Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755518AbcJHMZ1 (ORCPT ); Sat, 8 Oct 2016 08:25:27 -0400 Received: from mail-wm0-f47.google.com ([74.125.82.47]:37320 "EHLO mail-wm0-f47.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751574AbcJHMZR (ORCPT ); Sat, 8 Oct 2016 08:25:17 -0400 Cc: mtk.manpages@gmail.com To: lkml From: "Michael Kerrisk (man-pages)" Subject: man-pages-4.08 is released Message-ID: Date: Sat, 8 Oct 2016 14:25:14 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 9527 Lines: 297 The Linux man-pages maintainer proudly announces: man-pages-4.08 - man pages for Linux This release includes input and contributions from around 40 people. Nearly 200 pages saw changes, ranging from typo fixes through to page rewrites and 1 new page. Tarball download: http://www.kernel.org/doc/man-pages/download.html Git repository: https://git.kernel.org/cgit/docs/man-pages/man-pages.git/ Online changelog: http://man7.org/linux/man-pages/changelog.html#release_4.08 A short summary of the release is blogged at: http://linux-man-pages.blogspot.com/2016/10/man-pages-408-is-released.html The current version of the pages is browsable at: http://man7.org/linux/man-pages/ A selection of changes in this release that may be of interest to readers on LKML is shown below. Cheers, Michael ==================== Changes in man-pages-4.08 ==================== Released: 2016-10-08, Munich New and rewritten pages ----------------------- quotactl.2 Eugene Syromyatnikov [Michael Kerrisk] Updated information regarding disk quota flags Added information regarding DQF_SYS_FILE flag; updated definition of V1_DQF_RSQUASH, which has been defined privately and defined publicly as DQF_ROOT_SQUASH. Eugene Syromyatnikov Updated information regarding XFS-specific quotactl subcommands Added information regarding structure definitions used for XFS-specific subcommands, updated flag constants, added information regarding ignored syscall arguments, added notes on usage of kernel UAPI header. Eugene Syromyatnikov Additions regarding project quotas Added information regarding presence of project quotas. bswap.3 Michael Kerrisk New page documenting bswap_16(), bswap_32(), and bswap_64() cgroups.7 Michael Kerrisk Substantial rewrites, additions, and corrections. Newly documented interfaces in existing pages --------------------------------------------- readv.2 Michael Kerrisk Document the pwritev2() RWF_SYNC and RWF_DSYNC flags proc.5 Michael Kerrisk Document /proc/PID/seccomp Jann Horn Document /proc/[pid]/task/[tid]/children Document the /proc/[pid]/task/[tid]/children interface from CRIU, and more importantly, document why it's usually not a good interface. Changes to individual pages --------------------------- chroot.2 Michael Kerrisk Note user namespace requirements for CAP_SYS_CHROOT clone.2 Keno Fischer [Josh Triplett] Adjust syscall prototype and expand CLONE_SETTLS description Michael Kerrisk [Josh Triplett, Josh Triplett] Document raw syscall interfaces on various other architectures Michael Kerrisk Change types for 'ptid' and 'ctid' in syscall prototypes These types changed from 'void *' to 'int *' back in Linux 3.8. Michael Kerrisk EINVAL is generated by glibc wrapper for NULL 'fn' or 'child_stack' Clarify that this error is produced by the wrapper function, not the underlying system call. In particular, the point is that the raw system call can accommodate a NULL pointer for 'child_stack'. Michael Kerrisk [Elliott Hughes] Make the implications of CLONE_FILES more explicit If CLONE_FILES is not set, the duplicated FDs nevertheless share file offset and status flags via the open file description. epoll_wait.2 Mike Crowe Clarify that the timeout is measured against CLOCK_MONOTONIC fcntl.2 Michael Kerrisk Note an important detail of F_SETOWN permission rules for signals F_SETOWN records the caller's credentials at the time of the fcntl() call, and it is these saved credentials that are used for subsequent permission checks. getdomainname.2 Michael Kerrisk Note user namespace requirements for CAP_SYS_ADMIN getgroups.2 Michael Kerrisk Note user namespace requirements for CAP_SETGID gethostname.2 Michael Kerrisk Note user namespace requirements for CAP_SYS_ADMIN getrlimit.2 Michael Kerrisk Note user namespace semantics for CAP_SYS_RESOURCE kcmp.2 Michael Kerrisk Add an example program kill.2 Michael Kerrisk Note the user namespace requirement for CAP_KILL mlock.2 Sebastian Andrzej Siewior Document that fork() after mlock() may be a bad idea in a RT process mmap.2 Jann Horn Describe treatment of 'offset' for MAP_ANONYMOUS msgctl.2 msgget.2 msgop.2 semctl.2 semget.2 semop.2 shmctl.2 shmget.2 shmop.2 Michael Kerrisk Note the user namespace requirements for CAP_IPC_OWNER open.2 Michael Kerrisk Clarify user namespace capability requirements for O_NOATIME Michael Kerrisk F2FS support for O_TMPFILE was added in Linux 3.16 Michael Kerrisk Clarify the rules about how the group ID of a new file is determined prctl.2 Michael Kerrisk Simplify list of cases where "dumpable" attribute is reset Michael Kerrisk Note user namespace requirements for PR_CAPBSET_DROP CAP_SETPCAP readlink.2 Michael Kerrisk [Ursache Vladimir] Make example program handle links that report a size of zero Some "magic" symlinks created by the kernel (e.g., those under /proc and /sys) report 'st_size' as zero. Modify the example program to handle that possibility. readv.2 Michael Kerrisk [Christoph Hellwig] Clarify that RWF_DSYNC and RWF_SYNC apply only to data being written reboot.2 Michael Kerrisk Note user namespace requirements around CAP_SYS_BOOT sched_setaffinity.2 Michael Kerrisk Note user namespace requirements for CAP_SYS_NICE seccomp.2 Michael Kerrisk CAP_SYS_ADMIN is required only in caller's user namespace seteuid.2 Michael Kerrisk Note user namespace requirements for CAP_SETUID and CAP_SETGID setgid.2 Michael Kerrisk Note user namespace requirements for CAP_SETGID setresuid.2 Michael Kerrisk Note user namespace requirements for CAP_SETUID setreuid.2 Michael Kerrisk Note user namespace requirements for CAP_SETUID and CAP_SETGID setuid.2 Michael Kerrisk Note user namespace requirements for CAP_SETUID sigprocmask.2 Keno Fischer Expand/clarify libc/kernel sigset_t difference bindresvport.3 rcmd.3 ip.7 Michael Kerrisk Note user namespace requirements for CAP_NET_BIND_SERVICE core.5 Mike Frysinger [Michael Kerrisk] Add more details for output paths and the crash handler People sometimes assume that the crash handler runs in the same context as the crashing process. They would be incorrect :). proc.5 Mike Frysinger Clarify the root symlink and mount namespaces If the target process is in a different mount namespace, the root symlink actually shows that view of the filesystem. Michael Kerrisk [Mike Frysinger] Expand discussion of /proc/[pid]/root Add a shell example showing that /proc/[pid]/root is more than a symlink. Based on an example provided by Mike Frysinger in an earlier commit message. Michael Kerrisk Explain rules determining ownership of /proc/PID/* files Describe the effect of the "dumpable" attribute on ownership of /proc/PID files. Michael Kerrisk Note effect of 'suid_dumpable' on ownership of /proc/PID files Michael Kerrisk Note that 'suid_dumpable' mode 1 is insecure Michael Kerrisk Document /proc/meminfo '+ShmemHugePages' and 'ShmemPmdMapped' fields Michael Kerrisk Document /proc/PID/status 'RssAnon', 'RssFile', and 'RssShmem' fields Michael Kerrisk Document /proc/PID/status 'HugetlbPages' field Michael Kerrisk [Zefram] Clarify that /proc/PID/statm 'shared' field counts *resident* pages See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741360 Michael Kerrisk Clarify user namespace requirements for /proc/sys/fs/protected_hardlinks Michael Kerrisk Clarify description of /proc/PID/statm 'lib' and 'dt' fields These fields are always zero since Linux 2.6. Namhyung Kim [Petr Cermak] Add description of CLEAR_REFS_MM_HIWATER_RSS capabilities.7 Michael Kerrisk Add note about nosuid to file capabilities section packet.7 Michael Kerrisk Clarify user namespace requirements for CAP_NET_RAW pipe.7 Michael Kerrisk [Patrick McLean] Document FIONREAD raw.7 Michael Kerrisk Clarify user namespace requirements for CAP_NET_RAW Also remove mention of UID 0 as a method or creating a raw socket. As far as I can tell from reading the kernel source (net/ipv4/af_inet.c), this is not true. ld.so.8 Michael Kerrisk Expand description of LD_DEBUG Provide a list of the categories, and note that multiple categories can be specified. Michael Kerrisk Clarify text describing whether secure-mode programs preload libraries -- Michael Kerrisk Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ Linux/UNIX System Programming Training: http://man7.org/training/