Function report | 
Source Code:security\selinux\xfrm.c | 
Create Date:2022-07-28 19:16:25 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:Returns true if the xfrm contains a security blob for SELinux.
Proto:static inline int selinux_authorizable_xfrm(struct xfrm_state *x)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct xfrm_state * | x | 
| Name | Describe | 
|---|---|
| selinux_xfrm_state_pol_flow_match | LSM hook implementation that authorizes that a state matches* the given policy, flow combo. | 
| selinux_xfrm_skb_sid_egress | |
| selinux_xfrm_skb_sid_ingress | |
| selinux_xfrm_sock_rcv_skb | LSM hook that controls access to unlabelled packets. If* a xfrm_state is authorizable (defined by macro) then it was* already authorized by the IPSec process. If not, then* we need to check for unlabelled access since this may not have | 
| selinux_xfrm_postroute_last | POSTROUTE_LAST hook's XFRM processing:* If we have no security association, then we need to determine* whether the socket is allowed to send to an unlabelled destination.* If we do have a authorizable security association, then it has already been | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |