This series of patches provides a pioctl() system call, and makes kAFS use it to provide a number of of the OpenAFS pioctl functions sufficient to allow a number of OpenAFS userspace utilities work with kAFS. File-requiring pioctls have been tested with: [root@andromeda ~]# fs getfid /afs File /afs (1.1.0) contained in volume 1 [root@andromeda ~]# fs whichcell /afs File /afs lives in cell 'procyon.org.uk' [root@andromeda ~]# fs examine /afs fs: You don't have the required access rights on '/afs' [root@andromeda ~]# fs whereis /afs File /afs is on host altair.procyon.org.uk Non-file-requiring pioctls for manipulating authentication tokens have been tested with: [root@andromeda ~]# kinit admin/admin Password for admin/admin@xxxxxxxxxxxxxx: [root@andromeda ~]# klog admin Password: [root@andromeda ~]# keyctl show Session Keyring -3 --alswrv 0 0 keyring: _ses 939040040 --als--v 0 0 \_ rxrpc: afs@xxxxxxxxxxxxxx [root@andromeda ~]# fs examine /afs File /afs (1.1.32558) contained in volume 1 Volume status for vid = 536870912 named Current disk quota is 5000 Current blocks used are 2 The partition has 39007484 blocks available out of 39187776 [root@andromeda ~]# aklog [root@andromeda ~]# keyctl show Session Keyring -3 --alswrv 0 0 keyring: _ses 660792724 --als--v 0 0 \_ rxrpc: afs@xxxxxxxxxxxxxx [root@andromeda ~]# tokens Tokens held by the Cache Manager: User's (AFS ID 10143) tokens for afs@xxxxxxxxxxxxxx [Expires Jun 17 00:47] --End of list-- The AFS keys probably should be in their own keyring which is linked to from the session keyring. -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html