2 * inoclam - Inotify+ClamAV virus scanner
3 * Copyright (C) 2007 Vermont Department of Taxes
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 * Tom Cort <tom.cort@state.vt.us>
25 #include <inotifytools/inotifytools.h>
26 #include <inotifytools/inotify.h>
27 #include <libdaemon/dlog.h>
33 #include "inotify.hxx"
38 * The directory that inoclam should watch
43 * Grant permission to inoclam to delete infected files by setting this
46 cfg_bool_t virus_removal_enabled
;
49 * Initializes inotify and tells it to 'watch' basedir.
50 * @param basedir the directory to watch.
51 * @return 1 for OK, -1 for failure.
53 static int __inotify_init(char *basedir
)
55 if (!inotifytools_initialize() || !inotifytools_watch_recursively(basedir
, IN_ALL_EVENTS
)) {
56 if (inotifytools_error() == ENOENT
) {
57 daemon_log(LOG_ERR
, "(%s:%u) watch_dir '%s' does not exist. Check /etc/inoclam.conf", __FILE__
, __LINE__
, watch_dir
);
59 daemon_log(LOG_ERR
, "(%s:%u) Failed init inotify: %s", __FILE__
, __LINE__
, strerror(inotifytools_error()));
63 /* daemon_log(LOG_DEBUG, "(%s:%u) init inotify", __FILE__, __LINE__); */
69 * Free resources used by inotify
71 static void __inotify_exit()
73 inotifytools_cleanup();
77 * Watch the specified directory for changes and call contains_virus()
78 * @param basedir the directory to watch.
80 void inotify_main(char *basedir
)
82 struct inotify_event
*event
;
90 if (basedir
== NULL
|| __inotify_init(basedir
) == -1) {
95 daemon_log(LOG_INFO
, "(%s:%u) inotify watching '%s'", __FILE__
, __LINE__
, basedir
);
97 while (!exit_now
&& (event
= inotifytools_next_event(-1))) {
98 if (event
&& event
->name
&& event
->wd
) {
99 length
= strlen(inotifytools_filename_from_wd(event
->wd
)) + strlen(event
->name
) + 2;
100 filename
= (char *) malloc(sizeof(char) * length
);
102 daemon_log(LOG_ERR
, "(%s:%u) malloc() Failed: %s", __FILE__
, __LINE__
, strerror(errno
));
106 memset(filename
, '\0', length
);
108 snprintf(filename
, length
- 1, "%s%s", inotifytools_filename_from_wd(event
->wd
), event
->name
);
110 if ((event
->mask
& (IN_CLOSE_WRITE
| IN_MOVED_TO
)) && !(event
->mask
& IN_ISDIR
)) {
112 * Scan writtable files that are being closed.
113 * Scan files that have been moved to a watched directory.
114 * TODO: run the switch statement and scan in a new thread. (make sure filename is safely free()'d).
116 switch (contains_virus(filename
)) {
119 if (virus_removal_enabled
== cfg_true
) {
123 if (smtp_enabled
== cfg_true
) {
124 /* TODO: add more message text. what virus was found, date/time, user */
129 /* no virus detected */
132 daemon_log(LOG_ERR
, "(%s:%u) Scan Failed", __FILE__
, __LINE__
);
135 } else if ((event
->mask
& (IN_CREATE
| IN_MOVED_TO
| IN_DELETE
)) && (event
->mask
& IN_ISDIR
)) {
137 * If the directory structure has changed, reload the watch list.
138 * Benchmark this to determine if this is too much of a performance hit.
141 __inotify_init(basedir
);