Function report |
Source Code:kernel\auditsc.c |
Create Date:2022-07-28 11:28:25 |
| Last Modify:2020-03-17 16:31:21 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:audit_signal_info_syscall - record signal info for syscalls*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that.
Proto:int audit_signal_info_syscall(struct task_struct *t)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct task_struct * | t |
| 2389 | ctx = audit_context() |
| 2392 | If Not determines whether we collect data for signals sent || audit_dummy_context() Then Return 0 |
| 2397 | If Not target_pid Then |
| 2398 | target_pid = task_tgid_nr(t) |
| 2399 | target_auid = audit_get_loginuid(t) |
| 2400 | target_uid = t_uid |
| 2401 | target_sessionid = audit_get_sessionid(t) |
| 2402 | security_task_getsecid(t, & target_sid) |
| 2404 | Return 0 |
| 2408 | If Not axp || pid_count == Number of target pids per aux struct. Then |
| 2409 | axp = kzalloc - allocate memory. The memory is set to zero.*@size: how many bytes of memory are required.*@flags: the type of memory to allocate (see kmalloc). |
| 2413 | type = ptrace target |
| 2419 | target_pid[pid_count] = task_tgid_nr(t) |
| 2420 | target_auid[pid_count] = audit_get_loginuid(t) |
| 2421 | target_uid[pid_count] = t_uid |
| 2422 | target_sessionid[pid_count] = audit_get_sessionid(t) |
| 2423 | security_task_getsecid(t, & target_sid[pid_count]) |
| 2425 | pid_count++ |
| 2427 | Return 0 |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |