| Function report | 
| Source Code: kernel\audit.c | Create Date:2022-07-28 11:22:16 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:auditd_test_task - Check to see if a given task is an audit daemon*@task: the task to check* Description:* Return 1 if the task is a registered audit daemon, 0 otherwise.
Proto:int auditd_test_task(struct task_struct *task)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct task_struct * | task | 
| 222 | Return rc | 
| Name | Describe | 
|---|---|
| audit_log_start | audit_log_start - obtain an audit buffer*@ctx: audit_context (may be NULL)*@gfp_mask: type of allocation*@type: audit message type* Returns audit_buffer pointer on success or NULL on error | 
| audit_signal_info | audit_signal_info - record signal info for shutting down audit subsystem*@sig: signal value*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that. | 
| audit_filter_syscall | At syscall entry and exit time, this filter is called if the* audit_state is not low enough that auditing cannot take place, but is* also not high enough that we already know we have to write an audit* record (i | 
| audit_filter_inodes | At syscall exit time, this filter is called if any audit_names have been* collected during syscall processing. We only check rules in sublists at hash* buckets applicable to the inode numbers in audit_names. | 
| __audit_syscall_entry | __audit_syscall_entry - fill in an audit record at syscall entry*@major: major syscall type (function)*@a1: additional syscall register 1*@a2: additional syscall register 2*@a3: additional syscall register 3*@a4: additional syscall register 4 | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |