On Sat, Oct 01, 2016 at 10:54:36AM -0600, Jason Gunthorpe wrote:
> On Sat, Oct 01, 2016 at 03:01:25PM +0300, Jarkko Sakkinen wrote:
>
> > > + struct tpm_securityfs_data bin_sfs_data;
> > > + struct tpm_securityfs_data ascii_sfs_data;
> >
> > I think this is otherwise right but the struct name is very clunky.
> > First of all it doesn't own the data and IMHO now it kind of implies
> > of owning.
Ok, I'm not going to make this an issue. If you think these are good
names, I'll live with that :)
> These are passed in here:
>
> > > chip->bios_dir[chip->bios_dir_count] =
> > > securityfs_create_file("ascii_bios_measurements",
> > > S_IRUSR | S_IRGRP, chip->bios_dir[0],
> > > - (void *)&tpm_ascii_b_measurments_seqops,
> > > + (void *)&chip->ascii_sfs_data,
> > > &tpm_bios_measurements_ops);
>
> And the argument to securityfs_create_file is called 'data'..
>
> The key question with these patches is if all the locking is done
> right and we have the correct lifetime model now.
>
> Eg how much does securityfs_remove serialize and is the kref on the
> chip held for the duration of any fops. Can open() start after the
> kref is dropped, etc.
Why not make tpm_securityfs_data refcounted in order to remove
binding to the chip?
/Jarkko
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
tpmdd-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/tpmdd-devel