Function report |
Source Code:kernel\audit.c |
Create Date:2022-07-28 11:23:51 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:audit_log_path_denied - report a path restriction denial*@type: audit message type (AUDIT_ANOM_LINK, AUDIT_ANOM_CREAT, etc)*@operation: specific operation name
Proto:void audit_log_path_denied(int type, const char *operation)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
int | type | |
const char * | operation |
2168 | If Not audit_enabled || audit_dummy_context() Then Return |
2172 | ab = audit_log_start - obtain an audit buffer*@ctx: audit_context (may be NULL)*@gfp_mask: type of allocation*@type: audit message type* Returns audit_buffer pointer on success or NULL on error |
2173 | If Not ab Then Return |
2176 | audit_log_task_info(ab) |
Name | Describe |
---|---|
may_linkat | may_linkat - Check permissions for creating a hardlink*@link: the source to hardlink from* Block hardlink when all of:* - sysctl_protected_hardlinks enabled* - fsuid does not match inode* - hardlink source is unsafe (see safe_hardlink_source() above)* - |
may_create_in_sticky | may_create_in_sticky - Check whether an O_CREAT open in a sticky directory* should be allowed, or not, on files that already* exist |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |