亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? services.c

?? 底層驅動開發
?? C
?? 第 1 頁 / 共 3 頁
字號:
/* * Implementation of the security services. * * Authors : Stephen Smalley, <sds@epoch.ncsc.mil> *           James Morris <jmorris@redhat.com> * * Updated: Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> * *	Support for enhanced MLS infrastructure. * * Updated: Frank Mayer <mayerf@tresys.com> and Karl MacMillan <kmacmillan@tresys.com> * * 	Added conditional policy language extensions * * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc. * Copyright (C) 2003 - 2004 Tresys Technology, LLC * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> *	This program is free software; you can redistribute it and/or modify *  	it under the terms of the GNU General Public License as published by *	the Free Software Foundation, version 2. */#include <linux/kernel.h>#include <linux/slab.h>#include <linux/string.h>#include <linux/spinlock.h>#include <linux/errno.h>#include <linux/in.h>#include <linux/sched.h>#include <linux/audit.h>#include <asm/semaphore.h>#include "flask.h"#include "avc.h"#include "avc_ss.h"#include "security.h"#include "context.h"#include "policydb.h"#include "sidtab.h"#include "services.h"#include "conditional.h"#include "mls.h"extern void selnl_notify_policyload(u32 seqno);unsigned int policydb_loaded_version;static DEFINE_RWLOCK(policy_rwlock);#define POLICY_RDLOCK read_lock(&policy_rwlock)#define POLICY_WRLOCK write_lock_irq(&policy_rwlock)#define POLICY_RDUNLOCK read_unlock(&policy_rwlock)#define POLICY_WRUNLOCK write_unlock_irq(&policy_rwlock)static DECLARE_MUTEX(load_sem);#define LOAD_LOCK down(&load_sem)#define LOAD_UNLOCK up(&load_sem)static struct sidtab sidtab;struct policydb policydb;int ss_initialized = 0;/* * The largest sequence number that has been used when * providing an access decision to the access vector cache. * The sequence number only changes when a policy change * occurs. */static u32 latest_granting = 0;/* Forward declaration. */static int context_struct_to_string(struct context *context, char **scontext,				    u32 *scontext_len);/* * Return the boolean value of a constraint expression * when it is applied to the specified source and target * security contexts. * * xcontext is a special beast...  It is used by the validatetrans rules * only.  For these rules, scontext is the context before the transition, * tcontext is the context after the transition, and xcontext is the context * of the process performing the transition.  All other callers of * constraint_expr_eval should pass in NULL for xcontext. */static int constraint_expr_eval(struct context *scontext,				struct context *tcontext,				struct context *xcontext,				struct constraint_expr *cexpr){	u32 val1, val2;	struct context *c;	struct role_datum *r1, *r2;	struct mls_level *l1, *l2;	struct constraint_expr *e;	int s[CEXPR_MAXDEPTH];	int sp = -1;	for (e = cexpr; e; e = e->next) {		switch (e->expr_type) {		case CEXPR_NOT:			BUG_ON(sp < 0);			s[sp] = !s[sp];			break;		case CEXPR_AND:			BUG_ON(sp < 1);			sp--;			s[sp] &= s[sp+1];			break;		case CEXPR_OR:			BUG_ON(sp < 1);			sp--;			s[sp] |= s[sp+1];			break;		case CEXPR_ATTR:			if (sp == (CEXPR_MAXDEPTH-1))				return 0;			switch (e->attr) {			case CEXPR_USER:				val1 = scontext->user;				val2 = tcontext->user;				break;			case CEXPR_TYPE:				val1 = scontext->type;				val2 = tcontext->type;				break;			case CEXPR_ROLE:				val1 = scontext->role;				val2 = tcontext->role;				r1 = policydb.role_val_to_struct[val1 - 1];				r2 = policydb.role_val_to_struct[val2 - 1];				switch (e->op) {				case CEXPR_DOM:					s[++sp] = ebitmap_get_bit(&r1->dominates,								  val2 - 1);					continue;				case CEXPR_DOMBY:					s[++sp] = ebitmap_get_bit(&r2->dominates,								  val1 - 1);					continue;				case CEXPR_INCOMP:					s[++sp] = ( !ebitmap_get_bit(&r1->dominates,								     val2 - 1) &&						    !ebitmap_get_bit(&r2->dominates,								     val1 - 1) );					continue;				default:					break;				}				break;			case CEXPR_L1L2:				l1 = &(scontext->range.level[0]);				l2 = &(tcontext->range.level[0]);				goto mls_ops;			case CEXPR_L1H2:				l1 = &(scontext->range.level[0]);				l2 = &(tcontext->range.level[1]);				goto mls_ops;			case CEXPR_H1L2:				l1 = &(scontext->range.level[1]);				l2 = &(tcontext->range.level[0]);				goto mls_ops;			case CEXPR_H1H2:				l1 = &(scontext->range.level[1]);				l2 = &(tcontext->range.level[1]);				goto mls_ops;			case CEXPR_L1H1:				l1 = &(scontext->range.level[0]);				l2 = &(scontext->range.level[1]);				goto mls_ops;			case CEXPR_L2H2:				l1 = &(tcontext->range.level[0]);				l2 = &(tcontext->range.level[1]);				goto mls_ops;mls_ops:			switch (e->op) {			case CEXPR_EQ:				s[++sp] = mls_level_eq(l1, l2);				continue;			case CEXPR_NEQ:				s[++sp] = !mls_level_eq(l1, l2);				continue;			case CEXPR_DOM:				s[++sp] = mls_level_dom(l1, l2);				continue;			case CEXPR_DOMBY:				s[++sp] = mls_level_dom(l2, l1);				continue;			case CEXPR_INCOMP:				s[++sp] = mls_level_incomp(l2, l1);				continue;			default:				BUG();				return 0;			}			break;			default:				BUG();				return 0;			}			switch (e->op) {			case CEXPR_EQ:				s[++sp] = (val1 == val2);				break;			case CEXPR_NEQ:				s[++sp] = (val1 != val2);				break;			default:				BUG();				return 0;			}			break;		case CEXPR_NAMES:			if (sp == (CEXPR_MAXDEPTH-1))				return 0;			c = scontext;			if (e->attr & CEXPR_TARGET)				c = tcontext;			else if (e->attr & CEXPR_XTARGET) {				c = xcontext;				if (!c) {					BUG();					return 0;				}			}			if (e->attr & CEXPR_USER)				val1 = c->user;			else if (e->attr & CEXPR_ROLE)				val1 = c->role;			else if (e->attr & CEXPR_TYPE)				val1 = c->type;			else {				BUG();				return 0;			}			switch (e->op) {			case CEXPR_EQ:				s[++sp] = ebitmap_get_bit(&e->names, val1 - 1);				break;			case CEXPR_NEQ:				s[++sp] = !ebitmap_get_bit(&e->names, val1 - 1);				break;			default:				BUG();				return 0;			}			break;		default:			BUG();			return 0;		}	}	BUG_ON(sp != 0);	return s[0];}/* * Compute access vectors based on a context structure pair for * the permissions in a particular class. */static int context_struct_compute_av(struct context *scontext,				     struct context *tcontext,				     u16 tclass,				     u32 requested,				     struct av_decision *avd){	struct constraint_node *constraint;	struct role_allow *ra;	struct avtab_key avkey;	struct avtab_node *node;	struct class_datum *tclass_datum;	struct ebitmap *sattr, *tattr;	struct ebitmap_node *snode, *tnode;	unsigned int i, j;	/*	 * Remap extended Netlink classes for old policy versions.	 * Do this here rather than socket_type_to_security_class()	 * in case a newer policy version is loaded, allowing sockets	 * to remain in the correct class.	 */	if (policydb_loaded_version < POLICYDB_VERSION_NLCLASS)		if (tclass >= SECCLASS_NETLINK_ROUTE_SOCKET &&		    tclass <= SECCLASS_NETLINK_DNRT_SOCKET)			tclass = SECCLASS_NETLINK_SOCKET;	if (!tclass || tclass > policydb.p_classes.nprim) {		printk(KERN_ERR "security_compute_av:  unrecognized class %d\n",		       tclass);		return -EINVAL;	}	tclass_datum = policydb.class_val_to_struct[tclass - 1];	/*	 * Initialize the access vectors to the default values.	 */	avd->allowed = 0;	avd->decided = 0xffffffff;	avd->auditallow = 0;	avd->auditdeny = 0xffffffff;	avd->seqno = latest_granting;	/*	 * If a specific type enforcement rule was defined for	 * this permission check, then use it.	 */	avkey.target_class = tclass;	avkey.specified = AVTAB_AV;	sattr = &policydb.type_attr_map[scontext->type - 1];	tattr = &policydb.type_attr_map[tcontext->type - 1];	ebitmap_for_each_bit(sattr, snode, i) {		if (!ebitmap_node_get_bit(snode, i))			continue;		ebitmap_for_each_bit(tattr, tnode, j) {			if (!ebitmap_node_get_bit(tnode, j))				continue;			avkey.source_type = i + 1;			avkey.target_type = j + 1;			for (node = avtab_search_node(&policydb.te_avtab, &avkey);			     node != NULL;			     node = avtab_search_node_next(node, avkey.specified)) {				if (node->key.specified == AVTAB_ALLOWED)					avd->allowed |= node->datum.data;				else if (node->key.specified == AVTAB_AUDITALLOW)					avd->auditallow |= node->datum.data;				else if (node->key.specified == AVTAB_AUDITDENY)					avd->auditdeny &= node->datum.data;			}			/* Check conditional av table for additional permissions */			cond_compute_av(&policydb.te_cond_avtab, &avkey, avd);		}	}	/*	 * Remove any permissions prohibited by a constraint (this includes	 * the MLS policy).	 */	constraint = tclass_datum->constraints;	while (constraint) {		if ((constraint->permissions & (avd->allowed)) &&		    !constraint_expr_eval(scontext, tcontext, NULL,					  constraint->expr)) {			avd->allowed = (avd->allowed) & ~(constraint->permissions);		}		constraint = constraint->next;	}	/*	 * If checking process transition permission and the	 * role is changing, then check the (current_role, new_role)	 * pair.	 */	if (tclass == SECCLASS_PROCESS &&	    (avd->allowed & (PROCESS__TRANSITION | PROCESS__DYNTRANSITION)) &&	    scontext->role != tcontext->role) {		for (ra = policydb.role_allow; ra; ra = ra->next) {			if (scontext->role == ra->role &&			    tcontext->role == ra->new_role)				break;		}		if (!ra)			avd->allowed = (avd->allowed) & ~(PROCESS__TRANSITION |			                                PROCESS__DYNTRANSITION);	}	return 0;}static int security_validtrans_handle_fail(struct context *ocontext,                                           struct context *ncontext,                                           struct context *tcontext,                                           u16 tclass){	char *o = NULL, *n = NULL, *t = NULL;	u32 olen, nlen, tlen;	if (context_struct_to_string(ocontext, &o, &olen) < 0)		goto out;	if (context_struct_to_string(ncontext, &n, &nlen) < 0)		goto out;	if (context_struct_to_string(tcontext, &t, &tlen) < 0)		goto out;	audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR,	          "security_validate_transition:  denied for"	          " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s",	          o, n, t, policydb.p_class_val_to_name[tclass-1]);out:	kfree(o);	kfree(n);	kfree(t);	if (!selinux_enforcing)		return 0;	return -EPERM;}int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,                                 u16 tclass){	struct context *ocontext;	struct context *ncontext;	struct context *tcontext;	struct class_datum *tclass_datum;	struct constraint_node *constraint;	int rc = 0;	if (!ss_initialized)		return 0;	POLICY_RDLOCK;	/*	 * Remap extended Netlink classes for old policy versions.	 * Do this here rather than socket_type_to_security_class()	 * in case a newer policy version is loaded, allowing sockets	 * to remain in the correct class.	 */	if (policydb_loaded_version < POLICYDB_VERSION_NLCLASS)		if (tclass >= SECCLASS_NETLINK_ROUTE_SOCKET &&		    tclass <= SECCLASS_NETLINK_DNRT_SOCKET)			tclass = SECCLASS_NETLINK_SOCKET;	if (!tclass || tclass > policydb.p_classes.nprim) {		printk(KERN_ERR "security_validate_transition:  "		       "unrecognized class %d\n", tclass);		rc = -EINVAL;		goto out;	}	tclass_datum = policydb.class_val_to_struct[tclass - 1];	ocontext = sidtab_search(&sidtab, oldsid);	if (!ocontext) {		printk(KERN_ERR "security_validate_transition: "		       " unrecognized SID %d\n", oldsid);		rc = -EINVAL;		goto out;	}	ncontext = sidtab_search(&sidtab, newsid);	if (!ncontext) {		printk(KERN_ERR "security_validate_transition: "		       " unrecognized SID %d\n", newsid);		rc = -EINVAL;		goto out;	}	tcontext = sidtab_search(&sidtab, tasksid);	if (!tcontext) {		printk(KERN_ERR "security_validate_transition: "		       " unrecognized SID %d\n", tasksid);		rc = -EINVAL;		goto out;	}	constraint = tclass_datum->validatetrans;	while (constraint) {		if (!constraint_expr_eval(ocontext, ncontext, tcontext,		                          constraint->expr)) {			rc = security_validtrans_handle_fail(ocontext, ncontext,			                                     tcontext, tclass);			goto out;		}		constraint = constraint->next;	}out:	POLICY_RDUNLOCK;	return rc;}/** * security_compute_av - Compute access vector decisions. * @ssid: source security identifier * @tsid: target security identifier * @tclass: target security class * @requested: requested permissions * @avd: access vector decisions * * Compute a set of access vector decisions based on the * SID pair (@ssid, @tsid) for the permissions in @tclass. * Return -%EINVAL if any of the parameters are invalid or %0 * if the access vector decisions were computed successfully. */int security_compute_av(u32 ssid,			u32 tsid,			u16 tclass,			u32 requested,			struct av_decision *avd){	struct context *scontext = NULL, *tcontext = NULL;	int rc = 0;	if (!ss_initialized) {		avd->allowed = 0xffffffff;		avd->decided = 0xffffffff;		avd->auditallow = 0;		avd->auditdeny = 0xffffffff;		avd->seqno = latest_granting;		return 0;	}	POLICY_RDLOCK;	scontext = sidtab_search(&sidtab, ssid);	if (!scontext) {		printk(KERN_ERR "security_compute_av:  unrecognized SID %d\n",		       ssid);		rc = -EINVAL;		goto out;	}	tcontext = sidtab_search(&sidtab, tsid);	if (!tcontext) {		printk(KERN_ERR "security_compute_av:  unrecognized SID %d\n",		       tsid);		rc = -EINVAL;		goto out;	}	rc = context_struct_compute_av(scontext, tcontext, tclass,				       requested, avd);out:	POLICY_RDUNLOCK;	return rc;}/* * Write the security context string representation of * the context structure `context' into a dynamically * allocated string of the correct size.  Set `*scontext' * to point to this string and set `*scontext_len' to * the length of the string. */static int context_struct_to_string(struct context *context, char **scontext, u32 *scontext_len){	char *scontextp;	*scontext = NULL;	*scontext_len = 0;	/* Compute the size of the context. */	*scontext_len += strlen(policydb.p_user_val_to_name[context->user - 1]) + 1;	*scontext_len += strlen(policydb.p_role_val_to_name[context->role - 1]) + 1;	*scontext_len += strlen(policydb.p_type_val_to_name[context->type - 1]) + 1;	*scontext_len += mls_compute_context_len(context);	/* Allocate space for the context; caller must free this space. */	scontextp = kmalloc(*scontext_len, GFP_ATOMIC);	if (!scontextp) {		return -ENOMEM;	}	*scontext = scontextp;	/*	 * Copy the user name, role name and type name into the context.	 */	sprintf(scontextp, "%s:%s:%s",		policydb.p_user_val_to_name[context->user - 1],		policydb.p_role_val_to_name[context->role - 1],		policydb.p_type_val_to_name[context->type - 1]);	scontextp += strlen(policydb.p_user_val_to_name[context->user - 1]) +	             1 + strlen(policydb.p_role_val_to_name[context->role - 1]) +	             1 + strlen(policydb.p_type_val_to_name[context->type - 1]);	mls_sid_to_context(context, &scontextp);	*scontextp = 0;	return 0;}#include "initial_sid_to_string.h"/** * security_sid_to_context - Obtain a context for a given SID. * @sid: security identifier, SID * @scontext: security context * @scontext_len: length in bytes * * Write the string representation of the context associated with @sid * into a dynamically allocated string of the correct size.  Set @scontext * to point to this string and set @scontext_len to the length of the string. */int security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len){	struct context *context;	int rc = 0;	if (!ss_initialized) {		if (sid <= SECINITSID_NUM) {			char *scontextp;			*scontext_len = strlen(initial_sid_to_string[sid]) + 1;			scontextp = kmalloc(*scontext_len,GFP_ATOMIC);			strcpy(scontextp, initial_sid_to_string[sid]);			*scontext = scontextp;			goto out;		}		printk(KERN_ERR "security_sid_to_context:  called before initial "		       "load_policy on unknown SID %d\n", sid);		rc = -EINVAL;		goto out;	}	POLICY_RDLOCK;	context = sidtab_search(&sidtab, sid);

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧洲一区二区三区免费视频| 91看片淫黄大片一级在线观看| 国产精品18久久久久久久久| 国产一区二区精品久久91| 91丝袜美腿高跟国产极品老师| 日韩一区二区电影网| 亚洲区小说区图片区qvod| 国产一区二区三区久久久| 欧美色综合影院| 亚洲丝袜美腿综合| 国产一区二区91| 91精品国产高清一区二区三区蜜臀| 国产精品乱码一区二区三区软件| 久久不见久久见免费视频1| 色综合久久99| 国产精品不卡一区| 国产在线不卡一卡二卡三卡四卡| 欧美日韩一卡二卡| 亚洲欧美日韩国产一区二区三区| 国产99久久久久| 精品国产123| 精品亚洲porn| 日韩一区二区三区在线| 亚洲国产一区二区在线播放| 91片黄在线观看| 中文字幕亚洲一区二区va在线| 国产精品一二三| 国产亚洲精品aa| 国产精品白丝av| 国产午夜精品在线观看| 国产精品乡下勾搭老头1| 欧美mv日韩mv国产网站| 毛片基地黄久久久久久天堂| 欧美一区二区视频在线观看2020| 亚洲一区二区三区小说| 欧美视频精品在线| 日本aⅴ免费视频一区二区三区 | 欧美国产亚洲另类动漫| 国产真实乱偷精品视频免| 日韩欧美不卡在线观看视频| 麻豆国产欧美日韩综合精品二区| 欧美一级一级性生活免费录像| 天天操天天色综合| 欧美一级夜夜爽| 国产一本一道久久香蕉| 国产欧美久久久精品影院| 成人看片黄a免费看在线| 中文字幕一区二区三区蜜月| 色天使久久综合网天天| 一区二区久久久| 91精品久久久久久久久99蜜臂| 狠狠网亚洲精品| 国产精品家庭影院| 欧美日韩一区二区欧美激情| 青青草国产成人av片免费| 精品福利av导航| 成人精品小蝌蚪| 亚洲福中文字幕伊人影院| 欧美一级夜夜爽| caoporn国产精品| 亚洲午夜国产一区99re久久| 欧美变态tickling挠脚心| 丁香网亚洲国际| 亚洲视频网在线直播| 777午夜精品免费视频| 国产成人一区在线| 亚洲自拍偷拍综合| 久久精品欧美一区二区三区不卡| 国产激情精品久久久第一区二区| 亚洲卡通欧美制服中文| 婷婷成人激情在线网| 欧美电影精品一区二区| 一本大道av伊人久久综合| 蜜臀久久久久久久| 亚洲三级免费观看| 日韩亚洲电影在线| 在线观看日韩电影| 成人免费视频播放| 青青草一区二区三区| 自拍av一区二区三区| 欧美成人猛片aaaaaaa| 成人精品一区二区三区四区 | 2014亚洲片线观看视频免费| 色综合色狠狠综合色| 国产自产视频一区二区三区| 一区二区三区四区在线播放 | 精品欧美一区二区三区精品久久| 94-欧美-setu| 国产 欧美在线| 一区二区三区日韩欧美精品| 中文字幕av一区二区三区免费看| 日韩亚洲欧美在线观看| 成人动漫精品一区二区| 久久国产综合精品| 亚洲国产精品欧美一二99| 国产欧美一区二区精品性色| 欧美日韩成人综合| 91久久精品一区二区二区| 成人免费三级在线| 国产精品亚洲一区二区三区妖精 | 久久久久久97三级| 日韩一区二区三区在线视频| 欧美日韩一区二区三区高清| 色噜噜狠狠一区二区三区果冻| 国产馆精品极品| 国产一区二区三区视频在线播放| 琪琪久久久久日韩精品| 香蕉久久夜色精品国产使用方法 | 性做久久久久久久免费看| 亚洲精品免费在线观看| 有坂深雪av一区二区精品| 亚洲狠狠丁香婷婷综合久久久| 1000部国产精品成人观看| 国产精品国产三级国产普通话三级| 久久精品人人做人人综合| 久久亚洲精品小早川怜子| 久久在线观看免费| 欧美韩日一区二区三区| 国产欧美日韩综合精品一区二区| 久久精品亚洲一区二区三区浴池| 精品福利在线导航| 国产精品视频一区二区三区不卡| 欧美国产日韩a欧美在线观看| 国产精品毛片a∨一区二区三区| 国产欧美日韩另类视频免费观看 | 26uuu国产日韩综合| 精品国产髙清在线看国产毛片| 精品不卡在线视频| 国产人成一区二区三区影院| 国产精品乱子久久久久| 夜夜操天天操亚洲| 日韩福利电影在线观看| 麻豆国产精品视频| 成人性生交大片免费| 91免费观看国产| 欧美丰满少妇xxxbbb| 久久蜜桃av一区二区天堂| 中文字幕在线一区| 亚洲一区在线播放| 激情综合一区二区三区| av网站一区二区三区| 欧美主播一区二区三区| 91精品国产色综合久久ai换脸| 久久久高清一区二区三区| 亚洲欧美一区二区不卡| 日日夜夜精品视频天天综合网| 国产在线观看一区二区| 欧美色图在线观看| 久久久精品一品道一区| 亚洲精品videosex极品| 久久精品国产免费看久久精品| 99热在这里有精品免费| 制服丝袜亚洲色图| 国产精品美日韩| 免费久久精品视频| 91色婷婷久久久久合中文| 欧美大胆一级视频| 亚洲美女屁股眼交3| 久久国产视频网| 色88888久久久久久影院野外| 日韩一区二区三区免费看 | 精品制服美女久久| 成人午夜电影小说| 欧美日韩色综合| 国产亚洲欧美一区在线观看| 一区二区三区欧美久久| 久久精品国产在热久久| 欧美性一区二区| 国产精品久久久久久久久动漫| 肉色丝袜一区二区| 欧美色图在线观看| 最新国产精品久久精品| 国产一区二区主播在线| 欧美日韩国产天堂| 一区二区三区免费观看| 丁香婷婷综合网| 久久综合九色综合欧美亚洲| 视频一区二区中文字幕| 色综合久久久久久久久久久| 国产欧美精品在线观看| 久草热8精品视频在线观看| 欧美日韩视频专区在线播放| 一区二区不卡在线视频 午夜欧美不卡在 | 亚洲欧洲精品天堂一级| 国产一区在线精品| 日韩欧美一区在线观看| 首页综合国产亚洲丝袜| 色吧成人激情小说| 日韩理论在线观看| 99久久综合99久久综合网站| 国产欧美一区在线| 国产高清在线观看免费不卡| 久久综合久色欧美综合狠狠| 久久精品二区亚洲w码| 制服.丝袜.亚洲.另类.中文| 天天综合天天综合色| 欧美日韩精品三区| 亚洲国产综合色| 777a∨成人精品桃花网| 日韩国产欧美三级|