com.google.cloud.securitycenter.v1.KernelRootkitOrBuilder Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of proto-google-cloud-securitycenter-v1 Show documentation
Show all versions of proto-google-cloud-securitycenter-v1 Show documentation
PROTO library for proto-google-cloud-securitycenter-v1
/*
* Copyright 2024 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: google/cloud/securitycenter/v1/kernel_rootkit.proto
// Protobuf Java Version: 3.25.3
package com.google.cloud.securitycenter.v1;
public interface KernelRootkitOrBuilder
extends
// @@protoc_insertion_point(interface_extends:google.cloud.securitycenter.v1.KernelRootkit)
com.google.protobuf.MessageOrBuilder {
/**
*
*
*
* Rootkit name, when available.
*
*
* string name = 1;
*
* @return The name.
*/
java.lang.String getName();
/**
*
*
*
* Rootkit name, when available.
*
*
* string name = 1;
*
* @return The bytes for name.
*/
com.google.protobuf.ByteString getNameBytes();
/**
*
*
*
* True if unexpected modifications of kernel code memory are present.
*
*
* bool unexpected_code_modification = 2;
*
* @return The unexpectedCodeModification.
*/
boolean getUnexpectedCodeModification();
/**
*
*
*
* True if unexpected modifications of kernel read-only data memory are
* present.
*
*
* bool unexpected_read_only_data_modification = 3;
*
* @return The unexpectedReadOnlyDataModification.
*/
boolean getUnexpectedReadOnlyDataModification();
/**
*
*
*
* True if `ftrace` points are present with callbacks pointing to regions
* that are not in the expected kernel or module code range.
*
*
* bool unexpected_ftrace_handler = 4;
*
* @return The unexpectedFtraceHandler.
*/
boolean getUnexpectedFtraceHandler();
/**
*
*
*
* True if `kprobe` points are present with callbacks pointing to regions
* that are not in the expected kernel or module code range.
*
*
* bool unexpected_kprobe_handler = 5;
*
* @return The unexpectedKprobeHandler.
*/
boolean getUnexpectedKprobeHandler();
/**
*
*
*
* True if kernel code pages that are not in the expected kernel or module
* code regions are present.
*
*
* bool unexpected_kernel_code_pages = 6;
*
* @return The unexpectedKernelCodePages.
*/
boolean getUnexpectedKernelCodePages();
/**
*
*
*
* True if system call handlers that are are not in the expected kernel or
* module code regions are present.
*
*
* bool unexpected_system_call_handler = 7;
*
* @return The unexpectedSystemCallHandler.
*/
boolean getUnexpectedSystemCallHandler();
/**
*
*
*
* True if interrupt handlers that are are not in the expected kernel or
* module code regions are present.
*
*
* bool unexpected_interrupt_handler = 8;
*
* @return The unexpectedInterruptHandler.
*/
boolean getUnexpectedInterruptHandler();
/**
*
*
*
* True if unexpected processes in the scheduler run queue are present. Such
* processes are in the run queue, but not in the process task list.
*
*
* bool unexpected_processes_in_runqueue = 9;
*
* @return The unexpectedProcessesInRunqueue.
*/
boolean getUnexpectedProcessesInRunqueue();
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy