1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * InspIRCd: (C) 2002-2010 InspIRCd Development Team
6 * See: http://wiki.inspircd.org/Credits
8 * This program is free but copyrighted software; see
9 * the file COPYING for details.
11 * ---------------------------------------------------
18 #include "socketengine.h"
20 ListenSocket::ListenSocket(ConfigTag* tag, const irc::sockets::sockaddrs& bind_to)
23 irc::sockets::satoap(bind_to, bind_addr, bind_port);
24 bind_desc = irc::sockets::satouser(bind_to);
26 fd = socket(bind_to.sa.sa_family, SOCK_STREAM, 0);
31 ServerInstance->SE->SetReuse(fd);
32 int rv = ServerInstance->SE->Bind(this->fd, bind_to);
34 rv = ServerInstance->SE->Listen(this->fd, ServerInstance->Config->MaxConn);
39 ServerInstance->SE->Shutdown(this, 2);
40 ServerInstance->SE->Close(this);
46 ServerInstance->SE->NonBlocking(this->fd);
47 ServerInstance->SE->AddFd(this, FD_WANT_POLL_READ | FD_WANT_NO_WRITE);
51 ListenSocket::~ListenSocket()
53 if (this->GetFd() > -1)
55 ServerInstance->SE->DelFd(this);
56 ServerInstance->Logs->Log("SOCKET", DEBUG,"Shut down listener on fd %d", this->fd);
57 if (ServerInstance->SE->Shutdown(this, 2) || ServerInstance->SE->Close(this))
58 ServerInstance->Logs->Log("SOCKET", DEBUG,"Failed to cancel listener: %s", strerror(errno));
63 /* Just seperated into another func for tidiness really.. */
64 void ListenSocket::AcceptInternal()
66 irc::sockets::sockaddrs client;
67 irc::sockets::sockaddrs server;
69 socklen_t length = sizeof(client);
70 int incomingSockfd = ServerInstance->SE->Accept(this, &client.sa, &length);
72 ServerInstance->Logs->Log("SOCKET",DEBUG,"HandleEvent for Listensoket %s nfd=%d", bind_desc.c_str(), incomingSockfd);
73 if (incomingSockfd < 0)
75 ServerInstance->stats->statsRefused++;
79 socklen_t sz = sizeof(server);
80 if (getsockname(incomingSockfd, &server.sa, &sz))
82 ServerInstance->Logs->Log("SOCKET", DEBUG, "Can't get peername: %s", strerror(errno));
83 irc::sockets::aptosa(bind_addr, bind_port, server);
88 * this is done as a safety check to keep the file descriptors within range of fd_ref_table.
89 * its a pretty big but for the moment valid assumption:
90 * file descriptors are handed out starting at 0, and are recycled as theyre freed.
91 * therefore if there is ever an fd over 65535, 65536 clients must be connected to the
92 * irc server at once (or the irc server otherwise initiating this many connections, files etc)
93 * which for the time being is a physical impossibility (even the largest networks dont have more
94 * than about 10,000 users on ONE server!)
96 if (incomingSockfd >= ServerInstance->SE->GetMaxFds())
98 ServerInstance->Logs->Log("SOCKET", DEBUG, "Server is full");
99 ServerInstance->SE->Shutdown(incomingSockfd, 2);
100 ServerInstance->SE->Close(incomingSockfd);
101 ServerInstance->stats->statsRefused++;
105 if (client.sa.sa_family == AF_INET6)
108 * This case is the be all and end all patch to catch and nuke 4in6
109 * instead of special-casing shit all over the place and wreaking merry
110 * havoc with crap, instead, we just recreate sockaddr and strip ::ffff: prefix
113 * This is, of course, much improved over the older way of handling this
114 * (pretend it doesn't exist + hack around it -- yes, both were done!)
116 * Big, big thanks to danieldg for his work on this.
119 static const unsigned char prefix4in6[12] = { 0,0,0,0, 0,0,0,0, 0,0,0xFF,0xFF };
120 if (!memcmp(prefix4in6, &client.in6.sin6_addr, 12))
122 // recreate as a sockaddr_in using the IPv4 IP
123 uint16_t sport = client.in6.sin6_port;
124 uint32_t addr = *reinterpret_cast<uint32_t*>(client.in6.sin6_addr.s6_addr + 12);
125 client.in4.sin_family = AF_INET;
126 client.in4.sin_port = sport;
127 client.in4.sin_addr.s_addr = addr;
129 sport = server.in6.sin6_port;
130 addr = *reinterpret_cast<uint32_t*>(server.in6.sin6_addr.s6_addr + 12);
131 server.in4.sin_family = AF_INET;
132 server.in4.sin_port = sport;
133 server.in4.sin_addr.s_addr = addr;
137 ServerInstance->SE->NonBlocking(incomingSockfd);
140 FIRST_MOD_RESULT(OnAcceptConnection, res, (incomingSockfd, this, &client, &server));
141 if (res == MOD_RES_PASSTHRU)
143 std::string type = bind_tag->getString("type", "clients");
144 if (type == "clients")
146 ServerInstance->Users->AddUser(incomingSockfd, this, &client, &server);
150 if (res == MOD_RES_ALLOW)
152 ServerInstance->stats->statsAccept++;
156 ServerInstance->stats->statsRefused++;
157 ServerInstance->Logs->Log("SOCKET",DEFAULT,"Refusing connection on %s - %s",
158 bind_desc.c_str(), res == MOD_RES_DENY ? "Connection refused by module" : "Module for this port not found");
159 ServerInstance->SE->Close(incomingSockfd);
163 void ListenSocket::HandleEvent(EventType e, int err)
168 ServerInstance->Logs->Log("SOCKET",DEFAULT,"ListenSocket::HandleEvent() received a socket engine error event! well shit! '%s'", strerror(err));
171 ServerInstance->Logs->Log("SOCKET",DEBUG,"*** BUG *** ListenSocket::HandleEvent() got a WRITE event!!!");
174 this->AcceptInternal();