Fix two uses of strncat -> strlcat. Ensure proper use of strncpy when setting socket...
[amitay/samba.git] / source3 / modules / vfs_scannedonly.c
1 /*
2  * scannedonly VFS module for Samba 3.5
3  *
4  * Copyright 2007,2008,2009 (C) Olivier Sessink
5  *
6  * This program is free software; you can redistribute it and/or modify
7  * it under the terms of the GNU General Public License as published by
8  * the Free Software Foundation; either version 3 of the License, or
9  * (at your option) any later version.
10  *
11  * This program is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  * GNU General Public License for more details.
15  *
16  * You should have received a copy of the GNU General Public License
17  * along with this program; if not, write to the Free Software
18  * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19  *
20  * ABOUT SCANNEDONLY
21  *
22  * scannedonly implements a 'filter' like vfs module that talks over a
23  * unix domain socket or over UDP to a anti-virus engine.
24  *
25  * files that are clean have a corresponding .scanned:{filename} file
26  * in the same directory. So why the .scanned: files? They take up
27  * only an inode, because they are 0 bytes. To test if the file is
28  * scanned only a stat() call on the filesystem is needed which is
29  * very quick compared to a database lookup. All modern filesystems
30  * use database technology such as balanced trees for lookups anyway.
31  * The number of inodes in modern filesystems is also not limiting
32  * anymore. The .scanned: files are also easy scriptable. You can
33  * remove them with a simple find command or create them with a
34  * simple touch command. Extended filesystem attributes have similar
35  * properties, but are not supported on all filesystems, so that
36  * would limit the usage of the module (and attributes are not as
37  * easily scriptable)
38  *
39  * files that are not clean are sent to the AV-engine. Only the
40  * filename is sent over the socket. The protocol is very simple:
41  * a newline separated list of filenames inside each datagram.
42  *
43  * a file AV-scan may be requested multiple times, the AV-engine
44  * should also check if the file has been scanned already. Requests
45  * can also be dropped by the AV-engine (and we thus don't need the
46  * reliability of TCP).
47  *
48  */
49
50 #include "includes.h"
51
52 #include "config.h"
53
54 #define SENDBUFFERSIZE 1450
55
56 struct Tscannedonly {
57         int socket;
58         int domain_socket;
59         int portnum;
60         int scanning_message_len;
61         int recheck_time_open;
62         int recheck_tries_open;
63         int recheck_size_open;
64         int recheck_time_readdir;
65         int recheck_tries_readdir;
66         bool show_special_files;
67         bool rm_hidden_files_on_rmdir;
68         bool hide_nonscanned_files;
69         bool allow_nonscanned_files;
70         char *socketname;
71         char *scanhost;
72         char *scanning_message;
73         char *p_scanned; /* prefix for scanned files */
74         char *p_virus; /* prefix for virus containing files */
75         char *p_failed; /* prefix for failed to scan files */
76         char gsendbuffer[SENDBUFFERSIZE + 1];
77 };
78
79 #define STRUCTSCANO(var) ((struct Tscannedonly *)var)
80
81 struct scannedonly_DIR {
82         char *base;
83         int notify_loop_done;
84         SMB_STRUCT_DIR *DIR;
85 };
86 #define SCANNEDONLY_DEBUG 9
87 /*********************/
88 /* utility functions */
89 /*********************/
90
91 static char *real_path_from_notify_path(TALLOC_CTX *ctx,
92                                         struct Tscannedonly *so,
93                                         const char *path)
94 {
95         char *name;
96         int len, pathlen;
97
98         name = strrchr(path, '/');
99         if (!name) {
100                 return NULL;
101         }
102         pathlen = name - path;
103         name++;
104         len = strlen(name);
105         if (len <= so->scanning_message_len) {
106                 return NULL;
107         }
108
109         if (strcmp(name + (len - so->scanning_message_len),
110                    so->scanning_message) != 0) {
111                 return NULL;
112         }
113
114         return talloc_strndup(ctx,path,
115                               pathlen + len - so->scanning_message_len);
116 }
117
118 static char *cachefile_name(TALLOC_CTX *ctx,
119                             const char *shortname,
120                             const char *base,
121                             const char *p_scanned)
122 {
123         return talloc_asprintf(ctx, "%s%s%s", base, p_scanned, shortname);
124 }
125
126 static char *name_w_ending_slash(TALLOC_CTX *ctx, const char *name)
127 {
128         int len = strlen(name);
129         if (name[len - 1] == '/') {
130                 return talloc_strdup(ctx,name);
131         } else {
132                 return talloc_asprintf(ctx, "%s/", name);
133         }
134 }
135
136 static char *cachefile_name_f_fullpath(TALLOC_CTX *ctx,
137                                        const char *fullpath,
138                                        const char *p_scanned)
139 {
140         const char *base;
141         char *tmp, *cachefile, *shortname;
142         tmp = strrchr(fullpath, '/');
143         if (tmp) {
144                 base = talloc_strndup(ctx, fullpath, (tmp - fullpath) + 1);
145                 shortname = tmp + 1;
146         } else {
147                 base = "";
148                 shortname = (char *)fullpath;
149         }
150         cachefile = cachefile_name(ctx, shortname, base, p_scanned);
151         DEBUG(SCANNEDONLY_DEBUG,
152               ("cachefile_name_f_fullpath cachefile=%s\n", cachefile));
153         return cachefile;
154 }
155
156 static char *path_plus_name(TALLOC_CTX *ctx, const char *base,
157                             const char *filename)
158 {
159         return talloc_asprintf(ctx, "%s%s", base,filename);
160 }
161
162 static char *construct_full_path(TALLOC_CTX *ctx, vfs_handle_struct * handle,
163                                  const char *somepath, bool ending_slash)
164 {
165         char *tmp;
166
167         if (!somepath) {
168                 return NULL;
169         }
170         if (somepath[0] == '/') {
171                 if (ending_slash) {
172                         return name_w_ending_slash(ctx,somepath);
173                 }
174                 return talloc_strdup(ctx,somepath);
175         }
176         tmp=(char *)somepath;
177         if (tmp[0]=='.'&&tmp[1]=='/') {
178                 tmp+=2;
179         }
180         /* vfs_GetWd() seems to return a path with a slash */
181         if (ending_slash) {
182                 return talloc_asprintf(ctx, "%s%s/",
183                                        vfs_GetWd(ctx, handle->conn),tmp);
184         }
185         return talloc_asprintf(ctx, "%s%s",
186                                vfs_GetWd(ctx, handle->conn),tmp);
187 }
188
189 static int connect_to_scanner(vfs_handle_struct * handle)
190 {
191         struct Tscannedonly *so = (struct Tscannedonly *)handle->data;
192
193         if (so->domain_socket) {
194                 struct sockaddr_un saun;
195                 DEBUG(SCANNEDONLY_DEBUG, ("socket=%s\n", so->socketname));
196                 if ((so->socket = socket(AF_UNIX, SOCK_DGRAM, 0)) < 0) {
197                         DEBUG(2, ("failed to create socket %s\n",
198                                   so->socketname));
199                         return -1;
200                 }
201                 saun.sun_family = AF_UNIX;
202                 strncpy(saun.sun_path, so->socketname,
203                         sizeof(saun.sun_path) - 1);
204                 if (connect(so->socket, (struct sockaddr *)(void *)&saun,
205                             SUN_LEN(&saun)) < 0) {
206                         DEBUG(2, ("failed to connect to socket %s\n",
207                                   so->socketname));
208                         return -1;
209                 }
210                 DEBUG(SCANNEDONLY_DEBUG,("bound %s to socket %d\n",
211                                          saun.sun_path, so->socket));
212
213         } else {
214                 so->socket = open_udp_socket(so->scanhost, so->portnum);
215                 if (so->socket < 0) {
216                         DEBUG(2,("failed to open UDP socket to %s:%d\n",
217                                  so->scanhost,so->portnum));
218                         return -1;
219                 }
220         }
221
222         {/* increasing the socket buffer is done because we have large bursts
223             of UDP packets or DGRAM's on a domain socket whenever we hit a
224             large directory with lots of unscanned files. */
225                 int sndsize;
226                 socklen_t size = sizeof(int);
227                 getsockopt(so->socket, SOL_SOCKET, SO_RCVBUF,
228                            (char *)&sndsize, &size);
229                 DEBUG(SCANNEDONLY_DEBUG, ("current socket buffer size=%d\n",
230                                           sndsize));
231                 sndsize = 262144;
232                 if (setsockopt(so->socket, SOL_SOCKET, SO_RCVBUF,
233                                (char *)&sndsize,
234                                (int)sizeof(sndsize)) != 0) {
235                         DEBUG(SCANNEDONLY_DEBUG,
236                               ("error setting socket buffer %s (%d)\n",
237                                strerror(errno), errno));
238                 }
239         }
240         set_blocking(so->socket, false);
241         return 0;
242 }
243
244 static void flush_sendbuffer(vfs_handle_struct * handle)
245 {
246         struct Tscannedonly *so = (struct Tscannedonly *)handle->data;
247         int ret, len, loop = 10;
248         if (so->gsendbuffer[0] == '\0') {
249                 return;
250         }
251
252         do {
253                 loop--;
254                 len = strlen(so->gsendbuffer);
255                 ret = send(so->socket, so->gsendbuffer, len, MSG_DONTWAIT);
256                 if (ret == len) {
257                         so->gsendbuffer[0] = '\0';
258                         break;
259                 }
260                 if (ret == -1) {
261                         DEBUG(3,("scannedonly flush_sendbuffer: "
262                                  "error sending on socket %d to scanner:"
263                                  " %s (%d)\n",
264                                  so->socket, strerror(errno), errno));
265                         if (errno == ECONNREFUSED || errno == ENOTCONN
266                             || errno == ECONNRESET) {
267                                 if (connect_to_scanner(handle) == -1)
268                                         break;  /* connecting fails, abort */
269                                 /* try again */
270                         } else if (errno != EINTR) {
271                                 /* on EINTR we just try again, all remaining
272                                    other errors we log the error
273                                    and try again ONCE */
274                                 loop = 1;
275                                 DEBUG(3,("scannedonly flush_sendbuffer: "
276                                          "error sending data to scanner: %s "
277                                          "(%d)\n", strerror(errno), errno));
278                         }
279                 } else {
280                         /* --> partial write: Resend all filenames that were
281                            not or not completely written. a partial filename
282                            written means the filename will not arrive correctly,
283                            so resend it completely */
284                         int pos = 0;
285                         while (pos < len) {
286                                 char *tmp = strchr(so->gsendbuffer+pos, '\n');
287                                 if (tmp && tmp - so->gsendbuffer < ret)
288                                         pos = tmp - so->gsendbuffer + 1;
289                                 else
290                                         break;
291                         }
292                         memmove(so->gsendbuffer, so->gsendbuffer + pos,
293                                 SENDBUFFERSIZE - ret);
294                         /* now try again */
295                 }
296         } while (loop > 0);
297
298         if (so->gsendbuffer[0] != '\0') {
299                 DEBUG(2,
300                       ("scannedonly flush_sendbuffer: "
301                        "failed to send files to AV scanner, "
302                        "discarding files."));
303                 so->gsendbuffer[0] = '\0';
304         }
305 }
306
307 static void notify_scanner(vfs_handle_struct * handle, const char *scanfile)
308 {
309         char *tmp;
310         int tmplen, gsendlen;
311         struct Tscannedonly *so = (struct Tscannedonly *)handle->data;
312         TALLOC_CTX *ctx=talloc_tos();
313         if (scanfile[0] != '/') {
314                 tmp = construct_full_path(ctx,handle, scanfile, false);
315         } else {
316                 tmp = (char *)scanfile;
317         }
318         tmplen = strlen(tmp);
319         gsendlen = strlen(so->gsendbuffer);
320         DEBUG(SCANNEDONLY_DEBUG,
321               ("scannedonly notify_scanner: tmp=%s, tmplen=%d, gsendlen=%d\n",
322                tmp, tmplen, gsendlen));
323         if (gsendlen + tmplen >= SENDBUFFERSIZE) {
324                 flush_sendbuffer(handle);
325         }
326         strlcat(so->gsendbuffer, tmp, SENDBUFFERSIZE + 1);
327         strlcat(so->gsendbuffer, "\n", SENDBUFFERSIZE + 1);
328 }
329
330 static bool is_scannedonly_file(struct Tscannedonly *so, const char *shortname)
331 {
332         if (shortname[0]!='.') {
333                 return false;
334         }
335         if (strncmp(shortname, so->p_scanned, strlen(so->p_scanned)) == 0) {
336                 return true;
337         }
338         if (strncmp(shortname, so->p_virus, strlen(so->p_virus)) == 0) {
339                 return true;
340         }
341         if (strncmp(shortname, so->p_failed, strlen(so->p_failed)) == 0) {
342                 return true;
343         }
344         return false;
345 }
346
347 static bool timespec_is_newer(struct timespec *base, struct timespec *test)
348 {
349         return timespec_compare(base,test) < 0;
350 }
351
352 /*
353 vfs_handle_struct *handle the scannedonly handle
354 scannedonly_DIR * sDIR the scannedonly struct if called from _readdir()
355 or NULL
356 fullpath is a full path starting from / or a relative path to the
357 current working directory
358 shortname is the filename without directory components
359 basename, is the directory without file name component
360 allow_nonexistant return TRUE if stat() on the requested file fails
361 recheck_time, the time in milliseconds to wait for the daemon to
362 create a .scanned file
363 recheck_tries, the number of tries to wait
364 recheck_size, size in Kb of files that should not be waited for
365 loop : boolean if we should try to loop over all files in the directory
366 and send a notify to the scanner for all files that need scanning
367 */
368 static bool scannedonly_allow_access(vfs_handle_struct * handle,
369                                      struct scannedonly_DIR *sDIR,
370                                      struct smb_filename *smb_fname,
371                                      const char *shortname,
372                                      const char *base_name,
373                                      int allow_nonexistant,
374                                      int recheck_time, int recheck_tries,
375                                      int recheck_size, int loop)
376 {
377         struct smb_filename *cache_smb_fname;
378         TALLOC_CTX *ctx=talloc_tos();
379         char *cachefile;
380         int retval;
381         int didloop;
382         DEBUG(SCANNEDONLY_DEBUG,
383               ("smb_fname->base_name=%s, shortname=%s, base_name=%s\n"
384                ,smb_fname->base_name,shortname,base_name));
385
386         if (ISDOT(shortname) || ISDOTDOT(shortname)) {
387                 return true;
388         }
389         if (is_scannedonly_file(STRUCTSCANO(handle->data), shortname)) {
390                 DEBUG(SCANNEDONLY_DEBUG,
391                       ("scannedonly_allow_access, %s is a scannedonly file, "
392                        "return 0\n", shortname));
393                 return false;
394         }
395
396         if (!VALID_STAT(smb_fname->st)) {
397                 DEBUG(SCANNEDONLY_DEBUG,("stat %s\n",smb_fname->base_name));
398                 retval = SMB_VFS_NEXT_STAT(handle, smb_fname);
399                 if (retval != 0) {
400                         /* failed to stat this file?!? --> hide it */
401                         DEBUG(SCANNEDONLY_DEBUG,("no valid stat, return"
402                                                  " allow_nonexistant=%d\n",
403                                                  allow_nonexistant));
404                         return allow_nonexistant;
405                 }
406         }
407         if (!S_ISREG(smb_fname->st.st_ex_mode)) {
408                 DEBUG(SCANNEDONLY_DEBUG,
409                       ("%s is not a regular file, ISDIR=%d\n",
410                        smb_fname->base_name,
411                        S_ISDIR(smb_fname->st.st_ex_mode)));
412                 return (STRUCTSCANO(handle->data)->
413                         show_special_files ||
414                         S_ISDIR(smb_fname->st.st_ex_mode));
415         }
416         if (smb_fname->st.st_ex_size == 0) {
417                 DEBUG(SCANNEDONLY_DEBUG,("empty file, return 1\n"));
418                 return true;    /* empty files cannot contain viruses ! */
419         }
420         cachefile = cachefile_name(ctx,
421                                    shortname,
422                                    base_name,
423                                    STRUCTSCANO(handle->data)->p_scanned);
424         create_synthetic_smb_fname(ctx, cachefile,NULL,NULL,&cache_smb_fname);
425         if (!VALID_STAT(cache_smb_fname->st)) {
426                 retval = SMB_VFS_NEXT_STAT(handle, cache_smb_fname);
427         }
428         if (retval == 0 && VALID_STAT(cache_smb_fname->st)) {
429                 if (timespec_is_newer(&smb_fname->st.st_ex_mtime,
430                                       &cache_smb_fname->st.st_ex_mtime)) {
431                         talloc_free(cache_smb_fname);
432                         return true;
433                 }
434                 /* no cachefile or too old */
435                 SMB_VFS_NEXT_UNLINK(handle, cache_smb_fname);
436                 retval = -1;
437         }
438
439         notify_scanner(handle, smb_fname->base_name);
440
441         didloop = 0;
442         if (loop && sDIR && !sDIR->notify_loop_done) {
443                 /* check the rest of the directory and notify the
444                    scanner if some file needs scanning */
445                 long offset;
446                 SMB_STRUCT_DIRENT *dire;
447
448                 offset = SMB_VFS_NEXT_TELLDIR(handle, sDIR->DIR);
449                 dire = SMB_VFS_NEXT_READDIR(handle, sDIR->DIR, NULL);
450                 while (dire) {
451                         char *fpath2;
452                         struct smb_filename *smb_fname2;
453                         fpath2 = path_plus_name(ctx,base_name, dire->d_name);
454                         DEBUG(SCANNEDONLY_DEBUG,
455                               ("scannedonly_allow_access in loop, "
456                                "found %s\n", fpath2));
457                         create_synthetic_smb_fname(ctx, fpath2,NULL,NULL,
458                                                    &smb_fname2);
459                         scannedonly_allow_access(handle, NULL,
460                                                  smb_fname2,
461                                                  dire->d_name,
462                                                  base_name, 0, 0, 0, 0, 0);
463                         talloc_free(fpath2);
464                         talloc_free(smb_fname2);
465                         dire = SMB_VFS_NEXT_READDIR(handle, sDIR->DIR,NULL);
466                 }
467                 sDIR->notify_loop_done = 1;
468                 didloop = 1;
469                 SMB_VFS_NEXT_SEEKDIR(handle, sDIR->DIR, offset);
470         }
471         if (recheck_time > 0
472             && ((recheck_size > 0
473                  && smb_fname->st.st_ex_size < (1024 * recheck_size))
474                 || didloop)) {
475                 int i = 0;
476                 flush_sendbuffer(handle);
477                 while (retval != 0      /*&& errno == ENOENT */
478                        && i < recheck_tries) {
479                         struct timespec req = { 0, recheck_time * 10000 };
480                         DEBUG(SCANNEDONLY_DEBUG,
481                               ("scannedonly_allow_access, wait (try=%d "
482                                "(max %d), %d ms) for %s\n",
483                                i, recheck_tries,
484                                recheck_time, cache_smb_fname->base_name));
485                         nanosleep(&req, NULL);
486                         retval = SMB_VFS_NEXT_STAT(handle, cache_smb_fname);
487                         i++;
488                 }
489         }
490         /* still no cachefile, or still too old, return 0 */
491         if (retval != 0
492             || !timespec_is_newer(&smb_fname->st.st_ex_mtime,
493                                   &cache_smb_fname->st.st_ex_mtime)) {
494                 DEBUG(SCANNEDONLY_DEBUG,
495                       ("retval=%d, return 0\n",retval));
496                 return false;
497         }
498         return true;
499 }
500
501 /*********************/
502 /* VFS functions     */
503 /*********************/
504
505 static SMB_STRUCT_DIR *scannedonly_opendir(vfs_handle_struct * handle,
506                                            const char *fname,
507                                            const char *mask, uint32 attr)
508 {
509         SMB_STRUCT_DIR *DIRp;
510         struct scannedonly_DIR *sDIR;
511
512         DIRp = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
513         if (!DIRp) {
514                 return NULL;
515         }
516
517         sDIR = TALLOC_P(NULL, struct scannedonly_DIR);
518         if (fname[0] != '/') {
519                 sDIR->base = construct_full_path(sDIR,handle, fname, true);
520         } else {
521                 sDIR->base = name_w_ending_slash(sDIR, fname);
522         }
523         sDIR->DIR = DIRp;
524         sDIR->notify_loop_done = 0;
525         return (SMB_STRUCT_DIR *) sDIR;
526 }
527
528 static SMB_STRUCT_DIRENT *scannedonly_readdir(vfs_handle_struct *handle,
529                                               SMB_STRUCT_DIR * dirp,
530                                               SMB_STRUCT_STAT *sbuf)
531 {
532         SMB_STRUCT_DIRENT *result;
533         int allowed = 0;
534         char *tmp;
535         struct smb_filename *smb_fname;
536         char *notify_name;
537         int namelen;
538         SMB_STRUCT_DIRENT *newdirent;
539         TALLOC_CTX *ctx=talloc_tos();
540
541         struct scannedonly_DIR *sDIR = (struct scannedonly_DIR *)dirp;
542         if (!dirp) {
543                 return NULL;
544         }
545
546         result = SMB_VFS_NEXT_READDIR(handle, sDIR->DIR, sbuf);
547
548         if (!result)
549                 return NULL;
550
551         if (is_scannedonly_file(STRUCTSCANO(handle->data), result->d_name)) {
552                 DEBUG(SCANNEDONLY_DEBUG,
553                       ("scannedonly_readdir, %s is a scannedonly file, "
554                        "skip to next entry\n", result->d_name));
555                 return scannedonly_readdir(handle, dirp, NULL);
556         }
557
558         tmp = path_plus_name(ctx,sDIR->base, result->d_name);
559         DEBUG(SCANNEDONLY_DEBUG,
560               ("scannedonly_readdir, check access to %s (sbuf=%p)\n",
561                tmp,sbuf));
562
563         /* even if we don't hide nonscanned files or we allow non scanned
564            files we call allow_access because it will notify the daemon to
565            scan these files */
566         create_synthetic_smb_fname(ctx, tmp,NULL,
567                                    sbuf?VALID_STAT(*sbuf)?sbuf:NULL:NULL,
568                                    &smb_fname);
569         allowed = scannedonly_allow_access(
570                 handle, sDIR, smb_fname,
571                 result->d_name,
572                 sDIR->base, 0,
573                 STRUCTSCANO(handle->data)->hide_nonscanned_files
574                 ? STRUCTSCANO(handle->data)->recheck_time_readdir
575                 : 0,
576                 STRUCTSCANO(handle->data)->recheck_tries_readdir,
577                 -1,
578                 1);
579         DEBUG(SCANNEDONLY_DEBUG,
580               ("scannedonly_readdir access to %s (%s) = %d\n", tmp,
581                result->d_name, allowed));
582         if (allowed) {
583                 return result;
584         }
585         DEBUG(SCANNEDONLY_DEBUG,
586               ("hide_nonscanned_files=%d, allow_nonscanned_files=%d\n",
587                STRUCTSCANO(handle->data)->hide_nonscanned_files,
588                STRUCTSCANO(handle->data)->allow_nonscanned_files
589                       ));
590
591         if (!STRUCTSCANO(handle->data)->hide_nonscanned_files
592             || STRUCTSCANO(handle->data)->allow_nonscanned_files) {
593                 return result;
594         }
595
596         DEBUG(SCANNEDONLY_DEBUG,
597               ("scannedonly_readdir, readdir listing for %s not "
598                "allowed, notify user\n", result->d_name));
599         notify_name = talloc_asprintf(
600                 ctx,"%s %s",result->d_name,
601                 STRUCTSCANO(handle->data)->scanning_message);
602         namelen = strlen(notify_name);
603         newdirent = (SMB_STRUCT_DIRENT *)TALLOC_ARRAY(
604                 ctx, char, sizeof(SMB_STRUCT_DIRENT) + namelen + 1);
605         if (!newdirent) {
606                 return NULL;
607         }
608         memcpy(newdirent, result, sizeof(SMB_STRUCT_DIRENT));
609         memcpy(&newdirent->d_name, notify_name, namelen + 1);
610         DEBUG(SCANNEDONLY_DEBUG,
611               ("scannedonly_readdir, return newdirent at %p with "
612                "notification %s\n", newdirent, newdirent->d_name));
613         return newdirent;
614 }
615
616 static void scannedonly_seekdir(struct vfs_handle_struct *handle,
617                                 SMB_STRUCT_DIR * dirp, long offset)
618 {
619         struct scannedonly_DIR *sDIR = (struct scannedonly_DIR *)dirp;
620         SMB_VFS_NEXT_SEEKDIR(handle, sDIR->DIR, offset);
621 }
622
623 static long scannedonly_telldir(struct vfs_handle_struct *handle,
624                                 SMB_STRUCT_DIR * dirp)
625 {
626         struct scannedonly_DIR *sDIR = (struct scannedonly_DIR *)dirp;
627         return SMB_VFS_NEXT_TELLDIR(handle, sDIR->DIR);
628 }
629
630 static void scannedonly_rewinddir(struct vfs_handle_struct *handle,
631                                   SMB_STRUCT_DIR * dirp)
632 {
633         struct scannedonly_DIR *sDIR = (struct scannedonly_DIR *)dirp;
634         SMB_VFS_NEXT_REWINDDIR(handle, sDIR->DIR);
635 }
636
637 static int scannedonly_closedir(vfs_handle_struct * handle,
638                                 SMB_STRUCT_DIR * dirp)
639 {
640         int retval;
641         struct scannedonly_DIR *sDIR = (struct scannedonly_DIR *)dirp;
642         flush_sendbuffer(handle);
643         retval = SMB_VFS_NEXT_CLOSEDIR(handle, sDIR->DIR);
644         TALLOC_FREE(sDIR);
645         return retval;
646 }
647
648 static int scannedonly_stat(vfs_handle_struct * handle,
649                             struct smb_filename *smb_fname)
650 {
651         int ret;
652         ret = SMB_VFS_NEXT_STAT(handle, smb_fname);
653         DEBUG(SCANNEDONLY_DEBUG, ("scannedonly_stat: %s returned %d\n",
654                                   smb_fname->base_name, ret));
655         if (ret != 0 && errno == ENOENT) {
656                 TALLOC_CTX *ctx=talloc_tos();
657                 char *test_base_name, *tmp_base_name = smb_fname->base_name;
658                 /* possibly this was a fake name (file is being scanned for
659                    viruses.txt): check for that and create the real name and
660                    stat the real name */
661                 test_base_name = real_path_from_notify_path(
662                         ctx,
663                         STRUCTSCANO(handle->data),
664                         smb_fname->base_name);
665                 if (test_base_name) {
666                         smb_fname->base_name = test_base_name;
667                         ret = SMB_VFS_NEXT_STAT(handle, smb_fname);
668                         DEBUG(5, ("_stat: %s returned %d\n",
669                                   test_base_name, ret));
670                         smb_fname->base_name = tmp_base_name;
671                 }
672         }
673         return ret;
674 }
675
676 static int scannedonly_lstat(vfs_handle_struct * handle,
677                              struct smb_filename *smb_fname)
678 {
679         int ret;
680         ret = SMB_VFS_NEXT_LSTAT(handle, smb_fname);
681         DEBUG(SCANNEDONLY_DEBUG, ("scannedonly_lstat: %s returned %d\n",
682                                   smb_fname->base_name, ret));
683         if (ret != 0 && errno == ENOENT) {
684                 TALLOC_CTX *ctx=talloc_tos();
685                 char *test_base_name, *tmp_base_name = smb_fname->base_name;
686                 /* possibly this was a fake name (file is being scanned for
687                    viruses.txt): check for that and create the real name and
688                    stat the real name */
689                 test_base_name = real_path_from_notify_path(
690                         ctx, STRUCTSCANO(handle->data), smb_fname->base_name);
691                 if (test_base_name) {
692                         smb_fname->base_name = test_base_name;
693                         ret = SMB_VFS_NEXT_LSTAT(handle, smb_fname);
694                         DEBUG(5, ("_lstat: %s returned %d\n",
695                                   test_base_name, ret));
696                         smb_fname->base_name = tmp_base_name;
697                 }
698         }
699         return ret;
700 }
701
702 static int scannedonly_open(vfs_handle_struct * handle,
703                             struct smb_filename *smb_fname,
704                             files_struct * fsp, int flags, mode_t mode)
705 {
706         const char *base;
707         char *tmp, *shortname;
708         int allowed, write_access = 0;
709         TALLOC_CTX *ctx=talloc_tos();
710         /* if open for writing ignore it */
711         if ((flags & O_ACCMODE) == O_WRONLY) {
712                 return SMB_VFS_NEXT_OPEN(handle, smb_fname, fsp, flags, mode);
713         }
714         if ((flags & O_ACCMODE) == O_RDWR) {
715                 write_access = 1;
716         }
717         /* check if this file is scanned already */
718         tmp = strrchr(smb_fname->base_name, '/');
719         if (tmp) {
720                 base = talloc_strndup(ctx,smb_fname->base_name,
721                                       (tmp - smb_fname->base_name) + 1);
722                 shortname = tmp + 1;
723         } else {
724                 base = "";
725                 shortname = (char *)smb_fname->base_name;
726         }
727         allowed = scannedonly_allow_access(
728                 handle, NULL, smb_fname, shortname,
729                 base,
730                 write_access,
731                 STRUCTSCANO(handle->data)->recheck_time_open,
732                 STRUCTSCANO(handle->data)->recheck_tries_open,
733                 STRUCTSCANO(handle->data)->recheck_size_open,
734                 0);
735         flush_sendbuffer(handle);
736         DEBUG(SCANNEDONLY_DEBUG, ("scannedonly_open: allow=%d for %s\n",
737                                   allowed, smb_fname->base_name));
738         if (allowed
739             || STRUCTSCANO(handle->data)->allow_nonscanned_files) {
740                 return SMB_VFS_NEXT_OPEN(handle, smb_fname, fsp, flags, mode);
741         }
742         errno = EACCES;
743         return -1;
744 }
745
746 static int scannedonly_close(vfs_handle_struct * handle, files_struct * fsp)
747 {
748         /* we only have to notify the scanner
749            for files that were open readwrite or writable. */
750         if (fsp->can_write) {
751                 TALLOC_CTX *ctx = talloc_tos();
752                 notify_scanner(handle, construct_full_path(
753                                        ctx,handle,
754                                        fsp->fsp_name->base_name,false));
755                 flush_sendbuffer(handle);
756         }
757         return SMB_VFS_NEXT_CLOSE(handle, fsp);
758 }
759
760 static int scannedonly_rename(vfs_handle_struct * handle,
761                               const struct smb_filename *smb_fname_src,
762                               const struct smb_filename *smb_fname_dst)
763 {
764         /* rename the cache file before we pass the actual rename on */
765         struct smb_filename *smb_fname_src_tmp = NULL;
766         struct smb_filename *smb_fname_dst_tmp = NULL;
767         char *cachefile_src, *cachefile_dst;
768         TALLOC_CTX *ctx = talloc_tos();
769
770         /* Setup temporary smb_filename structs. */
771         cachefile_src = cachefile_name_f_fullpath(
772                 ctx,
773                 smb_fname_src->base_name,
774                 STRUCTSCANO(handle->data)->p_scanned);
775         cachefile_dst = cachefile_name_f_fullpath(
776                 ctx,
777                 smb_fname_dst->base_name,
778                 STRUCTSCANO(handle->data)->p_scanned);
779
780         create_synthetic_smb_fname(ctx, cachefile_src,NULL,NULL,
781                                    &smb_fname_src_tmp);
782         create_synthetic_smb_fname(ctx, cachefile_dst,NULL,NULL,
783                                    &smb_fname_dst_tmp);
784
785         if (SMB_VFS_NEXT_RENAME(handle, smb_fname_src_tmp, smb_fname_dst_tmp)
786             != 0) {
787                 DEBUG(SCANNEDONLY_DEBUG,
788                       ("failed to rename %s into %s\n", cachefile_src,
789                        cachefile_dst));
790         }
791         return SMB_VFS_NEXT_RENAME(handle, smb_fname_src, smb_fname_dst);
792 }
793
794 static int scannedonly_unlink(vfs_handle_struct * handle,
795                               const struct smb_filename *smb_fname)
796 {
797         /* unlink the 'scanned' file too */
798         struct smb_filename *smb_fname_cache = NULL;
799         char * cachefile;
800         TALLOC_CTX *ctx = talloc_tos();
801
802         cachefile = cachefile_name_f_fullpath(
803                 ctx,
804                 smb_fname->base_name,
805                 STRUCTSCANO(handle->data)->p_scanned);
806         create_synthetic_smb_fname(ctx, cachefile,NULL,NULL,
807                                    &smb_fname_cache);
808         if (SMB_VFS_NEXT_UNLINK(handle, smb_fname_cache) != 0) {
809                 DEBUG(SCANNEDONLY_DEBUG, ("_unlink: failed to unlink %s\n",
810                                           smb_fname_cache->base_name));
811         }
812         return SMB_VFS_NEXT_UNLINK(handle, smb_fname);
813 }
814
815 static int scannedonly_rmdir(vfs_handle_struct * handle, const char *path)
816 {
817         /* if there are only .scanned: .virus: or .failed: files, we delete
818            those, because the client cannot see them */
819         DIR *dirp;
820         SMB_STRUCT_DIRENT *dire;
821         TALLOC_CTX *ctx = talloc_tos();
822         bool only_deletable_files = true, have_files = false;
823         char *path_w_slash;
824
825         if (!STRUCTSCANO(handle->data)->rm_hidden_files_on_rmdir)
826                 return SMB_VFS_NEXT_RMDIR(handle, path);
827
828         path_w_slash = name_w_ending_slash(ctx,path);
829         dirp = SMB_VFS_NEXT_OPENDIR(handle, path, NULL, 0);
830         while ((dire = SMB_VFS_NEXT_READDIR(handle, dirp, NULL)) != NULL) {
831                 if (ISDOT(dire->d_name) || ISDOTDOT(dire->d_name)) {
832                         continue;
833                 }
834                 have_files = true;
835                 if (!is_scannedonly_file(STRUCTSCANO(handle->data),
836                                          dire->d_name)) {
837                         struct smb_filename *smb_fname = NULL;
838                         char *fullpath;
839                         int retval;
840
841                         if (STRUCTSCANO(handle->data)->show_special_files) {
842                                 only_deletable_files = false;
843                                 break;
844                         }
845                         /* stat the file and see if it is a
846                            special file */
847                         fullpath = path_plus_name(ctx,path_w_slash,
848                                                   dire->d_name);
849                         create_synthetic_smb_fname(ctx, fullpath,NULL,NULL,
850                                                    &smb_fname);
851                         retval = SMB_VFS_NEXT_STAT(handle, smb_fname);
852                         if (retval == 0
853                             && S_ISREG(smb_fname->st.st_ex_mode)) {
854                                 only_deletable_files = false;
855                         }
856                         TALLOC_FREE(fullpath);
857                         TALLOC_FREE(smb_fname);
858                         break;
859                 }
860         }
861         DEBUG(SCANNEDONLY_DEBUG,
862               ("path=%s, have_files=%d, only_deletable_files=%d\n",
863                path, have_files, only_deletable_files));
864         if (have_files && only_deletable_files) {
865                 DEBUG(SCANNEDONLY_DEBUG,
866                       ("scannedonly_rmdir, remove leftover scannedonly "
867                        "files from %s\n", path_w_slash));
868                 SMB_VFS_NEXT_REWINDDIR(handle, dirp);
869                 while ((dire = SMB_VFS_NEXT_READDIR(handle, dirp, NULL))
870                        != NULL) {
871                         char *fullpath;
872                         struct smb_filename *smb_fname = NULL;
873                         if (ISDOT(dire->d_name) || ISDOTDOT(dire->d_name)) {
874                                 continue;
875                         }
876                         fullpath = path_plus_name(ctx,path_w_slash,
877                                                   dire->d_name);
878                         create_synthetic_smb_fname(ctx, fullpath,NULL,NULL,
879                                                    &smb_fname);
880                         DEBUG(SCANNEDONLY_DEBUG, ("unlink %s\n", fullpath));
881                         SMB_VFS_NEXT_UNLINK(handle, smb_fname);
882                         TALLOC_FREE(fullpath);
883                         TALLOC_FREE(smb_fname);
884                 }
885         }
886         return SMB_VFS_NEXT_CLOSEDIR(handle, dirp);
887 }
888
889 static void free_scannedonly_data(void **data)
890 {
891         SAFE_FREE(*data);
892 }
893
894 static int scannedonly_connect(struct vfs_handle_struct *handle,
895                                const char *service, const char *user)
896 {
897
898         struct Tscannedonly *so;
899
900         so = SMB_MALLOC_P(struct Tscannedonly);
901         handle->data = (void *)so;
902         handle->free_data = free_scannedonly_data;
903         so->gsendbuffer[0]='\0';
904         so->domain_socket =
905                 lp_parm_bool(SNUM(handle->conn), "scannedonly",
906                              "domain_socket", True);
907         so->socketname =
908                 (char *)lp_parm_const_string(SNUM(handle->conn),
909                                              "scannedonly", "socketname",
910                                              "/var/lib/scannedonly/scan");
911         so->portnum =
912                 lp_parm_int(SNUM(handle->conn), "scannedonly", "portnum",
913                             2020);
914         so->scanhost =
915                 (char *)lp_parm_const_string(SNUM(handle->conn),
916                                              "scannedonly", "scanhost",
917                                              "localhost");
918
919         so->show_special_files =
920                 lp_parm_bool(SNUM(handle->conn), "scannedonly",
921                              "show_special_files", True);
922         so->rm_hidden_files_on_rmdir =
923                 lp_parm_bool(SNUM(handle->conn), "scannedonly",
924                              "rm_hidden_files_on_rmdir", True);
925         so->hide_nonscanned_files =
926                 lp_parm_bool(SNUM(handle->conn), "scannedonly",
927                              "hide_nonscanned_files", False);
928         so->allow_nonscanned_files =
929                 lp_parm_bool(SNUM(handle->conn), "scannedonly",
930                              "allow_nonscanned_files", False);
931         so->scanning_message =
932                 (char *)lp_parm_const_string(SNUM(handle->conn),
933                                              "scannedonly",
934                                              "scanning_message",
935                                              "is being scanned for viruses");
936         so->scanning_message_len = strlen(so->scanning_message);
937         so->recheck_time_open =
938                 lp_parm_int(SNUM(handle->conn), "scannedonly",
939                             "recheck_time_open", 50);
940         so->recheck_tries_open =
941                 lp_parm_int(SNUM(handle->conn), "scannedonly",
942                             "recheck_tries_open", 100);
943         so->recheck_size_open =
944                 lp_parm_int(SNUM(handle->conn), "scannedonly",
945                             "recheck_size_open", 100);
946         so->recheck_time_readdir =
947                 lp_parm_int(SNUM(handle->conn), "scannedonly",
948                             "recheck_time_readdir", 50);
949         so->recheck_tries_readdir =
950                 lp_parm_int(SNUM(handle->conn), "scannedonly",
951                             "recheck_tries_readdir", 20);
952
953         so->p_scanned =
954                 (char *)lp_parm_const_string(SNUM(handle->conn),
955                                              "scannedonly",
956                                              "pref_scanned",
957                                              ".scanned:");
958         so->p_virus =
959                 (char *)lp_parm_const_string(SNUM(handle->conn),
960                                              "scannedonly",
961                                              "pref_virus",
962                                              ".virus:");
963         so->p_failed =
964                 (char *)lp_parm_const_string(SNUM(handle->conn),
965                                              "scannedonly",
966                                              "pref_failed",
967                                              ".failed:");
968         connect_to_scanner(handle);
969
970         return SMB_VFS_NEXT_CONNECT(handle, service, user);
971 }
972
973 /* VFS operations structure */
974 static struct vfs_fn_pointers vfs_scannedonly_fns = {
975         .opendir = scannedonly_opendir,
976         .readdir = scannedonly_readdir,
977         .seekdir = scannedonly_seekdir,
978         .telldir = scannedonly_telldir,
979         .rewind_dir = scannedonly_rewinddir,
980         .closedir = scannedonly_closedir,
981         .rmdir = scannedonly_rmdir,
982         .stat = scannedonly_stat,
983         .lstat = scannedonly_lstat,
984         .open = scannedonly_open,
985         .close_fn = scannedonly_close,
986         .rename = scannedonly_rename,
987         .unlink = scannedonly_unlink,
988         .connect_fn = scannedonly_connect
989 };
990
991 NTSTATUS vfs_scannedonly_init(void)
992 {
993         return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "scannedonly",
994                                 &vfs_scannedonly_fns);
995 }