diff options
author | Catherine Zhang <cxzhang@watson.ibm.com> | 2006-03-21 07:49:00 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2006-03-21 07:49:00 +0100 |
commit | e6f507196c2b50243beb09b1bfa4639f999d4d1e (patch) | |
tree | 216886fba2700aa01970046e4c7412dce6638fa1 /security/selinux | |
parent | [NET]: Identation & other cleanups related to compat_[gs]etsockopt cset (diff) | |
download | linux-e6f507196c2b50243beb09b1bfa4639f999d4d1e.tar.xz linux-e6f507196c2b50243beb09b1bfa4639f999d4d1e.zip |
[SELINUX]: selinux_socket_getpeer_{stream,dgram} fixup
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Signed-off-by: Arnaldo Carvalho de Melo <acme@mandriva.com>
Diffstat (limited to 'security/selinux')
-rw-r--r-- | security/selinux/include/xfrm.h | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/security/selinux/include/xfrm.h b/security/selinux/include/xfrm.h index a7f388bff3f2..c10f1fc41502 100644 --- a/security/selinux/include/xfrm.h +++ b/security/selinux/include/xfrm.h @@ -51,6 +51,16 @@ static inline int selinux_xfrm_postroute_last(u32 isec_sid, struct sk_buff *skb) { return NF_ACCEPT; } + +static inline int selinux_socket_getpeer_stream(struct sock *sk) +{ + return SECSID_NULL; +} + +static inline int selinux_socket_getpeer_dgram(struct sk_buff *skb) +{ + return SECSID_NULL; +} #endif #endif /* _SELINUX_XFRM_H_ */ |