亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? services.c

?? 底層驅動開發
?? C
?? 第 1 頁 / 共 3 頁
字號:
	struct convert_context_args args;	u32 seqno;	int rc = 0;	struct policy_file file = { data, len }, *fp = &file;	LOAD_LOCK;	if (!ss_initialized) {		avtab_cache_init();		if (policydb_read(&policydb, fp)) {			LOAD_UNLOCK;			avtab_cache_destroy();			return -EINVAL;		}		if (policydb_load_isids(&policydb, &sidtab)) {			LOAD_UNLOCK;			policydb_destroy(&policydb);			avtab_cache_destroy();			return -EINVAL;		}		policydb_loaded_version = policydb.policyvers;		ss_initialized = 1;		seqno = ++latest_granting;		LOAD_UNLOCK;		selinux_complete_init();		avc_ss_reset(seqno);		selnl_notify_policyload(seqno);		return 0;	}#if 0	sidtab_hash_eval(&sidtab, "sids");#endif	if (policydb_read(&newpolicydb, fp)) {		LOAD_UNLOCK;		return -EINVAL;	}	sidtab_init(&newsidtab);	/* Verify that the existing classes did not change. */	if (hashtab_map(policydb.p_classes.table, validate_class, &newpolicydb)) {		printk(KERN_ERR "security:  the definition of an existing "		       "class changed\n");		rc = -EINVAL;		goto err;	}	/* Clone the SID table. */	sidtab_shutdown(&sidtab);	if (sidtab_map(&sidtab, clone_sid, &newsidtab)) {		rc = -ENOMEM;		goto err;	}	/* Convert the internal representations of contexts	   in the new SID table and remove invalid SIDs. */	args.oldp = &policydb;	args.newp = &newpolicydb;	sidtab_map_remove_on_error(&newsidtab, convert_context, &args);	/* Save the old policydb and SID table to free later. */	memcpy(&oldpolicydb, &policydb, sizeof policydb);	sidtab_set(&oldsidtab, &sidtab);	/* Install the new policydb and SID table. */	POLICY_WRLOCK;	memcpy(&policydb, &newpolicydb, sizeof policydb);	sidtab_set(&sidtab, &newsidtab);	seqno = ++latest_granting;	policydb_loaded_version = policydb.policyvers;	POLICY_WRUNLOCK;	LOAD_UNLOCK;	/* Free the old policydb and SID table. */	policydb_destroy(&oldpolicydb);	sidtab_destroy(&oldsidtab);	avc_ss_reset(seqno);	selnl_notify_policyload(seqno);	return 0;err:	LOAD_UNLOCK;	sidtab_destroy(&newsidtab);	policydb_destroy(&newpolicydb);	return rc;}/** * security_port_sid - Obtain the SID for a port. * @domain: communication domain aka address family * @type: socket type * @protocol: protocol number * @port: port number * @out_sid: security identifier */int security_port_sid(u16 domain,		      u16 type,		      u8 protocol,		      u16 port,		      u32 *out_sid){	struct ocontext *c;	int rc = 0;	POLICY_RDLOCK;	c = policydb.ocontexts[OCON_PORT];	while (c) {		if (c->u.port.protocol == protocol &&		    c->u.port.low_port <= port &&		    c->u.port.high_port >= port)			break;		c = c->next;	}	if (c) {		if (!c->sid[0]) {			rc = sidtab_context_to_sid(&sidtab,						   &c->context[0],						   &c->sid[0]);			if (rc)				goto out;		}		*out_sid = c->sid[0];	} else {		*out_sid = SECINITSID_PORT;	}out:	POLICY_RDUNLOCK;	return rc;}/** * security_netif_sid - Obtain the SID for a network interface. * @name: interface name * @if_sid: interface SID * @msg_sid: default SID for received packets */int security_netif_sid(char *name,		       u32 *if_sid,		       u32 *msg_sid){	int rc = 0;	struct ocontext *c;	POLICY_RDLOCK;	c = policydb.ocontexts[OCON_NETIF];	while (c) {		if (strcmp(name, c->u.name) == 0)			break;		c = c->next;	}	if (c) {		if (!c->sid[0] || !c->sid[1]) {			rc = sidtab_context_to_sid(&sidtab,						  &c->context[0],						  &c->sid[0]);			if (rc)				goto out;			rc = sidtab_context_to_sid(&sidtab,						   &c->context[1],						   &c->sid[1]);			if (rc)				goto out;		}		*if_sid = c->sid[0];		*msg_sid = c->sid[1];	} else {		*if_sid = SECINITSID_NETIF;		*msg_sid = SECINITSID_NETMSG;	}out:	POLICY_RDUNLOCK;	return rc;}static int match_ipv6_addrmask(u32 *input, u32 *addr, u32 *mask){	int i, fail = 0;	for(i = 0; i < 4; i++)		if(addr[i] != (input[i] & mask[i])) {			fail = 1;			break;		}	return !fail;}/** * security_node_sid - Obtain the SID for a node (host). * @domain: communication domain aka address family * @addrp: address * @addrlen: address length in bytes * @out_sid: security identifier */int security_node_sid(u16 domain,		      void *addrp,		      u32 addrlen,		      u32 *out_sid){	int rc = 0;	struct ocontext *c;	POLICY_RDLOCK;	switch (domain) {	case AF_INET: {		u32 addr;		if (addrlen != sizeof(u32)) {			rc = -EINVAL;			goto out;		}		addr = *((u32 *)addrp);		c = policydb.ocontexts[OCON_NODE];		while (c) {			if (c->u.node.addr == (addr & c->u.node.mask))				break;			c = c->next;		}		break;	}	case AF_INET6:		if (addrlen != sizeof(u64) * 2) {			rc = -EINVAL;			goto out;		}		c = policydb.ocontexts[OCON_NODE6];		while (c) {			if (match_ipv6_addrmask(addrp, c->u.node6.addr,						c->u.node6.mask))				break;			c = c->next;		}		break;	default:		*out_sid = SECINITSID_NODE;		goto out;	}	if (c) {		if (!c->sid[0]) {			rc = sidtab_context_to_sid(&sidtab,						   &c->context[0],						   &c->sid[0]);			if (rc)				goto out;		}		*out_sid = c->sid[0];	} else {		*out_sid = SECINITSID_NODE;	}out:	POLICY_RDUNLOCK;	return rc;}#define SIDS_NEL 25/** * security_get_user_sids - Obtain reachable SIDs for a user. * @fromsid: starting SID * @username: username * @sids: array of reachable SIDs for user * @nel: number of elements in @sids * * Generate the set of SIDs for legal security contexts * for a given user that can be reached by @fromsid. * Set *@sids to point to a dynamically allocated * array containing the set of SIDs.  Set *@nel to the * number of elements in the array. */int security_get_user_sids(u32 fromsid,	                   char *username,			   u32 **sids,			   u32 *nel){	struct context *fromcon, usercon;	u32 *mysids, *mysids2, sid;	u32 mynel = 0, maxnel = SIDS_NEL;	struct user_datum *user;	struct role_datum *role;	struct av_decision avd;	struct ebitmap_node *rnode, *tnode;	int rc = 0, i, j;	if (!ss_initialized) {		*sids = NULL;		*nel = 0;		goto out;	}	POLICY_RDLOCK;	fromcon = sidtab_search(&sidtab, fromsid);	if (!fromcon) {		rc = -EINVAL;		goto out_unlock;	}	user = hashtab_search(policydb.p_users.table, username);	if (!user) {		rc = -EINVAL;		goto out_unlock;	}	usercon.user = user->value;	mysids = kmalloc(maxnel*sizeof(*mysids), GFP_ATOMIC);	if (!mysids) {		rc = -ENOMEM;		goto out_unlock;	}	memset(mysids, 0, maxnel*sizeof(*mysids));	ebitmap_for_each_bit(&user->roles, rnode, i) {		if (!ebitmap_node_get_bit(rnode, i))			continue;		role = policydb.role_val_to_struct[i];		usercon.role = i+1;		ebitmap_for_each_bit(&role->types, tnode, j) {			if (!ebitmap_node_get_bit(tnode, j))				continue;			usercon.type = j+1;			if (mls_setup_user_range(fromcon, user, &usercon))				continue;			rc = context_struct_compute_av(fromcon, &usercon,						       SECCLASS_PROCESS,						       PROCESS__TRANSITION,						       &avd);			if (rc ||  !(avd.allowed & PROCESS__TRANSITION))				continue;			rc = sidtab_context_to_sid(&sidtab, &usercon, &sid);			if (rc) {				kfree(mysids);				goto out_unlock;			}			if (mynel < maxnel) {				mysids[mynel++] = sid;			} else {				maxnel += SIDS_NEL;				mysids2 = kmalloc(maxnel*sizeof(*mysids2), GFP_ATOMIC);				if (!mysids2) {					rc = -ENOMEM;					kfree(mysids);					goto out_unlock;				}				memset(mysids2, 0, maxnel*sizeof(*mysids2));				memcpy(mysids2, mysids, mynel * sizeof(*mysids2));				kfree(mysids);				mysids = mysids2;				mysids[mynel++] = sid;			}		}	}	*sids = mysids;	*nel = mynel;out_unlock:	POLICY_RDUNLOCK;out:	return rc;}/** * security_genfs_sid - Obtain a SID for a file in a filesystem * @fstype: filesystem type * @path: path from root of mount * @sclass: file security class * @sid: SID for path * * Obtain a SID to use for a file in a filesystem that * cannot support xattr or use a fixed labeling behavior like * transition SIDs or task SIDs. */int security_genfs_sid(const char *fstype,	               char *path,		       u16 sclass,		       u32 *sid){	int len;	struct genfs *genfs;	struct ocontext *c;	int rc = 0, cmp = 0;	POLICY_RDLOCK;	for (genfs = policydb.genfs; genfs; genfs = genfs->next) {		cmp = strcmp(fstype, genfs->fstype);		if (cmp <= 0)			break;	}	if (!genfs || cmp) {		*sid = SECINITSID_UNLABELED;		rc = -ENOENT;		goto out;	}	for (c = genfs->head; c; c = c->next) {		len = strlen(c->u.name);		if ((!c->v.sclass || sclass == c->v.sclass) &&		    (strncmp(c->u.name, path, len) == 0))			break;	}	if (!c) {		*sid = SECINITSID_UNLABELED;		rc = -ENOENT;		goto out;	}	if (!c->sid[0]) {		rc = sidtab_context_to_sid(&sidtab,					   &c->context[0],					   &c->sid[0]);		if (rc)			goto out;	}	*sid = c->sid[0];out:	POLICY_RDUNLOCK;	return rc;}/** * security_fs_use - Determine how to handle labeling for a filesystem. * @fstype: filesystem type * @behavior: labeling behavior * @sid: SID for filesystem (superblock) */int security_fs_use(	const char *fstype,	unsigned int *behavior,	u32 *sid){	int rc = 0;	struct ocontext *c;	POLICY_RDLOCK;	c = policydb.ocontexts[OCON_FSUSE];	while (c) {		if (strcmp(fstype, c->u.name) == 0)			break;		c = c->next;	}	if (c) {		*behavior = c->v.behavior;		if (!c->sid[0]) {			rc = sidtab_context_to_sid(&sidtab,						   &c->context[0],						   &c->sid[0]);			if (rc)				goto out;		}		*sid = c->sid[0];	} else {		rc = security_genfs_sid(fstype, "/", SECCLASS_DIR, sid);		if (rc) {			*behavior = SECURITY_FS_USE_NONE;			rc = 0;		} else {			*behavior = SECURITY_FS_USE_GENFS;		}	}out:	POLICY_RDUNLOCK;	return rc;}int security_get_bools(int *len, char ***names, int **values){	int i, rc = -ENOMEM;	POLICY_RDLOCK;	*names = NULL;	*values = NULL;	*len = policydb.p_bools.nprim;	if (!*len) {		rc = 0;		goto out;	}	*names = (char**)kmalloc(sizeof(char*) * *len, GFP_ATOMIC);	if (!*names)		goto err;	memset(*names, 0, sizeof(char*) * *len);	*values = (int*)kmalloc(sizeof(int) * *len, GFP_ATOMIC);	if (!*values)		goto err;	for (i = 0; i < *len; i++) {		size_t name_len;		(*values)[i] = policydb.bool_val_to_struct[i]->state;		name_len = strlen(policydb.p_bool_val_to_name[i]) + 1;		(*names)[i] = (char*)kmalloc(sizeof(char) * name_len, GFP_ATOMIC);		if (!(*names)[i])			goto err;		strncpy((*names)[i], policydb.p_bool_val_to_name[i], name_len);		(*names)[i][name_len - 1] = 0;	}	rc = 0;out:	POLICY_RDUNLOCK;	return rc;err:	if (*names) {		for (i = 0; i < *len; i++)			kfree((*names)[i]);	}	kfree(*values);	goto out;}int security_set_bools(int len, int *values){	int i, rc = 0;	int lenp, seqno = 0;	struct cond_node *cur;	POLICY_WRLOCK;	lenp = policydb.p_bools.nprim;	if (len != lenp) {		rc = -EFAULT;		goto out;	}	printk(KERN_INFO "security: committed booleans { ");	for (i = 0; i < len; i++) {		if (values[i]) {			policydb.bool_val_to_struct[i]->state = 1;		} else {			policydb.bool_val_to_struct[i]->state = 0;		}		if (i != 0)			printk(", ");		printk("%s:%d", policydb.p_bool_val_to_name[i],		       policydb.bool_val_to_struct[i]->state);	}	printk(" }\n");	for (cur = policydb.cond_list; cur != NULL; cur = cur->next) {		rc = evaluate_cond_node(&policydb, cur);		if (rc)			goto out;	}	seqno = ++latest_granting;out:	POLICY_WRUNLOCK;	if (!rc) {		avc_ss_reset(seqno);		selnl_notify_policyload(seqno);	}	return rc;}int security_get_bool_value(int bool){	int rc = 0;	int len;	POLICY_RDLOCK;	len = policydb.p_bools.nprim;	if (bool >= len) {		rc = -EFAULT;		goto out;	}	rc = policydb.bool_val_to_struct[bool]->state;out:	POLICY_RDUNLOCK;	return rc;}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
777午夜精品视频在线播放| 狠狠久久亚洲欧美| 9久草视频在线视频精品| 成人永久免费视频| 91麻豆精品久久久久蜜臀| 国产亚洲人成网站| 亚洲成人免费av| 91小视频免费看| 精品嫩草影院久久| 亚洲成人久久影院| 97精品久久久午夜一区二区三区| 制服.丝袜.亚洲.中文.综合| 国产精品全国免费观看高清| 国内外精品视频| 欧美精品丝袜中出| 亚洲免费观看高清完整版在线观看熊 | 国产成人在线看| 欧美日本在线播放| 亚洲欧美另类在线| 国产99久久久国产精品 | 色视频一区二区| 国产精品久久福利| 国产一区二区免费在线| 91精品国产欧美日韩| 亚洲成人免费观看| 欧美在线不卡视频| 一卡二卡三卡日韩欧美| 99久久精品一区二区| 国产精品日韩成人| 国产一区美女在线| 久久女同性恋中文字幕| 老司机精品视频线观看86| 精品视频在线看| 亚洲在线成人精品| 欧美无砖专区一中文字| 一区二区在线观看视频| 色噜噜夜夜夜综合网| 国产精品免费视频观看| 北条麻妃一区二区三区| 国产精品电影一区二区| www.久久精品| 亚洲欧美日韩小说| 欧美综合视频在线观看| 香港成人在线视频| 欧美日韩亚洲综合一区二区三区 | 欧美精品自拍偷拍| 免费成人性网站| 国产亚洲一区二区三区四区| 国产一区在线精品| 亚洲国产精品成人久久综合一区 | 欧美日韩三级一区| 日韩在线卡一卡二| 精品sm在线观看| 国产黄色精品网站| 亚洲日本成人在线观看| 欧美亚洲日本一区| 日韩电影在线一区二区| 久久久久久久久岛国免费| 国产成a人亚洲| 亚洲精品视频自拍| 日韩视频一区二区三区在线播放| 国产乱国产乱300精品| 最新高清无码专区| 欧美猛男超大videosgay| 精品亚洲免费视频| 中文字幕亚洲在| 在线不卡免费av| 国产精品亚洲一区二区三区妖精| 中文字幕一区二区三区四区不卡 | 蜜桃久久久久久久| 欧美国产激情二区三区 | 日本欧美一区二区| 中文字幕一区二| 日韩欧美国产麻豆| 99国内精品久久| 免费一级片91| 最新国产精品久久精品| 日韩欧美一区二区在线视频| 成人黄色电影在线| 欧美96一区二区免费视频| 日本一区二区电影| 欧美一区二区视频在线观看2020| 成人精品高清在线| 久久99精品网久久| 亚洲国产精品久久久久婷婷884 | 国产成人午夜精品5599| 性做久久久久久| 国产精品久久久久9999吃药| 91精品国产入口在线| 91久久一区二区| 国产99久久久国产精品潘金网站| 日产国产高清一区二区三区| 亚洲蜜臀av乱码久久精品蜜桃| 精品日韩av一区二区| 欧美疯狂做受xxxx富婆| 99精品一区二区三区| 国产一区二区三区精品视频| 日韩经典一区二区| 亚洲一区av在线| 亚洲九九爱视频| 日韩一区有码在线| 国产午夜精品一区二区三区嫩草| 这里是久久伊人| 欧美日韩国产另类一区| 日本乱人伦一区| 99re这里都是精品| 成人av网站免费| 国产传媒欧美日韩成人| 国产一区三区三区| 韩国午夜理伦三级不卡影院| 青青国产91久久久久久| 丝袜美腿一区二区三区| 午夜精品影院在线观看| 亚洲韩国一区二区三区| 亚洲va欧美va国产va天堂影院| 一区二区在线观看免费视频播放| 亚洲同性同志一二三专区| **性色生活片久久毛片| 亚洲精品亚洲人成人网在线播放| 综合电影一区二区三区 | 欧美丝袜第三区| 欧美日韩国产影片| 欧美久久一二区| 日韩一级成人av| 久久综合狠狠综合久久综合88 | 欧美电影影音先锋| 在线成人午夜影院| 欧美大片日本大片免费观看| 久久在线观看免费| 中文一区二区在线观看 | 国产精品久久久久永久免费观看| 中文字幕第一页久久| 国产精品女主播在线观看| 亚洲免费毛片网站| 亚洲一区二区三区在线播放| 蜜桃一区二区三区在线| 国产一区二区三区四| 成人18精品视频| 欧美视频一区在线| 日韩一区二区精品| 久久久三级国产网站| 在线成人免费观看| 国产日韩欧美a| 精品日韩在线一区| 午夜久久久久久电影| 午夜精彩视频在线观看不卡| 日韩国产在线观看一区| 国产一区二区不卡| 色婷婷av一区二区三区gif| 51久久夜色精品国产麻豆| 久久久777精品电影网影网| 亚洲精品久久7777| 美女性感视频久久| 99久久精品免费精品国产| 欧美日韩午夜影院| 欧美激情在线一区二区| 亚洲国产日韩一级| 国产a级毛片一区| 欧美日韩不卡在线| 国产农村妇女毛片精品久久麻豆| 一区二区三区不卡视频在线观看 | 欧美日韩美少妇| 欧美精品一区二区蜜臀亚洲| 亚洲视频狠狠干| 久久精品免费观看| 色婷婷精品久久二区二区蜜臀av| 欧美一区二区三区免费在线看| 中文字幕一区日韩精品欧美| 另类小说色综合网站| 日本韩国欧美在线| 中文字幕欧美三区| 黄色小说综合网站| 欧美精品高清视频| 一区二区不卡在线视频 午夜欧美不卡在| 麻豆91在线看| 欧美日韩一卡二卡三卡| 国产精品福利影院| 国产精品一二三四区| 欧美一区二区日韩| 亚洲国产cao| 91亚洲男人天堂| 国产精品日日摸夜夜摸av| 极品少妇xxxx精品少妇| 欧美人伦禁忌dvd放荡欲情| 综合欧美一区二区三区| 国产成人免费xxxxxxxx| 精品人在线二区三区| 日韩成人精品在线| 欧美日韩在线电影| 亚洲福利一二三区| 欧美日韩专区在线| 亚洲午夜日本在线观看| 欧洲色大大久久| 亚洲婷婷综合久久一本伊一区 | 国产成人在线视频网站| 精品久久久久香蕉网| 视频一区二区国产| 欧美一区二区女人| 亚洲成av人片在线观看无码| 在线免费一区三区|