text
stringlengths
0
234
(cast as
.ir "unsigned int" ).
.ip
the
.i arg2
(key id)
and
.i arg5
(keyring id)
are interpreted as for
.br keyctl_instantiate .
.ip
this operation is exposed by
.i libkeyutils
via the function
.br keyctl_instantiate_iov (3).
.tp
.br keyctl_invalidate " (since linux 3.5)"
.\" commit fd75815f727f157a05f4c96b5294a4617c0557da
mark a key as invalid.
.ip
the id of the key to be invalidated is specified in
.i arg2
(cast to
.ir key_serial_t ).
.ip
to invalidate a key,
the caller must have
.i search
permission on the key.
.\" cap_sys_admin is permitted to invalidate certain special keys
.ip
this operation marks the key as invalid
and schedules immediate garbage collection.
the garbage collector removes the invalidated key from all keyrings and
deletes the key when its reference count reaches zero.
after this operation,
the key will be ignored by all searches,
even if it is not yet deleted.
.ip
keys that are marked invalid become invisible to normal key operations
immediately, though they are still visible in
.i /proc/keys
(marked with an 'i' flag)
until they are actually removed.
.ip
the arguments
.ir arg3 ,
.ir arg4 ,
and
.ir arg5
are ignored.
.ip
this operation is exposed by
.i libkeyutils
via the function
.br keyctl_invalidate (3).
.tp
.br keyctl_get_persistent " (since linux 3.13)"
.\" commit f36f8c75ae2e7d4da34f4c908cebdb4aa42c977e
get the persistent keyring
.rb ( persistent\-keyring (7))
for a specified user and link it to a specified keyring.
.ip
the user id is specified in
.i arg2
(cast to
.ir uid_t ).
if the value \-1 is specified, the caller's real user id is used.
the id of the destination keyring is specified in
.i arg3
(cast to
.ir key_serial_t ).
.ip
the caller must have the
.br cap_setuid
capability in its user namespace in order to fetch the persistent keyring
for a user id that does not match either the real or effective user id
of the caller.
.ip
if the call is successful,
a link to the persistent keyring is added to the keyring
whose id was specified in
.ir arg3 .
.ip
the caller must have
.i write
permission on the keyring.
.ip
the persistent keyring will be created by the kernel
if it does not yet exist.
.ip
each time the
.b keyctl_get_persistent
operation is performed, the persistent keyring will
have its expiration timeout reset to the value in:
.ip
.in +4n
.ex
/proc/sys/kernel/keys/persistent_keyring_expiry