Function report |
Source Code:security\integrity\ima\ima_policy.c |
Create Date:2022-07-28 19:58:58 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:In addition to knowing that we need to appraise the file in general,* we need to differentiate between calling hooks, for hook specific rules.
Proto:static int get_subaction(struct ima_rule_entry *rule, enum ima_hooks func)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct ima_rule_entry * | rule | |
| enum ima_hooks | func |
| 455 | If Not (flags & lags definitions ) Then Return subaction appraise cache flags |
| 459 | Case func == MMAP_CHECK |
| 460 | Return IMA_MMAP_APPRAISE |
| 461 | Case func == BPRM_CHECK |
| 462 | Return IMA_BPRM_APPRAISE |
| 463 | Case func == CREDS_CHECK |
| 464 | Return IMA_CREDS_APPRAISE |
| 465 | Case func == FILE_CHECK |
| 466 | Case func == POST_SETATTR |
| 467 | Return subaction appraise cache flags |
| 468 | Case func == MODULE_CHECK...MAX_CHECK - 1 |
| 469 | Default |
| 470 | Return IMA_READ_APPRAISE |
| Name | Describe |
|---|---|
| ima_match_policy | ma_match_policy - decision based on LSM and other conditions*@inode: pointer to an inode for which the policy decision is being made*@cred: pointer to a credentials structure for which the policy decision is* being made*@secid: LSM secid of the task to be |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |