Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

thread-keyring(7) [linux man page]

THREAD-KEYRING(7)					     Linux Programmer's Manual						 THREAD-KEYRING(7)

NAME
thread-keyring - per-thread keyring DESCRIPTION
The thread keyring is a keyring used to anchor keys on behalf of a process. It is created only when a thread requests it. The thread keyring has the name (description) _tid. A special serial number value, KEY_SPEC_THREAD_KEYRING, is defined that can be used in lieu of the actual serial number of the calling thread's thread keyring. From the keyctl(1) utility, '@t' can be used instead of a numeric key ID in much the same way, but as keyctl(1) is a program run after forking, this is of no utility. Thread keyrings are not inherited across clone(2) and fork(2) and are cleared by execve(2). A thread keyring is destroyed when the thread that refers to it terminates. Initially, a thread does not have a thread keyring. If a thread doesn't have a thread keyring when it is accessed, then it will be created if it is to be modified; otherwise the operation fails with the error ENOKEY. SEE ALSO
keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), user-keyring(7), user-session-keyring(7) Linux 2017-03-13 THREAD-KEYRING(7)

Check Out this Related Man Page

USER-KEYRING(7) 					     Linux Programmer's Manual						   USER-KEYRING(7)

NAME
user-keyring - per-user keyring DESCRIPTION
The user keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own user keyring that is shared by all processes with that UID. The user keyring has a name (description) of the form _uid.<UID> where <UID> is the user ID of the corresponding user. The user keyring is associated with the record that the kernel maintains for the UID. It comes into existence upon the first attempt to access either the user keyring, the user-session-keyring(7), or the session-keyring(7). The keyring remains pinned in existence so long as there are processes running with that real UID or files opened by those processes remain open. (The keyring can also be pinned indefi- nitely by linking it into another keyring.) Typically, the user keyring is created by pam_keyinit(8) when a user logs in. The user keyring is not searched by default by request_key(2). When pam_keyinit(8) creates a session keyring, it adds to it a link to the user keyring so that the user keyring will be searched when the session keyring is. A special serial number value, KEY_SPEC_USER_KEYRING, is defined that can be used in lieu of the actual serial number of the calling process's user keyring. From the keyctl(1) utility, '@u' can be used instead of a numeric key ID in much the same way. User keyrings are independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2) excepting that the keyring is destroyed when the UID record is destroyed when the last process pinning it exits. If it is necessary for a key associated with a user to exist beyond the UID record being garbage collected--for example, for use by a cron(8) script--then the persistent-keyring(7) should be used instead. If a user keyring does not exist when it is accessed, it will be created. SEE ALSO
keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), thread-keyring(7), user-session-keyring(7), pam_keyinit(8) Linux 2017-03-13 USER-KEYRING(7)
Man Page

13 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Any backdoors?

Hello All: I left an important file on my computer in Montana (I'm in Arizona). It is running Mac OS 10.2.7. For some reason it appears file sharing is off, I don't understand how that happened because I have logged in remotely before. Can someone please tell me if there is any way to use... (7 Replies)
Discussion started by: jellegard
7 Replies

2. Post Here to Contact Site Administrators and Moderators

how gollum answered..

Dear admins, i remember, my first thread, it is regarding unix systems and i asked some suggestions... and i like to know how gollum answered for that thread?.. and is gollum is a program?.. (5 Replies)
Discussion started by: sekar sundaram
5 Replies

3. Shell Programming and Scripting

More log manipulation

wasn't sure if this should have a new thread since I'm still working on the same job I asked a question about earlier. But it's a different problem/question so I guess it deserves a new thread.... I have a log with roughly 10000 lines in it, each one has a timestamp. The problem is, the time... (8 Replies)
Discussion started by: StevePace
8 Replies

4. Post Here to Contact Site Administrators and Moderators

How to Delete a Post

Hi, I have created a new thread. I dont need that thread now. How should I delete it? Nobody has replied yet. Regd, M (5 Replies)
Discussion started by: mahatma
5 Replies

5. Shell Programming and Scripting

Shifting of lines in a file

Hi all, I am using the below command to shift the lines in a file which was advised by Anchal in this forum: awk -v total_records=$(cat redirects.virgin-atlantic.com.conf | wc -l) '{ if(NR>(total_records - 2)) printf "\t%s\n", $0; else print $0 }' align but I am getting the below error:... (7 Replies)
Discussion started by: Shazin
7 Replies

6. Cybersecurity

Root login in Linux - does it make sense?

I stumbled upon this thread and one aspect of it got me thinking. As i am building a small Linux network right now for a friend i would like to hear your opinion on this. I'd like to respectfully disagree. I think the Linux habit of disabling root login per default is wrong (not entirely... (6 Replies)
Discussion started by: bakunin
6 Replies

7. Shell Programming and Scripting

Help required in searching of pattern.

i m searching a zone file my domain name is abcd.com my zone file looks like this. abcd.com. IN SOA ns1.abcd.com. root.abcd.com. ( abcd.com. 400 IN A 15.1.1.1 Then i am searching that abcd.com have if below ip... (14 Replies)
Discussion started by: learnbash
14 Replies

8. AIX

AIX 7.1 on Power 750 is very slow with no high memory or process consumption

Hi, This thread has been posted before on linuxquestions.org, but no answer, maybe because this is unix question and not linux. I'm posting the same thread here, hope I can get an answer from someone in the meantime, I wish I could post of emergency thread but it needs bits which I don't have :... (6 Replies)
Discussion started by: aLuViAn
6 Replies

9. UNIX for Beginners Questions & Answers

Finding and renaming files with exceptions

Hello all, I am a new ubuntu user (have to use it for work) and I am trying to learn and familiarize myself with commands that I will be using frequently. I would like some help in how I can get a list of all files with certain keywords in the filename. For example, I have a directory... (8 Replies)
Discussion started by: azurite
8 Replies

10. UNIX for Beginners Questions & Answers

Extract data between two parenthesi

Thanks Ravinder for quick reply.Thats work. One more thing if i want to extract something based on paranthesis....can you help. Input: exp1: CREATE TABLE ( A, B, C ) o/p exp1: A, B, C exp2: (7 Replies)
Discussion started by: raju2016
7 Replies

11. SCO

Need Help With System Recovery After HD Errors

Last week our legacy SCO OpenServer 5.0.6 server started showing "panic" errors about bad blocks/sectors on hard drive. I ran the badtrack command which fully checked the disk, and it identified 2 LBA sectors as bad, and it was unable to recover some of the data. Apparently the lost data had... (29 Replies)
Discussion started by: spock9458
29 Replies

12. Post Here to Contact Site Administrators and Moderators

Change title of a thread after it is created

hi, how do we change the title of a thread after it is created? Thanks (5 Replies)
Discussion started by: milhan
5 Replies

13. Emergency UNIX and Linux Support

How do i start a new thread with my android phone?

thanks (6 Replies)
Discussion started by: jgt
6 Replies