Du kannst nicht mehr als 25 Themen auswählen Themen müssen mit entweder einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982
  1. /*
  2. * Copyright 2024 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "task.h"
  17. #include "rspamd.h"
  18. #include "scan_result.h"
  19. #include "libserver/protocol.h"
  20. #include "libserver/protocol_internal.h"
  21. #include "message.h"
  22. #include "lua/lua_common.h"
  23. #include "email_addr.h"
  24. #include "src/libserver/composites/composites.h"
  25. #include "stat_api.h"
  26. #include "unix-std.h"
  27. #include "utlist.h"
  28. #include "libserver/mempool_vars_internal.h"
  29. #include "libserver/cfg_file_private.h"
  30. #include "libmime/lang_detection.h"
  31. #include "libmime/scan_result_private.h"
  32. #include "lua/lua_classnames.h"
  33. #ifdef WITH_JEMALLOC
  34. #include <jemalloc/jemalloc.h>
  35. #else
  36. #if defined(__GLIBC__) && defined(_GNU_SOURCE)
  37. #include <malloc.h>
  38. #endif
  39. #endif
  40. #include <math.h>
  41. #ifdef SYS_ZSTD
  42. #include "zstd.h"
  43. #else
  44. #include "contrib/zstd/zstd.h"
  45. #endif
  46. __KHASH_IMPL(rspamd_req_headers_hash, static inline,
  47. rspamd_ftok_t *, struct rspamd_request_header_chain *, 1,
  48. rspamd_ftok_icase_hash, rspamd_ftok_icase_equal)
  49. static GQuark
  50. rspamd_task_quark(void)
  51. {
  52. return g_quark_from_static_string("task-error");
  53. }
  54. /*
  55. * Create new task
  56. */
  57. struct rspamd_task *
  58. rspamd_task_new(struct rspamd_worker *worker,
  59. struct rspamd_config *cfg,
  60. rspamd_mempool_t *pool,
  61. struct rspamd_lang_detector *lang_det,
  62. struct ev_loop *event_loop,
  63. gboolean debug_mem)
  64. {
  65. struct rspamd_task *new_task;
  66. rspamd_mempool_t *task_pool;
  67. unsigned int flags = RSPAMD_TASK_FLAG_LEARN_AUTO;
  68. if (pool == NULL) {
  69. task_pool = rspamd_mempool_new(rspamd_mempool_suggest_size(),
  70. "task", debug_mem ? RSPAMD_MEMPOOL_DEBUG : 0);
  71. flags |= RSPAMD_TASK_FLAG_OWN_POOL;
  72. }
  73. else {
  74. task_pool = pool;
  75. }
  76. new_task = rspamd_mempool_alloc0(task_pool, sizeof(struct rspamd_task));
  77. new_task->task_pool = task_pool;
  78. new_task->flags = flags;
  79. new_task->worker = worker;
  80. new_task->lang_det = lang_det;
  81. if (cfg) {
  82. new_task->cfg = cfg;
  83. REF_RETAIN(cfg);
  84. if (cfg->check_all_filters) {
  85. new_task->flags |= RSPAMD_TASK_FLAG_PASS_ALL;
  86. }
  87. if (cfg->re_cache) {
  88. new_task->re_rt = rspamd_re_cache_runtime_new(cfg->re_cache);
  89. }
  90. if (new_task->lang_det == NULL && cfg->lang_det != NULL) {
  91. new_task->lang_det = cfg->lang_det;
  92. }
  93. }
  94. new_task->event_loop = event_loop;
  95. new_task->task_timestamp = ev_time();
  96. new_task->time_real_finish = NAN;
  97. new_task->request_headers = kh_init(rspamd_req_headers_hash);
  98. new_task->sock = -1;
  99. new_task->flags |= (RSPAMD_TASK_FLAG_MIME);
  100. /* Default results chain */
  101. rspamd_create_metric_result(new_task, NULL, -1);
  102. new_task->queue_id = "undef";
  103. new_task->messages = ucl_object_typed_new(UCL_OBJECT);
  104. kh_static_init(rspamd_task_lua_cache, &new_task->lua_cache);
  105. return new_task;
  106. }
  107. static void
  108. rspamd_task_reply(struct rspamd_task *task)
  109. {
  110. const ev_tstamp write_timeout = 5.0;
  111. if (task->fin_callback) {
  112. task->fin_callback(task, task->fin_arg);
  113. }
  114. else {
  115. if (!(task->processed_stages & RSPAMD_TASK_STAGE_REPLIED)) {
  116. rspamd_protocol_write_reply(task, write_timeout);
  117. }
  118. }
  119. }
  120. /*
  121. * Called if all filters are processed
  122. * @return TRUE if session should be terminated
  123. */
  124. gboolean
  125. rspamd_task_fin(void *arg)
  126. {
  127. struct rspamd_task *task = (struct rspamd_task *) arg;
  128. /* Task is already finished or skipped */
  129. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  130. rspamd_task_reply(task);
  131. return TRUE;
  132. }
  133. if (!rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL)) {
  134. rspamd_task_reply(task);
  135. return TRUE;
  136. }
  137. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  138. rspamd_task_reply(task);
  139. return TRUE;
  140. }
  141. /* One more iteration */
  142. return FALSE;
  143. }
  144. /*
  145. * Free all structures of worker_task
  146. */
  147. void rspamd_task_free(struct rspamd_task *task)
  148. {
  149. struct rspamd_email_address *addr;
  150. static unsigned int free_iters = 0;
  151. unsigned int i;
  152. if (task) {
  153. debug_task("free pointer %p", task);
  154. if (task->rcpt_envelope) {
  155. for (i = 0; i < task->rcpt_envelope->len; i++) {
  156. addr = g_ptr_array_index(task->rcpt_envelope, i);
  157. rspamd_email_address_free(addr);
  158. }
  159. g_ptr_array_free(task->rcpt_envelope, TRUE);
  160. }
  161. if (task->from_envelope) {
  162. rspamd_email_address_free(task->from_envelope);
  163. }
  164. if (task->from_envelope_orig) {
  165. rspamd_email_address_free(task->from_envelope_orig);
  166. }
  167. if (task->meta_words) {
  168. g_array_free(task->meta_words, TRUE);
  169. }
  170. ucl_object_unref(task->messages);
  171. if (task->re_rt) {
  172. rspamd_re_cache_runtime_destroy(task->re_rt);
  173. }
  174. if (task->http_conn != NULL) {
  175. rspamd_http_connection_reset(task->http_conn);
  176. rspamd_http_connection_unref(task->http_conn);
  177. }
  178. if (task->settings != NULL) {
  179. ucl_object_unref(task->settings);
  180. }
  181. if (task->settings_elt != NULL) {
  182. REF_RELEASE(task->settings_elt);
  183. }
  184. if (task->client_addr) {
  185. rspamd_inet_address_free(task->client_addr);
  186. }
  187. if (task->from_addr) {
  188. rspamd_inet_address_free(task->from_addr);
  189. }
  190. if (task->err) {
  191. g_error_free(task->err);
  192. }
  193. ev_timer_stop(task->event_loop, &task->timeout_ev);
  194. ev_io_stop(task->event_loop, &task->guard_ev);
  195. if (task->sock != -1) {
  196. close(task->sock);
  197. }
  198. if (task->cfg) {
  199. struct rspamd_lua_cached_entry entry;
  200. kh_foreach_value(&task->lua_cache, entry, {
  201. luaL_unref(task->cfg->lua_state,
  202. LUA_REGISTRYINDEX, entry.ref);
  203. });
  204. kh_static_destroy(rspamd_task_lua_cache, &task->lua_cache);
  205. if (task->cfg->full_gc_iters && (++free_iters > task->cfg->full_gc_iters)) {
  206. /* Perform more expensive cleanup cycle */
  207. gsize allocated = 0, active = 0, metadata = 0,
  208. resident = 0, mapped = 0, old_lua_mem = 0;
  209. double t1, t2;
  210. old_lua_mem = lua_gc(task->cfg->lua_state, LUA_GCCOUNT, 0);
  211. t1 = rspamd_get_ticks(FALSE);
  212. #ifdef WITH_JEMALLOC
  213. gsize sz = sizeof(gsize);
  214. mallctl("stats.allocated", &allocated, &sz, NULL, 0);
  215. mallctl("stats.active", &active, &sz, NULL, 0);
  216. mallctl("stats.metadata", &metadata, &sz, NULL, 0);
  217. mallctl("stats.resident", &resident, &sz, NULL, 0);
  218. mallctl("stats.mapped", &mapped, &sz, NULL, 0);
  219. #else
  220. #if defined(__GLIBC__) && defined(_GNU_SOURCE)
  221. malloc_trim(0);
  222. #endif
  223. #endif
  224. lua_gc(task->cfg->lua_state, LUA_GCCOLLECT, 0);
  225. t2 = rspamd_get_ticks(FALSE);
  226. msg_notice_task("perform full gc cycle; memory stats: "
  227. "%Hz allocated, %Hz active, %Hz metadata, %Hz resident, %Hz mapped;"
  228. " lua memory: %z kb -> %d kb; %f ms for gc iter",
  229. allocated, active, metadata, resident, mapped,
  230. old_lua_mem, lua_gc(task->cfg->lua_state, LUA_GCCOUNT, 0),
  231. (t2 - t1) * 1000.0);
  232. free_iters = rspamd_time_jitter(0,
  233. (double) task->cfg->full_gc_iters / 2);
  234. }
  235. REF_RELEASE(task->cfg);
  236. }
  237. kh_destroy(rspamd_req_headers_hash, task->request_headers);
  238. rspamd_message_unref(task->message);
  239. if (task->flags & RSPAMD_TASK_FLAG_OWN_POOL) {
  240. rspamd_mempool_destructors_enforce(task->task_pool);
  241. if (task->symcache_runtime) {
  242. rspamd_symcache_runtime_destroy(task);
  243. }
  244. rspamd_mempool_delete(task->task_pool);
  245. }
  246. else if (task->symcache_runtime) {
  247. rspamd_symcache_runtime_destroy(task);
  248. }
  249. }
  250. }
  251. struct rspamd_task_map {
  252. gpointer begin;
  253. gulong len;
  254. int fd;
  255. };
  256. static void
  257. rspamd_task_unmapper(gpointer ud)
  258. {
  259. struct rspamd_task_map *m = ud;
  260. munmap(m->begin, m->len);
  261. close(m->fd);
  262. }
  263. gboolean
  264. rspamd_task_load_message(struct rspamd_task *task,
  265. struct rspamd_http_message *msg, const char *start, gsize len)
  266. {
  267. unsigned int control_len, r;
  268. struct ucl_parser *parser;
  269. ucl_object_t *control_obj;
  270. char filepath[PATH_MAX], *fp;
  271. int fd, flen;
  272. gulong offset = 0, shmem_size = 0;
  273. rspamd_ftok_t *tok;
  274. gpointer map;
  275. struct stat st;
  276. struct rspamd_task_map *m;
  277. const char *ft;
  278. #ifdef HAVE_SANE_SHMEM
  279. ft = "shm";
  280. #else
  281. ft = "file";
  282. #endif
  283. if (msg) {
  284. rspamd_protocol_handle_headers(task, msg);
  285. }
  286. tok = rspamd_task_get_request_header(task, "shm");
  287. if (tok) {
  288. /* Shared memory part */
  289. r = rspamd_strlcpy(filepath, tok->begin,
  290. MIN(sizeof(filepath), tok->len + 1));
  291. rspamd_url_decode(filepath, filepath, r + 1);
  292. flen = strlen(filepath);
  293. if (filepath[0] == '"' && flen > 2) {
  294. /* We need to unquote filepath */
  295. fp = &filepath[1];
  296. fp[flen - 2] = '\0';
  297. }
  298. else {
  299. fp = &filepath[0];
  300. }
  301. #ifdef HAVE_SANE_SHMEM
  302. fd = shm_open(fp, O_RDONLY, 00600);
  303. #else
  304. fd = open(fp, O_RDONLY, 00600);
  305. #endif
  306. if (fd == -1) {
  307. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  308. "Cannot open %s segment (%s): %s", ft, fp, strerror(errno));
  309. return FALSE;
  310. }
  311. if (fstat(fd, &st) == -1) {
  312. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  313. "Cannot stat %s segment (%s): %s", ft, fp, strerror(errno));
  314. close(fd);
  315. return FALSE;
  316. }
  317. map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  318. if (map == MAP_FAILED) {
  319. close(fd);
  320. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  321. "Cannot mmap %s (%s): %s", ft, fp, strerror(errno));
  322. return FALSE;
  323. }
  324. tok = rspamd_task_get_request_header(task, "shm-offset");
  325. if (tok) {
  326. rspamd_strtoul(tok->begin, tok->len, &offset);
  327. if (offset > (gulong) st.st_size) {
  328. msg_err_task("invalid offset %ul (%ul available) for shm "
  329. "segment %s",
  330. offset, (gulong) st.st_size, fp);
  331. munmap(map, st.st_size);
  332. close(fd);
  333. return FALSE;
  334. }
  335. }
  336. tok = rspamd_task_get_request_header(task, "shm-length");
  337. shmem_size = st.st_size;
  338. if (tok) {
  339. rspamd_strtoul(tok->begin, tok->len, &shmem_size);
  340. if (shmem_size > (gulong) st.st_size) {
  341. msg_err_task("invalid length %ul (%ul available) for %s "
  342. "segment %s",
  343. shmem_size, (gulong) st.st_size, ft, fp);
  344. munmap(map, st.st_size);
  345. close(fd);
  346. return FALSE;
  347. }
  348. }
  349. task->msg.begin = ((unsigned char *) map) + offset;
  350. task->msg.len = shmem_size;
  351. m = rspamd_mempool_alloc(task->task_pool, sizeof(*m));
  352. m->begin = map;
  353. m->len = st.st_size;
  354. m->fd = fd;
  355. msg_info_task("loaded message from shared memory %s (%ul size, %ul offset), fd=%d",
  356. fp, shmem_size, offset, fd);
  357. rspamd_mempool_add_destructor(task->task_pool, rspamd_task_unmapper, m);
  358. }
  359. else {
  360. /* Try file */
  361. tok = rspamd_task_get_request_header(task, "file");
  362. if (tok == NULL) {
  363. tok = rspamd_task_get_request_header(task, "path");
  364. }
  365. if (tok) {
  366. debug_task("want to scan file %T", tok);
  367. r = rspamd_strlcpy(filepath, tok->begin,
  368. MIN(sizeof(filepath), tok->len + 1));
  369. rspamd_url_decode(filepath, filepath, r + 1);
  370. flen = strlen(filepath);
  371. if (filepath[0] == '"' && flen > 2) {
  372. /* We need to unquote filepath */
  373. fp = &filepath[1];
  374. fp[flen - 2] = '\0';
  375. }
  376. else {
  377. fp = &filepath[0];
  378. }
  379. if (stat(fp, &st) == -1) {
  380. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  381. "Invalid file (%s): %s", fp, strerror(errno));
  382. return FALSE;
  383. }
  384. if (G_UNLIKELY(st.st_size == 0)) {
  385. /* Empty file */
  386. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  387. task->msg.begin = rspamd_mempool_strdup(task->task_pool, "");
  388. task->msg.len = 0;
  389. }
  390. else {
  391. fd = open(fp, O_RDONLY);
  392. if (fd == -1) {
  393. g_set_error(&task->err, rspamd_task_quark(),
  394. RSPAMD_PROTOCOL_ERROR,
  395. "Cannot open file (%s): %s", fp, strerror(errno));
  396. return FALSE;
  397. }
  398. map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  399. if (map == MAP_FAILED) {
  400. close(fd);
  401. g_set_error(&task->err, rspamd_task_quark(),
  402. RSPAMD_PROTOCOL_ERROR,
  403. "Cannot mmap file (%s): %s", fp, strerror(errno));
  404. return FALSE;
  405. }
  406. task->msg.begin = map;
  407. task->msg.len = st.st_size;
  408. m = rspamd_mempool_alloc(task->task_pool, sizeof(*m));
  409. m->begin = map;
  410. m->len = st.st_size;
  411. m->fd = fd;
  412. rspamd_mempool_add_destructor(task->task_pool, rspamd_task_unmapper, m);
  413. }
  414. task->msg.fpath = rspamd_mempool_strdup(task->task_pool, fp);
  415. task->flags |= RSPAMD_TASK_FLAG_FILE;
  416. msg_info_task("loaded message from file %s", fp);
  417. }
  418. else {
  419. /* Plain data */
  420. task->msg.begin = start;
  421. task->msg.len = len;
  422. }
  423. }
  424. debug_task("got input of length %z", task->msg.len);
  425. /* Check compression */
  426. tok = rspamd_task_get_request_header(task, "compression");
  427. if (tok) {
  428. /* Need to uncompress */
  429. rspamd_ftok_t t;
  430. t.begin = "zstd";
  431. t.len = 4;
  432. if (rspamd_ftok_casecmp(tok, &t) == 0) {
  433. ZSTD_DStream *zstream;
  434. ZSTD_inBuffer zin;
  435. ZSTD_outBuffer zout;
  436. unsigned char *out;
  437. gsize outlen, r;
  438. gulong dict_id;
  439. if (!rspamd_libs_reset_decompression(task->cfg->libs_ctx)) {
  440. g_set_error(&task->err, rspamd_task_quark(),
  441. RSPAMD_PROTOCOL_ERROR,
  442. "Cannot decompress, decompressor init failed");
  443. return FALSE;
  444. }
  445. tok = rspamd_task_get_request_header(task, "dictionary");
  446. if (tok != NULL) {
  447. /* We need to use custom dictionary */
  448. if (!rspamd_strtoul(tok->begin, tok->len, &dict_id)) {
  449. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  450. "Non numeric dictionary");
  451. return FALSE;
  452. }
  453. if (!task->cfg->libs_ctx->in_dict) {
  454. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  455. "Unknown dictionary, undefined locally");
  456. return FALSE;
  457. }
  458. if (task->cfg->libs_ctx->in_dict->id != dict_id) {
  459. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  460. "Unknown dictionary, invalid dictionary id");
  461. return FALSE;
  462. }
  463. }
  464. zstream = task->cfg->libs_ctx->in_zstream;
  465. zin.pos = 0;
  466. zin.src = task->msg.begin;
  467. zin.size = task->msg.len;
  468. if ((outlen = ZSTD_getDecompressedSize(task->msg.begin, task->msg.len)) == 0) {
  469. outlen = ZSTD_DStreamOutSize();
  470. }
  471. out = g_malloc(outlen);
  472. zout.dst = out;
  473. zout.pos = 0;
  474. zout.size = outlen;
  475. while (zin.pos < zin.size) {
  476. r = ZSTD_decompressStream(zstream, &zout, &zin);
  477. if (ZSTD_isError(r)) {
  478. g_set_error(&task->err, rspamd_task_quark(),
  479. RSPAMD_PROTOCOL_ERROR,
  480. "Decompression error: %s", ZSTD_getErrorName(r));
  481. return FALSE;
  482. }
  483. if (zout.pos == zout.size) {
  484. /* We need to extend output buffer */
  485. zout.size = zout.size * 2 + 1;
  486. zout.dst = g_realloc(zout.dst, zout.size);
  487. }
  488. }
  489. rspamd_mempool_add_destructor(task->task_pool, g_free, zout.dst);
  490. task->msg.begin = zout.dst;
  491. task->msg.len = zout.pos;
  492. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_COMPRESSED;
  493. msg_info_task("loaded message from zstd compressed stream; "
  494. "compressed: %ul; uncompressed: %ul",
  495. (gulong) zin.size, (gulong) zout.pos);
  496. }
  497. else {
  498. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  499. "Invalid compression method");
  500. return FALSE;
  501. }
  502. }
  503. if (task->msg.len == 0) {
  504. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  505. }
  506. if (task->protocol_flags & RSPAMD_TASK_PROTOCOL_FLAG_HAS_CONTROL) {
  507. rspamd_ftok_t *hv = rspamd_task_get_request_header(task, MLEN_HEADER);
  508. gulong message_len = 0;
  509. if (!hv || !rspamd_strtoul(hv->begin, hv->len, &message_len) ||
  510. task->msg.len < message_len) {
  511. msg_warn_task("message has invalid message length: %ul and total len: %ul",
  512. message_len, task->msg.len);
  513. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  514. "Invalid length");
  515. return FALSE;
  516. }
  517. control_len = task->msg.len - message_len;
  518. if (control_len > 0) {
  519. parser = ucl_parser_new(UCL_PARSER_KEY_LOWERCASE);
  520. if (!ucl_parser_add_chunk(parser, task->msg.begin, control_len)) {
  521. msg_warn_task("processing of control chunk failed: %s",
  522. ucl_parser_get_error(parser));
  523. ucl_parser_free(parser);
  524. }
  525. else {
  526. control_obj = ucl_parser_get_object(parser);
  527. ucl_parser_free(parser);
  528. rspamd_protocol_handle_control(task, control_obj);
  529. ucl_object_unref(control_obj);
  530. }
  531. task->msg.begin += control_len;
  532. task->msg.len -= control_len;
  533. }
  534. }
  535. return TRUE;
  536. }
  537. static unsigned int
  538. rspamd_task_select_processing_stage(struct rspamd_task *task, unsigned int stages)
  539. {
  540. unsigned int st, mask;
  541. mask = task->processed_stages;
  542. if (mask == 0) {
  543. st = 0;
  544. }
  545. else {
  546. for (st = 1; mask != 1; st++) {
  547. mask = mask >> 1u;
  548. }
  549. }
  550. st = 1 << st;
  551. if (stages & st) {
  552. return st;
  553. }
  554. else if (st < RSPAMD_TASK_STAGE_DONE) {
  555. /* We assume that the stage that was not requested is done */
  556. task->processed_stages |= st;
  557. return rspamd_task_select_processing_stage(task, stages);
  558. }
  559. /* We are done */
  560. return RSPAMD_TASK_STAGE_DONE;
  561. }
  562. gboolean
  563. rspamd_task_process(struct rspamd_task *task, unsigned int stages)
  564. {
  565. unsigned int st;
  566. gboolean ret = TRUE, all_done = TRUE;
  567. GError *stat_error = NULL;
  568. /* Avoid nested calls */
  569. if (task->flags & RSPAMD_TASK_FLAG_PROCESSING) {
  570. return TRUE;
  571. }
  572. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  573. return TRUE;
  574. }
  575. task->flags |= RSPAMD_TASK_FLAG_PROCESSING;
  576. st = rspamd_task_select_processing_stage(task, stages);
  577. switch (st) {
  578. case RSPAMD_TASK_STAGE_CONNFILTERS:
  579. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  580. break;
  581. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  582. if (!rspamd_message_parse(task)) {
  583. ret = FALSE;
  584. }
  585. break;
  586. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  587. if (!(task->flags & RSPAMD_TASK_FLAG_SKIP_PROCESS)) {
  588. rspamd_message_process(task);
  589. }
  590. break;
  591. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  592. case RSPAMD_TASK_STAGE_FILTERS:
  593. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  594. break;
  595. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  596. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  597. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  598. if (!RSPAMD_TASK_IS_EMPTY(task)) {
  599. if (rspamd_stat_classify(task, task->cfg->lua_state, st, &stat_error) ==
  600. RSPAMD_STAT_PROCESS_ERROR) {
  601. msg_err_task("classify error: %e", stat_error);
  602. g_error_free(stat_error);
  603. }
  604. }
  605. break;
  606. case RSPAMD_TASK_STAGE_COMPOSITES:
  607. rspamd_composites_process_task(task);
  608. task->result->nresults_postfilters = task->result->nresults;
  609. break;
  610. case RSPAMD_TASK_STAGE_POST_FILTERS:
  611. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache,
  612. st);
  613. if (all_done) {
  614. rspamd_task_result_adjust_grow_factor(task, task->result, task->cfg->grow_factor);
  615. }
  616. if (all_done && (task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO) &&
  617. !RSPAMD_TASK_IS_EMPTY(task) &&
  618. !(task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM | RSPAMD_TASK_FLAG_LEARN_HAM))) {
  619. rspamd_stat_check_autolearn(task);
  620. }
  621. break;
  622. case RSPAMD_TASK_STAGE_LEARN:
  623. case RSPAMD_TASK_STAGE_LEARN_PRE:
  624. case RSPAMD_TASK_STAGE_LEARN_POST:
  625. if (task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM | RSPAMD_TASK_FLAG_LEARN_HAM)) {
  626. if (task->err == NULL) {
  627. if (!rspamd_stat_learn(task,
  628. task->flags & RSPAMD_TASK_FLAG_LEARN_SPAM,
  629. task->cfg->lua_state, task->classifier,
  630. st, &stat_error)) {
  631. if (stat_error == NULL) {
  632. g_set_error(&stat_error,
  633. g_quark_from_static_string("stat"), 500,
  634. "Unknown statistics error, found on stage %s;"
  635. " classifier: %s",
  636. rspamd_task_stage_name(st), task->classifier);
  637. }
  638. if (stat_error->code >= 400) {
  639. msg_err_task("learn error: %e", stat_error);
  640. }
  641. else {
  642. msg_notice_task("skip learning: %e", stat_error);
  643. }
  644. if (!(task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO)) {
  645. task->err = stat_error;
  646. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  647. }
  648. else {
  649. /* Do not skip idempotent in case of learn error */
  650. if (stat_error) {
  651. g_error_free(stat_error);
  652. }
  653. task->processed_stages |= RSPAMD_TASK_STAGE_LEARN |
  654. RSPAMD_TASK_STAGE_LEARN_PRE |
  655. RSPAMD_TASK_STAGE_LEARN_POST;
  656. }
  657. }
  658. }
  659. }
  660. break;
  661. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  662. /* Second run of composites processing before idempotent filters (if needed) */
  663. if (task->result->nresults_postfilters != task->result->nresults) {
  664. rspamd_composites_process_task(task);
  665. }
  666. else {
  667. msg_debug_task("skip second run of composites as the result has not been changed");
  668. }
  669. break;
  670. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  671. /* Stop task timeout */
  672. if (ev_can_stop(&task->timeout_ev)) {
  673. ev_timer_stop(task->event_loop, &task->timeout_ev);
  674. }
  675. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  676. break;
  677. case RSPAMD_TASK_STAGE_DONE:
  678. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  679. break;
  680. default:
  681. /* TODO: not implemented stage */
  682. break;
  683. }
  684. if (RSPAMD_TASK_IS_SKIPPED(task)) {
  685. /* Set all bits except idempotent filters */
  686. task->processed_stages |= 0x7FFF;
  687. }
  688. task->flags &= ~RSPAMD_TASK_FLAG_PROCESSING;
  689. if (!ret || RSPAMD_TASK_IS_PROCESSED(task)) {
  690. if (!ret) {
  691. /* Set processed flags */
  692. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  693. }
  694. msg_debug_task("task is processed");
  695. return ret;
  696. }
  697. if (ret) {
  698. if (rspamd_session_events_pending(task->s) != 0) {
  699. /* We have events pending, so we consider this stage as incomplete */
  700. msg_debug_task("need more work on stage %d", st);
  701. }
  702. else {
  703. if (all_done) {
  704. /* Mark the current stage as done and go to the next stage */
  705. msg_debug_task("completed stage %d", st);
  706. task->processed_stages |= st;
  707. }
  708. else {
  709. msg_debug_task("need more processing on stage %d", st);
  710. }
  711. /* Tail recursion */
  712. return rspamd_task_process(task, stages);
  713. }
  714. }
  715. return ret;
  716. }
  717. struct rspamd_email_address *
  718. rspamd_task_get_sender(struct rspamd_task *task)
  719. {
  720. return task->from_envelope;
  721. }
  722. static const char *
  723. rspamd_task_cache_principal_recipient(struct rspamd_task *task,
  724. const char *rcpt, gsize len)
  725. {
  726. char *rcpt_lc;
  727. if (rcpt == NULL) {
  728. return NULL;
  729. }
  730. rcpt_lc = rspamd_mempool_alloc(task->task_pool, len + 1);
  731. rspamd_strlcpy(rcpt_lc, rcpt, len + 1);
  732. rspamd_str_lc(rcpt_lc, len);
  733. rspamd_mempool_set_variable(task->task_pool,
  734. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT, rcpt_lc, NULL);
  735. return rcpt_lc;
  736. }
  737. const char *
  738. rspamd_task_get_principal_recipient(struct rspamd_task *task)
  739. {
  740. const char *val;
  741. struct rspamd_email_address *addr;
  742. unsigned int i;
  743. val = rspamd_mempool_get_variable(task->task_pool,
  744. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT);
  745. if (val) {
  746. return val;
  747. }
  748. if (task->deliver_to) {
  749. return rspamd_task_cache_principal_recipient(task, task->deliver_to,
  750. strlen(task->deliver_to));
  751. }
  752. if (task->rcpt_envelope != NULL) {
  753. PTR_ARRAY_FOREACH(task->rcpt_envelope, i, addr)
  754. {
  755. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  756. return rspamd_task_cache_principal_recipient(task, addr->addr,
  757. addr->addr_len);
  758. }
  759. }
  760. }
  761. GPtrArray *rcpt_mime = MESSAGE_FIELD_CHECK(task, rcpt_mime);
  762. if (rcpt_mime != NULL && rcpt_mime->len > 0) {
  763. PTR_ARRAY_FOREACH(rcpt_mime, i, addr)
  764. {
  765. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  766. return rspamd_task_cache_principal_recipient(task, addr->addr,
  767. addr->addr_len);
  768. }
  769. }
  770. }
  771. return NULL;
  772. }
  773. gboolean
  774. rspamd_learn_task_spam(struct rspamd_task *task,
  775. gboolean is_spam,
  776. const char *classifier,
  777. GError **err)
  778. {
  779. /* Disable learn auto flag to avoid bad learn codes */
  780. task->flags &= ~RSPAMD_TASK_FLAG_LEARN_AUTO;
  781. if (is_spam) {
  782. task->flags |= RSPAMD_TASK_FLAG_LEARN_SPAM;
  783. }
  784. else {
  785. task->flags |= RSPAMD_TASK_FLAG_LEARN_HAM;
  786. }
  787. task->classifier = classifier;
  788. return TRUE;
  789. }
  790. static gboolean
  791. rspamd_task_log_check_condition(struct rspamd_task *task,
  792. struct rspamd_log_format *lf)
  793. {
  794. gboolean ret = FALSE;
  795. switch (lf->type) {
  796. case RSPAMD_LOG_MID:
  797. if (MESSAGE_FIELD_CHECK(task, message_id) &&
  798. strcmp(MESSAGE_FIELD(task, message_id), "undef") != 0) {
  799. ret = TRUE;
  800. }
  801. break;
  802. case RSPAMD_LOG_QID:
  803. if (task->queue_id && strcmp(task->queue_id, "undef") != 0) {
  804. ret = TRUE;
  805. }
  806. break;
  807. case RSPAMD_LOG_USER:
  808. if (task->auth_user) {
  809. ret = TRUE;
  810. }
  811. break;
  812. case RSPAMD_LOG_IP:
  813. if (task->from_addr && rspamd_ip_is_valid(task->from_addr)) {
  814. ret = TRUE;
  815. }
  816. break;
  817. case RSPAMD_LOG_SMTP_RCPT:
  818. case RSPAMD_LOG_SMTP_RCPTS:
  819. if (task->rcpt_envelope && task->rcpt_envelope->len > 0) {
  820. ret = TRUE;
  821. }
  822. break;
  823. case RSPAMD_LOG_MIME_RCPT:
  824. case RSPAMD_LOG_MIME_RCPTS:
  825. if (MESSAGE_FIELD_CHECK(task, rcpt_mime) &&
  826. MESSAGE_FIELD(task, rcpt_mime)->len > 0) {
  827. ret = TRUE;
  828. }
  829. break;
  830. case RSPAMD_LOG_SMTP_FROM:
  831. if (task->from_envelope) {
  832. ret = TRUE;
  833. }
  834. break;
  835. case RSPAMD_LOG_MIME_FROM:
  836. if (MESSAGE_FIELD_CHECK(task, from_mime) &&
  837. MESSAGE_FIELD(task, from_mime)->len > 0) {
  838. ret = TRUE;
  839. }
  840. break;
  841. case RSPAMD_LOG_FILENAME:
  842. if (task->msg.fpath) {
  843. ret = TRUE;
  844. }
  845. break;
  846. case RSPAMD_LOG_FORCED_ACTION:
  847. if (task->result->passthrough_result) {
  848. ret = TRUE;
  849. }
  850. break;
  851. case RSPAMD_LOG_SETTINGS_ID:
  852. if (task->settings_elt) {
  853. ret = TRUE;
  854. }
  855. break;
  856. default:
  857. ret = TRUE;
  858. break;
  859. }
  860. return ret;
  861. }
  862. /*
  863. * Sort by symbol's score -> name
  864. */
  865. static int
  866. rspamd_task_compare_log_sym(gconstpointer a, gconstpointer b)
  867. {
  868. const struct rspamd_symbol_result *s1 = *(const struct rspamd_symbol_result **) a,
  869. *s2 = *(const struct rspamd_symbol_result **) b;
  870. double w1, w2;
  871. w1 = fabs(s1->score);
  872. w2 = fabs(s2->score);
  873. if (w1 == w2 && s1->name && s2->name) {
  874. return strcmp(s1->name, s2->name);
  875. }
  876. return (w2 - w1) * 1000.0;
  877. }
  878. static int
  879. rspamd_task_compare_log_group(gconstpointer a, gconstpointer b)
  880. {
  881. const struct rspamd_symbols_group *s1 = *(const struct rspamd_symbols_group **) a,
  882. *s2 = *(const struct rspamd_symbols_group **) b;
  883. return strcmp(s1->name, s2->name);
  884. }
  885. static rspamd_ftok_t
  886. rspamd_task_log_metric_res(struct rspamd_task *task,
  887. struct rspamd_log_format *lf)
  888. {
  889. static char scorebuf[32];
  890. rspamd_ftok_t res = {.begin = NULL, .len = 0};
  891. struct rspamd_scan_result *mres;
  892. gboolean first = TRUE;
  893. rspamd_fstring_t *symbuf;
  894. struct rspamd_symbol_result *sym;
  895. GPtrArray *sorted_symbols;
  896. struct rspamd_action *act;
  897. struct rspamd_symbols_group *gr;
  898. unsigned int i, j;
  899. khiter_t k;
  900. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  901. mres = task->result;
  902. act = rspamd_check_action_metric(task, NULL, NULL);
  903. if (mres != NULL) {
  904. switch (lf->type) {
  905. case RSPAMD_LOG_ISSPAM:
  906. if (RSPAMD_TASK_IS_SKIPPED(task)) {
  907. res.begin = "S";
  908. }
  909. else if (!(act->flags & RSPAMD_ACTION_HAM)) {
  910. res.begin = "T";
  911. }
  912. else {
  913. res.begin = "F";
  914. }
  915. res.len = 1;
  916. break;
  917. case RSPAMD_LOG_ACTION:
  918. res.begin = act->name;
  919. res.len = strlen(res.begin);
  920. break;
  921. case RSPAMD_LOG_SCORES:
  922. res.len = rspamd_snprintf(scorebuf, sizeof(scorebuf), "%.2f/%.2f",
  923. mres->score, rspamd_task_get_required_score(task, mres));
  924. res.begin = scorebuf;
  925. break;
  926. case RSPAMD_LOG_SYMBOLS:
  927. symbuf = rspamd_fstring_sized_new(128);
  928. sorted_symbols = g_ptr_array_sized_new(kh_size(mres->symbols));
  929. kh_foreach_value(mres->symbols, sym, {
  930. if (!(sym->flags & RSPAMD_SYMBOL_RESULT_IGNORED)) {
  931. g_ptr_array_add(sorted_symbols, (gpointer) sym);
  932. }
  933. });
  934. g_ptr_array_sort(sorted_symbols, rspamd_task_compare_log_sym);
  935. for (i = 0; i < sorted_symbols->len; i++) {
  936. sym = g_ptr_array_index(sorted_symbols, i);
  937. if (first) {
  938. rspamd_printf_fstring(&symbuf, "%s", sym->name);
  939. }
  940. else {
  941. rspamd_printf_fstring(&symbuf, ",%s", sym->name);
  942. }
  943. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_SCORES) {
  944. rspamd_printf_fstring(&symbuf, "(%.2f)", sym->score);
  945. }
  946. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_PARAMS) {
  947. rspamd_printf_fstring(&symbuf, "{");
  948. if (sym->options) {
  949. struct rspamd_symbol_option *opt;
  950. j = 0;
  951. DL_FOREACH(sym->opts_head, opt)
  952. {
  953. rspamd_printf_fstring(&symbuf, "%*s;",
  954. (int) opt->optlen, opt->option);
  955. if (j >= max_log_elts && opt->next) {
  956. rspamd_printf_fstring(&symbuf, "...;");
  957. break;
  958. }
  959. j++;
  960. }
  961. }
  962. rspamd_printf_fstring(&symbuf, "}");
  963. }
  964. first = FALSE;
  965. }
  966. g_ptr_array_free(sorted_symbols, TRUE);
  967. rspamd_mempool_add_destructor(task->task_pool,
  968. (rspamd_mempool_destruct_t) rspamd_fstring_free,
  969. symbuf);
  970. rspamd_mempool_notify_alloc(task->task_pool, symbuf->len);
  971. res.begin = symbuf->str;
  972. res.len = symbuf->len;
  973. break;
  974. case RSPAMD_LOG_GROUPS:
  975. case RSPAMD_LOG_PUBLIC_GROUPS:
  976. symbuf = rspamd_fstring_sized_new(128);
  977. sorted_symbols = g_ptr_array_sized_new(kh_size(mres->sym_groups));
  978. kh_foreach_key(mres->sym_groups, gr, {
  979. if (!(gr->flags & RSPAMD_SYMBOL_GROUP_PUBLIC)) {
  980. if (lf->type == RSPAMD_LOG_PUBLIC_GROUPS) {
  981. continue;
  982. }
  983. }
  984. g_ptr_array_add(sorted_symbols, gr);
  985. });
  986. g_ptr_array_sort(sorted_symbols, rspamd_task_compare_log_group);
  987. for (i = 0; i < sorted_symbols->len; i++) {
  988. gr = g_ptr_array_index(sorted_symbols, i);
  989. if (first) {
  990. rspamd_printf_fstring(&symbuf, "%s", gr->name);
  991. }
  992. else {
  993. rspamd_printf_fstring(&symbuf, ",%s", gr->name);
  994. }
  995. k = kh_get(rspamd_symbols_group_hash, mres->sym_groups, gr);
  996. rspamd_printf_fstring(&symbuf, "(%.2f)",
  997. kh_value(mres->sym_groups, k));
  998. first = FALSE;
  999. }
  1000. g_ptr_array_free(sorted_symbols, TRUE);
  1001. rspamd_mempool_add_destructor(task->task_pool,
  1002. (rspamd_mempool_destruct_t) rspamd_fstring_free,
  1003. symbuf);
  1004. rspamd_mempool_notify_alloc(task->task_pool, symbuf->len);
  1005. res.begin = symbuf->str;
  1006. res.len = symbuf->len;
  1007. break;
  1008. default:
  1009. break;
  1010. }
  1011. }
  1012. return res;
  1013. }
  1014. static rspamd_fstring_t *
  1015. rspamd_task_log_write_var(struct rspamd_task *task, rspamd_fstring_t *logbuf,
  1016. const rspamd_ftok_t *var, const rspamd_ftok_t *content)
  1017. {
  1018. rspamd_fstring_t *res = logbuf;
  1019. const char *p, *c, *end;
  1020. if (content == NULL) {
  1021. /* Just output variable */
  1022. res = rspamd_fstring_append(res, var->begin, var->len);
  1023. }
  1024. else {
  1025. /* Replace $ with variable value */
  1026. p = content->begin;
  1027. c = p;
  1028. end = p + content->len;
  1029. while (p < end) {
  1030. if (*p == '$') {
  1031. if (p > c) {
  1032. res = rspamd_fstring_append(res, c, p - c);
  1033. }
  1034. res = rspamd_fstring_append(res, var->begin, var->len);
  1035. p++;
  1036. c = p;
  1037. }
  1038. else {
  1039. p++;
  1040. }
  1041. }
  1042. if (p > c) {
  1043. res = rspamd_fstring_append(res, c, p - c);
  1044. }
  1045. }
  1046. return res;
  1047. }
  1048. static rspamd_fstring_t *
  1049. rspamd_task_write_ialist(struct rspamd_task *task,
  1050. GPtrArray *addrs, int lim,
  1051. struct rspamd_log_format *lf,
  1052. rspamd_fstring_t *logbuf)
  1053. {
  1054. rspamd_fstring_t *res = logbuf, *varbuf;
  1055. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1056. struct rspamd_email_address *addr;
  1057. int i, nchars = 0, wr = 0, cur_chars;
  1058. gboolean has_orig = FALSE;
  1059. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  1060. if (addrs && lim <= 0) {
  1061. lim = addrs->len;
  1062. }
  1063. PTR_ARRAY_FOREACH(addrs, i, addr)
  1064. {
  1065. if (addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL) {
  1066. has_orig = TRUE;
  1067. break;
  1068. }
  1069. }
  1070. varbuf = rspamd_fstring_new();
  1071. PTR_ARRAY_FOREACH(addrs, i, addr)
  1072. {
  1073. if (wr >= lim) {
  1074. break;
  1075. }
  1076. if (has_orig) {
  1077. /* Report merely original addresses */
  1078. if (!(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  1079. continue;
  1080. }
  1081. }
  1082. bool last = i == lim - 1;
  1083. cur_chars = addr->addr_len;
  1084. varbuf = rspamd_fstring_append(varbuf, addr->addr,
  1085. cur_chars);
  1086. nchars += cur_chars;
  1087. wr++;
  1088. if (varbuf->len > 0 && !last) {
  1089. varbuf = rspamd_fstring_append(varbuf, ",", 1);
  1090. }
  1091. if (!last && (wr >= max_log_elts || nchars >= max_log_elts * 16)) {
  1092. varbuf = rspamd_fstring_append(varbuf, "...", 3);
  1093. break;
  1094. }
  1095. }
  1096. if (varbuf->len > 0) {
  1097. var.begin = varbuf->str;
  1098. var.len = varbuf->len;
  1099. res = rspamd_task_log_write_var(task, logbuf,
  1100. &var, (const rspamd_ftok_t *) lf->data);
  1101. }
  1102. rspamd_fstring_free(varbuf);
  1103. return res;
  1104. }
  1105. static rspamd_fstring_t *
  1106. rspamd_task_write_addr_list(struct rspamd_task *task,
  1107. GPtrArray *addrs, int lim,
  1108. struct rspamd_log_format *lf,
  1109. rspamd_fstring_t *logbuf)
  1110. {
  1111. rspamd_fstring_t *res = logbuf, *varbuf;
  1112. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1113. struct rspamd_email_address *addr;
  1114. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  1115. unsigned int i;
  1116. if (lim <= 0) {
  1117. lim = addrs->len;
  1118. }
  1119. varbuf = rspamd_fstring_new();
  1120. for (i = 0; i < lim; i++) {
  1121. addr = g_ptr_array_index(addrs, i);
  1122. bool last = i == lim - 1;
  1123. if (addr->addr) {
  1124. varbuf = rspamd_fstring_append(varbuf, addr->addr, addr->addr_len);
  1125. }
  1126. if (varbuf->len > 0 && !last) {
  1127. varbuf = rspamd_fstring_append(varbuf, ",", 1);
  1128. }
  1129. if (!last && i >= max_log_elts) {
  1130. varbuf = rspamd_fstring_append(varbuf, "...", 3);
  1131. break;
  1132. }
  1133. }
  1134. if (varbuf->len > 0) {
  1135. var.begin = varbuf->str;
  1136. var.len = varbuf->len;
  1137. res = rspamd_task_log_write_var(task, logbuf,
  1138. &var, (const rspamd_ftok_t *) lf->data);
  1139. }
  1140. rspamd_fstring_free(varbuf);
  1141. return res;
  1142. }
  1143. static rspamd_fstring_t *
  1144. rspamd_task_log_variable(struct rspamd_task *task,
  1145. struct rspamd_log_format *lf, rspamd_fstring_t *logbuf)
  1146. {
  1147. rspamd_fstring_t *res = logbuf;
  1148. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1149. static char numbuf[128];
  1150. static const char undef[] = "undef";
  1151. switch (lf->type) {
  1152. /* String vars */
  1153. case RSPAMD_LOG_MID:
  1154. if (MESSAGE_FIELD_CHECK(task, message_id)) {
  1155. var.begin = MESSAGE_FIELD(task, message_id);
  1156. var.len = strlen(var.begin);
  1157. }
  1158. else {
  1159. var.begin = undef;
  1160. var.len = sizeof(undef) - 1;
  1161. }
  1162. break;
  1163. case RSPAMD_LOG_QID:
  1164. if (task->queue_id) {
  1165. var.begin = task->queue_id;
  1166. var.len = strlen(var.begin);
  1167. }
  1168. else {
  1169. var.begin = undef;
  1170. var.len = sizeof(undef) - 1;
  1171. }
  1172. break;
  1173. case RSPAMD_LOG_USER:
  1174. if (task->auth_user) {
  1175. var.begin = task->auth_user;
  1176. var.len = strlen(var.begin);
  1177. }
  1178. else {
  1179. var.begin = undef;
  1180. var.len = sizeof(undef) - 1;
  1181. }
  1182. break;
  1183. case RSPAMD_LOG_IP:
  1184. if (task->from_addr && rspamd_ip_is_valid(task->from_addr)) {
  1185. var.begin = rspamd_inet_address_to_string(task->from_addr);
  1186. var.len = strlen(var.begin);
  1187. }
  1188. else {
  1189. var.begin = undef;
  1190. var.len = sizeof(undef) - 1;
  1191. }
  1192. break;
  1193. /* Numeric vars */
  1194. case RSPAMD_LOG_LEN:
  1195. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%uz",
  1196. task->msg.len);
  1197. var.begin = numbuf;
  1198. break;
  1199. case RSPAMD_LOG_DNS_REQ:
  1200. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%uD",
  1201. task->dns_requests);
  1202. var.begin = numbuf;
  1203. break;
  1204. case RSPAMD_LOG_TIME_REAL:
  1205. case RSPAMD_LOG_TIME_VIRTUAL:
  1206. var.begin = rspamd_log_check_time(task->task_timestamp,
  1207. task->time_real_finish,
  1208. task->cfg->clock_res);
  1209. var.len = strlen(var.begin);
  1210. break;
  1211. /* InternetAddress vars */
  1212. case RSPAMD_LOG_SMTP_FROM:
  1213. if (task->from_envelope) {
  1214. var.begin = task->from_envelope->addr;
  1215. var.len = task->from_envelope->addr_len;
  1216. }
  1217. break;
  1218. case RSPAMD_LOG_MIME_FROM:
  1219. if (MESSAGE_FIELD_CHECK(task, from_mime)) {
  1220. return rspamd_task_write_ialist(task,
  1221. MESSAGE_FIELD(task, from_mime),
  1222. 1,
  1223. lf,
  1224. logbuf);
  1225. }
  1226. break;
  1227. case RSPAMD_LOG_SMTP_RCPT:
  1228. if (task->rcpt_envelope) {
  1229. return rspamd_task_write_addr_list(task, task->rcpt_envelope, 1, lf,
  1230. logbuf);
  1231. }
  1232. break;
  1233. case RSPAMD_LOG_MIME_RCPT:
  1234. if (MESSAGE_FIELD_CHECK(task, rcpt_mime)) {
  1235. return rspamd_task_write_ialist(task,
  1236. MESSAGE_FIELD(task, rcpt_mime),
  1237. 1,
  1238. lf,
  1239. logbuf);
  1240. }
  1241. break;
  1242. case RSPAMD_LOG_SMTP_RCPTS:
  1243. if (task->rcpt_envelope) {
  1244. return rspamd_task_write_addr_list(task, task->rcpt_envelope, -1, lf,
  1245. logbuf);
  1246. }
  1247. break;
  1248. case RSPAMD_LOG_MIME_RCPTS:
  1249. if (MESSAGE_FIELD_CHECK(task, rcpt_mime)) {
  1250. return rspamd_task_write_ialist(task,
  1251. MESSAGE_FIELD(task, rcpt_mime),
  1252. -1, /* All addresses */
  1253. lf,
  1254. logbuf);
  1255. }
  1256. break;
  1257. case RSPAMD_LOG_DIGEST:
  1258. if (task->message) {
  1259. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%*xs",
  1260. (int) sizeof(MESSAGE_FIELD(task, digest)),
  1261. MESSAGE_FIELD(task, digest));
  1262. var.begin = numbuf;
  1263. }
  1264. else {
  1265. var.begin = undef;
  1266. var.len = sizeof(undef) - 1;
  1267. }
  1268. break;
  1269. case RSPAMD_LOG_FILENAME:
  1270. if (task->msg.fpath) {
  1271. var.len = strlen(task->msg.fpath);
  1272. var.begin = task->msg.fpath;
  1273. }
  1274. else {
  1275. var.begin = undef;
  1276. var.len = sizeof(undef) - 1;
  1277. }
  1278. break;
  1279. case RSPAMD_LOG_FORCED_ACTION:
  1280. if (task->result->passthrough_result) {
  1281. struct rspamd_passthrough_result *pr = task->result->passthrough_result;
  1282. if (!isnan(pr->target_score)) {
  1283. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1284. "%s \"%s\"; score=%.2f (set by %s)",
  1285. pr->action->name,
  1286. pr->message,
  1287. pr->target_score,
  1288. pr->module);
  1289. }
  1290. else {
  1291. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1292. "%s \"%s\"; score=nan (set by %s)",
  1293. pr->action->name,
  1294. pr->message,
  1295. pr->module);
  1296. }
  1297. var.begin = numbuf;
  1298. }
  1299. else {
  1300. var.begin = undef;
  1301. var.len = sizeof(undef) - 1;
  1302. }
  1303. break;
  1304. case RSPAMD_LOG_SETTINGS_ID:
  1305. if (task->settings_elt) {
  1306. var.begin = task->settings_elt->name;
  1307. var.len = strlen(task->settings_elt->name);
  1308. }
  1309. else {
  1310. var.begin = undef;
  1311. var.len = sizeof(undef) - 1;
  1312. }
  1313. break;
  1314. case RSPAMD_LOG_MEMPOOL_SIZE:
  1315. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1316. "%Hz",
  1317. rspamd_mempool_get_used_size(task->task_pool));
  1318. var.begin = numbuf;
  1319. break;
  1320. case RSPAMD_LOG_MEMPOOL_WASTE:
  1321. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1322. "%Hz",
  1323. rspamd_mempool_get_wasted_size(task->task_pool));
  1324. var.begin = numbuf;
  1325. break;
  1326. default:
  1327. var = rspamd_task_log_metric_res(task, lf);
  1328. break;
  1329. }
  1330. if (var.len > 0) {
  1331. res = rspamd_task_log_write_var(task, logbuf,
  1332. &var, (const rspamd_ftok_t *) lf->data);
  1333. }
  1334. return res;
  1335. }
  1336. void rspamd_task_write_log(struct rspamd_task *task)
  1337. {
  1338. rspamd_fstring_t *logbuf;
  1339. struct rspamd_log_format *lf;
  1340. struct rspamd_task **ptask;
  1341. const char *lua_str;
  1342. gsize lua_str_len;
  1343. lua_State *L;
  1344. g_assert(task != NULL);
  1345. if (task->cfg->log_format == NULL ||
  1346. (task->flags & RSPAMD_TASK_FLAG_NO_LOG)) {
  1347. msg_debug_task("skip logging due to no log flag");
  1348. return;
  1349. }
  1350. logbuf = rspamd_fstring_sized_new(1000);
  1351. DL_FOREACH(task->cfg->log_format, lf)
  1352. {
  1353. switch (lf->type) {
  1354. case RSPAMD_LOG_STRING:
  1355. logbuf = rspamd_fstring_append(logbuf, lf->data, lf->len);
  1356. break;
  1357. case RSPAMD_LOG_LUA:
  1358. L = task->cfg->lua_state;
  1359. lua_rawgeti(L, LUA_REGISTRYINDEX, GPOINTER_TO_INT(lf->data));
  1360. ptask = lua_newuserdata(L, sizeof(*ptask));
  1361. rspamd_lua_setclass(L, rspamd_task_classname, -1);
  1362. *ptask = task;
  1363. if (lua_pcall(L, 1, 1, 0) != 0) {
  1364. msg_err_task("call to log function failed: %s",
  1365. lua_tostring(L, -1));
  1366. lua_pop(L, 1);
  1367. }
  1368. else {
  1369. lua_str = lua_tolstring(L, -1, &lua_str_len);
  1370. if (lua_str != NULL) {
  1371. logbuf = rspamd_fstring_append(logbuf, lua_str, lua_str_len);
  1372. }
  1373. lua_pop(L, 1);
  1374. }
  1375. break;
  1376. default:
  1377. /* We have a variable in log format */
  1378. if (lf->flags & RSPAMD_LOG_FMT_FLAG_CONDITION) {
  1379. if (!rspamd_task_log_check_condition(task, lf)) {
  1380. continue;
  1381. }
  1382. }
  1383. logbuf = rspamd_task_log_variable(task, lf, logbuf);
  1384. break;
  1385. }
  1386. }
  1387. msg_notice_task("%V", logbuf);
  1388. rspamd_fstring_free(logbuf);
  1389. }
  1390. double
  1391. rspamd_task_get_required_score(struct rspamd_task *task, struct rspamd_scan_result *m)
  1392. {
  1393. if (m == NULL) {
  1394. m = task->result;
  1395. if (m == NULL) {
  1396. return NAN;
  1397. }
  1398. }
  1399. for (unsigned int i = m->nactions; i-- > 0;) {
  1400. struct rspamd_action_config *action_lim = &m->actions_config[i];
  1401. if (!isnan(action_lim->cur_limit) &&
  1402. !(action_lim->action->flags & (RSPAMD_ACTION_NO_THRESHOLD | RSPAMD_ACTION_HAM))) {
  1403. return m->actions_config[i].cur_limit;
  1404. }
  1405. }
  1406. return NAN;
  1407. }
  1408. rspamd_ftok_t *
  1409. rspamd_task_get_request_header(struct rspamd_task *task,
  1410. const char *name)
  1411. {
  1412. struct rspamd_request_header_chain *ret =
  1413. rspamd_task_get_request_header_multiple(task, name);
  1414. if (ret) {
  1415. return ret->hdr;
  1416. }
  1417. return NULL;
  1418. }
  1419. struct rspamd_request_header_chain *
  1420. rspamd_task_get_request_header_multiple(struct rspamd_task *task,
  1421. const char *name)
  1422. {
  1423. struct rspamd_request_header_chain *ret = NULL;
  1424. rspamd_ftok_t srch;
  1425. khiter_t k;
  1426. srch.begin = (char *) name;
  1427. srch.len = strlen(name);
  1428. k = kh_get(rspamd_req_headers_hash, task->request_headers,
  1429. &srch);
  1430. if (k != kh_end(task->request_headers)) {
  1431. ret = kh_value(task->request_headers, k);
  1432. }
  1433. return ret;
  1434. }
  1435. void rspamd_task_add_request_header(struct rspamd_task *task,
  1436. rspamd_ftok_t *name, rspamd_ftok_t *value)
  1437. {
  1438. khiter_t k;
  1439. int res;
  1440. struct rspamd_request_header_chain *chain, *nchain;
  1441. k = kh_put(rspamd_req_headers_hash, task->request_headers,
  1442. name, &res);
  1443. if (res == 0) {
  1444. /* Existing name */
  1445. nchain = rspamd_mempool_alloc(task->task_pool, sizeof(*nchain));
  1446. nchain->hdr = value;
  1447. nchain->next = NULL;
  1448. chain = kh_value(task->request_headers, k);
  1449. /* Slow but OK here */
  1450. LL_APPEND(chain, nchain);
  1451. }
  1452. else {
  1453. nchain = rspamd_mempool_alloc(task->task_pool, sizeof(*nchain));
  1454. nchain->hdr = value;
  1455. nchain->next = NULL;
  1456. kh_value(task->request_headers, k) = nchain;
  1457. }
  1458. }
  1459. void rspamd_task_profile_set(struct rspamd_task *task, const char *key,
  1460. double value)
  1461. {
  1462. GHashTable *tbl;
  1463. double *pval;
  1464. if (key == NULL) {
  1465. return;
  1466. }
  1467. tbl = rspamd_mempool_get_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1468. if (tbl == NULL) {
  1469. tbl = g_hash_table_new(rspamd_str_hash, rspamd_str_equal);
  1470. rspamd_mempool_set_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE,
  1471. tbl, (rspamd_mempool_destruct_t) g_hash_table_unref);
  1472. }
  1473. pval = g_hash_table_lookup(tbl, key);
  1474. if (pval == NULL) {
  1475. pval = rspamd_mempool_alloc(task->task_pool, sizeof(*pval));
  1476. *pval = value;
  1477. g_hash_table_insert(tbl, (void *) key, pval);
  1478. }
  1479. else {
  1480. *pval = value;
  1481. }
  1482. }
  1483. double *
  1484. rspamd_task_profile_get(struct rspamd_task *task, const char *key)
  1485. {
  1486. GHashTable *tbl;
  1487. double *pval = NULL;
  1488. tbl = rspamd_mempool_get_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1489. if (tbl != NULL) {
  1490. pval = g_hash_table_lookup(tbl, key);
  1491. }
  1492. return pval;
  1493. }
  1494. gboolean
  1495. rspamd_task_set_finish_time(struct rspamd_task *task)
  1496. {
  1497. if (isnan(task->time_real_finish)) {
  1498. task->time_real_finish = ev_time();
  1499. return TRUE;
  1500. }
  1501. return FALSE;
  1502. }
  1503. const char *
  1504. rspamd_task_stage_name(enum rspamd_task_stage stg)
  1505. {
  1506. const char *ret = "unknown stage";
  1507. switch (stg) {
  1508. case RSPAMD_TASK_STAGE_CONNECT:
  1509. ret = "connect";
  1510. break;
  1511. case RSPAMD_TASK_STAGE_CONNFILTERS:
  1512. ret = "connection_filter";
  1513. break;
  1514. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  1515. ret = "read_message";
  1516. break;
  1517. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  1518. ret = "prefilters";
  1519. break;
  1520. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  1521. ret = "process_message";
  1522. break;
  1523. case RSPAMD_TASK_STAGE_FILTERS:
  1524. ret = "filters";
  1525. break;
  1526. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  1527. ret = "classifiers_pre";
  1528. break;
  1529. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  1530. ret = "classifiers";
  1531. break;
  1532. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  1533. ret = "classifiers_post";
  1534. break;
  1535. case RSPAMD_TASK_STAGE_COMPOSITES:
  1536. ret = "composites";
  1537. break;
  1538. case RSPAMD_TASK_STAGE_POST_FILTERS:
  1539. ret = "postfilters";
  1540. break;
  1541. case RSPAMD_TASK_STAGE_LEARN_PRE:
  1542. ret = "learn_pre";
  1543. break;
  1544. case RSPAMD_TASK_STAGE_LEARN:
  1545. ret = "learn";
  1546. break;
  1547. case RSPAMD_TASK_STAGE_LEARN_POST:
  1548. ret = "learn_post";
  1549. break;
  1550. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  1551. ret = "composites_post";
  1552. break;
  1553. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  1554. ret = "idempotent";
  1555. break;
  1556. case RSPAMD_TASK_STAGE_DONE:
  1557. ret = "done";
  1558. break;
  1559. case RSPAMD_TASK_STAGE_REPLIED:
  1560. ret = "replied";
  1561. break;
  1562. default:
  1563. break;
  1564. }
  1565. return ret;
  1566. }
  1567. void rspamd_task_timeout(EV_P_ ev_timer *w, int revents)
  1568. {
  1569. struct rspamd_task *task = (struct rspamd_task *) w->data;
  1570. if (!(task->processed_stages & RSPAMD_TASK_STAGE_FILTERS)) {
  1571. ev_now_update_if_cheap(task->event_loop);
  1572. msg_info_task("processing of task time out: %.1fs spent; %.1fs limit; "
  1573. "forced processing",
  1574. ev_now(task->event_loop) - task->task_timestamp,
  1575. w->repeat);
  1576. if (task->cfg->soft_reject_on_timeout) {
  1577. struct rspamd_action *action, *soft_reject;
  1578. action = rspamd_check_action_metric(task, NULL, NULL);
  1579. if (action->action_type != METRIC_ACTION_REJECT) {
  1580. soft_reject = rspamd_config_get_action_by_type(task->cfg,
  1581. METRIC_ACTION_SOFT_REJECT);
  1582. rspamd_add_passthrough_result(task,
  1583. soft_reject,
  1584. 0,
  1585. NAN,
  1586. "timeout processing message",
  1587. "task timeout",
  1588. 0, NULL);
  1589. }
  1590. }
  1591. ev_timer_again(EV_A_ w);
  1592. task->processed_stages |= RSPAMD_TASK_STAGE_FILTERS;
  1593. rspamd_session_cleanup(task->s, true);
  1594. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1595. rspamd_session_pending(task->s);
  1596. }
  1597. else {
  1598. /* Postprocessing timeout */
  1599. msg_info_task("post-processing of task time out: %.1f second spent; forced processing",
  1600. ev_now(task->event_loop) - task->task_timestamp);
  1601. if (task->cfg->soft_reject_on_timeout) {
  1602. struct rspamd_action *action, *soft_reject;
  1603. action = rspamd_check_action_metric(task, NULL, NULL);
  1604. if (action->action_type != METRIC_ACTION_REJECT) {
  1605. soft_reject = rspamd_config_get_action_by_type(task->cfg,
  1606. METRIC_ACTION_SOFT_REJECT);
  1607. rspamd_add_passthrough_result(task,
  1608. soft_reject,
  1609. 0,
  1610. NAN,
  1611. "timeout post-processing message",
  1612. "task timeout",
  1613. 0, NULL);
  1614. }
  1615. }
  1616. ev_timer_stop(EV_A_ w);
  1617. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  1618. rspamd_session_cleanup(task->s, true);
  1619. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1620. rspamd_session_pending(task->s);
  1621. }
  1622. }
  1623. void rspamd_worker_guard_handler(EV_P_ ev_io *w, int revents)
  1624. {
  1625. struct rspamd_task *task = (struct rspamd_task *) w->data;
  1626. char fake_buf[1024];
  1627. gssize r;
  1628. r = read(w->fd, fake_buf, sizeof(fake_buf));
  1629. if (r > 0) {
  1630. msg_warn_task("received extra data after task is loaded, ignoring");
  1631. }
  1632. else {
  1633. if (r == 0) {
  1634. /*
  1635. * Poor man approach, that might break things in case of
  1636. * shutdown (SHUT_WR) but sockets are so bad that there's no
  1637. * reliable way to distinguish between shutdown(SHUT_WR) and
  1638. * close.
  1639. */
  1640. if (task->cmd != CMD_CHECK_V2 && task->cfg->enable_shutdown_workaround) {
  1641. msg_info_task("workaround for shutdown enabled, please update "
  1642. "your client, this support might be removed in future");
  1643. shutdown(w->fd, SHUT_RD);
  1644. ev_io_stop(task->event_loop, &task->guard_ev);
  1645. }
  1646. else {
  1647. msg_err_task("the peer has closed connection unexpectedly");
  1648. rspamd_session_destroy(task->s);
  1649. }
  1650. }
  1651. else if (errno != EAGAIN) {
  1652. msg_err_task("the peer has closed connection unexpectedly: %s",
  1653. strerror(errno));
  1654. rspamd_session_destroy(task->s);
  1655. }
  1656. else {
  1657. return;
  1658. }
  1659. }
  1660. }