2016-11-01 15:44:43 +00:00
|
|
|
.\" Copyright (C) 2014 Red Hat, Inc. All Rights Reserved.
|
|
|
|
.\" Written by David Howells (dhowells@redhat.com)
|
|
|
|
.\"
|
2016-11-02 11:24:22 +00:00
|
|
|
.\" %%%LICENSE_START(GPLv2+_SW_ONEPARA)
|
2016-11-01 15:44:43 +00:00
|
|
|
.\" This program is free software; you can redistribute it and/or
|
2016-11-08 08:24:22 +00:00
|
|
|
.\" modify it under the terms of the GNU General Public License
|
2016-11-01 15:44:43 +00:00
|
|
|
.\" as published by the Free Software Foundation; either version
|
2016-11-08 08:24:22 +00:00
|
|
|
.\" 2 of the License, or (at your option) any later version.
|
2016-11-02 11:24:22 +00:00
|
|
|
.\" %%%LICENSE_END
|
2016-11-01 15:44:43 +00:00
|
|
|
.\"
|
2019-09-27 12:04:48 +00:00
|
|
|
.TH PROCESS-KEYRING 7 2017-03-13 Linux "Linux Programmer's Manual"
|
2016-11-01 15:44:43 +00:00
|
|
|
.SH NAME
|
2016-11-01 17:26:22 +00:00
|
|
|
process-keyring \- per-process shared keyring
|
2016-11-01 15:44:43 +00:00
|
|
|
.SH DESCRIPTION
|
2016-11-01 18:08:09 +00:00
|
|
|
The process keyring is a keyring used to anchor keys on behalf of a process.
|
2016-11-01 20:58:07 +00:00
|
|
|
It is created only when a process requests it.
|
2016-11-07 21:49:19 +00:00
|
|
|
The process keyring has the name (description)
|
|
|
|
.IR _pid .
|
add_key.2, bpf.2, fcntl.2, futex.2, listxattr.2, perf_event_open.2, prctl.2, request_key.2, sigaltstack.2, __ppc_set_ppr_med.3, __ppc_yield.3, getw.3, setbuf.3, setjmp.3, lirc.4, core.5, securetty.5, inode.7, keyrings.7, process-keyring.7, user-keyring.7, ld.so.8: srcfix: use .PP instead of .P
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-08-17 23:13:44 +00:00
|
|
|
.PP
|
2016-11-01 18:08:09 +00:00
|
|
|
A special serial number value,
|
|
|
|
.BR KEY_SPEC_PROCESS_KEYRING ,
|
2016-11-02 11:47:05 +00:00
|
|
|
is defined that can be used in lieu of the actual serial number of
|
|
|
|
the calling process's process keyring.
|
aio.7, arp.7, attributes.7, boot.7, cgroups.7, cpuset.7, credentials.7, fanotify.7, fifo.7, glob.7, hier.7, hostname.7, icmp.7, inode.7, inotify.7, keyrings.7, libc.7, mailaddr.7, mount_namespaces.7, mq_overview.7, nptl.7, numa.7, path_resolution.7, persistent-keyring.7, pid_namespaces.7, pipe.7, pkeys.7, process-keyring.7, pthreads.7, pty.7, random.7, sched.7, sem_overview.7, session-keyring.7, shm_overview.7, signal-safety.7, signal.7, spufs.7, standards.7, symlink.7, termio.7, thread-keyring.7, time.7, unicode.7, user-keyring.7, user-session-keyring.7, user_namespaces.7, utf-8.7, xattr.7: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-08-17 22:59:04 +00:00
|
|
|
.PP
|
2016-11-02 11:47:05 +00:00
|
|
|
From the
|
|
|
|
.BR keyctl (1)
|
|
|
|
utility, '\fB@p\fP' can be used instead of a numeric key ID in
|
|
|
|
much the same way, but since
|
|
|
|
.BR keyctl (1)
|
|
|
|
is a program run after forking, this is of no utility.
|
aio.7, arp.7, attributes.7, boot.7, cgroups.7, cpuset.7, credentials.7, fanotify.7, fifo.7, glob.7, hier.7, hostname.7, icmp.7, inode.7, inotify.7, keyrings.7, libc.7, mailaddr.7, mount_namespaces.7, mq_overview.7, nptl.7, numa.7, path_resolution.7, persistent-keyring.7, pid_namespaces.7, pipe.7, pkeys.7, process-keyring.7, pthreads.7, pty.7, random.7, sched.7, sem_overview.7, session-keyring.7, shm_overview.7, signal-safety.7, signal.7, spufs.7, standards.7, symlink.7, termio.7, thread-keyring.7, time.7, unicode.7, user-keyring.7, user-session-keyring.7, user_namespaces.7, utf-8.7, xattr.7: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-08-17 22:59:04 +00:00
|
|
|
.PP
|
2016-11-02 11:47:05 +00:00
|
|
|
A thread created using the
|
2016-11-01 18:08:09 +00:00
|
|
|
.BR clone (2)
|
|
|
|
.B CLONE_THREAD
|
2016-11-02 11:47:05 +00:00
|
|
|
flag has the same process keyring as the caller of
|
|
|
|
.BR clone (2).
|
|
|
|
When a new process is created using
|
|
|
|
.BR fork ()
|
|
|
|
it initially has no process keyring.
|
|
|
|
A process's process keyring is cleared on
|
2016-11-01 18:08:09 +00:00
|
|
|
.BR execve (2).
|
2016-11-02 11:47:05 +00:00
|
|
|
The process keyring is destroyed when the last
|
|
|
|
thread that refers to it terminates.
|
aio.7, arp.7, attributes.7, boot.7, cgroups.7, cpuset.7, credentials.7, fanotify.7, fifo.7, glob.7, hier.7, hostname.7, icmp.7, inode.7, inotify.7, keyrings.7, libc.7, mailaddr.7, mount_namespaces.7, mq_overview.7, nptl.7, numa.7, path_resolution.7, persistent-keyring.7, pid_namespaces.7, pipe.7, pkeys.7, process-keyring.7, pthreads.7, pty.7, random.7, sched.7, sem_overview.7, session-keyring.7, shm_overview.7, signal-safety.7, signal.7, spufs.7, standards.7, symlink.7, termio.7, thread-keyring.7, time.7, unicode.7, user-keyring.7, user-session-keyring.7, user_namespaces.7, utf-8.7, xattr.7: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-08-17 22:59:04 +00:00
|
|
|
.PP
|
2016-11-02 11:47:05 +00:00
|
|
|
If a process doesn't have a process keyring when it is accessed,
|
|
|
|
then the process keyring will be created if the keyring is to be modified;
|
|
|
|
otherwise, the error
|
2016-11-01 18:08:09 +00:00
|
|
|
.B ENOKEY
|
2016-11-02 11:47:05 +00:00
|
|
|
results.
|
2016-11-01 15:44:43 +00:00
|
|
|
.SH SEE ALSO
|
2016-11-01 17:12:21 +00:00
|
|
|
.ad l
|
|
|
|
.nh
|
2016-11-01 15:44:43 +00:00
|
|
|
.BR keyctl (1),
|
|
|
|
.BR keyctl (3),
|
|
|
|
.BR keyrings (7),
|
2016-11-01 17:12:21 +00:00
|
|
|
.BR persistent\-keyring (7),
|
|
|
|
.BR session\-keyring (7),
|
|
|
|
.BR thread\-keyring (7),
|
|
|
|
.BR user\-keyring (7),
|
|
|
|
.BR user\-session\-keyring (7)
|