Rapid spam filtering system https://rspamd.com/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1649 lines
43 KiB

/*-
* Copyright 2016 Vsevolod Stakhov
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "config.h"
#include "rspamd.h"
#include "libserver/maps/map.h"
#include "lua/lua_common.h"
#include "libserver/worker_util.h"
#include "libserver/rspamd_control.h"
#include "ottery.h"
#include "cryptobox.h"
#include "utlist.h"
#include "unix-std.h"
/* pwd and grp */
#ifdef HAVE_PWD_H
#include <pwd.h>
#endif
#ifdef HAVE_GRP_H
#include <grp.h>
#endif
#ifdef HAVE_NFTW
#include <ftw.h>
#endif
#include <signal.h>
#ifdef HAVE_SYS_RESOURCE_H
#include <sys/resource.h>
#endif
#ifdef HAVE_LIBUTIL_H
#include <libutil.h>
#endif
#ifdef HAVE_OPENSSL
#include <openssl/err.h>
#include <openssl/evp.h>
#endif
#include "sqlite3.h"
#include "contrib/libev/ev.h"
/* 2 seconds to fork new process in place of dead one */
#define SOFT_FORK_TIME 2
/* 10 seconds after getting termination signal to terminate all workers with SIGKILL */
#define TERMINATION_INTERVAL (0.2)
static gboolean load_rspamd_config (struct rspamd_main *rspamd_main,
struct rspamd_config *cfg,
gboolean init_modules,
enum rspamd_post_load_options opts,
gboolean reload);
static void rspamd_cld_handler (EV_P_ ev_child *w,
struct rspamd_main *rspamd_main,
struct rspamd_worker *wrk);
/* Control socket */
static gint control_fd;
static ev_io control_ev;
static struct rspamd_stat old_stat;
static ev_timer stat_ev;
static gboolean valgrind_mode = FALSE;
/* Cmdline options */
static gboolean no_fork = FALSE;
static gboolean show_version = FALSE;
static gchar **cfg_names = NULL;
static gchar *rspamd_user = NULL;
static gchar *rspamd_group = NULL;
static gchar *rspamd_pidfile = NULL;
static gboolean is_debug = FALSE;
static gboolean is_insecure = FALSE;
static GHashTable *ucl_vars = NULL;
static gchar **lua_env = NULL;
static gboolean skip_template = FALSE;
static gint term_attempts = 0;
/* List of active listen sockets indexed by worker type */
static GHashTable *listen_sockets = NULL;
/* Defined in modules.c */
extern module_t *modules[];
extern worker_t *workers[];
/* Command line options */
static gboolean rspamd_parse_var (const gchar *option_name,
const gchar *value, gpointer data,
GError **error);
static GOptionEntry entries[] =
{
{ "no-fork", 'f', 0, G_OPTION_ARG_NONE, &no_fork,
"Do not daemonize main process", NULL },
{ "config", 'c', 0, G_OPTION_ARG_FILENAME_ARRAY, &cfg_names,
"Specify config file(s)", NULL },
{ "user", 'u', 0, G_OPTION_ARG_STRING, &rspamd_user,
"User to run rspamd as", NULL },
{ "group", 'g', 0, G_OPTION_ARG_STRING, &rspamd_group,
"Group to run rspamd as", NULL },
{ "pid", 'p', 0, G_OPTION_ARG_STRING, &rspamd_pidfile, "Path to pidfile",
NULL },
{ "debug", 'd', 0, G_OPTION_ARG_NONE, &is_debug, "Force debug output",
NULL },
{ "insecure", 'i', 0, G_OPTION_ARG_NONE, &is_insecure,
"Ignore running workers as privileged users (insecure)", NULL },
{ "version", 'v', 0, G_OPTION_ARG_NONE, &show_version,
"Show version and exit", NULL },
{"var", 0, 0, G_OPTION_ARG_CALLBACK, (gpointer)&rspamd_parse_var,
"Redefine/define environment variable", NULL},
{"skip-template", 'T', 0, G_OPTION_ARG_NONE, &skip_template,
"Do not apply Jinja templates", NULL},
{"lua-env", '\0', 0, G_OPTION_ARG_FILENAME_ARRAY, &lua_env,
"Load lua environment from the specified files", NULL},
{ NULL, 0, 0, G_OPTION_ARG_NONE, NULL, NULL, NULL }
};
static gboolean
rspamd_parse_var (const gchar *option_name,
const gchar *value, gpointer data,
GError **error)
{
gchar *k, *v, *t;
t = strchr (value, '=');
if (t != NULL) {
k = g_strdup (value);
t = k + (t - value);
v = g_strdup (t + 1);
*t = '\0';
if (ucl_vars == NULL) {
ucl_vars = g_hash_table_new_full (rspamd_strcase_hash,
rspamd_strcase_equal, g_free, g_free);
}
g_hash_table_insert (ucl_vars, k, v);
}
else {
g_set_error (error, g_quark_try_string ("main"), EINVAL,
"Bad variable format: %s", value);
return FALSE;
}
return TRUE;
}
static void
read_cmd_line (gint *argc, gchar ***argv, struct rspamd_config *cfg)
{
GError *error = NULL;
GOptionContext *context;
guint cfg_num;
context = g_option_context_new ("- run rspamd daemon");
#if defined(GIT_VERSION) && GIT_VERSION == 1
g_option_context_set_summary (context,
"Summary:\n Rspamd daemon version " RVERSION "-git\n Git id: " RID);
#else
g_option_context_set_summary (context,
"Summary:\n Rspamd daemon version " RVERSION);
#endif
g_option_context_add_main_entries (context, entries, NULL);
if (!g_option_context_parse (context, argc, argv, &error)) {
fprintf (stderr, "option parsing failed: %s\n", error->message);
g_option_context_free (context);
exit (1);
}
cfg->rspamd_user = rspamd_user;
cfg->rspamd_group = rspamd_group;
cfg_num = cfg_names != NULL ? g_strv_length (cfg_names) : 0;
if (cfg_num == 0) {
cfg->cfg_name = FIXED_CONFIG_FILE;
}
else {
cfg->cfg_name = cfg_names[0];
g_assert (cfg_num == 1);
}
cfg->pid_file = rspamd_pidfile;
g_option_context_free (context);
}
static int
rspamd_write_pid (struct rspamd_main *main)
{
pid_t pid;
if (main->cfg->pid_file == NULL) {
return -1;
}
main->pfh = rspamd_pidfile_open (main->cfg->pid_file, 0644, &pid);
if (main->pfh == NULL) {
return -1;
}
if (main->is_privilleged) {
/* Force root user as owner of pid file */
#ifdef HAVE_PIDFILE_FILENO
if (fchown (pidfile_fileno (main->pfh), 0, 0) == -1) {
#else
if (fchown (main->pfh->pf_fd, 0, 0) == -1) {
#endif
}
}
rspamd_pidfile_write (main->pfh);
return 0;
}
/* Detect privilleged mode */
static void
detect_priv (struct rspamd_main *rspamd_main)
{
struct passwd *pwd;
struct group *grp;
uid_t euid;
euid = geteuid ();
if (euid == 0) {
if (!rspamd_main->cfg->rspamd_user && !is_insecure) {
msg_err_main (
"cannot run rspamd workers as root user, please add -u and -g options to select a proper unprivilleged user or specify --insecure flag");
exit (EXIT_FAILURE);
}
else if (is_insecure) {
rspamd_main->is_privilleged = TRUE;
rspamd_main->workers_uid = 0;
rspamd_main->workers_gid = 0;
}
else {
rspamd_main->is_privilleged = TRUE;
pwd = getpwnam (rspamd_main->cfg->rspamd_user);
if (pwd == NULL) {
msg_err_main ("user specified does not exists (%s), aborting",
strerror (errno));
exit (-errno);
}
if (rspamd_main->cfg->rspamd_group) {
grp = getgrnam (rspamd_main->cfg->rspamd_group);
if (grp == NULL) {
msg_err_main ("group specified does not exists (%s), aborting",
strerror (errno));
exit (-errno);
}
rspamd_main->workers_gid = grp->gr_gid;
}
else {
rspamd_main->workers_gid = (gid_t)-1;
}
rspamd_main->workers_uid = pwd->pw_uid;
}
}
else {
rspamd_main->is_privilleged = FALSE;
rspamd_main->workers_uid = (uid_t)-1;
rspamd_main->workers_gid = (gid_t)-1;
}
}
static void
config_logger (rspamd_mempool_t *pool, gpointer ud)
{
struct rspamd_main *rspamd_main = ud;
rspamd_main->logger = rspamd_log_open_specific (rspamd_main->server_pool,
rspamd_main->cfg,
"main",
rspamd_main->workers_uid,
rspamd_main->workers_gid);
if (rspamd_main->logger == NULL) {
/*
* XXX:
* Error has been already logged (in fact,
* we might fall back to console logger here)
*/
exit (EXIT_FAILURE);
}
rspamd_logger_configure_modules (rspamd_main->cfg->debug_modules);
}
static gboolean
reread_config (struct rspamd_main *rspamd_main)
{
struct rspamd_config *tmp_cfg, *old_cfg;
gchar *cfg_file;
int load_opts = RSPAMD_CONFIG_INIT_VALIDATE|RSPAMD_CONFIG_INIT_SYMCACHE|
RSPAMD_CONFIG_INIT_LIBS|RSPAMD_CONFIG_INIT_URL;
rspamd_symcache_save (rspamd_main->cfg->cache);
tmp_cfg = rspamd_config_new (RSPAMD_CONFIG_INIT_DEFAULT);
tmp_cfg->libs_ctx = rspamd_main->cfg->libs_ctx;
REF_RETAIN (tmp_cfg->libs_ctx);
cfg_file = rspamd_mempool_strdup (tmp_cfg->cfg_pool,
rspamd_main->cfg->cfg_name);
/* Save some variables */
tmp_cfg->cfg_name = cfg_file;
old_cfg = rspamd_main->cfg;
rspamd_main->cfg = tmp_cfg;
rspamd_logger_t *old_logger = rspamd_main->logger;
if (!load_rspamd_config (rspamd_main, tmp_cfg, TRUE, load_opts, TRUE)) {
rspamd_main->cfg = old_cfg;
rspamd_main->logger = old_logger;
msg_err_main ("cannot parse new config file, revert to old one");
REF_RELEASE (tmp_cfg);
return FALSE;
}
else {
rspamd_log_close (old_logger);
msg_info_main ("replacing config");
REF_RELEASE (old_cfg);
rspamd_main->cfg->rspamd_user = rspamd_user;
rspamd_main->cfg->rspamd_group = rspamd_group;
/* Here, we can do post actions with the existing config */
/*
* As some rules are defined in lua, we need to process them, then init
* modules and merely afterwards to init modules
*/
rspamd_lua_post_load_config (tmp_cfg);
rspamd_init_filters (tmp_cfg, true, false);
/* Do post-load actions */
rspamd_config_post_load (tmp_cfg,
load_opts|RSPAMD_CONFIG_INIT_POST_LOAD_LUA|RSPAMD_CONFIG_INIT_PRELOAD_MAPS);
msg_info_main ("config has been reread successfully");
}
return TRUE;
}
struct waiting_worker {
struct rspamd_main *rspamd_main;
struct ev_timer wait_ev;
struct rspamd_worker_conf *cf;
guint oldindex;
};
static void
rspamd_fork_delayed_cb (EV_P_ ev_timer *w, int revents)
{
struct waiting_worker *waiting_worker = (struct waiting_worker *)w->data;
ev_timer_stop (EV_A_ &waiting_worker->wait_ev);
rspamd_fork_worker (waiting_worker->rspamd_main, waiting_worker->cf,
waiting_worker->oldindex,
waiting_worker->rspamd_main->event_loop,
rspamd_cld_handler, listen_sockets);
REF_RELEASE (waiting_worker->cf);
g_free (waiting_worker);
}
static void
rspamd_fork_delayed (struct rspamd_worker_conf *cf,
guint index,
struct rspamd_main *rspamd_main)
{
struct waiting_worker *nw;
nw = g_malloc0 (sizeof (*nw));
nw->cf = cf;
nw->oldindex = index;
nw->rspamd_main = rspamd_main;
REF_RETAIN (cf);
nw->wait_ev.data = nw;
ev_timer_init (&nw->wait_ev, rspamd_fork_delayed_cb, SOFT_FORK_TIME, 0.0);
ev_timer_start (rspamd_main->event_loop, &nw->wait_ev);
}
static GList *
create_listen_socket (GPtrArray *addrs, guint cnt,
enum rspamd_worker_socket_type listen_type)
{
GList *result = NULL;
gint fd;
guint i;
static const int listen_opts = RSPAMD_INET_ADDRESS_LISTEN_ASYNC;
struct rspamd_worker_listen_socket *ls;
g_ptr_array_sort (addrs, rspamd_inet_address_compare_ptr);
for (i = 0; i < cnt; i ++) {
/*
* Copy address to avoid reload issues
*/
if (listen_type & RSPAMD_WORKER_SOCKET_TCP) {
fd = rspamd_inet_address_listen (g_ptr_array_index (addrs, i),
SOCK_STREAM,
listen_opts, -1);
if (fd != -1) {
ls = g_malloc0 (sizeof (*ls));
ls->addr = rspamd_inet_address_copy (g_ptr_array_index (addrs, i));
ls->fd = fd;
ls->type = RSPAMD_WORKER_SOCKET_TCP;
result = g_list_prepend (result, ls);
}
}
if (listen_type & RSPAMD_WORKER_SOCKET_UDP) {
fd = rspamd_inet_address_listen (g_ptr_array_index (addrs, i),
SOCK_DGRAM,
listen_opts | RSPAMD_INET_ADDRESS_LISTEN_REUSEPORT, -1);
if (fd != -1) {
ls = g_malloc0 (sizeof (*ls));
ls->addr = rspamd_inet_address_copy (g_ptr_array_index (addrs, i));
ls->fd = fd;
ls->type = RSPAMD_WORKER_SOCKET_UDP;
result = g_list_prepend (result, ls);
}
}
}
return result;
}
static GList *
systemd_get_socket (struct rspamd_main *rspamd_main, const gchar *fdname)
{
int number, sock, num_passed, flags;
GList *result = NULL;
const gchar *e;
gchar **fdnames;
gchar *end;
struct stat st;
static const int sd_listen_fds_start = 3; /* SD_LISTEN_FDS_START */
struct rspamd_worker_listen_socket *ls;
union {
struct sockaddr_storage ss;
struct sockaddr sa;
} addr_storage;
socklen_t slen = sizeof (addr_storage);
gint stype;
number = strtoul (fdname, &end, 10);
if (end != NULL && *end != '\0') {
/* Cannot parse as number, assume a name in LISTEN_FDNAMES. */
e = getenv ("LISTEN_FDNAMES");
if (!e) {
msg_err_main ("cannot get systemd variable 'LISTEN_FDNAMES'");
errno = ENOENT;
return NULL;
}
fdnames = g_strsplit (e, ":", -1);
for (number = 0; fdnames[number]; number++) {
if (!strcmp (fdnames[number], fdname)) {
break;
}
}
if (!fdnames[number]) {
number = -1;
}
g_strfreev (fdnames);
}
if (number < 0) {
msg_warn_main ("cannot find systemd socket: %s", fdname);
errno = ENOENT;
return NULL;
}
e = getenv ("LISTEN_FDS");
if (e != NULL) {
errno = 0;
num_passed = strtoul (e, &end, 10);
if ((end == NULL || *end == '\0') && num_passed > number) {
sock = number + sd_listen_fds_start;
if (fstat (sock, &st) == -1) {
msg_warn_main ("cannot stat systemd descriptor %d", sock);
return NULL;
}
if (!S_ISSOCK (st.st_mode)) {
msg_warn_main ("systemd descriptor %d is not a socket", sock);
errno = EINVAL;
return NULL;
}
flags = fcntl (sock, F_GETFD);
if (flags != -1) {
(void)fcntl (sock, F_SETFD, flags | FD_CLOEXEC);
}
rspamd_socket_nonblocking (sock);
if (getsockname (sock, &addr_storage.sa, &slen) == -1) {
msg_warn_main ("cannot get name for systemd descriptor %d: %s",
sock, strerror (errno));
errno = EINVAL;
return NULL;
}
ls = g_malloc0 (sizeof (*ls));
ls->addr = rspamd_inet_address_from_sa (&addr_storage.sa, slen);
ls->fd = sock;
ls->is_systemd = true;
slen = sizeof (stype);
if (getsockopt (sock, SOL_SOCKET, SO_TYPE, &stype, &slen) != -1) {
if (stype == SOCK_STREAM) {
ls->type = RSPAMD_WORKER_SOCKET_TCP;
}
else {
ls->type = RSPAMD_WORKER_SOCKET_UDP;
}
}
else {
msg_warn_main ("cannot get type for systemd descriptor %d: %s",
sock, strerror (errno));
ls->type = RSPAMD_WORKER_SOCKET_TCP;
}
result = g_list_prepend (result, ls);
}
else if (num_passed <= number) {
msg_err_main ("systemd LISTEN_FDS does not contain the expected fd: %d",
num_passed);
errno = EINVAL;
}
}
else {
msg_err_main ("cannot get systemd variable 'LISTEN_FDS'");
errno = ENOENT;
}
return result;
}
static void
pass_signal_cb (gpointer key, gpointer value, gpointer ud)
{
struct rspamd_worker *cur = value;
gint signo = GPOINTER_TO_INT (ud);
kill (cur->pid, signo);
}
static void
rspamd_pass_signal (GHashTable * workers, gint signo)
{
g_hash_table_foreach (workers, pass_signal_cb, GINT_TO_POINTER (signo));
}
static inline uintptr_t
make_listen_key (struct rspamd_worker_bind_conf *cf)
{
rspamd_cryptobox_fast_hash_state_t st;
guint i, keylen = 0;
guint8 *key;
rspamd_inet_addr_t *addr;
guint16 port;
rspamd_cryptobox_fast_hash_init (&st, rspamd_hash_seed ());
if (cf->is_systemd) {
/* Something like 'systemd:0' or 'systemd:controller'. */
rspamd_cryptobox_fast_hash_update (&st, cf->name, strlen (cf->name));
}
else {
rspamd_cryptobox_fast_hash_update (&st, cf->name, strlen (cf->name));
for (i = 0; i < cf->cnt; i ++) {
addr = g_ptr_array_index (cf->addrs, i);
key = rspamd_inet_address_get_hash_key (
addr, &keylen);
rspamd_cryptobox_fast_hash_update (&st, key, keylen);
port = rspamd_inet_address_get_port (addr);
rspamd_cryptobox_fast_hash_update (&st, &port, sizeof (port));
}
}
return rspamd_cryptobox_fast_hash_final (&st);
}
static void
spawn_worker_type (struct rspamd_main *rspamd_main, struct ev_loop *event_loop,
struct rspamd_worker_conf *cf)
{
gint i;
if (cf->count < 0) {
msg_info_main ("skip spawning of worker %s: disabled in configuration",
cf->worker->name);
return;
}
if (cf->worker->flags & RSPAMD_WORKER_UNIQUE) {
if (cf->count > 1) {
msg_warn_main (
"cannot spawn more than 1 %s worker, so spawn one",
cf->worker->name);
}
rspamd_fork_worker (rspamd_main, cf, 0, event_loop, rspamd_cld_handler,
listen_sockets);
}
else if (cf->worker->flags & RSPAMD_WORKER_THREADED) {
rspamd_fork_worker (rspamd_main, cf, 0, event_loop, rspamd_cld_handler,
listen_sockets);
}
else {
for (i = 0; i < cf->count; i++) {
rspamd_fork_worker (rspamd_main, cf, i, event_loop,
rspamd_cld_handler, listen_sockets);
}
}
}
static void
spawn_workers (struct rspamd_main *rspamd_main, struct ev_loop *ev_base)
{
GList *cur, *ls;
struct rspamd_worker_conf *cf;
gpointer p;
guintptr key;
struct rspamd_worker_bind_conf *bcf;
gboolean listen_ok = FALSE;
GPtrArray *seen_mandatory_workers;
worker_t **cw, *wrk;
guint i;
/* Special hack for hs_helper if it's not defined in a config */
seen_mandatory_workers = g_ptr_array_new ();
cur = rspamd_main->cfg->workers;
while (cur) {
cf = cur->data;
listen_ok = FALSE;
if (cf->worker == NULL) {
msg_err_main ("type of worker is unspecified, skip spawning");
}
else {
if (!cf->enabled || cf->count <= 0) {
msg_info_main ("worker of type %s(%s) is disabled in the config, "
"skip spawning", g_quark_to_string (cf->type),
cf->bind_conf ? cf->bind_conf->name : "none");
cur = g_list_next (cur);
continue;
}
if (cf->worker->flags & RSPAMD_WORKER_ALWAYS_START) {
g_ptr_array_add (seen_mandatory_workers, cf->worker);
}
if (cf->worker->flags & RSPAMD_WORKER_HAS_SOCKET) {
LL_FOREACH (cf->bind_conf, bcf) {
key = make_listen_key (bcf);
if ((p =
g_hash_table_lookup (listen_sockets,
GINT_TO_POINTER (key))) == NULL) {
if (!bcf->is_systemd) {
/* Create listen socket */
ls = create_listen_socket (bcf->addrs, bcf->cnt,
cf->worker->listen_type);
}
else {
ls = systemd_get_socket (rspamd_main,
g_ptr_array_index (bcf->addrs, 0));
}
if (ls == NULL) {
msg_err_main ("cannot listen on %s socket %s: %s",
bcf->is_systemd ? "systemd" : "normal",
bcf->name,
strerror (errno));
}
else {
g_hash_table_insert (listen_sockets, (gpointer)key, ls);
listen_ok = TRUE;
}
}
else {
/* We had socket for this type of worker */
ls = p;
listen_ok = TRUE;
}
/* Do not add existing lists as it causes loops */
if (g_list_position (cf->listen_socks, ls) == -1) {
cf->listen_socks = g_list_concat (cf->listen_socks, ls);
}
}
if (listen_ok) {
spawn_worker_type (rspamd_main, ev_base, cf);
}
else {
if (cf->bind_conf == NULL) {
msg_err_main ("cannot create listen socket for %s",
g_quark_to_string (cf->type));
} else {
msg_err_main ("cannot create listen socket for %s at %s",
g_quark_to_string (cf->type), cf->bind_conf->name);
}
rspamd_hard_terminate (rspamd_main);
g_assert_not_reached ();
}
}
else {
spawn_worker_type (rspamd_main, ev_base, cf);
}
}
cur = g_list_next (cur);
}
for (cw = workers; *cw != NULL; cw ++) {
gboolean seen = FALSE;
wrk = *cw;
if (wrk->flags & RSPAMD_WORKER_ALWAYS_START) {
for (i = 0; i < seen_mandatory_workers->len; i ++) {
if (wrk == g_ptr_array_index (seen_mandatory_workers, i)) {
seen = TRUE;
break;
}
}
if (!seen) {
cf = rspamd_config_new_worker (rspamd_main->cfg, NULL);
cf->count = 1;
cf->worker = wrk;
cf->type = g_quark_from_static_string (wrk->name);
if (cf->worker->worker_init_func) {
cf->ctx = cf->worker->worker_init_func (rspamd_main->cfg);
}
spawn_worker_type (rspamd_main, ev_base, cf);
}
}
}
g_ptr_array_free (seen_mandatory_workers, TRUE);
}
static void
kill_old_workers (gpointer key, gpointer value, gpointer unused)
{
struct rspamd_worker *w = value;
struct rspamd_main *rspamd_main;
rspamd_main = w->srv;
if (w->state == rspamd_worker_state_wanna_die) {
w->state = rspamd_worker_state_terminating;
kill (w->pid, SIGUSR2);
ev_io_stop (rspamd_main->event_loop, &w->srv_ev);
g_hash_table_remove_all (w->control_events_pending);
msg_info_main ("send signal to worker %P", w->pid);
}
else if (w->state != rspamd_worker_state_running) {
msg_info_main ("do not send signal to worker %P, already sent", w->pid);
}
}
static void
mark_old_workers (gpointer key, gpointer value, gpointer unused)
{
struct rspamd_worker *w = value;
if (w->state == rspamd_worker_state_running) {
w->state = rspamd_worker_state_wanna_die;
}
w->flags |= RSPAMD_WORKER_OLD_CONFIG;
}
static void
rspamd_worker_wait (struct rspamd_worker *w)
{
struct rspamd_main *rspamd_main;
rspamd_main = w->srv;
if (term_attempts < 0) {
if (w->cf->worker->flags & RSPAMD_WORKER_KILLABLE) {
if (kill (w->pid, SIGKILL) == -1) {
if (errno == ESRCH) {
/* We have actually killed the process */
return;
}
}
else {
msg_warn_main ("terminate worker %s(%P) with SIGKILL",
g_quark_to_string (w->type), w->pid);
}
}
else {
kill (w->pid, SIGKILL);
if (errno == ESRCH) {
/* We have actually killed the process */
return;
}
else {
msg_err_main ("data corruption warning: terminating "
"special worker %s(%P) with SIGKILL",
g_quark_to_string (w->type), w->pid);
}
}
}
}
static void
hash_worker_wait_callback (gpointer key, gpointer value, gpointer unused)
{
rspamd_worker_wait ((struct rspamd_worker *)value);
}
struct core_check_cbdata {
struct rspamd_config *cfg;
gsize total_count;
gsize total_size;
};
#ifdef HAVE_NFTW
static struct core_check_cbdata cores_cbdata;
static gint
rspamd_check_core_cb (const gchar *path, const struct stat *st,
gint flag, struct FTW *ft)
{
if (S_ISREG (st->st_mode)) {
cores_cbdata.total_count ++;
/* Use physical size instead of displayed one */
cores_cbdata.total_size += st->st_blocks * 512;
}
return 0;
}
#endif
static void
rspamd_check_core_limits (struct rspamd_main *rspamd_main)
{
#ifdef HAVE_NFTW
struct rspamd_config *cfg = rspamd_main->cfg;
cores_cbdata.cfg = cfg;
cores_cbdata.total_count = 0;
cores_cbdata.total_size = 0;
if (cfg->cores_dir && (cfg->max_cores_count || cfg->max_cores_size)) {
if (nftw (cfg->cores_dir, rspamd_check_core_cb, 1, FTW_MOUNT|FTW_PHYS)
== -1) {
msg_err_main ("nftw failed for path %s: %s", cfg->cores_dir,
strerror (errno));
}
else {
if (!rspamd_main->cores_throttling) {
if (cfg->max_cores_size &&
cores_cbdata.total_size > cfg->max_cores_size) {
msg_warn_main (
"enable cores throttling as size of cores in"
" %s is %Hz, limit is %Hz",
cfg->cores_dir,
cores_cbdata.total_size,
cfg->max_cores_size);
rspamd_main->cores_throttling = TRUE;
}
if (cfg->max_cores_count &&
cores_cbdata.total_count > cfg->max_cores_count) {
msg_warn_main (
"enable cores throttling as count of cores in"
" %s is %z, limit is %z",
cfg->cores_dir,
cores_cbdata.total_count,
cfg->max_cores_count);
rspamd_main->cores_throttling = TRUE;
}
}
else {
if (cfg->max_cores_size &&
cores_cbdata.total_size < cfg->max_cores_size) {
msg_info_main (
"disable cores throttling as size of cores in"
" %s is now %Hz, limit is %Hz",
cfg->cores_dir,
cores_cbdata.total_size,
cfg->max_cores_size);
rspamd_main->cores_throttling = FALSE;
}
if (cfg->max_cores_count &&
cores_cbdata.total_count < cfg->max_cores_count) {
msg_info_main (
"disable cores throttling as count of cores in"
" %s is %z, limit is %z",
cfg->cores_dir,
cores_cbdata.total_count,
cfg->max_cores_count);
rspamd_main->cores_throttling = FALSE;
}
}
}
}
#endif
}
static void
reopen_log_handler (gpointer key, gpointer value, gpointer unused)
{
struct rspamd_worker *w = value;
struct rspamd_main *rspamd_main;
rspamd_main = w->srv;
if (kill (w->pid, SIGUSR1) == -1) {
msg_err_main ("kill failed for pid %P: %s", w->pid, strerror (errno));
}
}
static gboolean
load_rspamd_config (struct rspamd_main *rspamd_main,
struct rspamd_config *cfg, gboolean init_modules,
enum rspamd_post_load_options opts,
gboolean reload)
{
cfg->compiled_modules = modules;
cfg->compiled_workers = workers;
if (!rspamd_config_read (cfg, cfg->cfg_name, config_logger, rspamd_main,
ucl_vars, skip_template, lua_env)) {
return FALSE;
}
/* Strictly set temp dir */
if (!cfg->temp_dir) {
msg_warn_main ("tempdir is not set, trying to use $TMPDIR");
cfg->temp_dir =
rspamd_mempool_strdup (cfg->cfg_pool, getenv ("TMPDIR"));
if (!cfg->temp_dir) {
msg_warn_main ("$TMPDIR is empty too, using /tmp as default");
cfg->temp_dir = rspamd_mempool_strdup (cfg->cfg_pool, "/tmp");
}
}
if (!reload) {
/*
* As some rules are defined in lua, we need to process them, then init
* modules and merely afterwards to init modules
*/
rspamd_lua_post_load_config (cfg);
if (init_modules) {
if (!rspamd_init_filters (cfg, reload, false)) {
return FALSE;
}
}
/* Do post-load actions */
if (!rspamd_config_post_load (cfg, opts)) {
return FALSE;
}
}
return TRUE;
}
static void
rspamd_detach_worker (struct rspamd_main *rspamd_main, struct rspamd_worker *wrk)
{
ev_io_stop (rspamd_main->event_loop, &wrk->srv_ev);
ev_timer_stop (rspamd_main->event_loop, &wrk->hb.heartbeat_ev);
}
static void
rspamd_attach_worker (struct rspamd_main *rspamd_main, struct rspamd_worker *wrk)
{
ev_io_start (rspamd_main->event_loop, &wrk->srv_ev);
ev_timer_start (rspamd_main->event_loop, &wrk->hb.heartbeat_ev);
}
static void
stop_srv_ev (gpointer key, gpointer value, gpointer ud)
{
struct rspamd_worker *cur = (struct rspamd_worker *)value;
struct rspamd_main *rspamd_main = (struct rspamd_main *)ud;
rspamd_detach_worker (rspamd_main, cur);
}
static void
start_srv_ev (gpointer key, gpointer value, gpointer ud)
{
struct rspamd_worker *cur = (struct rspamd_worker *)value;
struct rspamd_main *rspamd_main = (struct rspamd_main *)ud;
rspamd_attach_worker (rspamd_main, cur);
}
static void
rspamd_final_timer_handler (EV_P_ ev_timer *w, int revents)
{
struct rspamd_main *rspamd_main = (struct rspamd_main *)w->data;
term_attempts--;
g_hash_table_foreach (rspamd_main->workers, hash_worker_wait_callback,
NULL);
if (g_hash_table_size (rspamd_main->workers) == 0) {
ev_break (rspamd_main->event_loop, EVBREAK_ALL);
}
}
/* Signal handlers */
static void
rspamd_term_handler (struct ev_loop *loop, ev_signal *w, int revents)
{
struct rspamd_main *rspamd_main = (struct rspamd_main *)w->data;
static ev_timer ev_finale;
ev_tstamp shutdown_ts;
if (!rspamd_main->wanna_die) {
rspamd_main->wanna_die = TRUE;
shutdown_ts = MAX (SOFT_SHUTDOWN_TIME,
rspamd_main->cfg->task_timeout * 2.0);
msg_info_main ("catch termination signal, waiting for %d children for %.2f seconds",
(gint)g_hash_table_size (rspamd_main->workers),
valgrind_mode ? shutdown_ts * 10 : shutdown_ts);
/* Stop srv events to avoid false notifications */
g_hash_table_foreach (rspamd_main->workers, stop_srv_ev, rspamd_main);
rspamd_pass_signal (rspamd_main->workers, SIGTERM);
if (control_fd != -1) {
ev_io_stop (rspamd_main->event_loop, &control_ev);
close (control_fd);
}
if (valgrind_mode) {
/* Special case if we are likely running with valgrind */
term_attempts = shutdown_ts / TERMINATION_INTERVAL * 10;
}
else {
term_attempts = shutdown_ts / TERMINATION_INTERVAL;
}
ev_finale.data = rspamd_main;
ev_timer_init (&ev_finale, rspamd_final_timer_handler,
TERMINATION_INTERVAL, TERMINATION_INTERVAL);
ev_timer_start (rspamd_main->event_loop, &ev_finale);
}
}
static void
rspamd_usr1_handler (struct ev_loop *loop, ev_signal *w, int revents)
{
struct rspamd_main *rspamd_main = (struct rspamd_main *)w->data;
if (!rspamd_main->wanna_die) {
rspamd_log_reopen (rspamd_main->logger,
rspamd_main->cfg,
rspamd_main->workers_uid,
rspamd_main->workers_gid);
msg_info_main ("logging reinitialised");
g_hash_table_foreach (rspamd_main->workers, reopen_log_handler,
NULL);
}
}
static void
rspamd_stat_update_handler (struct ev_loop *loop, ev_timer *w, int revents)
{
struct rspamd_main *rspamd_main = (struct rspamd_main *)w->data;
struct rspamd_stat cur_stat;
gchar proctitle[128];
memcpy (&cur_stat, rspamd_main->stat, sizeof (cur_stat));
if (old_stat.messages_scanned > 0 &&
cur_stat.messages_scanned > old_stat.messages_scanned) {
gdouble rate = (double)(cur_stat.messages_scanned - old_stat.messages_scanned) /
w->repeat;
gdouble old_spam = old_stat.actions_stat[METRIC_ACTION_REJECT] +
old_stat.actions_stat[METRIC_ACTION_ADD_HEADER] +
old_stat.actions_stat[METRIC_ACTION_REWRITE_SUBJECT];
gdouble old_ham = old_stat.actions_stat[METRIC_ACTION_NOACTION];
gdouble new_spam = cur_stat.actions_stat[METRIC_ACTION_REJECT] +
cur_stat.actions_stat[METRIC_ACTION_ADD_HEADER] +
cur_stat.actions_stat[METRIC_ACTION_REWRITE_SUBJECT];
gdouble new_ham = cur_stat.actions_stat[METRIC_ACTION_NOACTION];
rspamd_snprintf (proctitle, sizeof (proctitle),
"main process; %.1f msg/sec, %.1f msg/sec spam, %.1f msg/sec ham",
rate,
(new_spam - old_spam) / w->repeat,
(new_ham - old_ham) / w->repeat);
setproctitle (proctitle);
}
memcpy (&old_stat, &cur_stat, sizeof (cur_stat));
}
static void
rspamd_hup_handler (struct ev_loop *loop, ev_signal *w, int revents)
{
struct rspamd_main *rspamd_main = (struct rspamd_main *)w->data;
if (!rspamd_main->wanna_die) {
msg_info_main ("rspamd "
RVERSION
" is requested to reload configuration");
/* Detach existing workers and stop their heartbeats */
g_hash_table_foreach (rspamd_main->workers, stop_srv_ev, rspamd_main);
if (reread_config (rspamd_main)) {
rspamd_check_core_limits (rspamd_main);
/* Mark old workers */
g_hash_table_foreach (rspamd_main->workers, mark_old_workers, NULL);
msg_info_main ("spawn workers with a new config");
spawn_workers (rspamd_main, rspamd_main->event_loop);
msg_info_main ("workers spawning has been finished");
/* Kill marked */
msg_info_main ("kill old workers");
g_hash_table_foreach (rspamd_main->workers, kill_old_workers, NULL);
}
else {
/* Reattach old workers */
msg_info_main ("restore old workers with a old config");
g_hash_table_foreach (rspamd_main->workers, start_srv_ev, rspamd_main);
}
}
}
/* Called when a dead child has been found */
static void
rspamd_cld_handler (EV_P_ ev_child *w, struct rspamd_main *rspamd_main,
struct rspamd_worker *wrk)
{
gboolean need_refork;
static struct rspamd_control_command cmd;
/* Turn off locking for logger */
ev_child_stop (EV_A_ w);
/* Remove dead child form children list */
g_hash_table_remove (rspamd_main->workers, GSIZE_TO_POINTER (wrk->pid));
g_hash_table_remove_all (wrk->control_events_pending);
if (wrk->srv_pipe[0] != -1) {
/* Ugly workaround */
if (wrk->tmp_data) {
g_free (wrk->tmp_data);
}
rspamd_detach_worker (rspamd_main, wrk);
}
if (wrk->control_pipe[0] != -1) {
/* We also need to clean descriptors left */
close (wrk->control_pipe[0]);
close (wrk->srv_pipe[0]);
}
if (!rspamd_main->wanna_die) {
cmd.type = RSPAMD_CONTROL_CHILD_CHANGE;
cmd.cmd.child_change.what = rspamd_child_terminated;
cmd.cmd.child_change.pid = wrk->pid;
cmd.cmd.child_change.additional = w->rstatus;
rspamd_control_broadcast_srv_cmd (rspamd_main, &cmd, wrk->pid);
}
need_refork = rspamd_check_termination_clause (wrk->srv, wrk, w->rstatus);
if (need_refork) {
/* Fork another worker in replace of dead one */
msg_info_main ("respawn process %s in lieu of terminated process with pid %P",
g_quark_to_string (wrk->type),
wrk->pid);
rspamd_check_core_limits (rspamd_main);
rspamd_fork_delayed (wrk->cf, wrk->index, rspamd_main);
}
else {
msg_info_main ("do not respawn process %s after found terminated process with pid %P",
g_quark_to_string (wrk->type),
wrk->pid);
}
REF_RELEASE (wrk->cf);
g_hash_table_unref (wrk->control_events_pending);
g_free (wrk);
}
/* Control socket handler */
static void
rspamd_control_handler (EV_P_ ev_io *w, int revents)
{
struct rspamd_main *rspamd_main = (struct rspamd_main *)w->data;
rspamd_inet_addr_t *addr;
gint nfd;
if ((nfd =
rspamd_accept_from_socket (w->fd, &addr, NULL, NULL)) == -1) {
msg_warn_main ("accept failed: %s", strerror (errno));
return;
}
/* Check for EAGAIN */
if (nfd == 0) {
return;
}
msg_info_main ("accepted control connection from %s",
rspamd_inet_address_to_string (addr));
rspamd_control_process_client_socket (rspamd_main, nfd, addr);
}
static guint
rspamd_spair_hash (gconstpointer p)
{
return rspamd_cryptobox_fast_hash (p, PAIR_ID_LEN, rspamd_hash_seed ());
}
static gboolean
rspamd_spair_equal (gconstpointer a, gconstpointer b)
{
return memcmp (a, b, PAIR_ID_LEN) == 0;
}
static void
rspamd_spair_close (gpointer p)
{
gint *fds = p;
close (fds[0]);
close (fds[1]);
g_free (p);
}
static void
version (void)
{
#if defined(GIT_VERSION) && GIT_VERSION == 1
rspamd_printf ("Rspamd daemon version " RVERSION "-git." RID "\n");
#else
rspamd_printf ("Rspamd daemon version " RVERSION "\n");
#endif
}
static gboolean
rspamd_main_daemon (struct rspamd_main *rspamd_main)
{
int fd;
pid_t old_pid = getpid ();
switch (fork ()) {
case -1:
msg_err_main ("fork() failed: %s", strerror (errno));
return FALSE;
case 0:
break;
default:
/* Old process */
exit (0);
}
rspamd_log_on_fork (g_quark_from_static_string ("main"),
rspamd_main->cfg,
rspamd_main->logger);
if (setsid () == -1) {
msg_err_main ("setsid () failed: %s", strerror (errno));
return FALSE;
}
umask (0);
fd = open ("/dev/null", O_RDWR);
if (fd == -1) {
msg_err_main ("open(\"/dev/null\") failed: %s", strerror (errno));
return FALSE;
}
if (dup2 (fd, STDIN_FILENO) == -1) {
msg_err_main ("dup2(STDIN) failed: %s", strerror (errno));
return FALSE;
}
if (dup2 (fd, STDOUT_FILENO) == -1) {
msg_err_main ("dup2(STDOUT) failed: %s", strerror (errno));
return FALSE;
}
if (fd > STDERR_FILENO) {
if (close(fd) == -1) {
msg_err_main ("close() failed: %s", strerror (errno));
return FALSE;
}
}
msg_info_main ("daemonized successfully; old pid %P, new pid %P; pid file: %s",
old_pid, getpid (),
rspamd_main->cfg->pid_file);
return TRUE;
}
gint
main (gint argc, gchar **argv, gchar **env)
{
gint i, res = 0;
struct sigaction signals, sigpipe_act;
worker_t **pworker;
GQuark type;
rspamd_inet_addr_t *control_addr = NULL;
struct ev_loop *event_loop;
struct rspamd_main *rspamd_main;
gboolean skip_pid = FALSE;
sigset_t control_signals;
/* Block special signals on loading */
sigemptyset (&control_signals);
sigaddset (&control_signals, SIGHUP);
sigaddset (&control_signals, SIGUSR1);
sigaddset (&control_signals, SIGUSR2);
sigprocmask (SIG_BLOCK, &control_signals, NULL);
rspamd_main = (struct rspamd_main *) g_malloc0 (sizeof (struct rspamd_main));
rspamd_main->server_pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
"main", 0);
rspamd_main->stat = rspamd_mempool_alloc0_shared (rspamd_main->server_pool,
sizeof (struct rspamd_stat));
rspamd_main->cfg = rspamd_config_new (RSPAMD_CONFIG_INIT_DEFAULT);
rspamd_main->spairs = g_hash_table_new_full (rspamd_spair_hash,
rspamd_spair_equal, g_free, rspamd_spair_close);
rspamd_main->start_mtx = rspamd_mempool_get_mutex (rspamd_main->server_pool);
if (getenv ("VALGRIND") != NULL) {
valgrind_mode = TRUE;
}
#ifndef HAVE_SETPROCTITLE
init_title (rspamd_main->server_pool, argc, argv, env);
#endif
rspamd_main->cfg->libs_ctx = rspamd_init_libs ();
memset (&signals, 0, sizeof (struct sigaction));
read_cmd_line (&argc, &argv, rspamd_main->cfg);
if (show_version) {
version ();
exit (EXIT_SUCCESS);
}
if (argc > 0) {
/* Parse variables */
for (i = 0; i < argc; i++) {
if (strchr (argv[i], '=') != NULL) {
gchar *k, *v, *t;
k = g_strdup (argv[i]);
t = strchr (k, '=');
v = g_strdup (t + 1);
*t = '\0';
if (ucl_vars == NULL) {
ucl_vars = g_hash_table_new_full (rspamd_strcase_hash,
rspamd_strcase_equal, g_free, g_free);
}
g_hash_table_insert (ucl_vars, k, v);
}
}
}
if (is_debug) {
rspamd_main->cfg->log_level = G_LOG_LEVEL_DEBUG;
}
else {
rspamd_main->cfg->log_level = G_LOG_LEVEL_MESSAGE;
}
type = g_quark_from_static_string ("main");
/* First set logger to console logger */
rspamd_main->logger = rspamd_log_open_emergency (rspamd_main->server_pool, 0);
g_assert (rspamd_main->logger != NULL);
if (is_debug) {
rspamd_log_set_log_level (rspamd_main->logger, G_LOG_LEVEL_DEBUG);
}
else {
rspamd_log_set_log_level (rspamd_main->logger, G_LOG_LEVEL_MESSAGE);
}
g_log_set_default_handler (rspamd_glib_log_function, rspamd_main->logger);
g_set_printerr_handler (rspamd_glib_printerr_function);
detect_priv (rspamd_main);
msg_notice_main ("rspamd "
RVERSION
" is loading configuration, build id: "
RID);
pworker = &workers[0];
while (*pworker) {
/* Init string quarks */
(void) g_quark_from_static_string ((*pworker)->name);
pworker++;
}
/* Init listen sockets hash */
listen_sockets = g_hash_table_new (g_direct_hash, g_direct_equal);
sqlite3_initialize ();
/* Load config */
if (!load_rspamd_config (rspamd_main, rspamd_main->cfg, TRUE,
RSPAMD_CONFIG_LOAD_ALL, FALSE)) {
exit (EXIT_FAILURE);
}
/* Override pidfile from configuration by command line argument */
if (rspamd_pidfile != NULL) {
rspamd_main->cfg->pid_file = rspamd_pidfile;
}
/* Force debug log */
if (is_debug) {
rspamd_log_set_log_level (rspamd_main->logger, G_LOG_LEVEL_DEBUG);
}
/* Create rolling history */
rspamd_main->history = rspamd_roll_history_new (rspamd_main->server_pool,
rspamd_main->cfg->history_rows, rspamd_main->cfg);
msg_info_main ("rspamd "
RVERSION
" is starting, build id: "
RID);
rspamd_main->cfg->cfg_name = rspamd_mempool_strdup (
rspamd_main->cfg->cfg_pool,
rspamd_main->cfg->cfg_name);
msg_info_main ("cpu features: %s",
rspamd_main->cfg->libs_ctx->crypto_ctx->cpu_extensions);
msg_info_main ("cryptobox configuration: curve25519(libsodium), "
"chacha20(%s), poly1305(libsodium), siphash(libsodium), blake2(libsodium), base64(%s)",
rspamd_main->cfg->libs_ctx->crypto_ctx->chacha20_impl,
rspamd_main->cfg->libs_ctx->crypto_ctx->base64_impl);
msg_info_main ("libottery prf: %s", ottery_get_impl_name ());
/* Daemonize */
if (!no_fork) {
if (!rspamd_main_daemon (rspamd_main)) {
exit (EXIT_FAILURE);
}
/* Close emergency logger */
rspamd_log_close (rspamd_log_emergency_logger ());
}
/* Write info */
rspamd_main->pid = getpid ();
rspamd_main->type = type;
if (!valgrind_mode) {
rspamd_set_crash_handler (rspamd_main);
}
/* Ignore SIGPIPE as we handle write errors manually */
sigemptyset (&sigpipe_act.sa_mask);
sigaddset (&sigpipe_act.sa_mask, SIGPIPE);
sigpipe_act.sa_handler = SIG_IGN;
sigpipe_act.sa_flags = 0;
sigaction (SIGPIPE, &sigpipe_act, NULL);
if (rspamd_main->cfg->pid_file == NULL) {
msg_info_main ("pid file is not specified, skipping writing it");
skip_pid = TRUE;
}
else if (no_fork) {
msg_info_main ("skip writing pid in no-fork mode");
skip_pid = TRUE;
}
else if (rspamd_write_pid (rspamd_main) == -1) {
msg_err_main ("cannot write pid file %s", rspamd_main->cfg->pid_file);
exit (-errno);
}
sigprocmask (SIG_BLOCK, &signals.sa_mask, NULL);
/* Set title */
setproctitle ("main process");
/* Open control socket if needed */
control_fd = -1;
if (rspamd_main->cfg->control_socket_path) {
if (!rspamd_parse_inet_address (&control_addr,
rspamd_main->cfg->control_socket_path,
strlen (rspamd_main->cfg->control_socket_path),
RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
msg_err_main ("cannot parse inet address %s",
rspamd_main->cfg->control_socket_path);
}
else {
control_fd = rspamd_inet_address_listen (control_addr, SOCK_STREAM,
RSPAMD_INET_ADDRESS_LISTEN_ASYNC, -1);
if (control_fd == -1) {
msg_err_main ("cannot open control socket at path: %s",
rspamd_main->cfg->control_socket_path);
}
}
}
/* Maybe read roll history */
if (rspamd_main->cfg->history_file) {
rspamd_roll_history_load (rspamd_main->history,
rspamd_main->cfg->history_file);
}
/* Init workers hash */
rspamd_main->workers = g_hash_table_new (g_direct_hash, g_direct_equal);
/* Unblock control signals */
sigprocmask (SIG_UNBLOCK, &control_signals, NULL);
/* Init event base */
event_loop = ev_default_loop (rspamd_config_ev_backend_get (rspamd_main->cfg));
rspamd_main->event_loop = event_loop;
if (event_loop) {
int loop_type = ev_backend (event_loop);
gboolean effective_backend;
const gchar *loop_str;
loop_str =
rspamd_config_ev_backend_to_string (loop_type, &effective_backend);
if (!effective_backend) {
msg_warn_main ("event loop uses non-optimal backend: %s", loop_str);
}
else {
msg_info_main ("event loop initialised with backend: %s", loop_str);
}
}
else {
msg_err ("cannot init event loop! exiting");
exit (EXIT_FAILURE);
}
/* Unblock signals */
sigemptyset (&signals.sa_mask);
sigprocmask (SIG_SETMASK, &signals.sa_mask, NULL);
/* Set events for signals */
ev_signal_init (&rspamd_main->term_ev, rspamd_term_handler, SIGTERM);
rspamd_main->term_ev.data = rspamd_main;
ev_signal_start (event_loop, &rspamd_main->term_ev);
ev_signal_init (&rspamd_main->int_ev, rspamd_term_handler, SIGINT);
rspamd_main->int_ev.data = rspamd_main;
ev_signal_start (event_loop, &rspamd_main->int_ev);
ev_signal_init (&rspamd_main->hup_ev, rspamd_hup_handler, SIGHUP);
rspamd_main->hup_ev.data = rspamd_main;
ev_signal_start (event_loop, &rspamd_main->hup_ev);
ev_signal_init (&rspamd_main->usr1_ev, rspamd_usr1_handler, SIGUSR1);
rspamd_main->usr1_ev.data = rspamd_main;
ev_signal_start (event_loop, &rspamd_main->usr1_ev);
/* Update proctitle according to number of messages processed */
static const ev_tstamp stat_update_time = 10.0;
memset (&old_stat, 0, sizeof (old_stat));
stat_ev.data = rspamd_main;
ev_timer_init (&stat_ev, rspamd_stat_update_handler,
stat_update_time, stat_update_time);
ev_timer_start (event_loop, &stat_ev);
rspamd_check_core_limits (rspamd_main);
rspamd_mempool_lock_mutex (rspamd_main->start_mtx);
spawn_workers (rspamd_main, event_loop);
rspamd_mempool_unlock_mutex (rspamd_main->start_mtx);
rspamd_main->http_ctx = rspamd_http_context_create (rspamd_main->cfg,
event_loop, rspamd_main->cfg->ups_ctx);
if (control_fd != -1) {
msg_info_main ("listening for control commands on %s",
rspamd_inet_address_to_string (control_addr));
ev_io_init (&control_ev, rspamd_control_handler, control_fd, EV_READ);
control_ev.data = rspamd_main;
ev_io_start (event_loop, &control_ev);
}
ev_loop (event_loop, 0);
/* Maybe save roll history */
if (rspamd_main->cfg->history_file) {
rspamd_roll_history_save (rspamd_main->history,
rspamd_main->cfg->history_file);
}
if (rspamd_main->cfg->cache) {
rspamd_symcache_save(rspamd_main->cfg->cache);
}
msg_info_main ("terminating...");
REF_RELEASE (rspamd_main->cfg);
rspamd_log_close (rspamd_main->logger);
g_hash_table_unref (rspamd_main->spairs);
g_hash_table_unref (rspamd_main->workers);
rspamd_mempool_delete (rspamd_main->server_pool);
if (!skip_pid) {
rspamd_pidfile_close (rspamd_main->pfh);
}
g_free (rspamd_main);
ev_unref (event_loop);
sqlite3_shutdown ();
if (control_addr) {
rspamd_inet_address_free (control_addr);
}
return (res);
}