RPC_QUEUE_UPCALL(9) Linux Networking RPC_QUEUE_UPCALL(9)NAME
rpc_queue_upcall - queue an upcall message to userspace
SYNOPSIS
int rpc_queue_upcall(struct inode * inode, struct rpc_pipe_msg * msg);
ARGUMENTS
inode
inode of upcall pipe on which to queue given message
msg
message to queue
DESCRIPTION
Call with an inode created by rpc_mkpipe to queue an upcall. A userspace process may then later read the upcall by performing a read on an
open file for this inode. It is up to the caller to initialize the fields of msg (other than msg->list) appropriately.
COPYRIGHT Kernel Hackers Manual 2.6. July 2010 RPC_QUEUE_UPCALL(9)
Check Out this Related Man Page
CIFS.UPCALL(8) System Administration tools CIFS.UPCALL(8)NAME
cifs.upcall - Userspace upcall helper for Common Internet File System (CIFS)
SYNOPSIS
cifs.upcall [--trust-dns|-t] [--version|-v] {keyid}
DESCRIPTION
This tool is part of the cifs-utils suite.
cifs.upcall is a userspace helper program for the linux CIFS client filesystem. There are a number of activities that the kernel cannot
easily do itself. This program is a callout program that does these things for the kernel and then returns the result.
cifs.upcall is generally intended to be run when the kernel calls request-key(8) for a particular key type. While it can be run directly
from the command-line, it's not generally intended to be run that way.
OPTIONS -c
This option is deprecated and is currently ignored.
--trust-dns|-t
With krb5 upcalls, the name used as the host portion of the service principal defaults to the hostname portion of the UNC. This option
allows the upcall program to reverse resolve the network address of the server in order to get the hostname.
This is less secure than not trusting DNS. When using this option, it's possible that an attacker could get control of DNS and trick
the client into mounting a different server altogether. It's preferable to instead add server principals to the KDC for every possible
hostname, but this option exists for cases where that isn't possible. The default is to not trust reverse hostname lookups in this
fashion.
--version|-v
Print version number and exit.
CONFIGURATION FOR KEYCTL
cifs.upcall is designed to be called from the kernel via the request-key callout program. This requires that request-key be told where and
how to call this program. The current cifs.upcall program handles two different key types:
cifs.spnego
This keytype is for retrieving kerberos session keys
dns_resolver
This key type is for resolving hostnames into IP addresses
To make this program useful for CIFS, you'll need to set up entries for them in request-key.conf(5). Here's an example of an entry for each
key type:
#OPERATION TYPE D C PROGRAM ARG1 ARG2...
#========= ============= = = ================================
create cifs.spnego * * /usr/local/sbin/cifs.upcall %k
create dns_resolver * * /usr/local/sbin/cifs.upcall %k
See request-key.conf5() for more info on each field.
SEE ALSO request-key.conf(5), mount.cifs(8)AUTHOR
Igor Mammedov wrote the cifs.upcall program.
Jeff Layton authored this manpage.
The maintainer of the Linux CIFS VFS is Steve French.
The Linux CIFS Mailing list is the preferred place to ask questions regarding these programs.
cifs-utils 4.0 02/07/2010 CIFS.UPCALL(8)
Hi all,
I want to create a new user and grant him ONLY transfer files access to a specific directory where he can only upload and read the files. He should be restricted to this activity only.
Regards (6 Replies)
Hi everyone,
I know the following questions are noobish questions but I am asking them because I am confused about the basics of history behind UNIX and LINUX.
Ok onto business, my questions are-:
Was/Is UNIX ever an open source operating system ?
If UNIX was... (21 Replies)
Hi,
Last 2 weeks I have searched many forums and i haven't found the answer for the question:
How to get all command output to Putty title?
Needed it for other programs to know when some jobs on a server is done and is it done right or wrong. Plink stdout and stdin wasn't working, i used many... (1 Reply)
anyone have any idea how do to this with auth_attr?
I suspect if I grant him
solaris.device.:RO::Device Allocation::help=DevAllocHeader.html
that will work but I'm unsure. Just looking for a second opinion. (10 Replies)
I am looking for a stable, reliable system to replace my current Windows systems in the home. These are simple systems that I purchased from the local Big Box store.
I have heard many good things about Unix and it's various children and it sounds like a good option to me. I have worked... (2 Replies)
We have a lot of scripts using cut as :
cut -c 0-8 --works for cut (GNU coreutils) 5.97, but does not work for cut (GNU coreutils) 8.4.
Gives error -
cut: fields and positions are numbered from 1
Try `cut --help' for more information.
The position needs to start with 1 for later... (6 Replies)
I've got a problem with a proxy configuration. We have an LDAP group that lists all users who are authorised to use the proxy to FTP (usually Filezilla) out to the world, and by implication those not in the group should be denied. My users are delighted that this has been enabled and those that... (9 Replies)
hi folks,
how to using tar with exclude directory and compress it using tar.Z
i only know how to exclude dir only with this command below:
tar -cvf /varios/restore/test.tar -X excludefile.txt /jfma/test1/
how to compress it using 1 command?
Thanx
Please use CODE tags as... (6 Replies)
Hello All,
I had recently learnt a bit of Docker(which provides containerization process).
Here are some of my learning points from it.
Let us start first with very basic question:
What is Docker:
Docker is a platform for sysadmins and developers to DEPLOY, DEVELOP and RUN applications ... (7 Replies)
What is the point of this? Whenever I close my shell it appends to the history file without adding this. I have never seen it overwrite my history file.
# When the shell exits, append to the history file instead of overwriting it
shopt -s histappend (3 Replies)
Hello for all,
I am testing the behavior of a 32 bit application running on Solaris 5.10 (SPARC), and realize it reaches 4GB of memory and then crashes.
It doesn't matter the amount of used memory as application is intended to perform many transactions; rather, what I want to achieve is to... (2 Replies)