Function report | 
Source Code:security\integrity\ima\ima_policy.c | 
Create Date:2022-07-28 19:58:58 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:In addition to knowing that we need to appraise the file in general,* we need to differentiate between calling hooks, for hook specific rules.
Proto:static int get_subaction(struct ima_rule_entry *rule, enum ima_hooks func)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct ima_rule_entry * | rule | |
| enum ima_hooks | func | 
| 455 | If Not (flags & lags definitions ) Then Return subaction appraise cache flags | 
| 459 | Case func == MMAP_CHECK | 
| 460 | Return IMA_MMAP_APPRAISE | 
| 461 | Case func == BPRM_CHECK | 
| 462 | Return IMA_BPRM_APPRAISE | 
| 463 | Case func == CREDS_CHECK | 
| 464 | Return IMA_CREDS_APPRAISE | 
| 465 | Case func == FILE_CHECK | 
| 466 | Case func == POST_SETATTR | 
| 467 | Return subaction appraise cache flags | 
| 468 | Case func == MODULE_CHECK...MAX_CHECK - 1 | 
| 469 | Default | 
| 470 | Return IMA_READ_APPRAISE | 
| Name | Describe | 
|---|---|
| ima_match_policy | ma_match_policy - decision based on LSM and other conditions*@inode: pointer to an inode for which the policy decision is being made*@cred: pointer to a credentials structure for which the policy decision is* being made*@secid: LSM secid of the task to be | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |