1 /************************************************************************
2 * IRC - Internet Relay Chat, src/listener.c
3 * Copyright (C) 1999 Thomas Helvey <tomh@inxpress.net>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 1, or (at your option)
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 #include "ircd_alloc.h"
27 #include "ircd_events.h"
28 #include "ircd_features.h"
29 #include "ircd_osdep.h"
30 #include "ircd_reply.h"
31 #include "ircd_snprintf.h"
32 #include "ircd_string.h"
39 #include "sys.h" /* MAXCLIENTS */
48 #include <sys/socket.h>
49 #include <arpa/inet.h>
52 #define INADDR_NONE ((unsigned int) 0xffffffff)
55 struct Listener* ListenerPollList = 0;
57 static void accept_connection(struct Event* ev);
59 static struct Listener* make_listener(int port, struct in_addr addr)
61 struct Listener* listener =
62 (struct Listener*) MyMalloc(sizeof(struct Listener));
63 assert(0 != listener);
65 memset(listener, 0, sizeof(struct Listener));
68 listener->port = port;
69 listener->addr.s_addr = addr.s_addr;
71 #ifdef NULL_POINTER_NOT_ZERO
72 listener->next = NULL;
73 listener->conf = NULL;
78 static void free_listener(struct Listener* listener)
80 assert(0 != listener);
84 #define PORTNAMELEN 10 /* ":31337" */
87 * get_listener_name - return displayable listener name and port
88 * returns "host.foo.org:6667" for a given listener
90 const char* get_listener_name(const struct Listener* listener)
92 static char buf[HOSTLEN + PORTNAMELEN + 4];
93 assert(0 != listener);
94 ircd_snprintf(0, buf, sizeof(buf), "%s:%u", cli_name(&me), listener->port);
99 * count_listener_memory - count memory and listeners
101 void count_listener_memory(int* count_out, size_t* size_out)
105 assert(0 != count_out);
106 assert(0 != size_out);
107 for (l = ListenerPollList; l; l = l->next)
110 *size_out = count * sizeof(struct Listener);
114 * show_ports - send port listing to a client
115 * inputs - pointer to client to show ports to
117 * side effects - show ports
120 void show_ports(struct Client* sptr, struct StatDesc* sd, int stat,
123 struct Listener *listener = 0;
125 int show_hidden = IsOper(sptr);
126 int count = (IsOper(sptr) || MyUser(sptr)) ? 100 : 8;
134 for (listener = ListenerPollList; listener; listener = listener->next) {
135 if (port && port != listener->port)
137 flags[0] = (listener->server) ? 'S' : 'C';
138 if (listener->hidden) {
147 send_reply(sptr, RPL_STATSPLINE, listener->port, listener->ref_count,
148 flags, (listener->active) ? "active" : "disabled");
155 * inetport - create a listener socket in the AF_INET domain,
156 * bind it to the port given in 'port' and listen to it
157 * returns true (1) if successful false (0) on error.
159 * If the operating system has a define for SOMAXCONN, use it, otherwise
160 * use HYBRID_SOMAXCONN -Dianora
161 * NOTE: Do this in os_xxxx.c files
164 #define HYBRID_SOMAXCONN SOMAXCONN
166 #define HYBRID_SOMAXCONN 64
169 static int inetport(struct Listener* listener)
171 struct sockaddr_in sin;
175 * At first, open a new socket
177 if (-1 == (fd = socket(AF_INET, SOCK_STREAM, 0))) {
178 report_error(SOCKET_ERROR_MSG, get_listener_name(listener), errno);
181 else if (fd > MAXCLIENTS - 1) {
182 report_error(CONNLIMIT_ERROR_MSG, get_listener_name(listener), 0);
187 if (!os_set_reuseaddr(fd)) {
188 report_error(REUSEADDR_ERROR_MSG, get_listener_name(listener), errno);
193 * Bind a port to listen for new connections if port is non-null,
194 * else assume it is already open and try get something from it.
196 memset(&sin, 0, sizeof(sin));
197 sin.sin_family = AF_INET;
198 sin.sin_addr = listener->addr;
199 sin.sin_port = htons(listener->port);
201 if (bind(fd, (struct sockaddr*) &sin, sizeof(sin))) {
202 report_error(BIND_ERROR_MSG, get_listener_name(listener), errno);
207 * Set the buffer sizes for the listener. Accepted connections
208 * inherit the accepting sockets settings for SO_RCVBUF S_SNDBUF
209 * The window size is set during the SYN ACK so setting it anywhere
210 * else has no effect whatsoever on the connection.
211 * NOTE: this must be set before listen is called
213 if (!os_set_sockbufs(fd,
214 (listener->server) ? feature_int(FEAT_SOCKSENDBUF) : CLIENT_TCP_WINDOW,
215 (listener->server) ? feature_int(FEAT_SOCKRECVBUF) : CLIENT_TCP_WINDOW)) {
216 report_error(SETBUFS_ERROR_MSG, get_listener_name(listener), errno);
220 if (!os_set_listen(fd, HYBRID_SOMAXCONN)) {
221 report_error(LISTEN_ERROR_MSG, get_listener_name(listener), errno);
226 * XXX - this should always work, performance will suck if it doesn't
228 if (!os_set_nonblocking(fd)) {
229 report_error(NONB_ERROR_MSG, get_listener_name(listener), errno);
234 * Set the TOS bits - this is nonfatal if it doesn't stick.
236 if (!os_set_tos(fd,feature_int((listener->server)?FEAT_TOS_SERVER : FEAT_TOS_CLIENT))) {
237 report_error(TOS_ERROR_MSG, get_listener_name(listener), errno);
240 if (!socket_add(&listener->socket, accept_connection, (void*) listener,
241 SS_LISTENING, 0, fd)) {
242 /* Error should already have been reported to the logs */
253 * find_listener - find a listener in the list
255 * XXX - this function does N comparisons so if the list is huge
256 * we may want to do something else for this. (rehash and init use this)
258 static struct Listener* find_listener(int port, struct in_addr addr)
260 struct Listener* listener;
261 for (listener = ListenerPollList; listener; listener = listener->next) {
262 if (port == listener->port && addr.s_addr == listener->addr.s_addr)
269 * set_listener_mask - set the connection mask for this listener
271 static void set_listener_mask(struct Listener* listener, const char* mask)
276 assert(0 != listener);
278 if (EmptyString(mask) || 0 == strcmp(mask, "*")) {
279 listener->mask.s_addr = 0;
282 ad[0] = ad[1] = ad[2] = ad[3] = 0;
284 * do it this way because building ip# from separate values for each
285 * byte requires endian knowledge or some nasty messing. Also means
286 * easy conversion of "*" 0.0.0.0 or 134.* to 134.0.0.0 :-)
288 sscanf(mask, "%d.%d.%d.%d", &ad[0], &ad[1], &ad[2], &ad[3]);
289 ircd_snprintf(0, ipname, sizeof(ipname), "%d.%d.%d.%d", ad[0], ad[1], ad[2],
291 listener->mask.s_addr = inet_addr(ipname);
295 * connection_allowed - spin through mask and addr passed to see if connect
296 * allowed on a listener, uses mask generated by set_listener_mask
298 static int connection_allowed(const char* addr, const char* mask)
301 for ( ; i > 0; --i) {
302 if (*mask && *addr != *mask)
312 * add_listener- create a new listener
313 * port - the port number to listen on
314 * vhost_ip - if non-null must contain a valid IP address string in
315 * the format "255.255.255.255"
317 void add_listener(int port, const char* vhost_ip, const char* mask,
318 int is_server, int is_hidden)
320 struct Listener* listener;
321 struct in_addr vaddr;
324 * if no port in conf line, don't bother
329 vaddr.s_addr = INADDR_ANY;
331 if (!EmptyString(vhost_ip) && strcmp(vhost_ip,"*") != 0) {
332 vaddr.s_addr = inet_addr(vhost_ip);
333 if (INADDR_NONE == vaddr.s_addr)
337 if ((listener = find_listener(port, vaddr))) {
339 * set active flag and change connect mask here, it's the only thing
340 * that can change on a rehash
342 listener->active = 1;
343 set_listener_mask(listener, mask);
344 listener->hidden = is_hidden;
345 listener->server = is_server;
349 listener = make_listener(port, vaddr);
351 if (inetport(listener)) {
352 listener->active = 1;
353 set_listener_mask(listener, mask);
354 listener->hidden = is_hidden;
355 listener->server = is_server;
356 listener->next = ListenerPollList;
357 ListenerPollList = listener;
360 free_listener(listener);
364 * mark_listeners_closing - iterate through listeners and mark them as
367 void mark_listeners_closing(void)
369 struct Listener* listener;
370 for (listener = ListenerPollList; listener; listener = listener->next)
371 listener->active = 0;
375 * close_listener - close a single listener
377 void close_listener(struct Listener* listener)
379 assert(0 != listener);
381 * remove from listener list
383 if (listener == ListenerPollList)
384 ListenerPollList = listener->next;
386 struct Listener* prev = ListenerPollList;
387 for ( ; prev; prev = prev->next) {
388 if (listener == prev->next) {
389 prev->next = listener->next;
394 if (-1 < listener->fd)
396 socket_del(&listener->socket);
400 * close_listeners - close and free all listeners that are not being used
402 void close_listeners()
404 struct Listener* listener;
405 struct Listener* listener_next = 0;
407 * close all 'extra' listening ports we have
409 for (listener = ListenerPollList; listener; listener = listener_next) {
410 listener_next = listener->next;
411 if (0 == listener->active && 0 == listener->ref_count)
412 close_listener(listener);
416 void release_listener(struct Listener* listener)
418 assert(0 != listener);
419 assert(0 < listener->ref_count);
420 if (0 == --listener->ref_count && !listener->active)
421 close_listener(listener);
425 * accept_connection - accept a connection on a listener
427 static void accept_connection(struct Event* ev)
429 struct Listener* listener;
430 struct sockaddr_in addr = { 0 };
431 unsigned int addrlen = sizeof(struct sockaddr_in);
434 assert(0 != ev_socket(ev));
435 assert(0 != s_data(ev_socket(ev)));
437 listener = (struct Listener*) s_data(ev_socket(ev));
439 if (ev_type(ev) == ET_DESTROY) /* being destroyed */
440 free_listener(listener);
442 assert(ev_type(ev) == ET_ACCEPT || ev_type(ev) == ET_ERROR);
444 listener->last_accept = CurrentTime;
446 * There may be many reasons for error return, but
447 * in otherwise correctly working environment the
448 * probable cause is running out of file descriptors
449 * (EMFILE, ENFILE or others?). The man pages for
450 * accept don't seem to list these as possible,
451 * although it's obvious that it may happen here.
452 * Thus no specific errors are tested at this
453 * point, just assume that connections cannot
454 * be accepted until some old is closed first.
456 * This piece of code implements multi-accept, based
457 * on the idea that poll/select can only be efficient,
458 * if we succeed in handling all available events,
459 * i.e. accept all pending connections.
461 * http://www.hpl.hp.com/techreports/2000/HPL-2000-174.html
465 if ((fd = accept(listener->fd, (struct sockaddr*) &addr, &addrlen))
468 if (errno == EAGAIN ||
470 errno == EWOULDBLOCK)
473 /* Lotsa admins seem to have problems with not giving enough file
474 * descriptors to their server so we'll add a generic warning mechanism
475 * here. If it turns out too many messages are generated for
476 * meaningless reasons we can filter them back.
478 sendto_opmask_butone(0, SNO_TCPCOMMON,
479 "Unable to accept connection: %m");
483 * check for connection limit. If this fd exceeds the limit,
484 * all further accept()ed connections will also exceed it.
485 * Enable the server to clear out other connections before
486 * continuing to accept() new connections.
488 if (fd > MAXCLIENTS - 1)
490 ++ServerStats->is_ref;
491 send(fd, "ERROR :All connections in use\r\n", 32, 0);
496 * check to see if listener is shutting down. Continue
497 * to accept(), because it makes sense to clear our the
498 * socket's queue as fast as possible.
500 if (!listener->active)
502 ++ServerStats->is_ref;
503 send(fd, "ERROR :Use another port\r\n", 25, 0);
508 * check to see if connection is allowed for this address mask
510 if (!connection_allowed((const char*) &addr,
511 (const char*) &listener->mask))
513 ++ServerStats->is_ref;
514 send(fd, "ERROR :Use another port\r\n", 25, 0);
518 ++ServerStats->is_ac;
519 /* nextping = CurrentTime; */
520 add_connection(listener, fd);