[PATCH v5 3/3] ima: Use kstat.ctime as a fallback change detection for stacked fs
Mimi Zohar
zohar at linux.ibm.com
Thu Feb 5 04:26:27 UTC 2026
On Wed, 2026-02-04 at 15:22 -0600, Frederick Lawler wrote:
> That said, I think Mimi pointed out in an email [2] where multi-grain
> file systems are impacted regardless of stacked fs or not due to the last
> writer check.
>
> I don't recall coming across that in my tests, but perhaps I did that
> specific test wrong? To be sure, I created the C program, and on the VM,
> created a XFS disk, mounted it on loopback, ran the rdwr program on
> "somefile" multiple times, and only got 1 audit log for it, until I
> mutated it with touch, and only got 2 hits: original + after mutation
> after running the program multiple times.
>
> I'm not sure what's going on there, so I'll look into that a bit more,
> but so far the impact is stacked file systems & multigrain ctime AFAIK.
Make sure you're testing without your patch set applied or at least the last
patch.
Mimi
More information about the Linux-security-module-archive
mailing list