/* setfsuid or setfsgid, id0 == fsuid or fsgid */
#define LSM_SETID_FS 8
-
-#ifdef CONFIG_SECURITY
-
/* forward declares to avoid warnings */
struct sk_buff;
-struct net_device;
struct nfsctl_arg;
struct sched_param;
struct swap_info_struct;
+#ifdef CONFIG_SECURITY
+
/**
* struct security_operations - main security structure
*
struct security_operations *ops);
int (*unregister_security) (const char *name,
struct security_operations *ops);
+
+#ifdef CONFIG_SECURITY_NETWORK
+#endif /* CONFIG_SECURITY_NETWORK */
};
/* global variables */
#endif /* CONFIG_SECURITY */
+#ifdef CONFIG_SECURITY_NETWORK
+#else /* CONFIG_SECURITY_NETWORK */
+#endif /* CONFIG_SECURITY_NETWORK */
+
#endif /* ! __LINUX_SECURITY_H */
If you are unsure how to answer this question, answer N.
+config SECURITY_NETWORK
+ bool "Socket and Networking Security Hooks"
+ depends on SECURITY
+ help
+ This enables the socket and networking security hooks.
+ If enabled, a security module can use these hooks to
+ implement socket and networking access controls.
+ If you are unsure how to answer this question, answer N.
+
config SECURITY_CAPABILITIES
tristate "Default Linux Capabilities"
depends on SECURITY!=n
return 0;
}
+#ifdef CONFIG_SECURITY_NETWORK
+#endif /* CONFIG_SECURITY_NETWORK */
+
static int dummy_register_security (const char *name, struct security_operations *ops)
{
return -EINVAL;
set_to_dummy_if_null(ops, sem_semop);
set_to_dummy_if_null(ops, register_security);
set_to_dummy_if_null(ops, unregister_security);
+#ifdef CONFIG_SECURITY_NETWORK
+#endif /* CONFIG_SECURITY_NETWORK */
}