Function report |
Source Code:kernel\auditsc.c |
Create Date:2022-07-28 11:28:25 |
Last Modify:2020-03-17 16:31:21 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:audit_signal_info_syscall - record signal info for syscalls*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that.
Proto:int audit_signal_info_syscall(struct task_struct *t)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct task_struct * | t |
2389 | ctx = audit_context() |
2392 | If Not determines whether we collect data for signals sent || audit_dummy_context() Then Return 0 |
2397 | If Not target_pid Then |
2398 | target_pid = task_tgid_nr(t) |
2399 | target_auid = audit_get_loginuid(t) |
2400 | target_uid = t_uid |
2401 | target_sessionid = audit_get_sessionid(t) |
2402 | security_task_getsecid(t, & target_sid) |
2404 | Return 0 |
2408 | If Not axp || pid_count == Number of target pids per aux struct. Then |
2409 | axp = kzalloc - allocate memory. The memory is set to zero.*@size: how many bytes of memory are required.*@flags: the type of memory to allocate (see kmalloc). |
2413 | type = ptrace target |
2419 | target_pid[pid_count] = task_tgid_nr(t) |
2420 | target_auid[pid_count] = audit_get_loginuid(t) |
2421 | target_uid[pid_count] = t_uid |
2422 | target_sessionid[pid_count] = audit_get_sessionid(t) |
2423 | security_task_getsecid(t, & target_sid[pid_count]) |
2425 | pid_count++ |
2427 | Return 0 |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |