diff options
| author | Eric Biggers <ebiggers@google.com> | 2019-07-09 14:42:57 -0700 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2019-07-15 13:44:02 +0300 |
| commit | 139ac68a738cd793e67056bac39ab2061043c1da (patch) | |
| tree | ec3d471456aa7135f9444595e65102d7277f640f /executor/syscalls.h | |
| parent | a827bf70d7e428a73ad721c03244abfd8bfd9b4f (diff) | |
sys/linux: update key descriptions
- Add KEYCTL_MOVE (new in v5.3)
- Add KEYCTL_CAPABILITIES (new in v5.3)
- Add KEYCTL_GRANT_PERMISSION (new in v5.3)
- Remove KEY_PERM_UNDEF (was only ever in an internal kernel header,
not in UAPI; removed in v5.3)
Diffstat (limited to 'executor/syscalls.h')
| -rw-r--r-- | executor/syscalls.h | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/executor/syscalls.h b/executor/syscalls.h index fb6b5f64f..6e1ed2f50 100644 --- a/executor/syscalls.h +++ b/executor/syscalls.h @@ -3606,6 +3606,9 @@ const call_t syscalls[] = { {"kcmp", 349}, {"kcmp$KCMP_EPOLL_TFD", 349}, {"kexec_load", 283}, + {"keyctl$KEYCTL_CAPABILITIES", 288}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 288}, + {"keyctl$KEYCTL_MOVE", 288}, {"keyctl$KEYCTL_PKEY_DECRYPT", 288}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 288}, {"keyctl$KEYCTL_PKEY_QUERY", 288}, @@ -6344,6 +6347,9 @@ const call_t syscalls[] = { {"kcmp", 312}, {"kcmp$KCMP_EPOLL_TFD", 312}, {"kexec_load", 246}, + {"keyctl$KEYCTL_CAPABILITIES", 250}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 250}, + {"keyctl$KEYCTL_MOVE", 250}, {"keyctl$KEYCTL_PKEY_DECRYPT", 250}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 250}, {"keyctl$KEYCTL_PKEY_QUERY", 250}, @@ -9041,6 +9047,9 @@ const call_t syscalls[] = { {"kcmp", 378}, {"kcmp$KCMP_EPOLL_TFD", 378}, {"kexec_load", 347}, + {"keyctl$KEYCTL_CAPABILITIES", 311}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 311}, + {"keyctl$KEYCTL_MOVE", 311}, {"keyctl$KEYCTL_PKEY_DECRYPT", 311}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 311}, {"keyctl$KEYCTL_PKEY_QUERY", 311}, @@ -11726,6 +11735,9 @@ const call_t syscalls[] = { {"kcmp", 272}, {"kcmp$KCMP_EPOLL_TFD", 272}, {"kexec_load", 104}, + {"keyctl$KEYCTL_CAPABILITIES", 219}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 219}, + {"keyctl$KEYCTL_MOVE", 219}, {"keyctl$KEYCTL_PKEY_DECRYPT", 219}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 219}, {"keyctl$KEYCTL_PKEY_QUERY", 219}, @@ -14386,6 +14398,9 @@ const call_t syscalls[] = { {"kcmp", 354}, {"kcmp$KCMP_EPOLL_TFD", 354}, {"kexec_load", 268}, + {"keyctl$KEYCTL_CAPABILITIES", 271}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 271}, + {"keyctl$KEYCTL_MOVE", 271}, {"keyctl$KEYCTL_PKEY_DECRYPT", 271}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 271}, {"keyctl$KEYCTL_PKEY_QUERY", 271}, |
