From mboxrd@z Thu Jan 1 00:00:00 1970 From: Christoph Hellwig Subject: Re: [RFC] New authentication management syscalls Date: Fri, 9 May 2003 14:31:47 +0100 Sender: linux-kernel-owner@vger.kernel.org Message-ID: <20030509143147.A23197@infradead.org> References: <11183.1052485877@warthog.warthog> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Trond Myklebust , arjanv@redhat.com, viro@parcelfarce.linux.theplanet.co.uk, drepper@redhat.com, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org Return-path: To: David Howells Content-Disposition: inline In-Reply-To: <11183.1052485877@warthog.warthog>; from dhowells@redhat.com on Fri, May 09, 2003 at 02:11:17PM +0100 List-Id: linux-fsdevel.vger.kernel.org On Fri, May 09, 2003 at 02:11:17PM +0100, David Howells wrote: > (3) settok(const char *fs, const char *key, size_t size, const void *data) fs is the path to a mount point? > Present data to the named filesystem as being the authentication token > for the specified key (eg: an AFS cell). If accepted, this token should > be stored in the PAG to which the calling process belongs. s/filesystem/mount instance/ > > struct file_system_type { > ... > int settok(struct file_system_type *fstype, > const char *domain, > size_t size, > const void *data); > }; This should go into super_operations instead.