From 5685b18c275e6b7cf0bde92be1e73c137690be90 Mon Sep 17 00:00:00 2001 From: Michael Kerrisk Date: Thu, 3 Nov 2016 19:05:38 +0100 Subject: [PATCH] add_key.2, keyctl.2, request_key.2, syscalls.2: Correct kernel version for keys syscalls Signed-off-by: Michael Kerrisk --- man2/add_key.2 | 2 +- man2/keyctl.2 | 28 ++++++++++++++-------------- man2/request_key.2 | 2 +- man2/syscalls.2 | 6 +++--- 4 files changed, 19 insertions(+), 19 deletions(-) diff --git a/man2/add_key.2 b/man2/add_key.2 index cba57b3cd..98c5aa638 100644 --- a/man2/add_key.2 +++ b/man2/add_key.2 @@ -192,7 +192,7 @@ The keyring doesn't exist. .B ENOMEM Insufficient memory to create a key. .SH VERSIONS -This system call first appeared in Linux 2.6.11. +This system call first appeared in Linux 2.6.10. .SH CONFORMING TO This system call is a nonstandard Linux extension. .SH NOTES diff --git a/man2/keyctl.2 b/man2/keyctl.2 index 3230ec288..e9f38cfe5 100644 --- a/man2/keyctl.2 +++ b/man2/keyctl.2 @@ -64,7 +64,7 @@ The permitted values for .I operation are: .TP -.BR KEYCTL_GET_KEYRING_ID " (since Linux 2.6.11)" +.BR KEYCTL_GET_KEYRING_ID " (since Linux 2.6.10)" Map a special key ID to a real key ID for this process. This operation looks up the special key whose ID is provided in @@ -155,7 +155,7 @@ This operation is exposed by via the function .BR keyctl_get_keyring_ID (3). .TP -.BR KEYCTL_JOIN_SESSION_KEYRING " (since Linux 2.6.11)" +.BR KEYCTL_JOIN_SESSION_KEYRING " (since Linux 2.6.10)" Replace the session keyring this process subscribes to with a new session keyring. .\" This may be useful in conjunction with some sort of @@ -202,7 +202,7 @@ This operation is exposed by via the function .BR keyctl_join_session_keyring (3). .TP -.BR KEYCTL_UPDATE " (since Linux 2.6.11)" +.BR KEYCTL_UPDATE " (since Linux 2.6.10)" Update a key's data payload. The @@ -236,7 +236,7 @@ This operation is exposed by via the function .BR keyctl_update (3). .TP -.BR KEYCTL_REVOKE " (since Linux 2.6.11)" +.BR KEYCTL_REVOKE " (since Linux 2.6.10)" Revoke the key with the ID provided in .I arg2 (cast to @@ -268,7 +268,7 @@ This operation is exposed by via the function .BR keyctl_revoke (3). .TP -.BR KEYCTL_CHOWN " (since Linux 2.6.11)" +.BR KEYCTL_CHOWN " (since Linux 2.6.10)" Change the ownership (user and group ID) of a key. The @@ -311,7 +311,7 @@ This operation is exposed by via the function .BR keyctl_chown (3). .TP -.BR KEYCTL_SETPERM " (since Linux 2.6.11)" +.BR KEYCTL_SETPERM " (since Linux 2.6.10)" Change the permissions of the key with the ID provided in the .I arg2 argument (cast to @@ -511,7 +511,7 @@ This operation is exposed by via the function .BR keyctl_setperm (3). .TP -.BR KEYCTL_DESCRIBE " (since Linux 2.6.11)" +.BR KEYCTL_DESCRIBE " (since Linux 2.6.10)" Obtain a string describing the attributes of a specified key. The ID of the key to be described is specified in @@ -615,7 +615,7 @@ This operation is exposed by via the function .BR keyctl_clear (3). .TP -.BR KEYCTL_LINK " (since Linux 2.6.11)" +.BR KEYCTL_LINK " (since Linux 2.6.10)" Create a link from a keyring to a key. The key to be linked is specified in @@ -656,7 +656,7 @@ This operation is exposed by via the function .BR keyctl_link (3). .TP -.BR KEYCTL_UNLINK " (since Linux 2.6.11)" +.BR KEYCTL_UNLINK " (since Linux 2.6.10)" Unlink a key from a keyring. The ID of the key to be unlinked is specified in @@ -688,7 +688,7 @@ This operation is exposed by via the function .BR keyctl_unlink (3). .TP -.BR KEYCTL_SEARCH " (since Linux 2.6.11)" +.BR KEYCTL_SEARCH " (since Linux 2.6.10)" Search for a key in a keyring tree, returning its ID and optionally linking it to a specified keyring. @@ -755,7 +755,7 @@ This operation is exposed by via the function .BR keyctl_search (3). .TP -.BR KEYCTL_READ " (since Linux 2.6.11)" +.BR KEYCTL_READ " (since Linux 2.6.10)" Read the payload data of a key. The ID of the key whose payload is to be read is specified in @@ -815,7 +815,7 @@ This operation is exposed by via the function .BR keyctl_read (3). .TP -.BR KEYCTL_INSTANTIATE " (since Linux 2.6.11)" +.BR KEYCTL_INSTANTIATE " (since Linux 2.6.10)" (Positively) instantiate an uninstantiated key with a specified payload. The ID of the key to be instantiated is provided in @@ -859,7 +859,7 @@ This operation is exposed by via the function .BR keyctl_instantiate (3). .TP -.BR KEYCTL_NEGATE " (since Linux 2.6.11)" +.BR KEYCTL_NEGATE " (since Linux 2.6.10)" Negatively instantiate an uninstantiated key. This operation is equivalent to the call: @@ -1629,7 +1629,7 @@ or the parent process is .BR init (1) or a kernel thread. .SH VERSIONS -This system call first appeared in Linux 2.6.11. +This system call first appeared in Linux 2.6.10. .SH CONFORMING TO This system call is a nonstandard Linux extension. .SH NOTES diff --git a/man2/request_key.2 b/man2/request_key.2 index 142e35037..0fe383322 100644 --- a/man2/request_key.2 +++ b/man2/request_key.2 @@ -319,7 +319,7 @@ No matching key was found. .B ENOMEM Insufficient memory to create a key. .SH VERSIONS -This system call first appeared in Linux 2.6.11. +This system call first appeared in Linux 2.6.10. .SH CONFORMING TO This system call is a nonstandard Linux extension. .SH NOTES diff --git a/man2/syscalls.2 b/man2/syscalls.2 index 3ddf8b80a..356938ca1 100644 --- a/man2/syscalls.2 +++ b/man2/syscalls.2 @@ -164,7 +164,7 @@ l l l. \fBaccept4\fP(2) 2.6.28 \fBaccess\fP(2) 1.0 \fBacct\fP(2) 1.0 -\fBadd_key\fP(2) 2.6.11 +\fBadd_key\fP(2) 2.6.10 \fBadjtimex\fP(2) 1.0 \fBalarm\fP(2) 1.0 \fBalloc_hugepages\fP(2) 2.5.36 Removed in 2.5.44 @@ -315,7 +315,7 @@ T} \fBkexec_load\fP(2) 2.6.13 .\" The entry in the syscall table was reserved starting in 2.6.7 .\" Was named sys_kexec_load() from 2.6.7 to 2.6.16 -\fBkeyctl\fP(2) 2.6.11 +\fBkeyctl\fP(2) 2.6.10 \fBkill\fP(2) 1.0 \fBlchown\fP(2) 1.0 T{ See \fBchown\fP(2) for @@ -450,7 +450,7 @@ T} \fBrename\fP(2) 1.0 \fBrenameat\fP(2) 2.6.16 \fBrenameat2\fP(2) 3.15 -\fBrequest_key\fP(2) 2.6.11 +\fBrequest_key\fP(2) 2.6.10 \fBrestart_syscall\fP(2) 2.6 \fBrmdir\fP(2) 1.0 \fBrt_sigaction\fP(2) 2.2