summaryrefslogtreecommitdiffstats
path: root/Changes.old
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2014-04-20 11:08:56 +0200
committerMichael Kerrisk <mtk.manpages@gmail.com>2014-04-20 11:08:56 +0200
commit645de70f2f05ef9ba4d818557dc26e8a2d5c4f33 (patch)
treedd4a8afe40fa565bffa4d9ee9142f56d801e70bc /Changes.old
parent035e513fc10bc90f6c527d75defa52fed792a535 (diff)
Start of man-pages-3.66: updating Changes and Changes.old
Diffstat (limited to 'Changes.old')
-rw-r--r--Changes.old216
1 files changed, 216 insertions, 0 deletions
diff --git a/Changes.old b/Changes.old
index d1baffbcc..f15a38f30 100644
--- a/Changes.old
+++ b/Changes.old
@@ -30925,3 +30925,219 @@ symlink.7
name_to_handle_at(2) and open_by_handle_at(2) optionally follow symlinks
Michael Kerrisk
Mention use of readlink(2) to read contents of a symlink
+
+
+==================== Changes in man-pages-3.65 ====================
+
+Released: 2014-04-20, Munich
+
+
+Contributors
+------------
+
+The following people contributed patches/fixes or (noted in brackets
+in the changelog below) reports, notes, and ideas that have been
+incorporated in changes in this release:
+
+Alex Thorlton <athorlton@sgi.com>
+Ashish Sangwan <a.sangwan@samsung.com>
+Christopher Covington <cov@codeaurora.org>
+Christoph Hellwig <hch@infradead.org>
+Craig McQueen <craig.mcqueen@beamcommunications.com>
+Dave Chinner <david@fromorbit.com>
+David Prévot <taffit@debian.org>
+Greg Troxel <gdt@ir.bbn.com>
+Matthew Dempsky <mdempsky@chromium.org>
+Michael Kerrisk <mtk.manpages@gmail.com>
+Mike Frysinger <vapier@gentoo.org>
+Namjae Jeon <namjae.jeon@samsung.com>
+Peng Haitao <penght@cn.fujitsu.com>
+Petr Gajdos <pgajdos@suse.cz>
+Richard Hansen <rhansen@bbn.com>
+Simon Paillard <spaillard@debian.org>
+Steven Stewart-Gallus <sstewartgallus00@mylangara.bc.ca>
+Vince Weaver <vincent.weaver@maine.edu>
+Yuri Kozlov <yuray@komyakino.ru>
+
+Apologies if I missed anyone!
+
+
+New and rewritten pages
+-----------------------
+
+inet_net_pton.3
+ Michael Kerrisk
+ New page describing inet_net_pton(3) and inet_net_ntop(3)
+
+
+Newly documented interfaces in existing pages
+---------------------------------------------
+
+fallocate.2
+ Michael Kerrisk, Namjae Jeon [Christoph Hellwig, Dave Chinner]
+ Document FALLOC_FL_COLLAPSE_RANGE
+
+prctl.2
+ Michael Kerrisk [Alex Thorlton]
+ Document PR_SET_THP_DISABLE and PR_GET_THP_DISABLE
+
+proc.5
+ Michael Kerrisk
+ Document /proc/[pid]/stack
+ Michael Kerrisk
+ Document /proc/[pid]/clear_refs
+
+
+New and changed links
+---------------------
+
+inet_net_ntop.3
+ Michael Kerrisk
+ New link to new inet_net_pton.3
+
+
+Changes to individual pages
+---------------------------
+
+fcntl.2
+ Michael Kerrisk
+ Note the race when O_CLOEXEC is used at same time as fork()+execve()
+
+madvise.2
+ Michael Kerrisk
+ SEE ALSO: see prctl(2)
+ Because of PR_SET_THP_DISABLE.
+
+mlock.2
+ Michael Kerrisk
+ Describe treatment of MCL_FUTURE during fork(2) and execve(2)
+
+msync.2
+ Michael Kerrisk [Richard Hansen, Greg Troxel]
+ Warn that one of MS_SYNC or MS_ASYNC is required
+
+open.2
+ Michael Kerrisk
+ Add more detail on the race that O_CLOEXEC is designed to avoid
+ Michael Kerrisk [Matthew Dempsky]
+ Remove crufty text stating that O_DIRECTORY is Linux-specific
+ Michael Kerrisk
+ Note which filesystems support O_TMPFILE
+
+perf_event_open.2
+ Vince Weaver [Michael Kerrisk]
+ Clarify EACCES and EPERM errors
+ Clarify the reasons for EACCES and EPERM errors.
+ Vince Weaver [Michael Kerrisk]
+ Make the ERRORS section more comprehensive.
+ Determined both by code inspection and by writing a large
+ number of test programs.
+
+personality.2
+ Michael Kerrisk
+ Available execution domains are listed in <sys/personality.h>
+ Michael Kerrisk
+ Fix discussion of return value
+
+prctl.2
+ Michael Kerrisk
+ ERRORS: document EINVAL for PR_GET_NO_NEW_PRIVS
+ ERRORS: document EINVAL for PR_SET_PDEATHSIG
+ ERRORS: document EINVAL for PR_SET_TIMING
+ ERRORS: document EINVAL for PR_SET_DUMPABLE
+ ERRORS: document EINVAL for PR_SET_NO_NEW_PRIVS
+
+shmget.2
+ Michael Kerrisk
+ Rewrite description of SHMMNI default value
+ Michael Kerrisk
+ Note default value of SHMMAX
+ Note default value for SHMALL
+
+byteorder.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions htonl(), htons(), ntohl() and ntohs() are thread
+ safe.
+
+fexecve.3
+ Michael Kerrisk [Steven Stewart-Gallus]
+ If 'fd' is a close-on-exec file descriptor for a script, fexecve() fails
+ See https://bugzilla.kernel.org/show_bug.cgi?id=74481
+
+ffs.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions ffs(), ffsl() and ffsll() are thread safe.
+
+getauxval.3
+ Peng Haitao
+ ATTRIBUTES: Note function that is thread-safe
+ The function getauxval() is thread safe.
+
+getcontext.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions getcontext() and setcontext() are thread safe.
+
+getsubopt.3
+ Peng Haitao
+ ATTRIBUTES: Note function that is thread-safe
+ The function getsubopt() is thread safe.
+
+getutmp.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions getutmp() and getutmpx() are thread safe.
+
+inet.3
+ Michael Kerrisk
+ Note success and error return for inet_aton()
+
+inet.3
+ Michael Kerrisk [Craig McQueen]
+ The form 'a.b' if is suitable for Class A addresses (not class C)
+ Michael Kerrisk
+ SEE ALSO: add inet_net_pton(3)
+
+makecontext.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions makecontext() and swapcontext() are thread safe.
+
+pthread_attr_setdetachstate.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions pthread_attr_setdetachstate() and
+ pthread_attr_getdetachstate() are thread safe.
+
+pthread_attr_setguardsize.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions pthread_attr_setguardsize() and
+ pthread_attr_getguardsize() are thread safe.
+
+sigsetops.3
+ Peng Haitao
+ ATTRIBUTES: Note functions that are thread-safe
+ The functions sigemptyset(), sigfillset(), sigaddset(),
+ sigdelset(), sigismember(), sigisemptyset(), sigorset() and
+ sigandset() are thread safe.
+
+proc.5
+ Petr Gajdos
+ Improve /proc/[pid]/smaps entries description
+ Michael Kerrisk
+ /proc/PID/smaps is present only if CONFIG_PROC_PAGE_MONITOR
+ Michael Kerrisk
+ Note kernel version for /proc/sys/kernel/{shmall,shmmax}
+ Michael Kerrisk
+ Note kernel version for /proc/sys/kernel/{msgmax,msgmnb}
+
+capabilities.7
+ Michael Kerrisk
+ SEE ALSO: add capsh(1)
+
+libc.7
+ Michael Kerrisk
+ Add musl libc