Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
cloud-kernel
提交
a6926cc9
cloud-kernel
项目概览
openanolis
/
cloud-kernel
大约 1 年 前同步成功
通知
158
Star
36
Fork
7
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
10
列表
看板
标记
里程碑
合并请求
2
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
cloud-kernel
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
10
Issue
10
列表
看板
标记
里程碑
合并请求
2
合并请求
2
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
a6926cc9
编写于
5月 06, 2016
作者:
J
James Morris
浏览文件
操作
浏览文件
下载
差异文件
Merge branch 'stable-4.7' of
git://git.infradead.org/users/pcmoore/selinux
into next
上级
0250abcd
c2316dbf
变更
6
隐藏空白更改
内联
并排
Showing
6 changed file
with
128 addition
and
61 deletion
+128
-61
net/netlabel/netlabel_kapi.c
net/netlabel/netlabel_kapi.c
+1
-1
security/selinux/hooks.c
security/selinux/hooks.c
+102
-42
security/selinux/include/classmap.h
security/selinux/include/classmap.h
+19
-11
security/selinux/include/conditional.h
security/selinux/include/conditional.h
+1
-1
security/selinux/include/objsec.h
security/selinux/include/objsec.h
+2
-3
security/selinux/ss/services.c
security/selinux/ss/services.c
+3
-3
未找到文件。
net/netlabel/netlabel_kapi.c
浏览文件 @
a6926cc9
...
...
@@ -677,7 +677,7 @@ int netlbl_catmap_setrng(struct netlbl_lsm_catmap **catmap,
u32
spot
=
start
;
while
(
rc
==
0
&&
spot
<=
end
)
{
if
(((
spot
&
(
BITS_PER_LONG
-
1
))
!
=
0
)
&&
if
(((
spot
&
(
BITS_PER_LONG
-
1
))
=
=
0
)
&&
((
end
-
spot
)
>
BITS_PER_LONG
))
{
rc
=
netlbl_catmap_setlong
(
catmap
,
spot
,
...
...
security/selinux/hooks.c
浏览文件 @
a6926cc9
...
...
@@ -259,7 +259,7 @@ static int __inode_security_revalidate(struct inode *inode,
might_sleep_if
(
may_sleep
);
if
(
isec
->
initialized
==
LABEL_INVALI
D
)
{
if
(
ss_initialized
&&
isec
->
initialized
!=
LABEL_INITIALIZE
D
)
{
if
(
!
may_sleep
)
return
-
ECHILD
;
...
...
@@ -297,6 +297,13 @@ static struct inode_security_struct *inode_security(struct inode *inode)
return
inode
->
i_security
;
}
static
struct
inode_security_struct
*
backing_inode_security_novalidate
(
struct
dentry
*
dentry
)
{
struct
inode
*
inode
=
d_backing_inode
(
dentry
);
return
inode
->
i_security
;
}
/*
* Get the security label of a dentry's backing inode.
*/
...
...
@@ -686,7 +693,7 @@ static int selinux_set_mnt_opts(struct super_block *sb,
struct
superblock_security_struct
*
sbsec
=
sb
->
s_security
;
const
char
*
name
=
sb
->
s_type
->
name
;
struct
dentry
*
root
=
sbsec
->
sb
->
s_root
;
struct
inode_security_struct
*
root_isec
=
backing_inode_security
(
root
)
;
struct
inode_security_struct
*
root_isec
;
u32
fscontext_sid
=
0
,
context_sid
=
0
,
rootcontext_sid
=
0
;
u32
defcontext_sid
=
0
;
char
**
mount_options
=
opts
->
mnt_opts
;
...
...
@@ -729,6 +736,8 @@ static int selinux_set_mnt_opts(struct super_block *sb,
&&
(
num_opts
==
0
))
goto
out
;
root_isec
=
backing_inode_security_novalidate
(
root
);
/*
* parse the mount options, check if they are valid sids.
* also check if someone is trying to mount the same sb more
...
...
@@ -1622,7 +1631,7 @@ static int current_has_perm(const struct task_struct *tsk,
/* Check whether a task is allowed to use a capability. */
static
int
cred_has_capability
(
const
struct
cred
*
cred
,
int
cap
,
int
audit
)
int
cap
,
int
audit
,
bool
initns
)
{
struct
common_audit_data
ad
;
struct
av_decision
avd
;
...
...
@@ -1636,10 +1645,10 @@ static int cred_has_capability(const struct cred *cred,
switch
(
CAP_TO_INDEX
(
cap
))
{
case
0
:
sclass
=
SECCLASS_CAPABILITY
;
sclass
=
initns
?
SECCLASS_CAPABILITY
:
SECCLASS_CAP_USERNS
;
break
;
case
1
:
sclass
=
SECCLASS_CAPABILITY2
;
sclass
=
initns
?
SECCLASS_CAPABILITY2
:
SECCLASS_CAP2_USERNS
;
break
;
default:
printk
(
KERN_ERR
...
...
@@ -1781,7 +1790,6 @@ static int selinux_determine_inode_label(struct inode *dir,
u32
*
_new_isid
)
{
const
struct
superblock_security_struct
*
sbsec
=
dir
->
i_sb
->
s_security
;
const
struct
inode_security_struct
*
dsec
=
inode_security
(
dir
);
const
struct
task_security_struct
*
tsec
=
current_security
();
if
((
sbsec
->
flags
&
SE_SBINITIALIZED
)
&&
...
...
@@ -1791,6 +1799,7 @@ static int selinux_determine_inode_label(struct inode *dir,
tsec
->
create_sid
)
{
*
_new_isid
=
tsec
->
create_sid
;
}
else
{
const
struct
inode_security_struct
*
dsec
=
inode_security
(
dir
);
return
security_transition_sid
(
tsec
->
sid
,
dsec
->
sid
,
tclass
,
name
,
_new_isid
);
}
...
...
@@ -2075,7 +2084,7 @@ static int selinux_binder_transfer_file(struct task_struct *from,
u32
sid
=
task_sid
(
to
);
struct
file_security_struct
*
fsec
=
file
->
f_security
;
struct
dentry
*
dentry
=
file
->
f_path
.
dentry
;
struct
inode_security_struct
*
isec
=
backing_inode_security
(
dentry
)
;
struct
inode_security_struct
*
isec
;
struct
common_audit_data
ad
;
int
rc
;
...
...
@@ -2094,6 +2103,7 @@ static int selinux_binder_transfer_file(struct task_struct *from,
if
(
unlikely
(
IS_PRIVATE
(
d_backing_inode
(
dentry
))))
return
0
;
isec
=
backing_inode_security
(
dentry
);
return
avc_has_perm
(
sid
,
isec
->
sid
,
isec
->
sclass
,
file_to_av
(
file
),
&
ad
);
}
...
...
@@ -2142,7 +2152,7 @@ static int selinux_capset(struct cred *new, const struct cred *old,
static
int
selinux_capable
(
const
struct
cred
*
cred
,
struct
user_namespace
*
ns
,
int
cap
,
int
audit
)
{
return
cred_has_capability
(
cred
,
cap
,
audit
);
return
cred_has_capability
(
cred
,
cap
,
audit
,
ns
==
&
init_user_ns
);
}
static
int
selinux_quotactl
(
int
cmds
,
int
type
,
int
id
,
struct
super_block
*
sb
)
...
...
@@ -2220,7 +2230,7 @@ static int selinux_vm_enough_memory(struct mm_struct *mm, long pages)
int
rc
,
cap_sys_admin
=
0
;
rc
=
cred_has_capability
(
current_cred
(),
CAP_SYS_ADMIN
,
SECURITY_CAP_NOAUDIT
);
SECURITY_CAP_NOAUDIT
,
true
);
if
(
rc
==
0
)
cap_sys_admin
=
1
;
...
...
@@ -2229,6 +2239,20 @@ static int selinux_vm_enough_memory(struct mm_struct *mm, long pages)
/* binprm security operations */
static
u32
ptrace_parent_sid
(
struct
task_struct
*
task
)
{
u32
sid
=
0
;
struct
task_struct
*
tracer
;
rcu_read_lock
();
tracer
=
ptrace_parent
(
task
);
if
(
tracer
)
sid
=
task_sid
(
tracer
);
rcu_read_unlock
();
return
sid
;
}
static
int
check_nnp_nosuid
(
const
struct
linux_binprm
*
bprm
,
const
struct
task_security_struct
*
old_tsec
,
const
struct
task_security_struct
*
new_tsec
)
...
...
@@ -2350,18 +2374,7 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm)
* changes its SID has the appropriate permit */
if
(
bprm
->
unsafe
&
(
LSM_UNSAFE_PTRACE
|
LSM_UNSAFE_PTRACE_CAP
))
{
struct
task_struct
*
tracer
;
struct
task_security_struct
*
sec
;
u32
ptsid
=
0
;
rcu_read_lock
();
tracer
=
ptrace_parent
(
current
);
if
(
likely
(
tracer
!=
NULL
))
{
sec
=
__task_cred
(
tracer
)
->
security
;
ptsid
=
sec
->
sid
;
}
rcu_read_unlock
();
u32
ptsid
=
ptrace_parent_sid
(
current
);
if
(
ptsid
!=
0
)
{
rc
=
avc_has_perm
(
ptsid
,
new_tsec
->
sid
,
SECCLASS_PROCESS
,
...
...
@@ -3045,7 +3058,7 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
const
void
*
value
,
size_t
size
,
int
flags
)
{
struct
inode
*
inode
=
d_backing_inode
(
dentry
);
struct
inode_security_struct
*
isec
=
backing_inode_security
(
dentry
)
;
struct
inode_security_struct
*
isec
;
struct
superblock_security_struct
*
sbsec
;
struct
common_audit_data
ad
;
u32
newsid
,
sid
=
current_sid
();
...
...
@@ -3064,6 +3077,7 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
ad
.
type
=
LSM_AUDIT_DATA_DENTRY
;
ad
.
u
.
dentry
=
dentry
;
isec
=
backing_inode_security
(
dentry
);
rc
=
avc_has_perm
(
sid
,
isec
->
sid
,
isec
->
sclass
,
FILE__RELABELFROM
,
&
ad
);
if
(
rc
)
...
...
@@ -3122,7 +3136,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name,
int
flags
)
{
struct
inode
*
inode
=
d_backing_inode
(
dentry
);
struct
inode_security_struct
*
isec
=
backing_inode_security
(
dentry
)
;
struct
inode_security_struct
*
isec
;
u32
newsid
;
int
rc
;
...
...
@@ -3139,6 +3153,7 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name,
return
;
}
isec
=
backing_inode_security
(
dentry
);
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
isec
->
sid
=
newsid
;
isec
->
initialized
=
LABEL_INITIALIZED
;
...
...
@@ -3180,7 +3195,7 @@ static int selinux_inode_getsecurity(struct inode *inode, const char *name, void
u32
size
;
int
error
;
char
*
context
=
NULL
;
struct
inode_security_struct
*
isec
=
inode_security
(
inode
)
;
struct
inode_security_struct
*
isec
;
if
(
strcmp
(
name
,
XATTR_SELINUX_SUFFIX
))
return
-
EOPNOTSUPP
;
...
...
@@ -3198,7 +3213,8 @@ static int selinux_inode_getsecurity(struct inode *inode, const char *name, void
SECURITY_CAP_NOAUDIT
);
if
(
!
error
)
error
=
cred_has_capability
(
current_cred
(),
CAP_MAC_ADMIN
,
SECURITY_CAP_NOAUDIT
);
SECURITY_CAP_NOAUDIT
,
true
);
isec
=
inode_security
(
inode
);
if
(
!
error
)
error
=
security_sid_to_context_force
(
isec
->
sid
,
&
context
,
&
size
);
...
...
@@ -3219,7 +3235,7 @@ static int selinux_inode_getsecurity(struct inode *inode, const char *name, void
static
int
selinux_inode_setsecurity
(
struct
inode
*
inode
,
const
char
*
name
,
const
void
*
value
,
size_t
size
,
int
flags
)
{
struct
inode_security_struct
*
isec
=
inode_security
(
inode
);
struct
inode_security_struct
*
isec
=
inode_security
_novalidate
(
inode
);
u32
newsid
;
int
rc
;
...
...
@@ -3308,7 +3324,7 @@ static int ioctl_has_perm(const struct cred *cred, struct file *file,
struct
common_audit_data
ad
;
struct
file_security_struct
*
fsec
=
file
->
f_security
;
struct
inode
*
inode
=
file_inode
(
file
);
struct
inode_security_struct
*
isec
=
inode_security
(
inode
)
;
struct
inode_security_struct
*
isec
;
struct
lsm_ioctlop_audit
ioctl
;
u32
ssid
=
cred_sid
(
cred
);
int
rc
;
...
...
@@ -3332,6 +3348,7 @@ static int ioctl_has_perm(const struct cred *cred, struct file *file,
if
(
unlikely
(
IS_PRIVATE
(
inode
)))
return
0
;
isec
=
inode_security
(
inode
);
rc
=
avc_has_extended_perms
(
ssid
,
isec
->
sid
,
isec
->
sclass
,
requested
,
driver
,
xperm
,
&
ad
);
out:
...
...
@@ -3373,7 +3390,7 @@ static int selinux_file_ioctl(struct file *file, unsigned int cmd,
case
KDSKBENT
:
case
KDSKBSENT
:
error
=
cred_has_capability
(
cred
,
CAP_SYS_TTY_CONFIG
,
SECURITY_CAP_AUDIT
);
SECURITY_CAP_AUDIT
,
true
);
break
;
/* default case assumes that the command will go
...
...
@@ -3462,8 +3479,9 @@ static int selinux_file_mprotect(struct vm_area_struct *vma,
vma
->
vm_end
<=
vma
->
vm_mm
->
brk
)
{
rc
=
cred_has_perm
(
cred
,
cred
,
PROCESS__EXECHEAP
);
}
else
if
(
!
vma
->
vm_file
&&
vma
->
vm_start
<=
vma
->
vm_mm
->
start_stack
&&
vma
->
vm_end
>=
vma
->
vm_mm
->
start_stack
)
{
((
vma
->
vm_start
<=
vma
->
vm_mm
->
start_stack
&&
vma
->
vm_end
>=
vma
->
vm_mm
->
start_stack
)
||
vma_is_stack_for_task
(
vma
,
current
)))
{
rc
=
current_has_perm
(
current
,
PROCESS__EXECSTACK
);
}
else
if
(
vma
->
vm_file
&&
vma
->
anon_vma
)
{
/*
...
...
@@ -3719,6 +3737,52 @@ static int selinux_kernel_module_request(char *kmod_name)
SYSTEM__MODULE_REQUEST
,
&
ad
);
}
static
int
selinux_kernel_module_from_file
(
struct
file
*
file
)
{
struct
common_audit_data
ad
;
struct
inode_security_struct
*
isec
;
struct
file_security_struct
*
fsec
;
u32
sid
=
current_sid
();
int
rc
;
/* init_module */
if
(
file
==
NULL
)
return
avc_has_perm
(
sid
,
sid
,
SECCLASS_SYSTEM
,
SYSTEM__MODULE_LOAD
,
NULL
);
/* finit_module */
ad
.
type
=
LSM_AUDIT_DATA_PATH
;
ad
.
u
.
path
=
file
->
f_path
;
fsec
=
file
->
f_security
;
if
(
sid
!=
fsec
->
sid
)
{
rc
=
avc_has_perm
(
sid
,
fsec
->
sid
,
SECCLASS_FD
,
FD__USE
,
&
ad
);
if
(
rc
)
return
rc
;
}
isec
=
inode_security
(
file_inode
(
file
));
return
avc_has_perm
(
sid
,
isec
->
sid
,
SECCLASS_SYSTEM
,
SYSTEM__MODULE_LOAD
,
&
ad
);
}
static
int
selinux_kernel_read_file
(
struct
file
*
file
,
enum
kernel_read_file_id
id
)
{
int
rc
=
0
;
switch
(
id
)
{
case
READING_MODULE
:
rc
=
selinux_kernel_module_from_file
(
file
);
break
;
default:
break
;
}
return
rc
;
}
static
int
selinux_task_setpgid
(
struct
task_struct
*
p
,
pid_t
pgid
)
{
return
current_has_perm
(
p
,
PROCESS__SETPGID
);
...
...
@@ -4598,6 +4662,7 @@ static int selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *
{
u32
peer_secid
=
SECSID_NULL
;
u16
family
;
struct
inode_security_struct
*
isec
;
if
(
skb
&&
skb
->
protocol
==
htons
(
ETH_P_IP
))
family
=
PF_INET
;
...
...
@@ -4608,9 +4673,10 @@ static int selinux_socket_getpeersec_dgram(struct socket *sock, struct sk_buff *
else
goto
out
;
if
(
sock
&&
family
==
PF_UNIX
)
selinux_inode_getsecid
(
SOCK_INODE
(
sock
),
&
peer_secid
);
else
if
(
skb
)
if
(
sock
&&
family
==
PF_UNIX
)
{
isec
=
inode_security_novalidate
(
SOCK_INODE
(
sock
));
peer_secid
=
isec
->
sid
;
}
else
if
(
skb
)
selinux_skb_peerlbl_sid
(
skb
,
family
,
&
peer_secid
);
out:
...
...
@@ -5675,7 +5741,6 @@ static int selinux_setprocattr(struct task_struct *p,
char
*
name
,
void
*
value
,
size_t
size
)
{
struct
task_security_struct
*
tsec
;
struct
task_struct
*
tracer
;
struct
cred
*
new
;
u32
sid
=
0
,
ptsid
;
int
error
;
...
...
@@ -5782,14 +5847,8 @@ static int selinux_setprocattr(struct task_struct *p,
/* Check for ptracing, and update the task SID if ok.
Otherwise, leave SID unchanged and fail. */
ptsid
=
0
;
rcu_read_lock
();
tracer
=
ptrace_parent
(
p
);
if
(
tracer
)
ptsid
=
task_sid
(
tracer
);
rcu_read_unlock
();
if
(
tracer
)
{
ptsid
=
ptrace_parent_sid
(
p
);
if
(
ptsid
!=
0
)
{
error
=
avc_has_perm
(
ptsid
,
sid
,
SECCLASS_PROCESS
,
PROCESS__PTRACE
,
NULL
);
if
(
error
)
...
...
@@ -6020,6 +6079,7 @@ static struct security_hook_list selinux_hooks[] = {
LSM_HOOK_INIT
(
kernel_act_as
,
selinux_kernel_act_as
),
LSM_HOOK_INIT
(
kernel_create_files_as
,
selinux_kernel_create_files_as
),
LSM_HOOK_INIT
(
kernel_module_request
,
selinux_kernel_module_request
),
LSM_HOOK_INIT
(
kernel_read_file
,
selinux_kernel_read_file
),
LSM_HOOK_INIT
(
task_setpgid
,
selinux_task_setpgid
),
LSM_HOOK_INIT
(
task_getpgid
,
selinux_task_getpgid
),
LSM_HOOK_INIT
(
task_getsid
,
selinux_task_getsid
),
...
...
security/selinux/include/classmap.h
浏览文件 @
a6926cc9
...
...
@@ -12,6 +12,18 @@
#define COMMON_IPC_PERMS "create", "destroy", "getattr", "setattr", "read", \
"write", "associate", "unix_read", "unix_write"
#define COMMON_CAP_PERMS "chown", "dac_override", "dac_read_search", \
"fowner", "fsetid", "kill", "setgid", "setuid", "setpcap", \
"linux_immutable", "net_bind_service", "net_broadcast", \
"net_admin", "net_raw", "ipc_lock", "ipc_owner", "sys_module", \
"sys_rawio", "sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin", \
"sys_boot", "sys_nice", "sys_resource", "sys_time", \
"sys_tty_config", "mknod", "lease", "audit_write", \
"audit_control", "setfcap"
#define COMMON_CAP2_PERMS "mac_override", "mac_admin", "syslog", \
"wake_alarm", "block_suspend", "audit_read"
/*
* Note: The name for any socket class should be suffixed by "socket",
* and doesn't contain more than one substr of "socket".
...
...
@@ -32,16 +44,9 @@ struct security_class_mapping secclass_map[] = {
"setsockcreate"
,
NULL
}
},
{
"system"
,
{
"ipc_info"
,
"syslog_read"
,
"syslog_mod"
,
"syslog_console"
,
"module_request"
,
NULL
}
},
"syslog_console"
,
"module_request"
,
"module_load"
,
NULL
}
},
{
"capability"
,
{
"chown"
,
"dac_override"
,
"dac_read_search"
,
"fowner"
,
"fsetid"
,
"kill"
,
"setgid"
,
"setuid"
,
"setpcap"
,
"linux_immutable"
,
"net_bind_service"
,
"net_broadcast"
,
"net_admin"
,
"net_raw"
,
"ipc_lock"
,
"ipc_owner"
,
"sys_module"
,
"sys_rawio"
,
"sys_chroot"
,
"sys_ptrace"
,
"sys_pacct"
,
"sys_admin"
,
"sys_boot"
,
"sys_nice"
,
"sys_resource"
,
"sys_time"
,
"sys_tty_config"
,
"mknod"
,
"lease"
,
"audit_write"
,
"audit_control"
,
"setfcap"
,
NULL
}
},
{
COMMON_CAP_PERMS
,
NULL
}
},
{
"filesystem"
,
{
"mount"
,
"remount"
,
"unmount"
,
"getattr"
,
"relabelfrom"
,
"relabelto"
,
"associate"
,
"quotamod"
,
...
...
@@ -150,12 +155,15 @@ struct security_class_mapping secclass_map[] = {
{
"memprotect"
,
{
"mmap_zero"
,
NULL
}
},
{
"peer"
,
{
"recv"
,
NULL
}
},
{
"capability2"
,
{
"mac_override"
,
"mac_admin"
,
"syslog"
,
"wake_alarm"
,
"block_suspend"
,
"audit_read"
,
NULL
}
},
{
COMMON_CAP2_PERMS
,
NULL
}
},
{
"kernel_service"
,
{
"use_as_override"
,
"create_files_as"
,
NULL
}
},
{
"tun_socket"
,
{
COMMON_SOCK_PERMS
,
"attach_queue"
,
NULL
}
},
{
"binder"
,
{
"impersonate"
,
"call"
,
"set_context_mgr"
,
"transfer"
,
NULL
}
},
{
"cap_userns"
,
{
COMMON_CAP_PERMS
,
NULL
}
},
{
"cap2_userns"
,
{
COMMON_CAP2_PERMS
,
NULL
}
},
{
NULL
}
};
security/selinux/include/conditional.h
浏览文件 @
a6926cc9
...
...
@@ -17,6 +17,6 @@ int security_get_bools(int *len, char ***names, int **values);
int
security_set_bools
(
int
len
,
int
*
values
);
int
security_get_bool_value
(
int
bool
);
int
security_get_bool_value
(
int
index
);
#endif
security/selinux/include/objsec.h
浏览文件 @
a6926cc9
...
...
@@ -38,9 +38,8 @@ struct task_security_struct {
};
enum
label_initialized
{
LABEL_MISSING
,
/* not initialized */
LABEL_INITIALIZED
,
/* inizialized */
LABEL_INVALID
/* invalid */
LABEL_INVALID
,
/* invalid or not initialized */
LABEL_INITIALIZED
/* initialized */
};
struct
inode_security_struct
{
...
...
security/selinux/ss/services.c
浏览文件 @
a6926cc9
...
...
@@ -2696,7 +2696,7 @@ int security_set_bools(int len, int *values)
return
rc
;
}
int
security_get_bool_value
(
int
bool
)
int
security_get_bool_value
(
int
index
)
{
int
rc
;
int
len
;
...
...
@@ -2705,10 +2705,10 @@ int security_get_bool_value(int bool)
rc
=
-
EFAULT
;
len
=
policydb
.
p_bools
.
nprim
;
if
(
bool
>=
len
)
if
(
index
>=
len
)
goto
out
;
rc
=
policydb
.
bool_val_to_struct
[
bool
]
->
state
;
rc
=
policydb
.
bool_val_to_struct
[
index
]
->
state
;
out:
read_unlock
(
&
policy_rwlock
);
return
rc
;
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录