I think this is the wrong design. There are two problems you're trying to solve: a) how rpc.gssd finds credentials for processes on behalf of which it's acting b) how to create tmpfs locations in which to store credentials (which can be unbounded in size, so storing them in the kernel is silly; also the apps that use them are all user-land apps, so that too means there's no point in storing them in the kernel). Keyrings for the forst problem (or PAGs, or anything similar) is fine: on upcall to gssd the kernel tells it what it needs to know to find those credentials. (b) can be solved in many ways, and the simplest is to have a filesystem where top-level directories named after UIDs "exist" as soon as they are referenced and as long as they are non-empty. You can use autofs + tmpfs, or a variant of tmpfs for this. Solving (b) in a way that does not add a new ccache type (though having a KEYRING: ccache type that means "find the ccache URI in my keyring" is fine) is important because many of us run multiple implementations of Kerberos on any given host, and we do it because: - vendors are always behind the curve - legacy software linked with old versions of libkrb5 and friends - third party software Please review the above. Thanks, Nico -- -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html