736 lines
16 KiB
C
736 lines
16 KiB
C
/* $NetBSD: policy.c,v 1.10 2002/12/04 03:19:05 provos Exp $ */
|
|
/* $OpenBSD: policy.c,v 1.15 2002/08/07 00:34:17 vincent Exp $ */
|
|
/*
|
|
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by Niels Provos.
|
|
* 4. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
#include <sys/cdefs.h>
|
|
__RCSID("$NetBSD: policy.c,v 1.10 2002/12/04 03:19:05 provos Exp $");
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/param.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/tree.h>
|
|
#include <dirent.h>
|
|
#include <limits.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <grp.h>
|
|
#include <stdio.h>
|
|
#include <fcntl.h>
|
|
#include <ctype.h>
|
|
#include <err.h>
|
|
|
|
#include "intercept.h"
|
|
#include "systrace.h"
|
|
|
|
static int psccompare(struct policy_syscall *, struct policy_syscall *);
|
|
static int policycompare(struct policy *, struct policy *);
|
|
static int polnrcompare(struct policy *, struct policy *);
|
|
static char *systrace_policyfilename(char *, const char *);
|
|
static char *systrace_policyline(char *line);
|
|
static int systrace_policyprocess(struct policy *,
|
|
char *);
|
|
static int systrace_writepolicy(struct policy *);
|
|
|
|
int systrace_templatedir(void);
|
|
|
|
static int
|
|
psccompare(struct policy_syscall *a, struct policy_syscall *b)
|
|
{
|
|
int diff;
|
|
diff = strcmp(a->emulation, b->emulation);
|
|
if (diff)
|
|
return (diff);
|
|
return (strcmp(a->name, b->name));
|
|
}
|
|
|
|
SPLAY_PROTOTYPE(syscalltree, policy_syscall, node, psccompare);
|
|
SPLAY_GENERATE(syscalltree, policy_syscall, node, psccompare);
|
|
|
|
static SPLAY_HEAD(policytree, policy) policyroot;
|
|
static SPLAY_HEAD(polnrtree, policy) polnrroot;
|
|
|
|
int
|
|
policycompare(struct policy *a, struct policy *b)
|
|
{
|
|
return (strcmp(a->name, b->name));
|
|
}
|
|
|
|
int
|
|
polnrcompare(struct policy *a, struct policy *b)
|
|
{
|
|
int diff = a->policynr - b->policynr;
|
|
|
|
if (diff == 0)
|
|
return (0);
|
|
if (diff > 0 )
|
|
return (1);
|
|
return (-1);
|
|
}
|
|
|
|
SPLAY_PROTOTYPE(policytree, policy, node, policycompare);
|
|
SPLAY_GENERATE(policytree, policy, node, policycompare);
|
|
|
|
SPLAY_PROTOTYPE(polnrtree, policy, nrnode, polnrcompare);
|
|
SPLAY_GENERATE(polnrtree, policy, nrnode, polnrcompare);
|
|
|
|
extern int userpolicy;
|
|
|
|
static char policydir[MAXPATHLEN];
|
|
static char *groupnames[NGROUPS_MAX];
|
|
static int ngroups;
|
|
|
|
struct tmplqueue templates;
|
|
|
|
void
|
|
systrace_setupdir(char *path)
|
|
{
|
|
char *home;
|
|
struct stat sb;
|
|
|
|
if (path == NULL) {
|
|
home = getenv("HOME");
|
|
|
|
if (home == NULL)
|
|
errx(1, "No HOME environment set");
|
|
|
|
if (strlcpy(policydir, home, sizeof(policydir)) >= sizeof(policydir))
|
|
errx(1, "HOME too long");
|
|
|
|
if (strlcat(policydir, "/.systrace", sizeof(policydir)) >= sizeof(policydir))
|
|
errx(1, "HOME too long");
|
|
} else if (strlcpy(policydir, path, sizeof(policydir)) >= sizeof(policydir))
|
|
errx(1, "policy directory too long");
|
|
|
|
|
|
if (stat(policydir, &sb) != -1) {
|
|
if (!(sb.st_mode & S_IFDIR))
|
|
errx(1, "Not a directory: \"%s\"", policydir);
|
|
} else if (mkdir(policydir, 0700) == -1)
|
|
err(1, "mdkdir(%s)", policydir);
|
|
}
|
|
|
|
int
|
|
systrace_initpolicy(char *file, char *path)
|
|
{
|
|
gid_t groups[NGROUPS_MAX];
|
|
char gidbuf[10];
|
|
int i;
|
|
|
|
SPLAY_INIT(&policyroot);
|
|
SPLAY_INIT(&polnrroot);
|
|
|
|
/* Find out group names for current user */
|
|
if ((ngroups = getgroups(NGROUPS_MAX, groups)) == -1)
|
|
err(1, "getgroups");
|
|
|
|
for (i = 0; i < ngroups; i++) {
|
|
struct group *gr;
|
|
|
|
if ((gr = getgrgid(groups[i])) != NULL) {
|
|
if ((groupnames[i] = strdup(gr->gr_name)) == NULL)
|
|
err(1, "strdup(%s)", gr->gr_name);
|
|
} else {
|
|
snprintf(gidbuf, sizeof(gidbuf), "%u",
|
|
groups[i]);
|
|
if ((groupnames[i] = strdup(gidbuf)) == NULL)
|
|
err(1, "strdup(%s)", gidbuf);
|
|
}
|
|
}
|
|
|
|
if (userpolicy) {
|
|
systrace_setupdir(path);
|
|
systrace_templatedir();
|
|
}
|
|
|
|
if (file != NULL)
|
|
return (systrace_readpolicy(file));
|
|
|
|
return (0);
|
|
}
|
|
|
|
struct policy *
|
|
systrace_findpolicy(const char *name)
|
|
{
|
|
struct policy tmp;
|
|
|
|
tmp.name = name;
|
|
|
|
return (SPLAY_FIND(policytree, &policyroot, &tmp));
|
|
}
|
|
|
|
struct policy *
|
|
systrace_findpolnr(int nr)
|
|
{
|
|
struct policy tmp;
|
|
|
|
tmp.policynr = nr;
|
|
|
|
return (SPLAY_FIND(polnrtree, &polnrroot, &tmp));
|
|
}
|
|
|
|
int
|
|
systrace_newpolicynr(int fd, struct policy *tmp)
|
|
{
|
|
if (tmp->policynr != -1)
|
|
return (-1);
|
|
|
|
if ((tmp->policynr = intercept_newpolicy(fd)) == -1) {
|
|
free(tmp);
|
|
return (-1);
|
|
}
|
|
|
|
SPLAY_INSERT(polnrtree, &polnrroot, tmp);
|
|
|
|
return (tmp->policynr);
|
|
}
|
|
|
|
struct policy *
|
|
systrace_newpolicy(const char *emulation, const char *name)
|
|
{
|
|
struct policy *tmp;
|
|
|
|
if ((tmp = systrace_findpolicy(name)) != NULL)
|
|
return (tmp);
|
|
|
|
tmp = calloc(1, sizeof(struct policy));
|
|
if (tmp == NULL)
|
|
return (NULL);
|
|
|
|
tmp->policynr = -1;
|
|
|
|
/* New policies requires intialization */
|
|
if ((tmp->name = strdup(name)) == NULL)
|
|
err(1, "%s:%d: strdup", __func__, __LINE__);
|
|
strlcpy(tmp->emulation, emulation, sizeof(tmp->emulation));
|
|
|
|
SPLAY_INSERT(policytree, &policyroot, tmp);
|
|
SPLAY_INIT(&tmp->pflqs);
|
|
TAILQ_INIT(&tmp->filters);
|
|
TAILQ_INIT(&tmp->prefilters);
|
|
|
|
return (tmp);
|
|
}
|
|
|
|
struct filterq *
|
|
systrace_policyflq(struct policy *policy, const char *emulation,
|
|
const char *name)
|
|
{
|
|
struct policy_syscall tmp2, *tmp;
|
|
|
|
strlcpy(tmp2.emulation, emulation, sizeof(tmp2.emulation));
|
|
strlcpy(tmp2.name, name, sizeof(tmp2.name));
|
|
|
|
tmp = SPLAY_FIND(syscalltree, &policy->pflqs, &tmp2);
|
|
if (tmp != NULL)
|
|
return (&tmp->flq);
|
|
|
|
if ((tmp = calloc(1, sizeof(struct policy_syscall))) == NULL)
|
|
err(1, "%s:%d: out of memory", __func__, __LINE__);
|
|
|
|
strlcpy(tmp->emulation, emulation, sizeof(tmp->emulation));
|
|
strlcpy(tmp->name, name, sizeof(tmp->name));
|
|
TAILQ_INIT(&tmp->flq);
|
|
|
|
SPLAY_INSERT(syscalltree, &policy->pflqs, tmp);
|
|
|
|
return (&tmp->flq);
|
|
}
|
|
|
|
int
|
|
systrace_modifypolicy(int fd, int policynr, const char *name, short action)
|
|
{
|
|
struct policy *policy;
|
|
int res;
|
|
|
|
if ((policy = systrace_findpolnr(policynr)) == NULL)
|
|
return (-1);
|
|
|
|
res = intercept_modifypolicy(fd, policynr, policy->emulation,
|
|
name, action);
|
|
|
|
return (res);
|
|
}
|
|
|
|
char *
|
|
systrace_policyfilename(char *dirname, const char *name)
|
|
{
|
|
static char file[2*MAXPATHLEN];
|
|
const char *p;
|
|
int i, plen;
|
|
|
|
if (strlen(name) + strlen(dirname) + 1 >= sizeof(file))
|
|
return (NULL);
|
|
|
|
strlcpy(file, dirname, sizeof(file));
|
|
i = strlen(file);
|
|
file[i++] = '/';
|
|
plen = i;
|
|
|
|
p = name;
|
|
while (*p) {
|
|
if (!isalnum(*p)) {
|
|
if (i != plen)
|
|
file[i++] = '_';
|
|
} else
|
|
file[i++] = *p;
|
|
p++;
|
|
}
|
|
|
|
file[i] = '\0';
|
|
|
|
return (file);
|
|
}
|
|
|
|
int
|
|
systrace_addpolicy(const char *name)
|
|
{
|
|
char *file = NULL;
|
|
|
|
if (userpolicy) {
|
|
file = systrace_policyfilename(policydir, name);
|
|
/* Check if the user policy file exists */
|
|
if (file != NULL && access(file, R_OK) == -1)
|
|
file = NULL;
|
|
}
|
|
|
|
/* Read global policy */
|
|
if (file == NULL) {
|
|
file = systrace_policyfilename(POLICY_PATH, name);
|
|
if (file == NULL)
|
|
return (-1);
|
|
}
|
|
|
|
return (systrace_readpolicy(file));
|
|
}
|
|
|
|
/*
|
|
* Reads policy templates from the template directory.
|
|
* These policies can be inserted during interactive policy
|
|
* generation.
|
|
*/
|
|
|
|
int
|
|
systrace_templatedir(void)
|
|
{
|
|
char filename[MAXPATHLEN];
|
|
DIR *dir = NULL;
|
|
struct stat sb;
|
|
struct dirent *dp;
|
|
struct template *template;
|
|
int off;
|
|
|
|
TAILQ_INIT(&templates);
|
|
|
|
if (userpolicy) {
|
|
if (strlcpy(filename, policydir, sizeof(filename)) >=
|
|
sizeof(filename))
|
|
goto error;
|
|
if (strlcat(filename, "/templates", sizeof(filename)) >=
|
|
sizeof(filename))
|
|
goto error;
|
|
|
|
/* Check if template directory exists */
|
|
if (stat(filename, &sb) != -1 && (sb.st_mode & S_IFDIR))
|
|
dir = opendir(filename);
|
|
}
|
|
|
|
/* Read global policy */
|
|
if (dir == NULL) {
|
|
strlcpy(filename, POLICY_PATH, sizeof(filename));
|
|
strlcat(filename, "/templates", sizeof(filename));
|
|
if (stat(filename, &sb) != -1 && (sb.st_mode & S_IFDIR))
|
|
dir = opendir(filename);
|
|
if (dir == NULL)
|
|
return (-1);
|
|
}
|
|
|
|
if (strlcat(filename, "/", sizeof(filename)) >= sizeof(filename))
|
|
goto error;
|
|
off = strlen(filename);
|
|
|
|
while ((dp = readdir(dir)) != NULL) {
|
|
filename[off] = '\0';
|
|
if (strlcat(filename, dp->d_name, sizeof(filename)) >=
|
|
sizeof(filename))
|
|
goto error;
|
|
|
|
if (stat(filename, &sb) == -1 || !(sb.st_mode & S_IFREG))
|
|
continue;
|
|
|
|
template = systrace_readtemplate(filename, NULL, NULL);
|
|
if (template == NULL)
|
|
continue;
|
|
|
|
TAILQ_INSERT_TAIL(&templates, template, next);
|
|
}
|
|
closedir(dir);
|
|
|
|
return (0);
|
|
|
|
error:
|
|
errx(1, "%s: template name too long", __func__);
|
|
}
|
|
|
|
struct template *
|
|
systrace_readtemplate(char *filename, struct policy *policy,
|
|
struct template *template)
|
|
{
|
|
FILE *fp;
|
|
char line[_POSIX2_LINE_MAX], *p;
|
|
char *emulation, *name, *description;
|
|
int linenumber = 0;
|
|
|
|
if ((fp = fopen(filename, "r")) == NULL)
|
|
return (NULL);
|
|
|
|
/* Set up pid with current information */
|
|
while (fgets(line, sizeof(line), fp)) {
|
|
linenumber++;
|
|
|
|
if ((p = systrace_policyline(line)) == NULL) {
|
|
fprintf(stderr, "%s:%d: input line too long.\n",
|
|
filename, linenumber);
|
|
template = NULL;
|
|
goto out;
|
|
}
|
|
|
|
if (strlen(p) == 0)
|
|
continue;
|
|
|
|
if (!strncasecmp(p, "Template: ", 10)) {
|
|
p += 10;
|
|
name = strsep(&p, ",");
|
|
if (p == NULL)
|
|
goto error;
|
|
if (strncasecmp(p, " Emulation: ", 12))
|
|
goto error;
|
|
p += 12;
|
|
emulation = strsep(&p, ", ");
|
|
if (p == NULL)
|
|
goto error;
|
|
if (strncasecmp(p, " Description: ", 14))
|
|
goto error;
|
|
p += 14;
|
|
description = p;
|
|
|
|
if (template != NULL)
|
|
continue;
|
|
|
|
template = calloc(1, sizeof(struct template));
|
|
if (template == NULL)
|
|
err(1, "calloc");
|
|
|
|
template->filename = strdup(filename);
|
|
template->name = strdup(name);
|
|
template->emulation = strdup(emulation);
|
|
template->description = strdup(description);
|
|
|
|
if (template->filename == NULL ||
|
|
template->name == NULL ||
|
|
template->emulation == NULL ||
|
|
template->description == NULL)
|
|
err(1, "strdup");
|
|
|
|
continue;
|
|
}
|
|
|
|
if (policy == NULL)
|
|
return (template);
|
|
|
|
if (systrace_policyprocess(policy, p) == -1)
|
|
goto error;
|
|
}
|
|
|
|
out:
|
|
fclose(fp);
|
|
return (template);
|
|
|
|
error:
|
|
fprintf(stderr, "%s:%d: syntax error.\n", filename, linenumber);
|
|
goto out;
|
|
}
|
|
|
|
/* Removes trailing whitespace and comments from the input line */
|
|
|
|
static char *
|
|
systrace_policyline(char *line)
|
|
{
|
|
char *p;
|
|
int quoted = 0;
|
|
|
|
if ((p = strchr(line, '\n')) == NULL)
|
|
return (NULL);
|
|
*p = '\0';
|
|
|
|
/* Remove comments from the input line but ignore # that are part
|
|
* of the system call name or within quotes.
|
|
*/
|
|
for (p = line; *p; p++) {
|
|
if (*p == '"')
|
|
quoted = quoted ? 0 : 1;
|
|
if (*p == '#') {
|
|
if (quoted)
|
|
continue;
|
|
if (p != line && *(p-1) == '-')
|
|
continue;
|
|
*p = '\0';
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Remove trailing white space */
|
|
p = line + strlen(line) - 1;
|
|
while (p > line) {
|
|
if (!isspace(*p))
|
|
break;
|
|
*p-- = '\0';
|
|
}
|
|
|
|
/* Ignore white space at start of line */
|
|
p = line;
|
|
p += strspn(p, " \t");
|
|
|
|
return (p);
|
|
}
|
|
|
|
/*
|
|
* Parse a single line from a policy and convert it into a policy filter.
|
|
* Predicates are matched.
|
|
*/
|
|
|
|
static int
|
|
systrace_policyprocess(struct policy *policy, char *p)
|
|
{
|
|
char line[_POSIX2_LINE_MAX];
|
|
char *name, *emulation, *rule;
|
|
struct filter *filter, *parsed;
|
|
short action, future;
|
|
int resolved = 0, res, isvalid;
|
|
|
|
/* Delay predicate evaluation if we are root */
|
|
|
|
emulation = strsep(&p, "-");
|
|
if (p == NULL || *p == '\0')
|
|
return (-1);
|
|
|
|
if (strcmp(emulation, policy->emulation))
|
|
return (-1);
|
|
|
|
name = strsep(&p, ":");
|
|
if (p == NULL || *p != ' ')
|
|
return (-1);
|
|
|
|
isvalid = intercept_isvalidsystemcall(emulation, name);
|
|
|
|
p++;
|
|
rule = p;
|
|
|
|
if ((p = strrchr(p, ',')) != NULL && !strncasecmp(p, ", if", 4)) {
|
|
*p = '\0';
|
|
res = filter_parse_simple(rule, &action, &future);
|
|
*p = ',';
|
|
if (res == 0) {
|
|
/* Need to make a real policy out of it */
|
|
snprintf(line, sizeof(line), "true then %s", rule);
|
|
rule = line;
|
|
}
|
|
} else if (filter_parse_simple(rule, &action, &future) == 0)
|
|
resolved = 1;
|
|
|
|
/* For now, everything that does not seem to be a valid syscall
|
|
* does not get fast kernel policies even though the aliasing
|
|
* system supports it.
|
|
*/
|
|
if (resolved && !isvalid) {
|
|
resolved = 0;
|
|
snprintf(line, sizeof(line), "true then %s", rule);
|
|
rule = line;
|
|
}
|
|
|
|
/* If the simple parser did not match, try real parser */
|
|
if (!resolved) {
|
|
if (parse_filter(rule, &parsed) == -1)
|
|
return (-1);
|
|
|
|
filter_free(parsed);
|
|
}
|
|
|
|
filter = calloc(1, sizeof(struct filter));
|
|
if (filter == NULL)
|
|
err(1, "%s:%d: calloc", __func__, __LINE__);
|
|
|
|
filter->rule = strdup(rule);
|
|
if (filter->rule == NULL)
|
|
err(1, "%s:%d: strdup", __func__, __LINE__);
|
|
|
|
strlcpy(filter->name, name, sizeof(filter->name));
|
|
strlcpy(filter->emulation, emulation, sizeof(filter->emulation));
|
|
|
|
TAILQ_INSERT_TAIL(&policy->prefilters, filter, policy_next);
|
|
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
systrace_readpolicy(char *filename)
|
|
{
|
|
FILE *fp;
|
|
struct policy *policy;
|
|
char line[_POSIX2_LINE_MAX], *p;
|
|
char *emulation, *name;
|
|
int linenumber = 0;
|
|
int res = -1;
|
|
|
|
if ((fp = fopen(filename, "r")) == NULL)
|
|
return (-1);
|
|
|
|
policy = NULL;
|
|
while (fgets(line, sizeof(line), fp)) {
|
|
linenumber++;
|
|
|
|
if ((p = systrace_policyline(line)) == NULL) {
|
|
fprintf(stderr, "%s:%d: input line too long.\n",
|
|
filename, linenumber);
|
|
goto out;
|
|
}
|
|
|
|
if (strlen(p) == 0)
|
|
continue;
|
|
|
|
if (!strncasecmp(p, "Policy: ", 8)) {
|
|
p += 8;
|
|
name = strsep(&p, ",");
|
|
if (p == NULL)
|
|
goto error;
|
|
if (strncasecmp(p, " Emulation: ", 12))
|
|
goto error;
|
|
p += 12;
|
|
emulation = p;
|
|
|
|
policy = systrace_newpolicy(emulation, name);
|
|
if (policy == NULL)
|
|
goto error;
|
|
continue;
|
|
}
|
|
|
|
if (policy == NULL)
|
|
goto error;
|
|
|
|
if (!strncasecmp(p, "detached", 8)) {
|
|
policy->flags |= POLICY_DETACHED;
|
|
policy = NULL;
|
|
continue;
|
|
}
|
|
|
|
if (systrace_policyprocess(policy, p) == -1)
|
|
goto error;
|
|
}
|
|
res = 0;
|
|
|
|
out:
|
|
fclose(fp);
|
|
return (res);
|
|
|
|
error:
|
|
fprintf(stderr, "%s:%d: syntax error.\n", filename, linenumber);
|
|
goto out;
|
|
}
|
|
|
|
int
|
|
systrace_writepolicy(struct policy *policy)
|
|
{
|
|
FILE *fp;
|
|
int fd;
|
|
char *p;
|
|
char tmpname[2*MAXPATHLEN];
|
|
char finalname[2*MAXPATHLEN];
|
|
struct filter *filter;
|
|
|
|
if ((p = systrace_policyfilename(policydir, policy->name)) == NULL)
|
|
return (-1);
|
|
strlcpy(finalname, p, sizeof(finalname));
|
|
if ((p = systrace_policyfilename(policydir, "tmpXXXXXXXX")) == NULL)
|
|
return (-1);
|
|
strlcpy(tmpname, p, sizeof(tmpname));
|
|
if ((fd = mkstemp(tmpname)) == -1 ||
|
|
(fp = fdopen(fd, "w+")) == NULL) {
|
|
if (fd != -1) {
|
|
unlink(tmpname);
|
|
close(fd);
|
|
}
|
|
return (-1);
|
|
}
|
|
|
|
|
|
fprintf(fp, "Policy: %s, Emulation: %s\n",
|
|
policy->name, policy->emulation);
|
|
if (policy->flags & POLICY_DETACHED) {
|
|
fprintf(fp, "detached\n");
|
|
} else {
|
|
TAILQ_FOREACH(filter, &policy->prefilters, policy_next) {
|
|
fprintf(fp, "\t%s-%s: %s\n",
|
|
filter->emulation, filter->name, filter->rule);
|
|
}
|
|
TAILQ_FOREACH(filter, &policy->filters, policy_next) {
|
|
fprintf(fp, "\t%s-%s: %s\n",
|
|
filter->emulation, filter->name, filter->rule);
|
|
}
|
|
}
|
|
fprintf(fp, "\n");
|
|
fclose(fp);
|
|
|
|
if (rename(tmpname, finalname) == -1) {
|
|
warn("rename(%s, %s)", tmpname, finalname);
|
|
return (-1);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
systrace_dumppolicy(void)
|
|
{
|
|
struct policy *policy;
|
|
|
|
SPLAY_FOREACH(policy, policytree, &policyroot) {
|
|
if (!(policy->flags & POLICY_CHANGED))
|
|
continue;
|
|
|
|
if (systrace_writepolicy(policy) == -1)
|
|
fprintf(stderr, "Failed to write policy for %s\n",
|
|
policy->name);
|
|
else
|
|
policy->flags &= ~POLICY_CHANGED;
|
|
}
|
|
|
|
return (0);
|
|
}
|