Function report |
Source Code:security\integrity\ima\ima_queue.c |
Create Date:2022-07-28 19:57:53 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Add template entry to the measurement list and hash table, and* extend the pcr.* On systems which support carrying the IMA measurement list across* kexec, maintain the total memory size required for serializing the* binary_runtime_measurements.
Proto:int ima_add_template_entry(struct ima_template_entry *entry, int violation, const char *op, struct inode *inode, const unsigned char *filename)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct ima_template_entry * | entry | |
int | violation | |
const char * | op | |
struct inode * | inode | |
const unsigned char * | filename |
169 | audit_cause = "hash_added" |
171 | audit_info = 1 |
175 | If Not violation Then |
176 | memcpy(digest, sha1 or md5 measurement hash , size of digest ) |
185 | If result < 0 Then |
194 | tpmresult = Return the amount of memory required for serializing the* entire binary_runtime_measurement list, including the ima_kexec_hdr* structure. |
195 | If tpmresult != 0 Then |
198 | audit_cause = tpm_audit_cause |
199 | audit_info = 0 |
201 | out : |
203 | integrity_audit_msg(PCR invalidation msgs , inode, filename, op, audit_cause, result, audit_info) |
205 | Return result |
Name | Describe |
---|---|
ima_store_template | ma_store_template - store ima template measurements* Calculate the hash of a template entry, add the template entry* to an ordered list of measurement entries maintained inside the kernel,* and also update the aggregate integrity value (maintained inside |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |