linux/security/integrity/ima
Eric Paris 6ccd045630 ima: handle multiple rules per write
Currently IMA will only accept one rule per write().  This patch allows IMA to
accept writes which contain multiple rules but only processes one rule per
write.  \n is used as the delimiter between rules.  IMA will return a short
write indicating that it only accepted up to the first \n.

This allows simple userspace utilities like cat to be used to load an IMA
policy instead of needing a special userspace utility that understood 'one
write per rule'

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Mimi Zohar <zohar@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
2010-04-21 09:58:13 +10:00
..
ima_api.c ima: rename PATH_CHECK to FILE_CHECK 2010-02-07 03:06:23 -05:00
ima_audit.c IMA: use current_cred() instead of current->cred 2009-05-12 11:06:01 +10:00
ima_crypto.c ima: hashing large files bug fix 2009-08-24 14:58:29 +10:00
ima_fs.c ima: handle multiple rules per write 2010-04-21 09:58:13 +10:00
ima_iint.c security/ima: replace gcc specific __FUNCTION__ with __func__ 2010-03-10 15:59:54 +11:00
ima_init.c IMA: Add __init notation to ima functions 2009-05-22 09:34:21 +10:00
ima_main.c security/ima: replace gcc specific __FUNCTION__ with __func__ 2010-03-10 15:59:54 +11:00
ima_policy.c ima: handle multiple rules per write 2010-04-21 09:58:13 +10:00
ima_queue.c integrity: ima audit hash_exists fix 2009-06-29 08:57:49 +10:00
ima.h ima: handle multiple rules per write 2010-04-21 09:58:13 +10:00
Kconfig LSM: imbed ima calls in the security hooks 2009-10-25 12:22:48 +08:00
Makefile integrity: IMA display 2009-02-06 09:05:31 +11:00