text
stringlengths 0
234
|
---|
(cast as |
.ir "unsigned int" ). |
.ip |
the |
.i arg2 |
(key id) |
and |
.i arg5 |
(keyring id) |
are interpreted as for |
.br keyctl_instantiate . |
.ip |
this operation is exposed by |
.i libkeyutils |
via the function |
.br keyctl_instantiate_iov (3). |
.tp |
.br keyctl_invalidate " (since linux 3.5)" |
.\" commit fd75815f727f157a05f4c96b5294a4617c0557da |
mark a key as invalid. |
.ip |
the id of the key to be invalidated is specified in |
.i arg2 |
(cast to |
.ir key_serial_t ). |
.ip |
to invalidate a key, |
the caller must have |
.i search |
permission on the key. |
.\" cap_sys_admin is permitted to invalidate certain special keys |
.ip |
this operation marks the key as invalid |
and schedules immediate garbage collection. |
the garbage collector removes the invalidated key from all keyrings and |
deletes the key when its reference count reaches zero. |
after this operation, |
the key will be ignored by all searches, |
even if it is not yet deleted. |
.ip |
keys that are marked invalid become invisible to normal key operations |
immediately, though they are still visible in |
.i /proc/keys |
(marked with an 'i' flag) |
until they are actually removed. |
.ip |
the arguments |
.ir arg3 , |
.ir arg4 , |
and |
.ir arg5 |
are ignored. |
.ip |
this operation is exposed by |
.i libkeyutils |
via the function |
.br keyctl_invalidate (3). |
.tp |
.br keyctl_get_persistent " (since linux 3.13)" |
.\" commit f36f8c75ae2e7d4da34f4c908cebdb4aa42c977e |
get the persistent keyring |
.rb ( persistent\-keyring (7)) |
for a specified user and link it to a specified keyring. |
.ip |
the user id is specified in |
.i arg2 |
(cast to |
.ir uid_t ). |
if the value \-1 is specified, the caller's real user id is used. |
the id of the destination keyring is specified in |
.i arg3 |
(cast to |
.ir key_serial_t ). |
.ip |
the caller must have the |
.br cap_setuid |
capability in its user namespace in order to fetch the persistent keyring |
for a user id that does not match either the real or effective user id |
of the caller. |
.ip |
if the call is successful, |
a link to the persistent keyring is added to the keyring |
whose id was specified in |
.ir arg3 . |
.ip |
the caller must have |
.i write |
permission on the keyring. |
.ip |
the persistent keyring will be created by the kernel |
if it does not yet exist. |
.ip |
each time the |
.b keyctl_get_persistent |
operation is performed, the persistent keyring will |
have its expiration timeout reset to the value in: |
.ip |
.in +4n |
.ex |
/proc/sys/kernel/keys/persistent_keyring_expiry |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.