亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? services.c

?? xen虛擬機源代碼安裝包
?? C
?? 第 1 頁 / 共 3 頁
字號:
/* * Implementation of the security services. * * Authors : Stephen Smalley, <sds@epoch.ncsc.mil> *           James Morris <jmorris@redhat.com> * * Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * *    Support for enhanced MLS infrastructure. * * Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com> * *     Added conditional policy language extensions * * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. * Copyright (C) 2003 - 2004 Tresys Technology, LLC * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> *    This program is free software; you can redistribute it and/or modify *      it under the terms of the GNU General Public License as published by *    the Free Software Foundation, version 2. *//* Ported to Xen 3.0, George Coker, <gscoker@alpha.ncsc.mil> */#include <xen/lib.h>#include <xen/xmalloc.h>#include <xen/string.h>#include <xen/spinlock.h>#include <xen/errno.h>#include "flask.h"#include "avc.h"#include "avc_ss.h"#include "security.h"#include "context.h"#include "policydb.h"#include "sidtab.h"#include "services.h"#include "conditional.h"#include "mls.h"unsigned int policydb_loaded_version;static DEFINE_RWLOCK(policy_rwlock);#define POLICY_RDLOCK read_lock(&policy_rwlock)#define POLICY_WRLOCK write_lock_irq(&policy_rwlock)#define POLICY_RDUNLOCK read_unlock(&policy_rwlock)#define POLICY_WRUNLOCK write_unlock_irq(&policy_rwlock)static DEFINE_SPINLOCK(load_sem);#define LOAD_LOCK spin_lock(&load_sem)#define LOAD_UNLOCK spin_unlock(&load_sem)static struct sidtab sidtab;struct policydb policydb;int ss_initialized = 0;/* * The largest sequence number that has been used when * providing an access decision to the access vector cache. * The sequence number only changes when a policy change * occurs. */static u32 latest_granting = 0;/* Forward declaration. */static int context_struct_to_string(struct context *context, char **scontext,                                                            u32 *scontext_len);/* * Return the boolean value of a constraint expression * when it is applied to the specified source and target * security contexts. * * xcontext is a special beast...  It is used by the validatetrans rules * only.  For these rules, scontext is the context before the transition, * tcontext is the context after the transition, and xcontext is the context * of the process performing the transition.  All other callers of * constraint_expr_eval should pass in NULL for xcontext. */static int constraint_expr_eval(struct context *scontext,                            struct context *tcontext, struct context *xcontext,                                                 struct constraint_expr *cexpr){    u32 val1, val2;    struct context *c;    struct role_datum *r1, *r2;    struct mls_level *l1, *l2;    struct constraint_expr *e;    int s[CEXPR_MAXDEPTH];    int sp = -1;    for ( e = cexpr; e; e = e->next )    {        switch ( e->expr_type )        {            case CEXPR_NOT:                BUG_ON(sp < 0);                s[sp] = !s[sp];            break;            case CEXPR_AND:                BUG_ON(sp < 1);                sp--;                s[sp] &= s[sp+1];            break;            case CEXPR_OR:                BUG_ON(sp < 1);                sp--;                s[sp] |= s[sp+1];            break;            case CEXPR_ATTR:                if ( sp == (CEXPR_MAXDEPTH-1) )                    return 0;            switch ( e->attr )            {                case CEXPR_USER:                    val1 = scontext->user;                    val2 = tcontext->user;                    break;                case CEXPR_TYPE:                    val1 = scontext->type;                    val2 = tcontext->type;                    break;                case CEXPR_ROLE:                    val1 = scontext->role;                    val2 = tcontext->role;                    r1 = policydb.role_val_to_struct[val1 - 1];                    r2 = policydb.role_val_to_struct[val2 - 1];                switch ( e->op )                {                    case CEXPR_DOM:                        s[++sp] = ebitmap_get_bit(&r1->dominates, val2 - 1);                    continue;                    case CEXPR_DOMBY:                        s[++sp] = ebitmap_get_bit(&r2->dominates, val1 - 1);                    continue;                    case CEXPR_INCOMP:                        s[++sp] = ( !ebitmap_get_bit(&r1->dominates,                                         val2 - 1) &&                                !ebitmap_get_bit(&r2->dominates,                                         val1 - 1) );                    continue;                    default:                    break;                }                break;                case CEXPR_L1L2:                    l1 = &(scontext->range.level[0]);                    l2 = &(tcontext->range.level[0]);                    goto mls_ops;                case CEXPR_L1H2:                    l1 = &(scontext->range.level[0]);                    l2 = &(tcontext->range.level[1]);                    goto mls_ops;                case CEXPR_H1L2:                    l1 = &(scontext->range.level[1]);                    l2 = &(tcontext->range.level[0]);                    goto mls_ops;                case CEXPR_H1H2:                    l1 = &(scontext->range.level[1]);                    l2 = &(tcontext->range.level[1]);                    goto mls_ops;                case CEXPR_L1H1:                    l1 = &(scontext->range.level[0]);                    l2 = &(scontext->range.level[1]);                    goto mls_ops;                case CEXPR_L2H2:                    l1 = &(tcontext->range.level[0]);                    l2 = &(tcontext->range.level[1]);                    goto mls_ops;mls_ops:            switch ( e->op )            {                case CEXPR_EQ:                    s[++sp] = mls_level_eq(l1, l2);                continue;                case CEXPR_NEQ:                    s[++sp] = !mls_level_eq(l1, l2);                continue;                case CEXPR_DOM:                    s[++sp] = mls_level_dom(l1, l2);                continue;                case CEXPR_DOMBY:                    s[++sp] = mls_level_dom(l2, l1);                continue;                case CEXPR_INCOMP:                    s[++sp] = mls_level_incomp(l2, l1);                continue;                default:                    BUG();                    return 0;            }            break;            default:                BUG();                return 0;            }            switch ( e->op )            {                case CEXPR_EQ:                    s[++sp] = (val1 == val2);                break;                case CEXPR_NEQ:                    s[++sp] = (val1 != val2);                break;                default:                    BUG();                    return 0;            }            break;            case CEXPR_NAMES:                if ( sp == (CEXPR_MAXDEPTH-1) )                    return 0;                c = scontext;                if ( e->attr & CEXPR_TARGET )                    c = tcontext;                else if ( e->attr & CEXPR_XTARGET )                {                    c = xcontext;                    if ( !c )                    {                        BUG();                        return 0;                    }                }                if ( e->attr & CEXPR_USER )                    val1 = c->user;                else if ( e->attr & CEXPR_ROLE )                    val1 = c->role;                else if ( e->attr & CEXPR_TYPE )                    val1 = c->type;                else                {                    BUG();                    return 0;                }            switch ( e->op )            {                case CEXPR_EQ:                    s[++sp] = ebitmap_get_bit(&e->names, val1 - 1);                break;                case CEXPR_NEQ:                    s[++sp] = !ebitmap_get_bit(&e->names, val1 - 1);                break;                default:                    BUG();                    return 0;            }            break;            default:                BUG();                return 0;        }    }    BUG_ON(sp != 0);    return s[0];}/* * Compute access vectors based on a context structure pair for * the permissions in a particular class. */static int context_struct_compute_av(struct context *scontext,                            struct context *tcontext, u16 tclass, u32 requested,                                                         struct av_decision *avd){    struct constraint_node *constraint;    struct role_allow *ra;    struct avtab_key avkey;    struct avtab_node *node;    struct class_datum *tclass_datum;    struct ebitmap *sattr, *tattr;    struct ebitmap_node *snode, *tnode;    unsigned int i, j;    if ( !tclass || tclass > policydb.p_classes.nprim )    {        printk(KERN_ERR "security_compute_av:  unrecognized class %d\n",               tclass);        return -EINVAL;    }    tclass_datum = policydb.class_val_to_struct[tclass - 1];    /*     * Initialize the access vectors to the default values.     */    avd->allowed = 0;    avd->decided = 0xffffffff;    avd->auditallow = 0;    avd->auditdeny = 0xffffffff;    avd->seqno = latest_granting;    /*     * If a specific type enforcement rule was defined for     * this permission check, then use it.     */    avkey.target_class = tclass;    avkey.specified = AVTAB_AV;    sattr = &policydb.type_attr_map[scontext->type - 1];    tattr = &policydb.type_attr_map[tcontext->type - 1];    ebitmap_for_each_bit(sattr, snode, i)    {        if ( !ebitmap_node_get_bit(snode, i) )            continue;        ebitmap_for_each_bit(tattr, tnode, j)        {            if ( !ebitmap_node_get_bit(tnode, j) )                continue;            avkey.source_type = i + 1;            avkey.target_type = j + 1;            for ( node = avtab_search_node(&policydb.te_avtab, &avkey);                 node != NULL;                 node = avtab_search_node_next(node, avkey.specified) )            {                if ( node->key.specified == AVTAB_ALLOWED )                    avd->allowed |= node->datum.data;                else if ( node->key.specified == AVTAB_AUDITALLOW )                    avd->auditallow |= node->datum.data;                else if ( node->key.specified == AVTAB_AUDITDENY )                    avd->auditdeny &= node->datum.data;            }            /* Check conditional av table for additional permissions */            cond_compute_av(&policydb.te_cond_avtab, &avkey, avd);        }    }    /*     * Remove any permissions prohibited by a constraint (this includes     * the MLS policy).     */    constraint = tclass_datum->constraints;    while ( constraint )    {        if ( (constraint->permissions & (avd->allowed) ) &&            !constraint_expr_eval(scontext, tcontext, NULL, constraint->expr))        {            avd->allowed = (avd->allowed) & ~(constraint->permissions);        }        constraint = constraint->next;    }    /*     * If checking process transition permission and the     * role is changing, then check the (current_role, new_role)     * pair.     */    if ( tclass == SECCLASS_DOMAIN &&/* removed until future dynamic domain capability        (avd->allowed & (DOMAIN__TRANSITION | DOMAIN__DYNTRANSITION)) &&*/                                            scontext->role != tcontext->role )        {        for ( ra = policydb.role_allow; ra; ra = ra->next )        {            if ( scontext->role == ra->role && tcontext->role == ra->new_role )                break;        }/* removed until future dynamic domain capability            if (!ra)            avd->allowed = (avd->allowed) & ~(DOMAIN__TRANSITION |                                            DOMAIN__DYNTRANSITION);*/    }    return 0;}static int security_validtrans_handle_fail(struct context *ocontext,                struct context *ncontext, struct context *tcontext, u16 tclass){    char *o = NULL, *n = NULL, *t = NULL;    u32 olen, nlen, tlen;    if ( context_struct_to_string(ocontext, &o, &olen) < 0 )        goto out;    if ( context_struct_to_string(ncontext, &n, &nlen) < 0 )        goto out;    if ( context_struct_to_string(tcontext, &t, &tlen) < 0 )        goto out;    printk("security_validate_transition:  denied for"              " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s",              o, n, t, policydb.p_class_val_to_name[tclass-1]);out:    xfree(o);    xfree(n);    xfree(t);    if ( !flask_enforcing )        return 0;    return -EPERM;}int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,                                 u16 tclass){    struct context *ocontext;    struct context *ncontext;    struct context *tcontext;    struct class_datum *tclass_datum;    struct constraint_node *constraint;    int rc = 0;    if ( !ss_initialized )        return 0;    POLICY_RDLOCK;    if ( !tclass || tclass > policydb.p_classes.nprim )    {        printk(KERN_ERR "security_validate_transition: "                                            "unrecognized class %d\n", tclass);        rc = -EINVAL;        goto out;    }    tclass_datum = policydb.class_val_to_struct[tclass - 1];    ocontext = sidtab_search(&sidtab, oldsid);    if ( !ocontext )    {        printk(KERN_ERR "security_validate_transition: "               " unrecognized SID %d\n", oldsid);        rc = -EINVAL;        goto out;    }    ncontext = sidtab_search(&sidtab, newsid);    if ( !ncontext )    {        printk(KERN_ERR "security_validate_transition: "               " unrecognized SID %d\n", newsid);        rc = -EINVAL;        goto out;    }    tcontext = sidtab_search(&sidtab, tasksid);    if ( !tcontext )    {        printk(KERN_ERR "security_validate_transition: "               " unrecognized SID %d\n", tasksid);        rc = -EINVAL;        goto out;    }    constraint = tclass_datum->validatetrans;    while ( constraint )    {        if ( !constraint_expr_eval(ocontext, ncontext, tcontext,                                                            constraint->expr) )        {            rc = security_validtrans_handle_fail(ocontext, ncontext,                                                 tcontext, tclass);            goto out;        }        constraint = constraint->next;    }out:    POLICY_RDUNLOCK;    return rc;}/** * security_compute_av - Compute access vector decisions. * @ssid: source security identifier * @tsid: target security identifier * @tclass: target security class * @requested: requested permissions * @avd: access vector decisions * * Compute a set of access vector decisions based on the * SID pair (@ssid, @tsid) for the permissions in @tclass. * Return -%EINVAL if any of the parameters are invalid or %0 * if the access vector decisions were computed successfully. */int security_compute_av(u32 ssid, u32 tsid, u16 tclass, u32 requested,                                                    struct av_decision *avd){    struct context *scontext = NULL, *tcontext = NULL;    int rc = 0;    if ( !ss_initialized )    {        avd->allowed = 0xffffffff;        avd->decided = 0xffffffff;        avd->auditallow = 0;        avd->auditdeny = 0xffffffff;        avd->seqno = latest_granting;        return 0;    }    POLICY_RDLOCK;    scontext = sidtab_search(&sidtab, ssid);    if ( !scontext )    {        printk("security_compute_av:  unrecognized SID %d\n", ssid);        rc = -EINVAL;        goto out;    }    tcontext = sidtab_search(&sidtab, tsid);    if ( !tcontext )    {        printk("security_compute_av:  unrecognized SID %d\n", tsid);        rc = -EINVAL;        goto out;    }    rc = context_struct_compute_av(scontext, tcontext, tclass, requested, avd);out:    POLICY_RDUNLOCK;    return rc;}/* * Write the security context string representation of * the context structure `context' into a dynamically * allocated string of the correct size.  Set `*scontext' * to point to this string and set `*scontext_len' to * the length of the string. */static int context_struct_to_string(struct context *context, char **scontext, u32 *scontext_len){    char *scontextp;    *scontext = NULL;    *scontext_len = 0;    /* Compute the size of the context. */    *scontext_len += strlen(policydb.p_user_val_to_name[context->user - 1]) + 1;    *scontext_len += strlen(policydb.p_role_val_to_name[context->role - 1]) + 1;    *scontext_len += strlen(policydb.p_type_val_to_name[context->type - 1]) + 1;    *scontext_len += mls_compute_context_len(context);    /* Allocate space for the context; caller must free this space. */    scontextp = xmalloc_array(char, *scontext_len);    if ( !scontextp )        return -ENOMEM;    *scontext = scontextp;    /*     * Copy the user name, role name and type name into the context.     */    snprintf(scontextp, *scontext_len, "%s:%s:%s",        policydb.p_user_val_to_name[context->user - 1],        policydb.p_role_val_to_name[context->role - 1],        policydb.p_type_val_to_name[context->type - 1]);    scontextp += strlen(policydb.p_user_val_to_name[context->user - 1]) +                 1 + strlen(policydb.p_role_val_to_name[context->role - 1]) +

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧美一区二区三区极速播放| 亚洲综合网站在线观看| www.在线欧美| 亚洲精品福利视频网站| 99精品视频一区二区| 一区二区在线观看视频| 一本一本大道香蕉久在线精品| 国产精品视频看| 99久久综合精品| 夜夜嗨av一区二区三区四季av| 欧美午夜免费电影| 午夜视频久久久久久| 欧美一区二区三区在线电影 | 国产精品成人一区二区艾草 | 亚洲精品乱码久久久久久黑人| 337p日本欧洲亚洲大胆色噜噜| 欧美日韩激情在线| 色婷婷av一区| 一本大道久久a久久精品综合| 国产成人在线视频播放| 久久电影国产免费久久电影| 天天影视色香欲综合网老头| 亚洲欧美日韩国产综合| 国产精品久久久久三级| 国产亚洲一二三区| 久久久青草青青国产亚洲免观| 日韩一区二区三区观看| 欧美日韩不卡在线| 欧美日韩aaaaa| 欧美精品v国产精品v日韩精品| 在线观看不卡一区| 色网站国产精品| 欧美曰成人黄网| 久久久一区二区三区捆绑**| 亚洲色图在线播放| 欧美激情在线免费观看| 久久国产精品99精品国产 | 国产日产精品一区| 久久精品夜色噜噜亚洲a∨| 精品成人佐山爱一区二区| 精品入口麻豆88视频| 欧美一级二级在线观看| 欧美一区二区免费视频| 欧美大胆一级视频| 久久亚洲精品国产精品紫薇| 国产日韩成人精品| 中文字幕一区二区三区精华液| 欧美激情一区二区三区全黄| 国产视频一区不卡| 国产精品久久久久久妇女6080 | 久久蜜桃一区二区| 欧美伦理视频网站| 欧美曰成人黄网| 色综合激情久久| 色先锋资源久久综合| 成人国产精品免费观看| 不卡的av电影在线观看| 亚洲狠狠丁香婷婷综合久久久| 国产无遮挡一区二区三区毛片日本| 免费成人av在线| 欧美三级在线视频| 欧美最新大片在线看| 色婷婷综合激情| 欧美久久一二三四区| 日韩免费性生活视频播放| 精品99一区二区| 一色屋精品亚洲香蕉网站| 亚洲线精品一区二区三区| 美女尤物国产一区| 成人国产精品免费观看动漫| 在线观看成人免费视频| 日韩视频一区二区| 国产精品久久久久久妇女6080| 一区二区三区日韩精品视频| 久久99精品久久久久久国产越南 | 成人午夜在线视频| 日本伦理一区二区| 日韩精品一区二区三区老鸭窝| 国产精品丝袜在线| 三级欧美在线一区| 成人黄色小视频| 91精品国产高清一区二区三区蜜臀| 国产日韩视频一区二区三区| 日本一区二区动态图| 亚洲已满18点击进入久久| 韩国成人精品a∨在线观看| 91精品办公室少妇高潮对白| 久久这里只有精品首页| 亚洲精品高清在线| 国产白丝精品91爽爽久久| 欧美日韩成人高清| 国产精品久久久久精k8 | 日本久久电影网| 蜜桃视频免费观看一区| 成人av手机在线观看| 日韩天堂在线观看| 亚洲日本护士毛茸茸| 国产乱子伦视频一区二区三区| 欧美做爰猛烈大尺度电影无法无天| 久久精品一区二区三区不卡牛牛| 香蕉久久夜色精品国产使用方法| 成人免费观看av| 日韩三级中文字幕| 亚洲在线视频一区| 成人深夜福利app| 精品国产成人系列| 首页国产丝袜综合| 欧美午夜理伦三级在线观看| 欧美国产1区2区| 韩国v欧美v日本v亚洲v| 91精品久久久久久久99蜜桃| 亚洲最大成人网4388xx| 91麻豆国产自产在线观看| 中文文精品字幕一区二区| 麻豆精品久久精品色综合| 4438x亚洲最大成人网| 洋洋av久久久久久久一区| av电影在线观看不卡| 日本一区二区三区久久久久久久久不| 久久电影网站中文字幕| 欧美一级二级在线观看| 日韩 欧美一区二区三区| 在线影视一区二区三区| 成人免费在线视频| k8久久久一区二区三区| 亚洲国产精品ⅴa在线观看| 国产原创一区二区| 久久久久一区二区三区四区| 国产一区二区三区av电影| 2023国产精品自拍| 国模娜娜一区二区三区| 26uuu国产电影一区二区| 久久精品国产免费| 亚洲精品一区二区三区福利 | 高清国产午夜精品久久久久久| 日韩精品一区二区三区在线观看| 欧美日韩国产a| 午夜av电影一区| 91精品国产综合久久久久久 | 中文字幕在线不卡一区二区三区| 国产suv精品一区二区883| 国产精品三级av| 99国产精品一区| 亚洲精品ww久久久久久p站| 在线视频国内自拍亚洲视频| 一区二区三区资源| 欧美日本在线播放| 久久精品国产亚洲5555| 欧美国产日韩亚洲一区| 91在线无精精品入口| 亚洲午夜成aⅴ人片| 91精品婷婷国产综合久久性色| 蜜臀va亚洲va欧美va天堂 | 色拍拍在线精品视频8848| 亚洲综合色区另类av| 欧美精品视频www在线观看| 欧美aaaaaa午夜精品| 国产午夜精品一区二区| 99久久国产免费看| 亚洲h在线观看| 久久色成人在线| aaa国产一区| 香蕉久久一区二区不卡无毒影院| 日韩欧美国产不卡| 成人av网站大全| 丝袜诱惑亚洲看片| 国产日本欧美一区二区| 在线亚洲免费视频| 激情成人午夜视频| 亚洲天堂av一区| 欧美一级免费大片| 成人黄色小视频在线观看| 天堂精品中文字幕在线| 国产日韩精品一区二区浪潮av| 日本韩国精品在线| 韩国视频一区二区| 亚洲一区二区三区四区在线观看 | 久久免费视频色| 91久久线看在观草草青青| 精品亚洲porn| 亚洲欧美一区二区久久| 久久综合精品国产一区二区三区| 色综合天天性综合| 久久精品噜噜噜成人88aⅴ| 一色屋精品亚洲香蕉网站| 欧美一区二区三区婷婷月色| 成人av免费在线播放| 蜜臀国产一区二区三区在线播放| 亚洲欧美乱综合| 国产日产精品一区| 日韩西西人体444www| 97久久精品人人做人人爽| 另类调教123区| 亚洲一卡二卡三卡四卡无卡久久| 久久久精品国产99久久精品芒果| 51精品视频一区二区三区| 精品免费国产一区二区三区四区| 麻豆91精品视频| 亚洲自拍偷拍图区| 国产精品国产三级国产普通话99|