aboutsummaryrefslogtreecommitdiffstats
path: root/executor/syscalls.h
diff options
context:
space:
mode:
authorEric Biggers <ebiggers@google.com>2019-07-09 14:42:57 -0700
committerDmitry Vyukov <dvyukov@google.com>2019-07-15 13:44:02 +0300
commit139ac68a738cd793e67056bac39ab2061043c1da (patch)
treeec3d471456aa7135f9444595e65102d7277f640f /executor/syscalls.h
parenta827bf70d7e428a73ad721c03244abfd8bfd9b4f (diff)
sys/linux: update key descriptions
- Add KEYCTL_MOVE (new in v5.3) - Add KEYCTL_CAPABILITIES (new in v5.3) - Add KEYCTL_GRANT_PERMISSION (new in v5.3) - Remove KEY_PERM_UNDEF (was only ever in an internal kernel header, not in UAPI; removed in v5.3)
Diffstat (limited to 'executor/syscalls.h')
-rw-r--r--executor/syscalls.h15
1 files changed, 15 insertions, 0 deletions
diff --git a/executor/syscalls.h b/executor/syscalls.h
index fb6b5f64f..6e1ed2f50 100644
--- a/executor/syscalls.h
+++ b/executor/syscalls.h
@@ -3606,6 +3606,9 @@ const call_t syscalls[] = {
{"kcmp", 349},
{"kcmp$KCMP_EPOLL_TFD", 349},
{"kexec_load", 283},
+ {"keyctl$KEYCTL_CAPABILITIES", 288},
+ {"keyctl$KEYCTL_GRANT_PERMISSION", 288},
+ {"keyctl$KEYCTL_MOVE", 288},
{"keyctl$KEYCTL_PKEY_DECRYPT", 288},
{"keyctl$KEYCTL_PKEY_ENCRYPT", 288},
{"keyctl$KEYCTL_PKEY_QUERY", 288},
@@ -6344,6 +6347,9 @@ const call_t syscalls[] = {
{"kcmp", 312},
{"kcmp$KCMP_EPOLL_TFD", 312},
{"kexec_load", 246},
+ {"keyctl$KEYCTL_CAPABILITIES", 250},
+ {"keyctl$KEYCTL_GRANT_PERMISSION", 250},
+ {"keyctl$KEYCTL_MOVE", 250},
{"keyctl$KEYCTL_PKEY_DECRYPT", 250},
{"keyctl$KEYCTL_PKEY_ENCRYPT", 250},
{"keyctl$KEYCTL_PKEY_QUERY", 250},
@@ -9041,6 +9047,9 @@ const call_t syscalls[] = {
{"kcmp", 378},
{"kcmp$KCMP_EPOLL_TFD", 378},
{"kexec_load", 347},
+ {"keyctl$KEYCTL_CAPABILITIES", 311},
+ {"keyctl$KEYCTL_GRANT_PERMISSION", 311},
+ {"keyctl$KEYCTL_MOVE", 311},
{"keyctl$KEYCTL_PKEY_DECRYPT", 311},
{"keyctl$KEYCTL_PKEY_ENCRYPT", 311},
{"keyctl$KEYCTL_PKEY_QUERY", 311},
@@ -11726,6 +11735,9 @@ const call_t syscalls[] = {
{"kcmp", 272},
{"kcmp$KCMP_EPOLL_TFD", 272},
{"kexec_load", 104},
+ {"keyctl$KEYCTL_CAPABILITIES", 219},
+ {"keyctl$KEYCTL_GRANT_PERMISSION", 219},
+ {"keyctl$KEYCTL_MOVE", 219},
{"keyctl$KEYCTL_PKEY_DECRYPT", 219},
{"keyctl$KEYCTL_PKEY_ENCRYPT", 219},
{"keyctl$KEYCTL_PKEY_QUERY", 219},
@@ -14386,6 +14398,9 @@ const call_t syscalls[] = {
{"kcmp", 354},
{"kcmp$KCMP_EPOLL_TFD", 354},
{"kexec_load", 268},
+ {"keyctl$KEYCTL_CAPABILITIES", 271},
+ {"keyctl$KEYCTL_GRANT_PERMISSION", 271},
+ {"keyctl$KEYCTL_MOVE", 271},
{"keyctl$KEYCTL_PKEY_DECRYPT", 271},
{"keyctl$KEYCTL_PKEY_ENCRYPT", 271},
{"keyctl$KEYCTL_PKEY_QUERY", 271},