Commit Graph

14640 Commits

Author SHA1 Message Date
Gabriel F. T. Gomes a9a3390a4e __ppc_set_ppr_very_low.3: New link to __ppc_set_ppr_med.3
Signed-off-by: Gabriel F. T. Gomes <gftg@linux.vnet.ibm.com>

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 22:07:29 +01:00
Gabriel F. T. Gomes 97ad561735 __ppc_set_ppr_med_high.3: New link to __ppc_set_ppr_med.3
Signed-off-by: Gabriel F. T. Gomes <gftg@linux.vnet.ibm.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 21:22:11 +01:00
Michael Kerrisk 42f014d3f7 __ppc_set_ppr_med.3: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 21:21:26 +01:00
Michael Kerrisk e65b3f0d2d __ppc_set_ppr_med.3: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 21:19:47 +01:00
Gabriel F. T. Gomes eb6b6909a7 __ppc_set_ppr_med.3: Document PPC functions providing access to PPR
GNU C Library commit 1747fcda4902a3b46183d93fb16ed9b436b2608b
extends the priorities that can be set to the Program Priority
Register (PPR), with the functions: __ppc_set_ppr_very_low(3)
and __ppc_set_ppr_med_high(3).

Signed-off-by: Gabriel F. T. Gomes <gftg@linux.vnet.ibm.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 21:16:38 +01:00
Michael Kerrisk d27bed925b getpriority.2: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 20:58:20 +01:00
Michael Kerrisk b17796b95f getpriority.2: wfix
Reported-by: Jonny Grant <jg@jguk.org>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 20:57:35 +01:00
Michael Kerrisk d901e32568 ptrace.2: SEE ALSO: add prctl(2)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 13:01:33 +01:00
Michael Kerrisk 4978c60601 ptrace.2: Document /proc/sys/kernel/yama/ptrace_scope
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 13:01:33 +01:00
Michael Kerrisk cf71273de1 proc.5: Add reference to ptrace(2) for /proc/sys/kernel/yama/ptrace_scope
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 13:01:33 +01:00
Michael Kerrisk b405de5281 ptrace.2: Note that PTRACE_ATTACH cannot be applied to nondumpable processes
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-08 13:01:33 +01:00
Jonathan Wakely 03ffcdae22 dirfd.3: Remove outdated NOTES
As stated in the SYNOPSIS, since glibc 2.10 this function is also
declared by the relevant X/Open and POSIX macros.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-05 10:09:57 +01:00
Michael Kerrisk 624fbe44d9 posix_fallocate.3: Clarify text relating to MT-safety
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-05 10:00:29 +01:00
Michael Kerrisk 141c1d0547 posix_fallocate.3: ffix + wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-05 10:00:29 +01:00
Carlos O'Donell a74bc4c9e4 posix_fallocate.3: Mention glibc emulation caveats
When the glibc implementation of posix_fallocate detects
that the underlying filesystem does not support fallocate()
it uses an emulation function to attempt to allocate the
space requested. The most common case is calling
posix_fallocatei() for a file that is on NFS where the
NFS server is not new enough to support the recent fallocate
extensions. This emulation has various serious caveats that
must be understood in order to use posix_fallocate robustly
on all filesystems. The change documents the caveats in the
glibc implementation.

Lastly, we expand the meaning of EINVAL to match POSIX
2013 (Issue 7). If the underlying filesystem doesn't support
posix_fallocate()i, the implementation can return EINVAL, but
glibc does not do this, it emulates the operation instead.

Signed-off-by: Carlos O'Donell <carlos@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-10-05 09:47:47 +01:00
Michael Kerrisk 422dd47fd8 getauxval.3: Add some details for AT_SECURE
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-13 11:59:48 +02:00
Michael Kerrisk 6912d54fe2 getauxval.3: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-13 11:58:25 +02:00
Michael Kerrisk b5fe4c49f7 syscalls.2: Add userfaultfd()
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-13 10:04:08 +02:00
Mike Frysinger bb6adc5828 user_namespaces.7: tfix
Signed-off-by: Mike Frysinger <vapier@gentoo.org>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-13 09:52:05 +02:00
Michael Kerrisk b4b436adfb ptrace.2: Minor tweaks to Tycho's patch
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 14:00:59 +02:00
Tycho Andersen e3cfeba2ff ptrace.2: Document PTRACE_O_SUSPEND_SECCOMP flag
Signed-off-by: Tycho Andersen <tycho.andersen@canonical.com>
CC: Kees Cook <keescook@chromium.org>
CC: Andy Lutomirski <luto@amacapital.net>
CC: Oleg Nesterov <oleg@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 14:00:31 +02:00
Eric B Munson a0742a27be mremap.2: Add note about mremap() with locked areas
When mremap() is used to move or expand a mapping that is locked
with mlock() or equivalent it will attempt to populate the new
area.  However, like mmap(MAP_LOCKED), mremap() will not fail if
the area cannot be populated.  Also like mmap(MAP_LOCKED) this
might come as a surprise to users and should be noted.

Signed-off-by: Eric B Munson <emunson@akamai.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Cc: Michal Hocko <mhocko@suse.cz>
Cc: David Rientjes <rientjes@google.com>
Cc: linux-man@vger.kernel.org
Cc: linux-mm@kvack.org
Cc: linux-kernel@vger.kernel.org
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 13:45:35 +02:00
Michael Kerrisk e8aa7100f5 proc.5: wfix + tfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 13:35:36 +02:00
Heinrich Schuchardt 84ff8c1e2d proc.5: /proc/sys: Describe whitespace characters
Suggested patch
https://lkml.org/lkml/2015/8/24/171
indicates missing documentation.

Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 13:32:26 +02:00
Michael Kerrisk 2e2b236434 proc.5: wfix + ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 13:30:05 +02:00
Michael Kerrisk 004b062d87 proc.5: Note kernel version that introduced threads-max range checks
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 13:27:41 +02:00
Heinrich Schuchardt 6fb0f56f98 proc.5: Add details for threads-max
Add detail information for threads-max.
The checks for minimum and maximum values exist since kernel 4.1.
https://lkml.org/lkml/2015/3/15/96

Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 13:16:01 +02:00
Michael Kerrisk adce1084de signal.7: Note async-signal-safe functions added by POSIX.1-2008 TC1
Reported-by: Michael Hocko <mhocko@kernel.org>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:58:55 +02:00
Michael Kerrisk 3a09fae856 getspnam.3: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:09:57 +02:00
Zeng Linggang b6c73e0bdf termios.3: srcfix: add FIXME
Signed-off-by: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:07:24 +02:00
Zeng Linggang eabb7166a9 sigpause.3: srcfix: add FIXME
Signed-off-by: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:07:02 +02:00
Zeng Linggang c32cf2684a mallinfo.3: ATTRIBUTES: Note function that is not thread-safe
The marking matches glibc marking.
The marking of functions in glibc is:
- mallinfo: MT-Unsafe init const:mallopt

Signed-off-by: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:06:44 +02:00
Zeng Linggang 557d7d9682 getspnam.3: ATTRIBUTES: Note functions that are/aren't thread-safe
After research, We think
* getspnam(),
* getspent(),
* setspent(),
* endspent(),
* getspent_r(),
* fgetspent(),
* sgetspent(),
are not thread-safe. And
* putspent(),
* getspnam_r(),
* sgetspent_r(),
* lckpwdf(),
* ulckpwdf(),
* fgetspent_r(),
are thread-safe. But, there are not
markings of them in glibc document.

Signed-off-by: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:06:23 +02:00
Zeng Linggang 1ec27c36ff fgetpwent.3: ATTRIBUTES: Note function that is not thread-safe
The marking matches glibc marking.
marking of function in glibc is:
- fgetgrent: MT-Unsafe race:fpwent

ps: We think race:fpwent in glibc maybe hard for users to understand,
and have sent a patch to the GNU libc community for changing it to
race:fgetpwent, however, something about the copyright impeded the progress.
Here we mark it "race:fgetpwent", so there is a little different.

Signed-off-by: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:06:08 +02:00
Zeng Linggang 098cd28bbf fgetgrent.3: ATTRIBUTES: Note function that is not thread-safe
The marking matches glibc marking.
marking of function in glibc is:
- fgetgrent: MT-Unsafe race:fgrent

ps: We think race:fgrent in glibc maybe hard for users to understand,
and have sent a patch to the GNU libc community for changing it to
race:fgetgrent, however, something about the copyright impeded the progress.
Here we mark it "race:fgetgrent", so there is a little different.

Signed-off-by: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 12:05:11 +02:00
Michael Kerrisk 48453bada1 tcp.7: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 11:15:31 +02:00
Michael Kerrisk 935181bb5c tcp.7: Add some version details for 'tcp_ecn' changes
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 11:15:31 +02:00
Daniel Borkmann b95e7457d2 tcp.7: Improve paragraphs on tcp_ecn and add tcp_ecn_fallback bullet
Improve description of tcp_ecn, fix the RFC number and it's
not a boolean anymore since long time, and add a description
for tcp_ecn_fallback.

See also kernel doc under Documentation/networking/ip-sysctl.txt
on tcp_ecn and tcp_ecn_fallback.

Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 10:49:13 +02:00
Jakub Wilk 0d28496a14 getent.1: ffix
Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-11 10:44:40 +02:00
Ville Skyttä 2b91715912 man-pages.7: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-05 09:02:09 +02:00
Michael Kerrisk d74503a55a seccomp.2: Note why all filters in a set are executed even after SECCOMP_RET_KILL
Reported-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-05 09:00:02 +02:00
Michael Kerrisk 755a656a49 seccomp.2: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-05 08:51:37 +02:00
Michael Kerrisk 712551eaad seccomp.2: Describe use of 'instruction_pointer' data field
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-05 08:43:31 +02:00
Michael Kerrisk 944a31e27f seccomp.2: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-09-05 08:31:14 +02:00
Tobias Stoeckmann 9933634495 setsid.2: tfix
it -> its

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-08-30 05:07:22 -07:00
Michael Kerrisk b72bd8d1c0 mallopt.3: Minor wording fixes
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-08-30 05:02:25 -07:00
Michael Kerrisk bb1ee72e6f mallopt.3: Minor tweaks to Carlos's patch
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-08-30 05:02:25 -07:00
Carlos O'Donell 9d116bd272 mallopt.3: Document M_ARENA_TEST and M_ARENA_MAX
In 2013 I brought up the discussion if M_ARENA_MAX and M_ARENA_TEST
were public parameters:
https://sourceware.org/ml/libc-alpha/2013-03/msg00376.html
Consensus among Siddhesh and myself was that they should be
public, and in fact they were already in the public header.
Therefore there may already be applications uses these constants
and expecting them to work. At best we could limit mallopt()'s
acceptance of the options, but that seems like a bad solution
that could lead to unexpected behavior for user applications.
A quick google search shows that there are packages relying on
these constants to tune the glibc malloc implementation.

Since glibc 2.10 the M_ARENA_TEST and M_ARENA_MAX features
have been part of the public interface with
--enable-experimental-malloc.

Since glibc 2.15 the experimental allocator has been on by default
and M_ARENA_TEST and M_ARENA_MAX have been more broadly used.

There are environment variables, without trailing underscore, that
can also be used to adjust these values at runtime i.e.
MALLOC_ARENA_MAX, and MALLOC_ARENA_TEST.

This change describes these two options in the mallopt(3) man page
along with their environment variables.

Tested with glibc master on x86_64 to verify it works as expected.

Signed-off-by: Carlos O'Donell <carlos@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-08-30 03:09:38 -07:00
Michael Kerrisk 3f81631283 signalfd.2: Describe semantics with respect to SCM_RIGHTS
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-08-19 14:19:56 -07:00
Michael Kerrisk 15fb5d0374 open.2: Remove accidental mention of O_TTY_INIT
An earlier edit mentioned O_TTY_INIT as a file creation flag.
That's true, according POSIX, but Linux does not implement
this flag, so remove mention of it.

Reported-by: David Drysdale <drysdale@google.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2015-08-14 18:04:52 +02:00