Function report |
Source Code:kernel\audit.c |
Create Date:2022-07-28 11:22:20 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:audit_rate_check
Proto:static inline int audit_rate_check(void)
Type:int
Parameter:Nothing
313 | last_check = 0 |
314 | messages = 0 |
315 | DEFINE_SPINLOCK(lock) |
319 | retval = 0 |
321 | If Not If audit_rate_limit is non-zero, limit the rate of sending audit records* to that number per second. This prevents DoS attacks, but results in* audit records being dropped. Then Return 1 |
323 | spin_lock_irqsave( & lock, flags) |
325 | retval = 1 |
326 | Else |
328 | elapsed = now - last_check |
335 | spin_unlock_irqrestore( & lock, flags) |
337 | Return retval |
Name | Describe |
---|---|
audit_log_start | audit_log_start - obtain an audit buffer*@ctx: audit_context (may be NULL)*@gfp_mask: type of allocation*@type: audit message type* Returns audit_buffer pointer on success or NULL on error |
audit_log_end | audit_log_end - end one audit record*@ab: the audit_buffer* We can not do a netlink send inside an irq context because it blocks (last* arg, flags, is not set to MSG_DONTWAIT), so the audit buffer is placed on a* queue and a tasklet is scheduled to remove |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |