Function report |
Source Code:security\integrity\ima\ima_queue.c |
Create Date:2022-07-28 19:57:53 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Add template entry to the measurement list and hash table, and* extend the pcr.* On systems which support carrying the IMA measurement list across* kexec, maintain the total memory size required for serializing the* binary_runtime_measurements.
Proto:int ima_add_template_entry(struct ima_template_entry *entry, int violation, const char *op, struct inode *inode, const unsigned char *filename)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct ima_template_entry * | entry | |
| int | violation | |
| const char * | op | |
| struct inode * | inode | |
| const unsigned char * | filename |
| 169 | audit_cause = "hash_added" |
| 171 | audit_info = 1 |
| 175 | If Not violation Then |
| 176 | memcpy(digest, sha1 or md5 measurement hash , size of digest ) |
| 185 | If result < 0 Then |
| 194 | tpmresult = Return the amount of memory required for serializing the* entire binary_runtime_measurement list, including the ima_kexec_hdr* structure. |
| 195 | If tpmresult != 0 Then |
| 198 | audit_cause = tpm_audit_cause |
| 199 | audit_info = 0 |
| 201 | out : |
| 203 | integrity_audit_msg(PCR invalidation msgs , inode, filename, op, audit_cause, result, audit_info) |
| 205 | Return result |
| Name | Describe |
|---|---|
| ima_store_template | ma_store_template - store ima template measurements* Calculate the hash of a template entry, add the template entry* to an ordered list of measurement entries maintained inside the kernel,* and also update the aggregate integrity value (maintained inside |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |