add_key.2, bpf.2, fcntl.2, futex.2, listxattr.2, perf_event_open.2, prctl.2, request_key.2, sigaltstack.2, __ppc_set_ppr_med.3, __ppc_yield.3, getw.3, setbuf.3, setjmp.3, lirc.4, core.5, securetty.5, inode.7, keyrings.7, process-keyring.7, user-keyring.7, ld.so.8: srcfix: use .PP instead of .P

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2017-08-18 01:13:44 +02:00
parent dd3568a147
commit 11ac5b5109
22 changed files with 88 additions and 88 deletions

View File

@ -36,10 +36,10 @@ of length
attaches it to the nominated attaches it to the nominated
.IR keyring , .IR keyring ,
and returns the key's serial number. and returns the key's serial number.
.P .PP
The key may be rejected if the provided data is in the wrong format or The key may be rejected if the provided data is in the wrong format or
it is invalid in some other way. it is invalid in some other way.
.P .PP
If the destination If the destination
.I keyring .I keyring
already contains a key that matches the specified already contains a key that matches the specified
@ -57,7 +57,7 @@ and it will displace the link to the extant key from the keyring.
.\" is consequently unlinked, then keys that it was anchoring .\" is consequently unlinked, then keys that it was anchoring
.\" will have their reference count decreased by one (and may .\" will have their reference count decreased by one (and may
.\" consequently be garbage collected). Is this all correct? .\" consequently be garbage collected). Is this all correct?
.P .PP
The destination The destination
.I keyring .I keyring
serial number may be that of a valid keyring for which the caller has serial number may be that of a valid keyring for which the caller has

View File

@ -41,7 +41,7 @@ the original ("classic") BPF (cBPF) used to filter network packets.
For both cBPF and eBPF programs, For both cBPF and eBPF programs,
the kernel statically analyzes the programs before loading them, the kernel statically analyzes the programs before loading them,
in order to ensure that they cannot harm the running system. in order to ensure that they cannot harm the running system.
.P .PP
eBPF extends cBPF in multiple ways, including the ability to call eBPF extends cBPF in multiple ways, including the ability to call
a fixed set of in-kernel helper functions a fixed set of in-kernel helper functions
.\" See 'enum bpf_func_id' in include/uapi/linux/bpf.h .\" See 'enum bpf_func_id' in include/uapi/linux/bpf.h
@ -79,7 +79,7 @@ If a map lookup fails, the current program continues its execution.
See See
.B BPF_MAP_TYPE_PROG_ARRAY .B BPF_MAP_TYPE_PROG_ARRAY
below for further details. below for further details.
.P .PP
Generally, eBPF programs are loaded by the user process and automatically Generally, eBPF programs are loaded by the user process and automatically
unloaded when the process exits. unloaded when the process exits.
In some cases, for example, In some cases, for example,

View File

@ -403,7 +403,7 @@ If the conflicting lock is an open file description lock, then
is set to \-1. is set to \-1.
Note that the returned information Note that the returned information
may already be out of date by the time the caller inspects it. may already be out of date by the time the caller inspects it.
.P .PP
In order to place a read lock, In order to place a read lock,
.I fd .I fd
must be open for reading. must be open for reading.
@ -438,12 +438,12 @@ deadlock-detection algorithm; see BUGS.
As well as being removed by an explicit As well as being removed by an explicit
.BR F_UNLCK , .BR F_UNLCK ,
record locks are automatically released when the process terminates. record locks are automatically released when the process terminates.
.P .PP
Record locks are not inherited by a child created via Record locks are not inherited by a child created via
.BR fork (2), .BR fork (2),
but are preserved across an but are preserved across an
.BR execve (2). .BR execve (2).
.P .PP
Because of the buffering performed by the Because of the buffering performed by the
.BR stdio (3) .BR stdio (3)
library, the use of record locking with routines in that package library, the use of record locking with routines in that package
@ -1064,7 +1064,7 @@ other open file descriptors for the file.
.B F_UNLCK .B F_UNLCK
Remove our lease from the file. Remove our lease from the file.
.RE .RE
.P .PP
Leases are associated with an open file description (see Leases are associated with an open file description (see
.BR open (2)). .BR open (2)).
This means that duplicate file descriptors (created by, for example, This means that duplicate file descriptors (created by, for example,
@ -1077,7 +1077,7 @@ Furthermore, the lease is released by either an explicit
.B F_UNLCK .B F_UNLCK
operation on any of these duplicate file descriptors, or when all operation on any of these duplicate file descriptors, or when all
such file descriptors have been closed. such file descriptors have been closed.
.P .PP
Leases may be taken out only on regular files. Leases may be taken out only on regular files.
An unprivileged process may take out a lease only on a file whose An unprivileged process may take out a lease only on a file whose
UID (owner) matches the filesystem UID of the process. UID (owner) matches the filesystem UID of the process.

View File

@ -984,7 +984,7 @@ Additionally,
(or the error (or the error
.B EINVAL .B EINVAL
results). results).
.P .PP
The PI futex operations are as follows: The PI futex operations are as follows:
.\" .\"
.\"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" .\""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""

View File

@ -114,7 +114,7 @@ user.name1\\0system.name1\\0user.name2\\0
.fi .fi
.RE .RE
.fam T .fam T
.P .PP
Filesystems that implement POSIX ACLs using Filesystems that implement POSIX ACLs using
extended attributes might return a extended attributes might return a
.I list .I list

View File

@ -74,7 +74,7 @@ event periodically writes measurements to a buffer that can then
be accessed via be accessed via
.BR mmap (2). .BR mmap (2).
.SS Arguments .SS Arguments
.P .PP
The The
.I pid .I pid
and and
@ -105,7 +105,7 @@ value of less than 1.
.TP .TP
.BR "pid == \-1" " and " "cpu == \-1" .BR "pid == \-1" " and " "cpu == \-1"
This setting is invalid and will return an error. This setting is invalid and will return an error.
.P .PP
When When
.I pid .I pid
is greater than zero, permission to perform this system call is greater than zero, permission to perform this system call
@ -135,7 +135,7 @@ This means that the values of the member events can be
meaningfully compared\(emadded, divided (to get ratios), and so on\(emwith each meaningfully compared\(emadded, divided (to get ratios), and so on\(emwith each
other, since they have counted events for the same set of executed other, since they have counted events for the same set of executed
instructions. instructions.
.P .PP
The The
.I flags .I flags
argument is formed by ORing together zero or more of the following values: argument is formed by ORing together zero or more of the following values:
@ -194,7 +194,7 @@ must be passed as the
parameter. parameter.
cgroup monitoring is available only cgroup monitoring is available only
for system-wide events and may therefore require extra permissions. for system-wide events and may therefore require extra permissions.
.P .PP
The The
.I perf_event_attr .I perf_event_attr
structure provides detailed configuration information structure provides detailed configuration information
@ -546,7 +546,7 @@ value use the following equation:
(perf_hw_cache_id) | (perf_hw_cache_op_id << 8) | (perf_hw_cache_id) | (perf_hw_cache_op_id << 8) |
(perf_hw_cache_op_result_id << 16) (perf_hw_cache_op_result_id << 16)
.fi .fi
.P .PP
where where
.I perf_hw_cache_id .I perf_hw_cache_id
is one of: is one of:
@ -574,7 +574,7 @@ for measuring the branch prediction unit
.\" commit 89d6c0b5bdbb1927775584dcf532d98b3efe1477 .\" commit 89d6c0b5bdbb1927775584dcf532d98b3efe1477
for measuring local memory accesses for measuring local memory accesses
.RE .RE
.P .PP
and and
.I perf_hw_cache_op_id .I perf_hw_cache_op_id
is one of: is one of:
@ -589,7 +589,7 @@ for write accesses
.B PERF_COUNT_HW_CACHE_OP_PREFETCH .B PERF_COUNT_HW_CACHE_OP_PREFETCH
for prefetch accesses for prefetch accesses
.RE .RE
.P .PP
and and
.I perf_hw_cache_op_result_id .I perf_hw_cache_op_result_id
is one of: is one of:
@ -1248,7 +1248,7 @@ Branch target is in hypervisor.
.TP .TP
.B PERF_SAMPLE_BRANCH_PLM_ALL .B PERF_SAMPLE_BRANCH_PLM_ALL
A convenience value that is the three preceding values ORed together. A convenience value that is the three preceding values ORed together.
.P .PP
In addition to the privilege value, at least one or more of the In addition to the privilege value, at least one or more of the
following bits must be set. following bits must be set.
.TP .TP
@ -2192,7 +2192,7 @@ The branch was in an aborted transactional memory transaction.
.\" commit 71ef3c6b9d4665ee7afbbe4c208a98917dcfc32f .\" commit 71ef3c6b9d4665ee7afbbe4c208a98917dcfc32f
This reports the number of cycles elapsed since the This reports the number of cycles elapsed since the
previous branch stack update. previous branch stack update.
.P .PP
The entries are from most to least recent, so the first entry The entries are from most to least recent, so the first entry
has the most recent branch. has the most recent branch.
.PP .PP

View File

@ -596,7 +596,7 @@ value.
The requirements for the address are the same as for the The requirements for the address are the same as for the
.BR PR_SET_MM_START_BRK .BR PR_SET_MM_START_BRK
option. option.
.P .PP
The following options are available since Linux 3.5. The following options are available since Linux 3.5.
.\" commit fe8c7f5cbf91124987106faa3bdf0c8b955c4cf7 .\" commit fe8c7f5cbf91124987106faa3bdf0c8b955c4cf7
.TP .TP
@ -658,7 +658,7 @@ in a process life time.
Any further attempts will be rejected. Any further attempts will be rejected.
This should help system administrators monitor unusual This should help system administrators monitor unusual
symbolic-link transitions over all processes running on a system. symbolic-link transitions over all processes running on a system.
.P .PP
The following options are available since Linux 3.18. The following options are available since Linux 3.18.
.\" commit f606b77f1a9e362451aca8f81d8f36a3a112139e .\" commit f606b77f1a9e362451aca8f81d8f36a3a112139e
.TP .TP

View File

@ -41,7 +41,7 @@ first recursively searches for a matching key in all of the keyrings
attached to the calling process. attached to the calling process.
The keyrings are searched in the order: thread-specific keyring, The keyrings are searched in the order: thread-specific keyring,
process-specific keyring, and then session keyring. process-specific keyring, and then session keyring.
.P .PP
If If
.BR request_key () .BR request_key ()
is called from a program invoked by is called from a program invoked by
@ -53,7 +53,7 @@ supplementary group IDs, and security context to determine access.
.\" David Howells: we can then have an arbitrarily long sequence .\" David Howells: we can then have an arbitrarily long sequence
.\" of "recursive" request-key upcalls. There is no limit, other .\" of "recursive" request-key upcalls. There is no limit, other
.\" than number of PIDs, etc. .\" than number of PIDs, etc.
.P .PP
The search of the keyring tree is breadth-first: The search of the keyring tree is breadth-first:
the keys in each keyring searched are checked for a match before any child the keys in each keyring searched are checked for a match before any child
keyrings are recursed into. keyrings are recursed into.
@ -62,7 +62,7 @@ Only keys for which the caller has
permission be found, and only keyrings for which the caller has permission be found, and only keyrings for which the caller has
.I search .I search
permission may be searched. permission may be searched.
.P .PP
If the key is not found and If the key is not found and
.I callout .I callout
is NULL, then the call fails with the error is NULL, then the call fails with the error
@ -342,7 +342,7 @@ At this point, the
.BR request_key () .BR request_key ()
call completes, and the requesting program can continue execution. call completes, and the requesting program can continue execution.
.RE .RE
.P .PP
If these steps are unsuccessful, then an If these steps are unsuccessful, then an
.BR ENOKEY .BR ENOKEY
error will be returned to the caller of error will be returned to the caller of

View File

@ -77,7 +77,7 @@ When establishing a signal handler using
inform the system that the signal handler should be executed inform the system that the signal handler should be executed
on the alternate signal stack by on the alternate signal stack by
specifying the \fBSA_ONSTACK\fP flag. specifying the \fBSA_ONSTACK\fP flag.
.P .PP
The \fIss\fP argument is used to specify a new The \fIss\fP argument is used to specify a new
alternate signal stack, while the \fIold_ss\fP argument alternate signal stack, while the \fIold_ss\fP argument
is used to retrieve information about the currently is used to retrieve information about the currently
@ -192,7 +192,7 @@ normal process stack is exhausted: in this case, a signal handler for
.B SIGSEGV .B SIGSEGV
cannot be invoked on the process stack; if we wish to handle it, cannot be invoked on the process stack; if we wish to handle it,
we must use an alternate signal stack. we must use an alternate signal stack.
.P .PP
Establishing an alternate signal stack is useful if a process Establishing an alternate signal stack is useful if a process
expects that it may exhaust its standard stack. expects that it may exhaust its standard stack.
This may occur, for example, because the stack grows so large This may occur, for example, because the stack grows so large
@ -202,13 +202,13 @@ If the standard stack is exhausted, the kernel sends
the process a \fBSIGSEGV\fP signal. the process a \fBSIGSEGV\fP signal.
In these circumstances the only way to catch this signal is In these circumstances the only way to catch this signal is
on an alternate signal stack. on an alternate signal stack.
.P .PP
On most hardware architectures supported by Linux, stacks grow On most hardware architectures supported by Linux, stacks grow
downward. downward.
.BR sigaltstack () .BR sigaltstack ()
automatically takes account automatically takes account
of the direction of stack growth. of the direction of stack growth.
.P .PP
Functions called from a signal handler executing on an alternate Functions called from a signal handler executing on an alternate
signal stack will also use the alternate signal stack. signal stack will also use the alternate signal stack.
(This also applies to any handlers invoked for other signals while (This also applies to any handlers invoked for other signals while
@ -217,7 +217,7 @@ Unlike the standard stack, the system does not
automatically extend the alternate signal stack. automatically extend the alternate signal stack.
Exceeding the allocated size of the alternate signal stack will Exceeding the allocated size of the alternate signal stack will
lead to unpredictable results. lead to unpredictable results.
.P .PP
A successful call to A successful call to
.BR execve (2) .BR execve (2)
removes any existing alternate removes any existing alternate
@ -225,7 +225,7 @@ signal stack.
A child process created via A child process created via
.BR fork (2) .BR fork (2)
inherits a copy of its parent's alternate signal stack settings. inherits a copy of its parent's alternate signal stack settings.
.P .PP
.BR sigaltstack () .BR sigaltstack ()
supersedes the older supersedes the older
.BR sigstack () .BR sigstack ()

View File

@ -43,7 +43,7 @@ Set the Program Priority Register
These functions provide access to the These functions provide access to the
.I Program Priority Register .I Program Priority Register
(PPR) on the Power architecture. (PPR) on the Power architecture.
.P .PP
The PPR is a 64-bit register that controls the program's priority. The PPR is a 64-bit register that controls the program's priority.
By adjusting the PPR value the programmer may improve system By adjusting the PPR value the programmer may improve system
throughput by causing system resources to be used more throughput by causing system resources to be used more
@ -66,7 +66,7 @@ sets the Program Priority Register value to
.BR __ppc_set_ppr_med_low () .BR __ppc_set_ppr_med_low ()
sets the Program Priority Register value to sets the Program Priority Register value to
.IR "medium low" . .IR "medium low" .
.P .PP
The privileged state The privileged state
.IR "medium high" .IR "medium high"
may also be set during certain time intervals by problem-state (unprivileged) may also be set during certain time intervals by problem-state (unprivileged)
@ -75,7 +75,7 @@ programs, with the following function:
.BR __ppc_set_ppr_med_high () .BR __ppc_set_ppr_med_high ()
sets the Program Priority to sets the Program Priority to
.IR "medium high" . .IR "medium high" .
.P .PP
If the program priority is medium high when the time interval expires or if an If the program priority is medium high when the time interval expires or if an
attempt is made to set the priority to medium high when it is not allowed, the attempt is made to set the priority to medium high when it is not allowed, the
priority is set to medium. priority is set to medium.

View File

@ -41,18 +41,18 @@ provide hints about the usage of resources that are shared with other
processors on the Power architecture. processors on the Power architecture.
They can be used, for example, if a program waiting on a lock intends They can be used, for example, if a program waiting on a lock intends
to divert the shared resources to be used by other processors. to divert the shared resources to be used by other processors.
.P .PP
.BR __ppc_yield () .BR __ppc_yield ()
provides a hint that performance will probably be improved if shared provides a hint that performance will probably be improved if shared
resources dedicated to the executing processor are released for use by resources dedicated to the executing processor are released for use by
other processors. other processors.
.P .PP
.BR __ppc_mdoio () .BR __ppc_mdoio ()
provides a hint that performance will probably be improved if shared provides a hint that performance will probably be improved if shared
resources dedicated to the executing processor are released until all resources dedicated to the executing processor are released until all
outstanding storage accesses to caching-inhibited storage have been outstanding storage accesses to caching-inhibited storage have been
completed. completed.
.P .PP
.BR __ppc_mdoom () .BR __ppc_mdoom ()
provides a hint that performance will probably be improved if shared provides a hint that performance will probably be improved if shared
resources dedicated to the executing processor are released until all resources dedicated to the executing processor are released until all

View File

@ -62,7 +62,7 @@ It's provided for compatibility with SVr4.
We recommend you use We recommend you use
.BR fread (3) .BR fread (3)
instead. instead.
.P .PP
.BR putw () .BR putw ()
writes the word \fIw\fP (that is, writes the word \fIw\fP (that is,
an \fIint\fP) to \fIstream\fP. an \fIint\fP) to \fIstream\fP.

View File

@ -194,7 +194,7 @@ functions conform to C89 and C99.
.\" On 4.2BSD and 4.3BSD systems, .\" On 4.2BSD and 4.3BSD systems,
.\" .BR setbuf () .\" .BR setbuf ()
.\" always uses a suboptimal buffer size and should be avoided. .\" always uses a suboptimal buffer size and should be avoided.
.P .PP
You must make sure that the space that You must make sure that the space that
.I buf .I buf
points to still exists by the time points to still exists by the time

View File

@ -235,7 +235,7 @@ and
.IP \(bu .IP \(bu
they are not declared as they are not declared as
.IR volatile . .IR volatile .
.P .PP
Analogous remarks apply for Analogous remarks apply for
.BR siglongjmp (). .BR siglongjmp ().
.\" .\"

View File

@ -24,14 +24,14 @@
.SH NAME .SH NAME
lirc \- lirc devices lirc \- lirc devices
.SH DESCRIPTION .SH DESCRIPTION
.P .PP
The The
.B /dev/lirc* .B /dev/lirc*
character devices provide a low-level character devices provide a low-level
bi-directional interface to infra-red (IR) remotes. bi-directional interface to infra-red (IR) remotes.
When receiving data, the driver works in two different modes depending When receiving data, the driver works in two different modes depending
on the underlying hardware. on the underlying hardware.
.P .PP
Some hardware (typically TV-cards) decodes the IR signal internally Some hardware (typically TV-cards) decodes the IR signal internally
and just provides decoded button presses as integer values. and just provides decoded button presses as integer values.
Drivers for this kind of hardware work in Drivers for this kind of hardware work in
@ -40,7 +40,7 @@ mode.
Such hardware usually does not support sending IR signals. Such hardware usually does not support sending IR signals.
Furthermore, it usually only works with a specific remote which is Furthermore, it usually only works with a specific remote which is
bundled with, for example, a TV-card. bundled with, for example, a TV-card.
.P .PP
Other hardware provides a stream of pulse/space durations. Other hardware provides a stream of pulse/space durations.
Such drivers work in Such drivers work in
.BR LIRC_MODE_MODE2 .BR LIRC_MODE_MODE2
@ -48,12 +48,12 @@ mode.
Sometimes, this kind of hardware also supports Sometimes, this kind of hardware also supports
sending IR data. sending IR data.
Such hardware can be used with (almost) any kind of remote. Such hardware can be used with (almost) any kind of remote.
.P .PP
The \fBLIRC_GET_REC_MODE\fR ioctl (see below) allows probing for the The \fBLIRC_GET_REC_MODE\fR ioctl (see below) allows probing for the
mode. mode.
.\" .\"
.SS Reading input with the LIRC_MODE_MODE2 drivers .SS Reading input with the LIRC_MODE_MODE2 drivers
.P .PP
In the \fBLIRC_MODE_MODE2 mode\fR, the data returned by In the \fBLIRC_MODE_MODE2 mode\fR, the data returned by
.BR read (2) .BR read (2)
provides 32-bit values representing a space or a pulse duration, by provides 32-bit values representing a space or a pulse duration, by
@ -81,7 +81,7 @@ ioctl.
.SS Reading input with the .SS Reading input with the
.B LIRC_MODE_LIRCCODE .B LIRC_MODE_LIRCCODE
drivers drivers
.P .PP
In the \fBLIRC_MODE_LIRCCODE\fR In the \fBLIRC_MODE_LIRCCODE\fR
mode, the data returned by mode, the data returned by
.BR read (2) .BR read (2)
@ -93,7 +93,7 @@ the bit count returned by the \fBLIRC_GET_LENGTH\fR ioctl, rounded
up so it matches full bytes. up so it matches full bytes.
.\" .\"
.SS Sending data .SS Sending data
.P .PP
When sending data, only the \fBLIRC_MODE_PULSE\fR When sending data, only the \fBLIRC_MODE_PULSE\fR
mode is supported. mode is supported.
The data written to the character device using The data written to the character device using
@ -112,30 +112,30 @@ call fails with the error
.BR EINVAL .BR EINVAL
.\" .\"
.SH IOCTL COMMANDS .SH IOCTL COMMANDS
.P .PP
The complete list of ioctl commands is maintained in the kernel The complete list of ioctl commands is maintained in the kernel
documentation, see SEE ALSO. documentation, see SEE ALSO.
The ioctl commands presented here is a subset of the kernel The ioctl commands presented here is a subset of the kernel
documentation. documentation.
.P .PP
The LIRC device's ioctl definition is bound by the ioctl function The LIRC device's ioctl definition is bound by the ioctl function
definition of struct file_operations, leaving us with an unsigned definition of struct file_operations, leaving us with an unsigned
int for the ioctl command and an unsigned long for the argument. int for the ioctl command and an unsigned long for the argument.
For the purposes of ioctl portability across 32-bit and 64-bit architectures, For the purposes of ioctl portability across 32-bit and 64-bit architectures,
these values are capped to their 32-bit sizes. these values are capped to their 32-bit sizes.
.P .PP
.nf .nf
#include <lirc/include/media/lirc.h> /* But see BUGS */ #include <lirc/include/media/lirc.h> /* But see BUGS */
int ioctl(int fd, int cmd, ...); int ioctl(int fd, int cmd, ...);
.fi .fi
.P .PP
The following ioctls can be used to probe or change specific lirc The following ioctls can be used to probe or change specific lirc
hardware settings. hardware settings.
Many require a third argument, usually an Many require a third argument, usually an
.IR int . .IR int .
referred to below as referred to below as
.IR val . .IR val .
.P .PP
In general, each driver should have a default set of settings. In general, each driver should have a default set of settings.
The driver implementation is expected to re-apply the default settings The driver implementation is expected to re-apply the default settings
when the device is closed by user space, so that every application when the device is closed by user space, so that every application
@ -143,7 +143,7 @@ opening the device can rely on working with the default settings
initially. initially.
.\" .\"
.SS Always Supported Commands .SS Always Supported Commands
.P .PP
\fI/dev/lirc*\fR devices always support the following commands: \fI/dev/lirc*\fR devices always support the following commands:
.TP 4 .TP 4
.BR LIRC_GET_FEATURES " (\fIvoid\fP)" .BR LIRC_GET_FEATURES " (\fIvoid\fP)"
@ -165,13 +165,13 @@ The driver returns a sequence of pulse/space durations.
The driver returns integer values, each of which represents a decoded The driver returns integer values, each of which represents a decoded
button press. button press.
.RE .RE
.P .PP
If a device returns an error code for If a device returns an error code for
.BR LIRC_GET_REC_MODE , .BR LIRC_GET_REC_MODE ,
it is safe to assume it is not a lirc device. it is safe to assume it is not a lirc device.
.\" .\"
.SS Optional Commands .SS Optional Commands
.P .PP
Some lirc devices support commands listed below. Some lirc devices support commands listed below.
Unless otherwise stated, these fail with the error \fBENOIOCTLCMD\fR Unless otherwise stated, these fail with the error \fBENOIOCTLCMD\fR
or with the error \fBENOSYS\fR if the operation or with the error \fBENOSYS\fR if the operation
@ -371,7 +371,7 @@ This can be used by supporting hardware to give visual user
feedback, for example by flashing an LED. feedback, for example by flashing an LED.
.\" .\"
.SH FEATURES .SH FEATURES
.P .PP
The features returned by The features returned by
The The
.BR LIRC_GET_FEATURES .BR LIRC_GET_FEATURES
@ -471,5 +471,5 @@ Users of older kernels could use the file bundled in
.\" .\"
.SH SEE ALSO .SH SEE ALSO
.BR lircd (8) .BR lircd (8)
.P .PP
https://www.kernel.org/doc/htmldocs/media_api/lirc_dev.html https://www.kernel.org/doc/htmldocs/media_api/lirc_dev.html

View File

@ -172,7 +172,7 @@ TID of thread that triggered core dump, as seen in the initial PID namespace
PID of dumped process, PID of dumped process,
as seen in the PID namespace in which the process resides as seen in the PID namespace in which the process resides
.TP .TP
%P .PP
.\" Added in git commit 65aafb1e7484b7434a0c1d4c593191ebe5776a2f .\" Added in git commit 65aafb1e7484b7434a0c1d4c593191ebe5776a2f
PID of dumped process, as seen in the initial PID namespace PID of dumped process, as seen in the initial PID namespace
(since Linux 3.12) (since Linux 3.12)

View File

@ -34,7 +34,7 @@ contains the names of terminals
.IR /dev/ ) .IR /dev/ )
which are considered secure for the transmission of certain authentication which are considered secure for the transmission of certain authentication
tokens. tokens.
.P .PP
It is used by (some versions of) It is used by (some versions of)
.BR login (1) .BR login (1)
to restrict the terminals to restrict the terminals
@ -42,7 +42,7 @@ on which root is allowed to login.
See See
.BR login.defs (5) .BR login.defs (5)
if you use the shadow suite. if you use the shadow suite.
.P .PP
On PAM enabled systems, it is used for the same purpose by On PAM enabled systems, it is used for the same purpose by
.BR pam_securetty (8) .BR pam_securetty (8)
to restrict the terminals on which empty passwords are accepted. to restrict the terminals on which empty passwords are accepted.

View File

@ -373,7 +373,7 @@ S_IWOTH 00002 others have write permission
S_IXOTH 00001 others have execute permission S_IXOTH 00001 others have execute permission
.TE .TE
.in .in
.P .PP
The set-group-ID bit The set-group-ID bit
.RB ( S_ISGID ) .RB ( S_ISGID )
has several special uses. has several special uses.
@ -387,7 +387,7 @@ For a file that does not have the group execution bit
.RB ( S_IXGRP ) .RB ( S_IXGRP )
set, set,
the set-group-ID bit indicates mandatory file/record locking. the set-group-ID bit indicates mandatory file/record locking.
.P .PP
The sticky bit The sticky bit
.RB ( S_ISVTX ) .RB ( S_ISVTX )
on a directory means that a file on a directory means that a file

View File

@ -18,7 +18,7 @@ The Linux key-management facility
is primarily a way for various kernel components is primarily a way for various kernel components
to retain or cache security data, to retain or cache security data,
authentication keys, encryption keys, and other data in the kernel. authentication keys, encryption keys, and other data in the kernel.
.P .PP
System call interfaces are provided so that user-space programs can manage System call interfaces are provided so that user-space programs can manage
those objects and also use the facility for their own purposes; see those objects and also use the facility for their own purposes; see
.BR add_key (2), .BR add_key (2),
@ -175,7 +175,7 @@ links to other keys (which may include other keyrings).
Keys may be linked to by multiple keyrings. Keys may be linked to by multiple keyrings.
Keyrings may be considered as analogous to UNIX directories Keyrings may be considered as analogous to UNIX directories
where each directory contains a set of hard links to files. where each directory contains a set of hard links to files.
.P .PP
Various operations (system calls) may be applied only to keyrings: Various operations (system calls) may be applied only to keyrings:
.IP Adding .IP Adding
A key may be added to a keyring by system calls that create keys. A key may be added to a keyring by system calls that create keys.
@ -195,7 +195,7 @@ A keyring may be considered the root of a tree or subtree in which keyrings
form the branches and non-keyrings the leaves. form the branches and non-keyrings the leaves.
This tree may be searched for a key matching This tree may be searched for a key matching
a particular type and description. a particular type and description.
.P .PP
See See
.BR keyctl_clear (3), .BR keyctl_clear (3),
.BR keyctl_link (3), .BR keyctl_link (3),
@ -326,16 +326,16 @@ If a process is upcalled from the kernel to instantiate a key (see
.BR request_key (2)), .BR request_key (2)),
then it also possesses the requester's keyrings as in then it also possesses the requester's keyrings as in
rule (1) as if it were the requester. rule (1) as if it were the requester.
.P .PP
Note that possession is not a fundamental property of a key, Note that possession is not a fundamental property of a key,
but must rather be calculated each time the key is needed. but must rather be calculated each time the key is needed.
.P .PP
Possession is designed to allow set-user-ID programs run from, say Possession is designed to allow set-user-ID programs run from, say
a user's shell to access the user's keys. a user's shell to access the user's keys.
Granting permissions to the key possessor while denying them Granting permissions to the key possessor while denying them
to the key owner and group allows the prevention of access to keys to the key owner and group allows the prevention of access to keys
on the basis of UID and GID matches. on the basis of UID and GID matches.
.P .PP
When it creates the session keyring, When it creates the session keyring,
.BR pam_keyinit (8) .BR pam_keyinit (8)
adds a link to the adds a link to the
@ -352,7 +352,7 @@ The ID of a group that is permitted to access the key
A security label A security label
.IP * .IP *
A permissions mask A permissions mask
.P .PP
The permissions mask contains four sets of rights. The permissions mask contains four sets of rights.
The first three sets are mutually exclusive. The first three sets are mutually exclusive.
One and only one will be in force for a particular access check. One and only one will be in force for a particular access check.
@ -367,16 +367,16 @@ filesystem GID or one of the caller's supplementary group IDs.
.IP \fIother\fR .IP \fIother\fR
The set specifies the rights granted The set specifies the rights granted
if neither the key's user ID nor group ID matched. if neither the key's user ID nor group ID matched.
.P .PP
The fourth set of rights is: The fourth set of rights is:
.IP \fIpossessor\fR .IP \fIpossessor\fR
The set specifies the rights granted The set specifies the rights granted
if a key is determined to be possessed by the caller. if a key is determined to be possessed by the caller.
.P .PP
The complete set of rights for a key is the union of whichever The complete set of rights for a key is the union of whichever
of the first three sets is applicable plus the fourth set of the first three sets is applicable plus the fourth set
if the key is possessed. if the key is possessed.
.P .PP
The set of rights that may be granted in each of the four masks The set of rights that may be granted in each of the four masks
is as follows: is as follows:
.TP .TP
@ -408,14 +408,14 @@ doesn't require this permission.
.I setattr .I setattr
The ownership details and security label of the key may be changed, The ownership details and security label of the key may be changed,
the key's expiration time may be set, and the key may be revoked. the key's expiration time may be set, and the key may be revoked.
.P .PP
In addition to access rights, any active Linux Security Module (LSM) may In addition to access rights, any active Linux Security Module (LSM) may
prevent access to a key if its policy so dictates. prevent access to a key if its policy so dictates.
A key may be given a A key may be given a
security label or other attribute by the LSM; security label or other attribute by the LSM;
this label is retrievable via this label is retrievable via
.BR keyctl_get_security (3). .BR keyctl_get_security (3).
.P .PP
See See
.BR keyctl_chown (3), .BR keyctl_chown (3),
.BR keyctl_describe (3), .BR keyctl_describe (3),
@ -434,7 +434,7 @@ system call is the primary point of
access for user-space applications to find a key. access for user-space applications to find a key.
(Internally, the kernel has something similar available (Internally, the kernel has something similar available
for use by internal components that make use of keys.) for use by internal components that make use of keys.)
.P .PP
The search algorithm works as follows: The search algorithm works as follows:
.IP (1) 4 .IP (1) 4
The process keyrings are searched in the following order: the thread The process keyrings are searched in the following order: the thread
@ -467,10 +467,10 @@ If no valid matching key is found,
then the first noted error state is returned; otherwise, an then the first noted error state is returned; otherwise, an
.B ENOKEY .B ENOKEY
error is returned. error is returned.
.P .PP
It is also possible to search a specific keyring, in which case only steps It is also possible to search a specific keyring, in which case only steps
(3) to (6) apply. (3) to (6) apply.
.P .PP
See See
.BR request_key (2) .BR request_key (2)
and and
@ -485,18 +485,18 @@ will, if given a
argument, create a new key and then upcall to user space to argument, create a new key and then upcall to user space to
instantiate the key. instantiate the key.
This allows keys to be created on an as-needed basis. This allows keys to be created on an as-needed basis.
.P .PP
Typically, Typically,
this will involve the kernel creating a new process that executes the this will involve the kernel creating a new process that executes the
.BR request-key (8) .BR request-key (8)
program, which will then execute the appropriate handler based on its program, which will then execute the appropriate handler based on its
configuration. configuration.
.P .PP
The handler is passed a special authorization key that allows it The handler is passed a special authorization key that allows it
and only it to instantiate the new key. and only it to instantiate the new key.
This is also used to permit searches performed by the This is also used to permit searches performed by the
handler program to also search the requester's keyrings. handler program to also search the requester's keyrings.
.P .PP
See See
.BR request_key (2), .BR request_key (2),
.BR keyctl_assume_authority (3), .BR keyctl_assume_authority (3),
@ -814,7 +814,7 @@ note that each link in a keyring consumes 4 bytes of the keyring payload.
.SS Users .SS Users
The Linux key-management facility has a number of users and usages, The Linux key-management facility has a number of users and usages,
but is not limited to those that already exist. but is not limited to those that already exist.
.P .PP
In-kernel users of this facility include: In-kernel users of this facility include:
.TP .TP
Network filesystems - DNS Network filesystems - DNS
@ -837,7 +837,7 @@ The CIFS filesystem uses keys to store passwords for accessing remote shares.
Module verification Module verification
The kernel build process can be made to cryptographically sign modules. The kernel build process can be made to cryptographically sign modules.
That signature is then checked when a module is loaded. That signature is then checked when a module is loaded.
.P .PP
User-space users of this facility include: User-space users of this facility include:
.TP .TP
Kerberos key storage Kerberos key storage

View File

@ -17,7 +17,7 @@ The process keyring is a keyring used to anchor keys on behalf of a process.
It is created only when a process requests it. It is created only when a process requests it.
The process keyring has the name (description) The process keyring has the name (description)
.IR _pid . .IR _pid .
.P .PP
A special serial number value, A special serial number value,
.BR KEY_SPEC_PROCESS_KEYRING , .BR KEY_SPEC_PROCESS_KEYRING ,
is defined that can be used in lieu of the actual serial number of is defined that can be used in lieu of the actual serial number of

View File

@ -64,14 +64,14 @@ and
.BR _exit (2) .BR _exit (2)
excepting that the keyring is destroyed when the UID record is destroyed when excepting that the keyring is destroyed when the UID record is destroyed when
the last process pinning it exits. the last process pinning it exits.
.P .PP
If it is necessary for a key associated with a user to exist beyond the UID If it is necessary for a key associated with a user to exist beyond the UID
record being garbage collected\(emfor example, for use by a record being garbage collected\(emfor example, for use by a
.BR cron (8) .BR cron (8)
script\(emthen the script\(emthen the
.BR persistent-keyring (7) .BR persistent-keyring (7)
should be used instead. should be used instead.
.P .PP
If a user keyring does not exist when it is accessed, it will be created. If a user keyring does not exist when it is accessed, it will be created.
.SH SEE ALSO .SH SEE ALSO
.ad l .ad l

View File

@ -13,7 +13,7 @@ to the dynamic linker can be passed and, in the ELF case, the dynamic linker
which is stored in the which is stored in the
.B .interp .B .interp
section of the program is executed) or directly by running: section of the program is executed) or directly by running:
.P .PP
.I /lib/ld\-linux.so.* .I /lib/ld\-linux.so.*
[OPTIONS] [PROGRAM [ARGUMENTS]] [OPTIONS] [PROGRAM [ARGUMENTS]]
.SH DESCRIPTION .SH DESCRIPTION