vs_svc.c revision 911106dfb16696472af8c1b7b4c554a829354fa8
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2007 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#pragma ident "%Z%%M% %I% %E% SMI"
/*
* Implementation of the "scan file" interface
*/
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <errno.h>
#include <syslog.h>
#include <fcntl.h>
#include <bsm/adt_event.h>
#include "vs_incl.h"
/* local functions */
static void vs_svc_vlog(char *, vs_result_t *);
static void vs_svc_audit(char *, vs_result_t *);
/*
* vs_svc_init, vs_svc_fini
*
* Invoked on daemon load and unload
*/
void
{
}
void
{
}
/*
* vs_svc_scan_file
*
* vs_svc_scan_file is responsible for:
* - determining if a scan is required
* - obtaining & releasing a scan engine connection
* - invoking the scan engine interface code to do the scan
* - retrying a failed scan (up to VS_MAX_RETRY times)
* - updating scan statistics
* - logging virus information
*
* Returns:
* VS_ACCESS_ALLOW, VS_ACCESS_DENY
*/
int
{
int access = VS_ACCESS_UNDEFINED;
/* deny access to quarantined files */
if (fattr->vsa_quarantined)
return (VS_ACCESS_DENY);
/* allow access if not modified & scanstamp current */
if ((fattr->vsa_modified == 0) &&
return (VS_ACCESS_ALLOW);
}
/* identify available engine connection */
continue;
}
/* connect to engine and scan file */
if (vs_eng_connect(&conn) != 0)
else {
if (vscand_get_state() == VS_STATE_SHUTDOWN) {
return (VS_ACCESS_ALLOW);
}
}
/* if no error, clear error state on engine and break */
vs_eng_set_error(&conn, 0);
break;
}
/* if scan failed due to shutdown, allow access */
if (vscand_get_state() == VS_STATE_SHUTDOWN) {
return (VS_ACCESS_ALLOW);
}
/* set engine's error state and update engine stats */
if (rc == VS_RESULT_SE_ERROR) {
}
}
/* if file infected, update virus log and write audit record */
}
return (access);
}
/*
* vs_svc_process_scan_result
*
* Translate the scan result into VS_ACCESS_ALLOW or VS_ACCESS_DENY.
* If the scan failed (VS_RESULT_ERROR) deny access if the
* scan was initiated because the file had been modified or
* had never been scanned. Otherwise allow access.
*
* If file has been modified or has never been scanned, it must
* be successfully scanned before access is allowed
*
* If the file has previously been scanned and has not been
* modified, don't deny access if scan fail, only if the file
* is found to be infected.
*
* If the file is still infected set quarantine attribute,
* otherwise clear modified attribute.
*
* Returns: VS_ACCESS_ALLOW, VS_ACCESS_DENY
*/
static int
{
int access = VS_ACCESS_DENY;
case VS_RESULT_CLEANED:
case VS_RESULT_FORBIDDEN:
break;
case VS_RESULT_CLEAN:
sizeof (vs_scanstamp_t));
fattr->vsa_modified = 0;
break;
case VS_RESULT_ERROR:
case VS_RESULT_SE_ERROR:
case VS_RESULT_UNDEFINED:
default:
else
break;
}
return (access);
}
/*
* vs_svc_vlog
*
* log details of infections detected in file
* If virus log is not configured or cannot be opened, use syslog.
*/
static void
{
int i;
char *log;
if (fp) {
}
if (result->vsr_nviolations == 0) {
if (fp) {
} else {
}
} else {
for (i = 0; i < result->vsr_nviolations; i++) {
if (fp) {
} else {
}
}
}
if (fp)
}
/*
* vs_svc_audit
*
* Generate AUE_vscan_quarantine audit record containing name
* of infected file, and violation details if available.
*/
static void
{
int i;
char *violations[VS_MAX_VIOLATIONS];
return;
}
return;
}
(void) adt_end_session(ah);
return;
}
"adt_alloc_event(ADT_vscan_quarantine)): %m");
(void) adt_end_session(ah);
return;
}
/* populate vscan audit event */
for (i = 0; i < result->vsr_nviolations; i++) {
violations[i] = data[i];
}
(void) adt_end_session(ah);
}