clamav/clamscan/manager.c

1285 lines
38 KiB
C
Raw Normal View History

2003-07-29 15:48:06 +00:00
/*
2020-01-03 15:44:07 -05:00
* Copyright (C) 2013-2020 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
2013-10-14 17:07:40 -04:00
* Copyright (C) 2007-2013 Sourcefire, Inc.
*
* Authors: Tomasz Kojm
2003-07-29 15:48:06 +00:00
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
2003-07-29 15:48:06 +00:00
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
* MA 02110-1301, USA.
2003-07-29 15:48:06 +00:00
*
*/
2004-02-13 21:36:32 +00:00
#if HAVE_CONFIG_H
#include "clamav-config.h"
#endif
2003-07-29 15:48:06 +00:00
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <ctype.h>
#include <sys/stat.h>
#include <sys/types.h>
#ifdef HAVE_PWD_H
#include <pwd.h>
#endif
2009-09-24 19:23:21 +02:00
#include <dirent.h>
#ifndef _WIN32
2003-07-29 15:48:06 +00:00
#include <sys/wait.h>
#include <utime.h>
#include <sys/time.h>
#include <sys/resource.h>
#endif
2003-07-29 15:48:06 +00:00
#include <fcntl.h>
#ifdef HAVE_UNISTD_H
2003-07-29 15:48:06 +00:00
#include <unistd.h>
#endif
2003-07-29 15:48:06 +00:00
#include <sys/types.h>
#include <signal.h>
#include <errno.h>
#include <target.h>
2003-07-29 15:48:06 +00:00
Add CMake build tooling This patch adds experimental-quality CMake build tooling. The libmspack build required a modification to use "" instead of <> for header #includes. This will hopefully be included in the libmspack upstream project when adding CMake build tooling to libmspack. Removed use of libltdl when using CMake. Flex & Bison are now required to build. If -DMAINTAINER_MODE, then GPERF is also required, though it currently doesn't actually do anything. TODO! I found that the autotools build system was generating the lexer output but not actually compiling it, instead using previously generated (and manually renamed) lexer c source. As a consequence, changes to the .l and .y files weren't making it into the build. To resolve this, I removed generated flex/bison files and fixed the tooling to use the freshly generated files. Flex and bison are now required build tools. On Windows, this adds a dependency on the winflexbison package, which can be obtained using Chocolatey or may be manually installed. CMake tooling only has partial support for building with external LLVM library, and no support for the internal LLVM (to be removed in the future). I.e. The CMake build currently only supports the bytecode interpreter. Many files used include paths relative to the top source directory or relative to the current project, rather than relative to each build target. Modern CMake support requires including internal dependency headers the same way you would external dependency headers (albeit with "" instead of <>). This meant correcting all header includes to be relative to the build targets and not relative to the workspace. For example, ... ```c include "../libclamav/clamav.h" include "clamd/clamd_others.h" ``` ... becomes: ```c // libclamav include "clamav.h" // clamd include "clamd_others.h" ``` Fixes header name conflicts by renaming a few of the files. Converted the "shared" code into a static library, which depends on libclamav. The ironically named "shared" static library provides features common to the ClamAV apps which are not required in libclamav itself and are not intended for use by downstream projects. This change was required for correct modern CMake practices but was also required to use the automake "subdir-objects" option. This eliminates warnings when running autoreconf which, in the next version of autoconf & automake are likely to break the build. libclamav used to build in multiple stages where an earlier stage is a static library containing utils required by the "shared" code. Linking clamdscan and clamdtop with this libclamav utils static lib allowed these two apps to function without libclamav. While this is nice in theory, the practical gains are minimal and it complicates the build system. As such, the autotools and CMake tooling was simplified for improved maintainability and this feature was thrown out. clamdtop and clamdscan now require libclamav to function. Removed the nopthreads version of the autotools libclamav_internal_utils static library and added pthread linking to a couple apps that may have issues building on some platforms without it, with the intention of removing needless complexity from the source. Kept the regular version of libclamav_internal_utils.la though it is no longer used anywhere but in libclamav. Added an experimental doxygen build option which attempts to build clamav.h and libfreshclam doxygen html docs. The CMake build tooling also may build the example program(s), which isn't a feature in the Autotools build system. Changed C standard to C90+ due to inline linking issues with socket.h when linking libfreshclam.so on Linux. Generate common.rc for win32. Fix tabs/spaces in shared Makefile.am, and remove vestigial ifndef from misc.c. Add CMake files to the automake dist, so users can try the new CMake tooling w/out having to build from a git clone. clamonacc changes: - Renamed FANOTIFY macro to HAVE_SYS_FANOTIFY_H to better match other similar macros. - Added a new clamav-clamonacc.service systemd unit file, based on the work of ChadDevOps & Aaron Brighton. - Added missing clamonacc man page. Updates to clamdscan man page, add missing options. Remove vestigial CL_NOLIBCLAMAV definitions (all apps now use libclamav). Rename Windows mspack.dll to libmspack.dll so all ClamAV-built libraries have the lib-prefix with Visual Studio as with CMake.
2020-08-13 00:25:34 -07:00
// libclamav
#include "clamav.h"
#include "others.h"
#include "matcher-ac.h"
#include "matcher-pcre.h"
#include "str.h"
#include "readdb.h"
// shared
#include "optparser.h"
#include "actions.h"
#include "output.h"
#include "misc.h"
2003-07-29 15:48:06 +00:00
#include "manager.h"
2007-01-30 21:11:32 +00:00
#include "global.h"
2003-07-29 15:48:06 +00:00
#ifdef C_LINUX
dev_t procdev;
#endif
#ifdef _WIN32
/* FIXME: If possible, handle users correctly */
static int checkaccess(const char *path, const char *username, int mode)
{
2011-04-17 13:08:11 +02:00
return !access(path, mode);
}
#else
static int checkaccess(const char *path, const char *username, int mode)
{
struct passwd *user;
int ret = 0, status;
if (!geteuid()) {
if ((user = getpwnam(username)) == NULL) {
return -1;
}
switch (fork()) {
case -1:
return -2;
case 0:
if (setgid(user->pw_gid)) {
fprintf(stderr, "ERROR: setgid(%d) failed.\n", (int)user->pw_gid);
exit(0);
}
if (setuid(user->pw_uid)) {
fprintf(stderr, "ERROR: setuid(%d) failed.\n", (int)user->pw_uid);
exit(0);
}
if (access(path, mode))
exit(0);
else
exit(1);
default:
wait(&status);
if (WIFEXITED(status) && WEXITSTATUS(status) == 1)
ret = 1;
}
} else {
if (!access(path, mode))
ret = 1;
}
return ret;
}
#endif
struct metachain {
char **chains;
2014-11-06 14:51:26 -05:00
size_t lastadd;
size_t lastvir;
size_t level;
size_t nchains;
};
struct clamscan_cb_data {
struct metachain *chain;
const char *filename;
};
static cl_error_t pre(int fd, const char *type, void *context)
{
2014-11-06 14:51:26 -05:00
struct metachain *c;
struct clamscan_cb_data *d;
2014-11-06 14:51:26 -05:00
UNUSEDPARAM(fd);
2014-07-11 09:42:42 -04:00
UNUSEDPARAM(type);
2014-11-06 14:51:26 -05:00
if (!(context))
return CL_CLEAN;
d = (struct clamscan_cb_data *)context;
c = d->chain;
if (c == NULL)
return CL_CLEAN;
2014-11-06 14:51:26 -05:00
c->level++;
return CL_CLEAN;
}
2014-11-06 14:51:26 -05:00
static int print_chain(struct metachain *c, char *str, size_t len)
{
2014-11-06 14:51:26 -05:00
size_t i;
size_t na = 0;
for (i = 0; i < c->nchains - 1; i++) {
2014-11-06 14:51:26 -05:00
size_t n = strlen(c->chains[i]);
if (na)
str[na++] = '!';
if (n + na + 2 > len)
break;
memcpy(str + na, c->chains[i], n);
na += n;
}
str[na] = '\0';
str[len - 1] = '\0';
return i == c->nchains - 1 ? 0 : 1;
}
static cl_error_t post(int fd, int result, const char *virname, void *context)
{
struct clamscan_cb_data *d = context;
struct metachain *c = NULL;
2014-11-06 14:51:26 -05:00
char str[128];
UNUSEDPARAM(fd);
UNUSEDPARAM(result);
if (d != NULL)
c = d->chain;
2014-11-06 14:51:26 -05:00
if (c && c->nchains) {
print_chain(c, str, sizeof(str));
2014-11-06 14:51:26 -05:00
if (c->level == c->lastadd && !virname)
2014-11-06 14:51:26 -05:00
free(c->chains[--c->nchains]);
if (virname && !c->lastvir)
c->lastvir = c->level;
}
if (c)
c->level--;
return CL_CLEAN;
}
static cl_error_t meta(const char *container_type, unsigned long fsize_container, const char *filename,
unsigned long fsize_real, int is_encrypted, unsigned int filepos_container, void *context)
{
char prev[128];
2014-11-06 14:51:26 -05:00
struct metachain *c;
struct clamscan_cb_data *d;
2014-11-06 14:51:26 -05:00
const char *type;
size_t n;
char *chain;
char **chains;
int toolong;
UNUSEDPARAM(fsize_container);
UNUSEDPARAM(fsize_real);
UNUSEDPARAM(is_encrypted);
UNUSEDPARAM(filepos_container);
if (!(context))
return CL_CLEAN;
d = (struct clamscan_cb_data *)context;
c = d->chain;
2014-11-06 14:51:26 -05:00
type = (strncmp(container_type, "CL_TYPE_", 8) == 0 ? container_type + 8 : container_type);
n = strlen(type) + strlen(filename) + 2;
2014-11-06 14:51:26 -05:00
if (!c)
return CL_CLEAN;
chain = malloc(n);
if (!chain)
return CL_CLEAN;
2014-11-06 14:51:26 -05:00
if (!strcmp(type, "ANY"))
snprintf(chain, n, "%s", filename);
else
snprintf(chain, n, "%s:%s", type, filename);
if (c->lastadd != c->level) {
2014-11-06 14:51:26 -05:00
n = c->nchains + 1;
chains = realloc(c->chains, n * sizeof(*chains));
if (!chains) {
free(chain);
return CL_CLEAN;
}
c->chains = chains;
2014-11-06 14:51:26 -05:00
c->nchains = n;
c->lastadd = c->level;
} else {
2014-11-06 14:51:26 -05:00
if (c->nchains > 0)
free(c->chains[c->nchains - 1]);
}
2014-11-06 14:51:26 -05:00
if (c->nchains > 0) {
c->chains[c->nchains - 1] = chain;
toolong = print_chain(c, prev, sizeof(prev));
logg("*Scanning %s%s!%s\n", prev, toolong ? "..." : "", chain);
2014-11-06 14:51:26 -05:00
} else {
free(chain);
}
return CL_CLEAN;
}
static void clamscan_virus_found_cb(int fd, const char *virname, void *context)
{
struct clamscan_cb_data *data = (struct clamscan_cb_data *)context;
const char *filename;
UNUSEDPARAM(fd);
if (data == NULL)
return;
if (data->filename != NULL)
filename = data->filename;
else
filename = "(filename not set)";
logg("~%s: %s FOUND\n", filename, virname);
return;
}
static void scanfile(const char *filename, struct cl_engine *engine, const struct optstruct *opts, struct cl_scan_options *options)
2007-01-30 21:11:32 +00:00
{
cl_error_t ret = CL_SUCCESS;
int fd, included;
unsigned i;
const struct optstruct *opt;
const char *virname = NULL;
STATBUF sb;
struct metachain chain;
struct clamscan_cb_data data;
char *real_filename = NULL;
if (NULL == filename || NULL == engine || NULL == opts || NULL == options) {
logg("scanfile: Invalid args.\n");
ret = CL_EARG;
goto done;
}
2020-07-24 08:32:47 -07:00
ret = cli_realpath((const char *)filename, &real_filename);
if (CL_SUCCESS != ret) {
logg("*Failed to determine real filename of %s.\n", filename);
logg("*Quarantine of the file may fail if file path contains symlinks.\n");
} else {
filename = real_filename;
}
if ((opt = optget(opts, "exclude"))->enabled) {
while (opt) {
if (match_regex(filename, opt->strarg) == 1) {
if (!printinfected)
logg("~%s: Excluded\n", filename);
goto done;
}
opt = opt->nextarg;
}
}
if ((opt = optget(opts, "include"))->enabled) {
included = 0;
while (opt) {
if (match_regex(filename, opt->strarg) == 1) {
included = 1;
break;
}
opt = opt->nextarg;
}
if (!included) {
if (!printinfected)
logg("~%s: Excluded\n", filename);
goto done;
}
}
/* argh, don't scan /proc files */
if (CLAMSTAT(filename, &sb) != -1) {
#ifdef C_LINUX
if (procdev && sb.st_dev == procdev) {
if (!printinfected)
logg("~%s: Excluded (/proc)\n", filename);
goto done;
}
#endif
if (!sb.st_size) {
if (!printinfected)
logg("~%s: Empty file\n", filename);
goto done;
}
info.rblocks += sb.st_size / CL_COUNT_PRECISION;
}
2009-09-24 16:08:52 +02:00
#ifndef _WIN32
if (geteuid()) {
if (checkaccess(filename, NULL, R_OK) != 1) {
if (!printinfected)
logg("~%s: Access denied\n", filename);
info.errors++;
goto done;
}
}
#endif
memset(&chain, 0, sizeof(chain));
if (optget(opts, "archive-verbose")->enabled) {
2014-11-06 14:51:26 -05:00
chain.chains = malloc(sizeof(char **));
if (chain.chains) {
chain.chains[0] = strdup(filename);
if (!chain.chains[0]) {
free(chain.chains);
logg("Unable to allocate memory in scanfile()\n");
info.errors++;
goto done;
}
2014-11-06 14:51:26 -05:00
chain.nchains = 1;
}
}
logg("*Scanning %s\n", filename);
if ((fd = safe_open(filename, O_RDONLY | O_BINARY)) == -1) {
logg("^Can't open file %s: %s\n", filename, strerror(errno));
info.errors++;
goto done;
}
data.chain = &chain;
data.filename = filename;
if ((ret = cl_scandesc_callback(fd, filename, &virname, &info.blocks, engine, options, &data)) == CL_VIRUS) {
if (optget(opts, "archive-verbose")->enabled) {
2014-11-06 14:51:26 -05:00
if (chain.nchains > 1) {
char str[128];
int toolong = print_chain(&chain, str, sizeof(str));
logg("~%s%s!(%llu)%s: %s FOUND\n", str, toolong ? "..." : "", (long long unsigned)(chain.lastvir - 1), chain.chains[chain.nchains - 1], virname);
} else if (chain.lastvir) {
logg("~%s!(%llu): %s FOUND\n", filename, (long long unsigned)(chain.lastvir - 1), virname);
}
}
info.files++;
info.ifiles++;
if (bell)
fprintf(stderr, "\007");
} else if (ret == CL_CLEAN) {
if (!printinfected && printclean)
mprintf("~%s: OK\n", filename);
info.files++;
} else {
if (!printinfected)
logg("~%s: %s ERROR\n", filename, cl_strerror(ret));
info.errors++;
}
for (i = 0; i < chain.nchains; i++)
free(chain.chains[i]);
free(chain.chains);
close(fd);
if (ret == CL_VIRUS && action)
action(filename);
done:
if (NULL != real_filename) {
free(real_filename);
}
return;
}
static void scandirs(const char *dirname, struct cl_engine *engine, const struct optstruct *opts, struct cl_scan_options *options, unsigned int depth, dev_t dev)
{
DIR *dd;
struct dirent *dent;
STATBUF sb;
char *fname;
int included;
const struct optstruct *opt;
unsigned int dirlnk, filelnk;
if ((opt = optget(opts, "exclude-dir"))->enabled) {
while (opt) {
if (match_regex(dirname, opt->strarg) == 1) {
if (!printinfected)
logg("~%s: Excluded\n", dirname);
return;
}
opt = opt->nextarg;
}
}
if ((opt = optget(opts, "include-dir"))->enabled) {
included = 0;
while (opt) {
if (match_regex(dirname, opt->strarg) == 1) {
included = 1;
break;
}
opt = opt->nextarg;
}
if (!included) {
if (!printinfected)
logg("~%s: Excluded\n", dirname);
return;
}
}
if (depth > (unsigned int)optget(opts, "max-dir-recursion")->numarg)
return;
dirlnk = optget(opts, "follow-dir-symlinks")->numarg;
filelnk = optget(opts, "follow-file-symlinks")->numarg;
if ((dd = opendir(dirname)) != NULL) {
info.dirs++;
depth++;
while ((dent = readdir(dd))) {
if (dent->d_ino) {
if (strcmp(dent->d_name, ".") && strcmp(dent->d_name, "..")) {
/* build the full name */
fname = malloc(strlen(dirname) + strlen(dent->d_name) + 2);
if (fname == NULL) { /* oops, malloc() failed, print warning and return */
logg("!scandirs: Memory allocation failed for fname\n");
break;
}
if (!strcmp(dirname, PATHSEP))
sprintf(fname, PATHSEP "%s", dent->d_name);
else
sprintf(fname, "%s" PATHSEP "%s", dirname, dent->d_name);
/* stat the file */
if (LSTAT(fname, &sb) != -1) {
if (!optget(opts, "cross-fs")->enabled) {
if (sb.st_dev != dev) {
if (!printinfected)
logg("~%s: Excluded\n", fname);
free(fname);
continue;
}
}
if (S_ISLNK(sb.st_mode)) {
if (dirlnk != 2 && filelnk != 2) {
if (!printinfected)
logg("%s: Symbolic link\n", fname);
} else if (CLAMSTAT(fname, &sb) != -1) {
if (S_ISREG(sb.st_mode) && filelnk == 2) {
scanfile(fname, engine, opts, options);
} else if (S_ISDIR(sb.st_mode) && dirlnk == 2) {
if (recursion)
scandirs(fname, engine, opts, options, depth, dev);
} else {
if (!printinfected)
logg("%s: Symbolic link\n", fname);
}
}
} else if (S_ISREG(sb.st_mode)) {
scanfile(fname, engine, opts, options);
} else if (S_ISDIR(sb.st_mode) && recursion) {
scandirs(fname, engine, opts, options, depth, dev);
}
}
free(fname);
}
}
}
closedir(dd);
} else {
if (!printinfected)
logg("~%s: Can't open directory.\n", dirname);
info.errors++;
}
2007-01-30 21:11:32 +00:00
}
static int scanstdin(const struct cl_engine *engine, struct cl_scan_options *options)
2007-01-30 21:11:32 +00:00
{
int ret;
unsigned int fsize = 0;
const char *virname = NULL;
const char *tmpdir = NULL;
char *file, buff[FILEBUFF];
size_t bread;
FILE *fs;
struct clamscan_cb_data data;
2007-01-30 21:11:32 +00:00
tmpdir = cl_engine_get_str(engine, CL_ENGINE_TMPDIR, NULL);
if (NULL == tmpdir) {
tmpdir = cli_gettmpdir();
}
2007-01-30 21:11:32 +00:00
if (access(tmpdir, R_OK | W_OK) == -1) {
logg("!Can't write to temporary directory\n");
return 2;
2007-01-30 21:11:32 +00:00
}
if (!(file = cli_gentemp(tmpdir))) {
logg("!Can't generate tempfile name\n");
return 2;
2012-07-05 12:45:07 -04:00
}
2007-01-30 21:11:32 +00:00
if (!(fs = fopen(file, "wb"))) {
logg("!Can't open %s for writing\n", file);
free(file);
return 2;
2007-01-30 21:11:32 +00:00
}
while ((bread = fread(buff, 1, FILEBUFF, stdin))) {
fsize += bread;
if (fwrite(buff, 1, bread, fs) < bread) {
logg("!Can't write to %s\n", file);
free(file);
fclose(fs);
return 2;
}
}
2007-01-30 21:11:32 +00:00
fclose(fs);
logg("*Checking %s\n", file);
2007-01-30 21:11:32 +00:00
info.files++;
info.rblocks += fsize / CL_COUNT_PRECISION;
2007-01-30 21:11:32 +00:00
data.filename = "stdin";
data.chain = NULL;
if ((ret = cl_scanfile_callback(file, &virname, &info.blocks, engine, options, &data)) == CL_VIRUS) {
info.ifiles++;
2007-01-30 21:11:32 +00:00
if (bell)
fprintf(stderr, "\007");
} else if (ret == CL_CLEAN) {
if (!printinfected)
mprintf("stdin: OK\n");
} else {
if (!printinfected)
logg("stdin: %s ERROR\n", cl_strerror(ret));
info.errors++;
}
2007-01-30 21:11:32 +00:00
unlink(file);
free(file);
return ret;
}
int scanmanager(const struct optstruct *opts)
2003-07-29 15:48:06 +00:00
{
int ret = 0, i;
struct cl_scan_options options;
unsigned int dboptions = 0, dirlnk = 1, filelnk = 1;
struct cl_engine *engine;
STATBUF sb;
char *file, cwd[1024], *pua_cats = NULL;
const char *filename;
const struct optstruct *opt;
2009-09-24 19:23:21 +02:00
#ifndef _WIN32
struct rlimit rlim;
#endif
2003-07-29 15:48:06 +00:00
/* Initalize scan options struct */
memset(&options, 0, sizeof(struct cl_scan_options));
dirlnk = optget(opts, "follow-dir-symlinks")->numarg;
if (dirlnk > 2) {
logg("!--follow-dir-symlinks: Invalid argument\n");
return 2;
}
filelnk = optget(opts, "follow-file-symlinks")->numarg;
if (filelnk > 2) {
logg("!--follow-file-symlinks: Invalid argument\n");
return 2;
}
if (optget(opts, "yara-rules")->enabled) {
char *p = optget(opts, "yara-rules")->strarg;
if (strcmp(p, "yes")) {
if (!strcmp(p, "only"))
dboptions |= CL_DB_YARA_ONLY;
else if (!strcmp(p, "no"))
dboptions |= CL_DB_YARA_EXCLUDE;
}
}
if (optget(opts, "phishing-sigs")->enabled)
dboptions |= CL_DB_PHISHING;
2003-07-29 15:48:06 +00:00
if (optget(opts, "official-db-only")->enabled)
dboptions |= CL_DB_OFFICIAL_ONLY;
if (optget(opts, "phishing-scan-urls")->enabled)
dboptions |= CL_DB_PHISHING_URLS;
if (optget(opts, "bytecode")->enabled)
dboptions |= CL_DB_BYTECODE;
if ((ret = cl_init(CL_INIT_DEFAULT))) {
logg("!Can't initialize libclamav: %s\n", cl_strerror(ret));
return 2;
}
if (!(engine = cl_engine_new())) {
logg("!Can't initialize antivirus engine\n");
return 2;
}
cl_engine_set_clcb_virus_found(engine, clamscan_virus_found_cb);
if (optget(opts, "disable-cache")->enabled)
cl_engine_set_num(engine, CL_ENGINE_DISABLE_CACHE, 1);
if (optget(opts, "detect-pua")->enabled) {
dboptions |= CL_DB_PUA;
if ((opt = optget(opts, "exclude-pua"))->enabled) {
dboptions |= CL_DB_PUA_EXCLUDE;
i = 0;
while (opt) {
if (!(pua_cats = realloc(pua_cats, i + strlen(opt->strarg) + 3))) {
logg("!Can't allocate memory for pua_cats\n");
cl_engine_free(engine);
return 2;
}
sprintf(pua_cats + i, ".%s", opt->strarg);
i += strlen(opt->strarg) + 1;
pua_cats[i] = 0;
opt = opt->nextarg;
}
pua_cats[i] = '.';
pua_cats[i + 1] = 0;
}
if ((opt = optget(opts, "include-pua"))->enabled) {
if (pua_cats) {
logg("!--exclude-pua and --include-pua cannot be used at the same time\n");
cl_engine_free(engine);
free(pua_cats);
return 2;
}
dboptions |= CL_DB_PUA_INCLUDE;
i = 0;
while (opt) {
if (!(pua_cats = realloc(pua_cats, i + strlen(opt->strarg) + 3))) {
logg("!Can't allocate memory for pua_cats\n");
cl_engine_free(engine);
return 2;
}
sprintf(pua_cats + i, ".%s", opt->strarg);
i += strlen(opt->strarg) + 1;
pua_cats[i] = 0;
opt = opt->nextarg;
}
pua_cats[i] = '.';
pua_cats[i + 1] = 0;
}
if (pua_cats) {
if ((ret = cl_engine_set_str(engine, CL_ENGINE_PUA_CATEGORIES, pua_cats))) {
logg("!cli_engine_set_str(CL_ENGINE_PUA_CATEGORIES) failed: %s\n", cl_strerror(ret));
free(pua_cats);
cl_engine_free(engine);
return 2;
}
free(pua_cats);
}
}
if (optget(opts, "dev-ac-only")->enabled)
cl_engine_set_num(engine, CL_ENGINE_AC_ONLY, 1);
if (optget(opts, "dev-ac-depth")->enabled)
cl_engine_set_num(engine, CL_ENGINE_AC_MAXDEPTH, optget(opts, "dev-ac-depth")->numarg);
if (optget(opts, "leave-temps")->enabled)
cl_engine_set_num(engine, CL_ENGINE_KEEPTMP, 1);
if (optget(opts, "force-to-disk")->enabled)
cl_engine_set_num(engine, CL_ENGINE_FORCETODISK, 1);
if (optget(opts, "bytecode-unsigned")->enabled)
dboptions |= CL_DB_BYTECODE_UNSIGNED;
if ((opt = optget(opts, "bytecode-timeout"))->enabled)
cl_engine_set_num(engine, CL_ENGINE_BYTECODE_TIMEOUT, opt->numarg);
if (optget(opts, "nocerts")->enabled)
cl_engine_set_num(engine, CL_ENGINE_DISABLE_PE_CERTS, 1);
if (optget(opts, "dumpcerts")->enabled)
cl_engine_set_num(engine, CL_ENGINE_PE_DUMPCERTS, 1);
if ((opt = optget(opts, "bytecode-mode"))->enabled) {
enum bytecode_mode mode;
if (!strcmp(opt->strarg, "ForceJIT"))
mode = CL_BYTECODE_MODE_JIT;
else if (!strcmp(opt->strarg, "ForceInterpreter"))
mode = CL_BYTECODE_MODE_INTERPRETER;
else if (!strcmp(opt->strarg, "Test"))
mode = CL_BYTECODE_MODE_TEST;
else
mode = CL_BYTECODE_MODE_AUTO;
cl_engine_set_num(engine, CL_ENGINE_BYTECODE_MODE, mode);
}
if ((opt = optget(opts, "statistics"))->enabled) {
while (opt) {
if (!strcasecmp(opt->strarg, "bytecode")) {
dboptions |= CL_DB_BYTECODE_STATS;
} else if (!strcasecmp(opt->strarg, "pcre")) {
dboptions |= CL_DB_PCRE_STATS;
}
opt = opt->nextarg;
}
}
/* JSON check to prevent engine loading if specified without libjson-c */
#if HAVE_JSON
if (optget(opts, "gen-json")->enabled)
options.general |= CL_SCAN_GENERAL_COLLECT_METADATA;
#else
if (optget(opts, "gen-json")->enabled) {
2018-03-01 14:38:05 -05:00
logg("!Can't generate json (gen-json). libjson-c dev library was missing or misconfigured when ClamAV was built.\n");
cl_engine_free(engine);
return 2;
}
#endif
if ((opt = optget(opts, "tempdir"))->enabled) {
if ((ret = cl_engine_set_str(engine, CL_ENGINE_TMPDIR, opt->strarg))) {
logg("!cli_engine_set_str(CL_ENGINE_TMPDIR) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "database"))->active) {
while (opt) {
if ((ret = cl_load(opt->strarg, engine, &info.sigs, dboptions))) {
logg("!%s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
opt = opt->nextarg;
}
2003-07-29 15:48:06 +00:00
} else {
char *dbdir = freshdbdir();
if ((ret = cl_load(dbdir, engine, &info.sigs, dboptions))) {
logg("!%s\n", cl_strerror(ret));
free(dbdir);
cl_engine_free(engine);
return 2;
}
free(dbdir);
2003-07-29 15:48:06 +00:00
}
/* pcre engine limits - required for cl_engine_compile */
if ((opt = optget(opts, "pcre-match-limit"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_PCRE_MATCH_LIMIT, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_PCRE_MATCH_LIMIT) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "pcre-recmatch-limit"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_PCRE_RECMATCH_LIMIT, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_PCRE_RECMATCH_LIMIT) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((ret = cl_engine_compile(engine)) != 0) {
logg("!Database initialization error: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
2003-07-29 15:48:06 +00:00
if (optget(opts, "archive-verbose")->enabled) {
cl_engine_set_clcb_meta(engine, meta);
cl_engine_set_clcb_pre_cache(engine, pre);
cl_engine_set_clcb_post_scan(engine, post);
}
2007-01-30 21:11:32 +00:00
/* set limits */
2003-07-29 15:48:06 +00:00
/* TODO: Remove deprecated option in a future feature release */
if ((opt = optget(opts, "timelimit"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_SCANTIME, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_SCANTIME) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-scantime"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_SCANTIME, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_SCANTIME) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-scansize"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_SCANSIZE, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_SCANSIZE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-filesize"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_FILESIZE, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_FILESIZE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
2003-07-29 15:48:06 +00:00
2009-09-24 19:23:21 +02:00
#ifndef _WIN32
if (getrlimit(RLIMIT_FSIZE, &rlim) == 0) {
if (rlim.rlim_cur < (rlim_t)cl_engine_get_num(engine, CL_ENGINE_MAX_FILESIZE, NULL))
logg("^System limit for file size is lower than engine->maxfilesize\n");
if (rlim.rlim_cur < (rlim_t)cl_engine_get_num(engine, CL_ENGINE_MAX_SCANSIZE, NULL))
logg("^System limit for file size is lower than engine->maxscansize\n");
} else {
logg("^Cannot obtain resource limits for file size\n");
}
#endif
if ((opt = optget(opts, "max-files"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_FILES, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_FILES) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
2003-07-29 15:48:06 +00:00
if ((opt = optget(opts, "max-recursion"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_RECURSION, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_RECURSION) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
2003-07-29 15:48:06 +00:00
/* Engine max sizes */
if ((opt = optget(opts, "max-embeddedpe"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_EMBEDDEDPE, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_EMBEDDEDPE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-htmlnormalize"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_HTMLNORMALIZE, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_HTMLNORMALIZE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-htmlnotags"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_HTMLNOTAGS, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_HTMLNOTAGS) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-scriptnormalize"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_SCRIPTNORMALIZE, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_SCRIPTNORMALIZE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-ziptypercg"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_ZIPTYPERCG, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_ZIPTYPERCG) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-partitions"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_PARTITIONS, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_PARTITIONS) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-iconspe"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_ICONSPE, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_ICONSPE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "max-rechwp3"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MAX_RECHWP3, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MAX_RECHWP3) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "pcre-max-filesize"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_PCRE_MAX_FILESIZE, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_PCRE_MAX_FILESIZE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
/* set scan options */
if (optget(opts, "allmatch")->enabled) {
options.general |= CL_SCAN_GENERAL_ALLMATCHES;
}
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "phishing-ssl")->enabled) ||
(optget(opts, "alert-phishing-ssl")->enabled))
options.heuristic |= CL_SCAN_HEURISTIC_PHISHING_SSL_MISMATCH;
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "phishing-cloak")->enabled) ||
(optget(opts, "alert-phishing-cloak")->enabled))
options.heuristic |= CL_SCAN_HEURISTIC_PHISHING_CLOAK;
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "partition-intersection")->enabled) ||
(optget(opts, "alert-partition-intersection")->enabled))
options.heuristic |= CL_SCAN_HEURISTIC_PARTITION_INTXN;
if (optget(opts, "heuristic-scan-precedence")->enabled)
options.general |= CL_SCAN_GENERAL_HEURISTIC_PRECEDENCE;
if (optget(opts, "scan-archive")->enabled)
options.parse |= CL_SCAN_PARSE_ARCHIVE;
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "detect-broken")->enabled) ||
(optget(opts, "alert-broken")->enabled)) {
options.heuristic |= CL_SCAN_HEURISTIC_BROKEN;
}
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "block-encrypted")->enabled) ||
(optget(opts, "alert-encrypted")->enabled)) {
options.heuristic |= CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE;
options.heuristic |= CL_SCAN_HEURISTIC_ENCRYPTED_DOC;
}
if (optget(opts, "alert-encrypted-archive")->enabled)
options.heuristic |= CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE;
if (optget(opts, "alert-encrypted-doc")->enabled)
options.heuristic |= CL_SCAN_HEURISTIC_ENCRYPTED_DOC;
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "block-macros")->enabled) ||
(optget(opts, "alert-macros")->enabled)) {
options.heuristic |= CL_SCAN_HEURISTIC_MACROS;
}
if (optget(opts, "scan-pe")->enabled)
options.parse |= CL_SCAN_PARSE_PE;
if (optget(opts, "scan-elf")->enabled)
options.parse |= CL_SCAN_PARSE_ELF;
if (optget(opts, "scan-ole2")->enabled)
options.parse |= CL_SCAN_PARSE_OLE2;
if (optget(opts, "scan-pdf")->enabled)
options.parse |= CL_SCAN_PARSE_PDF;
if (optget(opts, "scan-swf")->enabled)
options.parse |= CL_SCAN_PARSE_SWF;
if (optget(opts, "scan-html")->enabled && optget(opts, "normalize")->enabled)
options.parse |= CL_SCAN_PARSE_HTML;
if (optget(opts, "scan-mail")->enabled)
options.parse |= CL_SCAN_PARSE_MAIL;
if (optget(opts, "scan-xmldocs")->enabled)
options.parse |= CL_SCAN_PARSE_XMLDOCS;
if (optget(opts, "scan-hwp3")->enabled)
options.parse |= CL_SCAN_PARSE_HWP3;
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "algorithmic-detection")->enabled) && /* && used due to default-yes for both options */
(optget(opts, "heuristic-alerts")->enabled)) {
options.general |= CL_SCAN_GENERAL_HEURISTICS;
}
/* TODO: Remove deprecated option in a future feature release */
if ((optget(opts, "block-max")->enabled) ||
(optget(opts, "alert-exceeds-max")->enabled)) {
options.heuristic |= CL_SCAN_HEURISTIC_EXCEEDS_MAX;
}
#ifdef HAVE__INTERNAL__SHA_COLLECT
if (optget(opts, "dev-collect-hashes")->enabled)
options.dev |= CL_SCAN_DEV_COLLECT_SHA;
#endif
if (optget(opts, "dev-performance")->enabled)
options.dev |= CL_SCAN_DEV_COLLECT_PERFORMANCE_INFO;
if (optget(opts, "detect-structured")->enabled) {
options.heuristic |= CL_SCAN_HEURISTIC_STRUCTURED;
if ((opt = optget(opts, "structured-ssn-format"))->enabled) {
switch (opt->numarg) {
case 0:
options.heuristic |= CL_SCAN_HEURISTIC_STRUCTURED_SSN_NORMAL;
break;
case 1:
options.heuristic |= CL_SCAN_HEURISTIC_STRUCTURED_SSN_STRIPPED;
break;
case 2:
options.heuristic |= (CL_SCAN_HEURISTIC_STRUCTURED_SSN_NORMAL | CL_SCAN_HEURISTIC_STRUCTURED_SSN_STRIPPED);
break;
default:
logg("!Invalid argument for --structured-ssn-format\n");
return 2;
}
} else {
options.heuristic |= CL_SCAN_HEURISTIC_STRUCTURED_SSN_NORMAL;
}
if ((opt = optget(opts, "structured-ssn-count"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MIN_SSN_COUNT, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MIN_SSN_COUNT) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
if ((opt = optget(opts, "structured-cc-count"))->active) {
if ((ret = cl_engine_set_num(engine, CL_ENGINE_MIN_CC_COUNT, opt->numarg))) {
logg("!cli_engine_set_num(CL_ENGINE_MIN_CC_COUNT) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 2;
}
}
2019-08-27 17:33:22 -04:00
if ((opt = optget(opts, "structured-cc-mode"))->active) {
switch (opt->numarg) {
case 0:
break;
case 1:
options.heuristic |= CL_SCAN_HEURISTIC_STRUCTURED_CC;
break;
default:
logg("!Invalid argument for --structured-cc-mode\n");
return 2;
}
}
} else {
options.heuristic &= ~CL_SCAN_HEURISTIC_STRUCTURED;
}
2003-07-29 15:48:06 +00:00
#ifdef C_LINUX
procdev = (dev_t)0;
if (CLAMSTAT("/proc", &sb) != -1 && !sb.st_size)
procdev = sb.st_dev;
2003-07-29 15:48:06 +00:00
#endif
/* check filetype */
if (!opts->filename && !optget(opts, "file-list")->enabled) {
/* we need full path for some reasons (eg. archive handling) */
if (!getcwd(cwd, sizeof(cwd))) {
logg("!Can't get absolute pathname of current working directory\n");
ret = 2;
} else {
CLAMSTAT(cwd, &sb);
scandirs(cwd, engine, opts, &options, 1, sb.st_dev);
}
} else if (opts->filename && !optget(opts, "file-list")->enabled && !strcmp(opts->filename[0], "-")) { /* read data from stdin */
ret = scanstdin(engine, &options);
2003-07-29 15:48:06 +00:00
} else {
if (opts->filename && optget(opts, "file-list")->enabled)
logg("^Only scanning files from --file-list (files passed at cmdline are ignored)\n");
while ((filename = filelist(opts, &ret)) && (file = strdup(filename))) {
if (LSTAT(file, &sb) == -1) {
perror(file);
logg("^%s: Can't access file\n", file);
ret = 2;
} else {
for (i = strlen(file) - 1; i > 0; i--) {
if (file[i] == *PATHSEP)
file[i] = 0;
else
break;
}
if (S_ISLNK(sb.st_mode)) {
if (dirlnk == 0 && filelnk == 0) {
if (!printinfected)
logg("%s: Symbolic link\n", file);
} else if (CLAMSTAT(file, &sb) != -1) {
if (S_ISREG(sb.st_mode) && filelnk) {
scanfile(file, engine, opts, &options);
} else if (S_ISDIR(sb.st_mode) && dirlnk) {
scandirs(file, engine, opts, &options, 1, sb.st_dev);
} else {
if (!printinfected)
logg("%s: Symbolic link\n", file);
}
}
} else if (S_ISREG(sb.st_mode)) {
scanfile(file, engine, opts, &options);
} else if (S_ISDIR(sb.st_mode)) {
scandirs(file, engine, opts, &options, 1, sb.st_dev);
} else {
logg("^%s: Not supported file type\n", file);
ret = 2;
}
}
free(file);
}
2003-07-29 15:48:06 +00:00
}
if ((opt = optget(opts, "statistics"))->enabled) {
while (opt) {
if (!strcasecmp(opt->strarg, "bytecode")) {
cli_sigperf_print();
cli_sigperf_events_destroy();
}
#if HAVE_PCRE
else if (!strcasecmp(opt->strarg, "pcre")) {
cli_pcre_perf_print();
cli_pcre_perf_events_destroy();
}
#endif
opt = opt->nextarg;
}
2012-12-05 15:48:52 -08:00
}
2007-01-30 21:11:32 +00:00
/* free the engine */
cl_engine_free(engine);
2003-07-29 15:48:06 +00:00
/* overwrite return code - infection takes priority */
if (info.ifiles)
ret = 1;
else if (info.errors)
ret = 2;
2003-07-29 15:48:06 +00:00
return ret;
}