk
+ 'errno -s' can be used to search for errors by string in description
+ Michael Kerrisk
+ Add Linux error text corresponding to ENOMEM
+
+fgetpwent.3
+ Michael Kerrisk
+ Add missing ATTRIBUTES preamble
+
+fts.3
+ Michael Kerrisk [Pradeep Kumar]
+ fts_pathlen = strlen(fts_path) + strlen(fts_name)
+
+fuse.4
+ Michael Kerrisk
+ Places errors in alphabetical order (no content changes)
+
+veth.4
+ Michael Kerrisk
+ Add network_namespaces(7)
+
+sysfs.5
+ Michael Kerrisk
+ Refer to cgroups(7) for information about files in /sys/kernel/cgroup
+
+capabilities.7
+ Michael Kerrisk
+ Note which capability sets are affected by SECBIT_NO_SETUID_FIXUP
+ Note explicitly that SECBIT_NO_SETUID_FIXUP is relevant for
+ the permitted, effective, and ambient capability sets.
+ Michael Kerrisk
+ Deemphasize the ancient prctl(2) PR_SET_KEEPCAPS command
+ The modern approach is SECBITS_KEEP_CAPS.
+ Michael Kerrisk
+ Clarify effect of CAP_SETFCAP
+ Make it clear that CAP_SETFCAP allows setting arbitrary
+ capabilities on a file.
+ Michael Kerrisk
+ Clarify which capability sets are effected by SECBIT_KEEP_CAPS
+ This flag has relevance only for the process permitted and
+ effective sets.
+ Michael Kerrisk
+ Rephrase CAP_SETPCAP description
+ * Mention kernel versions.
+ * Place current kernel behavior first
+ Michael Kerrisk
+ SECBIT_KEEP_CAPS is ignored if SECBIT_NO_SETUID_FIXUP is set
+ Michael Kerrisk
+ Ambient set is also cleared when UIDs are set to nonzero value
+
+cgroups.7
+ Michael Kerrisk
+ Add a more complete description of cgroup v1 named hierarchies
+ Michael Kerrisk
+ Add a section on unmounting cgroup v1 filesystems
+ Michael Kerrisk
+ Add subsection describing cgroups v2 subtree delegation
+ Michael Kerrisk
+ Mention ENOENT error that can occur when writing to subtree_control file
+ Michael Kerrisk
+ Add list of currently available version 2 controllers
+ Nikolay Borisov
+ Add information about RDMA controller
+ Michael Kerrisk
+ Rewrite the description of cgroup v2 subtree control
+ Michael Kerrisk [Tejun Heo]
+ Note Linux 4.11 changes to cgroup v2 delegation containment rules
+ Michael Kerrisk
+ systemd(1) nowadays automatically mounts the cgroup2 filesystem
+ Michael Kerrisk
+ Clarify that cgroup.controllers is read-only
+ Michael Kerrisk
+ Elaborate a little on problems of splitting threads across cgroups in v1
+ Michael Kerrisk [Tejun Heo]
+ Tweak the description of delegation of cgroup.subtree_control
+
+ip.7
+ Ricardo Biehl Pasquali
+ INADDR_* values cannot be assigned directly to 's_addr'
+ Michael Kerrisk
+ s/INADDR_ANY/INADDR_LOOPBACK/ in discussion of htonl()
+ INADDR_LOOPBACK is a better example, since it is not
+ byte-order neutral.
+
+namespaces.7
+network_namespaces.7
+ Michael Kerrisk
+ Move content from namespaces(7) to network_namespaces(7)
+
+pid_namespaces.7
+ Michael Kerrisk
+ SEE ALSO: add mount_namespaces(7)
+
+sched.7
+ Michael Kerrisk [Andrea Parri]
+ Correctly describe effect of priority changes for RT threads
+ The placement of a thread in the run queue for its new
+ priority depends on the direction of movement in priority.
+ (This appears to contradict POSIX, except in the case of
+ pthread_setschedprio().)
+
+user_namespaces.7
+ Michael Kerrisk
+ Mention NS_GET_OWNER_UID ioctl() operation