From 139ac68a738cd793e67056bac39ab2061043c1da Mon Sep 17 00:00:00 2001 From: Eric Biggers Date: Tue, 9 Jul 2019 14:42:57 -0700 Subject: sys/linux: update key descriptions - Add KEYCTL_MOVE (new in v5.3) - Add KEYCTL_CAPABILITIES (new in v5.3) - Add KEYCTL_GRANT_PERMISSION (new in v5.3) - Remove KEY_PERM_UNDEF (was only ever in an internal kernel header, not in UAPI; removed in v5.3) --- executor/syscalls.h | 15 +++++++++++++++ 1 file changed, 15 insertions(+) (limited to 'executor/syscalls.h') diff --git a/executor/syscalls.h b/executor/syscalls.h index fb6b5f64f..6e1ed2f50 100644 --- a/executor/syscalls.h +++ b/executor/syscalls.h @@ -3606,6 +3606,9 @@ const call_t syscalls[] = { {"kcmp", 349}, {"kcmp$KCMP_EPOLL_TFD", 349}, {"kexec_load", 283}, + {"keyctl$KEYCTL_CAPABILITIES", 288}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 288}, + {"keyctl$KEYCTL_MOVE", 288}, {"keyctl$KEYCTL_PKEY_DECRYPT", 288}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 288}, {"keyctl$KEYCTL_PKEY_QUERY", 288}, @@ -6344,6 +6347,9 @@ const call_t syscalls[] = { {"kcmp", 312}, {"kcmp$KCMP_EPOLL_TFD", 312}, {"kexec_load", 246}, + {"keyctl$KEYCTL_CAPABILITIES", 250}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 250}, + {"keyctl$KEYCTL_MOVE", 250}, {"keyctl$KEYCTL_PKEY_DECRYPT", 250}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 250}, {"keyctl$KEYCTL_PKEY_QUERY", 250}, @@ -9041,6 +9047,9 @@ const call_t syscalls[] = { {"kcmp", 378}, {"kcmp$KCMP_EPOLL_TFD", 378}, {"kexec_load", 347}, + {"keyctl$KEYCTL_CAPABILITIES", 311}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 311}, + {"keyctl$KEYCTL_MOVE", 311}, {"keyctl$KEYCTL_PKEY_DECRYPT", 311}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 311}, {"keyctl$KEYCTL_PKEY_QUERY", 311}, @@ -11726,6 +11735,9 @@ const call_t syscalls[] = { {"kcmp", 272}, {"kcmp$KCMP_EPOLL_TFD", 272}, {"kexec_load", 104}, + {"keyctl$KEYCTL_CAPABILITIES", 219}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 219}, + {"keyctl$KEYCTL_MOVE", 219}, {"keyctl$KEYCTL_PKEY_DECRYPT", 219}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 219}, {"keyctl$KEYCTL_PKEY_QUERY", 219}, @@ -14386,6 +14398,9 @@ const call_t syscalls[] = { {"kcmp", 354}, {"kcmp$KCMP_EPOLL_TFD", 354}, {"kexec_load", 268}, + {"keyctl$KEYCTL_CAPABILITIES", 271}, + {"keyctl$KEYCTL_GRANT_PERMISSION", 271}, + {"keyctl$KEYCTL_MOVE", 271}, {"keyctl$KEYCTL_PKEY_DECRYPT", 271}, {"keyctl$KEYCTL_PKEY_ENCRYPT", 271}, {"keyctl$KEYCTL_PKEY_QUERY", 271}, -- cgit mrf-deployment