File: KEYCTL_SETPERM.2const

package info (click to toggle)
manpages 6.15-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 20,184 kB
  • sloc: sh: 575; python: 222; perl: 190; makefile: 29; lisp: 22
file content (273 lines) | stat: -rw-r--r-- 5,344 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
.\" Copyright, the authors of the Linux man-pages project
.\"
.\" SPDX-License-Identifier: Linux-man-pages-copyleft
.\"
.TH KEYCTL_SETPERM 2const 2025-05-17 "Linux man-pages (unreleased)"
.SH NAME
KEYCTL_SETPERM
\-
change the permissions mask on a key
.SH LIBRARY
Standard C library
.RI ( libc ,\~ \-lc )
.SH SYNOPSIS
.nf
.BR "#include <linux/keyctl.h>" "  /* Definition of " KEY* " constants */"
.BR "#include <sys/syscall.h>" "   /* Definition of " SYS_* " constants */"
.B #include <unistd.h>
.P
.BI "long syscall(SYS_keyctl, KEYCTL_SETPERM, key_serial_t " key ,
.BI "             key_perm_t " perms );
.fi
.SH DESCRIPTION
Change the permissions of the key with the ID provided in the
.I key
argument
to the permissions provided in the
.I perms
argument.
.P
If the caller doesn't have the
.B CAP_SYS_ADMIN
capability, it can change permissions only for the keys it owns.
(More precisely: the caller's filesystem UID must match the UID of the key.)
.P
The key must grant
.I setattr
permission to the caller
.I regardless
of the caller's capabilities.
.\" FIXME Above, is it really intended that a privileged process can't
.\" override the lack of the 'setattr' permission?
.P
The permissions in
.I perms
specify masks of available operations
for each of the following user categories:
.TP
.IR possessor " (since Linux 2.6.14)"
.\" commit 664cceb0093b755739e56572b836a99104ee8a75
This is the permission granted to a process that possesses the key
(has it attached searchably to one of the process's keyrings);
see
.BR keyrings (7).
.TP
.I user
This is the permission granted to a process
whose filesystem UID matches the UID of the key.
.TP
.I group
This is the permission granted to a process
whose filesystem GID or any of its supplementary GIDs
matches the GID of the key.
.TP
.I other
This is the permission granted to other processes
that do not match the
.I user
and
.I group
categories.
.P
The
.IR user ,
.IR group ,
and
.I other
categories are exclusive:
if a process matches the
.I user
category, it will not receive permissions granted in the
.I group
category; if a process matches the
.I user
or
.I group
category, then it will not receive permissions granted in the
.I other
category.
.P
The
.I possessor
category grants permissions that are cumulative with the grants from the
.IR user ,
.IR group ,
or
.I other
category.
.P
Each permission mask is eight bits in size,
with only six bits currently used.
The available permissions are:
.TP
.I view
This permission allows reading attributes of a key.
.IP
This permission is required for the
.BR KEYCTL_DESCRIBE (2const)
operation.
.P
The permission bits for each category are:
.RS
.TP
.B KEY_POS_VIEW
.TQ
.B KEY_USR_VIEW
.TQ
.B KEY_GRP_VIEW
.TQ
.B KEY_OTH_VIEW
.RE
.TP
.I read
This permission allows reading a key's payload.
.IP
This permission is required for the
.BR KEYCTL_READ (2const)
operation.
.IP
The permission bits for each category are
.RS
.TP
.B KEY_POS_READ
.TQ
.B KEY_USR_READ
.TQ
.B KEY_GRP_READ
.TQ
.B KEY_OTH_READ
.RE
.TP
.I write
This permission allows update or instantiation of a key's payload.
For a keyring, it allows keys to be linked and unlinked from the keyring,
.IP
This permission is required for the
.BR KEYCTL_UPDATE (2const),
.BR KEYCTL_REVOKE (2const),
.BR KEYCTL_CLEAR (2const),
.BR KEYCTL_LINK (2const),
and
.BR KEYCTL_UNLINK (2const)
operations.
.IP
The permission bits for each category are:
.RS
.TP
.B KEY_POS_WRITE
.TQ
.B KEY_USR_WRITE
.TQ
.B KEY_GRP_WRITE
.TQ
.B KEY_OTH_WRITE
.RE
.TP
.I search
This permission allows keyrings to be searched and keys to be found.
Searches can recurse only into nested keyrings that have
.I search
permission set.
.IP
This permission is required for the
.BR KEYCTL_GET_KEYRING_ID (2const),
.BR KEYCTL_JOIN_SESSION_KEYRING (2const),
.BR KEYCTL_SEARCH (2const),
and
.B KEYCTL_INVALIDATE (2const)
operations.
.IP
The permission bits for each category are:
.RS
.TP
.B KEY_POS_SEARCH
.TQ
.B KEY_USR_SEARCH
.TQ
.B KEY_GRP_SEARCH
.TQ
.B KEY_OTH_SEARCH
.RE
.TP
.I link
This permission allows a key or keyring to be linked to.
.IP
This permission is required for the
.BR KEYCTL_LINK (2const)
and
.BR KEYCTL_SESSION_TO_PARENT (2const)
operations.
.IP
The permission bits for each category are:
.RS
.TP
.B KEY_POS_LINK
.TQ
.B KEY_USR_LINK
.TQ
.B KEY_GRP_LINK
.TQ
.B KEY_OTH_LINK
.RE
.TP
.IR setattr " (since Linux 2.6.15)"
This permission allows a key's UID, GID, and permissions mask to be changed.
.IP
This permission is required for the
.BR KEYCTL_REVOKE (2const),
.BR KEYCTL_CHOWN (2const),
and
.B KEYCTL_SETPERM (2const)
operations.
.IP
The permission bits for each category are:
.RS
.TP
.B KEY_POS_SETATTR
.TQ
.B KEY_USR_SETATTR
.TQ
.B KEY_GRP_SETATTR
.TQ
.B KEY_OTH_SETATTR
.RE
.P
As a convenience, the following macros are defined as masks for
all of the permission bits in each of the user categories:
.RS
.TP
.B KEY_POS_ALL
.TQ
.B KEY_USR_ALL
.TQ
.B KEY_GRP_ALL
.TQ
.B KEY_OTH_ALL
.RE
.SH RETURN VALUE
On success,
0 is returned.
.P
On error, \-1 is returned, and
.I errno
is set to indicate the error.
.SH ERRORS
.TP
.B EINVAL
.I operation
was
.B KEYCTL_SETPERM
and an invalid permission bit was specified in
.IR perms .
.SH VERSIONS
A wrapper is provided in the
.I libkeyutils
library:
.BR keyctl_setperm (3).
.SH STANDARDS
Linux.
.SH HISTORY
Linux 2.6.10.
.SH SEE ALSO
.BR keyctl (2),
.BR keyctl_setperm (3)