Function report |
Source Code:security\integrity\ima\ima_main.c |
Create Date:2022-07-28 19:58:17 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:ma_load_data - appraise decision based on policy*@id: kernel load data caller identifier* Callers of this LSM hook can not measure, appraise, or audit the* data provided by userspace. Enforce policy rules requring a file* signature (eg
Proto:int ima_load_data(enum kernel_load_data_id id)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
enum kernel_load_data_id | id |
592 | ima_enforce = (ima_appraise & Appraise integrity measurements ) == Appraise integrity measurements |
596 | Case id == LOADING_KEXEC_IMAGE |
599 | pr_err("impossible to appraise a kernel image without a file descriptor; try using kexec_file_load syscall.\n") |
600 | Return -EACCES |
603 | If ima_enforce && ima_appraise & IMA_APPRAISE_KEXEC Then |
604 | pr_err("impossible to appraise a kernel image without a file descriptor; try using kexec_file_load syscall.\n") |
605 | Return -EACCES |
607 | Break |
608 | Case id == LOADING_FIRMWARE |
609 | If ima_enforce && ima_appraise & IMA_APPRAISE_FIRMWARE Then |
613 | Break |
614 | Case id == LOADING_MODULE |
615 | sig_enforce = Export sig_enforce kernel cmdline parameter to allow other subsystems rely* on that instead of directly to CONFIG_MODULE_SIG_FORCE config. |
617 | If ima_enforce && Not sig_enforce && ima_appraise & IMA_APPRAISE_MODULES Then |
622 | Default |
623 | Break |
625 | Return 0 |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |