Received: by 10.192.165.148 with SMTP id m20csp470970imm; Fri, 4 May 2018 00:44:39 -0700 (PDT) X-Google-Smtp-Source: AB8JxZr9Zb5wSyFfy3W7GpEdf/KUvqhGLhKVcl5NtRQldpgruca3z/Ds70nSBidZRoRL4Fq2OokE X-Received: by 2002:a17:902:7008:: with SMTP id y8-v6mr2852763plk.141.1525419879073; Fri, 04 May 2018 00:44:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525419879; cv=none; d=google.com; s=arc-20160816; b=Cg8wSszACyaUebhBNfmrSrUoDB4r7K6MWdIegy7UZtW6UW8Vp/hu475RPwIon5V1qL cmrC7Vi4MDfwPQtJi/yVT+O619T0OkDcVtmXwyBDdfprR0OrScxA1lJvv/q4NL0UH87u oQLitD2rpw+M5jfV4mDG0xSWIQsqR+ZFhVFh6aQO/kFZhQxjSvQnCETVCQq2OqawS+ZZ R863yD5Cnj/sAG2o55H/iHShKZGvhUFgq0wKphU98H9miHnym8NhZXM+Iro1kKD0qL+/ Hl1IK64uGTIcT8LKGioyZPRF1afNu2TtXOtV2Dfhn8BppPk8gMDG3VC9gv9xMIoWjgUc gaFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject:to :from:cc:dkim-signature:arc-authentication-results; bh=4dr3Mrqjh0JVLvar8GF7SxNIu3/V/1VLB5xKvUT5+TU=; b=NCQuPVGcT1oyr+VbefvY59xrMiL2CLsdQ4RJ0r5w5DWvck3rRl+By4vacUwmjhdB2u N8kjbOFrCX1jrYjjK9n28XVCt5ehodj+qcSVC0bwfe/6MTXZRvalTFUuuwC3ghBgtj04 LUrVBcjDVGwtsk+rNMy8155j9YwC8eAxMcieVO7D9dqlgYelpv0GVbvOCIAnapQQJVKG 5zn/lqj3ODFmx97Nr7+wWM/UuXZxWaFXoOeLNe9CjewrXHhHZ/bCUhbLS4/7z0moSHgn A/Et8zsvHDIZW7NSygSWkQuQYSYUmj5r3aXMWbzvav/5FCAtZrpI5lIEBAzn9MDBEssA EHQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NcpFhW4a; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x4-v6si4681303pgr.301.2018.05.04.00.44.25; Fri, 04 May 2018 00:44:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NcpFhW4a; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751404AbeEDHnh (ORCPT + 99 others); Fri, 4 May 2018 03:43:37 -0400 Received: from mail-wr0-f175.google.com ([209.85.128.175]:34688 "EHLO mail-wr0-f175.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751277AbeEDHng (ORCPT ); Fri, 4 May 2018 03:43:36 -0400 Received: by mail-wr0-f175.google.com with SMTP id p18-v6so20042371wrm.1 for ; Fri, 04 May 2018 00:43:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=cc:from:to:subject:message-id:date:user-agent:mime-version :content-language:content-transfer-encoding; bh=4dr3Mrqjh0JVLvar8GF7SxNIu3/V/1VLB5xKvUT5+TU=; b=NcpFhW4a3rSjt3UkZ2aaRta1PLJR/f5BTLhVYk9V1Ltg3+x5+LBhde1MT3ZFy5+kfM +QDIFhP7YNxMNR2T64i2PSWrfwEoRgVgFmWc8S+4Tp9AQdBRsUS3RpV7y+rpimcAX1gx IBDsHarzEUWGGHBCQxKNP+6ApbEKoDM8mkFwNpsz3GtvJKZXHFSRLUhp+aGXjkraVfy1 QTN6uy2koIdEFuttjZImICzHYMLTDYHVcG6oNqfNlKXynlhqG/vA5ZTfeYSIqR8fW3pq WhIXEw6MpQjlDvLnFMgQkh+MgVbjbyN6Tyb0rj6IrelrZgXYFrSzTWwmO7YcpgtBA2rv Pu6g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:cc:from:to:subject:message-id:date:user-agent :mime-version:content-language:content-transfer-encoding; bh=4dr3Mrqjh0JVLvar8GF7SxNIu3/V/1VLB5xKvUT5+TU=; b=tZ64KFu3R7N+LKWNxssy4Nild8+ogYD6qV6nWAdta3FaxkYZHPduq7i+JWWTALGPyV kFv8hI7VTQaxFk52RPwdm+Z9lYLsFA7zNWfYl9ajgZu2UxxRdbmyaLO25h/RaDaqrdse m1tCEvKQeOm5ta7NP7JKnP6ov4pREbW8YAOeseYDkx2sYEhLYnYe0T3PjZnqy87Dkdvy YVVOicVtzVaYQVnV+cTGIBHas9xE8KkVy3QI78vl2bGMpb84F3nPCNkjXmVv/0st7oIz aIMMICYnzvKLV2QzKB7Dv59CJODR1WsKO3+t5KiPmUhNTj4AbvGcmljijQEIdBFy/+3v k66A== X-Gm-Message-State: ALQs6tAVdWqrlAp2utwgTrFcTgbDhoQqRcsLNR3I6n7TGJuGD58+0cCF na2BD3WBfSsf2BAtXXu1Ovo= X-Received: by 2002:adf:ea8a:: with SMTP id s10-v6mr19586668wrm.223.1525419815447; Fri, 04 May 2018 00:43:35 -0700 (PDT) Received: from [192.168.51.234] ([84.16.30.22]) by smtp.gmail.com with ESMTPSA id q2-v6sm16087237wrm.26.2018.05.04.00.43.34 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 04 May 2018 00:43:34 -0700 (PDT) Cc: mtk.manpages@gmail.com From: "Michael Kerrisk (man-pages)" To: lkml Subject: man-pages-4.16 is released Message-ID: <8cc21d2e-9f1c-01d1-f3bb-8f9d5f411aeb@gmail.com> Date: Fri, 4 May 2018 09:43:34 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Gidday, The Linux man-pages maintainer proudly announces: man-pages-4.16 - man pages for Linux This release resulted from patches, bug reports, reviews, and comments from 29 contributors. Around 160 commits changed 62 pages. Tarball download: http://www.kernel.org/doc/man-pages/download.html Git repository: https://git.kernel.org/cgit/docs/man-pages/man-pages.git/ Online changelog: http://man7.org/linux/man-pages/changelog.html#release_4.16 A short summary of the release is blogged at: http://linux-man-pages.blogspot.com/2018/04/man-pages-416-is-released.html The current version of the pages is browsable at: http://man7.org/linux/man-pages/ A selection of changes in this release that may be of interest to readers of LKML is shown below. Cheers, Michael ==================== Changes in man-pages-4.16 ==================== Newly documented interfaces in existing pages --------------------------------------------- membarrier.2 Mathieu Desnoyers [Michael Kerrisk] Document new membarrier commands introduced in Linux 4.16 Document the following membarrier commands introduced in Linux 4.16: MEMBARRIER_CMD_GLOBAL_EXPEDITED (the old enum label MEMBARRIER_CMD_SHARED is now an alias to preserve header backward compatibility) MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE mmap.2 Jan Kara [Ross Zwisler, Michael Kerrisk] Add description of MAP_SHARED_VALIDATE and MAP_SYNC Michal Hocko [John Hubbard, Michael Kerrisk, Jann Horn] Document new MAP_FIXED_NOREPLACE flag 4.17+ kernels offer a new MAP_FIXED_NOREPLACE flag which allows the caller to atomically probe for a given address range. readv.2 io_submit.2 Jürg Billeter Document RWF_APPEND added in Linux 4.16 capabilities.7 Michael Kerrisk Describe file capability versioning Michael Kerrisk [Serge E. Hallyn] Document namespaced-file capabilities [There's still more work to be done on this new text] Changes to individual pages --------------------------- bpf.2 Michael Kerrisk Update list of architectures that support JITed eBPF And note kernel version numbers where support is added. Michael Kerrisk Kernel 4.15 added CONFIG_BPF_JIT_ALWAYS_ON This causes the JIT compiler to be always on and forces bpf_jit_enable to 1. fallocate.2 Michael Kerrisk Since Linux 4.16, Btrfs supports FALLOC_FL_ZERO_RANGE getrlimit.2 Michael Kerrisk CAP_SYS_RESOURCE capability is required in *initial user namespace* mmap.2 Jann Horn MAP_FIXED is okay if the address range has been reserved Clarify that MAP_FIXED is appropriate if the specified address range has been reserved using an existing mapping, but shouldn't be used otherwise. mount.2 Michael Kerrisk ERRORS: add EBUSY for the case of trying to stack same mount twice Michael Kerrisk Remove a couple of obsolete EBUSY errors As far as I can tell, these EBUSY errors disappeared with the addition of stackable mounts in Linux 2.4. perf_event_open.2 Song Liu Add type kprobe and uprobe Two new types kprobe and uprobe are being added to perf_event_open(), which allow creating kprobe or uprobe with perf_event_open. This patch adds information about these types. seccomp.2 Michael Kerrisk Note that execve() may change syscall numbers during life of process On a multiarch/multi-ABI platform such as modern x86, each architecture/ABI (x86-64, x32, i386)has its own syscall numbers, which means a seccomp() filter may see different syscall numbers over the life of the process if that process uses execve() to execute programs that has a different architectures/ABIs. Michael Kerrisk Note which architectures support seccomp BPF Michael Kerrisk In EXAMPLE, clearly note that x32 syscalls are >= X32_SYSCALL_BIT tmpfs.5 Mike Frysinger Document current mount options Some of this content is moved from the mount(8) man page. Style was based on proc(5) sections. cgroups.7 Michael Kerrisk cgroup.events transitions generate POLLERR as well as POLLPRI namespaces.7 Michael Kerrisk [Konstantin Khlebnikov] Mention that device ID should also be checked when comparing NS symlinks When comparing two namespaces symlinks to see if they refer to the same namespace, both the inode number and the device ID should be compared. This point was already made clear in ioctl_ns(2), but was missing from this page. Michael Kerrisk Note an idiosyncrasy of /proc/[pid]/ns/pid_for_children /proc/[pid]/ns/pid_for_children has a value only after first child is created in PID namespace. Verified by experiment. network_namespaces.7 Michael Kerrisk Network namespaces isolate the UNIX domain abstract socket namespace vdso.7 Michael Kerrisk VDSO symbols (system calls) are not visible to seccomp(2) filters -- Michael Kerrisk Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ Linux/UNIX System Programming Training: http://man7.org/training/