You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

task.c 46KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975
  1. /*
  2. * Copyright 2024 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "task.h"
  17. #include "rspamd.h"
  18. #include "scan_result.h"
  19. #include "libserver/protocol.h"
  20. #include "libserver/protocol_internal.h"
  21. #include "message.h"
  22. #include "lua/lua_common.h"
  23. #include "email_addr.h"
  24. #include "src/libserver/composites/composites.h"
  25. #include "stat_api.h"
  26. #include "unix-std.h"
  27. #include "utlist.h"
  28. #include "libserver/mempool_vars_internal.h"
  29. #include "libserver/cfg_file_private.h"
  30. #include "libmime/lang_detection.h"
  31. #include "libmime/scan_result_private.h"
  32. #include "lua/lua_classnames.h"
  33. #ifdef WITH_JEMALLOC
  34. #include <jemalloc/jemalloc.h>
  35. #else
  36. #if defined(__GLIBC__) && defined(_GNU_SOURCE)
  37. #include <malloc.h>
  38. #endif
  39. #endif
  40. #include <math.h>
  41. #ifdef SYS_ZSTD
  42. #include "zstd.h"
  43. #else
  44. #include "contrib/zstd/zstd.h"
  45. #endif
  46. __KHASH_IMPL(rspamd_req_headers_hash, static inline,
  47. rspamd_ftok_t *, struct rspamd_request_header_chain *, 1,
  48. rspamd_ftok_icase_hash, rspamd_ftok_icase_equal)
  49. static GQuark
  50. rspamd_task_quark(void)
  51. {
  52. return g_quark_from_static_string("task-error");
  53. }
  54. /*
  55. * Create new task
  56. */
  57. struct rspamd_task *
  58. rspamd_task_new(struct rspamd_worker *worker,
  59. struct rspamd_config *cfg,
  60. rspamd_mempool_t *pool,
  61. struct rspamd_lang_detector *lang_det,
  62. struct ev_loop *event_loop,
  63. gboolean debug_mem)
  64. {
  65. struct rspamd_task *new_task;
  66. rspamd_mempool_t *task_pool;
  67. unsigned int flags = 0;
  68. if (pool == NULL) {
  69. task_pool = rspamd_mempool_new(rspamd_mempool_suggest_size(),
  70. "task", debug_mem ? RSPAMD_MEMPOOL_DEBUG : 0);
  71. flags |= RSPAMD_TASK_FLAG_OWN_POOL;
  72. }
  73. else {
  74. task_pool = pool;
  75. }
  76. new_task = rspamd_mempool_alloc0(task_pool, sizeof(struct rspamd_task));
  77. new_task->task_pool = task_pool;
  78. new_task->flags = flags;
  79. new_task->worker = worker;
  80. new_task->lang_det = lang_det;
  81. if (cfg) {
  82. new_task->cfg = cfg;
  83. REF_RETAIN(cfg);
  84. if (cfg->check_all_filters) {
  85. new_task->flags |= RSPAMD_TASK_FLAG_PASS_ALL;
  86. }
  87. if (cfg->re_cache) {
  88. new_task->re_rt = rspamd_re_cache_runtime_new(cfg->re_cache);
  89. }
  90. if (new_task->lang_det == NULL && cfg->lang_det != NULL) {
  91. new_task->lang_det = cfg->lang_det;
  92. }
  93. }
  94. new_task->event_loop = event_loop;
  95. new_task->task_timestamp = ev_time();
  96. new_task->time_real_finish = NAN;
  97. new_task->request_headers = kh_init(rspamd_req_headers_hash);
  98. new_task->sock = -1;
  99. new_task->flags |= (RSPAMD_TASK_FLAG_MIME);
  100. /* Default results chain */
  101. rspamd_create_metric_result(new_task, NULL, -1);
  102. new_task->queue_id = "undef";
  103. new_task->messages = ucl_object_typed_new(UCL_OBJECT);
  104. kh_static_init(rspamd_task_lua_cache, &new_task->lua_cache);
  105. return new_task;
  106. }
  107. static void
  108. rspamd_task_reply(struct rspamd_task *task)
  109. {
  110. const ev_tstamp write_timeout = 5.0;
  111. if (task->fin_callback) {
  112. task->fin_callback(task, task->fin_arg);
  113. }
  114. else {
  115. if (!(task->processed_stages & RSPAMD_TASK_STAGE_REPLIED)) {
  116. rspamd_protocol_write_reply(task, write_timeout);
  117. }
  118. }
  119. }
  120. /*
  121. * Called if all filters are processed
  122. * @return TRUE if session should be terminated
  123. */
  124. gboolean
  125. rspamd_task_fin(void *arg)
  126. {
  127. struct rspamd_task *task = (struct rspamd_task *) arg;
  128. /* Task is already finished or skipped */
  129. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  130. rspamd_task_reply(task);
  131. return TRUE;
  132. }
  133. if (!rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL)) {
  134. rspamd_task_reply(task);
  135. return TRUE;
  136. }
  137. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  138. rspamd_task_reply(task);
  139. return TRUE;
  140. }
  141. /* One more iteration */
  142. return FALSE;
  143. }
  144. /*
  145. * Free all structures of worker_task
  146. */
  147. void rspamd_task_free(struct rspamd_task *task)
  148. {
  149. struct rspamd_email_address *addr;
  150. static unsigned int free_iters = 0;
  151. unsigned int i;
  152. if (task) {
  153. debug_task("free pointer %p", task);
  154. if (task->rcpt_envelope) {
  155. for (i = 0; i < task->rcpt_envelope->len; i++) {
  156. addr = g_ptr_array_index(task->rcpt_envelope, i);
  157. rspamd_email_address_free(addr);
  158. }
  159. g_ptr_array_free(task->rcpt_envelope, TRUE);
  160. }
  161. if (task->from_envelope) {
  162. rspamd_email_address_free(task->from_envelope);
  163. }
  164. if (task->from_envelope_orig) {
  165. rspamd_email_address_free(task->from_envelope_orig);
  166. }
  167. if (task->meta_words) {
  168. g_array_free(task->meta_words, TRUE);
  169. }
  170. ucl_object_unref(task->messages);
  171. if (task->re_rt) {
  172. rspamd_re_cache_runtime_destroy(task->re_rt);
  173. }
  174. if (task->http_conn != NULL) {
  175. rspamd_http_connection_reset(task->http_conn);
  176. rspamd_http_connection_unref(task->http_conn);
  177. }
  178. if (task->settings != NULL) {
  179. ucl_object_unref(task->settings);
  180. }
  181. if (task->settings_elt != NULL) {
  182. REF_RELEASE(task->settings_elt);
  183. }
  184. if (task->client_addr) {
  185. rspamd_inet_address_free(task->client_addr);
  186. }
  187. if (task->from_addr) {
  188. rspamd_inet_address_free(task->from_addr);
  189. }
  190. if (task->err) {
  191. g_error_free(task->err);
  192. }
  193. ev_timer_stop(task->event_loop, &task->timeout_ev);
  194. ev_io_stop(task->event_loop, &task->guard_ev);
  195. if (task->sock != -1) {
  196. close(task->sock);
  197. }
  198. if (task->cfg) {
  199. struct rspamd_lua_cached_entry entry;
  200. kh_foreach_value(&task->lua_cache, entry, {
  201. luaL_unref(task->cfg->lua_state,
  202. LUA_REGISTRYINDEX, entry.ref);
  203. });
  204. kh_static_destroy(rspamd_task_lua_cache, &task->lua_cache);
  205. if (task->cfg->full_gc_iters && (++free_iters > task->cfg->full_gc_iters)) {
  206. /* Perform more expensive cleanup cycle */
  207. gsize allocated = 0, active = 0, metadata = 0,
  208. resident = 0, mapped = 0, old_lua_mem = 0;
  209. double t1, t2;
  210. old_lua_mem = lua_gc(task->cfg->lua_state, LUA_GCCOUNT, 0);
  211. t1 = rspamd_get_ticks(FALSE);
  212. #ifdef WITH_JEMALLOC
  213. gsize sz = sizeof(gsize);
  214. mallctl("stats.allocated", &allocated, &sz, NULL, 0);
  215. mallctl("stats.active", &active, &sz, NULL, 0);
  216. mallctl("stats.metadata", &metadata, &sz, NULL, 0);
  217. mallctl("stats.resident", &resident, &sz, NULL, 0);
  218. mallctl("stats.mapped", &mapped, &sz, NULL, 0);
  219. #else
  220. #if defined(__GLIBC__) && defined(_GNU_SOURCE)
  221. malloc_trim(0);
  222. #endif
  223. #endif
  224. lua_gc(task->cfg->lua_state, LUA_GCCOLLECT, 0);
  225. t2 = rspamd_get_ticks(FALSE);
  226. msg_notice_task("perform full gc cycle; memory stats: "
  227. "%Hz allocated, %Hz active, %Hz metadata, %Hz resident, %Hz mapped;"
  228. " lua memory: %z kb -> %d kb; %f ms for gc iter",
  229. allocated, active, metadata, resident, mapped,
  230. old_lua_mem, lua_gc(task->cfg->lua_state, LUA_GCCOUNT, 0),
  231. (t2 - t1) * 1000.0);
  232. free_iters = rspamd_time_jitter(0,
  233. (double) task->cfg->full_gc_iters / 2);
  234. }
  235. REF_RELEASE(task->cfg);
  236. }
  237. kh_destroy(rspamd_req_headers_hash, task->request_headers);
  238. rspamd_message_unref(task->message);
  239. if (task->flags & RSPAMD_TASK_FLAG_OWN_POOL) {
  240. rspamd_mempool_destructors_enforce(task->task_pool);
  241. if (task->symcache_runtime) {
  242. rspamd_symcache_runtime_destroy(task);
  243. }
  244. rspamd_mempool_delete(task->task_pool);
  245. }
  246. else if (task->symcache_runtime) {
  247. rspamd_symcache_runtime_destroy(task);
  248. }
  249. }
  250. }
  251. struct rspamd_task_map {
  252. gpointer begin;
  253. gulong len;
  254. int fd;
  255. };
  256. static void
  257. rspamd_task_unmapper(gpointer ud)
  258. {
  259. struct rspamd_task_map *m = ud;
  260. munmap(m->begin, m->len);
  261. close(m->fd);
  262. }
  263. gboolean
  264. rspamd_task_load_message(struct rspamd_task *task,
  265. struct rspamd_http_message *msg, const char *start, gsize len)
  266. {
  267. unsigned int control_len, r;
  268. struct ucl_parser *parser;
  269. ucl_object_t *control_obj;
  270. char filepath[PATH_MAX], *fp;
  271. int fd, flen;
  272. gulong offset = 0, shmem_size = 0;
  273. rspamd_ftok_t *tok;
  274. gpointer map;
  275. struct stat st;
  276. struct rspamd_task_map *m;
  277. const char *ft;
  278. #ifdef HAVE_SANE_SHMEM
  279. ft = "shm";
  280. #else
  281. ft = "file";
  282. #endif
  283. if (msg) {
  284. rspamd_protocol_handle_headers(task, msg);
  285. }
  286. tok = rspamd_task_get_request_header(task, "shm");
  287. if (tok) {
  288. /* Shared memory part */
  289. r = rspamd_strlcpy(filepath, tok->begin,
  290. MIN(sizeof(filepath), tok->len + 1));
  291. rspamd_url_decode(filepath, filepath, r + 1);
  292. flen = strlen(filepath);
  293. if (filepath[0] == '"' && flen > 2) {
  294. /* We need to unquote filepath */
  295. fp = &filepath[1];
  296. fp[flen - 2] = '\0';
  297. }
  298. else {
  299. fp = &filepath[0];
  300. }
  301. #ifdef HAVE_SANE_SHMEM
  302. fd = shm_open(fp, O_RDONLY, 00600);
  303. #else
  304. fd = open(fp, O_RDONLY, 00600);
  305. #endif
  306. if (fd == -1) {
  307. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  308. "Cannot open %s segment (%s): %s", ft, fp, strerror(errno));
  309. return FALSE;
  310. }
  311. if (fstat(fd, &st) == -1) {
  312. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  313. "Cannot stat %s segment (%s): %s", ft, fp, strerror(errno));
  314. close(fd);
  315. return FALSE;
  316. }
  317. map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  318. if (map == MAP_FAILED) {
  319. close(fd);
  320. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  321. "Cannot mmap %s (%s): %s", ft, fp, strerror(errno));
  322. return FALSE;
  323. }
  324. tok = rspamd_task_get_request_header(task, "shm-offset");
  325. if (tok) {
  326. rspamd_strtoul(tok->begin, tok->len, &offset);
  327. if (offset > (gulong) st.st_size) {
  328. msg_err_task("invalid offset %ul (%ul available) for shm "
  329. "segment %s",
  330. offset, (gulong) st.st_size, fp);
  331. munmap(map, st.st_size);
  332. close(fd);
  333. return FALSE;
  334. }
  335. }
  336. tok = rspamd_task_get_request_header(task, "shm-length");
  337. shmem_size = st.st_size;
  338. if (tok) {
  339. rspamd_strtoul(tok->begin, tok->len, &shmem_size);
  340. if (shmem_size > (gulong) st.st_size) {
  341. msg_err_task("invalid length %ul (%ul available) for %s "
  342. "segment %s",
  343. shmem_size, (gulong) st.st_size, ft, fp);
  344. munmap(map, st.st_size);
  345. close(fd);
  346. return FALSE;
  347. }
  348. }
  349. task->msg.begin = ((unsigned char *) map) + offset;
  350. task->msg.len = shmem_size;
  351. m = rspamd_mempool_alloc(task->task_pool, sizeof(*m));
  352. m->begin = map;
  353. m->len = st.st_size;
  354. m->fd = fd;
  355. msg_info_task("loaded message from shared memory %s (%ul size, %ul offset), fd=%d",
  356. fp, shmem_size, offset, fd);
  357. rspamd_mempool_add_destructor(task->task_pool, rspamd_task_unmapper, m);
  358. }
  359. else {
  360. /* Try file */
  361. tok = rspamd_task_get_request_header(task, "file");
  362. if (tok == NULL) {
  363. tok = rspamd_task_get_request_header(task, "path");
  364. }
  365. if (tok) {
  366. debug_task("want to scan file %T", tok);
  367. r = rspamd_strlcpy(filepath, tok->begin,
  368. MIN(sizeof(filepath), tok->len + 1));
  369. rspamd_url_decode(filepath, filepath, r + 1);
  370. flen = strlen(filepath);
  371. if (filepath[0] == '"' && flen > 2) {
  372. /* We need to unquote filepath */
  373. fp = &filepath[1];
  374. fp[flen - 2] = '\0';
  375. }
  376. else {
  377. fp = &filepath[0];
  378. }
  379. if (stat(fp, &st) == -1) {
  380. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  381. "Invalid file (%s): %s", fp, strerror(errno));
  382. return FALSE;
  383. }
  384. if (G_UNLIKELY(st.st_size == 0)) {
  385. /* Empty file */
  386. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  387. task->msg.begin = rspamd_mempool_strdup(task->task_pool, "");
  388. task->msg.len = 0;
  389. }
  390. else {
  391. fd = open(fp, O_RDONLY);
  392. if (fd == -1) {
  393. g_set_error(&task->err, rspamd_task_quark(),
  394. RSPAMD_PROTOCOL_ERROR,
  395. "Cannot open file (%s): %s", fp, strerror(errno));
  396. return FALSE;
  397. }
  398. map = mmap(NULL, st.st_size, PROT_READ, MAP_SHARED, fd, 0);
  399. if (map == MAP_FAILED) {
  400. close(fd);
  401. g_set_error(&task->err, rspamd_task_quark(),
  402. RSPAMD_PROTOCOL_ERROR,
  403. "Cannot mmap file (%s): %s", fp, strerror(errno));
  404. return FALSE;
  405. }
  406. task->msg.begin = map;
  407. task->msg.len = st.st_size;
  408. m = rspamd_mempool_alloc(task->task_pool, sizeof(*m));
  409. m->begin = map;
  410. m->len = st.st_size;
  411. m->fd = fd;
  412. rspamd_mempool_add_destructor(task->task_pool, rspamd_task_unmapper, m);
  413. }
  414. task->msg.fpath = rspamd_mempool_strdup(task->task_pool, fp);
  415. task->flags |= RSPAMD_TASK_FLAG_FILE;
  416. msg_info_task("loaded message from file %s", fp);
  417. }
  418. else {
  419. /* Plain data */
  420. task->msg.begin = start;
  421. task->msg.len = len;
  422. }
  423. }
  424. debug_task("got input of length %z", task->msg.len);
  425. /* Check compression */
  426. tok = rspamd_task_get_request_header(task, "compression");
  427. if (tok) {
  428. /* Need to uncompress */
  429. rspamd_ftok_t t;
  430. t.begin = "zstd";
  431. t.len = 4;
  432. if (rspamd_ftok_casecmp(tok, &t) == 0) {
  433. ZSTD_DStream *zstream;
  434. ZSTD_inBuffer zin;
  435. ZSTD_outBuffer zout;
  436. unsigned char *out;
  437. gsize outlen, r;
  438. gulong dict_id;
  439. if (!rspamd_libs_reset_decompression(task->cfg->libs_ctx)) {
  440. g_set_error(&task->err, rspamd_task_quark(),
  441. RSPAMD_PROTOCOL_ERROR,
  442. "Cannot decompress, decompressor init failed");
  443. return FALSE;
  444. }
  445. tok = rspamd_task_get_request_header(task, "dictionary");
  446. if (tok != NULL) {
  447. /* We need to use custom dictionary */
  448. if (!rspamd_strtoul(tok->begin, tok->len, &dict_id)) {
  449. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  450. "Non numeric dictionary");
  451. return FALSE;
  452. }
  453. if (!task->cfg->libs_ctx->in_dict) {
  454. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  455. "Unknown dictionary, undefined locally");
  456. return FALSE;
  457. }
  458. if (task->cfg->libs_ctx->in_dict->id != dict_id) {
  459. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  460. "Unknown dictionary, invalid dictionary id");
  461. return FALSE;
  462. }
  463. }
  464. zstream = task->cfg->libs_ctx->in_zstream;
  465. zin.pos = 0;
  466. zin.src = task->msg.begin;
  467. zin.size = task->msg.len;
  468. if ((outlen = ZSTD_getDecompressedSize(task->msg.begin, task->msg.len)) == 0) {
  469. outlen = ZSTD_DStreamOutSize();
  470. }
  471. out = g_malloc(outlen);
  472. zout.dst = out;
  473. zout.pos = 0;
  474. zout.size = outlen;
  475. while (zin.pos < zin.size) {
  476. r = ZSTD_decompressStream(zstream, &zout, &zin);
  477. if (ZSTD_isError(r)) {
  478. g_set_error(&task->err, rspamd_task_quark(),
  479. RSPAMD_PROTOCOL_ERROR,
  480. "Decompression error: %s", ZSTD_getErrorName(r));
  481. return FALSE;
  482. }
  483. if (zout.pos == zout.size) {
  484. /* We need to extend output buffer */
  485. zout.size = zout.size * 2 + 1;
  486. zout.dst = g_realloc(zout.dst, zout.size);
  487. }
  488. }
  489. rspamd_mempool_add_destructor(task->task_pool, g_free, zout.dst);
  490. task->msg.begin = zout.dst;
  491. task->msg.len = zout.pos;
  492. task->protocol_flags |= RSPAMD_TASK_PROTOCOL_FLAG_COMPRESSED;
  493. msg_info_task("loaded message from zstd compressed stream; "
  494. "compressed: %ul; uncompressed: %ul",
  495. (gulong) zin.size, (gulong) zout.pos);
  496. }
  497. else {
  498. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  499. "Invalid compression method");
  500. return FALSE;
  501. }
  502. }
  503. if (task->msg.len == 0) {
  504. task->flags |= RSPAMD_TASK_FLAG_EMPTY;
  505. }
  506. if (task->protocol_flags & RSPAMD_TASK_PROTOCOL_FLAG_HAS_CONTROL) {
  507. rspamd_ftok_t *hv = rspamd_task_get_request_header(task, MLEN_HEADER);
  508. gulong message_len = 0;
  509. if (!hv || !rspamd_strtoul(hv->begin, hv->len, &message_len) ||
  510. task->msg.len < message_len) {
  511. msg_warn_task("message has invalid message length: %ul and total len: %ul",
  512. message_len, task->msg.len);
  513. g_set_error(&task->err, rspamd_task_quark(), RSPAMD_PROTOCOL_ERROR,
  514. "Invalid length");
  515. return FALSE;
  516. }
  517. control_len = task->msg.len - message_len;
  518. if (control_len > 0) {
  519. parser = ucl_parser_new(UCL_PARSER_KEY_LOWERCASE);
  520. if (!ucl_parser_add_chunk(parser, task->msg.begin, control_len)) {
  521. msg_warn_task("processing of control chunk failed: %s",
  522. ucl_parser_get_error(parser));
  523. ucl_parser_free(parser);
  524. }
  525. else {
  526. control_obj = ucl_parser_get_object(parser);
  527. ucl_parser_free(parser);
  528. rspamd_protocol_handle_control(task, control_obj);
  529. ucl_object_unref(control_obj);
  530. }
  531. task->msg.begin += control_len;
  532. task->msg.len -= control_len;
  533. }
  534. }
  535. return TRUE;
  536. }
  537. static unsigned int
  538. rspamd_task_select_processing_stage(struct rspamd_task *task, unsigned int stages)
  539. {
  540. unsigned int st, mask;
  541. mask = task->processed_stages;
  542. if (mask == 0) {
  543. st = 0;
  544. }
  545. else {
  546. for (st = 1; mask != 1; st++) {
  547. mask = mask >> 1u;
  548. }
  549. }
  550. st = 1 << st;
  551. if (stages & st) {
  552. return st;
  553. }
  554. else if (st < RSPAMD_TASK_STAGE_DONE) {
  555. /* We assume that the stage that was not requested is done */
  556. task->processed_stages |= st;
  557. return rspamd_task_select_processing_stage(task, stages);
  558. }
  559. /* We are done */
  560. return RSPAMD_TASK_STAGE_DONE;
  561. }
  562. gboolean
  563. rspamd_task_process(struct rspamd_task *task, unsigned int stages)
  564. {
  565. unsigned int st;
  566. gboolean ret = TRUE, all_done = TRUE;
  567. GError *stat_error = NULL;
  568. /* Avoid nested calls */
  569. if (task->flags & RSPAMD_TASK_FLAG_PROCESSING) {
  570. return TRUE;
  571. }
  572. if (RSPAMD_TASK_IS_PROCESSED(task)) {
  573. return TRUE;
  574. }
  575. task->flags |= RSPAMD_TASK_FLAG_PROCESSING;
  576. st = rspamd_task_select_processing_stage(task, stages);
  577. switch (st) {
  578. case RSPAMD_TASK_STAGE_CONNFILTERS:
  579. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  580. break;
  581. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  582. if (!rspamd_message_parse(task)) {
  583. ret = FALSE;
  584. }
  585. break;
  586. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  587. if (!(task->flags & RSPAMD_TASK_FLAG_SKIP_PROCESS)) {
  588. rspamd_message_process(task);
  589. }
  590. break;
  591. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  592. case RSPAMD_TASK_STAGE_FILTERS:
  593. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  594. break;
  595. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  596. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  597. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  598. if (!RSPAMD_TASK_IS_EMPTY(task)) {
  599. if (rspamd_stat_classify(task, task->cfg->lua_state, st, &stat_error) ==
  600. RSPAMD_STAT_PROCESS_ERROR) {
  601. msg_err_task("classify error: %e", stat_error);
  602. g_error_free(stat_error);
  603. }
  604. }
  605. break;
  606. case RSPAMD_TASK_STAGE_COMPOSITES:
  607. rspamd_composites_process_task(task);
  608. task->result->nresults_postfilters = task->result->nresults;
  609. break;
  610. case RSPAMD_TASK_STAGE_POST_FILTERS:
  611. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache,
  612. st);
  613. if (all_done && (task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO) &&
  614. !RSPAMD_TASK_IS_EMPTY(task) &&
  615. !(task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM | RSPAMD_TASK_FLAG_LEARN_HAM))) {
  616. rspamd_stat_check_autolearn(task);
  617. }
  618. break;
  619. case RSPAMD_TASK_STAGE_LEARN:
  620. case RSPAMD_TASK_STAGE_LEARN_PRE:
  621. case RSPAMD_TASK_STAGE_LEARN_POST:
  622. if (task->flags & (RSPAMD_TASK_FLAG_LEARN_SPAM | RSPAMD_TASK_FLAG_LEARN_HAM)) {
  623. if (task->err == NULL) {
  624. if (!rspamd_stat_learn(task,
  625. task->flags & RSPAMD_TASK_FLAG_LEARN_SPAM,
  626. task->cfg->lua_state, task->classifier,
  627. st, &stat_error)) {
  628. if (stat_error == NULL) {
  629. g_set_error(&stat_error,
  630. g_quark_from_static_string("stat"), 500,
  631. "Unknown statistics error, found on stage %s;"
  632. " classifier: %s",
  633. rspamd_task_stage_name(st), task->classifier);
  634. }
  635. if (stat_error->code >= 400) {
  636. msg_err_task("learn error: %e", stat_error);
  637. }
  638. else {
  639. msg_notice_task("skip learning: %e", stat_error);
  640. }
  641. if (!(task->flags & RSPAMD_TASK_FLAG_LEARN_AUTO)) {
  642. task->err = stat_error;
  643. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  644. }
  645. else {
  646. /* Do not skip idempotent in case of learn error */
  647. if (stat_error) {
  648. g_error_free(stat_error);
  649. }
  650. task->processed_stages |= RSPAMD_TASK_STAGE_LEARN |
  651. RSPAMD_TASK_STAGE_LEARN_PRE |
  652. RSPAMD_TASK_STAGE_LEARN_POST;
  653. }
  654. }
  655. }
  656. }
  657. break;
  658. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  659. /* Second run of composites processing before idempotent filters (if needed) */
  660. if (task->result->nresults_postfilters != task->result->nresults) {
  661. rspamd_composites_process_task(task);
  662. }
  663. else {
  664. msg_debug_task("skip second run of composites as the result has not been changed");
  665. }
  666. break;
  667. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  668. /* Stop task timeout */
  669. if (ev_can_stop(&task->timeout_ev)) {
  670. ev_timer_stop(task->event_loop, &task->timeout_ev);
  671. }
  672. all_done = rspamd_symcache_process_symbols(task, task->cfg->cache, st);
  673. break;
  674. case RSPAMD_TASK_STAGE_DONE:
  675. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  676. break;
  677. default:
  678. /* TODO: not implemented stage */
  679. break;
  680. }
  681. if (RSPAMD_TASK_IS_SKIPPED(task)) {
  682. /* Set all bits except idempotent filters */
  683. task->processed_stages |= 0x7FFF;
  684. }
  685. task->flags &= ~RSPAMD_TASK_FLAG_PROCESSING;
  686. if (!ret || RSPAMD_TASK_IS_PROCESSED(task)) {
  687. if (!ret) {
  688. /* Set processed flags */
  689. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  690. }
  691. msg_debug_task("task is processed");
  692. return ret;
  693. }
  694. if (ret) {
  695. if (rspamd_session_events_pending(task->s) != 0) {
  696. /* We have events pending, so we consider this stage as incomplete */
  697. msg_debug_task("need more work on stage %d", st);
  698. }
  699. else {
  700. if (all_done) {
  701. /* Mark the current stage as done and go to the next stage */
  702. msg_debug_task("completed stage %d", st);
  703. task->processed_stages |= st;
  704. }
  705. else {
  706. msg_debug_task("need more processing on stage %d", st);
  707. }
  708. /* Tail recursion */
  709. return rspamd_task_process(task, stages);
  710. }
  711. }
  712. return ret;
  713. }
  714. struct rspamd_email_address *
  715. rspamd_task_get_sender(struct rspamd_task *task)
  716. {
  717. return task->from_envelope;
  718. }
  719. static const char *
  720. rspamd_task_cache_principal_recipient(struct rspamd_task *task,
  721. const char *rcpt, gsize len)
  722. {
  723. char *rcpt_lc;
  724. if (rcpt == NULL) {
  725. return NULL;
  726. }
  727. rcpt_lc = rspamd_mempool_alloc(task->task_pool, len + 1);
  728. rspamd_strlcpy(rcpt_lc, rcpt, len + 1);
  729. rspamd_str_lc(rcpt_lc, len);
  730. rspamd_mempool_set_variable(task->task_pool,
  731. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT, rcpt_lc, NULL);
  732. return rcpt_lc;
  733. }
  734. const char *
  735. rspamd_task_get_principal_recipient(struct rspamd_task *task)
  736. {
  737. const char *val;
  738. struct rspamd_email_address *addr;
  739. unsigned int i;
  740. val = rspamd_mempool_get_variable(task->task_pool,
  741. RSPAMD_MEMPOOL_PRINCIPAL_RECIPIENT);
  742. if (val) {
  743. return val;
  744. }
  745. if (task->deliver_to) {
  746. return rspamd_task_cache_principal_recipient(task, task->deliver_to,
  747. strlen(task->deliver_to));
  748. }
  749. if (task->rcpt_envelope != NULL) {
  750. PTR_ARRAY_FOREACH(task->rcpt_envelope, i, addr)
  751. {
  752. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  753. return rspamd_task_cache_principal_recipient(task, addr->addr,
  754. addr->addr_len);
  755. }
  756. }
  757. }
  758. GPtrArray *rcpt_mime = MESSAGE_FIELD_CHECK(task, rcpt_mime);
  759. if (rcpt_mime != NULL && rcpt_mime->len > 0) {
  760. PTR_ARRAY_FOREACH(rcpt_mime, i, addr)
  761. {
  762. if (addr->addr && !(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  763. return rspamd_task_cache_principal_recipient(task, addr->addr,
  764. addr->addr_len);
  765. }
  766. }
  767. }
  768. return NULL;
  769. }
  770. gboolean
  771. rspamd_learn_task_spam(struct rspamd_task *task,
  772. gboolean is_spam,
  773. const char *classifier,
  774. GError **err)
  775. {
  776. if (is_spam) {
  777. task->flags |= RSPAMD_TASK_FLAG_LEARN_SPAM;
  778. }
  779. else {
  780. task->flags |= RSPAMD_TASK_FLAG_LEARN_HAM;
  781. }
  782. task->classifier = classifier;
  783. return TRUE;
  784. }
  785. static gboolean
  786. rspamd_task_log_check_condition(struct rspamd_task *task,
  787. struct rspamd_log_format *lf)
  788. {
  789. gboolean ret = FALSE;
  790. switch (lf->type) {
  791. case RSPAMD_LOG_MID:
  792. if (MESSAGE_FIELD_CHECK(task, message_id) &&
  793. strcmp(MESSAGE_FIELD(task, message_id), "undef") != 0) {
  794. ret = TRUE;
  795. }
  796. break;
  797. case RSPAMD_LOG_QID:
  798. if (task->queue_id && strcmp(task->queue_id, "undef") != 0) {
  799. ret = TRUE;
  800. }
  801. break;
  802. case RSPAMD_LOG_USER:
  803. if (task->auth_user) {
  804. ret = TRUE;
  805. }
  806. break;
  807. case RSPAMD_LOG_IP:
  808. if (task->from_addr && rspamd_ip_is_valid(task->from_addr)) {
  809. ret = TRUE;
  810. }
  811. break;
  812. case RSPAMD_LOG_SMTP_RCPT:
  813. case RSPAMD_LOG_SMTP_RCPTS:
  814. if (task->rcpt_envelope && task->rcpt_envelope->len > 0) {
  815. ret = TRUE;
  816. }
  817. break;
  818. case RSPAMD_LOG_MIME_RCPT:
  819. case RSPAMD_LOG_MIME_RCPTS:
  820. if (MESSAGE_FIELD_CHECK(task, rcpt_mime) &&
  821. MESSAGE_FIELD(task, rcpt_mime)->len > 0) {
  822. ret = TRUE;
  823. }
  824. break;
  825. case RSPAMD_LOG_SMTP_FROM:
  826. if (task->from_envelope) {
  827. ret = TRUE;
  828. }
  829. break;
  830. case RSPAMD_LOG_MIME_FROM:
  831. if (MESSAGE_FIELD_CHECK(task, from_mime) &&
  832. MESSAGE_FIELD(task, from_mime)->len > 0) {
  833. ret = TRUE;
  834. }
  835. break;
  836. case RSPAMD_LOG_FILENAME:
  837. if (task->msg.fpath) {
  838. ret = TRUE;
  839. }
  840. break;
  841. case RSPAMD_LOG_FORCED_ACTION:
  842. if (task->result->passthrough_result) {
  843. ret = TRUE;
  844. }
  845. break;
  846. case RSPAMD_LOG_SETTINGS_ID:
  847. if (task->settings_elt) {
  848. ret = TRUE;
  849. }
  850. break;
  851. default:
  852. ret = TRUE;
  853. break;
  854. }
  855. return ret;
  856. }
  857. /*
  858. * Sort by symbol's score -> name
  859. */
  860. static int
  861. rspamd_task_compare_log_sym(gconstpointer a, gconstpointer b)
  862. {
  863. const struct rspamd_symbol_result *s1 = *(const struct rspamd_symbol_result **) a,
  864. *s2 = *(const struct rspamd_symbol_result **) b;
  865. double w1, w2;
  866. w1 = fabs(s1->score);
  867. w2 = fabs(s2->score);
  868. if (w1 == w2 && s1->name && s2->name) {
  869. return strcmp(s1->name, s2->name);
  870. }
  871. return (w2 - w1) * 1000.0;
  872. }
  873. static int
  874. rspamd_task_compare_log_group(gconstpointer a, gconstpointer b)
  875. {
  876. const struct rspamd_symbols_group *s1 = *(const struct rspamd_symbols_group **) a,
  877. *s2 = *(const struct rspamd_symbols_group **) b;
  878. return strcmp(s1->name, s2->name);
  879. }
  880. static rspamd_ftok_t
  881. rspamd_task_log_metric_res(struct rspamd_task *task,
  882. struct rspamd_log_format *lf)
  883. {
  884. static char scorebuf[32];
  885. rspamd_ftok_t res = {.begin = NULL, .len = 0};
  886. struct rspamd_scan_result *mres;
  887. gboolean first = TRUE;
  888. rspamd_fstring_t *symbuf;
  889. struct rspamd_symbol_result *sym;
  890. GPtrArray *sorted_symbols;
  891. struct rspamd_action *act;
  892. struct rspamd_symbols_group *gr;
  893. unsigned int i, j;
  894. khiter_t k;
  895. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  896. mres = task->result;
  897. act = rspamd_check_action_metric(task, NULL, NULL);
  898. if (mres != NULL) {
  899. switch (lf->type) {
  900. case RSPAMD_LOG_ISSPAM:
  901. if (RSPAMD_TASK_IS_SKIPPED(task)) {
  902. res.begin = "S";
  903. }
  904. else if (!(act->flags & RSPAMD_ACTION_HAM)) {
  905. res.begin = "T";
  906. }
  907. else {
  908. res.begin = "F";
  909. }
  910. res.len = 1;
  911. break;
  912. case RSPAMD_LOG_ACTION:
  913. res.begin = act->name;
  914. res.len = strlen(res.begin);
  915. break;
  916. case RSPAMD_LOG_SCORES:
  917. res.len = rspamd_snprintf(scorebuf, sizeof(scorebuf), "%.2f/%.2f",
  918. mres->score, rspamd_task_get_required_score(task, mres));
  919. res.begin = scorebuf;
  920. break;
  921. case RSPAMD_LOG_SYMBOLS:
  922. symbuf = rspamd_fstring_sized_new(128);
  923. sorted_symbols = g_ptr_array_sized_new(kh_size(mres->symbols));
  924. kh_foreach_value(mres->symbols, sym, {
  925. if (!(sym->flags & RSPAMD_SYMBOL_RESULT_IGNORED)) {
  926. g_ptr_array_add(sorted_symbols, (gpointer) sym);
  927. }
  928. });
  929. g_ptr_array_sort(sorted_symbols, rspamd_task_compare_log_sym);
  930. for (i = 0; i < sorted_symbols->len; i++) {
  931. sym = g_ptr_array_index(sorted_symbols, i);
  932. if (first) {
  933. rspamd_printf_fstring(&symbuf, "%s", sym->name);
  934. }
  935. else {
  936. rspamd_printf_fstring(&symbuf, ",%s", sym->name);
  937. }
  938. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_SCORES) {
  939. rspamd_printf_fstring(&symbuf, "(%.2f)", sym->score);
  940. }
  941. if (lf->flags & RSPAMD_LOG_FMT_FLAG_SYMBOLS_PARAMS) {
  942. rspamd_printf_fstring(&symbuf, "{");
  943. if (sym->options) {
  944. struct rspamd_symbol_option *opt;
  945. j = 0;
  946. DL_FOREACH(sym->opts_head, opt)
  947. {
  948. rspamd_printf_fstring(&symbuf, "%*s;",
  949. (int) opt->optlen, opt->option);
  950. if (j >= max_log_elts && opt->next) {
  951. rspamd_printf_fstring(&symbuf, "...;");
  952. break;
  953. }
  954. j++;
  955. }
  956. }
  957. rspamd_printf_fstring(&symbuf, "}");
  958. }
  959. first = FALSE;
  960. }
  961. g_ptr_array_free(sorted_symbols, TRUE);
  962. rspamd_mempool_add_destructor(task->task_pool,
  963. (rspamd_mempool_destruct_t) rspamd_fstring_free,
  964. symbuf);
  965. rspamd_mempool_notify_alloc(task->task_pool, symbuf->len);
  966. res.begin = symbuf->str;
  967. res.len = symbuf->len;
  968. break;
  969. case RSPAMD_LOG_GROUPS:
  970. case RSPAMD_LOG_PUBLIC_GROUPS:
  971. symbuf = rspamd_fstring_sized_new(128);
  972. sorted_symbols = g_ptr_array_sized_new(kh_size(mres->sym_groups));
  973. kh_foreach_key(mres->sym_groups, gr, {
  974. if (!(gr->flags & RSPAMD_SYMBOL_GROUP_PUBLIC)) {
  975. if (lf->type == RSPAMD_LOG_PUBLIC_GROUPS) {
  976. continue;
  977. }
  978. }
  979. g_ptr_array_add(sorted_symbols, gr);
  980. });
  981. g_ptr_array_sort(sorted_symbols, rspamd_task_compare_log_group);
  982. for (i = 0; i < sorted_symbols->len; i++) {
  983. gr = g_ptr_array_index(sorted_symbols, i);
  984. if (first) {
  985. rspamd_printf_fstring(&symbuf, "%s", gr->name);
  986. }
  987. else {
  988. rspamd_printf_fstring(&symbuf, ",%s", gr->name);
  989. }
  990. k = kh_get(rspamd_symbols_group_hash, mres->sym_groups, gr);
  991. rspamd_printf_fstring(&symbuf, "(%.2f)",
  992. kh_value(mres->sym_groups, k));
  993. first = FALSE;
  994. }
  995. g_ptr_array_free(sorted_symbols, TRUE);
  996. rspamd_mempool_add_destructor(task->task_pool,
  997. (rspamd_mempool_destruct_t) rspamd_fstring_free,
  998. symbuf);
  999. rspamd_mempool_notify_alloc(task->task_pool, symbuf->len);
  1000. res.begin = symbuf->str;
  1001. res.len = symbuf->len;
  1002. break;
  1003. default:
  1004. break;
  1005. }
  1006. }
  1007. return res;
  1008. }
  1009. static rspamd_fstring_t *
  1010. rspamd_task_log_write_var(struct rspamd_task *task, rspamd_fstring_t *logbuf,
  1011. const rspamd_ftok_t *var, const rspamd_ftok_t *content)
  1012. {
  1013. rspamd_fstring_t *res = logbuf;
  1014. const char *p, *c, *end;
  1015. if (content == NULL) {
  1016. /* Just output variable */
  1017. res = rspamd_fstring_append(res, var->begin, var->len);
  1018. }
  1019. else {
  1020. /* Replace $ with variable value */
  1021. p = content->begin;
  1022. c = p;
  1023. end = p + content->len;
  1024. while (p < end) {
  1025. if (*p == '$') {
  1026. if (p > c) {
  1027. res = rspamd_fstring_append(res, c, p - c);
  1028. }
  1029. res = rspamd_fstring_append(res, var->begin, var->len);
  1030. p++;
  1031. c = p;
  1032. }
  1033. else {
  1034. p++;
  1035. }
  1036. }
  1037. if (p > c) {
  1038. res = rspamd_fstring_append(res, c, p - c);
  1039. }
  1040. }
  1041. return res;
  1042. }
  1043. static rspamd_fstring_t *
  1044. rspamd_task_write_ialist(struct rspamd_task *task,
  1045. GPtrArray *addrs, int lim,
  1046. struct rspamd_log_format *lf,
  1047. rspamd_fstring_t *logbuf)
  1048. {
  1049. rspamd_fstring_t *res = logbuf, *varbuf;
  1050. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1051. struct rspamd_email_address *addr;
  1052. int i, nchars = 0, wr = 0, cur_chars;
  1053. gboolean has_orig = FALSE;
  1054. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  1055. if (addrs && lim <= 0) {
  1056. lim = addrs->len;
  1057. }
  1058. PTR_ARRAY_FOREACH(addrs, i, addr)
  1059. {
  1060. if (addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL) {
  1061. has_orig = TRUE;
  1062. break;
  1063. }
  1064. }
  1065. varbuf = rspamd_fstring_new();
  1066. PTR_ARRAY_FOREACH(addrs, i, addr)
  1067. {
  1068. if (wr >= lim) {
  1069. break;
  1070. }
  1071. if (has_orig) {
  1072. /* Report merely original addresses */
  1073. if (!(addr->flags & RSPAMD_EMAIL_ADDR_ORIGINAL)) {
  1074. continue;
  1075. }
  1076. }
  1077. bool last = i == lim - 1;
  1078. cur_chars = addr->addr_len;
  1079. varbuf = rspamd_fstring_append(varbuf, addr->addr,
  1080. cur_chars);
  1081. nchars += cur_chars;
  1082. wr++;
  1083. if (varbuf->len > 0 && !last) {
  1084. varbuf = rspamd_fstring_append(varbuf, ",", 1);
  1085. }
  1086. if (!last && (wr >= max_log_elts || nchars >= max_log_elts * 16)) {
  1087. varbuf = rspamd_fstring_append(varbuf, "...", 3);
  1088. break;
  1089. }
  1090. }
  1091. if (varbuf->len > 0) {
  1092. var.begin = varbuf->str;
  1093. var.len = varbuf->len;
  1094. res = rspamd_task_log_write_var(task, logbuf,
  1095. &var, (const rspamd_ftok_t *) lf->data);
  1096. }
  1097. rspamd_fstring_free(varbuf);
  1098. return res;
  1099. }
  1100. static rspamd_fstring_t *
  1101. rspamd_task_write_addr_list(struct rspamd_task *task,
  1102. GPtrArray *addrs, int lim,
  1103. struct rspamd_log_format *lf,
  1104. rspamd_fstring_t *logbuf)
  1105. {
  1106. rspamd_fstring_t *res = logbuf, *varbuf;
  1107. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1108. struct rspamd_email_address *addr;
  1109. unsigned int max_log_elts = task->cfg->log_task_max_elts;
  1110. unsigned int i;
  1111. if (lim <= 0) {
  1112. lim = addrs->len;
  1113. }
  1114. varbuf = rspamd_fstring_new();
  1115. for (i = 0; i < lim; i++) {
  1116. addr = g_ptr_array_index(addrs, i);
  1117. bool last = i == lim - 1;
  1118. if (addr->addr) {
  1119. varbuf = rspamd_fstring_append(varbuf, addr->addr, addr->addr_len);
  1120. }
  1121. if (varbuf->len > 0 && !last) {
  1122. varbuf = rspamd_fstring_append(varbuf, ",", 1);
  1123. }
  1124. if (!last && i >= max_log_elts) {
  1125. varbuf = rspamd_fstring_append(varbuf, "...", 3);
  1126. break;
  1127. }
  1128. }
  1129. if (varbuf->len > 0) {
  1130. var.begin = varbuf->str;
  1131. var.len = varbuf->len;
  1132. res = rspamd_task_log_write_var(task, logbuf,
  1133. &var, (const rspamd_ftok_t *) lf->data);
  1134. }
  1135. rspamd_fstring_free(varbuf);
  1136. return res;
  1137. }
  1138. static rspamd_fstring_t *
  1139. rspamd_task_log_variable(struct rspamd_task *task,
  1140. struct rspamd_log_format *lf, rspamd_fstring_t *logbuf)
  1141. {
  1142. rspamd_fstring_t *res = logbuf;
  1143. rspamd_ftok_t var = {.begin = NULL, .len = 0};
  1144. static char numbuf[128];
  1145. static const char undef[] = "undef";
  1146. switch (lf->type) {
  1147. /* String vars */
  1148. case RSPAMD_LOG_MID:
  1149. if (MESSAGE_FIELD_CHECK(task, message_id)) {
  1150. var.begin = MESSAGE_FIELD(task, message_id);
  1151. var.len = strlen(var.begin);
  1152. }
  1153. else {
  1154. var.begin = undef;
  1155. var.len = sizeof(undef) - 1;
  1156. }
  1157. break;
  1158. case RSPAMD_LOG_QID:
  1159. if (task->queue_id) {
  1160. var.begin = task->queue_id;
  1161. var.len = strlen(var.begin);
  1162. }
  1163. else {
  1164. var.begin = undef;
  1165. var.len = sizeof(undef) - 1;
  1166. }
  1167. break;
  1168. case RSPAMD_LOG_USER:
  1169. if (task->auth_user) {
  1170. var.begin = task->auth_user;
  1171. var.len = strlen(var.begin);
  1172. }
  1173. else {
  1174. var.begin = undef;
  1175. var.len = sizeof(undef) - 1;
  1176. }
  1177. break;
  1178. case RSPAMD_LOG_IP:
  1179. if (task->from_addr && rspamd_ip_is_valid(task->from_addr)) {
  1180. var.begin = rspamd_inet_address_to_string(task->from_addr);
  1181. var.len = strlen(var.begin);
  1182. }
  1183. else {
  1184. var.begin = undef;
  1185. var.len = sizeof(undef) - 1;
  1186. }
  1187. break;
  1188. /* Numeric vars */
  1189. case RSPAMD_LOG_LEN:
  1190. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%uz",
  1191. task->msg.len);
  1192. var.begin = numbuf;
  1193. break;
  1194. case RSPAMD_LOG_DNS_REQ:
  1195. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%uD",
  1196. task->dns_requests);
  1197. var.begin = numbuf;
  1198. break;
  1199. case RSPAMD_LOG_TIME_REAL:
  1200. case RSPAMD_LOG_TIME_VIRTUAL:
  1201. var.begin = rspamd_log_check_time(task->task_timestamp,
  1202. task->time_real_finish,
  1203. task->cfg->clock_res);
  1204. var.len = strlen(var.begin);
  1205. break;
  1206. /* InternetAddress vars */
  1207. case RSPAMD_LOG_SMTP_FROM:
  1208. if (task->from_envelope) {
  1209. var.begin = task->from_envelope->addr;
  1210. var.len = task->from_envelope->addr_len;
  1211. }
  1212. break;
  1213. case RSPAMD_LOG_MIME_FROM:
  1214. if (MESSAGE_FIELD_CHECK(task, from_mime)) {
  1215. return rspamd_task_write_ialist(task,
  1216. MESSAGE_FIELD(task, from_mime),
  1217. 1,
  1218. lf,
  1219. logbuf);
  1220. }
  1221. break;
  1222. case RSPAMD_LOG_SMTP_RCPT:
  1223. if (task->rcpt_envelope) {
  1224. return rspamd_task_write_addr_list(task, task->rcpt_envelope, 1, lf,
  1225. logbuf);
  1226. }
  1227. break;
  1228. case RSPAMD_LOG_MIME_RCPT:
  1229. if (MESSAGE_FIELD_CHECK(task, rcpt_mime)) {
  1230. return rspamd_task_write_ialist(task,
  1231. MESSAGE_FIELD(task, rcpt_mime),
  1232. 1,
  1233. lf,
  1234. logbuf);
  1235. }
  1236. break;
  1237. case RSPAMD_LOG_SMTP_RCPTS:
  1238. if (task->rcpt_envelope) {
  1239. return rspamd_task_write_addr_list(task, task->rcpt_envelope, -1, lf,
  1240. logbuf);
  1241. }
  1242. break;
  1243. case RSPAMD_LOG_MIME_RCPTS:
  1244. if (MESSAGE_FIELD_CHECK(task, rcpt_mime)) {
  1245. return rspamd_task_write_ialist(task,
  1246. MESSAGE_FIELD(task, rcpt_mime),
  1247. -1, /* All addresses */
  1248. lf,
  1249. logbuf);
  1250. }
  1251. break;
  1252. case RSPAMD_LOG_DIGEST:
  1253. if (task->message) {
  1254. var.len = rspamd_snprintf(numbuf, sizeof(numbuf), "%*xs",
  1255. (int) sizeof(MESSAGE_FIELD(task, digest)),
  1256. MESSAGE_FIELD(task, digest));
  1257. var.begin = numbuf;
  1258. }
  1259. else {
  1260. var.begin = undef;
  1261. var.len = sizeof(undef) - 1;
  1262. }
  1263. break;
  1264. case RSPAMD_LOG_FILENAME:
  1265. if (task->msg.fpath) {
  1266. var.len = strlen(task->msg.fpath);
  1267. var.begin = task->msg.fpath;
  1268. }
  1269. else {
  1270. var.begin = undef;
  1271. var.len = sizeof(undef) - 1;
  1272. }
  1273. break;
  1274. case RSPAMD_LOG_FORCED_ACTION:
  1275. if (task->result->passthrough_result) {
  1276. struct rspamd_passthrough_result *pr = task->result->passthrough_result;
  1277. if (!isnan(pr->target_score)) {
  1278. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1279. "%s \"%s\"; score=%.2f (set by %s)",
  1280. pr->action->name,
  1281. pr->message,
  1282. pr->target_score,
  1283. pr->module);
  1284. }
  1285. else {
  1286. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1287. "%s \"%s\"; score=nan (set by %s)",
  1288. pr->action->name,
  1289. pr->message,
  1290. pr->module);
  1291. }
  1292. var.begin = numbuf;
  1293. }
  1294. else {
  1295. var.begin = undef;
  1296. var.len = sizeof(undef) - 1;
  1297. }
  1298. break;
  1299. case RSPAMD_LOG_SETTINGS_ID:
  1300. if (task->settings_elt) {
  1301. var.begin = task->settings_elt->name;
  1302. var.len = strlen(task->settings_elt->name);
  1303. }
  1304. else {
  1305. var.begin = undef;
  1306. var.len = sizeof(undef) - 1;
  1307. }
  1308. break;
  1309. case RSPAMD_LOG_MEMPOOL_SIZE:
  1310. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1311. "%Hz",
  1312. rspamd_mempool_get_used_size(task->task_pool));
  1313. var.begin = numbuf;
  1314. break;
  1315. case RSPAMD_LOG_MEMPOOL_WASTE:
  1316. var.len = rspamd_snprintf(numbuf, sizeof(numbuf),
  1317. "%Hz",
  1318. rspamd_mempool_get_wasted_size(task->task_pool));
  1319. var.begin = numbuf;
  1320. break;
  1321. default:
  1322. var = rspamd_task_log_metric_res(task, lf);
  1323. break;
  1324. }
  1325. if (var.len > 0) {
  1326. res = rspamd_task_log_write_var(task, logbuf,
  1327. &var, (const rspamd_ftok_t *) lf->data);
  1328. }
  1329. return res;
  1330. }
  1331. void rspamd_task_write_log(struct rspamd_task *task)
  1332. {
  1333. rspamd_fstring_t *logbuf;
  1334. struct rspamd_log_format *lf;
  1335. struct rspamd_task **ptask;
  1336. const char *lua_str;
  1337. gsize lua_str_len;
  1338. lua_State *L;
  1339. g_assert(task != NULL);
  1340. if (task->cfg->log_format == NULL ||
  1341. (task->flags & RSPAMD_TASK_FLAG_NO_LOG)) {
  1342. msg_debug_task("skip logging due to no log flag");
  1343. return;
  1344. }
  1345. logbuf = rspamd_fstring_sized_new(1000);
  1346. DL_FOREACH(task->cfg->log_format, lf)
  1347. {
  1348. switch (lf->type) {
  1349. case RSPAMD_LOG_STRING:
  1350. logbuf = rspamd_fstring_append(logbuf, lf->data, lf->len);
  1351. break;
  1352. case RSPAMD_LOG_LUA:
  1353. L = task->cfg->lua_state;
  1354. lua_rawgeti(L, LUA_REGISTRYINDEX, GPOINTER_TO_INT(lf->data));
  1355. ptask = lua_newuserdata(L, sizeof(*ptask));
  1356. rspamd_lua_setclass(L, rspamd_task_classname, -1);
  1357. *ptask = task;
  1358. if (lua_pcall(L, 1, 1, 0) != 0) {
  1359. msg_err_task("call to log function failed: %s",
  1360. lua_tostring(L, -1));
  1361. lua_pop(L, 1);
  1362. }
  1363. else {
  1364. lua_str = lua_tolstring(L, -1, &lua_str_len);
  1365. if (lua_str != NULL) {
  1366. logbuf = rspamd_fstring_append(logbuf, lua_str, lua_str_len);
  1367. }
  1368. lua_pop(L, 1);
  1369. }
  1370. break;
  1371. default:
  1372. /* We have a variable in log format */
  1373. if (lf->flags & RSPAMD_LOG_FMT_FLAG_CONDITION) {
  1374. if (!rspamd_task_log_check_condition(task, lf)) {
  1375. continue;
  1376. }
  1377. }
  1378. logbuf = rspamd_task_log_variable(task, lf, logbuf);
  1379. break;
  1380. }
  1381. }
  1382. msg_notice_task("%V", logbuf);
  1383. rspamd_fstring_free(logbuf);
  1384. }
  1385. double
  1386. rspamd_task_get_required_score(struct rspamd_task *task, struct rspamd_scan_result *m)
  1387. {
  1388. if (m == NULL) {
  1389. m = task->result;
  1390. if (m == NULL) {
  1391. return NAN;
  1392. }
  1393. }
  1394. for (unsigned int i = m->nactions; i-- > 0;) {
  1395. struct rspamd_action_config *action_lim = &m->actions_config[i];
  1396. if (!isnan(action_lim->cur_limit) &&
  1397. !(action_lim->action->flags & (RSPAMD_ACTION_NO_THRESHOLD | RSPAMD_ACTION_HAM))) {
  1398. return m->actions_config[i].cur_limit;
  1399. }
  1400. }
  1401. return NAN;
  1402. }
  1403. rspamd_ftok_t *
  1404. rspamd_task_get_request_header(struct rspamd_task *task,
  1405. const char *name)
  1406. {
  1407. struct rspamd_request_header_chain *ret =
  1408. rspamd_task_get_request_header_multiple(task, name);
  1409. if (ret) {
  1410. return ret->hdr;
  1411. }
  1412. return NULL;
  1413. }
  1414. struct rspamd_request_header_chain *
  1415. rspamd_task_get_request_header_multiple(struct rspamd_task *task,
  1416. const char *name)
  1417. {
  1418. struct rspamd_request_header_chain *ret = NULL;
  1419. rspamd_ftok_t srch;
  1420. khiter_t k;
  1421. srch.begin = (char *) name;
  1422. srch.len = strlen(name);
  1423. k = kh_get(rspamd_req_headers_hash, task->request_headers,
  1424. &srch);
  1425. if (k != kh_end(task->request_headers)) {
  1426. ret = kh_value(task->request_headers, k);
  1427. }
  1428. return ret;
  1429. }
  1430. void rspamd_task_add_request_header(struct rspamd_task *task,
  1431. rspamd_ftok_t *name, rspamd_ftok_t *value)
  1432. {
  1433. khiter_t k;
  1434. int res;
  1435. struct rspamd_request_header_chain *chain, *nchain;
  1436. k = kh_put(rspamd_req_headers_hash, task->request_headers,
  1437. name, &res);
  1438. if (res == 0) {
  1439. /* Existing name */
  1440. nchain = rspamd_mempool_alloc(task->task_pool, sizeof(*nchain));
  1441. nchain->hdr = value;
  1442. nchain->next = NULL;
  1443. chain = kh_value(task->request_headers, k);
  1444. /* Slow but OK here */
  1445. LL_APPEND(chain, nchain);
  1446. }
  1447. else {
  1448. nchain = rspamd_mempool_alloc(task->task_pool, sizeof(*nchain));
  1449. nchain->hdr = value;
  1450. nchain->next = NULL;
  1451. kh_value(task->request_headers, k) = nchain;
  1452. }
  1453. }
  1454. void rspamd_task_profile_set(struct rspamd_task *task, const char *key,
  1455. double value)
  1456. {
  1457. GHashTable *tbl;
  1458. double *pval;
  1459. if (key == NULL) {
  1460. return;
  1461. }
  1462. tbl = rspamd_mempool_get_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1463. if (tbl == NULL) {
  1464. tbl = g_hash_table_new(rspamd_str_hash, rspamd_str_equal);
  1465. rspamd_mempool_set_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE,
  1466. tbl, (rspamd_mempool_destruct_t) g_hash_table_unref);
  1467. }
  1468. pval = g_hash_table_lookup(tbl, key);
  1469. if (pval == NULL) {
  1470. pval = rspamd_mempool_alloc(task->task_pool, sizeof(*pval));
  1471. *pval = value;
  1472. g_hash_table_insert(tbl, (void *) key, pval);
  1473. }
  1474. else {
  1475. *pval = value;
  1476. }
  1477. }
  1478. double *
  1479. rspamd_task_profile_get(struct rspamd_task *task, const char *key)
  1480. {
  1481. GHashTable *tbl;
  1482. double *pval = NULL;
  1483. tbl = rspamd_mempool_get_variable(task->task_pool, RSPAMD_MEMPOOL_PROFILE);
  1484. if (tbl != NULL) {
  1485. pval = g_hash_table_lookup(tbl, key);
  1486. }
  1487. return pval;
  1488. }
  1489. gboolean
  1490. rspamd_task_set_finish_time(struct rspamd_task *task)
  1491. {
  1492. if (isnan(task->time_real_finish)) {
  1493. task->time_real_finish = ev_time();
  1494. return TRUE;
  1495. }
  1496. return FALSE;
  1497. }
  1498. const char *
  1499. rspamd_task_stage_name(enum rspamd_task_stage stg)
  1500. {
  1501. const char *ret = "unknown stage";
  1502. switch (stg) {
  1503. case RSPAMD_TASK_STAGE_CONNECT:
  1504. ret = "connect";
  1505. break;
  1506. case RSPAMD_TASK_STAGE_CONNFILTERS:
  1507. ret = "connection_filter";
  1508. break;
  1509. case RSPAMD_TASK_STAGE_READ_MESSAGE:
  1510. ret = "read_message";
  1511. break;
  1512. case RSPAMD_TASK_STAGE_PRE_FILTERS:
  1513. ret = "prefilters";
  1514. break;
  1515. case RSPAMD_TASK_STAGE_PROCESS_MESSAGE:
  1516. ret = "process_message";
  1517. break;
  1518. case RSPAMD_TASK_STAGE_FILTERS:
  1519. ret = "filters";
  1520. break;
  1521. case RSPAMD_TASK_STAGE_CLASSIFIERS_PRE:
  1522. ret = "classifiers_pre";
  1523. break;
  1524. case RSPAMD_TASK_STAGE_CLASSIFIERS:
  1525. ret = "classifiers";
  1526. break;
  1527. case RSPAMD_TASK_STAGE_CLASSIFIERS_POST:
  1528. ret = "classifiers_post";
  1529. break;
  1530. case RSPAMD_TASK_STAGE_COMPOSITES:
  1531. ret = "composites";
  1532. break;
  1533. case RSPAMD_TASK_STAGE_POST_FILTERS:
  1534. ret = "postfilters";
  1535. break;
  1536. case RSPAMD_TASK_STAGE_LEARN_PRE:
  1537. ret = "learn_pre";
  1538. break;
  1539. case RSPAMD_TASK_STAGE_LEARN:
  1540. ret = "learn";
  1541. break;
  1542. case RSPAMD_TASK_STAGE_LEARN_POST:
  1543. ret = "learn_post";
  1544. break;
  1545. case RSPAMD_TASK_STAGE_COMPOSITES_POST:
  1546. ret = "composites_post";
  1547. break;
  1548. case RSPAMD_TASK_STAGE_IDEMPOTENT:
  1549. ret = "idempotent";
  1550. break;
  1551. case RSPAMD_TASK_STAGE_DONE:
  1552. ret = "done";
  1553. break;
  1554. case RSPAMD_TASK_STAGE_REPLIED:
  1555. ret = "replied";
  1556. break;
  1557. default:
  1558. break;
  1559. }
  1560. return ret;
  1561. }
  1562. void rspamd_task_timeout(EV_P_ ev_timer *w, int revents)
  1563. {
  1564. struct rspamd_task *task = (struct rspamd_task *) w->data;
  1565. if (!(task->processed_stages & RSPAMD_TASK_STAGE_FILTERS)) {
  1566. ev_now_update_if_cheap(task->event_loop);
  1567. msg_info_task("processing of task time out: %.1fs spent; %.1fs limit; "
  1568. "forced processing",
  1569. ev_now(task->event_loop) - task->task_timestamp,
  1570. w->repeat);
  1571. if (task->cfg->soft_reject_on_timeout) {
  1572. struct rspamd_action *action, *soft_reject;
  1573. action = rspamd_check_action_metric(task, NULL, NULL);
  1574. if (action->action_type != METRIC_ACTION_REJECT) {
  1575. soft_reject = rspamd_config_get_action_by_type(task->cfg,
  1576. METRIC_ACTION_SOFT_REJECT);
  1577. rspamd_add_passthrough_result(task,
  1578. soft_reject,
  1579. 0,
  1580. NAN,
  1581. "timeout processing message",
  1582. "task timeout",
  1583. 0, NULL);
  1584. }
  1585. }
  1586. ev_timer_again(EV_A_ w);
  1587. task->processed_stages |= RSPAMD_TASK_STAGE_FILTERS;
  1588. rspamd_session_cleanup(task->s, true);
  1589. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1590. rspamd_session_pending(task->s);
  1591. }
  1592. else {
  1593. /* Postprocessing timeout */
  1594. msg_info_task("post-processing of task time out: %.1f second spent; forced processing",
  1595. ev_now(task->event_loop) - task->task_timestamp);
  1596. if (task->cfg->soft_reject_on_timeout) {
  1597. struct rspamd_action *action, *soft_reject;
  1598. action = rspamd_check_action_metric(task, NULL, NULL);
  1599. if (action->action_type != METRIC_ACTION_REJECT) {
  1600. soft_reject = rspamd_config_get_action_by_type(task->cfg,
  1601. METRIC_ACTION_SOFT_REJECT);
  1602. rspamd_add_passthrough_result(task,
  1603. soft_reject,
  1604. 0,
  1605. NAN,
  1606. "timeout post-processing message",
  1607. "task timeout",
  1608. 0, NULL);
  1609. }
  1610. }
  1611. ev_timer_stop(EV_A_ w);
  1612. task->processed_stages |= RSPAMD_TASK_STAGE_DONE;
  1613. rspamd_session_cleanup(task->s, true);
  1614. rspamd_task_process(task, RSPAMD_TASK_PROCESS_ALL);
  1615. rspamd_session_pending(task->s);
  1616. }
  1617. }
  1618. void rspamd_worker_guard_handler(EV_P_ ev_io *w, int revents)
  1619. {
  1620. struct rspamd_task *task = (struct rspamd_task *) w->data;
  1621. char fake_buf[1024];
  1622. gssize r;
  1623. r = read(w->fd, fake_buf, sizeof(fake_buf));
  1624. if (r > 0) {
  1625. msg_warn_task("received extra data after task is loaded, ignoring");
  1626. }
  1627. else {
  1628. if (r == 0) {
  1629. /*
  1630. * Poor man approach, that might break things in case of
  1631. * shutdown (SHUT_WR) but sockets are so bad that there's no
  1632. * reliable way to distinguish between shutdown(SHUT_WR) and
  1633. * close.
  1634. */
  1635. if (task->cmd != CMD_CHECK_V2 && task->cfg->enable_shutdown_workaround) {
  1636. msg_info_task("workaround for shutdown enabled, please update "
  1637. "your client, this support might be removed in future");
  1638. shutdown(w->fd, SHUT_RD);
  1639. ev_io_stop(task->event_loop, &task->guard_ev);
  1640. }
  1641. else {
  1642. msg_err_task("the peer has closed connection unexpectedly");
  1643. rspamd_session_destroy(task->s);
  1644. }
  1645. }
  1646. else if (errno != EAGAIN) {
  1647. msg_err_task("the peer has closed connection unexpectedly: %s",
  1648. strerror(errno));
  1649. rspamd_session_destroy(task->s);
  1650. }
  1651. else {
  1652. return;
  1653. }
  1654. }
  1655. }