You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

task.c 46KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979
  1. /*
  2. * Copyright 2024 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "task.h"
  17. #include "rspamd.h"
  18. #include "scan_result.h"
  19. #include "libserver/protocol.h"
  20. #include "libserver/protocol_internal.h"
  21. #include "message.h"
  22. #include "lua/lua_common.h"
  23. #include "email_addr.h"
  24. #include "src/libserver/composites/composites.h"
  25. #include "stat_api.h"
  26. #include "unix-std.h"
  27. #include "utlist.h"
  28. #include "libserver/mempool_vars_internal.h"
  29. #include "libserver/cfg_file_private.h"
  30. #include "libmime/lang_detection.h"
  31. #include "libmime/scan_result_private.h"
  32. #include "lua/lua_classnames.h"
  33. #ifdef WITH_JEMALLOC
  34. #include <jemalloc/jemalloc.h>
  35. #else
  36. #if defined(__GLIBC__) && defined(_GNU_SOURCE)
  37. #include <malloc.h>
  38. #endif
  39. #endif
  40. #include <math.h>
  41. #ifdef SYS_ZSTD
  42. #include "zstd.h"
  43. #else
  44. #include "contrib/zstd/zstd.h"
  45. #endif
  46. __KHASH_IMPL(rspamd_req_headers_hash, static inline,
  47. rspamd_ftok_t *, struct rspamd_request_header_chain *, 1,
  48. rspamd_ftok_icase_hash, rspamd_ftok_icase_equal)
  49. static GQuark
  50. rspamd_task_quark(void)
  51. {
  52. return g_quark_from_static_string("task-error");
  53. }
  54. /*
  55. * Create new task
  56. */
  57. struct rspamd_task *
  58. rspamd_task_new(struct rspamd_worker *worker,
  59. struct rspamd_config *cfg,
  60. rspamd_mempool_t *pool,
  61. struct rspamd_lang_detector *lang_det,
  62. struct ev_loop *event_loop,
  63. gboolean debug_mem)
  64. {
  65. struct rspamd_task *new_task;
  66. rspamd_mempool_t *task_pool;
  67. unsigned int flags = 0;
  68. if (pool == NULL) {
  69. task_pool = rspamd_mempool_new(rspamd_mempool_suggest_size(),
  70. "task", debug_mem ? RSPAMD_MEMPOOL_DEBUG : 0);
  71. flags |= RSPAMD_TASK_FLAG_OWN_POOL;
  72. }
  73. else {
  74. task_pool = pool;
  75. }
  76. new_task = rspamd_mempool_alloc0(task_pool, sizeof(struct rspamd_task));
  77. new_task->task_pool = task_pool;
  78. new_task->flags = flags;
  79. new_task->worker = worker;
  80. new_task->lang_det = lang_det;
  81. if (cfg) {
  82. new_task->cfg = cfg;
  83. REF_RETAIN(cfg);
  84. if (cfg->check_all_filters) {
  85. new_task->flags |= RSPAMD_TASK_FLAG_PASS_ALL;
  86. }
  87. if (cfg->re_cache) {
  88. new_task->re_rt = rspamd_re_cache_runtime_new(cfg->re_cache);
  89. }
  90. if (new_task->lang_det == NULL && cfg->lang_det != NULL) {
  91. new_task->lang_det = cfg->lang_det;
  92. }
  93. }
  94. new_task->event_loop = event_loop;
  95. new_task->task_timestamp = ev_time();
  96. new_task->time_real_finish = NAN;
  97. new_task->request_headers = kh_init(rspamd_req_headers_hash);
  98. new_task->sock = -1;
  99. new_task->flags |= (RSPAMD_TASK_FLAG_MIME);
  100. /* Default results chain */
  101. rspamd_create_metric_result(new_task, NULL, -1);
  102. new_task->queue_id = "undef";
  103. new_task->messages = ucl_object_typed_new(UCL_OBJECT);
  104. kh_static_init(rspamd_task_lua_cache, &new_task->lua_cache);
  105. return new_task;
  106. }
  107. static void
  108. rspamd_task_reply(struct rspamd_task *task)
  109. {
  110. const ev_tstamp write_timeout = 5.0;
  111. if (task->fin_callback) {
  112. task->fin_callback(task, task->fin_arg);
  113. }
  114. else {
  115. if (!(task->processed_stages & RSPAMD_TASK_STAGE_REPLIED)) {
  116. rspamd_protocol_write_reply(task, write_timeout);
  117. }
  118. }
  119. }
  120. /*
  121. * Called if all filters are processed
  122. * @return TRUE if session should be terminated
  123. */
  124. gboolean
  125. rspamd_task_fin(void *arg)
  126. {
  127. struct rspamd_task *task = (struct rspamd_task *) arg;
  128. /* Task is already finished or skipped */
  129. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  130. rspamd_task_reply(task);
  131. return TRUE;
  132. }
  133. if (!rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL)) {
  134. rspamd_task_reply(task);
  135. return TRUE;
  136. }
  137. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  138. rspamd_task_reply(task);
  139. return TRUE;
  140. }
  141. /* One more iteration */
  142. return FALSE;
  143. }
  144. /*
  145. * Free all structures of worker_task
  146. */
  147. void rspamd_task_free(struct rspamd_task *task)
  148. {
  149. struct rspamd_email_address *addr;
  150. static unsigned int free_iters = 0;
  151. unsigned int i;
  152. if (task) {
  153. debug_task("free pointer %p", task);
  154. if (task->rcpt_envelope) {
  155. for (i = 0; i < task->rcpt_envelope->len; i++) {
  156. addr = g_ptr_array_index(task->rcpt_envelope, i);
  157. rspamd_email_address_free(addr);
  158. }
  159. g_ptr_array_free(task->rcpt_envelope, TRUE);
  160. }
  161. if (task->from_envelope) {
  162. rspamd_email_address_free(task->from_envelope);
  163. }
  164. if (task->from_envelope_orig) {
  165. rspamd_email_address_free(task->from_envelope_orig);
  166. }
  167. if (task->meta_words) {
  168. g_array_free(task->meta_words, TRUE);
  169. }
  170. ucl_object_unref(task->messages);
  171. if (task->re_rt) {
  172. rspamd_re_cache_runtime_destroy(task->re_rt);
  173. }
  174. if (task->http_conn != NULL) {
  175. rspamd_http_connection_reset(task->http_conn);
  176. rspamd_http_connection_unref(task->http_conn);
  177. }
  178. if (task->settings != NULL) {
  179. ucl_object_unref(task->settings);
  180. }
  181. if (task->settings_elt != NULL) {
  182. REF_RELEASE(task->settings_elt);
  183. }
  184. if (task->client_addr) {
  185. rspamd_inet_address_free(task->client_addr);
  186. }
  187. if (task->from_addr) {
  188. rspamd_inet_address_free(task->from_addr);
  189. }
  190. if (task->err) {
  191. g_error_free(task->err);
  192. }
  193. ev_timer_stop(task->event_loop, &task->timeout_ev);
  194. ev_io_stop(task->event_loop, &task->guard_ev);
  195. if (task->sock != -1) {
  196. close(task->sock);
  197. }
  198. if (task->cfg) {
  199. struct rspamd_lua_cached_entry entry;
  200. kh_foreach_value(&task->lua_cache, entry, {
  201. luaL_unref(task->cfg->lua_state,
  202. LUA_REGISTRYINDEX, entry.ref);
  203. });
  204. kh_static_destroy(rspamd_task_lua_cache, &task->lua_cache);
  205. if (task->cfg->full_gc_iters && (++free_iters > task->cfg->full_gc_iters)) {
  206. /* Perform more expensive cleanup cycle */
  207. gsize allocated = 0, active = 0, metadata = 0,
  208. resident = 0, mapped = 0, old_lua_mem = 0;
  209. double t1, t2;
  210. old_lua_mem = lua_gc(task->cfg->lua_state, LUA_GCCOUNT, 0);
  211. t1 = rspamd_get_ticks(FALSE);
  212. #ifdef WITH_JEMALLOC
  213. gsize sz = sizeof(gsize);
  214. mallctl("stats.allocated", &allocated, &sz, NULL, 0);
  215. mallctl("stats.active", &active, &sz, NULL, 0);
  216. mallctl("stats.metadata", &metadata, &sz, NULL, 0);
  217. mallctl("stats.resident", &resident, &sz, NULL, 0);
  218. mallctl("stats.mapped", &mapped, &sz, NULL, 0);
  219. #else
  220. #if defined(__GLIBC__) && defined(_GNU_SOURCE)
  221. malloc_trim(0);
  222. #endif
  223. #endif
  224. lua_gc(task->cfg->lua_state, LUA_GCCOLLECT, 0);
  225. t2 = rspamd_get_ticks(FALSE);
  226. msg_notice_task("perform full gc cycle; memory stats: "
  227. "%Hz allocated, %Hz active, %Hz metadata, %Hz resident, %Hz mapped;"
  228. " lua memory: %z kb -> %d kb; %f ms for gc iter",
  229. allocated, active, metadata, resident, mapped,
  230. old_lua_mem, lua_gc(task->cfg->lua_state, LUA_GCCOUNT, 0),
  231. (t2 - t1) * 1000.0);
  232. free_iters = rspamd_time_jitter(0,
  233. (double) task->cfg->full_gc_iters / 2);
  234. }
  235. REF_RELEASE(task->cfg);
  236. }
  237. kh_destroy(rspamd_req_headers_hash, task->request_headers);
  238. rspamd_message_unref(task->message);
  239. if (task->flags & RSPAMD_TASK_FLAG_OWN_POOL) {
  240. rspamd_mempool_destructors_enforce(task->task_pool);
  241. if (task->symcache_runtime) {
  242. rspamd_symcache_runtime_destroy(task);
  243. }
  244. rspamd_mempool_delete(task->task_pool);
  245. }
  246. else if (task->symcache_runtime) {
  247. rspamd_symcache_runtime_destroy(task);
  248. }
  249. }
  250. }
  251. struct rspamd_task_map {
  252. gpointer begin;
  253. gulong len;
  254. int fd;
  255. };
  256. static void
  257. rspamd_task_unmapper(gpointer ud)
  258. {
  259. struct rspamd_task_map *m = ud;
  260. munmap(m->begin, m->len);
  261. close(m->fd);
  262. }
  263. gboolean
  264. rspamd_task_load_message(struct rspamd_task *task,
  265. struct rspamd_http_message *msg, const char *start, gsize len)
  266. {
  267. unsigned int control_len, r;
  268. struct ucl_parser *parser;
  269. ucl_object_t *control_obj;
  270. char filepath[PATH_MAX], *fp;
  271. int fd, flen;
  272. gulong offset = 0, shmem_size = 0;
  273. rspamd_ftok_t *tok;
  274. gpointer map;
  275. struct stat st;
  276. struct rspamd_task_map *m;
  277. const char *ft;
  278. #ifdef HAVE_SANE_SHMEM
  279. ft = "shm";
  280. #else
  281. ft = "file";
  282. #endif
  283. if (msg) {
  284. rspamd_protocol_handle_headers(task, msg);
  285. }
  286. tok = rspamd_task_get_request_header(task, "shm");
  287. if (tok) {
  288. /* Shared memory part */
  289. r = rspamd_strlcpy(filepath, tok->begin,
  290. MIN(sizeof(filepath), tok->len + 1));
  291. rspamd_url_decode(filepath, filepath, r + 1);
  292. flen = strlen(filepath);
  293. if (filepath[0] == '"' && flen > 2) {
  294. /* We need to unquote filepath */
  295. fp = &filepath[1];
  296. fp[flen - 2] = '\0';
  297. }
  298. else {
  299. fp = &filepath[0];
  300. }
  301. #ifdef HAVE_SANE_SHMEM
  302. fd = shm_open(fp, O_RDONLY, 00600);
  303. #else
  304. fd = open(fp, O_RDONLY, 00600);
  305. #endif
  306. if (fd == -1) {
  307. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  308. "Cannot open %s segment (%s): %s", ft, fp, strerror(errno));
  309. return FALSE;
  310. }
  311. if (fstat(fd, &st) == -1) {
  312. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  313. "Cannot stat %s segment (%s): %s", ft, fp, strerror(errno));
  314. close(fd);
  315. return FALSE;
  316. }
  317. map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  318. if (map == MAP_FAILED) {
  319. close(fd);
  320. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  321. "Cannot mmap %s (%s): %s", ft, fp, strerror(errno));
  322. return FALSE;
  323. }
  324. tok = rspamd_task_get_request_header(task, "shm-offset");
  325. if (tok) {
  326. rspamd_strtoul(tok->begin, tok->len, &offset);
  327. if (offset > (gulong) st.st_size) {
  328. msg_err_task("invalid offset %ul (%ul available) for shm "
  329. "segment %s",
  330. offset, (gulong) st.st_size, fp);
  331. munmap(map, st.st_size);
  332. close(fd);
  333. return FALSE;
  334. }
  335. }
  336. tok = rspamd_task_get_request_header(task, "shm-length");
  337. shmem_size = st.st_size;
  338. if (tok) {
  339. rspamd_strtoul(tok->begin, tok->len, &shmem_size);
  340. if (shmem_size > (gulong) st.st_size) {
  341. msg_err_task("invalid length %ul (%ul available) for %s "
  342. "segment %s",
  343. shmem_size, (gulong) st.st_size, ft, fp);
  344. munmap(map, st.st_size);
  345. close(fd);
  346. return FALSE;
  347. }
  348. }
  349. task->msg.begin = ((unsigned char *) map) + offset;
  350. task->msg.len = shmem_size;
  351. m = rspamd_mempool_alloc(task->task_pool, sizeof(*m));
  352. m->begin = map;
  353. m->len = st.st_size;
  354. m->fd = fd;
  355. msg_info_task("loaded message from shared memory %s (%ul size, %ul offset), fd=%d",
  356. fp, shmem_size, offset, fd);
  357. rspamd_mempool_add_destructor(task->task_pool, rspamd_task_unmapper, m);
  358. }
  359. else {
  360. /* Try file */
  361. tok = rspamd_task_get_request_header(task, "file");
  362. if (tok == NULL) {
  363. tok = rspamd_task_get_request_header(task, "path");
  364. }
  365. if (tok) {
  366. debug_task("want to scan file %T", tok);
  367. r = rspamd_strlcpy(filepath, tok->begin,
  368. MIN(sizeof(filepath), tok->len + 1));
  369. rspamd_url_decode(filepath, filepath, r + 1);
  370. flen = strlen(filepath);
  371. if (filepath[0] == '"' && flen > 2) {
  372. /* We need to unquote filepath */
  373. fp = &filepath[1];
  374. fp[flen - 2] = '\0';
  375. }
  376. else {
  377. fp = &filepath[0];
  378. }
  379. if (stat(fp, &st) == -1) {
  380. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  381. "Invalid file (%s): %s", fp, strerror(errno));
  382. return FALSE;
  383. }
  384. if (G_UNLIKELY(st.st_size == 0)) {
  385. /* Empty file */
  386. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  387. task->msg.begin = rspamd_mempool_strdup(task->task_pool, "");
  388. task->msg.len = 0;
  389. }
  390. else {
  391. fd = open(fp, O_RDONLY);
  392. if (fd == -1) {
  393. g_set_error(&task->err, rspamd_task_quark(),
  394. RSPAMD_PROTOCOL_ERROR,
  395. "Cannot open file (%s): %s", fp, strerror(errno));
  396. return FALSE;
  397. }
  398. map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  399. if (map == MAP_FAILED) {
  400. close(fd);
  401. g_set_error(&task->err, rspamd_task_quark(),
  402. RSPAMD_PROTOCOL_ERROR,
  403. "Cannot mmap file (%s): %s", fp, strerror(errno));
  404. return FALSE;
  405. }
  406. task->msg.begin = map;
  407. task->msg.len = st.st_size;
  408. m = rspamd_mempool_alloc(task->task_pool, sizeof(*m));
  409. m->begin = map;
  410. m->len = st.st_size;
  411. m->fd = fd;
  412. rspamd_mempool_add_destructor(task->task_pool, rspamd_task_unmapper, m);
  413. }
  414. task->msg.fpath = rspamd_mempool_strdup(task->task_pool, fp);
  415. task->flags |= RSPAMD_TASK_FLAG_FILE;
  416. msg_info_task("loaded message from file %s", fp);
  417. }
  418. else {
  419. /* Plain data */
  420. task->msg.begin = start;
  421. task->msg.len = len;
  422. }
  423. }
  424. debug_task("got input of length %z", task->msg.len);
  425. /* Check compression */
  426. tok = rspamd_task_get_request_header(task, "compression");
  427. if (tok) {
  428. /* Need to uncompress */
  429. rspamd_ftok_t t;
  430. t.begin = "zstd";
  431. t.len = 4;
  432. if (rspamd_ftok_casecmp(tok, &t) == 0) {
  433. ZSTD_DStream *zstream;
  434. ZSTD_inBuffer zin;
  435. ZSTD_outBuffer zout;
  436. unsigned char *out;
  437. gsize outlen, r;
  438. gulong dict_id;
  439. if (!rspamd_libs_reset_decompression(task->cfg->libs_ctx)) {
  440. g_set_error(&task->err, rspamd_task_quark(),
  441. RSPAMD_PROTOCOL_ERROR,
  442. "Cannot decompress, decompressor init failed");
  443. return FALSE;
  444. }
  445. tok = rspamd_task_get_request_header(task, "dictionary");
  446. if (tok != NULL) {
  447. /* We need to use custom dictionary */
  448. if (!rspamd_strtoul(tok->begin, tok->len, &dict_id)) {
  449. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  450. "Non numeric dictionary");
  451. return FALSE;
  452. }
  453. if (!task->cfg->libs_ctx->in_dict) {
  454. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  455. "Unknown dictionary, undefined locally");
  456. return FALSE;
  457. }
  458. if (task->cfg->libs_ctx->in_dict->id != dict_id) {
  459. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  460. "Unknown dictionary, invalid dictionary id");
  461. return FALSE;
  462. }
  463. }
  464. zstream = task->cfg->libs_ctx->in_zstream;
  465. zin.pos = 0;
  466. zin.src = task->msg.begin;
  467. zin.size = task->msg.len;
  468. if ((outlen = ZSTD_getDecompressedSize(task->msg.begin, task->msg.len)) == 0) {
  469. outlen = ZSTD_DStreamOutSize();
  470. }
  471. out = g_malloc(outlen);
  472. zout.dst = out;
  473. zout.pos = 0;
  474. zout.size = outlen;
  475. while (zin.pos < zin.size) {
  476. r = ZSTD_decompressStream(zstream, &zout, &zin);
  477. if (ZSTD_isError(r)) {
  478. g_set_error(&task->err, rspamd_task_quark(),
  479. RSPAMD_PROTOCOL_ERROR,
  480. "Decompression error: %s", ZSTD_getErrorName(r));
  481. return FALSE;
  482. }
  483. if (zout.pos == zout.size) {
  484. /* We need to extend output buffer */
  485. zout.size = zout.size * 2 + 1;
  486. zout.dst = g_realloc(zout.dst, zout.size);
  487. }
  488. }
  489. rspamd_mempool_add_destructor(task->task_pool, g_free, zout.dst);
  490. task->msg.begin = zout.dst;
  491. task->msg.len = zout.pos;
  492. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_COMPRESSED;
  493. msg_info_task("loaded message from zstd compressed stream; "
  494. "compressed: %ul; uncompressed: %ul",
  495. (gulong) zin.size, (gulong) zout.pos);
  496. }
  497. else {
  498. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  499. "Invalid compression method");
  500. return FALSE;
  501. }
  502. }
  503. if (task->msg.len == 0) {
  504. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  505. }
  506. if (task->protocol_flags & RSPAMD_TASK_PROTOCOL_FLAG_HAS_CONTROL) {
  507. rspamd_ftok_t *hv = rspamd_task_get_request_header(task, MLEN_HEADER);
  508. gulong message_len = 0;
  509. if (!hv || !rspamd_strtoul(hv->begin, hv->len, &message_len) ||
  510. task->msg.len < message_len) {
  511. msg_warn_task("message has invalid message length: %ul and total len: %ul",
  512. message_len, task->msg.len);
  513. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  514. "Invalid length");
  515. return FALSE;
  516. }
  517. control_len = task->msg.len - message_len;
  518. if (control_len > 0) {
  519. parser = ucl_parser_new(UCL_PARSER_KEY_LOWERCASE);
  520. if (!ucl_parser_add_chunk(parser, task->msg.begin, control_len)) {
  521. msg_warn_task("processing of control chunk failed: %s",
  522. ucl_parser_get_error(parser));
  523. ucl_parser_free(parser);
  524. }
  525. else {
  526. control_obj = ucl_parser_get_object(parser);
  527. ucl_parser_free(parser);
  528. rspamd_protocol_handle_control(task, control_obj);
  529. ucl_object_unref(control_obj);
  530. }
  531. task->msg.begin += control_len;
  532. task->msg.len -= control_len;
  533. }
  534. }
  535. return TRUE;
  536. }
  537. static unsigned int
  538. rspamd_task_select_processing_stage(struct rspamd_task *task, unsigned int stages)
  539. {
  540. unsigned int st, mask;
  541. mask = task->processed_stages;
  542. if (mask == 0) {
  543. st = 0;
  544. }
  545. else {
  546. for (st = 1; mask != 1; st++) {
  547. mask = mask >> 1u;
  548. }
  549. }
  550. st = 1 << st;
  551. if (stages & st) {
  552. return st;
  553. }
  554. else if (st < RSPAMD_TASK_STAGE_DONE) {
  555. /* We assume that the stage that was not requested is done */
  556. task->processed_stages |= st;
  557. return rspamd_task_select_processing_stage(task, stages);
  558. }
  559. /* We are done */
  560. return RSPAMD_TASK_STAGE_DONE;
  561. }
  562. gboolean
  563. rspamd_task_process(struct rspamd_task *task, unsigned int stages)
  564. {
  565. unsigned int st;
  566. gboolean ret = TRUE, all_done = TRUE;
  567. GError *stat_error = NULL;
  568. /* Avoid nested calls */
  569. if (task->flags & RSPAMD_TASK_FLAG_PROCESSING) {
  570. return TRUE;
  571. }
  572. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  573. return TRUE;
  574. }
  575. task->flags |= RSPAMD_TASK_FLAG_PROCESSING;
  576. st = rspamd_task_select_processing_stage(task, stages);
  577. switch (st) {
  578. case RSPAMD_TASK_STAGE_CONNFILTERS:
  579. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  580. break;
  581. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  582. if (!rspamd_message_parse(task)) {
  583. ret = FALSE;
  584. }
  585. break;
  586. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  587. if (!(task->flags & RSPAMD_TASK_FLAG_SKIP_PROCESS)) {
  588. rspamd_message_process(task);
  589. }
  590. break;
  591. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  592. case RSPAMD_TASK_STAGE_FILTERS:
  593. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  594. break;
  595. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  596. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  597. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  598. if (!RSPAMD_TASK_IS_EMPTY(task)) {
  599. if (rspamd_stat_classify(task, task->cfg->lua_state, st, &stat_error) ==
  600. RSPAMD_STAT_PROCESS_ERROR) {
  601. msg_err_task("classify error: %e", stat_error);
  602. g_error_free(stat_error);
  603. }
  604. }
  605. break;
  606. case RSPAMD_TASK_STAGE_COMPOSITES:
  607. rspamd_composites_process_task(task);
  608. task->result->nresults_postfilters = task->result->nresults;
  609. break;
  610. case RSPAMD_TASK_STAGE_POST_FILTERS:
  611. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache,
  612. st);
  613. if (all_done) {
  614. rspamd_task_result_adjust_grow_factor(task, task->result, task->cfg->grow_factor);
  615. }
  616. if (all_done && (task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO) &&
  617. !RSPAMD_TASK_IS_EMPTY(task) &&
  618. !(task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM | RSPAMD_TASK_FLAG_LEARN_HAM))) {
  619. rspamd_stat_check_autolearn(task);
  620. }
  621. break;
  622. case RSPAMD_TASK_STAGE_LEARN:
  623. case RSPAMD_TASK_STAGE_LEARN_PRE:
  624. case RSPAMD_TASK_STAGE_LEARN_POST:
  625. if (task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM | RSPAMD_TASK_FLAG_LEARN_HAM)) {
  626. if (task->err == NULL) {
  627. if (!rspamd_stat_learn(task,
  628. task->flags & RSPAMD_TASK_FLAG_LEARN_SPAM,
  629. task->cfg->lua_state, task->classifier,
  630. st, &stat_error)) {
  631. if (stat_error == NULL) {
  632. g_set_error(&stat_error,
  633. g_quark_from_static_string("stat"), 500,
  634. "Unknown statistics error, found on stage %s;"
  635. " classifier: %s",
  636. rspamd_task_stage_name(st), task->classifier);
  637. }
  638. if (stat_error->code >= 400) {
  639. msg_err_task("learn error: %e", stat_error);
  640. }
  641. else {
  642. msg_notice_task("skip learning: %e", stat_error);
  643. }
  644. if (!(task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO)) {
  645. task->err = stat_error;
  646. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  647. }
  648. else {
  649. /* Do not skip idempotent in case of learn error */
  650. if (stat_error) {
  651. g_error_free(stat_error);
  652. }
  653. task->processed_stages |= RSPAMD_TASK_STAGE_LEARN |
  654. RSPAMD_TASK_STAGE_LEARN_PRE |
  655. RSPAMD_TASK_STAGE_LEARN_POST;
  656. }
  657. }
  658. }
  659. }
  660. break;
  661. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  662. /* Second run of composites processing before idempotent filters (if needed) */
  663. if (task->result->nresults_postfilters != task->result->nresults) {
  664. rspamd_composites_process_task(task);
  665. }
  666. else {
  667. msg_debug_task("skip second run of composites as the result has not been changed");
  668. }
  669. break;
  670. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  671. /* Stop task timeout */
  672. if (ev_can_stop(&task->timeout_ev)) {
  673. ev_timer_stop(task->event_loop, &task->timeout_ev);
  674. }
  675. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  676. break;
  677. case RSPAMD_TASK_STAGE_DONE:
  678. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  679. break;
  680. default:
  681. /* TODO: not implemented stage */
  682. break;
  683. }
  684. if (RSPAMD_TASK_IS_SKIPPED(task)) {
  685. /* Set all bits except idempotent filters */
  686. task->processed_stages |= 0x7FFF;
  687. }
  688. task->flags &= ~RSPAMD_TASK_FLAG_PROCESSING;
  689. if (!ret || RSPAMD_TASK_IS_PROCESSED(task)) {
  690. if (!ret) {
  691. /* Set processed flags */
  692. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  693. }
  694. msg_debug_task("task is processed");
  695. return ret;
  696. }
  697. if (ret) {
  698. if (rspamd_session_events_pending(task->s) != 0) {
  699. /* We have events pending, so we consider this stage as incomplete */
  700. msg_debug_task("need more work on stage %d", st);
  701. }
  702. else {
  703. if (all_done) {
  704. /* Mark the current stage as done and go to the next stage */
  705. msg_debug_task("completed stage %d", st);
  706. task->processed_stages |= st;
  707. }
  708. else {
  709. msg_debug_task("need more processing on stage %d", st);
  710. }
  711. /* Tail recursion */
  712. return rspamd_task_process(task, stages);
  713. }
  714. }
  715. return ret;
  716. }
  717. struct rspamd_email_address *
  718. rspamd_task_get_sender(struct rspamd_task *task)
  719. {
  720. return task->from_envelope;
  721. }
  722. static const char *
  723. rspamd_task_cache_principal_recipient(struct rspamd_task *task,
  724. const char *rcpt, gsize len)
  725. {
  726. char *rcpt_lc;
  727. if (rcpt == NULL) {
  728. return NULL;
  729. }
  730. rcpt_lc = rspamd_mempool_alloc(task->task_pool, len + 1);
  731. rspamd_strlcpy(rcpt_lc, rcpt, len + 1);
  732. rspamd_str_lc(rcpt_lc, len);
  733. rspamd_mempool_set_variable(task->task_pool,
  734. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT, rcpt_lc, NULL);
  735. return rcpt_lc;
  736. }
  737. const char *
  738. rspamd_task_get_principal_recipient(struct rspamd_task *task)
  739. {
  740. const char *val;
  741. struct rspamd_email_address *addr;
  742. unsigned int i;
  743. val = rspamd_mempool_get_variable(task->task_pool,
  744. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT);
  745. if (val) {
  746. return val;
  747. }
  748. if (task->deliver_to) {
  749. return rspamd_task_cache_principal_recipient(task, task->deliver_to,
  750. strlen(task->deliver_to));
  751. }
  752. if (task->rcpt_envelope != NULL) {
  753. PTR_ARRAY_FOREACH(task->rcpt_envelope, i, addr)
  754. {
  755. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  756. return rspamd_task_cache_principal_recipient(task, addr->addr,
  757. addr->addr_len);
  758. }
  759. }
  760. }
  761. GPtrArray *rcpt_mime = MESSAGE_FIELD_CHECK(task, rcpt_mime);
  762. if (rcpt_mime != NULL && rcpt_mime->len > 0) {
  763. PTR_ARRAY_FOREACH(rcpt_mime, i, addr)
  764. {
  765. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  766. return rspamd_task_cache_principal_recipient(task, addr->addr,
  767. addr->addr_len);
  768. }
  769. }
  770. }
  771. return NULL;
  772. }
  773. gboolean
  774. rspamd_learn_task_spam(struct rspamd_task *task,
  775. gboolean is_spam,
  776. const char *classifier,
  777. GError **err)
  778. {
  779. if (is_spam) {
  780. task->flags |= RSPAMD_TASK_FLAG_LEARN_SPAM;
  781. }
  782. else {
  783. task->flags |= RSPAMD_TASK_FLAG_LEARN_HAM;
  784. }
  785. task->classifier = classifier;
  786. return TRUE;
  787. }
  788. static gboolean
  789. rspamd_task_log_check_condition(struct rspamd_task *task,
  790. struct rspamd_log_format *lf)
  791. {
  792. gboolean ret = FALSE;
  793. switch (lf->type) {
  794. case RSPAMD_LOG_MID:
  795. if (MESSAGE_FIELD_CHECK(task, message_id) &&
  796. strcmp(MESSAGE_FIELD(task, message_id), "undef") != 0) {
  797. ret = TRUE;
  798. }
  799. break;
  800. case RSPAMD_LOG_QID:
  801. if (task->queue_id && strcmp(task->queue_id, "undef") != 0) {
  802. ret = TRUE;
  803. }
  804. break;
  805. case RSPAMD_LOG_USER:
  806. if (task->auth_user) {
  807. ret = TRUE;
  808. }
  809. break;
  810. case RSPAMD_LOG_IP:
  811. if (task->from_addr && rspamd_ip_is_valid(task->from_addr)) {
  812. ret = TRUE;
  813. }
  814. break;
  815. case RSPAMD_LOG_SMTP_RCPT:
  816. case RSPAMD_LOG_SMTP_RCPTS:
  817. if (task->rcpt_envelope && task->rcpt_envelope->len > 0) {
  818. ret = TRUE;
  819. }
  820. break;
  821. case RSPAMD_LOG_MIME_RCPT:
  822. case RSPAMD_LOG_MIME_RCPTS:
  823. if (MESSAGE_FIELD_CHECK(task, rcpt_mime) &&
  824. MESSAGE_FIELD(task, rcpt_mime)->len > 0) {
  825. ret = TRUE;
  826. }
  827. break;
  828. case RSPAMD_LOG_SMTP_FROM:
  829. if (task->from_envelope) {
  830. ret = TRUE;
  831. }
  832. break;
  833. case RSPAMD_LOG_MIME_FROM:
  834. if (MESSAGE_FIELD_CHECK(task, from_mime) &&
  835. MESSAGE_FIELD(task, from_mime)->len > 0) {
  836. ret = TRUE;
  837. }
  838. break;
  839. case RSPAMD_LOG_FILENAME:
  840. if (task->msg.fpath) {
  841. ret = TRUE;
  842. }
  843. break;
  844. case RSPAMD_LOG_FORCED_ACTION:
  845. if (task->result->passthrough_result) {
  846. ret = TRUE;
  847. }
  848. break;
  849. case RSPAMD_LOG_SETTINGS_ID:
  850. if (task->settings_elt) {
  851. ret = TRUE;
  852. }
  853. break;
  854. default:
  855. ret = TRUE;
  856. break;
  857. }
  858. return ret;
  859. }
  860. /*
  861. * Sort by symbol's score -> name
  862. */
  863. static int
  864. rspamd_task_compare_log_sym(gconstpointer a, gconstpointer b)
  865. {
  866. const struct rspamd_symbol_result *s1 = *(const struct rspamd_symbol_result **) a,
  867. *s2 = *(const struct rspamd_symbol_result **) b;
  868. double w1, w2;
  869. w1 = fabs(s1->score);
  870. w2 = fabs(s2->score);
  871. if (w1 == w2 && s1->name && s2->name) {
  872. return strcmp(s1->name, s2->name);
  873. }
  874. return (w2 - w1) * 1000.0;
  875. }
  876. static int
  877. rspamd_task_compare_log_group(gconstpointer a, gconstpointer b)
  878. {
  879. const struct rspamd_symbols_group *s1 = *(const struct rspamd_symbols_group **) a,
  880. *s2 = *(const struct rspamd_symbols_group **) b;
  881. return strcmp(s1->name, s2->name);
  882. }
  883. static rspamd_ftok_t
  884. rspamd_task_log_metric_res(struct rspamd_task *task,
  885. struct rspamd_log_format *lf)
  886. {
  887. static char scorebuf[32];
  888. rspamd_ftok_t res = {.begin = NULL, .len = 0};
  889. struct rspamd_scan_result *mres;
  890. gboolean first = TRUE;
  891. rspamd_fstring_t *symbuf;
  892. struct rspamd_symbol_result *sym;
  893. GPtrArray *sorted_symbols;
  894. struct rspamd_action *act;
  895. struct rspamd_symbols_group *gr;
  896. unsigned int i, j;
  897. khiter_t k;
  898. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  899. mres = task->result;
  900. act = rspamd_check_action_metric(task, NULL, NULL);
  901. if (mres != NULL) {
  902. switch (lf->type) {
  903. case RSPAMD_LOG_ISSPAM:
  904. if (RSPAMD_TASK_IS_SKIPPED(task)) {
  905. res.begin = "S";
  906. }
  907. else if (!(act->flags & RSPAMD_ACTION_HAM)) {
  908. res.begin = "T";
  909. }
  910. else {
  911. res.begin = "F";
  912. }
  913. res.len = 1;
  914. break;
  915. case RSPAMD_LOG_ACTION:
  916. res.begin = act->name;
  917. res.len = strlen(res.begin);
  918. break;
  919. case RSPAMD_LOG_SCORES:
  920. res.len = rspamd_snprintf(scorebuf, sizeof(scorebuf), "%.2f/%.2f",
  921. mres->score, rspamd_task_get_required_score(task, mres));
  922. res.begin = scorebuf;
  923. break;
  924. case RSPAMD_LOG_SYMBOLS:
  925. symbuf = rspamd_fstring_sized_new(128);
  926. sorted_symbols = g_ptr_array_sized_new(kh_size(mres->symbols));
  927. kh_foreach_value(mres->symbols, sym, {
  928. if (!(sym->flags & RSPAMD_SYMBOL_RESULT_IGNORED)) {
  929. g_ptr_array_add(sorted_symbols, (gpointer) sym);
  930. }
  931. });
  932. g_ptr_array_sort(sorted_symbols, rspamd_task_compare_log_sym);
  933. for (i = 0; i < sorted_symbols->len; i++) {
  934. sym = g_ptr_array_index(sorted_symbols, i);
  935. if (first) {
  936. rspamd_printf_fstring(&symbuf, "%s", sym->name);
  937. }
  938. else {
  939. rspamd_printf_fstring(&symbuf, ",%s", sym->name);
  940. }
  941. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_SCORES) {
  942. rspamd_printf_fstring(&symbuf, "(%.2f)", sym->score);
  943. }
  944. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_PARAMS) {
  945. rspamd_printf_fstring(&symbuf, "{");
  946. if (sym->options) {
  947. struct rspamd_symbol_option *opt;
  948. j = 0;
  949. DL_FOREACH(sym->opts_head, opt)
  950. {
  951. rspamd_printf_fstring(&symbuf, "%*s;",
  952. (int) opt->optlen, opt->option);
  953. if (j >= max_log_elts && opt->next) {
  954. rspamd_printf_fstring(&symbuf, "...;");
  955. break;
  956. }
  957. j++;
  958. }
  959. }
  960. rspamd_printf_fstring(&symbuf, "}");
  961. }
  962. first = FALSE;
  963. }
  964. g_ptr_array_free(sorted_symbols, TRUE);
  965. rspamd_mempool_add_destructor(task->task_pool,
  966. (rspamd_mempool_destruct_t) rspamd_fstring_free,
  967. symbuf);
  968. rspamd_mempool_notify_alloc(task->task_pool, symbuf->len);
  969. res.begin = symbuf->str;
  970. res.len = symbuf->len;
  971. break;
  972. case RSPAMD_LOG_GROUPS:
  973. case RSPAMD_LOG_PUBLIC_GROUPS:
  974. symbuf = rspamd_fstring_sized_new(128);
  975. sorted_symbols = g_ptr_array_sized_new(kh_size(mres->sym_groups));
  976. kh_foreach_key(mres->sym_groups, gr, {
  977. if (!(gr->flags & RSPAMD_SYMBOL_GROUP_PUBLIC)) {
  978. if (lf->type == RSPAMD_LOG_PUBLIC_GROUPS) {
  979. continue;
  980. }
  981. }
  982. g_ptr_array_add(sorted_symbols, gr);
  983. });
  984. g_ptr_array_sort(sorted_symbols, rspamd_task_compare_log_group);
  985. for (i = 0; i < sorted_symbols->len; i++) {
  986. gr = g_ptr_array_index(sorted_symbols, i);
  987. if (first) {
  988. rspamd_printf_fstring(&symbuf, "%s", gr->name);
  989. }
  990. else {
  991. rspamd_printf_fstring(&symbuf, ",%s", gr->name);
  992. }
  993. k = kh_get(rspamd_symbols_group_hash, mres->sym_groups, gr);
  994. rspamd_printf_fstring(&symbuf, "(%.2f)",
  995. kh_value(mres->sym_groups, k));
  996. first = FALSE;
  997. }
  998. g_ptr_array_free(sorted_symbols, TRUE);
  999. rspamd_mempool_add_destructor(task->task_pool,
  1000. (rspamd_mempool_destruct_t) rspamd_fstring_free,
  1001. symbuf);
  1002. rspamd_mempool_notify_alloc(task->task_pool, symbuf->len);
  1003. res.begin = symbuf->str;
  1004. res.len = symbuf->len;
  1005. break;
  1006. default:
  1007. break;
  1008. }
  1009. }
  1010. return res;
  1011. }
  1012. static rspamd_fstring_t *
  1013. rspamd_task_log_write_var(struct rspamd_task *task, rspamd_fstring_t *logbuf,
  1014. const rspamd_ftok_t *var, const rspamd_ftok_t *content)
  1015. {
  1016. rspamd_fstring_t *res = logbuf;
  1017. const char *p, *c, *end;
  1018. if (content == NULL) {
  1019. /* Just output variable */
  1020. res = rspamd_fstring_append(res, var->begin, var->len);
  1021. }
  1022. else {
  1023. /* Replace $ with variable value */
  1024. p = content->begin;
  1025. c = p;
  1026. end = p + content->len;
  1027. while (p < end) {
  1028. if (*p == '$') {
  1029. if (p > c) {
  1030. res = rspamd_fstring_append(res, c, p - c);
  1031. }
  1032. res = rspamd_fstring_append(res, var->begin, var->len);
  1033. p++;
  1034. c = p;
  1035. }
  1036. else {
  1037. p++;
  1038. }
  1039. }
  1040. if (p > c) {
  1041. res = rspamd_fstring_append(res, c, p - c);
  1042. }
  1043. }
  1044. return res;
  1045. }
  1046. static rspamd_fstring_t *
  1047. rspamd_task_write_ialist(struct rspamd_task *task,
  1048. GPtrArray *addrs, int lim,
  1049. struct rspamd_log_format *lf,
  1050. rspamd_fstring_t *logbuf)
  1051. {
  1052. rspamd_fstring_t *res = logbuf, *varbuf;
  1053. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1054. struct rspamd_email_address *addr;
  1055. int i, nchars = 0, wr = 0, cur_chars;
  1056. gboolean has_orig = FALSE;
  1057. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  1058. if (addrs && lim <= 0) {
  1059. lim = addrs->len;
  1060. }
  1061. PTR_ARRAY_FOREACH(addrs, i, addr)
  1062. {
  1063. if (addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL) {
  1064. has_orig = TRUE;
  1065. break;
  1066. }
  1067. }
  1068. varbuf = rspamd_fstring_new();
  1069. PTR_ARRAY_FOREACH(addrs, i, addr)
  1070. {
  1071. if (wr >= lim) {
  1072. break;
  1073. }
  1074. if (has_orig) {
  1075. /* Report merely original addresses */
  1076. if (!(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  1077. continue;
  1078. }
  1079. }
  1080. bool last = i == lim - 1;
  1081. cur_chars = addr->addr_len;
  1082. varbuf = rspamd_fstring_append(varbuf, addr->addr,
  1083. cur_chars);
  1084. nchars += cur_chars;
  1085. wr++;
  1086. if (varbuf->len > 0 && !last) {
  1087. varbuf = rspamd_fstring_append(varbuf, ",", 1);
  1088. }
  1089. if (!last && (wr >= max_log_elts || nchars >= max_log_elts * 16)) {
  1090. varbuf = rspamd_fstring_append(varbuf, "...", 3);
  1091. break;
  1092. }
  1093. }
  1094. if (varbuf->len > 0) {
  1095. var.begin = varbuf->str;
  1096. var.len = varbuf->len;
  1097. res = rspamd_task_log_write_var(task, logbuf,
  1098. &var, (const rspamd_ftok_t *) lf->data);
  1099. }
  1100. rspamd_fstring_free(varbuf);
  1101. return res;
  1102. }
  1103. static rspamd_fstring_t *
  1104. rspamd_task_write_addr_list(struct rspamd_task *task,
  1105. GPtrArray *addrs, int lim,
  1106. struct rspamd_log_format *lf,
  1107. rspamd_fstring_t *logbuf)
  1108. {
  1109. rspamd_fstring_t *res = logbuf, *varbuf;
  1110. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1111. struct rspamd_email_address *addr;
  1112. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  1113. unsigned int i;
  1114. if (lim <= 0) {
  1115. lim = addrs->len;
  1116. }
  1117. varbuf = rspamd_fstring_new();
  1118. for (i = 0; i < lim; i++) {
  1119. addr = g_ptr_array_index(addrs, i);
  1120. bool last = i == lim - 1;
  1121. if (addr->addr) {
  1122. varbuf = rspamd_fstring_append(varbuf, addr->addr, addr->addr_len);
  1123. }
  1124. if (varbuf->len > 0 && !last) {
  1125. varbuf = rspamd_fstring_append(varbuf, ",", 1);
  1126. }
  1127. if (!last && i >= max_log_elts) {
  1128. varbuf = rspamd_fstring_append(varbuf, "...", 3);
  1129. break;
  1130. }
  1131. }
  1132. if (varbuf->len > 0) {
  1133. var.begin = varbuf->str;
  1134. var.len = varbuf->len;
  1135. res = rspamd_task_log_write_var(task, logbuf,
  1136. &var, (const rspamd_ftok_t *) lf->data);
  1137. }
  1138. rspamd_fstring_free(varbuf);
  1139. return res;
  1140. }
  1141. static rspamd_fstring_t *
  1142. rspamd_task_log_variable(struct rspamd_task *task,
  1143. struct rspamd_log_format *lf, rspamd_fstring_t *logbuf)
  1144. {
  1145. rspamd_fstring_t *res = logbuf;
  1146. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1147. static char numbuf[128];
  1148. static const char undef[] = "undef";
  1149. switch (lf->type) {
  1150. /* String vars */
  1151. case RSPAMD_LOG_MID:
  1152. if (MESSAGE_FIELD_CHECK(task, message_id)) {
  1153. var.begin = MESSAGE_FIELD(task, message_id);
  1154. var.len = strlen(var.begin);
  1155. }
  1156. else {
  1157. var.begin = undef;
  1158. var.len = sizeof(undef) - 1;
  1159. }
  1160. break;
  1161. case RSPAMD_LOG_QID:
  1162. if (task->queue_id) {
  1163. var.begin = task->queue_id;
  1164. var.len = strlen(var.begin);
  1165. }
  1166. else {
  1167. var.begin = undef;
  1168. var.len = sizeof(undef) - 1;
  1169. }
  1170. break;
  1171. case RSPAMD_LOG_USER:
  1172. if (task->auth_user) {
  1173. var.begin = task->auth_user;
  1174. var.len = strlen(var.begin);
  1175. }
  1176. else {
  1177. var.begin = undef;
  1178. var.len = sizeof(undef) - 1;
  1179. }
  1180. break;
  1181. case RSPAMD_LOG_IP:
  1182. if (task->from_addr && rspamd_ip_is_valid(task->from_addr)) {
  1183. var.begin = rspamd_inet_address_to_string(task->from_addr);
  1184. var.len = strlen(var.begin);
  1185. }
  1186. else {
  1187. var.begin = undef;
  1188. var.len = sizeof(undef) - 1;
  1189. }
  1190. break;
  1191. /* Numeric vars */
  1192. case RSPAMD_LOG_LEN:
  1193. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%uz",
  1194. task->msg.len);
  1195. var.begin = numbuf;
  1196. break;
  1197. case RSPAMD_LOG_DNS_REQ:
  1198. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%uD",
  1199. task->dns_requests);
  1200. var.begin = numbuf;
  1201. break;
  1202. case RSPAMD_LOG_TIME_REAL:
  1203. case RSPAMD_LOG_TIME_VIRTUAL:
  1204. var.begin = rspamd_log_check_time(task->task_timestamp,
  1205. task->time_real_finish,
  1206. task->cfg->clock_res);
  1207. var.len = strlen(var.begin);
  1208. break;
  1209. /* InternetAddress vars */
  1210. case RSPAMD_LOG_SMTP_FROM:
  1211. if (task->from_envelope) {
  1212. var.begin = task->from_envelope->addr;
  1213. var.len = task->from_envelope->addr_len;
  1214. }
  1215. break;
  1216. case RSPAMD_LOG_MIME_FROM:
  1217. if (MESSAGE_FIELD_CHECK(task, from_mime)) {
  1218. return rspamd_task_write_ialist(task,
  1219. MESSAGE_FIELD(task, from_mime),
  1220. 1,
  1221. lf,
  1222. logbuf);
  1223. }
  1224. break;
  1225. case RSPAMD_LOG_SMTP_RCPT:
  1226. if (task->rcpt_envelope) {
  1227. return rspamd_task_write_addr_list(task, task->rcpt_envelope, 1, lf,
  1228. logbuf);
  1229. }
  1230. break;
  1231. case RSPAMD_LOG_MIME_RCPT:
  1232. if (MESSAGE_FIELD_CHECK(task, rcpt_mime)) {
  1233. return rspamd_task_write_ialist(task,
  1234. MESSAGE_FIELD(task, rcpt_mime),
  1235. 1,
  1236. lf,
  1237. logbuf);
  1238. }
  1239. break;
  1240. case RSPAMD_LOG_SMTP_RCPTS:
  1241. if (task->rcpt_envelope) {
  1242. return rspamd_task_write_addr_list(task, task->rcpt_envelope, -1, lf,
  1243. logbuf);
  1244. }
  1245. break;
  1246. case RSPAMD_LOG_MIME_RCPTS:
  1247. if (MESSAGE_FIELD_CHECK(task, rcpt_mime)) {
  1248. return rspamd_task_write_ialist(task,
  1249. MESSAGE_FIELD(task, rcpt_mime),
  1250. -1, /* All addresses */
  1251. lf,
  1252. logbuf);
  1253. }
  1254. break;
  1255. case RSPAMD_LOG_DIGEST:
  1256. if (task->message) {
  1257. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%*xs",
  1258. (int) sizeof(MESSAGE_FIELD(task, digest)),
  1259. MESSAGE_FIELD(task, digest));
  1260. var.begin = numbuf;
  1261. }
  1262. else {
  1263. var.begin = undef;
  1264. var.len = sizeof(undef) - 1;
  1265. }
  1266. break;
  1267. case RSPAMD_LOG_FILENAME:
  1268. if (task->msg.fpath) {
  1269. var.len = strlen(task->msg.fpath);
  1270. var.begin = task->msg.fpath;
  1271. }
  1272. else {
  1273. var.begin = undef;
  1274. var.len = sizeof(undef) - 1;
  1275. }
  1276. break;
  1277. case RSPAMD_LOG_FORCED_ACTION:
  1278. if (task->result->passthrough_result) {
  1279. struct rspamd_passthrough_result *pr = task->result->passthrough_result;
  1280. if (!isnan(pr->target_score)) {
  1281. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1282. "%s \"%s\"; score=%.2f (set by %s)",
  1283. pr->action->name,
  1284. pr->message,
  1285. pr->target_score,
  1286. pr->module);
  1287. }
  1288. else {
  1289. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1290. "%s \"%s\"; score=nan (set by %s)",
  1291. pr->action->name,
  1292. pr->message,
  1293. pr->module);
  1294. }
  1295. var.begin = numbuf;
  1296. }
  1297. else {
  1298. var.begin = undef;
  1299. var.len = sizeof(undef) - 1;
  1300. }
  1301. break;
  1302. case RSPAMD_LOG_SETTINGS_ID:
  1303. if (task->settings_elt) {
  1304. var.begin = task->settings_elt->name;
  1305. var.len = strlen(task->settings_elt->name);
  1306. }
  1307. else {
  1308. var.begin = undef;
  1309. var.len = sizeof(undef) - 1;
  1310. }
  1311. break;
  1312. case RSPAMD_LOG_MEMPOOL_SIZE:
  1313. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1314. "%Hz",
  1315. rspamd_mempool_get_used_size(task->task_pool));
  1316. var.begin = numbuf;
  1317. break;
  1318. case RSPAMD_LOG_MEMPOOL_WASTE:
  1319. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1320. "%Hz",
  1321. rspamd_mempool_get_wasted_size(task->task_pool));
  1322. var.begin = numbuf;
  1323. break;
  1324. default:
  1325. var = rspamd_task_log_metric_res(task, lf);
  1326. break;
  1327. }
  1328. if (var.len > 0) {
  1329. res = rspamd_task_log_write_var(task, logbuf,
  1330. &var, (const rspamd_ftok_t *) lf->data);
  1331. }
  1332. return res;
  1333. }
  1334. void rspamd_task_write_log(struct rspamd_task *task)
  1335. {
  1336. rspamd_fstring_t *logbuf;
  1337. struct rspamd_log_format *lf;
  1338. struct rspamd_task **ptask;
  1339. const char *lua_str;
  1340. gsize lua_str_len;
  1341. lua_State *L;
  1342. g_assert(task != NULL);
  1343. if (task->cfg->log_format == NULL ||
  1344. (task->flags & RSPAMD_TASK_FLAG_NO_LOG)) {
  1345. msg_debug_task("skip logging due to no log flag");
  1346. return;
  1347. }
  1348. logbuf = rspamd_fstring_sized_new(1000);
  1349. DL_FOREACH(task->cfg->log_format, lf)
  1350. {
  1351. switch (lf->type) {
  1352. case RSPAMD_LOG_STRING:
  1353. logbuf = rspamd_fstring_append(logbuf, lf->data, lf->len);
  1354. break;
  1355. case RSPAMD_LOG_LUA:
  1356. L = task->cfg->lua_state;
  1357. lua_rawgeti(L, LUA_REGISTRYINDEX, GPOINTER_TO_INT(lf->data));
  1358. ptask = lua_newuserdata(L, sizeof(*ptask));
  1359. rspamd_lua_setclass(L, rspamd_task_classname, -1);
  1360. *ptask = task;
  1361. if (lua_pcall(L, 1, 1, 0) != 0) {
  1362. msg_err_task("call to log function failed: %s",
  1363. lua_tostring(L, -1));
  1364. lua_pop(L, 1);
  1365. }
  1366. else {
  1367. lua_str = lua_tolstring(L, -1, &lua_str_len);
  1368. if (lua_str != NULL) {
  1369. logbuf = rspamd_fstring_append(logbuf, lua_str, lua_str_len);
  1370. }
  1371. lua_pop(L, 1);
  1372. }
  1373. break;
  1374. default:
  1375. /* We have a variable in log format */
  1376. if (lf->flags & RSPAMD_LOG_FMT_FLAG_CONDITION) {
  1377. if (!rspamd_task_log_check_condition(task, lf)) {
  1378. continue;
  1379. }
  1380. }
  1381. logbuf = rspamd_task_log_variable(task, lf, logbuf);
  1382. break;
  1383. }
  1384. }
  1385. msg_notice_task("%V", logbuf);
  1386. rspamd_fstring_free(logbuf);
  1387. }
  1388. double
  1389. rspamd_task_get_required_score(struct rspamd_task *task, struct rspamd_scan_result *m)
  1390. {
  1391. if (m == NULL) {
  1392. m = task->result;
  1393. if (m == NULL) {
  1394. return NAN;
  1395. }
  1396. }
  1397. for (unsigned int i = m->nactions; i-- > 0;) {
  1398. struct rspamd_action_config *action_lim = &m->actions_config[i];
  1399. if (!isnan(action_lim->cur_limit) &&
  1400. !(action_lim->action->flags & (RSPAMD_ACTION_NO_THRESHOLD | RSPAMD_ACTION_HAM))) {
  1401. return m->actions_config[i].cur_limit;
  1402. }
  1403. }
  1404. return NAN;
  1405. }
  1406. rspamd_ftok_t *
  1407. rspamd_task_get_request_header(struct rspamd_task *task,
  1408. const char *name)
  1409. {
  1410. struct rspamd_request_header_chain *ret =
  1411. rspamd_task_get_request_header_multiple(task, name);
  1412. if (ret) {
  1413. return ret->hdr;
  1414. }
  1415. return NULL;
  1416. }
  1417. struct rspamd_request_header_chain *
  1418. rspamd_task_get_request_header_multiple(struct rspamd_task *task,
  1419. const char *name)
  1420. {
  1421. struct rspamd_request_header_chain *ret = NULL;
  1422. rspamd_ftok_t srch;
  1423. khiter_t k;
  1424. srch.begin = (char *) name;
  1425. srch.len = strlen(name);
  1426. k = kh_get(rspamd_req_headers_hash, task->request_headers,
  1427. &srch);
  1428. if (k != kh_end(task->request_headers)) {
  1429. ret = kh_value(task->request_headers, k);
  1430. }
  1431. return ret;
  1432. }
  1433. void rspamd_task_add_request_header(struct rspamd_task *task,
  1434. rspamd_ftok_t *name, rspamd_ftok_t *value)
  1435. {
  1436. khiter_t k;
  1437. int res;
  1438. struct rspamd_request_header_chain *chain, *nchain;
  1439. k = kh_put(rspamd_req_headers_hash, task->request_headers,
  1440. name, &res);
  1441. if (res == 0) {
  1442. /* Existing name */
  1443. nchain = rspamd_mempool_alloc(task->task_pool, sizeof(*nchain));
  1444. nchain->hdr = value;
  1445. nchain->next = NULL;
  1446. chain = kh_value(task->request_headers, k);
  1447. /* Slow but OK here */
  1448. LL_APPEND(chain, nchain);
  1449. }
  1450. else {
  1451. nchain = rspamd_mempool_alloc(task->task_pool, sizeof(*nchain));
  1452. nchain->hdr = value;
  1453. nchain->next = NULL;
  1454. kh_value(task->request_headers, k) = nchain;
  1455. }
  1456. }
  1457. void rspamd_task_profile_set(struct rspamd_task *task, const char *key,
  1458. double value)
  1459. {
  1460. GHashTable *tbl;
  1461. double *pval;
  1462. if (key == NULL) {
  1463. return;
  1464. }
  1465. tbl = rspamd_mempool_get_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1466. if (tbl == NULL) {
  1467. tbl = g_hash_table_new(rspamd_str_hash, rspamd_str_equal);
  1468. rspamd_mempool_set_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE,
  1469. tbl, (rspamd_mempool_destruct_t) g_hash_table_unref);
  1470. }
  1471. pval = g_hash_table_lookup(tbl, key);
  1472. if (pval == NULL) {
  1473. pval = rspamd_mempool_alloc(task->task_pool, sizeof(*pval));
  1474. *pval = value;
  1475. g_hash_table_insert(tbl, (void *) key, pval);
  1476. }
  1477. else {
  1478. *pval = value;
  1479. }
  1480. }
  1481. double *
  1482. rspamd_task_profile_get(struct rspamd_task *task, const char *key)
  1483. {
  1484. GHashTable *tbl;
  1485. double *pval = NULL;
  1486. tbl = rspamd_mempool_get_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1487. if (tbl != NULL) {
  1488. pval = g_hash_table_lookup(tbl, key);
  1489. }
  1490. return pval;
  1491. }
  1492. gboolean
  1493. rspamd_task_set_finish_time(struct rspamd_task *task)
  1494. {
  1495. if (isnan(task->time_real_finish)) {
  1496. task->time_real_finish = ev_time();
  1497. return TRUE;
  1498. }
  1499. return FALSE;
  1500. }
  1501. const char *
  1502. rspamd_task_stage_name(enum rspamd_task_stage stg)
  1503. {
  1504. const char *ret = "unknown stage";
  1505. switch (stg) {
  1506. case RSPAMD_TASK_STAGE_CONNECT:
  1507. ret = "connect";
  1508. break;
  1509. case RSPAMD_TASK_STAGE_CONNFILTERS:
  1510. ret = "connection_filter";
  1511. break;
  1512. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  1513. ret = "read_message";
  1514. break;
  1515. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  1516. ret = "prefilters";
  1517. break;
  1518. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  1519. ret = "process_message";
  1520. break;
  1521. case RSPAMD_TASK_STAGE_FILTERS:
  1522. ret = "filters";
  1523. break;
  1524. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  1525. ret = "classifiers_pre";
  1526. break;
  1527. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  1528. ret = "classifiers";
  1529. break;
  1530. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  1531. ret = "classifiers_post";
  1532. break;
  1533. case RSPAMD_TASK_STAGE_COMPOSITES:
  1534. ret = "composites";
  1535. break;
  1536. case RSPAMD_TASK_STAGE_POST_FILTERS:
  1537. ret = "postfilters";
  1538. break;
  1539. case RSPAMD_TASK_STAGE_LEARN_PRE:
  1540. ret = "learn_pre";
  1541. break;
  1542. case RSPAMD_TASK_STAGE_LEARN:
  1543. ret = "learn";
  1544. break;
  1545. case RSPAMD_TASK_STAGE_LEARN_POST:
  1546. ret = "learn_post";
  1547. break;
  1548. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  1549. ret = "composites_post";
  1550. break;
  1551. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  1552. ret = "idempotent";
  1553. break;
  1554. case RSPAMD_TASK_STAGE_DONE:
  1555. ret = "done";
  1556. break;
  1557. case RSPAMD_TASK_STAGE_REPLIED:
  1558. ret = "replied";
  1559. break;
  1560. default:
  1561. break;
  1562. }
  1563. return ret;
  1564. }
  1565. void rspamd_task_timeout(EV_P_ ev_timer *w, int revents)
  1566. {
  1567. struct rspamd_task *task = (struct rspamd_task *) w->data;
  1568. if (!(task->processed_stages & RSPAMD_TASK_STAGE_FILTERS)) {
  1569. ev_now_update_if_cheap(task->event_loop);
  1570. msg_info_task("processing of task time out: %.1fs spent; %.1fs limit; "
  1571. "forced processing",
  1572. ev_now(task->event_loop) - task->task_timestamp,
  1573. w->repeat);
  1574. if (task->cfg->soft_reject_on_timeout) {
  1575. struct rspamd_action *action, *soft_reject;
  1576. action = rspamd_check_action_metric(task, NULL, NULL);
  1577. if (action->action_type != METRIC_ACTION_REJECT) {
  1578. soft_reject = rspamd_config_get_action_by_type(task->cfg,
  1579. METRIC_ACTION_SOFT_REJECT);
  1580. rspamd_add_passthrough_result(task,
  1581. soft_reject,
  1582. 0,
  1583. NAN,
  1584. "timeout processing message",
  1585. "task timeout",
  1586. 0, NULL);
  1587. }
  1588. }
  1589. ev_timer_again(EV_A_ w);
  1590. task->processed_stages |= RSPAMD_TASK_STAGE_FILTERS;
  1591. rspamd_session_cleanup(task->s, true);
  1592. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1593. rspamd_session_pending(task->s);
  1594. }
  1595. else {
  1596. /* Postprocessing timeout */
  1597. msg_info_task("post-processing of task time out: %.1f second spent; forced processing",
  1598. ev_now(task->event_loop) - task->task_timestamp);
  1599. if (task->cfg->soft_reject_on_timeout) {
  1600. struct rspamd_action *action, *soft_reject;
  1601. action = rspamd_check_action_metric(task, NULL, NULL);
  1602. if (action->action_type != METRIC_ACTION_REJECT) {
  1603. soft_reject = rspamd_config_get_action_by_type(task->cfg,
  1604. METRIC_ACTION_SOFT_REJECT);
  1605. rspamd_add_passthrough_result(task,
  1606. soft_reject,
  1607. 0,
  1608. NAN,
  1609. "timeout post-processing message",
  1610. "task timeout",
  1611. 0, NULL);
  1612. }
  1613. }
  1614. ev_timer_stop(EV_A_ w);
  1615. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  1616. rspamd_session_cleanup(task->s, true);
  1617. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1618. rspamd_session_pending(task->s);
  1619. }
  1620. }
  1621. void rspamd_worker_guard_handler(EV_P_ ev_io *w, int revents)
  1622. {
  1623. struct rspamd_task *task = (struct rspamd_task *) w->data;
  1624. char fake_buf[1024];
  1625. gssize r;
  1626. r = read(w->fd, fake_buf, sizeof(fake_buf));
  1627. if (r > 0) {
  1628. msg_warn_task("received extra data after task is loaded, ignoring");
  1629. }
  1630. else {
  1631. if (r == 0) {
  1632. /*
  1633. * Poor man approach, that might break things in case of
  1634. * shutdown (SHUT_WR) but sockets are so bad that there's no
  1635. * reliable way to distinguish between shutdown(SHUT_WR) and
  1636. * close.
  1637. */
  1638. if (task->cmd != CMD_CHECK_V2 && task->cfg->enable_shutdown_workaround) {
  1639. msg_info_task("workaround for shutdown enabled, please update "
  1640. "your client, this support might be removed in future");
  1641. shutdown(w->fd, SHUT_RD);
  1642. ev_io_stop(task->event_loop, &task->guard_ev);
  1643. }
  1644. else {
  1645. msg_err_task("the peer has closed connection unexpectedly");
  1646. rspamd_session_destroy(task->s);
  1647. }
  1648. }
  1649. else if (errno != EAGAIN) {
  1650. msg_err_task("the peer has closed connection unexpectedly: %s",
  1651. strerror(errno));
  1652. rspamd_session_destroy(task->s);
  1653. }
  1654. else {
  1655. return;
  1656. }
  1657. }
  1658. }