ClamAV is an open source (GPLv2) anti-virus toolkit.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
clamav/clamdscan/proto.c

453 lines
12 KiB

/*
* Copyright (C) 2013-2024 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
* Copyright (C) 2009-2013 Sourcefire, Inc.
*
* Authors: Tomasz Kojm, aCaB
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
* MA 02110-1301, USA.
*/
#if HAVE_CONFIG_H
#include "clamav-config.h"
#endif
#if defined(C_SOLARIS)
#ifndef __EXTENSIONS__
#define __EXTENSIONS__
#endif
#endif
/* must be first because it may define _XOPEN_SOURCE */
#include "fdpassing.h"
#include <stdio.h>
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#include <string.h>
#include <errno.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#ifdef HAVE_SYS_SELECT_H
#include <sys/select.h>
#endif
#ifndef _WIN32
#include <arpa/inet.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <netdb.h>
#endif
// libclamav
#include "clamav.h"
#include "others.h"
// common
#include "actions.h"
#include "output.h"
#include "misc.h"
#include "clamdcom.h"
#include "proto.h"
#include "client.h"
extern unsigned long int maxstream;
int printinfected;
extern struct optstruct *clamdopts;
static int ftw_chkpath(const char *path, struct cli_ftw_cbdata *data)
{
UNUSEDPARAM(data);
return chkpath(path, clamdopts);
}
/* Used by serial_callback() */
struct client_serial_data {
int infected;
int scantype;
int printok;
int files;
int errors;
};
/* FTW callback for scanning in non IDSESSION mode
* Returns SUCCESS or BREAK on success, CL_EXXX on error */
static cl_error_t serial_callback(STATBUF *sb, char *filename, const char *path, enum cli_ftw_reason reason, struct cli_ftw_cbdata *data)
{
int status = CL_EOPEN;
struct client_serial_data *c = (struct client_serial_data *)data->data;
int sockd, ret;
const char *f = filename;
char *real_filename = NULL;
UNUSEDPARAM(sb);
if (reason != visit_directory_toplev) {
if (CL_SUCCESS != cli_realpath((const char *)path, &real_filename)) {
logg(LOGG_DEBUG, "Failed to determine real filename of %s.\n", path);
logg(LOGG_DEBUG, "Quarantine of the file may fail if file path contains symlinks.\n");
} else {
path = real_filename;
}
}
if (chkpath(path, clamdopts)) {
/* Exclude the path */
status = CL_SUCCESS;
goto done;
}
c->files++;
switch (reason) {
case error_stat:
logg(LOGG_ERROR, "Can't access file %s\n", path);
c->errors++;
status = CL_SUCCESS;
goto done;
case error_mem:
logg(LOGG_ERROR, "Memory allocation failed in ftw\n");
c->errors++;
status = CL_EMEM;
goto done;
case warning_skipped_dir:
logg(LOGG_WARNING, "Directory recursion limit reached\n");
/* fall-through */
case warning_skipped_link:
status = CL_SUCCESS;
goto done;
case warning_skipped_special:
logg(LOGG_WARNING, "%s: Not supported file type\n", path);
c->errors++;
status = CL_SUCCESS;
goto done;
case visit_directory_toplev:
if (c->scantype >= STREAM) {
status = CL_SUCCESS;
goto done;
}
f = path;
case visit_file:
break;
}
if ((sockd = dconnect(clamdopts)) < 0) {
c->errors++;
goto done;
}
ret = dsresult(sockd, c->scantype, f, &c->printok, &c->errors, clamdopts);
closesocket(sockd);
if (ret < 0) {
c->errors++;
goto done;
}
c->infected += ret;
if (reason == visit_directory_toplev) {
status = CL_BREAK;
goto done;
}
status = CL_SUCCESS;
done:
if (NULL != real_filename) {
free(real_filename);
}
free(filename);
return status;
}
/* Non-IDSESSION handler
* Returns non zero for serious errors, zero otherwise */
int serial_client_scan(char *file, int scantype, int *infected, int *err, int maxlevel, int flags)
{
struct cli_ftw_cbdata data;
struct client_serial_data cdata;
int ftw;
cdata.infected = 0;
cdata.files = 0;
cdata.errors = 0;
cdata.printok = printinfected ^ 1;
cdata.scantype = scantype;
data.data = &cdata;
ftw = cli_ftw(file, flags, maxlevel ? maxlevel : INT_MAX, serial_callback, &data, ftw_chkpath);
*infected += cdata.infected;
*err += cdata.errors;
if (!cdata.errors && (ftw == CL_SUCCESS || ftw == CL_BREAK)) {
if (cdata.printok)
logg(LOGG_INFO, "%s: OK\n", file);
return 0;
} else if (!cdata.files) {
logg(LOGG_INFO, "%s: No files scanned\n", file);
return 0;
}
return 1;
}
/* Used in IDSESSION mode */
struct client_parallel_data {
int infected;
int files;
int errors;
int scantype;
int sockd;
int lastid;
int printok;
struct SCANID {
unsigned int id;
const char *file;
struct SCANID *next;
} *ids;
};
/* Sends a proper scan request to clamd and parses its replies
* This is used only in IDSESSION mode
* Returns 0 on success, 1 on hard failures, 2 on len == 0 (bb#1717) */
static int dspresult(struct client_parallel_data *c)
{
const char *filename;
char *bol, *eol;
unsigned int rid;
int len;
struct SCANID **id = NULL;
struct RCVLN rcv;
recvlninit(&rcv, c->sockd);
do {
len = recvln(&rcv, &bol, &eol);
if (len < 0) return 1;
if (!len) return 2;
if ((rid = atoi(bol))) {
id = &c->ids;
while (*id) {
if ((*id)->id == rid) break;
id = &((*id)->next);
}
if (!*id) id = NULL;
}
if (!id) {
logg(LOGG_ERROR, "Bogus session id from clamd\n");
return 1;
}
filename = (*id)->file;
if (len > 7) {
char *colon = strrchr(bol, ':');
if (!colon) {
logg(LOGG_ERROR, "Failed to parse reply\n");
free((void *)filename);
return 1;
} else if (!memcmp(eol - 7, " FOUND", 6)) {
c->infected++;
c->printok = 0;
logg(LOGG_INFO, "%s%s\n", filename, colon);
if (action) action(filename);
} else if (!memcmp(eol - 7, " ERROR", 6)) {
c->errors++;
c->printok = 0;
logg(LOGG_INFO, "%s%s\n", filename, colon);
}
}
free((void *)filename);
bol = (char *)*id;
*id = (*id)->next;
free(bol);
} while (rcv.cur != rcv.buf); /* clamd sends whole lines, so, on partial lines, we just assume
more data can be recv()'d with close to zero latency */
return 0;
}
/* FTW callback for scanning in IDSESSION mode
* Returns SUCCESS on success, CL_EXXX or BREAK on error */
static cl_error_t parallel_callback(STATBUF *sb, char *filename, const char *path, enum cli_ftw_reason reason, struct cli_ftw_cbdata *data)
{
cl_error_t status = CL_EOPEN;
struct client_parallel_data *c = (struct client_parallel_data *)data->data;
struct SCANID *cid = NULL;
int res = CL_CLEAN;
char *real_filename = NULL;
UNUSEDPARAM(sb);
UNUSEDPARAM(path);
if (reason != visit_directory_toplev) {
if (CL_SUCCESS != cli_realpath((const char *)filename, &real_filename)) {
logg(LOGG_DEBUG, "Failed to determine real filename of %s.\n", filename);
logg(LOGG_DEBUG, "Quarantine of the file may fail if file path contains symlinks.\n");
} else {
free(filename); /* callback is responsible for free'ing filename parameter. */
filename = real_filename;
}
}
if (chkpath(filename, clamdopts)) {
/* Exclude the path */
status = CL_SUCCESS;
goto done;
}
c->files++;
switch (reason) {
case error_stat:
logg(LOGG_ERROR, "Can't access file %s\n", filename);
c->errors++;
status = CL_SUCCESS;
goto done;
case error_mem:
logg(LOGG_ERROR, "Memory allocation failed in ftw\n");
c->errors++;
status = CL_EMEM;
goto done;
case warning_skipped_dir:
logg(LOGG_WARNING, "Directory recursion limit reached\n");
status = CL_SUCCESS;
goto done;
case warning_skipped_special:
logg(LOGG_WARNING, "%s: Not supported file type\n", filename);
c->errors++;
/* fall-through */
case warning_skipped_link:
case visit_directory_toplev:
status = CL_SUCCESS;
goto done;
case visit_file:
break;
}
while (1) {
/* consume all the available input to let some of the clamd
* threads blocked on send() to be dead.
* by doing so we shouldn't deadlock on the next recv() */
fd_set rfds, wfds;
FD_ZERO(&rfds);
FD_SET(c->sockd, &rfds);
FD_ZERO(&wfds);
FD_SET(c->sockd, &wfds);
if (select(c->sockd + 1, &rfds, &wfds, NULL, NULL) < 0) {
if (errno == EINTR) continue;
logg(LOGG_ERROR, "select() failed during session: %s\n", strerror(errno));
status = CL_BREAK;
goto done;
}
if (FD_ISSET(c->sockd, &rfds)) {
if (dspresult(c)) {
status = CL_BREAK;
goto done;
} else
continue;
}
if (FD_ISSET(c->sockd, &wfds)) break;
}
switch (c->scantype) {
#ifdef HAVE_FD_PASSING
case FILDES:
res = send_fdpass(c->sockd, filename);
break;
#endif
case STREAM:
res = send_stream(c->sockd, filename, clamdopts);
break;
}
if (res <= 0) {
c->printok = 0;
c->errors++;
status = res ? CL_BREAK : CL_SUCCESS;
goto done;
}
cid = (struct SCANID *)malloc(sizeof(struct SCANID));
if (!cid) {
logg(LOGG_ERROR, "Failed to allocate scanid entry: %s\n", strerror(errno));
status = CL_BREAK;
goto done;
}
cid->id = ++c->lastid;
cid->file = filename;
cid->next = c->ids;
c->ids = cid;
/* Give up ownership of the filename to the client parallel scan ID list */
filename = NULL;
status = CL_SUCCESS;
done:
if (NULL != filename) {
free(filename);
}
return status;
}
/* IDSESSION handler
* Returns non zero for serious errors, zero otherwise */
int parallel_client_scan(char *file, int scantype, int *infected, int *err, int maxlevel, int flags)
{
struct cli_ftw_cbdata data;
struct client_parallel_data cdata;
int ftw;
const char zIDSESSION[] = "zIDSESSION";
const char zEND[] = "zEND";
if ((cdata.sockd = dconnect(clamdopts)) < 0)
return 1;
if (sendln(cdata.sockd, zIDSESSION, sizeof(zIDSESSION))) {
closesocket(cdata.sockd);
return 1;
}
cdata.infected = 0;
cdata.files = 0;
cdata.errors = 0;
cdata.scantype = scantype;
cdata.lastid = 0;
cdata.ids = NULL;
cdata.printok = printinfected ^ 1;
data.data = &cdata;
ftw = cli_ftw(file, flags, maxlevel ? maxlevel : INT_MAX, parallel_callback, &data, ftw_chkpath);
if (ftw != CL_SUCCESS) {
*err += cdata.errors;
*infected += cdata.infected;
closesocket(cdata.sockd);
return 1;
}
sendln(cdata.sockd, zEND, sizeof(zEND));
while (cdata.ids && !dspresult(&cdata)) continue;
closesocket(cdata.sockd);
*infected += cdata.infected;
*err += cdata.errors;
if (cdata.ids) {
logg(LOGG_ERROR, "Clamd closed the connection before scanning all files.\n");
return 1;
}
if (cdata.errors)
return 1;
if (!cdata.files)
return 0;
if (cdata.printok)
logg(LOGG_INFO, "%s: OK\n", file);
return 0;
}