All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.cloud.securitycenter.v1.KernelRootkitOrBuilder Maven / Gradle / Ivy

There is a newer version: 2.62.0
Show newest version
/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/securitycenter/v1/kernel_rootkit.proto

// Protobuf Java Version: 3.25.3
package com.google.cloud.securitycenter.v1;

public interface KernelRootkitOrBuilder
    extends
    // @@protoc_insertion_point(interface_extends:google.cloud.securitycenter.v1.KernelRootkit)
    com.google.protobuf.MessageOrBuilder {

  /**
   *
   *
   * 
   * Rootkit name, when available.
   * 
* * string name = 1; * * @return The name. */ java.lang.String getName(); /** * * *
   * Rootkit name, when available.
   * 
* * string name = 1; * * @return The bytes for name. */ com.google.protobuf.ByteString getNameBytes(); /** * * *
   * True if unexpected modifications of kernel code memory are present.
   * 
* * bool unexpected_code_modification = 2; * * @return The unexpectedCodeModification. */ boolean getUnexpectedCodeModification(); /** * * *
   * True if unexpected modifications of kernel read-only data memory are
   * present.
   * 
* * bool unexpected_read_only_data_modification = 3; * * @return The unexpectedReadOnlyDataModification. */ boolean getUnexpectedReadOnlyDataModification(); /** * * *
   * True if `ftrace` points are present with callbacks pointing to regions
   * that are not in the expected kernel or module code range.
   * 
* * bool unexpected_ftrace_handler = 4; * * @return The unexpectedFtraceHandler. */ boolean getUnexpectedFtraceHandler(); /** * * *
   * True if `kprobe` points are present with callbacks pointing to regions
   * that are not in the expected kernel or module code range.
   * 
* * bool unexpected_kprobe_handler = 5; * * @return The unexpectedKprobeHandler. */ boolean getUnexpectedKprobeHandler(); /** * * *
   * True if kernel code pages that are not in the expected kernel or module
   * code regions are present.
   * 
* * bool unexpected_kernel_code_pages = 6; * * @return The unexpectedKernelCodePages. */ boolean getUnexpectedKernelCodePages(); /** * * *
   * True if system call handlers that are are not in the expected kernel or
   * module code regions are present.
   * 
* * bool unexpected_system_call_handler = 7; * * @return The unexpectedSystemCallHandler. */ boolean getUnexpectedSystemCallHandler(); /** * * *
   * True if interrupt handlers that are are not in the expected kernel or
   * module code regions are present.
   * 
* * bool unexpected_interrupt_handler = 8; * * @return The unexpectedInterruptHandler. */ boolean getUnexpectedInterruptHandler(); /** * * *
   * True if unexpected processes in the scheduler run queue are present. Such
   * processes are in the run queue, but not in the process task list.
   * 
* * bool unexpected_processes_in_runqueue = 9; * * @return The unexpectedProcessesInRunqueue. */ boolean getUnexpectedProcessesInRunqueue(); }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy