ClamAV is an open source (GPLv2) anti-virus toolkit.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
clamav/clamd/server-th.c

868 lines
22 KiB

/*
* Copyright (C) 2002 - 2005 Tomasz Kojm <tkojm@clamav.net>
* Trog <trog@clamav.net>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
* MA 02110-1301, USA.
*/
#ifdef _MSC_VER
#include <winsock.h>
#endif
#if HAVE_CONFIG_H
#include "clamav-config.h"
#endif
#include <pthread.h>
#include <errno.h>
#include <signal.h>
#include <stdio.h>
#include <string.h>
#include <time.h>
#include <sys/types.h>
#ifndef C_WINDOWS
#include <sys/socket.h>
#include <sys/time.h>
#include <sys/resource.h>
#endif
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#include "libclamav/clamav.h"
#include "shared/output.h"
#include "shared/optparser.h"
#include "server.h"
#include "thrmgr.h"
#include "session.h"
#include "clamuko.h"
#include "others.h"
#include "shared.h"
#include "libclamav/others.h"
#include "libclamav/readdb.h"
#include "libclamav/cltypes.h"
#ifndef C_WINDOWS
#define closesocket(s) close(s)
#endif
#define BUFFSIZE 1024
#ifndef FALSE
#define FALSE (0)
#endif
#ifndef TRUE
#define TRUE (1)
#endif
int progexit = 0;
pthread_mutex_t exit_mutex = PTHREAD_MUTEX_INITIALIZER;
int reload = 0;
time_t reloaded_time = 0;
pthread_mutex_t reload_mutex = PTHREAD_MUTEX_INITIALIZER;
int sighup = 0;
static struct cl_stat *dbstat = NULL;
typedef struct client_conn_tag {
char *cmd;
size_t cmdlen;
int sd;
unsigned int options;
const struct optstruct *opts;
struct cl_engine *engine;
time_t engine_timestamp;
} client_conn_t;
static void scanner_thread(void *arg)
{
client_conn_t *conn = (client_conn_t *) arg;
#ifndef C_WINDOWS
sigset_t sigset;
#endif
int ret, timeout, session=FALSE;
#ifndef C_WINDOWS
/* ignore all signals */
sigfillset(&sigset);
/* The behavior of a process is undefined after it ignores a
* SIGFPE, SIGILL, SIGSEGV, or SIGBUS signal */
sigdelset(&sigset, SIGFPE);
sigdelset(&sigset, SIGILL);
sigdelset(&sigset, SIGSEGV);
#ifdef SIGBUS
sigdelset(&sigset, SIGBUS);
#endif
pthread_sigmask(SIG_SETMASK, &sigset, NULL);
#endif
timeout = optget(conn->opts, "ReadTimeout")->numarg;
if(!timeout)
timeout = -1;
do {
ret = command(conn->sd, conn->cmd, conn->cmdlen, conn->engine, conn->options, conn->opts, timeout);
if (ret < 0) {
break;
}
switch(ret) {
case COMMAND_SHUTDOWN:
pthread_mutex_lock(&exit_mutex);
progexit = 1;
pthread_mutex_unlock(&exit_mutex);
break;
case COMMAND_RELOAD:
pthread_mutex_lock(&reload_mutex);
reload = 1;
pthread_mutex_unlock(&reload_mutex);
break;
case COMMAND_SESSION:
session = TRUE;
break;
case COMMAND_END:
session = FALSE;
break;
}
if (session) {
pthread_mutex_lock(&exit_mutex);
if(progexit) {
session = FALSE;
}
pthread_mutex_unlock(&exit_mutex);
pthread_mutex_lock(&reload_mutex);
if (conn->engine_timestamp != reloaded_time) {
session = FALSE;
}
pthread_mutex_unlock(&reload_mutex);
}
} while (session);
thrmgr_setactiveengine(NULL);
shutdown(conn->sd, 2);
closesocket(conn->sd);
cl_engine_free(conn->engine);
free(conn->cmd);
free(conn);
return;
}
void sighandler_th(int sig)
{
switch(sig) {
case SIGINT:
case SIGTERM:
progexit = 1;
break;
#ifdef SIGHUP
case SIGHUP:
sighup = 1;
break;
#endif
#ifdef SIGUSR2
case SIGUSR2:
reload = 1;
break;
#endif
default:
break; /* Take no action on other signals - e.g. SIGPIPE */
}
}
static struct cl_engine *reload_db(struct cl_engine *engine, unsigned int dboptions, const struct optstruct *opts, int do_check, int *ret)
{
const char *dbdir;
int retval;
unsigned int sigs = 0;
char pua_cats[128];
pua_cats[0] = 0;
*ret = 0;
if(do_check) {
if(dbstat == NULL) {
logg("No stats for Database check - forcing reload\n");
return engine;
}
if(cl_statchkdir(dbstat) == 1) {
logg("SelfCheck: Database modification detected. Forcing reload.\n");
return engine;
} else {
logg("SelfCheck: Database status OK.\n");
return NULL;
}
}
/* release old structure */
if(engine) {
if(dboptions & (CL_DB_PUA_INCLUDE | CL_DB_PUA_EXCLUDE))
if(cl_engine_get(engine, CL_ENGINE_PUA_CATEGORIES, pua_cats))
logg("^Can't make a copy of pua_cats\n");
thrmgr_setactiveengine(NULL);
cl_engine_free(engine);
}
dbdir = optget(opts, "DatabaseDirectory")->strarg;
logg("Reading databases from %s\n", dbdir);
if(dbstat == NULL) {
dbstat = (struct cl_stat *) malloc(sizeof(struct cl_stat));
if(!dbstat) {
logg("!Can't allocate memory for dbstat\n");
*ret = 1;
return NULL;
}
} else {
cl_statfree(dbstat);
}
memset(dbstat, 0, sizeof(struct cl_stat));
if((retval = cl_statinidir(dbdir, dbstat))) {
logg("!cl_statinidir() failed: %s\n", cl_strerror(retval));
*ret = 1;
return NULL;
}
if(!(engine = cl_engine_new())) {
logg("!Can't initialize antivirus engine\n");
*ret = 1;
return NULL;
}
if(strlen(pua_cats)) {
if((retval = cl_engine_set(engine, CL_ENGINE_PUA_CATEGORIES, pua_cats))) {
logg("!cl_engine_set(CL_ENGINE_PUA_CATEGORIES): %s\n", cl_strerror(retval));
cl_engine_free(engine);
*ret = 1;
return NULL;
}
}
if((retval = cl_load(dbdir, engine, &sigs, dboptions))) {
logg("!reload db failed: %s\n", cl_strerror(retval));
cl_engine_free(engine);
*ret = 1;
return NULL;
}
if((retval = cl_engine_compile(engine)) != 0) {
logg("!Database initialization error: can't compile engine: %s\n", cl_strerror(retval));
cl_engine_free(engine);
*ret = 1;
return NULL;
}
logg("Database correctly reloaded (%u signatures)\n", sigs);
thrmgr_setactiveengine(engine);
return engine;
}
struct rcvloop {
threadpool_t *thr_pool;
struct fd_data *fds;
};
static const char *get_cmd(struct fd_buf *buf, size_t off, size_t *len)
{
unsigned char *pos;
if (!buf->off || off >= buf->off) {
*len = 0;
return NULL;
}
switch (buf->buffer[0]) {
/* commands terminated by delimiters */
case 'n':
case 'z':
pos = memchr(buf->buffer + off, buf->buffer[0] == 'n' ? '\n' : '\0', buf->off);
if (!pos) {
/* we don't have another full command yet */
*len = 0;
return NULL;
}
*pos = '\0';
*len = pos - buf->buffer;
return buf->buffer + 1;
default:
/* one packet = one command */
*len = buf->off;
return buf->buffer;
}
}
int acceptloop_th(int *socketds, unsigned nsockets, struct cl_engine *engine, unsigned int dboptions, const struct optstruct *opts)
{
int max_threads, ret = 0;
unsigned int options = 0;
threadpool_t *thr_pool;
char timestr[32];
#ifndef C_WINDOWS
struct sigaction sigact;
sigset_t sigset;
struct rlimit rlim;
#endif
mode_t old_umask;
client_conn_t *client_conn;
const struct optstruct *opt;
#ifdef HAVE_STRERROR_R
char buff[BUFFSIZE + 1];
#endif
unsigned int selfchk;
time_t start_time, current_time;
pid_t mainpid;
int idletimeout;
uint32_t val32;
uint64_t val64;
struct fd_data fds;
size_t i;
#ifdef CLAMUKO
pthread_t clamuko_pid;
pthread_attr_t clamuko_attr;
struct thrarg *tharg = NULL; /* shut up gcc */
#endif
#ifndef C_WINDOWS
memset(&sigact, 0, sizeof(struct sigaction));
#endif
/* set up limits */
if((opt = optget(opts, "MaxScanSize"))->enabled) {
val64 = opt->numarg;
if((ret = cl_engine_set(engine, CL_ENGINE_MAX_SCANSIZE, &val64))) {
logg("!cli_engine_set(CL_ENGINE_MAX_SCANSIZE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 1;
}
}
cl_engine_get(engine, CL_ENGINE_MAX_SCANSIZE, &val64);
if(val64)
logg("Limits: Global size limit set to %llu bytes.\n", (unsigned long long) val64);
else
logg("^Limits: Global size limit protection disabled.\n");
if((opt = optget(opts, "MaxFileSize"))->enabled) {
val64 = opt->numarg;
if((ret = cl_engine_set(engine, CL_ENGINE_MAX_FILESIZE, &val64))) {
logg("!cli_engine_set(CL_ENGINE_MAX_FILESIZE) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 1;
}
}
cl_engine_get(engine, CL_ENGINE_MAX_FILESIZE, &val64);
if(val64)
logg("Limits: File size limit set to %llu bytes.\n", (unsigned long long) val64);
else
logg("^Limits: File size limit protection disabled.\n");
#ifndef C_WINDOWS
if(getrlimit(RLIMIT_FSIZE, &rlim) == 0) {
cl_engine_get(engine, CL_ENGINE_MAX_FILESIZE, &val64);
if(rlim.rlim_max < val64)
logg("^System limit for file size is lower than engine->maxfilesize\n");
cl_engine_get(engine, CL_ENGINE_MAX_SCANSIZE, &val64);
if(rlim.rlim_max < val64)
logg("^System limit for file size is lower than engine->maxscansize\n");
} else {
logg("^Cannot obtain resource limits for file size\n");
}
#endif
if((opt = optget(opts, "MaxRecursion"))->enabled) {
val32 = opt->numarg;
if((ret = cl_engine_set(engine, CL_ENGINE_MAX_RECURSION, &val32))) {
logg("!cli_engine_set(CL_ENGINE_MAX_RECURSION) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 1;
}
}
cl_engine_get(engine, CL_ENGINE_MAX_RECURSION, &val32);
if(val32)
logg("Limits: Recursion level limit set to %u.\n", (unsigned int) val32);
else
logg("^Limits: Recursion level limit protection disabled.\n");
if((opt = optget(opts, "MaxFiles"))->enabled) {
val32 = opt->numarg;
if((ret = cl_engine_set(engine, CL_ENGINE_MAX_FILES, &val32))) {
logg("!cli_engine_set(CL_ENGINE_MAX_FILES) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 1;
}
}
cl_engine_get(engine, CL_ENGINE_MAX_FILES, &val32);
if(val32)
logg("Limits: Files limit set to %u.\n", (unsigned int) val32);
else
logg("^Limits: Files limit protection disabled.\n");
if(optget(opts, "ScanArchive")->enabled) {
logg("Archive support enabled.\n");
options |= CL_SCAN_ARCHIVE;
if(optget(opts, "ArchiveBlockEncrypted")->enabled) {
logg("Archive: Blocking encrypted archives.\n");
options |= CL_SCAN_BLOCKENCRYPTED;
}
} else {
logg("Archive support disabled.\n");
}
if(optget(opts, "AlgorithmicDetection")->enabled) {
logg("Algorithmic detection enabled.\n");
options |= CL_SCAN_ALGORITHMIC;
} else {
logg("Algorithmic detection disabled.\n");
}
if(optget(opts, "ScanPE")->enabled) {
logg("Portable Executable support enabled.\n");
options |= CL_SCAN_PE;
} else {
logg("Portable Executable support disabled.\n");
}
if(optget(opts, "ScanELF")->enabled) {
logg("ELF support enabled.\n");
options |= CL_SCAN_ELF;
} else {
logg("ELF support disabled.\n");
}
if(optget(opts, "ScanPE")->enabled || optget(opts, "ScanELF")->enabled) {
if(optget(opts, "DetectBrokenExecutables")->enabled) {
logg("Detection of broken executables enabled.\n");
options |= CL_SCAN_BLOCKBROKEN;
}
}
if(optget(opts, "ScanMail")->enabled) {
logg("Mail files support enabled.\n");
options |= CL_SCAN_MAIL;
if(optget(opts, "MailFollowURLs")->enabled) {
logg("Mail: URL scanning enabled.\n");
options |= CL_SCAN_MAILURL;
}
if(optget(opts, "ScanPartialMessages")->enabled) {
logg("Mail: RFC1341 handling enabled.\n");
options |= CL_SCAN_PARTIAL_MESSAGE;
}
} else {
logg("Mail files support disabled.\n");
}
if(optget(opts, "ScanOLE2")->enabled) {
logg("OLE2 support enabled.\n");
options |= CL_SCAN_OLE2;
} else {
logg("OLE2 support disabled.\n");
}
if(optget(opts, "ScanPDF")->enabled) {
logg("PDF support enabled.\n");
options |= CL_SCAN_PDF;
} else {
logg("PDF support disabled.\n");
}
if(optget(opts, "ScanHTML")->enabled) {
logg("HTML support enabled.\n");
options |= CL_SCAN_HTML;
} else {
logg("HTML support disabled.\n");
}
if(optget(opts,"PhishingScanURLs")->enabled) {
if(optget(opts,"PhishingAlwaysBlockCloak")->enabled) {
options |= CL_SCAN_PHISHING_BLOCKCLOAK;
logg("Phishing: Always checking for cloaked urls\n");
}
if(optget(opts,"PhishingAlwaysBlockSSLMismatch")->enabled) {
options |= CL_SCAN_PHISHING_BLOCKSSL;
logg("Phishing: Always checking for ssl mismatches\n");
}
}
if(optget(opts,"HeuristicScanPrecedence")->enabled) {
options |= CL_SCAN_HEURISTIC_PRECEDENCE;
logg("Heuristic: precedence enabled\n");
}
if(optget(opts, "StructuredDataDetection")->enabled) {
options |= CL_SCAN_STRUCTURED;
if((opt = optget(opts, "StructuredMinCreditCardCount"))->enabled) {
val32 = opt->numarg;
if((ret = cl_engine_set(engine, CL_ENGINE_MIN_CC_COUNT, &val32))) {
logg("!cli_engine_set(CL_ENGINE_MIN_CC_COUNT) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 1;
}
}
cl_engine_get(engine, CL_ENGINE_MIN_CC_COUNT, &val32);
logg("Structured: Minimum Credit Card Number Count set to %u\n", (unsigned int) val32);
if((opt = optget(opts, "StructuredMinSSNCount"))->enabled) {
val32 = opt->numarg;
if((ret = cl_engine_set(engine, CL_ENGINE_MIN_SSN_COUNT, &val32))) {
logg("!cli_engine_set(CL_ENGINE_MIN_SSN_COUNT) failed: %s\n", cl_strerror(ret));
cl_engine_free(engine);
return 1;
}
}
cl_engine_get(engine, CL_ENGINE_MIN_SSN_COUNT, &val32);
logg("Structured: Minimum Social Security Number Count set to %u\n", (unsigned int) val32);
if(optget(opts, "StructuredSSNFormatNormal")->enabled)
options |= CL_SCAN_STRUCTURED_SSN_NORMAL;
if(optget(opts, "StructuredSSNFormatStripped")->enabled)
options |= CL_SCAN_STRUCTURED_SSN_STRIPPED;
}
selfchk = optget(opts, "SelfCheck")->numarg;
if(!selfchk) {
logg("Self checking disabled.\n");
} else {
logg("Self checking every %u seconds.\n", selfchk);
}
/* save the PID */
mainpid = getpid();
if((opt = optget(opts, "PidFile"))->enabled) {
FILE *fd;
old_umask = umask(0006);
if((fd = fopen(opt->strarg, "w")) == NULL) {
logg("!Can't save PID in file %s\n", opt->strarg);
} else {
if (fprintf(fd, "%u", (unsigned int) mainpid)<0) {
logg("!Can't save PID in file %s\n", opt->strarg);
}
fclose(fd);
}
umask(old_umask);
}
logg("*Listening daemon: PID: %u\n", (unsigned int) mainpid);
max_threads = optget(opts, "MaxThreads")->numarg;
if(optget(opts, "ClamukoScanOnAccess")->enabled)
#ifdef CLAMUKO
{
do {
if(pthread_attr_init(&clamuko_attr)) break;
pthread_attr_setdetachstate(&clamuko_attr, PTHREAD_CREATE_JOINABLE);
if(!(tharg = (struct thrarg *) malloc(sizeof(struct thrarg)))) break;
tharg->opts = opts;
tharg->engine = engine;
tharg->options = options;
if(!pthread_create(&clamuko_pid, &clamuko_attr, clamukoth, tharg)) break;
free(tharg);
tharg=NULL;
} while(0);
if (!tharg) logg("!Unable to start Clamuko\n");
}
#else
logg("Clamuko is not available.\n");
#endif
#ifndef C_WINDOWS
/* set up signal handling */
sigfillset(&sigset);
sigdelset(&sigset, SIGINT);
sigdelset(&sigset, SIGTERM);
sigdelset(&sigset, SIGSEGV);
sigdelset(&sigset, SIGHUP);
sigdelset(&sigset, SIGPIPE);
sigdelset(&sigset, SIGUSR2);
/* The behavior of a process is undefined after it ignores a
* SIGFPE, SIGILL, SIGSEGV, or SIGBUS signal */
sigdelset(&sigset, SIGFPE);
sigdelset(&sigset, SIGILL);
sigdelset(&sigset, SIGSEGV);
#ifdef SIGBUS
sigdelset(&sigset, SIGBUS);
#endif
sigprocmask(SIG_SETMASK, &sigset, NULL);
/* SIGINT, SIGTERM, SIGSEGV */
sigact.sa_handler = sighandler_th;
sigemptyset(&sigact.sa_mask);
sigaddset(&sigact.sa_mask, SIGINT);
sigaddset(&sigact.sa_mask, SIGTERM);
sigaddset(&sigact.sa_mask, SIGHUP);
sigaddset(&sigact.sa_mask, SIGPIPE);
sigaddset(&sigact.sa_mask, SIGUSR2);
sigaction(SIGINT, &sigact, NULL);
sigaction(SIGTERM, &sigact, NULL);
sigaction(SIGHUP, &sigact, NULL);
sigaction(SIGPIPE, &sigact, NULL);
sigaction(SIGUSR2, &sigact, NULL);
#endif
idletimeout = optget(opts, "IdleTimeout")->numarg;
memset(&fds, 0, sizeof(fds));
for (i=0;i < nsockets;i++)
if (fds_add(&fds, socketds[i], 1) == -1) {
logg("!fds_add failed\n");
cl_engine_free(engine);
return 1;
}
if ((thr_pool=thrmgr_new(max_threads, idletimeout, scanner_thread)) == NULL) {
logg("!thrmgr_new failed\n");
exit(-1);
}
time(&start_time);
pthread_mutex_lock(&fds.buf_mutex);
for(;;) {
/* Block waiting for connection on any of the sockets,
* doesn't wake on signals, that is what recvloop does! */
int new_sd = fds_poll_recv(&fds, -1, 0);
/* TODO: what about sockets that get rm-ed? */
if (!fds.nfds) {
/* no more sockets to poll, all gave an error */
logg("!Main socket gone: fatal\n");
break;
}
for (i=0;i < fds.nfds && new_sd >= 0; i++) {
struct fd_buf *buf = &fds.buf[i];
if (!buf->got_newdata)
continue;
if (!buf->buffer) {
/* listen only socket */
new_sd = accept(fds.buf[i].fd, NULL, NULL);
if (new_sd >= 0) {
if (fds_add(&fds, new_sd, 0) == -1) {
logg("!fds_add failed\n");
closesocket(new_sd);
continue;
}
} else if (errno != EINTR) {
pthread_mutex_lock(&exit_mutex);
if(progexit) {
pthread_mutex_unlock(&exit_mutex);
break;
}
pthread_mutex_unlock(&exit_mutex);
/* very bad - need to exit or restart */
#ifdef HAVE_STRERROR_R
strerror_r(errno, buff, BUFFSIZE);
logg("!accept() failed: %s\n", buff);
#else
logg("!accept() failed\n");
#endif
continue;
}
} else if (buf->fd != -1) {
const char *cmd;
size_t cmdlen = 0;
size_t pos = 0;
int error = 0;
/* New data available to read on socket. */
/* Parse & dispatch commands */
while ((cmd = get_cmd(buf, pos, &cmdlen)) != NULL) {
printf("%s\n",cmd);
client_conn = (client_conn_t *) malloc(sizeof(struct client_conn_tag));
if(client_conn) {
client_conn->sd = buf->fd;
client_conn->cmdlen = cmdlen;
client_conn->cmd = malloc(cmdlen+1);
if (!client_conn->cmd) {
logg("!acceptloop_th: failed to allocate memory for command\n");
error = 1;
break;
}
memcpy(client_conn->cmd, cmd, cmdlen);
client_conn->cmd[cmdlen] = '\0';
client_conn->options = options;
client_conn->opts = opts;
if(cl_engine_addref(engine)) {
logg("!cl_engine_addref() failed\n");
error = 1;
pthread_mutex_lock(&exit_mutex);
progexit = 1;
pthread_mutex_unlock(&exit_mutex);
} else {
client_conn->engine = engine;
client_conn->engine_timestamp = reloaded_time;
if(!thrmgr_dispatch(thr_pool, client_conn)) {
logg("!thread dispatch failed\n");
error = 1;
}
}
} else {
logg("!Can't allocate memory for client_conn\n");
if(optget(opts, "ExitOnOOM")->enabled) {
pthread_mutex_lock(&exit_mutex);
progexit = 1;
pthread_mutex_unlock(&exit_mutex);
}
error = 1;
}
pos += cmdlen+1;
}
if (error) {
mdprintf(buf->fd, "ERROR\n");
shutdown(buf->fd, 2);
closesocket(buf->fd);
buf->fd = -1;
} else {
/* move partial command to beginning of buffer */
if (pos < buf->off) {
memmove (buf->buffer, &buf->buffer[pos], buf->off - pos);
buf->off -= pos;
} else
buf->off = 0;
}
}
/* handle progexit */
pthread_mutex_lock(&exit_mutex);
if (progexit) {
pthread_mutex_unlock(&exit_mutex);
for (i=0;i < fds.nfds; i++) {
if (fds.buf[i].fd == -1)
continue;
shutdown(fds.buf[i].fd, 2);
closesocket(fds.buf[i].fd);
}
break;
}
pthread_mutex_unlock(&exit_mutex);
}
/* SIGHUP */
if (sighup) {
logg("SIGHUP caught: re-opening log file.\n");
logg_close();
sighup = 0;
if(!logg_file && (opt = optget(opts, "LogFile"))->enabled)
logg_file = opt->strarg;
}
/* SelfCheck */
if(selfchk) {
time(&current_time);
if((current_time - start_time) > (time_t)selfchk) {
if(reload_db(engine, dboptions, opts, TRUE, &ret)) {
pthread_mutex_lock(&reload_mutex);
reload = 1;
pthread_mutex_unlock(&reload_mutex);
}
time(&start_time);
}
}
/* DB reload */
pthread_mutex_lock(&reload_mutex);
if(reload) {
pthread_mutex_unlock(&reload_mutex);
engine = reload_db(engine, dboptions, opts, FALSE, &ret);
if(ret) {
logg("Terminating because of a fatal error.\n");
if(new_sd >= 0)
closesocket(new_sd);
break;
}
pthread_mutex_lock(&reload_mutex);
reload = 0;
time(&reloaded_time);
pthread_mutex_unlock(&reload_mutex);
#ifdef CLAMUKO
if(optget(opts, "ClamukoScanOnAccess")->enabled && tharg) {
logg("Stopping and restarting Clamuko.\n");
pthread_kill(clamuko_pid, SIGUSR1);
pthread_join(clamuko_pid, NULL);
tharg->engine = engine;
pthread_create(&clamuko_pid, &clamuko_attr, clamukoth, tharg);
}
#endif
} else {
pthread_mutex_unlock(&reload_mutex);
}
}
pthread_mutex_unlock(&fds.buf_mutex);
fds_free(&fds);
/* Destroy the thread manager.
* This waits for all current tasks to end
*/
thrmgr_destroy(thr_pool);
#ifdef CLAMUKO
if(optget(opts, "ClamukoScanOnAccess")->enabled) {
logg("Stopping Clamuko.\n");
pthread_kill(clamuko_pid, SIGUSR1);
pthread_join(clamuko_pid, NULL);
}
#endif
if(engine) {
thrmgr_setactiveengine(NULL);
cl_engine_free(engine);
}
if(dbstat)
cl_statfree(dbstat);
logg("*Shutting down the main socket%s.\n", (nsockets > 1) ? "s" : "");
for (i = 0; i < nsockets; i++)
shutdown(socketds[i], 2);
logg("*Closing the main socket%s.\n", (nsockets > 1) ? "s" : "");
for (i = 0; i < nsockets; i++)
closesocket(socketds[i]);
#ifndef C_OS2
if((opt = optget(opts, "LocalSocket"))->enabled) {
if(unlink(opt->strarg) == -1)
logg("!Can't unlink the socket file %s\n", opt->strarg);
else
logg("Socket file removed.\n");
}
#endif
if((opt = optget(opts, "PidFile"))->enabled) {
if(unlink(opt->strarg) == -1)
logg("!Can't unlink the pid file %s\n", opt->strarg);
else
logg("Pid file removed.\n");
}
time(&current_time);
logg("--- Stopped at %s", cli_ctime(&current_time, timestr, sizeof(timestr)));
return ret;
}