| Function report | 
| Source Code: kernel\auditsc.c | Create Date:2022-07-28 11:28:25 | 
| Last Modify:2020-03-17 16:31:21 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:audit_signal_info_syscall - record signal info for syscalls*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that.
Proto:int audit_signal_info_syscall(struct task_struct *t)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct task_struct * | t | 
| 2389 | ctx = audit_context() | 
| 2392 | If Not determines whether we collect data for signals sent || audit_dummy_context() Then Return 0 | 
| 2397 | If Not target_pid Then | 
| 2398 | target_pid = task_tgid_nr(t) | 
| 2399 | target_auid = audit_get_loginuid(t) | 
| 2400 | target_uid = t_uid | 
| 2401 | target_sessionid = audit_get_sessionid(t) | 
| 2402 | security_task_getsecid(t, & target_sid) | 
| 2404 | Return 0 | 
| 2408 | If Not axp || pid_count == Number of target pids per aux struct. Then | 
| 2409 | axp = kzalloc - allocate memory. The memory is set to zero.*@size: how many bytes of memory are required.*@flags: the type of memory to allocate (see kmalloc). | 
| 2413 | type = ptrace target | 
| 2419 | target_pid[pid_count] = task_tgid_nr(t) | 
| 2420 | target_auid[pid_count] = audit_get_loginuid(t) | 
| 2421 | target_uid[pid_count] = t_uid | 
| 2422 | target_sessionid[pid_count] = audit_get_sessionid(t) | 
| 2423 | security_task_getsecid(t, & target_sid[pid_count]) | 
| 2425 | pid_count++ | 
| 2427 | Return 0 | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |