Hi James, As the last IMA-appraisal posting on 3/29 addressed Al's performance/maintenance concerns of deferring the __fput() and there hasn't been any additional comments, please consider pulling the IMA-appraisal patches. The linux-integrity.git also contains the two prereqs: vfs: fix IMA lockdep circular locking dependency (Acked by Eric) vfs: iversion truncate bug fix (currently in linux-next, via Andrew) The following changes since commit eadc10b3e17f00681f7bfb2ed6e4aee39ad93f03: vfs: extend vfs_removexattr locking (2012-04-18 07:06:55 -0400) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git next-ima-appraisal thanks, Mimi Dmitry Kasatkin (3): ima: free securityfs violations file ima: allocating iint improvements ima: digital signature verification support Mimi Zohar (8): vfs: move ima_file_free before releasing the file ima: integrity appraisal extension ima: add appraise action keywords and default rules ima: replace iint spinlock with rwlock/read_lock ima: add inode_post_setattr call ima: add ima_inode_setxattr/removexattr function and calls ima: defer calling __fput() ima: add support for different security.ima data types Documentation/ABI/testing/ima_policy | 25 ++- Documentation/kernel-parameters.txt | 8 + fs/attr.c | 2 + fs/file_table.c | 7 +- include/linux/ima.h | 32 +++ include/linux/integrity.h | 7 +- include/linux/xattr.h | 3 + security/integrity/evm/evm_main.c | 3 + security/integrity/iint.c | 64 +++---- security/integrity/ima/Kconfig | 15 ++ security/integrity/ima/Makefile | 2 + security/integrity/ima/ima.h | 37 ++++- security/integrity/ima/ima_api.c | 56 ++++-- security/integrity/ima/ima_appraise.c | 344 +++++++++++++++++++++++++++++++++ security/integrity/ima/ima_crypto.c | 8 +- security/integrity/ima/ima_fs.c | 1 + security/integrity/ima/ima_main.c | 89 ++++++--- security/integrity/ima/ima_policy.c | 181 +++++++++++++----- security/integrity/integrity.h | 11 +- security/security.c | 6 + 20 files changed, 754 insertions(+), 147 deletions(-) create mode 100644 security/integrity/ima/ima_appraise.c -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html