| Function report | 
| Source Code: kernel\auditsc.c | Create Date:2022-07-28 11:27:01 | 
| Last Modify:2020-03-17 16:31:21 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:At process creation time, we can determine if system-call auditing is* completely disabled for this task. Since we only have the task* structure at this point, we can only check uid and gid.
Proto:static enum audit_state audit_filter_task(struct task_struct *tsk, char **key)
Type:enum audit_state
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct task_struct * | tsk | |
| char ** | key | 
| 752 | Return state | 
| Name | Describe | 
|---|---|
| audit_alloc | audit_alloc - allocate an audit context block for a task*@tsk: task* Filter on the task information and allocate a per-task audit context* if necessary. Doing so turns on system call auditing for the* specified task | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |