NAME |LIBRARY |SYNOPSIS |DESCRIPTION |RETURN VALUE |VERSIONS |STANDARDS |HISTORY |SEE ALSO |COLOPHON | |
KEYCTL_SET_REQKEY_KEYRING(2const)KEYCTL_SET_REQKEY_KEYRING(2const)KEYCTL_SET_REQKEY_KEYRING - set the implicit destination keyring
Standard C library (libc,-lc)
#include <linux/keyctl.h>/* Definition ofKEY*constants */#include <sys/syscall.h>/* Definition ofSYS_*constants */#include <unistd.h>long syscall(SYS_keyctl, KEYCTL_SET_REQKEY_KEYRING, intop);
Set the default keyring to which implicitly requested keys will be linked for this thread, and return the previous setting. Implicit key requests are those made by internal kernel components, such as can occur when, for example, opening files on an AFS or NFS filesystem. Setting the default keyring also has an effect when requesting a key from user space; seerequest_key(2) for details. Theop argument should contain one of the following values, to specify the new default keyring:KEY_REQKEY_DEFL_NO_CHANGE Don't change the default keyring. This can be used to discover the current default keyring (without changing it).KEY_REQKEY_DEFL_DEFAULT This selects the default behaviour, which is to use the thread-specific keyring if there is one, otherwise the process-specific keyring if there is one, otherwise the session keyring if there is one, otherwise the UID-specific session keyring, otherwise the user-specific keyring.KEY_REQKEY_DEFL_THREAD_KEYRING Use the thread-specific keyring (thread-keyring(7)) as the new default keyring.KEY_REQKEY_DEFL_PROCESS_KEYRING Use the process-specific keyring (process-keyring(7)) as the new default keyring.KEY_REQKEY_DEFL_SESSION_KEYRING Use the session-specific keyring (session-keyring(7)) as the new default keyring.KEY_REQKEY_DEFL_USER_KEYRING Use the UID-specific keyring (user-keyring(7)) as the new default keyring.KEY_REQKEY_DEFL_USER_SESSION_KEYRING Use the UID-specific session keyring (user-session-keyring(7)) as the new default keyring.KEY_REQKEY_DEFL_REQUESTOR_KEYRING(since Linux 2.6.29) Use the requestor keyring. All other values are invalid. The setting controlled by this operation is inherited by the child offork(2) and preserved acrossexecve(2).
On success, the ID of the previous default keyring to which implicitly requested keys were linked (one ofKEY_REQKEY_DEFL_USER_*). On error, -1 is returned, anderrno is set to indicate the error.
A wrapper is provided in thelibkeyutils library:keyctl_set_reqkey_keyring(3)
Linux.
Linux 2.6.13.
keyctl(2),keyctl_set_reqkey_keyring(3)
This page is part of theman-pages (Linux kernel and C library user-space interface documentation) project. Information about the project can be found at ⟨https://www.kernel.org/doc/man-pages/⟩. If you have a bug report for this manual page, see ⟨https://git.kernel.org/pub/scm/docs/man-pages/man-pages.git/tree/CONTRIBUTING⟩. This page was obtained from the tarball man-pages-6.15.tar.gz fetched from ⟨https://mirrors.edge.kernel.org/pub/linux/docs/man-pages/⟩ on 2025-08-11. If you discover any rendering problems in this HTML version of the page, or you believe there is a better or more up- to-date source for the page, or you have corrections or improvements to the information in this COLOPHON (which isnot part of the original manual page), send a mail to man-pages@man7.orgLinux man-pages 6.15 2025-05-1K7EYCTL_SET_REQKEY_KEYRING(2const)Pages that refer to this page:keyctl(2)
HTML rendering created 2025-09-06 byMichael Kerrisk, author ofThe Linux Programming Interface. For details of in-depthLinux/UNIX system programming training courses that I teach, lookhere. Hosting byjambit GmbH. | ![]() |