You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

task.c 46KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "task.h"
  17. #include "rspamd.h"
  18. #include "scan_result.h"
  19. #include "libserver/protocol.h"
  20. #include "libserver/protocol_internal.h"
  21. #include "message.h"
  22. #include "lua/lua_common.h"
  23. #include "email_addr.h"
  24. #include "src/libserver/composites/composites.h"
  25. #include "stat_api.h"
  26. #include "unix-std.h"
  27. #include "utlist.h"
  28. #include "libserver/mempool_vars_internal.h"
  29. #include "libserver/cfg_file_private.h"
  30. #include "libmime/lang_detection.h"
  31. #include "libmime/scan_result_private.h"
  32. #ifdef WITH_JEMALLOC
  33. #include <jemalloc/jemalloc.h>
  34. #else
  35. # if defined(__GLIBC__) && defined(_GNU_SOURCE)
  36. # include <malloc.h>
  37. # endif
  38. #endif
  39. #include <math.h>
  40. #ifdef SYS_ZSTD
  41. # include "zstd.h"
  42. #else
  43. # include "contrib/zstd/zstd.h"
  44. #endif
  45. __KHASH_IMPL (rspamd_req_headers_hash, static inline,
  46. rspamd_ftok_t *, struct rspamd_request_header_chain *, 1,
  47. rspamd_ftok_icase_hash, rspamd_ftok_icase_equal)
  48. /*
  49. * Do not print more than this amount of elts
  50. */
  51. static const int max_log_elts = 7;
  52. static GQuark
  53. rspamd_task_quark (void)
  54. {
  55. return g_quark_from_static_string ("task-error");
  56. }
  57. /*
  58. * Create new task
  59. */
  60. struct rspamd_task *
  61. rspamd_task_new (struct rspamd_worker *worker,
  62. struct rspamd_config *cfg,
  63. rspamd_mempool_t *pool,
  64. struct rspamd_lang_detector *lang_det,
  65. struct ev_loop *event_loop,
  66. gboolean debug_mem)
  67. {
  68. struct rspamd_task *new_task;
  69. rspamd_mempool_t *task_pool;
  70. guint flags = 0;
  71. if (pool == NULL) {
  72. task_pool = rspamd_mempool_new (rspamd_mempool_suggest_size (),
  73. "task", debug_mem ? RSPAMD_MEMPOOL_DEBUG : 0);
  74. flags |= RSPAMD_TASK_FLAG_OWN_POOL;
  75. }
  76. else {
  77. task_pool = pool;
  78. }
  79. new_task = rspamd_mempool_alloc0 (task_pool, sizeof (struct rspamd_task));
  80. new_task->task_pool = task_pool;
  81. new_task->flags = flags;
  82. new_task->worker = worker;
  83. new_task->lang_det = lang_det;
  84. if (cfg) {
  85. new_task->cfg = cfg;
  86. REF_RETAIN (cfg);
  87. if (cfg->check_all_filters) {
  88. new_task->flags |= RSPAMD_TASK_FLAG_PASS_ALL;
  89. }
  90. if (cfg->re_cache) {
  91. new_task->re_rt = rspamd_re_cache_runtime_new (cfg->re_cache);
  92. }
  93. if (new_task->lang_det == NULL && cfg->lang_det != NULL) {
  94. new_task->lang_det = cfg->lang_det;
  95. }
  96. }
  97. new_task->event_loop = event_loop;
  98. new_task->task_timestamp = ev_time ();
  99. new_task->time_real_finish = NAN;
  100. new_task->request_headers = kh_init (rspamd_req_headers_hash);
  101. new_task->sock = -1;
  102. new_task->flags |= (RSPAMD_TASK_FLAG_MIME);
  103. /* Default results chain */
  104. rspamd_create_metric_result (new_task, NULL, -1);
  105. new_task->queue_id = "undef";
  106. new_task->messages = ucl_object_typed_new (UCL_OBJECT);
  107. new_task->lua_cache = g_hash_table_new (rspamd_str_hash, rspamd_str_equal);
  108. return new_task;
  109. }
  110. static void
  111. rspamd_task_reply (struct rspamd_task *task)
  112. {
  113. const ev_tstamp write_timeout = 5.0;
  114. if (task->fin_callback) {
  115. task->fin_callback (task, task->fin_arg);
  116. }
  117. else {
  118. if (!(task->processed_stages & RSPAMD_TASK_STAGE_REPLIED)) {
  119. rspamd_protocol_write_reply (task, write_timeout);
  120. }
  121. }
  122. }
  123. /*
  124. * Called if all filters are processed
  125. * @return TRUE if session should be terminated
  126. */
  127. gboolean
  128. rspamd_task_fin (void *arg)
  129. {
  130. struct rspamd_task *task = (struct rspamd_task *) arg;
  131. /* Task is already finished or skipped */
  132. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  133. rspamd_task_reply (task);
  134. return TRUE;
  135. }
  136. if (!rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL)) {
  137. rspamd_task_reply (task);
  138. return TRUE;
  139. }
  140. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  141. rspamd_task_reply (task);
  142. return TRUE;
  143. }
  144. /* One more iteration */
  145. return FALSE;
  146. }
  147. /*
  148. * Called if session was restored inside fin callback
  149. */
  150. void
  151. rspamd_task_restore (void *arg)
  152. {
  153. /* XXX: not needed now ? */
  154. }
  155. /*
  156. * Free all structures of worker_task
  157. */
  158. void
  159. rspamd_task_free (struct rspamd_task *task)
  160. {
  161. struct rspamd_email_address *addr;
  162. struct rspamd_lua_cached_entry *entry;
  163. static guint free_iters = 0;
  164. GHashTableIter it;
  165. gpointer k, v;
  166. guint i;
  167. if (task) {
  168. debug_task ("free pointer %p", task);
  169. if (task->rcpt_envelope) {
  170. for (i = 0; i < task->rcpt_envelope->len; i ++) {
  171. addr = g_ptr_array_index (task->rcpt_envelope, i);
  172. rspamd_email_address_free (addr);
  173. }
  174. g_ptr_array_free (task->rcpt_envelope, TRUE);
  175. }
  176. if (task->from_envelope) {
  177. rspamd_email_address_free (task->from_envelope);
  178. }
  179. if (task->from_envelope_orig) {
  180. rspamd_email_address_free (task->from_envelope_orig);
  181. }
  182. if (task->meta_words) {
  183. g_array_free (task->meta_words, TRUE);
  184. }
  185. ucl_object_unref (task->messages);
  186. if (task->re_rt) {
  187. rspamd_re_cache_runtime_destroy (task->re_rt);
  188. }
  189. if (task->http_conn != NULL) {
  190. rspamd_http_connection_reset (task->http_conn);
  191. rspamd_http_connection_unref (task->http_conn);
  192. }
  193. if (task->settings != NULL) {
  194. ucl_object_unref (task->settings);
  195. }
  196. if (task->settings_elt != NULL) {
  197. REF_RELEASE (task->settings_elt);
  198. }
  199. if (task->client_addr) {
  200. rspamd_inet_address_free (task->client_addr);
  201. }
  202. if (task->from_addr) {
  203. rspamd_inet_address_free (task->from_addr);
  204. }
  205. if (task->err) {
  206. g_error_free (task->err);
  207. }
  208. ev_timer_stop (task->event_loop, &task->timeout_ev);
  209. ev_io_stop (task->event_loop, &task->guard_ev);
  210. if (task->sock != -1) {
  211. close (task->sock);
  212. }
  213. if (task->cfg) {
  214. if (task->lua_cache) {
  215. g_hash_table_iter_init (&it, task->lua_cache);
  216. while (g_hash_table_iter_next (&it, &k, &v)) {
  217. entry = (struct rspamd_lua_cached_entry *)v;
  218. luaL_unref (task->cfg->lua_state,
  219. LUA_REGISTRYINDEX, entry->ref);
  220. }
  221. g_hash_table_unref (task->lua_cache);
  222. }
  223. if (task->cfg->full_gc_iters && (++free_iters > task->cfg->full_gc_iters)) {
  224. /* Perform more expensive cleanup cycle */
  225. gsize allocated = 0, active = 0, metadata = 0,
  226. resident = 0, mapped = 0, old_lua_mem = 0;
  227. gdouble t1, t2;
  228. old_lua_mem = lua_gc (task->cfg->lua_state, LUA_GCCOUNT, 0);
  229. t1 = rspamd_get_ticks (FALSE);
  230. #ifdef WITH_JEMALLOC
  231. gsize sz = sizeof (gsize);
  232. mallctl ("stats.allocated", &allocated, &sz, NULL, 0);
  233. mallctl ("stats.active", &active, &sz, NULL, 0);
  234. mallctl ("stats.metadata", &metadata, &sz, NULL, 0);
  235. mallctl ("stats.resident", &resident, &sz, NULL, 0);
  236. mallctl ("stats.mapped", &mapped, &sz, NULL, 0);
  237. #else
  238. # if defined(__GLIBC__) && defined(_GNU_SOURCE)
  239. malloc_trim (0);
  240. # endif
  241. #endif
  242. lua_gc (task->cfg->lua_state, LUA_GCCOLLECT, 0);
  243. t2 = rspamd_get_ticks (FALSE);
  244. msg_notice_task ("perform full gc cycle; memory stats: "
  245. "%Hz allocated, %Hz active, %Hz metadata, %Hz resident, %Hz mapped;"
  246. " lua memory: %z kb -> %d kb; %f ms for gc iter",
  247. allocated, active, metadata, resident, mapped,
  248. old_lua_mem, lua_gc (task->cfg->lua_state, LUA_GCCOUNT, 0),
  249. (t2 - t1) * 1000.0);
  250. free_iters = rspamd_time_jitter (0,
  251. (gdouble)task->cfg->full_gc_iters / 2);
  252. }
  253. REF_RELEASE (task->cfg);
  254. }
  255. kh_destroy (rspamd_req_headers_hash, task->request_headers);
  256. rspamd_message_unref (task->message);
  257. if (task->flags & RSPAMD_TASK_FLAG_OWN_POOL) {
  258. rspamd_mempool_delete (task->task_pool);
  259. }
  260. }
  261. }
  262. struct rspamd_task_map {
  263. gpointer begin;
  264. gulong len;
  265. gint fd;
  266. };
  267. static void
  268. rspamd_task_unmapper (gpointer ud)
  269. {
  270. struct rspamd_task_map *m = ud;
  271. munmap (m->begin, m->len);
  272. close (m->fd);
  273. }
  274. gboolean
  275. rspamd_task_load_message (struct rspamd_task *task,
  276. struct rspamd_http_message *msg, const gchar *start, gsize len)
  277. {
  278. guint control_len, r;
  279. struct ucl_parser *parser;
  280. ucl_object_t *control_obj;
  281. gchar filepath[PATH_MAX], *fp;
  282. gint fd, flen;
  283. gulong offset = 0, shmem_size = 0;
  284. rspamd_ftok_t *tok;
  285. gpointer map;
  286. struct stat st;
  287. struct rspamd_task_map *m;
  288. const gchar *ft;
  289. #ifdef HAVE_SANE_SHMEM
  290. ft = "shm";
  291. #else
  292. ft = "file";
  293. #endif
  294. if (msg) {
  295. rspamd_protocol_handle_headers (task, msg);
  296. }
  297. tok = rspamd_task_get_request_header (task, "shm");
  298. if (tok) {
  299. /* Shared memory part */
  300. r = rspamd_strlcpy (filepath, tok->begin,
  301. MIN (sizeof (filepath), tok->len + 1));
  302. rspamd_url_decode (filepath, filepath, r + 1);
  303. flen = strlen (filepath);
  304. if (filepath[0] == '"' && flen > 2) {
  305. /* We need to unquote filepath */
  306. fp = &filepath[1];
  307. fp[flen - 2] = '\0';
  308. }
  309. else {
  310. fp = &filepath[0];
  311. }
  312. #ifdef HAVE_SANE_SHMEM
  313. fd = shm_open (fp, O_RDONLY, 00600);
  314. #else
  315. fd = open (fp, O_RDONLY, 00600);
  316. #endif
  317. if (fd == -1) {
  318. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  319. "Cannot open %s segment (%s): %s", ft, fp, strerror (errno));
  320. return FALSE;
  321. }
  322. if (fstat (fd, &st) == -1) {
  323. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  324. "Cannot stat %s segment (%s): %s", ft, fp, strerror (errno));
  325. close (fd);
  326. return FALSE;
  327. }
  328. map = mmap (NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  329. if (map == MAP_FAILED) {
  330. close (fd);
  331. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  332. "Cannot mmap %s (%s): %s", ft, fp, strerror (errno));
  333. return FALSE;
  334. }
  335. tok = rspamd_task_get_request_header (task, "shm-offset");
  336. if (tok) {
  337. rspamd_strtoul (tok->begin, tok->len, &offset);
  338. if (offset > (gulong)st.st_size) {
  339. msg_err_task ("invalid offset %ul (%ul available) for shm "
  340. "segment %s", offset, (gulong)st.st_size, fp);
  341. munmap (map, st.st_size);
  342. close (fd);
  343. return FALSE;
  344. }
  345. }
  346. tok = rspamd_task_get_request_header (task, "shm-length");
  347. shmem_size = st.st_size;
  348. if (tok) {
  349. rspamd_strtoul (tok->begin, tok->len, &shmem_size);
  350. if (shmem_size > (gulong)st.st_size) {
  351. msg_err_task ("invalid length %ul (%ul available) for %s "
  352. "segment %s", shmem_size, (gulong)st.st_size, ft, fp);
  353. munmap (map, st.st_size);
  354. close (fd);
  355. return FALSE;
  356. }
  357. }
  358. task->msg.begin = ((guchar *)map) + offset;
  359. task->msg.len = shmem_size;
  360. m = rspamd_mempool_alloc (task->task_pool, sizeof (*m));
  361. m->begin = map;
  362. m->len = st.st_size;
  363. m->fd = fd;
  364. msg_info_task ("loaded message from shared memory %s (%ul size, %ul offset), fd=%d",
  365. fp, shmem_size, offset, fd);
  366. rspamd_mempool_add_destructor (task->task_pool, rspamd_task_unmapper, m);
  367. return TRUE;
  368. }
  369. tok = rspamd_task_get_request_header (task, "file");
  370. if (tok == NULL) {
  371. tok = rspamd_task_get_request_header (task, "path");
  372. }
  373. if (tok) {
  374. debug_task ("want to scan file %T", tok);
  375. r = rspamd_strlcpy (filepath, tok->begin,
  376. MIN (sizeof (filepath), tok->len + 1));
  377. rspamd_url_decode (filepath, filepath, r + 1);
  378. flen = strlen (filepath);
  379. if (filepath[0] == '"' && flen > 2) {
  380. /* We need to unquote filepath */
  381. fp = &filepath[1];
  382. fp[flen - 2] = '\0';
  383. }
  384. else {
  385. fp = &filepath[0];
  386. }
  387. if (stat (fp, &st) == -1) {
  388. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  389. "Invalid file (%s): %s", fp, strerror (errno));
  390. return FALSE;
  391. }
  392. if (G_UNLIKELY (st.st_size == 0)) {
  393. /* Empty file */
  394. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  395. task->msg.begin = rspamd_mempool_strdup (task->task_pool, "");
  396. task->msg.len = 0;
  397. }
  398. else {
  399. fd = open (fp, O_RDONLY);
  400. if (fd == -1) {
  401. g_set_error (&task->err, rspamd_task_quark (),
  402. RSPAMD_PROTOCOL_ERROR,
  403. "Cannot open file (%s): %s", fp, strerror (errno));
  404. return FALSE;
  405. }
  406. map = mmap (NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  407. if (map == MAP_FAILED) {
  408. close (fd);
  409. g_set_error (&task->err, rspamd_task_quark (),
  410. RSPAMD_PROTOCOL_ERROR,
  411. "Cannot mmap file (%s): %s", fp, strerror (errno));
  412. return FALSE;
  413. }
  414. task->msg.begin = map;
  415. task->msg.len = st.st_size;
  416. m = rspamd_mempool_alloc (task->task_pool, sizeof (*m));
  417. m->begin = map;
  418. m->len = st.st_size;
  419. m->fd = fd;
  420. rspamd_mempool_add_destructor (task->task_pool, rspamd_task_unmapper, m);
  421. }
  422. task->msg.fpath = rspamd_mempool_strdup (task->task_pool, fp);
  423. task->flags |= RSPAMD_TASK_FLAG_FILE;
  424. msg_info_task ("loaded message from file %s", fp);
  425. return TRUE;
  426. }
  427. /* Plain data */
  428. debug_task ("got input of length %z", task->msg.len);
  429. /* Check compression */
  430. tok = rspamd_task_get_request_header (task, "compression");
  431. if (tok) {
  432. /* Need to uncompress */
  433. rspamd_ftok_t t;
  434. t.begin = "zstd";
  435. t.len = 4;
  436. if (rspamd_ftok_casecmp (tok, &t) == 0) {
  437. ZSTD_DStream *zstream;
  438. ZSTD_inBuffer zin;
  439. ZSTD_outBuffer zout;
  440. guchar *out;
  441. gsize outlen, r;
  442. gulong dict_id;
  443. if (!rspamd_libs_reset_decompression (task->cfg->libs_ctx)) {
  444. g_set_error (&task->err, rspamd_task_quark(),
  445. RSPAMD_PROTOCOL_ERROR,
  446. "Cannot decompress, decompressor init failed");
  447. return FALSE;
  448. }
  449. tok = rspamd_task_get_request_header (task, "dictionary");
  450. if (tok != NULL) {
  451. /* We need to use custom dictionary */
  452. if (!rspamd_strtoul (tok->begin, tok->len, &dict_id)) {
  453. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  454. "Non numeric dictionary");
  455. return FALSE;
  456. }
  457. if (!task->cfg->libs_ctx->in_dict) {
  458. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  459. "Unknown dictionary, undefined locally");
  460. return FALSE;
  461. }
  462. if (task->cfg->libs_ctx->in_dict->id != dict_id) {
  463. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  464. "Unknown dictionary, invalid dictionary id");
  465. return FALSE;
  466. }
  467. }
  468. zstream = task->cfg->libs_ctx->in_zstream;
  469. zin.pos = 0;
  470. zin.src = start;
  471. zin.size = len;
  472. if ((outlen = ZSTD_getDecompressedSize (start, len)) == 0) {
  473. outlen = ZSTD_DStreamOutSize ();
  474. }
  475. out = g_malloc (outlen);
  476. zout.dst = out;
  477. zout.pos = 0;
  478. zout.size = outlen;
  479. while (zin.pos < zin.size) {
  480. r = ZSTD_decompressStream (zstream, &zout, &zin);
  481. if (ZSTD_isError (r)) {
  482. g_set_error (&task->err, rspamd_task_quark(),
  483. RSPAMD_PROTOCOL_ERROR,
  484. "Decompression error: %s", ZSTD_getErrorName (r));
  485. return FALSE;
  486. }
  487. if (zout.pos == zout.size) {
  488. /* We need to extend output buffer */
  489. zout.size = zout.size * 2 + 1;
  490. zout.dst = g_realloc (zout.dst, zout.size);
  491. }
  492. }
  493. rspamd_mempool_add_destructor (task->task_pool, g_free, zout.dst);
  494. task->msg.begin = zout.dst;
  495. task->msg.len = zout.pos;
  496. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_COMPRESSED;
  497. msg_info_task ("loaded message from zstd compressed stream; "
  498. "compressed: %ul; uncompressed: %ul",
  499. (gulong)zin.size, (gulong)zout.pos);
  500. }
  501. else {
  502. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  503. "Invalid compression method");
  504. return FALSE;
  505. }
  506. }
  507. else {
  508. task->msg.begin = start;
  509. task->msg.len = len;
  510. }
  511. if (task->msg.len == 0) {
  512. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  513. }
  514. if (task->protocol_flags & RSPAMD_TASK_PROTOCOL_FLAG_HAS_CONTROL) {
  515. rspamd_ftok_t *hv = rspamd_task_get_request_header (task, MLEN_HEADER);
  516. gulong message_len = 0;
  517. if (!hv || !rspamd_strtoul (hv->begin, hv->len, &message_len) ||
  518. task->msg.len < message_len) {
  519. msg_warn_task ("message has invalid message length: %ul and total len: %ul",
  520. message_len, task->msg.len);
  521. g_set_error (&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  522. "Invalid length");
  523. return FALSE;
  524. }
  525. control_len = task->msg.len - message_len;
  526. if (control_len > 0) {
  527. parser = ucl_parser_new (UCL_PARSER_KEY_LOWERCASE);
  528. if (!ucl_parser_add_chunk (parser, task->msg.begin, control_len)) {
  529. msg_warn_task ("processing of control chunk failed: %s",
  530. ucl_parser_get_error (parser));
  531. ucl_parser_free (parser);
  532. }
  533. else {
  534. control_obj = ucl_parser_get_object (parser);
  535. ucl_parser_free (parser);
  536. rspamd_protocol_handle_control (task, control_obj);
  537. ucl_object_unref (control_obj);
  538. }
  539. task->msg.begin += control_len;
  540. task->msg.len -= control_len;
  541. }
  542. }
  543. return TRUE;
  544. }
  545. static gint
  546. rspamd_task_select_processing_stage (struct rspamd_task *task, guint stages)
  547. {
  548. gint st, mask;
  549. mask = task->processed_stages;
  550. if (mask == 0) {
  551. st = 0;
  552. }
  553. else {
  554. for (st = 1; mask != 1; st ++) {
  555. mask = (unsigned int)mask >> 1;
  556. }
  557. }
  558. st = 1 << st;
  559. if (stages & st) {
  560. return st;
  561. }
  562. else if (st < RSPAMD_TASK_STAGE_DONE) {
  563. /* We assume that the stage that was not requested is done */
  564. task->processed_stages |= st;
  565. return rspamd_task_select_processing_stage (task, stages);
  566. }
  567. /* We are done */
  568. return RSPAMD_TASK_STAGE_DONE;
  569. }
  570. gboolean
  571. rspamd_task_process (struct rspamd_task *task, guint stages)
  572. {
  573. gint st;
  574. gboolean ret = TRUE, all_done = TRUE;
  575. GError *stat_error = NULL;
  576. /* Avoid nested calls */
  577. if (task->flags & RSPAMD_TASK_FLAG_PROCESSING) {
  578. return TRUE;
  579. }
  580. if (RSPAMD_TASK_IS_PROCESSED (task)) {
  581. return TRUE;
  582. }
  583. task->flags |= RSPAMD_TASK_FLAG_PROCESSING;
  584. st = rspamd_task_select_processing_stage (task, stages);
  585. switch (st) {
  586. case RSPAMD_TASK_STAGE_CONNFILTERS:
  587. all_done = rspamd_symcache_process_symbols (task, task->cfg->cache, st);
  588. break;
  589. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  590. if (!rspamd_message_parse (task)) {
  591. ret = FALSE;
  592. }
  593. break;
  594. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  595. if (!(task->flags & RSPAMD_TASK_FLAG_SKIP_PROCESS)) {
  596. rspamd_message_process (task);
  597. }
  598. break;
  599. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  600. case RSPAMD_TASK_STAGE_FILTERS:
  601. all_done = rspamd_symcache_process_symbols (task, task->cfg->cache, st);
  602. break;
  603. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  604. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  605. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  606. if (!RSPAMD_TASK_IS_EMPTY (task)) {
  607. if (rspamd_stat_classify (task, task->cfg->lua_state, st, &stat_error) ==
  608. RSPAMD_STAT_PROCESS_ERROR) {
  609. msg_err_task ("classify error: %e", stat_error);
  610. g_error_free (stat_error);
  611. }
  612. }
  613. break;
  614. case RSPAMD_TASK_STAGE_COMPOSITES:
  615. rspamd_composites_process_task (task);
  616. task->result->nresults_postfilters = task->result->nresults;
  617. break;
  618. case RSPAMD_TASK_STAGE_POST_FILTERS:
  619. all_done = rspamd_symcache_process_symbols (task, task->cfg->cache,
  620. st);
  621. if (all_done && (task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO) &&
  622. !RSPAMD_TASK_IS_EMPTY (task) &&
  623. !(task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM|RSPAMD_TASK_FLAG_LEARN_HAM))) {
  624. rspamd_stat_check_autolearn (task);
  625. }
  626. break;
  627. case RSPAMD_TASK_STAGE_LEARN:
  628. case RSPAMD_TASK_STAGE_LEARN_PRE:
  629. case RSPAMD_TASK_STAGE_LEARN_POST:
  630. if (task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM|RSPAMD_TASK_FLAG_LEARN_HAM)) {
  631. if (task->err == NULL) {
  632. if (!rspamd_stat_learn (task,
  633. task->flags & RSPAMD_TASK_FLAG_LEARN_SPAM,
  634. task->cfg->lua_state, task->classifier,
  635. st, &stat_error)) {
  636. if (stat_error == NULL) {
  637. g_set_error (&stat_error,
  638. g_quark_from_static_string ("stat"), 500,
  639. "Unknown statistics error, found on stage %s;"
  640. " classifier: %s",
  641. rspamd_task_stage_name (st), task->classifier);
  642. }
  643. if (stat_error->code >= 400) {
  644. msg_err_task ("learn error: %e", stat_error);
  645. }
  646. else {
  647. msg_notice_task ("skip learning: %e", stat_error);
  648. }
  649. if (!(task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO)) {
  650. task->err = stat_error;
  651. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  652. }
  653. else {
  654. /* Do not skip idempotent in case of learn error */
  655. if (stat_error) {
  656. g_error_free (stat_error);
  657. }
  658. task->processed_stages |= RSPAMD_TASK_STAGE_LEARN|
  659. RSPAMD_TASK_STAGE_LEARN_PRE|
  660. RSPAMD_TASK_STAGE_LEARN_POST;
  661. }
  662. }
  663. }
  664. }
  665. break;
  666. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  667. /* Second run of composites processing before idempotent filters (if needed) */
  668. if (task->result->nresults_postfilters != task->result->nresults) {
  669. rspamd_composites_process_task (task);
  670. }
  671. else {
  672. msg_debug_task ("skip second run of composites as the result has not been changed");
  673. }
  674. break;
  675. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  676. /* Stop task timeout */
  677. if (ev_can_stop (&task->timeout_ev)) {
  678. ev_timer_stop (task->event_loop, &task->timeout_ev);
  679. }
  680. all_done = rspamd_symcache_process_symbols (task, task->cfg->cache, st);
  681. break;
  682. case RSPAMD_TASK_STAGE_DONE:
  683. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  684. break;
  685. default:
  686. /* TODO: not implemented stage */
  687. break;
  688. }
  689. if (RSPAMD_TASK_IS_SKIPPED (task)) {
  690. /* Set all bits except idempotent filters */
  691. task->processed_stages |= 0x7FFF;
  692. }
  693. task->flags &= ~RSPAMD_TASK_FLAG_PROCESSING;
  694. if (!ret || RSPAMD_TASK_IS_PROCESSED (task)) {
  695. if (!ret) {
  696. /* Set processed flags */
  697. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  698. }
  699. msg_debug_task ("task is processed");
  700. return ret;
  701. }
  702. if (ret) {
  703. if (rspamd_session_events_pending (task->s) != 0) {
  704. /* We have events pending, so we consider this stage as incomplete */
  705. msg_debug_task ("need more work on stage %d", st);
  706. }
  707. else {
  708. if (all_done) {
  709. /* Mark the current stage as done and go to the next stage */
  710. msg_debug_task ("completed stage %d", st);
  711. task->processed_stages |= st;
  712. }
  713. else {
  714. msg_debug_task ("need more processing on stage %d", st);
  715. }
  716. /* Tail recursion */
  717. return rspamd_task_process (task, stages);
  718. }
  719. }
  720. return ret;
  721. }
  722. struct rspamd_email_address*
  723. rspamd_task_get_sender (struct rspamd_task *task)
  724. {
  725. return task->from_envelope;
  726. }
  727. static const gchar *
  728. rspamd_task_cache_principal_recipient (struct rspamd_task *task,
  729. const gchar *rcpt, gsize len)
  730. {
  731. gchar *rcpt_lc;
  732. if (rcpt == NULL) {
  733. return NULL;
  734. }
  735. rcpt_lc = rspamd_mempool_alloc (task->task_pool, len + 1);
  736. rspamd_strlcpy (rcpt_lc, rcpt, len + 1);
  737. rspamd_str_lc (rcpt_lc, len);
  738. rspamd_mempool_set_variable (task->task_pool,
  739. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT, rcpt_lc, NULL);
  740. return rcpt_lc;
  741. }
  742. const gchar *
  743. rspamd_task_get_principal_recipient (struct rspamd_task *task)
  744. {
  745. const gchar *val;
  746. struct rspamd_email_address *addr;
  747. guint i;
  748. val = rspamd_mempool_get_variable (task->task_pool,
  749. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT);
  750. if (val) {
  751. return val;
  752. }
  753. if (task->deliver_to) {
  754. return rspamd_task_cache_principal_recipient (task, task->deliver_to,
  755. strlen (task->deliver_to));
  756. }
  757. if (task->rcpt_envelope != NULL) {
  758. PTR_ARRAY_FOREACH (task->rcpt_envelope, i, addr) {
  759. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  760. return rspamd_task_cache_principal_recipient (task, addr->addr,
  761. addr->addr_len);
  762. }
  763. }
  764. }
  765. GPtrArray *rcpt_mime = MESSAGE_FIELD_CHECK (task, rcpt_mime);
  766. if (rcpt_mime != NULL && rcpt_mime->len > 0) {
  767. PTR_ARRAY_FOREACH (rcpt_mime, i, addr) {
  768. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  769. return rspamd_task_cache_principal_recipient (task, addr->addr,
  770. addr->addr_len);
  771. }
  772. }
  773. }
  774. return NULL;
  775. }
  776. gboolean
  777. rspamd_learn_task_spam (struct rspamd_task *task,
  778. gboolean is_spam,
  779. const gchar *classifier,
  780. GError **err)
  781. {
  782. if (is_spam) {
  783. task->flags |= RSPAMD_TASK_FLAG_LEARN_SPAM;
  784. }
  785. else {
  786. task->flags |= RSPAMD_TASK_FLAG_LEARN_HAM;
  787. }
  788. task->classifier = classifier;
  789. return TRUE;
  790. }
  791. static gboolean
  792. rspamd_task_log_check_condition (struct rspamd_task *task,
  793. struct rspamd_log_format *lf)
  794. {
  795. gboolean ret = FALSE;
  796. switch (lf->type) {
  797. case RSPAMD_LOG_MID:
  798. if (MESSAGE_FIELD_CHECK (task, message_id) &&
  799. strcmp (MESSAGE_FIELD (task, message_id) , "undef") != 0) {
  800. ret = TRUE;
  801. }
  802. break;
  803. case RSPAMD_LOG_QID:
  804. if (task->queue_id && strcmp (task->queue_id, "undef") != 0) {
  805. ret = TRUE;
  806. }
  807. break;
  808. case RSPAMD_LOG_USER:
  809. if (task->user) {
  810. ret = TRUE;
  811. }
  812. break;
  813. case RSPAMD_LOG_IP:
  814. if (task->from_addr && rspamd_ip_is_valid (task->from_addr)) {
  815. ret = TRUE;
  816. }
  817. break;
  818. case RSPAMD_LOG_SMTP_RCPT:
  819. case RSPAMD_LOG_SMTP_RCPTS:
  820. if (task->rcpt_envelope && task->rcpt_envelope->len > 0) {
  821. ret = TRUE;
  822. }
  823. break;
  824. case RSPAMD_LOG_MIME_RCPT:
  825. case RSPAMD_LOG_MIME_RCPTS:
  826. if (MESSAGE_FIELD_CHECK (task, rcpt_mime) &&
  827. MESSAGE_FIELD (task, rcpt_mime)->len > 0) {
  828. ret = TRUE;
  829. }
  830. break;
  831. case RSPAMD_LOG_SMTP_FROM:
  832. if (task->from_envelope) {
  833. ret = TRUE;
  834. }
  835. break;
  836. case RSPAMD_LOG_MIME_FROM:
  837. if (MESSAGE_FIELD_CHECK (task, from_mime) &&
  838. MESSAGE_FIELD (task, from_mime)->len > 0) {
  839. ret = TRUE;
  840. }
  841. break;
  842. case RSPAMD_LOG_FILENAME:
  843. if (task->msg.fpath) {
  844. ret = TRUE;
  845. }
  846. break;
  847. case RSPAMD_LOG_FORCED_ACTION:
  848. if (task->result->passthrough_result) {
  849. ret = TRUE;
  850. }
  851. break;
  852. case RSPAMD_LOG_SETTINGS_ID:
  853. if (task->settings_elt) {
  854. ret = TRUE;
  855. }
  856. break;
  857. default:
  858. ret = TRUE;
  859. break;
  860. }
  861. return ret;
  862. }
  863. /*
  864. * Sort by symbol's score -> name
  865. */
  866. static gint
  867. rspamd_task_compare_log_sym (gconstpointer a, gconstpointer b)
  868. {
  869. const struct rspamd_symbol_result *s1 = *(const struct rspamd_symbol_result **)a,
  870. *s2 = *(const struct rspamd_symbol_result **)b;
  871. gdouble w1, w2;
  872. w1 = fabs (s1->score);
  873. w2 = fabs (s2->score);
  874. if (w1 == w2 && s1->name && s2->name) {
  875. return strcmp (s1->name, s2->name);
  876. }
  877. return (w2 - w1) * 1000.0;
  878. }
  879. static gint
  880. rspamd_task_compare_log_group (gconstpointer a, gconstpointer b)
  881. {
  882. const struct rspamd_symbols_group *s1 = *(const struct rspamd_symbols_group **)a,
  883. *s2 = *(const struct rspamd_symbols_group **)b;
  884. return strcmp (s1->name, s2->name);
  885. }
  886. static rspamd_ftok_t
  887. rspamd_task_log_metric_res (struct rspamd_task *task,
  888. struct rspamd_log_format *lf)
  889. {
  890. static gchar scorebuf[32];
  891. rspamd_ftok_t res = {.begin = NULL, .len = 0};
  892. struct rspamd_scan_result *mres;
  893. gboolean first = TRUE;
  894. rspamd_fstring_t *symbuf;
  895. struct rspamd_symbol_result *sym;
  896. GPtrArray *sorted_symbols;
  897. struct rspamd_action *act;
  898. struct rspamd_symbols_group *gr;
  899. guint i, j;
  900. khiter_t k;
  901. mres = task->result;
  902. act = rspamd_check_action_metric (task, NULL, NULL);
  903. if (mres != NULL) {
  904. switch (lf->type) {
  905. case RSPAMD_LOG_ISSPAM:
  906. if (RSPAMD_TASK_IS_SKIPPED (task)) {
  907. res.begin = "S";
  908. }
  909. else if (!(act->flags & RSPAMD_ACTION_HAM)) {
  910. res.begin = "T";
  911. }
  912. else {
  913. res.begin = "F";
  914. }
  915. res.len = 1;
  916. break;
  917. case RSPAMD_LOG_ACTION:
  918. res.begin = act->name;
  919. res.len = strlen (res.begin);
  920. break;
  921. case RSPAMD_LOG_SCORES:
  922. res.len = rspamd_snprintf (scorebuf, sizeof (scorebuf), "%.2f/%.2f",
  923. mres->score, rspamd_task_get_required_score (task, mres));
  924. res.begin = scorebuf;
  925. break;
  926. case RSPAMD_LOG_SYMBOLS:
  927. symbuf = rspamd_fstring_sized_new (128);
  928. sorted_symbols = g_ptr_array_sized_new (kh_size (mres->symbols));
  929. kh_foreach_value (mres->symbols, sym, {
  930. if (!(sym->flags & RSPAMD_SYMBOL_RESULT_IGNORED)) {
  931. g_ptr_array_add (sorted_symbols, (gpointer)sym);
  932. }
  933. });
  934. g_ptr_array_sort (sorted_symbols, rspamd_task_compare_log_sym);
  935. for (i = 0; i < sorted_symbols->len; i ++) {
  936. sym = g_ptr_array_index (sorted_symbols, i);
  937. if (first) {
  938. rspamd_printf_fstring (&symbuf, "%s", sym->name);
  939. }
  940. else {
  941. rspamd_printf_fstring (&symbuf, ",%s", sym->name);
  942. }
  943. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_SCORES) {
  944. rspamd_printf_fstring (&symbuf, "(%.2f)", sym->score);
  945. }
  946. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_PARAMS) {
  947. rspamd_printf_fstring (&symbuf, "{");
  948. if (sym->options) {
  949. struct rspamd_symbol_option *opt;
  950. j = 0;
  951. DL_FOREACH (sym->opts_head, opt) {
  952. rspamd_printf_fstring (&symbuf, "%*s;",
  953. (gint)opt->optlen, opt->option);
  954. if (j >= max_log_elts) {
  955. rspamd_printf_fstring (&symbuf, "...;");
  956. break;
  957. }
  958. j ++;
  959. }
  960. }
  961. rspamd_printf_fstring (&symbuf, "}");
  962. }
  963. first = FALSE;
  964. }
  965. g_ptr_array_free (sorted_symbols, TRUE);
  966. rspamd_mempool_add_destructor (task->task_pool,
  967. (rspamd_mempool_destruct_t)rspamd_fstring_free,
  968. symbuf);
  969. rspamd_mempool_notify_alloc (task->task_pool, symbuf->len);
  970. res.begin = symbuf->str;
  971. res.len = symbuf->len;
  972. break;
  973. case RSPAMD_LOG_GROUPS:
  974. case RSPAMD_LOG_PUBLIC_GROUPS:
  975. symbuf = rspamd_fstring_sized_new (128);
  976. sorted_symbols = g_ptr_array_sized_new (kh_size (mres->sym_groups));
  977. kh_foreach_key (mres->sym_groups, gr,{
  978. if (!(gr->flags & RSPAMD_SYMBOL_GROUP_PUBLIC)) {
  979. if (lf->type == RSPAMD_LOG_PUBLIC_GROUPS) {
  980. continue;
  981. }
  982. }
  983. g_ptr_array_add (sorted_symbols, gr);
  984. });
  985. g_ptr_array_sort (sorted_symbols, rspamd_task_compare_log_group);
  986. for (i = 0; i < sorted_symbols->len; i++) {
  987. gr = g_ptr_array_index (sorted_symbols, i);
  988. if (first) {
  989. rspamd_printf_fstring (&symbuf, "%s", gr->name);
  990. }
  991. else {
  992. rspamd_printf_fstring (&symbuf, ",%s", gr->name);
  993. }
  994. k = kh_get (rspamd_symbols_group_hash, mres->sym_groups, gr);
  995. rspamd_printf_fstring (&symbuf, "(%.2f)",
  996. kh_value (mres->sym_groups, k));
  997. first = FALSE;
  998. }
  999. g_ptr_array_free (sorted_symbols, TRUE);
  1000. rspamd_mempool_add_destructor (task->task_pool,
  1001. (rspamd_mempool_destruct_t) rspamd_fstring_free,
  1002. symbuf);
  1003. rspamd_mempool_notify_alloc (task->task_pool, symbuf->len);
  1004. res.begin = symbuf->str;
  1005. res.len = symbuf->len;
  1006. break;
  1007. default:
  1008. break;
  1009. }
  1010. }
  1011. return res;
  1012. }
  1013. static rspamd_fstring_t *
  1014. rspamd_task_log_write_var (struct rspamd_task *task, rspamd_fstring_t *logbuf,
  1015. const rspamd_ftok_t *var, const rspamd_ftok_t *content)
  1016. {
  1017. rspamd_fstring_t *res = logbuf;
  1018. const gchar *p, *c, *end;
  1019. if (content == NULL) {
  1020. /* Just output variable */
  1021. res = rspamd_fstring_append (res, var->begin, var->len);
  1022. }
  1023. else {
  1024. /* Replace $ with variable value */
  1025. p = content->begin;
  1026. c = p;
  1027. end = p + content->len;
  1028. while (p < end) {
  1029. if (*p == '$') {
  1030. if (p > c) {
  1031. res = rspamd_fstring_append (res, c, p - c);
  1032. }
  1033. res = rspamd_fstring_append (res, var->begin, var->len);
  1034. p ++;
  1035. c = p;
  1036. }
  1037. else {
  1038. p ++;
  1039. }
  1040. }
  1041. if (p > c) {
  1042. res = rspamd_fstring_append (res, c, p - c);
  1043. }
  1044. }
  1045. return res;
  1046. }
  1047. static rspamd_fstring_t *
  1048. rspamd_task_write_ialist (struct rspamd_task *task,
  1049. GPtrArray *addrs, gint lim,
  1050. struct rspamd_log_format *lf,
  1051. rspamd_fstring_t *logbuf)
  1052. {
  1053. rspamd_fstring_t *res = logbuf, *varbuf;
  1054. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1055. struct rspamd_email_address *addr;
  1056. gint i, nchars = 0, wr = 0, cur_chars;
  1057. gboolean has_orig = FALSE;
  1058. if (addrs && lim <= 0) {
  1059. lim = addrs->len;
  1060. }
  1061. PTR_ARRAY_FOREACH (addrs, i, addr) {
  1062. if (addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL) {
  1063. has_orig = TRUE;
  1064. break;
  1065. }
  1066. }
  1067. varbuf = rspamd_fstring_new ();
  1068. PTR_ARRAY_FOREACH (addrs, i, addr) {
  1069. if (wr >= lim) {
  1070. break;
  1071. }
  1072. if (has_orig) {
  1073. /* Report merely original addresses */
  1074. if (!(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  1075. continue;
  1076. }
  1077. }
  1078. cur_chars = addr->addr_len;
  1079. varbuf = rspamd_fstring_append (varbuf, addr->addr,
  1080. cur_chars);
  1081. nchars += cur_chars;
  1082. wr ++;
  1083. if (varbuf->len > 0) {
  1084. if (i != lim - 1) {
  1085. varbuf = rspamd_fstring_append (varbuf, ",", 1);
  1086. }
  1087. }
  1088. if (wr >= max_log_elts || nchars >= max_log_elts * 10) {
  1089. varbuf = rspamd_fstring_append (varbuf, "...", 3);
  1090. break;
  1091. }
  1092. }
  1093. if (varbuf->len > 0) {
  1094. var.begin = varbuf->str;
  1095. var.len = varbuf->len;
  1096. res = rspamd_task_log_write_var (task, logbuf,
  1097. &var, (const rspamd_ftok_t *) lf->data);
  1098. }
  1099. rspamd_fstring_free (varbuf);
  1100. return res;
  1101. }
  1102. static rspamd_fstring_t *
  1103. rspamd_task_write_addr_list (struct rspamd_task *task,
  1104. GPtrArray *addrs, gint lim,
  1105. struct rspamd_log_format *lf,
  1106. rspamd_fstring_t *logbuf)
  1107. {
  1108. rspamd_fstring_t *res = logbuf, *varbuf;
  1109. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1110. struct rspamd_email_address *addr;
  1111. gint i;
  1112. if (lim <= 0) {
  1113. lim = addrs->len;
  1114. }
  1115. varbuf = rspamd_fstring_new ();
  1116. for (i = 0; i < lim; i++) {
  1117. addr = g_ptr_array_index (addrs, i);
  1118. if (addr->addr) {
  1119. varbuf = rspamd_fstring_append (varbuf, addr->addr, addr->addr_len);
  1120. }
  1121. if (varbuf->len > 0) {
  1122. if (i != lim - 1) {
  1123. varbuf = rspamd_fstring_append (varbuf, ",", 1);
  1124. }
  1125. }
  1126. if (i >= max_log_elts) {
  1127. varbuf = rspamd_fstring_append (varbuf, "...", 3);
  1128. break;
  1129. }
  1130. }
  1131. if (varbuf->len > 0) {
  1132. var.begin = varbuf->str;
  1133. var.len = varbuf->len;
  1134. res = rspamd_task_log_write_var (task, logbuf,
  1135. &var, (const rspamd_ftok_t *) lf->data);
  1136. }
  1137. rspamd_fstring_free (varbuf);
  1138. return res;
  1139. }
  1140. static rspamd_fstring_t *
  1141. rspamd_task_log_variable (struct rspamd_task *task,
  1142. struct rspamd_log_format *lf, rspamd_fstring_t *logbuf)
  1143. {
  1144. rspamd_fstring_t *res = logbuf;
  1145. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1146. static gchar numbuf[128];
  1147. static const gchar undef[] = "undef";
  1148. switch (lf->type) {
  1149. /* String vars */
  1150. case RSPAMD_LOG_MID:
  1151. if (MESSAGE_FIELD_CHECK (task, message_id)) {
  1152. var.begin = MESSAGE_FIELD (task, message_id);
  1153. var.len = strlen (var.begin);
  1154. }
  1155. else {
  1156. var.begin = undef;
  1157. var.len = sizeof (undef) - 1;
  1158. }
  1159. break;
  1160. case RSPAMD_LOG_QID:
  1161. if (task->queue_id) {
  1162. var.begin = task->queue_id;
  1163. var.len = strlen (var.begin);
  1164. }
  1165. else {
  1166. var.begin = undef;
  1167. var.len = sizeof (undef) - 1;
  1168. }
  1169. break;
  1170. case RSPAMD_LOG_USER:
  1171. if (task->user) {
  1172. var.begin = task->user;
  1173. var.len = strlen (var.begin);
  1174. }
  1175. else {
  1176. var.begin = undef;
  1177. var.len = sizeof (undef) - 1;
  1178. }
  1179. break;
  1180. case RSPAMD_LOG_IP:
  1181. if (task->from_addr && rspamd_ip_is_valid (task->from_addr)) {
  1182. var.begin = rspamd_inet_address_to_string (task->from_addr);
  1183. var.len = strlen (var.begin);
  1184. }
  1185. else {
  1186. var.begin = undef;
  1187. var.len = sizeof (undef) - 1;
  1188. }
  1189. break;
  1190. /* Numeric vars */
  1191. case RSPAMD_LOG_LEN:
  1192. var.len = rspamd_snprintf (numbuf, sizeof (numbuf), "%uz",
  1193. task->msg.len);
  1194. var.begin = numbuf;
  1195. break;
  1196. case RSPAMD_LOG_DNS_REQ:
  1197. var.len = rspamd_snprintf (numbuf, sizeof (numbuf), "%uD",
  1198. task->dns_requests);
  1199. var.begin = numbuf;
  1200. break;
  1201. case RSPAMD_LOG_TIME_REAL:
  1202. var.begin = rspamd_log_check_time (task->task_timestamp,
  1203. task->time_real_finish,
  1204. task->cfg->clock_res);
  1205. var.len = strlen (var.begin);
  1206. break;
  1207. case RSPAMD_LOG_TIME_VIRTUAL:
  1208. var.begin = rspamd_log_check_time (task->task_timestamp,
  1209. task->time_real_finish,
  1210. task->cfg->clock_res);
  1211. var.len = strlen (var.begin);
  1212. break;
  1213. /* InternetAddress vars */
  1214. case RSPAMD_LOG_SMTP_FROM:
  1215. if (task->from_envelope) {
  1216. var.begin = task->from_envelope->addr;
  1217. var.len = task->from_envelope->addr_len;
  1218. }
  1219. break;
  1220. case RSPAMD_LOG_MIME_FROM:
  1221. if (MESSAGE_FIELD_CHECK (task, from_mime)) {
  1222. return rspamd_task_write_ialist (task,
  1223. MESSAGE_FIELD (task, from_mime),
  1224. 1,
  1225. lf,
  1226. logbuf);
  1227. }
  1228. break;
  1229. case RSPAMD_LOG_SMTP_RCPT:
  1230. if (task->rcpt_envelope) {
  1231. return rspamd_task_write_addr_list (task, task->rcpt_envelope, 1, lf,
  1232. logbuf);
  1233. }
  1234. break;
  1235. case RSPAMD_LOG_MIME_RCPT:
  1236. if (MESSAGE_FIELD_CHECK (task, rcpt_mime)) {
  1237. return rspamd_task_write_ialist (task,
  1238. MESSAGE_FIELD (task, rcpt_mime),
  1239. 1,
  1240. lf,
  1241. logbuf);
  1242. }
  1243. break;
  1244. case RSPAMD_LOG_SMTP_RCPTS:
  1245. if (task->rcpt_envelope) {
  1246. return rspamd_task_write_addr_list (task, task->rcpt_envelope, -1, lf,
  1247. logbuf);
  1248. }
  1249. break;
  1250. case RSPAMD_LOG_MIME_RCPTS:
  1251. if (MESSAGE_FIELD_CHECK (task, rcpt_mime)) {
  1252. return rspamd_task_write_ialist (task,
  1253. MESSAGE_FIELD (task, rcpt_mime),
  1254. -1, /* All addresses */
  1255. lf,
  1256. logbuf);
  1257. }
  1258. break;
  1259. case RSPAMD_LOG_DIGEST:
  1260. if (task->message) {
  1261. var.len = rspamd_snprintf (numbuf, sizeof (numbuf), "%*xs",
  1262. (gint) sizeof (MESSAGE_FIELD (task, digest)),
  1263. MESSAGE_FIELD (task, digest));
  1264. var.begin = numbuf;
  1265. }
  1266. else {
  1267. var.begin = undef;
  1268. var.len = sizeof (undef) - 1;
  1269. }
  1270. break;
  1271. case RSPAMD_LOG_FILENAME:
  1272. if (task->msg.fpath) {
  1273. var.len = strlen (task->msg.fpath);
  1274. var.begin = task->msg.fpath;
  1275. }
  1276. else {
  1277. var.begin = undef;
  1278. var.len = sizeof (undef) - 1;
  1279. }
  1280. break;
  1281. case RSPAMD_LOG_FORCED_ACTION:
  1282. if (task->result->passthrough_result) {
  1283. struct rspamd_passthrough_result *pr = task->result->passthrough_result;
  1284. if (!isnan (pr->target_score)) {
  1285. var.len = rspamd_snprintf (numbuf, sizeof (numbuf),
  1286. "%s \"%s\"; score=%.2f (set by %s)",
  1287. pr->action->name,
  1288. pr->message,
  1289. pr->target_score,
  1290. pr->module);
  1291. }
  1292. else {
  1293. var.len = rspamd_snprintf (numbuf, sizeof (numbuf),
  1294. "%s \"%s\"; score=nan (set by %s)",
  1295. pr->action->name,
  1296. pr->message,
  1297. pr->module);
  1298. }
  1299. var.begin = numbuf;
  1300. }
  1301. else {
  1302. var.begin = undef;
  1303. var.len = sizeof (undef) - 1;
  1304. }
  1305. break;
  1306. case RSPAMD_LOG_SETTINGS_ID:
  1307. if (task->settings_elt) {
  1308. var.begin = task->settings_elt->name;
  1309. var.len = strlen (task->settings_elt->name);
  1310. }
  1311. else {
  1312. var.begin = undef;
  1313. var.len = sizeof (undef) - 1;
  1314. }
  1315. break;
  1316. case RSPAMD_LOG_MEMPOOL_SIZE:
  1317. var.len = rspamd_snprintf (numbuf, sizeof (numbuf),
  1318. "%Hz",
  1319. rspamd_mempool_get_used_size (task->task_pool));
  1320. var.begin = numbuf;
  1321. break;
  1322. case RSPAMD_LOG_MEMPOOL_WASTE:
  1323. var.len = rspamd_snprintf (numbuf, sizeof (numbuf),
  1324. "%Hz",
  1325. rspamd_mempool_get_wasted_size (task->task_pool));
  1326. var.begin = numbuf;
  1327. break;
  1328. default:
  1329. var = rspamd_task_log_metric_res (task, lf);
  1330. break;
  1331. }
  1332. if (var.len > 0) {
  1333. res = rspamd_task_log_write_var (task, logbuf,
  1334. &var, (const rspamd_ftok_t *)lf->data);
  1335. }
  1336. return res;
  1337. }
  1338. void
  1339. rspamd_task_write_log (struct rspamd_task *task)
  1340. {
  1341. rspamd_fstring_t *logbuf;
  1342. struct rspamd_log_format *lf;
  1343. struct rspamd_task **ptask;
  1344. const gchar *lua_str;
  1345. gsize lua_str_len;
  1346. lua_State *L;
  1347. g_assert (task != NULL);
  1348. if (task->cfg->log_format == NULL ||
  1349. (task->flags & RSPAMD_TASK_FLAG_NO_LOG)) {
  1350. msg_debug_task ("skip logging due to no log flag");
  1351. return;
  1352. }
  1353. logbuf = rspamd_fstring_sized_new (1000);
  1354. DL_FOREACH (task->cfg->log_format, lf) {
  1355. switch (lf->type) {
  1356. case RSPAMD_LOG_STRING:
  1357. logbuf = rspamd_fstring_append (logbuf, lf->data, lf->len);
  1358. break;
  1359. case RSPAMD_LOG_LUA:
  1360. L = task->cfg->lua_state;
  1361. lua_rawgeti (L, LUA_REGISTRYINDEX, GPOINTER_TO_INT (lf->data));
  1362. ptask = lua_newuserdata (L, sizeof (*ptask));
  1363. rspamd_lua_setclass (L, "rspamd{task}", -1);
  1364. *ptask = task;
  1365. if (lua_pcall (L, 1, 1, 0) != 0) {
  1366. msg_err_task ("call to log function failed: %s",
  1367. lua_tostring (L, -1));
  1368. lua_pop (L, 1);
  1369. }
  1370. else {
  1371. lua_str = lua_tolstring (L, -1, &lua_str_len);
  1372. if (lua_str != NULL) {
  1373. logbuf = rspamd_fstring_append (logbuf, lua_str, lua_str_len);
  1374. }
  1375. lua_pop (L, 1);
  1376. }
  1377. break;
  1378. default:
  1379. /* We have a variable in log format */
  1380. if (lf->flags & RSPAMD_LOG_FMT_FLAG_CONDITION) {
  1381. if (!rspamd_task_log_check_condition (task, lf)) {
  1382. continue;
  1383. }
  1384. }
  1385. logbuf = rspamd_task_log_variable (task, lf, logbuf);
  1386. break;
  1387. }
  1388. }
  1389. msg_notice_task ("%V", logbuf);
  1390. rspamd_fstring_free (logbuf);
  1391. }
  1392. gdouble
  1393. rspamd_task_get_required_score (struct rspamd_task *task, struct rspamd_scan_result *m)
  1394. {
  1395. gint i;
  1396. if (m == NULL) {
  1397. m = task->result;
  1398. if (m == NULL) {
  1399. return NAN;
  1400. }
  1401. }
  1402. for (i = m->nactions - 1; i >= 0; i --) {
  1403. struct rspamd_action_result *action_lim = &m->actions_limits[i];
  1404. if (!isnan (action_lim->cur_limit) &&
  1405. !(action_lim->action->flags & (RSPAMD_ACTION_NO_THRESHOLD|RSPAMD_ACTION_HAM))) {
  1406. return m->actions_limits[i].cur_limit;
  1407. }
  1408. }
  1409. return NAN;
  1410. }
  1411. rspamd_ftok_t *
  1412. rspamd_task_get_request_header (struct rspamd_task *task,
  1413. const gchar *name)
  1414. {
  1415. struct rspamd_request_header_chain *ret =
  1416. rspamd_task_get_request_header_multiple (task, name);
  1417. if (ret) {
  1418. return ret->hdr;
  1419. }
  1420. return NULL;
  1421. }
  1422. struct rspamd_request_header_chain *
  1423. rspamd_task_get_request_header_multiple (struct rspamd_task *task,
  1424. const gchar *name)
  1425. {
  1426. struct rspamd_request_header_chain *ret = NULL;
  1427. rspamd_ftok_t srch;
  1428. khiter_t k;
  1429. srch.begin = (gchar *)name;
  1430. srch.len = strlen (name);
  1431. k = kh_get (rspamd_req_headers_hash, task->request_headers,
  1432. &srch);
  1433. if (k != kh_end (task->request_headers)) {
  1434. ret = kh_value (task->request_headers, k);
  1435. }
  1436. return ret;
  1437. }
  1438. void
  1439. rspamd_task_add_request_header (struct rspamd_task *task,
  1440. rspamd_ftok_t *name, rspamd_ftok_t *value)
  1441. {
  1442. khiter_t k;
  1443. gint res;
  1444. struct rspamd_request_header_chain *chain, *nchain;
  1445. k = kh_put (rspamd_req_headers_hash, task->request_headers,
  1446. name, &res);
  1447. if (res == 0) {
  1448. /* Existing name */
  1449. nchain = rspamd_mempool_alloc (task->task_pool, sizeof (*nchain));
  1450. nchain->hdr = value;
  1451. nchain->next = NULL;
  1452. chain = kh_value (task->request_headers, k);
  1453. /* Slow but OK here */
  1454. LL_APPEND (chain, nchain);
  1455. }
  1456. else {
  1457. nchain = rspamd_mempool_alloc (task->task_pool, sizeof (*nchain));
  1458. nchain->hdr = value;
  1459. nchain->next = NULL;
  1460. kh_value (task->request_headers, k) = nchain;
  1461. }
  1462. }
  1463. void
  1464. rspamd_task_profile_set (struct rspamd_task *task, const gchar *key,
  1465. gdouble value)
  1466. {
  1467. GHashTable *tbl;
  1468. gdouble *pval;
  1469. if (key == NULL) {
  1470. return;
  1471. }
  1472. tbl = rspamd_mempool_get_variable (task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1473. if (tbl == NULL) {
  1474. tbl = g_hash_table_new (rspamd_str_hash, rspamd_str_equal);
  1475. rspamd_mempool_set_variable (task->task_pool, RSPAMD_MEMPOOL_PROFILE,
  1476. tbl, (rspamd_mempool_destruct_t)g_hash_table_unref);
  1477. }
  1478. pval = g_hash_table_lookup (tbl, key);
  1479. if (pval == NULL) {
  1480. pval = rspamd_mempool_alloc (task->task_pool, sizeof (*pval));
  1481. *pval = value;
  1482. g_hash_table_insert (tbl, (void *)key, pval);
  1483. }
  1484. else {
  1485. *pval = value;
  1486. }
  1487. }
  1488. gdouble*
  1489. rspamd_task_profile_get (struct rspamd_task *task, const gchar *key)
  1490. {
  1491. GHashTable *tbl;
  1492. gdouble *pval = NULL;
  1493. tbl = rspamd_mempool_get_variable (task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1494. if (tbl != NULL) {
  1495. pval = g_hash_table_lookup (tbl, key);
  1496. }
  1497. return pval;
  1498. }
  1499. gboolean
  1500. rspamd_task_set_finish_time (struct rspamd_task *task)
  1501. {
  1502. if (isnan (task->time_real_finish)) {
  1503. task->time_real_finish = ev_time ();
  1504. return TRUE;
  1505. }
  1506. return FALSE;
  1507. }
  1508. const gchar *
  1509. rspamd_task_stage_name (enum rspamd_task_stage stg)
  1510. {
  1511. const gchar *ret = "unknown stage";
  1512. switch (stg) {
  1513. case RSPAMD_TASK_STAGE_CONNECT:
  1514. ret = "connect";
  1515. break;
  1516. case RSPAMD_TASK_STAGE_CONNFILTERS:
  1517. ret = "connection_filter";
  1518. break;
  1519. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  1520. ret = "read_message";
  1521. break;
  1522. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  1523. ret = "prefilters";
  1524. break;
  1525. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  1526. ret = "process_message";
  1527. break;
  1528. case RSPAMD_TASK_STAGE_FILTERS:
  1529. ret = "filters";
  1530. break;
  1531. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  1532. ret = "classifiers_pre";
  1533. break;
  1534. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  1535. ret = "classifiers";
  1536. break;
  1537. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  1538. ret = "classifiers_post";
  1539. break;
  1540. case RSPAMD_TASK_STAGE_COMPOSITES:
  1541. ret = "composites";
  1542. break;
  1543. case RSPAMD_TASK_STAGE_POST_FILTERS:
  1544. ret = "postfilters";
  1545. break;
  1546. case RSPAMD_TASK_STAGE_LEARN_PRE:
  1547. ret = "learn_pre";
  1548. break;
  1549. case RSPAMD_TASK_STAGE_LEARN:
  1550. ret = "learn";
  1551. break;
  1552. case RSPAMD_TASK_STAGE_LEARN_POST:
  1553. ret = "learn_post";
  1554. break;
  1555. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  1556. ret = "composites_post";
  1557. break;
  1558. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  1559. ret = "idempotent";
  1560. break;
  1561. case RSPAMD_TASK_STAGE_DONE:
  1562. ret = "done";
  1563. break;
  1564. case RSPAMD_TASK_STAGE_REPLIED:
  1565. ret = "replied";
  1566. break;
  1567. default:
  1568. break;
  1569. }
  1570. return ret;
  1571. }
  1572. void
  1573. rspamd_task_timeout (EV_P_ ev_timer *w, int revents)
  1574. {
  1575. struct rspamd_task *task = (struct rspamd_task *)w->data;
  1576. if (!(task->processed_stages & RSPAMD_TASK_STAGE_FILTERS)) {
  1577. ev_now_update_if_cheap (task->event_loop);
  1578. msg_info_task ("processing of task time out: %.1fs spent; %.1fs limit; "
  1579. "forced processing",
  1580. ev_now (task->event_loop) - task->task_timestamp,
  1581. w->repeat);
  1582. if (task->cfg->soft_reject_on_timeout) {
  1583. struct rspamd_action *action, *soft_reject;
  1584. action = rspamd_check_action_metric (task, NULL, NULL);
  1585. if (action->action_type != METRIC_ACTION_REJECT) {
  1586. soft_reject = rspamd_config_get_action_by_type (task->cfg,
  1587. METRIC_ACTION_SOFT_REJECT);
  1588. rspamd_add_passthrough_result (task,
  1589. soft_reject,
  1590. 0,
  1591. NAN,
  1592. "timeout processing message",
  1593. "task timeout",
  1594. 0, NULL);
  1595. }
  1596. }
  1597. ev_timer_again (EV_A_ w);
  1598. task->processed_stages |= RSPAMD_TASK_STAGE_FILTERS;
  1599. rspamd_session_cleanup (task->s);
  1600. rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL);
  1601. rspamd_session_pending (task->s);
  1602. }
  1603. else {
  1604. /* Postprocessing timeout */
  1605. msg_info_task ("post-processing of task time out: %.1f second spent; forced processing",
  1606. ev_now (task->event_loop) - task->task_timestamp);
  1607. if (task->cfg->soft_reject_on_timeout) {
  1608. struct rspamd_action *action, *soft_reject;
  1609. action = rspamd_check_action_metric (task, NULL, NULL);
  1610. if (action->action_type != METRIC_ACTION_REJECT) {
  1611. soft_reject = rspamd_config_get_action_by_type (task->cfg,
  1612. METRIC_ACTION_SOFT_REJECT);
  1613. rspamd_add_passthrough_result (task,
  1614. soft_reject,
  1615. 0,
  1616. NAN,
  1617. "timeout post-processing message",
  1618. "task timeout",
  1619. 0, NULL);
  1620. }
  1621. }
  1622. ev_timer_stop (EV_A_ w);
  1623. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  1624. rspamd_session_cleanup (task->s);
  1625. rspamd_task_process (task, RSPAMD_TASK_PROCESS_ALL);
  1626. rspamd_session_pending (task->s);
  1627. }
  1628. }
  1629. void
  1630. rspamd_worker_guard_handler (EV_P_ ev_io *w, int revents)
  1631. {
  1632. struct rspamd_task *task = (struct rspamd_task *)w->data;
  1633. gchar fake_buf[1024];
  1634. gssize r;
  1635. r = read (w->fd, fake_buf, sizeof (fake_buf));
  1636. if (r > 0) {
  1637. msg_warn_task ("received extra data after task is loaded, ignoring");
  1638. }
  1639. else {
  1640. if (r == 0) {
  1641. /*
  1642. * Poor man approach, that might break things in case of
  1643. * shutdown (SHUT_WR) but sockets are so bad that there's no
  1644. * reliable way to distinguish between shutdown(SHUT_WR) and
  1645. * close.
  1646. */
  1647. if (task->cmd != CMD_CHECK_V2 && task->cfg->enable_shutdown_workaround) {
  1648. msg_info_task ("workaround for shutdown enabled, please update "
  1649. "your client, this support might be removed in future");
  1650. shutdown (w->fd, SHUT_RD);
  1651. ev_io_stop (task->event_loop, &task->guard_ev);
  1652. }
  1653. else {
  1654. msg_err_task ("the peer has closed connection unexpectedly");
  1655. rspamd_session_destroy (task->s);
  1656. }
  1657. }
  1658. else if (errno != EAGAIN) {
  1659. msg_err_task ("the peer has closed connection unexpectedly: %s",
  1660. strerror (errno));
  1661. rspamd_session_destroy (task->s);
  1662. }
  1663. else {
  1664. return;
  1665. }
  1666. }
  1667. }