diff options
author | Michael Kerrisk <mtk.manpages@gmail.com> | 2015-01-10 16:09:05 +0100 |
---|---|---|
committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2015-01-10 16:09:05 +0100 |
commit | 6b13e1336492a05903fa522a8b26c17f3ec1d8fa (patch) | |
tree | 59290d8100aaceea22759a3e6d1cfc9fb5caa283 /Changes.old | |
parent | ecf136da2d6934806a605e1bf3894407d909abf2 (diff) |
Start of man-pages-3.78: updating Changes and Changes.old
Diffstat (limited to 'Changes.old')
-rw-r--r-- | Changes.old | 171 |
1 files changed, 171 insertions, 0 deletions
diff --git a/Changes.old b/Changes.old index 8fbc80380..658a13dde 100644 --- a/Changes.old +++ b/Changes.old @@ -34623,3 +34623,174 @@ ld.so.8 See http://stackoverflow.com/questions/26280738/what-is-the-equivalent-of-loader-path-for-rpath-specification-on-linux/26281226#26281226 + + +==================== Changes in man-pages-3.77 ==================== + +Released: 2015-01-10, Munich + + +Contributors +------------ + +The following people contributed patches/fixes or (noted in brackets +in the changelog below) reports, notes, and ideas that have been +incorporated in changes in this release: + +Akihiro Motoki <amotoki@gmail.com> +Alexandre Bique <bique.alexandre@gmail.com> +Andre Majorel <aym-xunil@teaser.fr> +Andy Lutomirski <luto@amacapital.net> +Daniel Borkmann <dborkman@redhat.com> +Dave Hansen <dave.hansen@intel.com> +Elie De Brauwer <eliedebrauwer@gmail.com> +Heinrich Schuchardt <xypron.glpk@gmx.de> +Ignat Loskutov <ignat.loskutov@gmail.com> +Jeff Epler <jepler@unpythonic.net> +Jérôme Pouiller <jezz@sysmic.org> +Kees Cook <keescook@chromium.org> +Laurent Georget <laurent.georget@supelec.fr> +Masanari Iida <standby24x7@gmail.com> +Michael Haardt <michael@moria.de> +Michael Kerrisk <mtk.manpages@gmail.com> +Mike Frysinger <vapier@gentoo.org> +Richard Cochran <richardcochran@gmail.com> +Stephan Mueller <stephan.mueller@atsec.com> +Troy Davis <troy@yort.com> +Vince Weaver <vincent.weaver@maine.edu> +Will Drewry <wad@chromium.org> + +Apologies if I missed anyone! + + +New and rewritten pages +----------------------- + +seccomp.2 + Kees Cook, Michael Kerrisk, Will Drewry [Andy Lutomirski] + New page documenting seccomp(2) + Combines documentation from prctl, in-kernel seccomp_filter.txt + and dropper.c, along with details specific to the new system call. + + +Newly documented interfaces in existing pages +--------------------------------------------- + +netlink.7 + Stephan Mueller [Michael Kerrisk] + Add NETLINK_CRYPTO + + +Changes to individual pages +--------------------------- + +adjtimex.2 + Laurent Georget [Richard Cochran, Jeff Epler] + Clarify the 'ppm scaling' used in struct timex + This patch makes explicit and clarifies the unit used for + the fields "freq", "ppsfreq" and "stabil" in struct timex. + Michael Kerrisk [Masanari Iida] + Note that TIME_ERROR is the modern synonym for TIME_BAD + +perf_event_open.2 + Vince Weaver + Clarify the PERF_FLAG_FD_* flags + This change clarifies the behavior of the PERF_FLAG_FD_OUTPUT and + PERF_FLAG_FD_NO_GROUP flags to perf_event_open(), and removes + the related FIXME comments. + + While writing tests to validate the behavior of these flags I + discovered that PERF_FLAG_FD_OUTPUT has been broken since the + 2.6.35 kernel release. + +prctl.2 + Dave Hansen [Michael Kerrisk] + Add description of Intel MPX calls + The 3.19 kernel will have support for Intel MPX, including + a pair of new prctl() calls (PR_MPX_ENABLE_MANAGEMENT and + PR_MPX_DISABLE_MANAGEMENT) for enabling and disabling the + kernel's management of the "bounds tables". Add a + descriptions of the interface. + Michael Kerrisk + Add mention of seccomp(2) under PR_SET_SECCOMP + Michael Kerrisk + Suggest /proc/PID/status "Seccomp" as alternative to PRCTL_GET_SECCOMP + Michael Kerrisk + SIGKILL can also occur PRCTL_GET_SECCOMP in SECCOMP_MODE_FILTER mode + Kees Cook [Andy Lutomirski] + Document SECCOMP_MODE_FILTER vs EFAULT + This notes the distinction made between EINVAL and EFAULT when + attempting to use SECCOMP_MODE_FILTER with PR_SET_SECCOMP. + +setns.2 +pid_namespaces.7 + Mike Frysinger + Elaborate discussion of the PID namespace descendant limitation + The setns(2) man page already mentions that CLONE_NEWPID may only + be used with descendant namespaces, but this nuance could be + listed in a few more places so it is not missed. + +shmget.2 + Michael Kerrisk [Akihiro Motoki] + Make wording of SHMALL description a little clearer + +sigaction.2 + Michael Kerrisk + Add siginfo_t fields for SECCOMP_RET_TRAP + +memchr.3 +strstr.3 + Alexandre Bique + Reference memmem(3) in SEE ALSO section + +memcmp.3 + Michael Kerrisk [Michael Haardt] + NOTES: add some detail on avoiding memcmp() of cryptographic data + Wording largely based on comments from Michael Haardt. + +pthread_tryjoin_np.3 + Jérôme Pouiller [Michael Kerrisk] + Document EINVAL error for pthread_timedjoin_np() + +mem.4 + Elie De Brauwer + /dev/kmem depends on CONFIG_DEVKMEM + Elie De Brauwer + Correct /dev/port group in example + mem.4 mentions that group for /dev/port should be set to 'mem' + However, all other files (/dev/mem and /dev/kmem) use the kmem + group in their examples and on my system /dev/port belongs to + kmem. Hence the 'mem' group was probably a typo: + Elie De Brauwer + Add CONFIG_STRICT_DEVMEM + Since 2.6.26 the CONFIG_NONPROMISC_DEVMEM options limits the + physical addresses which can be accessed through /dev/mem. + +random.4 + Heinrich Schuchardt + Describe handling of O_NONBLOCK + /dev/random and /dev/urandom treat O_NONBLOCK differently. + This should be described in the manpage. + Heinrich Schuchardt + Mention PRNG used by urandom + /dev/urandom uses a pseudo-random number generator to replace + missing entropy. + +proc.5 + Michael Kerrisk + Document "Seccomp" field of /proc/PID/status + +epoll.7 + Michael Kerrisk [Ignat Loskutov] + Use epoll_create1() rather than epoll_create() in the code example + epoll_create1() is more or less the preferred API for new + applications, since it allows for some flags and avoids the + misdesigned epoll_create() argument, and so it seems sensible + to use that in the example, rather than epoll_create(). + +tcp.7 + Troy Davis + Clarify tcp_tw_recycle on Internet-facing hosts + Clarify that tcp_tw_recycle will break communication with many + general-purpose remote Internet hosts (namely, remote NAT devices) + even when the Linux device itself is not behind NAT. |