mirror of https://github.com/mkerrisk/man-pages
add_key.2, bpf.2, fcntl.2, futex.2, listxattr.2, perf_event_open.2, prctl.2, request_key.2, sigaltstack.2, __ppc_set_ppr_med.3, __ppc_yield.3, getw.3, setbuf.3, setjmp.3, lirc.4, core.5, securetty.5, inode.7, keyrings.7, process-keyring.7, user-keyring.7, ld.so.8: srcfix: use .PP instead of .P
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
dd3568a147
commit
11ac5b5109
|
@ -36,10 +36,10 @@ of length
|
||||||
attaches it to the nominated
|
attaches it to the nominated
|
||||||
.IR keyring ,
|
.IR keyring ,
|
||||||
and returns the key's serial number.
|
and returns the key's serial number.
|
||||||
.P
|
.PP
|
||||||
The key may be rejected if the provided data is in the wrong format or
|
The key may be rejected if the provided data is in the wrong format or
|
||||||
it is invalid in some other way.
|
it is invalid in some other way.
|
||||||
.P
|
.PP
|
||||||
If the destination
|
If the destination
|
||||||
.I keyring
|
.I keyring
|
||||||
already contains a key that matches the specified
|
already contains a key that matches the specified
|
||||||
|
@ -57,7 +57,7 @@ and it will displace the link to the extant key from the keyring.
|
||||||
.\" is consequently unlinked, then keys that it was anchoring
|
.\" is consequently unlinked, then keys that it was anchoring
|
||||||
.\" will have their reference count decreased by one (and may
|
.\" will have their reference count decreased by one (and may
|
||||||
.\" consequently be garbage collected). Is this all correct?
|
.\" consequently be garbage collected). Is this all correct?
|
||||||
.P
|
.PP
|
||||||
The destination
|
The destination
|
||||||
.I keyring
|
.I keyring
|
||||||
serial number may be that of a valid keyring for which the caller has
|
serial number may be that of a valid keyring for which the caller has
|
||||||
|
|
|
@ -41,7 +41,7 @@ the original ("classic") BPF (cBPF) used to filter network packets.
|
||||||
For both cBPF and eBPF programs,
|
For both cBPF and eBPF programs,
|
||||||
the kernel statically analyzes the programs before loading them,
|
the kernel statically analyzes the programs before loading them,
|
||||||
in order to ensure that they cannot harm the running system.
|
in order to ensure that they cannot harm the running system.
|
||||||
.P
|
.PP
|
||||||
eBPF extends cBPF in multiple ways, including the ability to call
|
eBPF extends cBPF in multiple ways, including the ability to call
|
||||||
a fixed set of in-kernel helper functions
|
a fixed set of in-kernel helper functions
|
||||||
.\" See 'enum bpf_func_id' in include/uapi/linux/bpf.h
|
.\" See 'enum bpf_func_id' in include/uapi/linux/bpf.h
|
||||||
|
@ -79,7 +79,7 @@ If a map lookup fails, the current program continues its execution.
|
||||||
See
|
See
|
||||||
.B BPF_MAP_TYPE_PROG_ARRAY
|
.B BPF_MAP_TYPE_PROG_ARRAY
|
||||||
below for further details.
|
below for further details.
|
||||||
.P
|
.PP
|
||||||
Generally, eBPF programs are loaded by the user process and automatically
|
Generally, eBPF programs are loaded by the user process and automatically
|
||||||
unloaded when the process exits.
|
unloaded when the process exits.
|
||||||
In some cases, for example,
|
In some cases, for example,
|
||||||
|
|
10
man2/fcntl.2
10
man2/fcntl.2
|
@ -403,7 +403,7 @@ If the conflicting lock is an open file description lock, then
|
||||||
is set to \-1.
|
is set to \-1.
|
||||||
Note that the returned information
|
Note that the returned information
|
||||||
may already be out of date by the time the caller inspects it.
|
may already be out of date by the time the caller inspects it.
|
||||||
.P
|
.PP
|
||||||
In order to place a read lock,
|
In order to place a read lock,
|
||||||
.I fd
|
.I fd
|
||||||
must be open for reading.
|
must be open for reading.
|
||||||
|
@ -438,12 +438,12 @@ deadlock-detection algorithm; see BUGS.
|
||||||
As well as being removed by an explicit
|
As well as being removed by an explicit
|
||||||
.BR F_UNLCK ,
|
.BR F_UNLCK ,
|
||||||
record locks are automatically released when the process terminates.
|
record locks are automatically released when the process terminates.
|
||||||
.P
|
.PP
|
||||||
Record locks are not inherited by a child created via
|
Record locks are not inherited by a child created via
|
||||||
.BR fork (2),
|
.BR fork (2),
|
||||||
but are preserved across an
|
but are preserved across an
|
||||||
.BR execve (2).
|
.BR execve (2).
|
||||||
.P
|
.PP
|
||||||
Because of the buffering performed by the
|
Because of the buffering performed by the
|
||||||
.BR stdio (3)
|
.BR stdio (3)
|
||||||
library, the use of record locking with routines in that package
|
library, the use of record locking with routines in that package
|
||||||
|
@ -1064,7 +1064,7 @@ other open file descriptors for the file.
|
||||||
.B F_UNLCK
|
.B F_UNLCK
|
||||||
Remove our lease from the file.
|
Remove our lease from the file.
|
||||||
.RE
|
.RE
|
||||||
.P
|
.PP
|
||||||
Leases are associated with an open file description (see
|
Leases are associated with an open file description (see
|
||||||
.BR open (2)).
|
.BR open (2)).
|
||||||
This means that duplicate file descriptors (created by, for example,
|
This means that duplicate file descriptors (created by, for example,
|
||||||
|
@ -1077,7 +1077,7 @@ Furthermore, the lease is released by either an explicit
|
||||||
.B F_UNLCK
|
.B F_UNLCK
|
||||||
operation on any of these duplicate file descriptors, or when all
|
operation on any of these duplicate file descriptors, or when all
|
||||||
such file descriptors have been closed.
|
such file descriptors have been closed.
|
||||||
.P
|
.PP
|
||||||
Leases may be taken out only on regular files.
|
Leases may be taken out only on regular files.
|
||||||
An unprivileged process may take out a lease only on a file whose
|
An unprivileged process may take out a lease only on a file whose
|
||||||
UID (owner) matches the filesystem UID of the process.
|
UID (owner) matches the filesystem UID of the process.
|
||||||
|
|
|
@ -984,7 +984,7 @@ Additionally,
|
||||||
(or the error
|
(or the error
|
||||||
.B EINVAL
|
.B EINVAL
|
||||||
results).
|
results).
|
||||||
.P
|
.PP
|
||||||
The PI futex operations are as follows:
|
The PI futex operations are as follows:
|
||||||
.\"
|
.\"
|
||||||
.\""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
|
.\""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
|
||||||
|
|
|
@ -114,7 +114,7 @@ user.name1\\0system.name1\\0user.name2\\0
|
||||||
.fi
|
.fi
|
||||||
.RE
|
.RE
|
||||||
.fam T
|
.fam T
|
||||||
.P
|
.PP
|
||||||
Filesystems that implement POSIX ACLs using
|
Filesystems that implement POSIX ACLs using
|
||||||
extended attributes might return a
|
extended attributes might return a
|
||||||
.I list
|
.I list
|
||||||
|
|
|
@ -74,7 +74,7 @@ event periodically writes measurements to a buffer that can then
|
||||||
be accessed via
|
be accessed via
|
||||||
.BR mmap (2).
|
.BR mmap (2).
|
||||||
.SS Arguments
|
.SS Arguments
|
||||||
.P
|
.PP
|
||||||
The
|
The
|
||||||
.I pid
|
.I pid
|
||||||
and
|
and
|
||||||
|
@ -105,7 +105,7 @@ value of less than 1.
|
||||||
.TP
|
.TP
|
||||||
.BR "pid == \-1" " and " "cpu == \-1"
|
.BR "pid == \-1" " and " "cpu == \-1"
|
||||||
This setting is invalid and will return an error.
|
This setting is invalid and will return an error.
|
||||||
.P
|
.PP
|
||||||
When
|
When
|
||||||
.I pid
|
.I pid
|
||||||
is greater than zero, permission to perform this system call
|
is greater than zero, permission to perform this system call
|
||||||
|
@ -135,7 +135,7 @@ This means that the values of the member events can be
|
||||||
meaningfully compared\(emadded, divided (to get ratios), and so on\(emwith each
|
meaningfully compared\(emadded, divided (to get ratios), and so on\(emwith each
|
||||||
other, since they have counted events for the same set of executed
|
other, since they have counted events for the same set of executed
|
||||||
instructions.
|
instructions.
|
||||||
.P
|
.PP
|
||||||
The
|
The
|
||||||
.I flags
|
.I flags
|
||||||
argument is formed by ORing together zero or more of the following values:
|
argument is formed by ORing together zero or more of the following values:
|
||||||
|
@ -194,7 +194,7 @@ must be passed as the
|
||||||
parameter.
|
parameter.
|
||||||
cgroup monitoring is available only
|
cgroup monitoring is available only
|
||||||
for system-wide events and may therefore require extra permissions.
|
for system-wide events and may therefore require extra permissions.
|
||||||
.P
|
.PP
|
||||||
The
|
The
|
||||||
.I perf_event_attr
|
.I perf_event_attr
|
||||||
structure provides detailed configuration information
|
structure provides detailed configuration information
|
||||||
|
@ -546,7 +546,7 @@ value use the following equation:
|
||||||
(perf_hw_cache_id) | (perf_hw_cache_op_id << 8) |
|
(perf_hw_cache_id) | (perf_hw_cache_op_id << 8) |
|
||||||
(perf_hw_cache_op_result_id << 16)
|
(perf_hw_cache_op_result_id << 16)
|
||||||
.fi
|
.fi
|
||||||
.P
|
.PP
|
||||||
where
|
where
|
||||||
.I perf_hw_cache_id
|
.I perf_hw_cache_id
|
||||||
is one of:
|
is one of:
|
||||||
|
@ -574,7 +574,7 @@ for measuring the branch prediction unit
|
||||||
.\" commit 89d6c0b5bdbb1927775584dcf532d98b3efe1477
|
.\" commit 89d6c0b5bdbb1927775584dcf532d98b3efe1477
|
||||||
for measuring local memory accesses
|
for measuring local memory accesses
|
||||||
.RE
|
.RE
|
||||||
.P
|
.PP
|
||||||
and
|
and
|
||||||
.I perf_hw_cache_op_id
|
.I perf_hw_cache_op_id
|
||||||
is one of:
|
is one of:
|
||||||
|
@ -589,7 +589,7 @@ for write accesses
|
||||||
.B PERF_COUNT_HW_CACHE_OP_PREFETCH
|
.B PERF_COUNT_HW_CACHE_OP_PREFETCH
|
||||||
for prefetch accesses
|
for prefetch accesses
|
||||||
.RE
|
.RE
|
||||||
.P
|
.PP
|
||||||
and
|
and
|
||||||
.I perf_hw_cache_op_result_id
|
.I perf_hw_cache_op_result_id
|
||||||
is one of:
|
is one of:
|
||||||
|
@ -1248,7 +1248,7 @@ Branch target is in hypervisor.
|
||||||
.TP
|
.TP
|
||||||
.B PERF_SAMPLE_BRANCH_PLM_ALL
|
.B PERF_SAMPLE_BRANCH_PLM_ALL
|
||||||
A convenience value that is the three preceding values ORed together.
|
A convenience value that is the three preceding values ORed together.
|
||||||
.P
|
.PP
|
||||||
In addition to the privilege value, at least one or more of the
|
In addition to the privilege value, at least one or more of the
|
||||||
following bits must be set.
|
following bits must be set.
|
||||||
.TP
|
.TP
|
||||||
|
@ -2192,7 +2192,7 @@ The branch was in an aborted transactional memory transaction.
|
||||||
.\" commit 71ef3c6b9d4665ee7afbbe4c208a98917dcfc32f
|
.\" commit 71ef3c6b9d4665ee7afbbe4c208a98917dcfc32f
|
||||||
This reports the number of cycles elapsed since the
|
This reports the number of cycles elapsed since the
|
||||||
previous branch stack update.
|
previous branch stack update.
|
||||||
.P
|
.PP
|
||||||
The entries are from most to least recent, so the first entry
|
The entries are from most to least recent, so the first entry
|
||||||
has the most recent branch.
|
has the most recent branch.
|
||||||
.PP
|
.PP
|
||||||
|
|
|
@ -596,7 +596,7 @@ value.
|
||||||
The requirements for the address are the same as for the
|
The requirements for the address are the same as for the
|
||||||
.BR PR_SET_MM_START_BRK
|
.BR PR_SET_MM_START_BRK
|
||||||
option.
|
option.
|
||||||
.P
|
.PP
|
||||||
The following options are available since Linux 3.5.
|
The following options are available since Linux 3.5.
|
||||||
.\" commit fe8c7f5cbf91124987106faa3bdf0c8b955c4cf7
|
.\" commit fe8c7f5cbf91124987106faa3bdf0c8b955c4cf7
|
||||||
.TP
|
.TP
|
||||||
|
@ -658,7 +658,7 @@ in a process life time.
|
||||||
Any further attempts will be rejected.
|
Any further attempts will be rejected.
|
||||||
This should help system administrators monitor unusual
|
This should help system administrators monitor unusual
|
||||||
symbolic-link transitions over all processes running on a system.
|
symbolic-link transitions over all processes running on a system.
|
||||||
.P
|
.PP
|
||||||
The following options are available since Linux 3.18.
|
The following options are available since Linux 3.18.
|
||||||
.\" commit f606b77f1a9e362451aca8f81d8f36a3a112139e
|
.\" commit f606b77f1a9e362451aca8f81d8f36a3a112139e
|
||||||
.TP
|
.TP
|
||||||
|
|
|
@ -41,7 +41,7 @@ first recursively searches for a matching key in all of the keyrings
|
||||||
attached to the calling process.
|
attached to the calling process.
|
||||||
The keyrings are searched in the order: thread-specific keyring,
|
The keyrings are searched in the order: thread-specific keyring,
|
||||||
process-specific keyring, and then session keyring.
|
process-specific keyring, and then session keyring.
|
||||||
.P
|
.PP
|
||||||
If
|
If
|
||||||
.BR request_key ()
|
.BR request_key ()
|
||||||
is called from a program invoked by
|
is called from a program invoked by
|
||||||
|
@ -53,7 +53,7 @@ supplementary group IDs, and security context to determine access.
|
||||||
.\" David Howells: we can then have an arbitrarily long sequence
|
.\" David Howells: we can then have an arbitrarily long sequence
|
||||||
.\" of "recursive" request-key upcalls. There is no limit, other
|
.\" of "recursive" request-key upcalls. There is no limit, other
|
||||||
.\" than number of PIDs, etc.
|
.\" than number of PIDs, etc.
|
||||||
.P
|
.PP
|
||||||
The search of the keyring tree is breadth-first:
|
The search of the keyring tree is breadth-first:
|
||||||
the keys in each keyring searched are checked for a match before any child
|
the keys in each keyring searched are checked for a match before any child
|
||||||
keyrings are recursed into.
|
keyrings are recursed into.
|
||||||
|
@ -62,7 +62,7 @@ Only keys for which the caller has
|
||||||
permission be found, and only keyrings for which the caller has
|
permission be found, and only keyrings for which the caller has
|
||||||
.I search
|
.I search
|
||||||
permission may be searched.
|
permission may be searched.
|
||||||
.P
|
.PP
|
||||||
If the key is not found and
|
If the key is not found and
|
||||||
.I callout
|
.I callout
|
||||||
is NULL, then the call fails with the error
|
is NULL, then the call fails with the error
|
||||||
|
@ -342,7 +342,7 @@ At this point, the
|
||||||
.BR request_key ()
|
.BR request_key ()
|
||||||
call completes, and the requesting program can continue execution.
|
call completes, and the requesting program can continue execution.
|
||||||
.RE
|
.RE
|
||||||
.P
|
.PP
|
||||||
If these steps are unsuccessful, then an
|
If these steps are unsuccessful, then an
|
||||||
.BR ENOKEY
|
.BR ENOKEY
|
||||||
error will be returned to the caller of
|
error will be returned to the caller of
|
||||||
|
|
|
@ -77,7 +77,7 @@ When establishing a signal handler using
|
||||||
inform the system that the signal handler should be executed
|
inform the system that the signal handler should be executed
|
||||||
on the alternate signal stack by
|
on the alternate signal stack by
|
||||||
specifying the \fBSA_ONSTACK\fP flag.
|
specifying the \fBSA_ONSTACK\fP flag.
|
||||||
.P
|
.PP
|
||||||
The \fIss\fP argument is used to specify a new
|
The \fIss\fP argument is used to specify a new
|
||||||
alternate signal stack, while the \fIold_ss\fP argument
|
alternate signal stack, while the \fIold_ss\fP argument
|
||||||
is used to retrieve information about the currently
|
is used to retrieve information about the currently
|
||||||
|
@ -192,7 +192,7 @@ normal process stack is exhausted: in this case, a signal handler for
|
||||||
.B SIGSEGV
|
.B SIGSEGV
|
||||||
cannot be invoked on the process stack; if we wish to handle it,
|
cannot be invoked on the process stack; if we wish to handle it,
|
||||||
we must use an alternate signal stack.
|
we must use an alternate signal stack.
|
||||||
.P
|
.PP
|
||||||
Establishing an alternate signal stack is useful if a process
|
Establishing an alternate signal stack is useful if a process
|
||||||
expects that it may exhaust its standard stack.
|
expects that it may exhaust its standard stack.
|
||||||
This may occur, for example, because the stack grows so large
|
This may occur, for example, because the stack grows so large
|
||||||
|
@ -202,13 +202,13 @@ If the standard stack is exhausted, the kernel sends
|
||||||
the process a \fBSIGSEGV\fP signal.
|
the process a \fBSIGSEGV\fP signal.
|
||||||
In these circumstances the only way to catch this signal is
|
In these circumstances the only way to catch this signal is
|
||||||
on an alternate signal stack.
|
on an alternate signal stack.
|
||||||
.P
|
.PP
|
||||||
On most hardware architectures supported by Linux, stacks grow
|
On most hardware architectures supported by Linux, stacks grow
|
||||||
downward.
|
downward.
|
||||||
.BR sigaltstack ()
|
.BR sigaltstack ()
|
||||||
automatically takes account
|
automatically takes account
|
||||||
of the direction of stack growth.
|
of the direction of stack growth.
|
||||||
.P
|
.PP
|
||||||
Functions called from a signal handler executing on an alternate
|
Functions called from a signal handler executing on an alternate
|
||||||
signal stack will also use the alternate signal stack.
|
signal stack will also use the alternate signal stack.
|
||||||
(This also applies to any handlers invoked for other signals while
|
(This also applies to any handlers invoked for other signals while
|
||||||
|
@ -217,7 +217,7 @@ Unlike the standard stack, the system does not
|
||||||
automatically extend the alternate signal stack.
|
automatically extend the alternate signal stack.
|
||||||
Exceeding the allocated size of the alternate signal stack will
|
Exceeding the allocated size of the alternate signal stack will
|
||||||
lead to unpredictable results.
|
lead to unpredictable results.
|
||||||
.P
|
.PP
|
||||||
A successful call to
|
A successful call to
|
||||||
.BR execve (2)
|
.BR execve (2)
|
||||||
removes any existing alternate
|
removes any existing alternate
|
||||||
|
@ -225,7 +225,7 @@ signal stack.
|
||||||
A child process created via
|
A child process created via
|
||||||
.BR fork (2)
|
.BR fork (2)
|
||||||
inherits a copy of its parent's alternate signal stack settings.
|
inherits a copy of its parent's alternate signal stack settings.
|
||||||
.P
|
.PP
|
||||||
.BR sigaltstack ()
|
.BR sigaltstack ()
|
||||||
supersedes the older
|
supersedes the older
|
||||||
.BR sigstack ()
|
.BR sigstack ()
|
||||||
|
|
|
@ -43,7 +43,7 @@ Set the Program Priority Register
|
||||||
These functions provide access to the
|
These functions provide access to the
|
||||||
.I Program Priority Register
|
.I Program Priority Register
|
||||||
(PPR) on the Power architecture.
|
(PPR) on the Power architecture.
|
||||||
.P
|
.PP
|
||||||
The PPR is a 64-bit register that controls the program's priority.
|
The PPR is a 64-bit register that controls the program's priority.
|
||||||
By adjusting the PPR value the programmer may improve system
|
By adjusting the PPR value the programmer may improve system
|
||||||
throughput by causing system resources to be used more
|
throughput by causing system resources to be used more
|
||||||
|
@ -66,7 +66,7 @@ sets the Program Priority Register value to
|
||||||
.BR __ppc_set_ppr_med_low ()
|
.BR __ppc_set_ppr_med_low ()
|
||||||
sets the Program Priority Register value to
|
sets the Program Priority Register value to
|
||||||
.IR "medium low" .
|
.IR "medium low" .
|
||||||
.P
|
.PP
|
||||||
The privileged state
|
The privileged state
|
||||||
.IR "medium high"
|
.IR "medium high"
|
||||||
may also be set during certain time intervals by problem-state (unprivileged)
|
may also be set during certain time intervals by problem-state (unprivileged)
|
||||||
|
@ -75,7 +75,7 @@ programs, with the following function:
|
||||||
.BR __ppc_set_ppr_med_high ()
|
.BR __ppc_set_ppr_med_high ()
|
||||||
sets the Program Priority to
|
sets the Program Priority to
|
||||||
.IR "medium high" .
|
.IR "medium high" .
|
||||||
.P
|
.PP
|
||||||
If the program priority is medium high when the time interval expires or if an
|
If the program priority is medium high when the time interval expires or if an
|
||||||
attempt is made to set the priority to medium high when it is not allowed, the
|
attempt is made to set the priority to medium high when it is not allowed, the
|
||||||
priority is set to medium.
|
priority is set to medium.
|
||||||
|
|
|
@ -41,18 +41,18 @@ provide hints about the usage of resources that are shared with other
|
||||||
processors on the Power architecture.
|
processors on the Power architecture.
|
||||||
They can be used, for example, if a program waiting on a lock intends
|
They can be used, for example, if a program waiting on a lock intends
|
||||||
to divert the shared resources to be used by other processors.
|
to divert the shared resources to be used by other processors.
|
||||||
.P
|
.PP
|
||||||
.BR __ppc_yield ()
|
.BR __ppc_yield ()
|
||||||
provides a hint that performance will probably be improved if shared
|
provides a hint that performance will probably be improved if shared
|
||||||
resources dedicated to the executing processor are released for use by
|
resources dedicated to the executing processor are released for use by
|
||||||
other processors.
|
other processors.
|
||||||
.P
|
.PP
|
||||||
.BR __ppc_mdoio ()
|
.BR __ppc_mdoio ()
|
||||||
provides a hint that performance will probably be improved if shared
|
provides a hint that performance will probably be improved if shared
|
||||||
resources dedicated to the executing processor are released until all
|
resources dedicated to the executing processor are released until all
|
||||||
outstanding storage accesses to caching-inhibited storage have been
|
outstanding storage accesses to caching-inhibited storage have been
|
||||||
completed.
|
completed.
|
||||||
.P
|
.PP
|
||||||
.BR __ppc_mdoom ()
|
.BR __ppc_mdoom ()
|
||||||
provides a hint that performance will probably be improved if shared
|
provides a hint that performance will probably be improved if shared
|
||||||
resources dedicated to the executing processor are released until all
|
resources dedicated to the executing processor are released until all
|
||||||
|
|
|
@ -62,7 +62,7 @@ It's provided for compatibility with SVr4.
|
||||||
We recommend you use
|
We recommend you use
|
||||||
.BR fread (3)
|
.BR fread (3)
|
||||||
instead.
|
instead.
|
||||||
.P
|
.PP
|
||||||
.BR putw ()
|
.BR putw ()
|
||||||
writes the word \fIw\fP (that is,
|
writes the word \fIw\fP (that is,
|
||||||
an \fIint\fP) to \fIstream\fP.
|
an \fIint\fP) to \fIstream\fP.
|
||||||
|
|
|
@ -194,7 +194,7 @@ functions conform to C89 and C99.
|
||||||
.\" On 4.2BSD and 4.3BSD systems,
|
.\" On 4.2BSD and 4.3BSD systems,
|
||||||
.\" .BR setbuf ()
|
.\" .BR setbuf ()
|
||||||
.\" always uses a suboptimal buffer size and should be avoided.
|
.\" always uses a suboptimal buffer size and should be avoided.
|
||||||
.P
|
.PP
|
||||||
You must make sure that the space that
|
You must make sure that the space that
|
||||||
.I buf
|
.I buf
|
||||||
points to still exists by the time
|
points to still exists by the time
|
||||||
|
|
|
@ -235,7 +235,7 @@ and
|
||||||
.IP \(bu
|
.IP \(bu
|
||||||
they are not declared as
|
they are not declared as
|
||||||
.IR volatile .
|
.IR volatile .
|
||||||
.P
|
.PP
|
||||||
Analogous remarks apply for
|
Analogous remarks apply for
|
||||||
.BR siglongjmp ().
|
.BR siglongjmp ().
|
||||||
.\"
|
.\"
|
||||||
|
|
34
man4/lirc.4
34
man4/lirc.4
|
@ -24,14 +24,14 @@
|
||||||
.SH NAME
|
.SH NAME
|
||||||
lirc \- lirc devices
|
lirc \- lirc devices
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
.P
|
.PP
|
||||||
The
|
The
|
||||||
.B /dev/lirc*
|
.B /dev/lirc*
|
||||||
character devices provide a low-level
|
character devices provide a low-level
|
||||||
bi-directional interface to infra-red (IR) remotes.
|
bi-directional interface to infra-red (IR) remotes.
|
||||||
When receiving data, the driver works in two different modes depending
|
When receiving data, the driver works in two different modes depending
|
||||||
on the underlying hardware.
|
on the underlying hardware.
|
||||||
.P
|
.PP
|
||||||
Some hardware (typically TV-cards) decodes the IR signal internally
|
Some hardware (typically TV-cards) decodes the IR signal internally
|
||||||
and just provides decoded button presses as integer values.
|
and just provides decoded button presses as integer values.
|
||||||
Drivers for this kind of hardware work in
|
Drivers for this kind of hardware work in
|
||||||
|
@ -40,7 +40,7 @@ mode.
|
||||||
Such hardware usually does not support sending IR signals.
|
Such hardware usually does not support sending IR signals.
|
||||||
Furthermore, it usually only works with a specific remote which is
|
Furthermore, it usually only works with a specific remote which is
|
||||||
bundled with, for example, a TV-card.
|
bundled with, for example, a TV-card.
|
||||||
.P
|
.PP
|
||||||
Other hardware provides a stream of pulse/space durations.
|
Other hardware provides a stream of pulse/space durations.
|
||||||
Such drivers work in
|
Such drivers work in
|
||||||
.BR LIRC_MODE_MODE2
|
.BR LIRC_MODE_MODE2
|
||||||
|
@ -48,12 +48,12 @@ mode.
|
||||||
Sometimes, this kind of hardware also supports
|
Sometimes, this kind of hardware also supports
|
||||||
sending IR data.
|
sending IR data.
|
||||||
Such hardware can be used with (almost) any kind of remote.
|
Such hardware can be used with (almost) any kind of remote.
|
||||||
.P
|
.PP
|
||||||
The \fBLIRC_GET_REC_MODE\fR ioctl (see below) allows probing for the
|
The \fBLIRC_GET_REC_MODE\fR ioctl (see below) allows probing for the
|
||||||
mode.
|
mode.
|
||||||
.\"
|
.\"
|
||||||
.SS Reading input with the LIRC_MODE_MODE2 drivers
|
.SS Reading input with the LIRC_MODE_MODE2 drivers
|
||||||
.P
|
.PP
|
||||||
In the \fBLIRC_MODE_MODE2 mode\fR, the data returned by
|
In the \fBLIRC_MODE_MODE2 mode\fR, the data returned by
|
||||||
.BR read (2)
|
.BR read (2)
|
||||||
provides 32-bit values representing a space or a pulse duration, by
|
provides 32-bit values representing a space or a pulse duration, by
|
||||||
|
@ -81,7 +81,7 @@ ioctl.
|
||||||
.SS Reading input with the
|
.SS Reading input with the
|
||||||
.B LIRC_MODE_LIRCCODE
|
.B LIRC_MODE_LIRCCODE
|
||||||
drivers
|
drivers
|
||||||
.P
|
.PP
|
||||||
In the \fBLIRC_MODE_LIRCCODE\fR
|
In the \fBLIRC_MODE_LIRCCODE\fR
|
||||||
mode, the data returned by
|
mode, the data returned by
|
||||||
.BR read (2)
|
.BR read (2)
|
||||||
|
@ -93,7 +93,7 @@ the bit count returned by the \fBLIRC_GET_LENGTH\fR ioctl, rounded
|
||||||
up so it matches full bytes.
|
up so it matches full bytes.
|
||||||
.\"
|
.\"
|
||||||
.SS Sending data
|
.SS Sending data
|
||||||
.P
|
.PP
|
||||||
When sending data, only the \fBLIRC_MODE_PULSE\fR
|
When sending data, only the \fBLIRC_MODE_PULSE\fR
|
||||||
mode is supported.
|
mode is supported.
|
||||||
The data written to the character device using
|
The data written to the character device using
|
||||||
|
@ -112,30 +112,30 @@ call fails with the error
|
||||||
.BR EINVAL
|
.BR EINVAL
|
||||||
.\"
|
.\"
|
||||||
.SH IOCTL COMMANDS
|
.SH IOCTL COMMANDS
|
||||||
.P
|
.PP
|
||||||
The complete list of ioctl commands is maintained in the kernel
|
The complete list of ioctl commands is maintained in the kernel
|
||||||
documentation, see SEE ALSO.
|
documentation, see SEE ALSO.
|
||||||
The ioctl commands presented here is a subset of the kernel
|
The ioctl commands presented here is a subset of the kernel
|
||||||
documentation.
|
documentation.
|
||||||
.P
|
.PP
|
||||||
The LIRC device's ioctl definition is bound by the ioctl function
|
The LIRC device's ioctl definition is bound by the ioctl function
|
||||||
definition of struct file_operations, leaving us with an unsigned
|
definition of struct file_operations, leaving us with an unsigned
|
||||||
int for the ioctl command and an unsigned long for the argument.
|
int for the ioctl command and an unsigned long for the argument.
|
||||||
For the purposes of ioctl portability across 32-bit and 64-bit architectures,
|
For the purposes of ioctl portability across 32-bit and 64-bit architectures,
|
||||||
these values are capped to their 32-bit sizes.
|
these values are capped to their 32-bit sizes.
|
||||||
.P
|
.PP
|
||||||
.nf
|
.nf
|
||||||
#include <lirc/include/media/lirc.h> /* But see BUGS */
|
#include <lirc/include/media/lirc.h> /* But see BUGS */
|
||||||
int ioctl(int fd, int cmd, ...);
|
int ioctl(int fd, int cmd, ...);
|
||||||
.fi
|
.fi
|
||||||
.P
|
.PP
|
||||||
The following ioctls can be used to probe or change specific lirc
|
The following ioctls can be used to probe or change specific lirc
|
||||||
hardware settings.
|
hardware settings.
|
||||||
Many require a third argument, usually an
|
Many require a third argument, usually an
|
||||||
.IR int .
|
.IR int .
|
||||||
referred to below as
|
referred to below as
|
||||||
.IR val .
|
.IR val .
|
||||||
.P
|
.PP
|
||||||
In general, each driver should have a default set of settings.
|
In general, each driver should have a default set of settings.
|
||||||
The driver implementation is expected to re-apply the default settings
|
The driver implementation is expected to re-apply the default settings
|
||||||
when the device is closed by user space, so that every application
|
when the device is closed by user space, so that every application
|
||||||
|
@ -143,7 +143,7 @@ opening the device can rely on working with the default settings
|
||||||
initially.
|
initially.
|
||||||
.\"
|
.\"
|
||||||
.SS Always Supported Commands
|
.SS Always Supported Commands
|
||||||
.P
|
.PP
|
||||||
\fI/dev/lirc*\fR devices always support the following commands:
|
\fI/dev/lirc*\fR devices always support the following commands:
|
||||||
.TP 4
|
.TP 4
|
||||||
.BR LIRC_GET_FEATURES " (\fIvoid\fP)"
|
.BR LIRC_GET_FEATURES " (\fIvoid\fP)"
|
||||||
|
@ -165,13 +165,13 @@ The driver returns a sequence of pulse/space durations.
|
||||||
The driver returns integer values, each of which represents a decoded
|
The driver returns integer values, each of which represents a decoded
|
||||||
button press.
|
button press.
|
||||||
.RE
|
.RE
|
||||||
.P
|
.PP
|
||||||
If a device returns an error code for
|
If a device returns an error code for
|
||||||
.BR LIRC_GET_REC_MODE ,
|
.BR LIRC_GET_REC_MODE ,
|
||||||
it is safe to assume it is not a lirc device.
|
it is safe to assume it is not a lirc device.
|
||||||
.\"
|
.\"
|
||||||
.SS Optional Commands
|
.SS Optional Commands
|
||||||
.P
|
.PP
|
||||||
Some lirc devices support commands listed below.
|
Some lirc devices support commands listed below.
|
||||||
Unless otherwise stated, these fail with the error \fBENOIOCTLCMD\fR
|
Unless otherwise stated, these fail with the error \fBENOIOCTLCMD\fR
|
||||||
or with the error \fBENOSYS\fR if the operation
|
or with the error \fBENOSYS\fR if the operation
|
||||||
|
@ -371,7 +371,7 @@ This can be used by supporting hardware to give visual user
|
||||||
feedback, for example by flashing an LED.
|
feedback, for example by flashing an LED.
|
||||||
.\"
|
.\"
|
||||||
.SH FEATURES
|
.SH FEATURES
|
||||||
.P
|
.PP
|
||||||
The features returned by
|
The features returned by
|
||||||
The
|
The
|
||||||
.BR LIRC_GET_FEATURES
|
.BR LIRC_GET_FEATURES
|
||||||
|
@ -471,5 +471,5 @@ Users of older kernels could use the file bundled in
|
||||||
.\"
|
.\"
|
||||||
.SH SEE ALSO
|
.SH SEE ALSO
|
||||||
.BR lircd (8)
|
.BR lircd (8)
|
||||||
.P
|
.PP
|
||||||
https://www.kernel.org/doc/htmldocs/media_api/lirc_dev.html
|
https://www.kernel.org/doc/htmldocs/media_api/lirc_dev.html
|
||||||
|
|
|
@ -172,7 +172,7 @@ TID of thread that triggered core dump, as seen in the initial PID namespace
|
||||||
PID of dumped process,
|
PID of dumped process,
|
||||||
as seen in the PID namespace in which the process resides
|
as seen in the PID namespace in which the process resides
|
||||||
.TP
|
.TP
|
||||||
%P
|
.PP
|
||||||
.\" Added in git commit 65aafb1e7484b7434a0c1d4c593191ebe5776a2f
|
.\" Added in git commit 65aafb1e7484b7434a0c1d4c593191ebe5776a2f
|
||||||
PID of dumped process, as seen in the initial PID namespace
|
PID of dumped process, as seen in the initial PID namespace
|
||||||
(since Linux 3.12)
|
(since Linux 3.12)
|
||||||
|
|
|
@ -34,7 +34,7 @@ contains the names of terminals
|
||||||
.IR /dev/ )
|
.IR /dev/ )
|
||||||
which are considered secure for the transmission of certain authentication
|
which are considered secure for the transmission of certain authentication
|
||||||
tokens.
|
tokens.
|
||||||
.P
|
.PP
|
||||||
It is used by (some versions of)
|
It is used by (some versions of)
|
||||||
.BR login (1)
|
.BR login (1)
|
||||||
to restrict the terminals
|
to restrict the terminals
|
||||||
|
@ -42,7 +42,7 @@ on which root is allowed to login.
|
||||||
See
|
See
|
||||||
.BR login.defs (5)
|
.BR login.defs (5)
|
||||||
if you use the shadow suite.
|
if you use the shadow suite.
|
||||||
.P
|
.PP
|
||||||
On PAM enabled systems, it is used for the same purpose by
|
On PAM enabled systems, it is used for the same purpose by
|
||||||
.BR pam_securetty (8)
|
.BR pam_securetty (8)
|
||||||
to restrict the terminals on which empty passwords are accepted.
|
to restrict the terminals on which empty passwords are accepted.
|
||||||
|
|
|
@ -373,7 +373,7 @@ S_IWOTH 00002 others have write permission
|
||||||
S_IXOTH 00001 others have execute permission
|
S_IXOTH 00001 others have execute permission
|
||||||
.TE
|
.TE
|
||||||
.in
|
.in
|
||||||
.P
|
.PP
|
||||||
The set-group-ID bit
|
The set-group-ID bit
|
||||||
.RB ( S_ISGID )
|
.RB ( S_ISGID )
|
||||||
has several special uses.
|
has several special uses.
|
||||||
|
@ -387,7 +387,7 @@ For a file that does not have the group execution bit
|
||||||
.RB ( S_IXGRP )
|
.RB ( S_IXGRP )
|
||||||
set,
|
set,
|
||||||
the set-group-ID bit indicates mandatory file/record locking.
|
the set-group-ID bit indicates mandatory file/record locking.
|
||||||
.P
|
.PP
|
||||||
The sticky bit
|
The sticky bit
|
||||||
.RB ( S_ISVTX )
|
.RB ( S_ISVTX )
|
||||||
on a directory means that a file
|
on a directory means that a file
|
||||||
|
|
|
@ -18,7 +18,7 @@ The Linux key-management facility
|
||||||
is primarily a way for various kernel components
|
is primarily a way for various kernel components
|
||||||
to retain or cache security data,
|
to retain or cache security data,
|
||||||
authentication keys, encryption keys, and other data in the kernel.
|
authentication keys, encryption keys, and other data in the kernel.
|
||||||
.P
|
.PP
|
||||||
System call interfaces are provided so that user-space programs can manage
|
System call interfaces are provided so that user-space programs can manage
|
||||||
those objects and also use the facility for their own purposes; see
|
those objects and also use the facility for their own purposes; see
|
||||||
.BR add_key (2),
|
.BR add_key (2),
|
||||||
|
@ -175,7 +175,7 @@ links to other keys (which may include other keyrings).
|
||||||
Keys may be linked to by multiple keyrings.
|
Keys may be linked to by multiple keyrings.
|
||||||
Keyrings may be considered as analogous to UNIX directories
|
Keyrings may be considered as analogous to UNIX directories
|
||||||
where each directory contains a set of hard links to files.
|
where each directory contains a set of hard links to files.
|
||||||
.P
|
.PP
|
||||||
Various operations (system calls) may be applied only to keyrings:
|
Various operations (system calls) may be applied only to keyrings:
|
||||||
.IP Adding
|
.IP Adding
|
||||||
A key may be added to a keyring by system calls that create keys.
|
A key may be added to a keyring by system calls that create keys.
|
||||||
|
@ -195,7 +195,7 @@ A keyring may be considered the root of a tree or subtree in which keyrings
|
||||||
form the branches and non-keyrings the leaves.
|
form the branches and non-keyrings the leaves.
|
||||||
This tree may be searched for a key matching
|
This tree may be searched for a key matching
|
||||||
a particular type and description.
|
a particular type and description.
|
||||||
.P
|
.PP
|
||||||
See
|
See
|
||||||
.BR keyctl_clear (3),
|
.BR keyctl_clear (3),
|
||||||
.BR keyctl_link (3),
|
.BR keyctl_link (3),
|
||||||
|
@ -326,16 +326,16 @@ If a process is upcalled from the kernel to instantiate a key (see
|
||||||
.BR request_key (2)),
|
.BR request_key (2)),
|
||||||
then it also possesses the requester's keyrings as in
|
then it also possesses the requester's keyrings as in
|
||||||
rule (1) as if it were the requester.
|
rule (1) as if it were the requester.
|
||||||
.P
|
.PP
|
||||||
Note that possession is not a fundamental property of a key,
|
Note that possession is not a fundamental property of a key,
|
||||||
but must rather be calculated each time the key is needed.
|
but must rather be calculated each time the key is needed.
|
||||||
.P
|
.PP
|
||||||
Possession is designed to allow set-user-ID programs run from, say
|
Possession is designed to allow set-user-ID programs run from, say
|
||||||
a user's shell to access the user's keys.
|
a user's shell to access the user's keys.
|
||||||
Granting permissions to the key possessor while denying them
|
Granting permissions to the key possessor while denying them
|
||||||
to the key owner and group allows the prevention of access to keys
|
to the key owner and group allows the prevention of access to keys
|
||||||
on the basis of UID and GID matches.
|
on the basis of UID and GID matches.
|
||||||
.P
|
.PP
|
||||||
When it creates the session keyring,
|
When it creates the session keyring,
|
||||||
.BR pam_keyinit (8)
|
.BR pam_keyinit (8)
|
||||||
adds a link to the
|
adds a link to the
|
||||||
|
@ -352,7 +352,7 @@ The ID of a group that is permitted to access the key
|
||||||
A security label
|
A security label
|
||||||
.IP *
|
.IP *
|
||||||
A permissions mask
|
A permissions mask
|
||||||
.P
|
.PP
|
||||||
The permissions mask contains four sets of rights.
|
The permissions mask contains four sets of rights.
|
||||||
The first three sets are mutually exclusive.
|
The first three sets are mutually exclusive.
|
||||||
One and only one will be in force for a particular access check.
|
One and only one will be in force for a particular access check.
|
||||||
|
@ -367,16 +367,16 @@ filesystem GID or one of the caller's supplementary group IDs.
|
||||||
.IP \fIother\fR
|
.IP \fIother\fR
|
||||||
The set specifies the rights granted
|
The set specifies the rights granted
|
||||||
if neither the key's user ID nor group ID matched.
|
if neither the key's user ID nor group ID matched.
|
||||||
.P
|
.PP
|
||||||
The fourth set of rights is:
|
The fourth set of rights is:
|
||||||
.IP \fIpossessor\fR
|
.IP \fIpossessor\fR
|
||||||
The set specifies the rights granted
|
The set specifies the rights granted
|
||||||
if a key is determined to be possessed by the caller.
|
if a key is determined to be possessed by the caller.
|
||||||
.P
|
.PP
|
||||||
The complete set of rights for a key is the union of whichever
|
The complete set of rights for a key is the union of whichever
|
||||||
of the first three sets is applicable plus the fourth set
|
of the first three sets is applicable plus the fourth set
|
||||||
if the key is possessed.
|
if the key is possessed.
|
||||||
.P
|
.PP
|
||||||
The set of rights that may be granted in each of the four masks
|
The set of rights that may be granted in each of the four masks
|
||||||
is as follows:
|
is as follows:
|
||||||
.TP
|
.TP
|
||||||
|
@ -408,14 +408,14 @@ doesn't require this permission.
|
||||||
.I setattr
|
.I setattr
|
||||||
The ownership details and security label of the key may be changed,
|
The ownership details and security label of the key may be changed,
|
||||||
the key's expiration time may be set, and the key may be revoked.
|
the key's expiration time may be set, and the key may be revoked.
|
||||||
.P
|
.PP
|
||||||
In addition to access rights, any active Linux Security Module (LSM) may
|
In addition to access rights, any active Linux Security Module (LSM) may
|
||||||
prevent access to a key if its policy so dictates.
|
prevent access to a key if its policy so dictates.
|
||||||
A key may be given a
|
A key may be given a
|
||||||
security label or other attribute by the LSM;
|
security label or other attribute by the LSM;
|
||||||
this label is retrievable via
|
this label is retrievable via
|
||||||
.BR keyctl_get_security (3).
|
.BR keyctl_get_security (3).
|
||||||
.P
|
.PP
|
||||||
See
|
See
|
||||||
.BR keyctl_chown (3),
|
.BR keyctl_chown (3),
|
||||||
.BR keyctl_describe (3),
|
.BR keyctl_describe (3),
|
||||||
|
@ -434,7 +434,7 @@ system call is the primary point of
|
||||||
access for user-space applications to find a key.
|
access for user-space applications to find a key.
|
||||||
(Internally, the kernel has something similar available
|
(Internally, the kernel has something similar available
|
||||||
for use by internal components that make use of keys.)
|
for use by internal components that make use of keys.)
|
||||||
.P
|
.PP
|
||||||
The search algorithm works as follows:
|
The search algorithm works as follows:
|
||||||
.IP (1) 4
|
.IP (1) 4
|
||||||
The process keyrings are searched in the following order: the thread
|
The process keyrings are searched in the following order: the thread
|
||||||
|
@ -467,10 +467,10 @@ If no valid matching key is found,
|
||||||
then the first noted error state is returned; otherwise, an
|
then the first noted error state is returned; otherwise, an
|
||||||
.B ENOKEY
|
.B ENOKEY
|
||||||
error is returned.
|
error is returned.
|
||||||
.P
|
.PP
|
||||||
It is also possible to search a specific keyring, in which case only steps
|
It is also possible to search a specific keyring, in which case only steps
|
||||||
(3) to (6) apply.
|
(3) to (6) apply.
|
||||||
.P
|
.PP
|
||||||
See
|
See
|
||||||
.BR request_key (2)
|
.BR request_key (2)
|
||||||
and
|
and
|
||||||
|
@ -485,18 +485,18 @@ will, if given a
|
||||||
argument, create a new key and then upcall to user space to
|
argument, create a new key and then upcall to user space to
|
||||||
instantiate the key.
|
instantiate the key.
|
||||||
This allows keys to be created on an as-needed basis.
|
This allows keys to be created on an as-needed basis.
|
||||||
.P
|
.PP
|
||||||
Typically,
|
Typically,
|
||||||
this will involve the kernel creating a new process that executes the
|
this will involve the kernel creating a new process that executes the
|
||||||
.BR request-key (8)
|
.BR request-key (8)
|
||||||
program, which will then execute the appropriate handler based on its
|
program, which will then execute the appropriate handler based on its
|
||||||
configuration.
|
configuration.
|
||||||
.P
|
.PP
|
||||||
The handler is passed a special authorization key that allows it
|
The handler is passed a special authorization key that allows it
|
||||||
and only it to instantiate the new key.
|
and only it to instantiate the new key.
|
||||||
This is also used to permit searches performed by the
|
This is also used to permit searches performed by the
|
||||||
handler program to also search the requester's keyrings.
|
handler program to also search the requester's keyrings.
|
||||||
.P
|
.PP
|
||||||
See
|
See
|
||||||
.BR request_key (2),
|
.BR request_key (2),
|
||||||
.BR keyctl_assume_authority (3),
|
.BR keyctl_assume_authority (3),
|
||||||
|
@ -814,7 +814,7 @@ note that each link in a keyring consumes 4 bytes of the keyring payload.
|
||||||
.SS Users
|
.SS Users
|
||||||
The Linux key-management facility has a number of users and usages,
|
The Linux key-management facility has a number of users and usages,
|
||||||
but is not limited to those that already exist.
|
but is not limited to those that already exist.
|
||||||
.P
|
.PP
|
||||||
In-kernel users of this facility include:
|
In-kernel users of this facility include:
|
||||||
.TP
|
.TP
|
||||||
Network filesystems - DNS
|
Network filesystems - DNS
|
||||||
|
@ -837,7 +837,7 @@ The CIFS filesystem uses keys to store passwords for accessing remote shares.
|
||||||
Module verification
|
Module verification
|
||||||
The kernel build process can be made to cryptographically sign modules.
|
The kernel build process can be made to cryptographically sign modules.
|
||||||
That signature is then checked when a module is loaded.
|
That signature is then checked when a module is loaded.
|
||||||
.P
|
.PP
|
||||||
User-space users of this facility include:
|
User-space users of this facility include:
|
||||||
.TP
|
.TP
|
||||||
Kerberos key storage
|
Kerberos key storage
|
||||||
|
|
|
@ -17,7 +17,7 @@ The process keyring is a keyring used to anchor keys on behalf of a process.
|
||||||
It is created only when a process requests it.
|
It is created only when a process requests it.
|
||||||
The process keyring has the name (description)
|
The process keyring has the name (description)
|
||||||
.IR _pid .
|
.IR _pid .
|
||||||
.P
|
.PP
|
||||||
A special serial number value,
|
A special serial number value,
|
||||||
.BR KEY_SPEC_PROCESS_KEYRING ,
|
.BR KEY_SPEC_PROCESS_KEYRING ,
|
||||||
is defined that can be used in lieu of the actual serial number of
|
is defined that can be used in lieu of the actual serial number of
|
||||||
|
|
|
@ -64,14 +64,14 @@ and
|
||||||
.BR _exit (2)
|
.BR _exit (2)
|
||||||
excepting that the keyring is destroyed when the UID record is destroyed when
|
excepting that the keyring is destroyed when the UID record is destroyed when
|
||||||
the last process pinning it exits.
|
the last process pinning it exits.
|
||||||
.P
|
.PP
|
||||||
If it is necessary for a key associated with a user to exist beyond the UID
|
If it is necessary for a key associated with a user to exist beyond the UID
|
||||||
record being garbage collected\(emfor example, for use by a
|
record being garbage collected\(emfor example, for use by a
|
||||||
.BR cron (8)
|
.BR cron (8)
|
||||||
script\(emthen the
|
script\(emthen the
|
||||||
.BR persistent-keyring (7)
|
.BR persistent-keyring (7)
|
||||||
should be used instead.
|
should be used instead.
|
||||||
.P
|
.PP
|
||||||
If a user keyring does not exist when it is accessed, it will be created.
|
If a user keyring does not exist when it is accessed, it will be created.
|
||||||
.SH SEE ALSO
|
.SH SEE ALSO
|
||||||
.ad l
|
.ad l
|
||||||
|
|
|
@ -13,7 +13,7 @@ to the dynamic linker can be passed and, in the ELF case, the dynamic linker
|
||||||
which is stored in the
|
which is stored in the
|
||||||
.B .interp
|
.B .interp
|
||||||
section of the program is executed) or directly by running:
|
section of the program is executed) or directly by running:
|
||||||
.P
|
.PP
|
||||||
.I /lib/ld\-linux.so.*
|
.I /lib/ld\-linux.so.*
|
||||||
[OPTIONS] [PROGRAM [ARGUMENTS]]
|
[OPTIONS] [PROGRAM [ARGUMENTS]]
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
|
|
Loading…
Reference in New Issue