mirror of
https://github.com/torvalds/linux.git
synced 2024-12-13 22:53:20 +00:00
2572f5b424
A missing 'struct' keyword caused a build error when CONFIG_NETLABEL is disabled: In file included from security/selinux/hooks.c:99: security/selinux/include/netlabel.h:135:66: error: unknown type name 'sock' static inline void selinux_netlbl_sctp_sk_clone(struct sock *sk, sock *newsk) ^~~~ security/selinux/hooks.c: In function 'selinux_sctp_sk_clone': security/selinux/hooks.c:5188:2: error: implicit declaration of function 'selinux_netlbl_sctp_sk_clone'; did you mean 'selinux_netlbl_inet_csk_clone'? [-Werror=implicit-function-declaration] Fixes: db97c9f9d312 ("selinux: Add SCTP support") Signed-off-by: Arnd Bergmann <arnd@arndb.de> Signed-off-by: Paul Moore <paul@paul-moore.com>
171 lines
4.3 KiB
C
171 lines
4.3 KiB
C
/*
|
|
* SELinux interface to the NetLabel subsystem
|
|
*
|
|
* Author: Paul Moore <paul@paul-moore.com>
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
* the GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#ifndef _SELINUX_NETLABEL_H_
|
|
#define _SELINUX_NETLABEL_H_
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/net.h>
|
|
#include <linux/skbuff.h>
|
|
#include <net/sock.h>
|
|
#include <net/request_sock.h>
|
|
#include <net/sctp/structs.h>
|
|
|
|
#include "avc.h"
|
|
#include "objsec.h"
|
|
|
|
#ifdef CONFIG_NETLABEL
|
|
void selinux_netlbl_cache_invalidate(void);
|
|
|
|
void selinux_netlbl_err(struct sk_buff *skb, u16 family, int error,
|
|
int gateway);
|
|
|
|
void selinux_netlbl_sk_security_free(struct sk_security_struct *sksec);
|
|
void selinux_netlbl_sk_security_reset(struct sk_security_struct *sksec);
|
|
|
|
int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
|
|
u16 family,
|
|
u32 *type,
|
|
u32 *sid);
|
|
int selinux_netlbl_skbuff_setsid(struct sk_buff *skb,
|
|
u16 family,
|
|
u32 sid);
|
|
int selinux_netlbl_sctp_assoc_request(struct sctp_endpoint *ep,
|
|
struct sk_buff *skb);
|
|
int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
|
|
void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family);
|
|
void selinux_netlbl_sctp_sk_clone(struct sock *sk, struct sock *newsk);
|
|
int selinux_netlbl_socket_post_create(struct sock *sk, u16 family);
|
|
int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
|
|
struct sk_buff *skb,
|
|
u16 family,
|
|
struct common_audit_data *ad);
|
|
int selinux_netlbl_socket_setsockopt(struct socket *sock,
|
|
int level,
|
|
int optname);
|
|
int selinux_netlbl_socket_connect(struct sock *sk, struct sockaddr *addr);
|
|
int selinux_netlbl_socket_connect_locked(struct sock *sk,
|
|
struct sockaddr *addr);
|
|
|
|
#else
|
|
static inline void selinux_netlbl_cache_invalidate(void)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline void selinux_netlbl_err(struct sk_buff *skb,
|
|
u16 family,
|
|
int error,
|
|
int gateway)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sk_security_free(
|
|
struct sk_security_struct *sksec)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline void selinux_netlbl_sk_security_reset(
|
|
struct sk_security_struct *sksec)
|
|
{
|
|
return;
|
|
}
|
|
|
|
static inline int selinux_netlbl_skbuff_getsid(struct sk_buff *skb,
|
|
u16 family,
|
|
u32 *type,
|
|
u32 *sid)
|
|
{
|
|
*type = NETLBL_NLTYPE_NONE;
|
|
*sid = SECSID_NULL;
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_skbuff_setsid(struct sk_buff *skb,
|
|
u16 family,
|
|
u32 sid)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline int selinux_netlbl_conn_setsid(struct sock *sk,
|
|
struct sockaddr *addr)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline int selinux_netlbl_sctp_assoc_request(struct sctp_endpoint *ep,
|
|
struct sk_buff *skb)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_inet_conn_request(struct request_sock *req,
|
|
u16 family)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline void selinux_netlbl_inet_csk_clone(struct sock *sk, u16 family)
|
|
{
|
|
return;
|
|
}
|
|
static inline void selinux_netlbl_sctp_sk_clone(struct sock *sk,
|
|
struct sock *newsk)
|
|
{
|
|
return;
|
|
}
|
|
static inline int selinux_netlbl_socket_post_create(struct sock *sk,
|
|
u16 family)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec,
|
|
struct sk_buff *skb,
|
|
u16 family,
|
|
struct common_audit_data *ad)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_socket_setsockopt(struct socket *sock,
|
|
int level,
|
|
int optname)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_socket_connect(struct sock *sk,
|
|
struct sockaddr *addr)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline int selinux_netlbl_socket_connect_locked(struct sock *sk,
|
|
struct sockaddr *addr)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_NETLABEL */
|
|
|
|
#endif
|