/************************************************************************ * IRC - Internet Relay Chat, src/listener.c * Copyright (C) 1999 Thomas Helvey * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 1, or (at your option) * any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. * * $Id: listener.c 814 2004-09-13 17:18:26Z sirvulcan $ */ #include "config.h" #include "listener.h" #include "client.h" #include "ircd.h" #include "ircd_alloc.h" #include "ircd_events.h" #include "ircd_features.h" #include "ircd_osdep.h" #include "ircd_reply.h" #include "ircd_snprintf.h" #include "ircd_string.h" #include "numeric.h" #include "s_bsd.h" #include "s_conf.h" #include "s_misc.h" #include "s_stats.h" #include "send.h" #include "sys.h" /* MAXCLIENTS */ #include #include #include #include #include #include #include #include #include #ifndef INADDR_NONE #define INADDR_NONE ((unsigned int) 0xffffffff) #endif struct Listener* ListenerPollList = 0; static void accept_connection(struct Event* ev); static struct Listener* make_listener(int port, struct in_addr addr) { struct Listener* listener = (struct Listener*) MyMalloc(sizeof(struct Listener)); assert(0 != listener); memset(listener, 0, sizeof(struct Listener)); listener->fd = -1; listener->port = port; listener->addr.s_addr = addr.s_addr; #ifdef NULL_POINTER_NOT_ZERO listener->next = NULL; listener->conf = NULL; #endif return listener; } static void free_listener(struct Listener* listener) { assert(0 != listener); MyFree(listener); } #define PORTNAMELEN 10 /* ":31337" */ /* * get_listener_name - return displayable listener name and port * returns "host.foo.org:6667" for a given listener */ const char* get_listener_name(const struct Listener* listener) { static char buf[HOSTLEN + PORTNAMELEN + 4]; assert(0 != listener); ircd_snprintf(0, buf, sizeof(buf), "%s:%u", cli_name(&me), listener->port); return buf; } /* * count_listener_memory - count memory and listeners */ void count_listener_memory(int* count_out, size_t* size_out) { struct Listener* l; int count = 0; assert(0 != count_out); assert(0 != size_out); for (l = ListenerPollList; l; l = l->next) ++count; *count_out = count; *size_out = count * sizeof(struct Listener); } /* * show_ports - send port listing to a client * inputs - pointer to client to show ports to * output - none * side effects - show ports * author - Dianora */ void show_ports(struct Client* sptr, struct StatDesc* sd, int stat, char* param) { struct Listener* listener = 0; char flags[8]; int show_hidden = IsOper(sptr); int count = IsOper(sptr) || MyUser(sptr) ? 100 : 8; int port = 0; assert(0 != sptr); if (param) port = atoi(param); for (listener = ListenerPollList; listener; listener = listener->next) { if (port && port != listener->port) continue; #ifdef USE_SSL flags[0] = (listener->server) ? 'S' : ((listener->ssl) ? 'E' : 'C'); #else flags[0] = (listener->server) ? 'S' : 'C'; #endif /* USE_SSL */ if (listener->hidden) { if (!show_hidden) continue; flags[1] = 'H'; flags[2] = '\0'; } else flags[1] = '\0'; send_reply(sptr, RPL_STATSPLINE, listener->port, listener->ref_count, flags, (listener->active) ? "active" : "disabled"); if (--count == 0) break; } } /* * inetport - create a listener socket in the AF_INET domain, * bind it to the port given in 'port' and listen to it * returns true (1) if successful false (0) on error. * * If the operating system has a define for SOMAXCONN, use it, otherwise * use HYBRID_SOMAXCONN -Dianora * NOTE: Do this in os_xxxx.c files */ #ifdef SOMAXCONN #define HYBRID_SOMAXCONN SOMAXCONN #else #define HYBRID_SOMAXCONN 64 #endif static int inetport(struct Listener* listener) { struct sockaddr_in sin; int fd; /* * At first, open a new socket */ if (-1 == (fd = socket(AF_INET, SOCK_STREAM, 0))) { report_error(SOCKET_ERROR_MSG, get_listener_name(listener), errno); return 0; } else if (fd > MAXCLIENTS - 1) { report_error(CONNLIMIT_ERROR_MSG, get_listener_name(listener), 0); close(fd); return 0; } if (!os_set_reuseaddr(fd)) { report_error(REUSEADDR_ERROR_MSG, get_listener_name(listener), errno); close(fd); return 0; } /* * Bind a port to listen for new connections if port is non-null, * else assume it is already open and try get something from it. */ memset(&sin, 0, sizeof(sin)); sin.sin_family = AF_INET; sin.sin_addr = listener->addr; sin.sin_port = htons(listener->port); if (bind(fd, (struct sockaddr*) &sin, sizeof(sin))) { report_error(BIND_ERROR_MSG, get_listener_name(listener), errno); close(fd); return 0; } /* * Set the buffer sizes for the listener. Accepted connections * inherit the accepting sockets settings for SO_RCVBUF S_SNDBUF * The window size is set during the SYN ACK so setting it anywhere * else has no effect whatsoever on the connection. * NOTE: this must be set before listen is called */ if (!os_set_sockbufs(fd, (listener->server) ? feature_int(FEAT_SOCKSENDBUF) : CLIENT_TCP_WINDOW, (listener->server) ? feature_int(FEAT_SOCKRECVBUF) : CLIENT_TCP_WINDOW)) { report_error(SETBUFS_ERROR_MSG, get_listener_name(listener), errno); close(fd); return 0; } if (!os_set_listen(fd, HYBRID_SOMAXCONN)) { report_error(LISTEN_ERROR_MSG, get_listener_name(listener), errno); close(fd); return 0; } /* * XXX - this should always work, performance will suck if it doesn't */ if (!os_set_nonblocking(fd)) { report_error(NONB_ERROR_MSG, get_listener_name(listener), errno); close(fd); return 0; } /* * Set the TOS bits - this is nonfatal if it doesn't stick. */ if (!os_set_tos(fd,feature_int((listener->server)?FEAT_TOS_SERVER : FEAT_TOS_CLIENT))) { report_error(TOS_ERROR_MSG, get_listener_name(listener), errno); } if (!socket_add(&listener->socket, accept_connection, (void*) listener, SS_LISTENING, 0, fd)) { /* Error should already have been reported to the logs */ close(fd); return 0; } listener->fd = fd; return 1; } /* * find_listener - find a listener in the list * * XXX - this function does N comparisons so if the list is huge * we may want to do something else for this. (rehash and init use this) */ static struct Listener* find_listener(int port, struct in_addr addr) { struct Listener* listener; for (listener = ListenerPollList; listener; listener = listener->next) { if (port == listener->port && addr.s_addr == listener->addr.s_addr) return listener; } return 0; } /* * set_listener_mask - set the connection mask for this listener */ static void set_listener_mask(struct Listener* listener, const char* mask) { int ad[4]; char ipname[20]; assert(0 != listener); if (EmptyString(mask) || 0 == strcmp(mask, "*")) { listener->mask.s_addr = 0; return; } ad[0] = ad[1] = ad[2] = ad[3] = 0; /* * do it this way because building ip# from separate values for each * byte requires endian knowledge or some nasty messing. Also means * easy conversion of "*" 0.0.0.0 or 134.* to 134.0.0.0 :-) */ sscanf(mask, "%d.%d.%d.%d", &ad[0], &ad[1], &ad[2], &ad[3]); ircd_snprintf(0, ipname, sizeof(ipname), "%d.%d.%d.%d", ad[0], ad[1], ad[2], ad[3]); listener->mask.s_addr = inet_addr(ipname); } /* * connection_allowed - spin through mask and addr passed to see if connect * allowed on a listener, uses mask generated by set_listener_mask */ static int connection_allowed(const char* addr, const char* mask) { int i = 4; for ( ; i > 0; --i) { if (*mask && *addr != *mask) break; ++addr; ++mask; } return (0 == i); } /* * add_listener- create a new listener * port - the port number to listen on * vhost_ip - if non-null must contain a valid IP address string in * the format "255.255.255.255" */ #ifdef USE_SSL void add_listener(int port, const char* vhost_ip, const char* mask, int is_server, int is_hidden, int is_ssl) #else void add_listener(int port, const char* vhost_ip, const char* mask, int is_server, int is_hidden) #endif /* USE_SSL */ { struct Listener* listener; struct in_addr vaddr; /* * if no port in conf line, don't bother */ if (0 == port) return; vaddr.s_addr = INADDR_ANY; if (!EmptyString(vhost_ip) && strcmp(vhost_ip,"*") != 0) { vaddr.s_addr = inet_addr(vhost_ip); if (INADDR_NONE == vaddr.s_addr) return; } if ((listener = find_listener(port, vaddr))) { /* * set active flag and change connect mask here, it's the only thing * that can change on a rehash */ listener->active = 1; set_listener_mask(listener, mask); listener->hidden = is_hidden; listener->server = is_server; #ifdef USE_SSL listener->ssl = is_ssl; #endif /* USE_SSL */ return; } listener = make_listener(port, vaddr); set_listener_mask(listener, mask); listener->hidden = is_hidden; listener->server = is_server; #ifdef USE_SSL listener->ssl = is_ssl; #endif /* USE_SSL */ if (inetport(listener)) { listener->active = 1; listener->next = ListenerPollList; ListenerPollList = listener; } else free_listener(listener); } /* * mark_listeners_closing - iterate through listeners and mark them as * inactive */ void mark_listeners_closing(void) { struct Listener* listener; for (listener = ListenerPollList; listener; listener = listener->next) listener->active = 0; } /* * close_listener - close a single listener */ void close_listener(struct Listener* listener) { assert(0 != listener); /* * remove from listener list */ if (listener == ListenerPollList) ListenerPollList = listener->next; else { struct Listener* prev = ListenerPollList; for ( ; prev; prev = prev->next) { if (listener == prev->next) { prev->next = listener->next; break; } } } if (-1 < listener->fd) close(listener->fd); socket_del(&listener->socket); } /* * close_listeners - close and free all listeners that are not being used */ void close_listeners() { struct Listener* listener; struct Listener* listener_next = 0; /* * close all 'extra' listening ports we have */ for (listener = ListenerPollList; listener; listener = listener_next) { listener_next = listener->next; if (0 == listener->active && 0 == listener->ref_count) close_listener(listener); } } void release_listener(struct Listener* listener) { assert(0 != listener); assert(0 < listener->ref_count); if (0 == --listener->ref_count && !listener->active) close_listener(listener); } /* * accept_connection - accept a connection on a listener */ static void accept_connection(struct Event* ev) { struct Listener* listener; struct sockaddr_in addr = { 0 }; unsigned int addrlen = sizeof(struct sockaddr_in); int fd; assert(0 != ev_socket(ev)); assert(0 != s_data(ev_socket(ev))); listener = s_data(ev_socket(ev)); if (ev_type(ev) == ET_DESTROY) /* being destroyed */ free_listener(listener); else { assert(ev_type(ev) == ET_ACCEPT || ev_type(ev) == ET_ERROR); listener->last_accept = CurrentTime; /* * There may be many reasons for error return, but * in otherwise correctly working environment the * probable cause is running out of file descriptors * (EMFILE, ENFILE or others?). The man pages for * accept don't seem to list these as possible, * although it's obvious that it may happen here. * Thus no specific errors are tested at this * point, just assume that connections cannot * be accepted until some old is closed first. */ /* * This piece of code implements multi-accept, based * on the idea that poll/select can only be efficient, * if we succeed in handling all available events, * i.e. accept all pending connections. * * http://www.hpl.hp.com/techreports/2000/HPL-2000-174.html */ while (1) { if (-1 == (fd = accept(listener->fd, (struct sockaddr*) &addr, &addrlen))) { /* There is no other connection pending */ if (errno == EAGAIN || errno == EWOULDBLOCK) return; /* Lotsa admins seem to have problems with not giving enough file * descriptors to their server so we'll add a generic warning mechanism * here. If it turns out too many messages are generated for * meaningless reasons we can filter them back. */ sendto_opmask_butone(0, SNO_TCPCOMMON, "Unable to accept connection: %m"); return; } /* * check for connection limit. If this fd exceeds the limit, * all further accept()ed connections will also exceed it. * Enable the server to clear out other connections before * continuing to accept() new connections. */ if (fd > MAXCLIENTS - 1) { ++ServerStats->is_ref; send(fd, "ERROR :All connections in use\r\n", 32, 0); close(fd); return; } /* * check to see if listener is shutting down. Continue * to accept(), because it makes sense to clear our the * socket's queue as fast as possible. */ if (!listener->active) { ++ServerStats->is_ref; send(fd, "ERROR :Use another port\r\n", 25, 0); close(fd); continue; } /* * check to see if connection is allowed for this address mask */ if (!connection_allowed((const char*) &addr, (const char*) &listener->mask)) { ++ServerStats->is_ref; send(fd, "ERROR :Use another port\r\n", 25, 0); close(fd); continue; } ++ServerStats->is_ac; /* nextping = CurrentTime; */ #ifdef USE_SSL if (listener->ssl) ssl_add_connection(listener, fd); else add_connection(listener, fd, NULL); #else add_connection(listener, fd); #endif /* USE_SSL */ } } }