JFIF  x x C         C     "        } !1AQa "q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz        w !1AQ aq"2B #3Rbr{ gilour

File "KernelRootkit.php"

Full Path: /home/palsarh/web/palsarh.in/public_html/vendor/google/apiclient-services/src/SecurityCommandCenter/KernelRootkit.php
File size: 6.29 KB
MIME-type: text/x-php
Charset: utf-8

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\SecurityCommandCenter;

class KernelRootkit extends \Google\Model
{
  /**
   * Rootkit name, when available.
   *
   * @var string
   */
  public $name;
  /**
   * True if unexpected modifications of kernel code memory are present.
   *
   * @var bool
   */
  public $unexpectedCodeModification;
  /**
   * True if `ftrace` points are present with callbacks pointing to regions that
   * are not in the expected kernel or module code range.
   *
   * @var bool
   */
  public $unexpectedFtraceHandler;
  /**
   * True if interrupt handlers that are are not in the expected kernel or
   * module code regions are present.
   *
   * @var bool
   */
  public $unexpectedInterruptHandler;
  /**
   * True if kernel code pages that are not in the expected kernel or module
   * code regions are present.
   *
   * @var bool
   */
  public $unexpectedKernelCodePages;
  /**
   * True if `kprobe` points are present with callbacks pointing to regions that
   * are not in the expected kernel or module code range.
   *
   * @var bool
   */
  public $unexpectedKprobeHandler;
  /**
   * True if unexpected processes in the scheduler run queue are present. Such
   * processes are in the run queue, but not in the process task list.
   *
   * @var bool
   */
  public $unexpectedProcessesInRunqueue;
  /**
   * True if unexpected modifications of kernel read-only data memory are
   * present.
   *
   * @var bool
   */
  public $unexpectedReadOnlyDataModification;
  /**
   * True if system call handlers that are are not in the expected kernel or
   * module code regions are present.
   *
   * @var bool
   */
  public $unexpectedSystemCallHandler;

  /**
   * Rootkit name, when available.
   *
   * @param string $name
   */
  public function setName($name)
  {
    $this->name = $name;
  }
  /**
   * @return string
   */
  public function getName()
  {
    return $this->name;
  }
  /**
   * True if unexpected modifications of kernel code memory are present.
   *
   * @param bool $unexpectedCodeModification
   */
  public function setUnexpectedCodeModification($unexpectedCodeModification)
  {
    $this->unexpectedCodeModification = $unexpectedCodeModification;
  }
  /**
   * @return bool
   */
  public function getUnexpectedCodeModification()
  {
    return $this->unexpectedCodeModification;
  }
  /**
   * True if `ftrace` points are present with callbacks pointing to regions that
   * are not in the expected kernel or module code range.
   *
   * @param bool $unexpectedFtraceHandler
   */
  public function setUnexpectedFtraceHandler($unexpectedFtraceHandler)
  {
    $this->unexpectedFtraceHandler = $unexpectedFtraceHandler;
  }
  /**
   * @return bool
   */
  public function getUnexpectedFtraceHandler()
  {
    return $this->unexpectedFtraceHandler;
  }
  /**
   * True if interrupt handlers that are are not in the expected kernel or
   * module code regions are present.
   *
   * @param bool $unexpectedInterruptHandler
   */
  public function setUnexpectedInterruptHandler($unexpectedInterruptHandler)
  {
    $this->unexpectedInterruptHandler = $unexpectedInterruptHandler;
  }
  /**
   * @return bool
   */
  public function getUnexpectedInterruptHandler()
  {
    return $this->unexpectedInterruptHandler;
  }
  /**
   * True if kernel code pages that are not in the expected kernel or module
   * code regions are present.
   *
   * @param bool $unexpectedKernelCodePages
   */
  public function setUnexpectedKernelCodePages($unexpectedKernelCodePages)
  {
    $this->unexpectedKernelCodePages = $unexpectedKernelCodePages;
  }
  /**
   * @return bool
   */
  public function getUnexpectedKernelCodePages()
  {
    return $this->unexpectedKernelCodePages;
  }
  /**
   * True if `kprobe` points are present with callbacks pointing to regions that
   * are not in the expected kernel or module code range.
   *
   * @param bool $unexpectedKprobeHandler
   */
  public function setUnexpectedKprobeHandler($unexpectedKprobeHandler)
  {
    $this->unexpectedKprobeHandler = $unexpectedKprobeHandler;
  }
  /**
   * @return bool
   */
  public function getUnexpectedKprobeHandler()
  {
    return $this->unexpectedKprobeHandler;
  }
  /**
   * True if unexpected processes in the scheduler run queue are present. Such
   * processes are in the run queue, but not in the process task list.
   *
   * @param bool $unexpectedProcessesInRunqueue
   */
  public function setUnexpectedProcessesInRunqueue($unexpectedProcessesInRunqueue)
  {
    $this->unexpectedProcessesInRunqueue = $unexpectedProcessesInRunqueue;
  }
  /**
   * @return bool
   */
  public function getUnexpectedProcessesInRunqueue()
  {
    return $this->unexpectedProcessesInRunqueue;
  }
  /**
   * True if unexpected modifications of kernel read-only data memory are
   * present.
   *
   * @param bool $unexpectedReadOnlyDataModification
   */
  public function setUnexpectedReadOnlyDataModification($unexpectedReadOnlyDataModification)
  {
    $this->unexpectedReadOnlyDataModification = $unexpectedReadOnlyDataModification;
  }
  /**
   * @return bool
   */
  public function getUnexpectedReadOnlyDataModification()
  {
    return $this->unexpectedReadOnlyDataModification;
  }
  /**
   * True if system call handlers that are are not in the expected kernel or
   * module code regions are present.
   *
   * @param bool $unexpectedSystemCallHandler
   */
  public function setUnexpectedSystemCallHandler($unexpectedSystemCallHandler)
  {
    $this->unexpectedSystemCallHandler = $unexpectedSystemCallHandler;
  }
  /**
   * @return bool
   */
  public function getUnexpectedSystemCallHandler()
  {
    return $this->unexpectedSystemCallHandler;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(KernelRootkit::class, 'Google_Service_SecurityCommandCenter_KernelRootkit');