Received: by 10.223.176.5 with SMTP id f5csp894983wra; Fri, 2 Feb 2018 07:51:30 -0800 (PST) X-Google-Smtp-Source: AH8x226Qceb/0Ol6hlXDbWeafErP0Ex8x2GDiqBMq0l/riqVG9RJ38sBl77O+jA7t5g4vQKjZ5dm X-Received: by 10.98.159.25 with SMTP id g25mr40770268pfe.224.1517586690041; Fri, 02 Feb 2018 07:51:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517586690; cv=none; d=google.com; s=arc-20160816; b=CzHPF42KPpjTMFWlT5E/72HiMImQ5F8ENCEOh30g46SZrY+z5iS3G+D4dQbnIUUAdx G8/s5eXa5akuWnrTQwiBNd1u6RCr/TCF9iKHz16l4CmTTJqjxdV33Z8KyPFfqogr2KLk CaC82rAk2jbP2tWQOuGJDsUk0KwqFyBGKrFN01IU0b3/fbNNasST1WjfoVM4gROq8zBf hFLz5KyrIe4f+uPnxyg3JmeKQ/3H0tNuH43x9HVTLsCMb/ve8H0/rWZzsdiW0+e6+0yZ Ju7rKAMOA4DAElu25xy1w9je7jq6KhM1VmWorNsQfuPFDRuDjsBxO3xDfh/oKSNG7Dv3 /BoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject :from:to:cc:dkim-signature:arc-authentication-results; bh=2KzQG6/12UPGViC4LeapV9mjAIZIs5gJG806XhnXpoc=; b=oRtE/UIY4ymtq+B7hNAJBj50jPWp5aLlH3bD1bUOyLy9/WFep0gd8GXS6NdXow8b+U glQGjDpfF/uAVDqmxFGdlm3C6IVdy8U5u/N5md1IWLnxw8nI9AhhyRSXM7bnDzMAYsdR UhfZWFs2l3gYWJzqK3Pcpcq1Lm82BzG6R5Iuu1zrrRSP9PZ5ylBu1DtG1UuZC7x1EgXo VKAorqWqjywnms0WygaKjjXMtRUh4RbCbI9h/H5xrcPiELYEgUslBCDrE/A6e2qoEGQt Mn2dA44/iadakaqi2fQ7LOjirTmreiAm0BAVxlrXjW2wKwZdZOjQdU+ASbpCsNzzObJ7 4/eQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tMMWR6P+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w23-v6si1970802plk.537.2018.02.02.07.51.15; Fri, 02 Feb 2018 07:51:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tMMWR6P+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752077AbeBBPt0 (ORCPT + 99 others); Fri, 2 Feb 2018 10:49:26 -0500 Received: from mail-pf0-f176.google.com ([209.85.192.176]:39272 "EHLO mail-pf0-f176.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751470AbeBBPtV (ORCPT ); Fri, 2 Feb 2018 10:49:21 -0500 Received: by mail-pf0-f176.google.com with SMTP id e11so17495403pff.6 for ; Fri, 02 Feb 2018 07:49:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=cc:to:from:subject:message-id:date:user-agent:mime-version :content-language:content-transfer-encoding; bh=2KzQG6/12UPGViC4LeapV9mjAIZIs5gJG806XhnXpoc=; b=tMMWR6P+uZwCYEvVZ+J1b0QCZNeF3tqwF64qihAhX1hReXTyemfzPPH8PvckcfN7tC IEwL6d2YY3zO/byHjdFeKypePoMUNViyXKrUwzq/o2+c4PExr20zcIdR4DAo7zX8utQQ esWVfjO9F6Q4sVm5OTan9KhCS1EkoczuHExqLgEbpoQvzL5T42dpjntvPhfKR1F6LXrR BMCamjwF1K/SS4KwX1NlkMvOErOtQaQgh1lIlYSxtFcgPo5iksorHvHgCrL3OiOKI5O0 H0JAmIL9NwSWnma7vc11A8QHUBAQzjDYBQdiGKMYSyn0jvyuDLyGixzS8P6kcPeNm/y3 xQTA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:cc:to:from:subject:message-id:date:user-agent :mime-version:content-language:content-transfer-encoding; bh=2KzQG6/12UPGViC4LeapV9mjAIZIs5gJG806XhnXpoc=; b=Ize2OJUnjBPdsxWGYgkjWFUIopw+hytQjyOoJEGt/qHAZJdHik5WGJ1ADdMGSPIdMz e20Ny8BZjTJ9A4hYUF83uSvAcEXzMukib3y+KMvc2WNiHoXA3DAyeFFDGxR8WniD0obX fmZ0pjuzjH9cs6IkwofhRG+vYQ3LRrqUVNFh6+rZFZTtl3S8/OpEkKDMjpGIG9z98xF2 xxgB96Cu5nOhCiU2ZJPHAmrQGmXqYUXkEgYNQSPASYwCpe2Ra/TppmYoOM27Q3xGz8EZ 55bsdvAJxSPjowF3o+/b3SFjIga+FE/7jN/sdgVRuQrdyrnKDOJp3lIwViXRFZR5Cb4d c5PQ== X-Gm-Message-State: AKwxytfdUqO6ITUdMkWakZVOkTZVX4IcVFhfUNWXvSt9M42/5QdLkWp8 Ij2f5LhQpHacfU0aSjP72uk= X-Received: by 10.99.104.194 with SMTP id d185mr31943521pgc.404.1517586560527; Fri, 02 Feb 2018 07:49:20 -0800 (PST) Received: from ?IPv6:2601:647:5401:143e::ad3? ([2601:647:5401:143e::ad3]) by smtp.gmail.com with ESMTPSA id w27sm3767735pge.54.2018.02.02.07.49.19 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 02 Feb 2018 07:49:19 -0800 (PST) Cc: mtk.manpages@gmail.com To: lkml From: "Michael Kerrisk (man-pages)" Subject: man-pages-4.15 is released Message-ID: Date: Fri, 2 Feb 2018 16:49:18 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Gidday, The Linux man-pages maintainer proudly announces: man-pages-4.15 - man pages for Linux This release resulted from patches, bug reports, reviews, and comments from 26 contributors. Over 200 commits changed around 75 pages. In addition, 3 new manual pages were added. Tarball download: http://www.kernel.org/doc/man-pages/download.html Git repository: https://git.kernel.org/cgit/docs/man-pages/man-pages.git/ Online changelog: http://man7.org/linux/man-pages/changelog.html#release_4.15 A short summary of the release is blogged at: http://linux-man-pages.blogspot.com/2018/02/man-pages-415-is-released.html A selection of changes in this release that may be of interest to readers of LKML is shown below. Cheers, Michael ==================== Changes in man-pages-4.15 ==================== New and rewritten pages ----------------------- s390_sthyi.2 QingFeng Hao [Michael Kerrisk] New page for s390-specific s390_sthyi(2) network_namespaces.7 Michael Kerrisk New page describing network namespaces Based on content moved from namespaces(7) vsock.7 Stefan Hajnoczi [Jorgen Hansen, Michael Kerrisk] Document the VSOCK socket address family Newly documented interfaces in existing pages --------------------------------------------- cgroups.7 Michael Kerrisk [Tejun Heo] Document cgroups v2 "thread mode" Michael Kerrisk [Tejun Heo] Document cgroup v2 delegation via the 'nsdelegate' mount option Michael Kerrisk Document the cgroup.max.depth and cgroup.max.descendants files Michael Kerrisk Document 'release_agent' mount option Michael Kerrisk [Roman Gushchin] Document /sys/kernel/cgroup/delegate Michael Kerrisk [Roman Gushchin] Document /sys/kernel/cgroup/features Michael Kerrisk [Roman Gushchin] Document cgroups v2 cgroup.stat file Changes to individual pages --------------------------- fcntl.2 read.2 write.2 NeilBrown Document "Lost locks" as cause for EIO. If an advisory lock is lost, then read/write requests on any affected file descriptor can return EIO - for NFSv4 at least. mmap.2 John Hubbard [Michael Hocko] MAP_FIXED is no longer discouraged MAP_FIXED has been widely used for a very long time, yet the man page still claims that "the use of this option is discouraged". John Hubbard MAP_FIXED updated documentation -- Expand the documentation to discuss the hazards in enough detail to allow avoiding them. -- Mention the upcoming MAP_FIXED_SAFE flag. -- Enhance the alignment requirement slightly. recvmmsg.2 sendmmsg.2 Nikola Forró Point out that error handling is unreliable seccomp.2 Michael Kerrisk Clarify that SECCOMP_RET_TRAP SIGSYS signal is thread-directed capabilities.7 Michael Kerrisk Note which capability sets are affected by SECBIT_NO_SETUID_FIXUP Note explicitly that SECBIT_NO_SETUID_FIXUP is relevant for the permitted, effective, and ambient capability sets. Michael Kerrisk Clarify effect of CAP_SETFCAP Make it clear that CAP_SETFCAP allows setting arbitrary capabilities on a file. Michael Kerrisk Clarify which capability sets are effected by SECBIT_KEEP_CAPS This flag has relevance only for the process permitted and effective sets. Michael Kerrisk Rephrase CAP_SETPCAP description * Mention kernel versions. * Place current kernel behavior first Michael Kerrisk SECBIT_KEEP_CAPS is ignored if SECBIT_NO_SETUID_FIXUP is set Michael Kerrisk Ambient set is also cleared when UIDs are set to nonzero value cgroups.7 Michael Kerrisk Add a more complete description of cgroup v1 named hierarchies Michael Kerrisk Add a section on unmounting cgroup v1 filesystems Michael Kerrisk Add subsection describing cgroups v2 subtree delegation Michael Kerrisk Mention ENOENT error that can occur when writing to subtree_control file Michael Kerrisk Add list of currently available version 2 controllers Nikolay Borisov Add information about RDMA controller Michael Kerrisk Rewrite the description of cgroup v2 subtree control Michael Kerrisk [Tejun Heo] Note Linux 4.11 changes to cgroup v2 delegation containment rules Michael Kerrisk systemd(1) nowadays automatically mounts the cgroup2 filesystem Michael Kerrisk Clarify that cgroup.controllers is read-only Michael Kerrisk Elaborate a little on problems of splitting threads across cgroups in v1 Michael Kerrisk [Tejun Heo] Tweak the description of delegation of cgroup.subtree_control sched.7 Michael Kerrisk [Andrea Parri] Correctly describe effect of priority changes for RT threads The placement of a thread in the run queue for its new priority depends on the direction of movement in priority. (This appears to contradict POSIX, except in the case of pthread_setschedprio().) -- Michael Kerrisk Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ Linux/UNIX System Programming Training: http://man7.org/training/