From mboxrd@z Thu Jan 1 00:00:00 1970 From: Mimi Zohar Subject: Re: [PATCH 0/4] IMA: making i_readcount a first class inode citizen Date: Wed, 16 Feb 2011 18:08:13 -0500 Message-ID: <1297897693.2524.201.camel@localhost.localdomain> References: <1297715397-4141-1-git-send-email-zohar@linux.vnet.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit Cc: linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org, James Morris , torvalds@linux-foundation.org, eparis@redhat.com, viro@zeniv.linux.org.uk, Dave Chinner , "J. Bruce Fields" , David Safford To: linux-kernel@vger.kernel.org Return-path: In-Reply-To: <1297715397-4141-1-git-send-email-zohar@linux.vnet.ibm.com> Sender: linux-security-module-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org Hi, As Linus has already agreed that the i_readcount patches (1 - 4) can be upstreamed (https://lkml.org/lkml/2010/11/18/670), do I need to do anything else (eg. send James a request to pull)? thanks, Mimi On Mon, 2011-02-14 at 15:29 -0500, Mimi Zohar wrote: > This is a repost of patches 1 - 4 of the ima-i_readcount patch set rebased > against security-testing/#next, as requested a while ago. The patches are > also available from: > git://git.kernel.org/pub/scm/linux/kernel/git/zohar/ima-2.6.git/#next > > This patchset separates the incrementing/decrementing of the i_readcount, > in the VFS layer, from other IMA functionality, by replacing the current > ima_counts_get() call with i_readcount_inc(). Its unclear whether this > call to increment i_readcount should be made earlier, like i_writecount. > Currently the call is situated immediately after the switch from put_filp() > to fput() for cleanup. > > Mimi > > Mimi Zohar (4): > IMA: convert i_readcount to atomic > IMA: define readcount functions > IMA: maintain i_readcount in the VFS layer > IMA: remove IMA imbalance checking > > fs/file_table.c | 5 +- > fs/open.c | 3 +- > include/linux/fs.h | 23 ++++++- > include/linux/ima.h | 6 -- > security/integrity/ima/ima_iint.c | 5 -- > security/integrity/ima/ima_main.c | 130 ++++--------------------------------- > 6 files changed, 40 insertions(+), 132 deletions(-) >