THREAD-KEYRING(7) Linux Programmer's Manual THREAD-KEYRING(7)NAME
thread-keyring - per-thread keyring
DESCRIPTION
The thread keyring is a keyring used to anchor keys on behalf of a process. It is created only when a thread requests it. The thread
keyring has the name (description) _tid.
A special serial number value, KEY_SPEC_THREAD_KEYRING, is defined that can be used in lieu of the actual serial number of the calling
thread's thread keyring.
From the keyctl(1) utility, '@t' can be used instead of a numeric key ID in much the same way, but as keyctl(1) is a program run after
forking, this is of no utility.
Thread keyrings are not inherited across clone(2) and fork(2) and are cleared by execve(2). A thread keyring is destroyed when the thread
that refers to it terminates.
Initially, a thread does not have a thread keyring. If a thread doesn't have a thread keyring when it is accessed, then it will be created
if it is to be modified; otherwise the operation fails with the error ENOKEY.
SEE ALSO keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), user-keyring(7), user-session-keyring(7)Linux 2017-03-13 THREAD-KEYRING(7)
Check Out this Related Man Page
USER-KEYRING(7) Linux Programmer's Manual USER-KEYRING(7)NAME
user-keyring - per-user keyring
DESCRIPTION
The user keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own user keyring that is
shared by all processes with that UID. The user keyring has a name (description) of the form _uid.<UID> where <UID> is the user ID of the
corresponding user.
The user keyring is associated with the record that the kernel maintains for the UID. It comes into existence upon the first attempt to
access either the user keyring, the user-session-keyring(7), or the session-keyring(7). The keyring remains pinned in existence so long as
there are processes running with that real UID or files opened by those processes remain open. (The keyring can also be pinned indefi-
nitely by linking it into another keyring.)
Typically, the user keyring is created by pam_keyinit(8) when a user logs in.
The user keyring is not searched by default by request_key(2). When pam_keyinit(8) creates a session keyring, it adds to it a link to the
user keyring so that the user keyring will be searched when the session keyring is.
A special serial number value, KEY_SPEC_USER_KEYRING, is defined that can be used in lieu of the actual serial number of the calling
process's user keyring.
From the keyctl(1) utility, '@u' can be used instead of a numeric key ID in much the same way.
User keyrings are independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2) excepting that the keyring is destroyed when the UID
record is destroyed when the last process pinning it exits.
If it is necessary for a key associated with a user to exist beyond the UID record being garbage collected--for example, for use by a
cron(8) script--then the persistent-keyring(7) should be used instead.
If a user keyring does not exist when it is accessed, it will be created.
SEE ALSO keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), thread-keyring(7),
user-session-keyring(7), pam_keyinit(8)Linux 2017-03-13 USER-KEYRING(7)
Hello All:
I left an important file on my computer in Montana (I'm in Arizona). It is running Mac OS 10.2.7. For some reason it appears file sharing is off, I don't understand how that happened because I have logged in remotely before. Can someone please tell me if there is any way to use... (7 Replies)
Discussion started by: jellegard
7 Replies
2. Post Here to Contact Site Administrators and Moderators
Dear admins,
i remember, my first thread, it is regarding unix systems and i asked some suggestions...
and i like to know how gollum answered for that thread?..
and is gollum is a program?.. (5 Replies)
wasn't sure if this should have a new thread since I'm still working on the same job I asked a question about earlier. But it's a different problem/question so I guess it deserves a new thread....
I have a log with roughly 10000 lines in it, each one has a timestamp. The problem is, the time... (8 Replies)
Discussion started by: StevePace
8 Replies
4. Post Here to Contact Site Administrators and Moderators
Hi all,
I am using the below command to shift the lines in a file which was advised by Anchal in this forum:
awk -v total_records=$(cat redirects.virgin-atlantic.com.conf | wc -l) '{ if(NR>(total_records - 2)) printf "\t%s\n", $0; else print $0 }' align
but I am getting the below error:... (7 Replies)
I stumbled upon this thread and one aspect of it got me thinking. As i am building a small Linux network right now for a friend i would like to hear your opinion on this.
I'd like to respectfully disagree. I think the Linux habit of disabling root login per default is wrong (not entirely... (6 Replies)
i m searching a zone file my domain name is abcd.com
my zone file looks like this.
abcd.com. IN SOA ns1.abcd.com. root.abcd.com. (
abcd.com. 400 IN A 15.1.1.1
Then i am searching that abcd.com have if below ip... (14 Replies)
Hi,
This thread has been posted before on linuxquestions.org, but no answer, maybe because this is unix question and not linux. I'm posting the same thread here, hope I can get an answer from someone in the meantime, I wish I could post of emergency thread but it needs bits which I don't have :... (6 Replies)
Hello all,
I am a new ubuntu user (have to use it for work) and I am trying to learn and familiarize myself with commands that I will be using frequently.
I would like some help in how I can get a list of all files with certain keywords in the filename.
For example, I have a directory... (8 Replies)
Thanks Ravinder for quick reply.Thats work.
One more thing if i want to extract something based on paranthesis....can you help.
Input:
exp1:
CREATE TABLE
(
A,
B,
C
)
o/p exp1:
A,
B,
C
exp2: (7 Replies)
Last week our legacy SCO OpenServer 5.0.6 server started showing "panic" errors about bad blocks/sectors on hard drive. I ran the badtrack command which fully checked the disk, and it identified 2 LBA sectors as bad, and it was unable to recover some of the data. Apparently the lost data had... (29 Replies)
Discussion started by: spock9458
29 Replies
12. Post Here to Contact Site Administrators and Moderators