Received: by 10.223.164.202 with SMTP id h10csp737259wrb; Sun, 26 Nov 2017 11:19:36 -0800 (PST) X-Google-Smtp-Source: AGs4zMbDpiQ7n+g+Y6J6NiRjukTie12GJ3iEaD9ExUOvDPJ3gULvT2zRdH21GPB6Qrz08vwhdVih X-Received: by 10.159.244.20 with SMTP id x20mr36218005plr.433.1511723976761; Sun, 26 Nov 2017 11:19:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1511723976; cv=none; d=google.com; s=arc-20160816; b=A/CZACRiYMtSoGr3aml7n/4jUHOYX2NFYKUl+D7TizEBNPYBuHgxIU3i/GioIixzcH WS/dbJKmk6lOpBnYIwlHRDSBgZFqFrE0s1fjo2U6kq8B8PvCOehtlDMKKTn/LgS1q6wS /ScCo76EMfP9oEgTSA0pcy0DzhjbcavD7K75eVMFNhxoFVK1/8C9zOb9OClCML1vYs+m 62AxX4C8YQLzW5EOawFe37EIgEwTzkqL+aViJ+4t0NF/G1NGnZtmry8Pe4QTKMpnSL/y JeLkFv8TDmwxbb2eBpppCdkWS89YTyPC3cf4XMIBz51hxaW9HWQNh+oN8+xILpn3X2/1 ra/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject :from:to:cc:dkim-signature:arc-authentication-results; bh=4HstsUJNME1L9d4fB4ESjf33pHBfc+rAgHb2lUCZee4=; b=xVl0SwCupaDp1Ff57elylAvsxoANBTqrbVmwZOXEm10b1IIUSEYJ1PVcuNJiRYSlB8 vxDFKV0n3YXUu35XZz4pkKGHM2XRv1Rp8BmdTyfEwIo7/PhKJABpUaWCGdIHJPTRk5pE x/6z3SiyAwGEXF5aA0/N4UbSxAQajfVpd0HkpyGpySlQVorA3lxAGL0IYANV2jWKTG5s Klme+uYPFQRXrlgbdkxacTqghkRLeR1Eom1eHtMZKhHv7N0r+ahc33AhuKN0xtDzDC1G T2nsUOhXOjt72JUd6CrIf6VynZsOJkRjhKQYe5gdUs1/P+TYhHp4JuCXuDqVtFkMaX8a 2Q8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jsDQkyO7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g185si21537094pgc.826.2017.11.26.11.19.24; Sun, 26 Nov 2017 11:19:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jsDQkyO7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751605AbdKZTSp (ORCPT + 77 others); Sun, 26 Nov 2017 14:18:45 -0500 Received: from mail-wm0-f51.google.com ([74.125.82.51]:35826 "EHLO mail-wm0-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751511AbdKZTSo (ORCPT ); Sun, 26 Nov 2017 14:18:44 -0500 Received: by mail-wm0-f51.google.com with SMTP id w73so2115733wmw.0 for ; Sun, 26 Nov 2017 11:18:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=cc:to:from:subject:message-id:date:user-agent:mime-version :content-language:content-transfer-encoding; bh=4HstsUJNME1L9d4fB4ESjf33pHBfc+rAgHb2lUCZee4=; b=jsDQkyO7XsMPVTGSHnqM3SEt1wQSTDghzxGO6pqNX2CF4Z8cfgvv2mrRiZFX7glIWP wy2wP+YsZfxLMAFVH55byuOs1KzdR042UJNSrKs0No7BMko/RsS2+4A/qKeET8w/ga2m tWMKOPEFN7OXIunlKVFzeQdwKPd1Q1ItcdjNyzaZ/5Yz3bOK8sPd5FWblfo6P5+jSlqf fPlOnQBBCZQal9YvUreNYhAHfpo7VtAnD68vyzcyH3mVfuKG/0mNPuU1tTYb1UeYtfMI WVvskvwATsOiytO4e/AReQmlmhp4YX/9/Y7kv3pqb6LX0d7/FmL2ufsCpqpWeCDeEz5S U5Lg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:cc:to:from:subject:message-id:date:user-agent :mime-version:content-language:content-transfer-encoding; bh=4HstsUJNME1L9d4fB4ESjf33pHBfc+rAgHb2lUCZee4=; b=KQebvC+QmyOW2owmaiDcjxXQuNLb/nbJIUvuGHU4Ocic62CUrrVZbIBrEuda9cXZ7k HJlGMQuR8qTh57jaEoCC9XVz8RMU6oWxn6wvEgzxmR1PpG4MxLD34+slHRRndbQttbif hxj50VtiHFVoCsTn1s2padOkyOfCBQoa9dQwa+r65mxBuuDcv4TN3g17DNB2HKhpabdi ESARowiYyzBb+N1YSqgzIcqSWRYh/UiBmc5Nfj4lsjxnTLIt4ecOKHANmOtuUti+RIu8 YlpBa+2fsr/Ic9d8ITEjDnaoiTp2JPz4JjZJtmxQVVv/6grWFBxAgr7yGVv4Q3lfHOlm 0pPg== X-Gm-Message-State: AJaThX6Y8vbJdqLZMA+SD9+pnYNhvIIhtVKLjJSdqZZvHMRR/XwL/+DT 4gZPpC1VKda+ddTckft6b+m5gUNdi6g= X-Received: by 10.28.29.21 with SMTP id d21mr15390943wmd.93.1511723922940; Sun, 26 Nov 2017 11:18:42 -0800 (PST) Received: from ?IPv6:2a01:cb04:137:b700:c6ad:f260:2ca6:7564? (2a01cb040137b700c6adf2602ca67564.ipv6.abo.wanadoo.fr. [2a01:cb04:137:b700:c6ad:f260:2ca6:7564]) by smtp.gmail.com with ESMTPSA id u5sm6877230wmf.47.2017.11.26.11.18.41 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 26 Nov 2017 11:18:42 -0800 (PST) Cc: mtk.manpages@gmail.com To: lkml From: "Michael Kerrisk (man-pages)" Subject: man-pages-4.14 is released Message-ID: Date: Sun, 26 Nov 2017 20:18:41 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Gidday, The Linux man-pages maintainer proudly announces: man-pages-4.14 - man pages for Linux This release resulted from patches, bug reports, reviews, and comments from 71 contributors. Nearly 400 commits changed more than 160 pages. In addition, 4 new manual pages were added. Tarball download: http://www.kernel.org/doc/man-pages/download.html Git repository: https://git.kernel.org/cgit/docs/man-pages/man-pages.git/ Online changelog: http://man7.org/linux/man-pages/changelog.html#release_4.14 A short summary of the release is blogged at: http://linux-man-pages.blogspot.com/2017/11/man-pages-414-is-released.html The current version of the pages is browsable at: http://man7.org/linux/man-pages/ A selection of changes in this release that may be of interest to readers of LKML is shown below. Cheers, Michael ==================== Changes in man-pages-4.14 ==================== Released: 2017-11-26, Paris New and rewritten pages ----------------------- pthread_spin_init.3 Michael Kerrisk [Peter Zijlstra, Thomas Gleixner, Zack Weinberg, Florian Weimer] New page describing pthread_spin_init(3) and pthread_spin_destroy(3) pthread_spin_lock.3 Michael Kerrisk [Carlos O'Donell] New page describing functions that lock and unlock spin locks Add a page describing pthread_spin_lock(3), pthread_spin_unlock(3), and pthread_spin_trylock(3). smartpqi.4 Don Brace [Michael Kerrisk, G. Branden Robinson] Document the smartpqi SCSI driver veth.4 Tomáš Pospíšek, Eric Biederman, Michael Kerrisk New page document veth virtual ethernet devices Based on a page from Tomáš Pospíšek, with some clean-ups by mtk. Newly documented interfaces in existing pages --------------------------------------------- ioctl_userfaultfd.2 userfaultfd.2 Prakash Sangappa [Andrea Arcangeli, Mike Rapoport] Add description for UFFD_FEATURE_SIGBUS madvise.2 Rik van Riel [Colm MacCárthaigh, Michael Kerrisk] Document MADV_WIPEONFORK and MADV_KEEPONFORK Michael Kerrisk Note fork() and execve() semantics for wipe-on-fork setting membarrier.2 Mathieu Desnoyers Update membarrier manpage for 4.14 Add documentation for these new membarrier() commands: MEMBARRIER_CMD_PRIVATE_EXPEDITED MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED memfd_create.2 Mike Kravetz Add description of MFD_HUGETLB (hugetlbfs) support hugetlbfs support for memfd_create() was recently merged by Linus and should be in the Linux 4.14 release. To request hugetlbfs support a new memfd_create() flag (MFD_HUGETLB) was added. readv.2 Christoph Hellwig Document RWF_NOWAIT added in Linux 4.14 seccomp.2 Tyler Hicks Document the SECCOMP_GET_ACTION_AVAIL operation added in Linux 4.14 Tyler Hicks Document the SECCOMP_FILTER_FLAG_LOG flag added in Linux 4.14 Tyler Hicks Document the SECCOMP_RET_LOG action added In Linux 4.14 Michael Kerrisk [Kees Cook] Add description of SECCOMP_RET_KILL_PROCESS Michael Kerrisk Add SECCOMP_RET_KILL_THREAD description and rework SECCOMP_RET_KILL text Michael Kerrisk Document the seccomp audit logging feature added in Linux 4.14 seccomp.2 proc.5 Tyler Hicks Document the seccomp /proc interfaces added in Linux 4.14 Document the seccomp /proc interfaces in Linux 4.14: /proc/sys/kernel/seccomp/actions_avail and /proc/sys/kernel/seccomp/actions_logged. sigaltstack.2 Michael Kerrisk [Stas Sergeev] Document the SS_AUTODISARM flag added in Linux 4.7 proc.5 Michael Kerrisk Document /proc/locks Oliver Ebert Document /proc/kpagecgroup Oliver Ebert Add KPF_BALLOON, KPF_ZERO_PAGE, and KPF_IDLE for /proc/kpageflags pid_namespaces.7 Michael Kerrisk Document /proc/sys/kernel/ns_last_pid Changes to individual pages --------------------------- capget.2 Michael Kerrisk Clarify discussion of kernels that have no VFS capability support clone.2 Michael Kerrisk Warn that the clone() wrapper modifies child_stack in the parent io_submit.2 Goldwyn Rodrigues Add iocb details to io_submit Add more information about the iocb structure. Explains the fields of the I/O control block structure which is passed to the io_submit() call. mremap.2 Mike Kravetz [Florian Weimer, Jann Horn] Add description of old_size == 0 functionality Since at least the 2.6 time frame, mremap() would create a new mapping of the same pages if 'old_size == 0'. It would also leave the original mapping. This was used to create a 'duplicate mapping'. A recent change was made to mremap() so that an attempt to create a duplicate a private mapping will fail. Michael Kerrisk [Michal Hocko, Mike Kravetz] BUGS: describe older behavior for old_size==0 on private mappings Explain the older behavior, and why it changed. This is a follow-up to Mike Kravetz's patch documenting the behavior for old_size==0 with shared mappings. open.2 Michael Kerrisk By contrast with O_RDONLY, no file permissions are required for O_PATH Note one of the significant advantages of O_PATH: many of the operations applied to O_PATH file descriptors don't require read permission, so there's no reason why the open() itself should require read permission. open_by_handle_at.2 NeilBrown Clarifications needed due to NFS reexport NeilBrown [Lennart Poettering] Clarify MAX_HANDLE_SZ As hinted in the kernel source, MAX_HANDLE_SZ is a hint rather than a promise. pipe.2 Michael Kerrisk [Marin H.] Since Linux 4.5, fcntl() can be used to set O_DIRECT for a pipe See https://bugzilla.kernel.org/show_bug.cgi?id=197917 pkey_alloc.2 Breno Leitao Fix argument order Currently pkey_alloc() syscall has two arguments, and the very first argument is still not supported and should be set to zero. The second argument is the one that should specify the page access rights. reboot.2 Michael Kerrisk [Michał Zegan] Fix bogus description of reboot() from non-initial PID namespace The current text was confused (mea culpa). No signal is sent to the init() process. Rather, depending on the 'cmd' given to reboot(), the 'group_exit_code' value will set to either SIGHUP or SIGINT, with the effect that one of those signals is reported to wait() in the parent process. See https://bugzilla.kernel.org/show_bug.cgi?id=195899 sched_yield.2 Michael Kerrisk [Peter Zijlstra] sched_yield() is intended for use with real-time scheduling policies seccomp.2 Michael Kerrisk [Adhemerval Zanella, Florian Weimer, Kees Cook] Add some Caveats regarding the use of seccomp filters Michael Kerrisk Document the "default" filter return action The kernel defaults to either SECCOMP_RET_KILL_PROCESS or SECCOMP_RET_KILL_THREAD for unrecognized filter return action values. Michael Kerrisk [Kees Cook] Change SECCOMP_RET_ACTION to SECCOMP_RET_ACTION_FULL In Linux 4.14, the action component of the return value switched from being 15 bits to being 16 bits. A new macro, SECCOMP_RET_ACTION_FULL, that masks the 16 bits was added, to replace the older SECCOMP_RET_ACTION. Michael Kerrisk Explicitly note that other threads survive SECCOMP_RET_KILL_THREAD sigaction.2 Michael Kerrisk Rework discussion of SA_SIGINFO handler arguments Expand and rework the text a little, in particular adding a reference to sigreturn(2) as a source of further information about the ucontext argument. Michael Kerrisk Mention that libc sets the act.sa_restorer field sigreturn.2 Michael Kerrisk Make it a little clearer that a stack frame is created by the kernel Michael Kerrisk glibc has a simple wrapper for sigreturn() that returns ENOSYS stat.2 NeilBrown Correct AT_NO_AUTOMOUNT text and general revisions Expand on the relationship between fstatat() and the other three functions, and improve the description of AT_NO_AUTOMOUNT. Specifically, both stat() and lstat() act the same way with respect to automounts, and that behavior matches fstatat() with the AT_NO_AUTOMOUNT flag. exec.3 Michael Kerrisk glibc 2.24 dropped CWD from the default path Document the glibc 2.24 change that dropped CWD from the default search path employed by execlp(), execvp() and execvpe() when PATH is not defined. core.5 Michael Kerrisk Add some notes on systemd and core dumps Michael Kerrisk Dumps are not produced if core_pattern is empty and core_uses_pid is 0 Michael Kerrisk [Per Böhlin] RLIMIT_CORE is not enforced when piping core dump to a program proc.5 Michael Kerrisk [Miklos Szered, Ram Pai] Correct the description of the parent mount ID for /proc/PID/mountinfo Oliver Ebert Add mmap-exclusive bit for /proc/[pid]/pagemap Marcus Folkesson Update description of /proc//oom_score Lucas Werkmeister Clarify permissions in /proc/[pid]/fd/ sysfs.5 Michael Kerrisk Add a brief explanation of /sys/kernel Michael Kerrisk Add a brief description of /sys/class/net Michael Kerrisk Add a brief description of /sys/kernel/mm Michael Kerrisk Add brief description of /sys/kernel/debug/tracing Michael Kerrisk Add a description of /sys/kernel/mm/hugepages socket.7 Michael Kerrisk [Petr Malat, Tobias Klausmann] Correct the description of SO_RXQ_OVFL user_namespaces.7 Christian Brauner [Michael Kerrisk] Document new 340 line idmap limit -- Michael Kerrisk Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ Linux/UNIX System Programming Training: http://man7.org/training/ From 1585224541098864356@xxx Mon Nov 27 13:05:30 +0000 2017 X-GM-THRID: 1585224541098864356 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread