Function report |
Source Code:security\selinux\xfrm.c |
Create Date:2022-07-28 19:16:25 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Returns true if the xfrm contains a security blob for SELinux.
Proto:static inline int selinux_authorizable_xfrm(struct xfrm_state *x)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct xfrm_state * | x |
| Name | Describe |
|---|---|
| selinux_xfrm_state_pol_flow_match | LSM hook implementation that authorizes that a state matches* the given policy, flow combo. |
| selinux_xfrm_skb_sid_egress | |
| selinux_xfrm_skb_sid_ingress | |
| selinux_xfrm_sock_rcv_skb | LSM hook that controls access to unlabelled packets. If* a xfrm_state is authorizable (defined by macro) then it was* already authorized by the IPSec process. If not, then* we need to check for unlabelled access since this may not have |
| selinux_xfrm_postroute_last | POSTROUTE_LAST hook's XFRM processing:* If we have no security association, then we need to determine* whether the socket is allowed to send to an unlabelled destination.* If we do have a authorizable security association, then it has already been |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |