1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * InspIRCd: (C) 2002-2010 InspIRCd Development Team
6 * See: http://wiki.inspircd.org/Credits
8 * This program is free but copyrighted software; see
9 * the file COPYING for details.
11 * ---------------------------------------------------
16 #include "socketengine.h"
18 ListenSocket::ListenSocket(ConfigTag* tag, const irc::sockets::sockaddrs& bind_to)
21 irc::sockets::satoap(bind_to, bind_addr, bind_port);
22 bind_desc = irc::sockets::satouser(bind_to);
24 fd = socket(bind_to.sa.sa_family, SOCK_STREAM, 0);
29 ServerInstance->SE->SetReuse(fd);
30 int rv = ServerInstance->SE->Bind(this->fd, bind_to);
32 rv = ServerInstance->SE->Listen(this->fd, ServerInstance->Config->MaxConn);
37 ServerInstance->SE->Shutdown(this, 2);
38 ServerInstance->SE->Close(this);
44 ServerInstance->SE->NonBlocking(this->fd);
45 ServerInstance->SE->AddFd(this, FD_WANT_POLL_READ | FD_WANT_NO_WRITE);
49 ListenSocket::~ListenSocket()
51 if (this->GetFd() > -1)
53 ServerInstance->SE->DelFd(this);
54 ServerInstance->Logs->Log("SOCKET", DEBUG,"Shut down listener on fd %d", this->fd);
55 if (ServerInstance->SE->Shutdown(this, 2) || ServerInstance->SE->Close(this))
56 ServerInstance->Logs->Log("SOCKET", DEBUG,"Failed to cancel listener: %s", strerror(errno));
61 /* Just seperated into another func for tidiness really.. */
62 void ListenSocket::AcceptInternal()
64 irc::sockets::sockaddrs client;
65 irc::sockets::sockaddrs server;
67 socklen_t length = sizeof(client);
68 int incomingSockfd = ServerInstance->SE->Accept(this, &client.sa, &length);
70 ServerInstance->Logs->Log("SOCKET",DEBUG,"HandleEvent for Listensocket %s nfd=%d", bind_desc.c_str(), incomingSockfd);
71 if (incomingSockfd < 0)
73 ServerInstance->stats->statsRefused++;
77 socklen_t sz = sizeof(server);
78 if (getsockname(incomingSockfd, &server.sa, &sz))
80 ServerInstance->Logs->Log("SOCKET", DEBUG, "Can't get peername: %s", strerror(errno));
81 irc::sockets::aptosa(bind_addr, bind_port, server);
86 * this is done as a safety check to keep the file descriptors within range of fd_ref_table.
87 * its a pretty big but for the moment valid assumption:
88 * file descriptors are handed out starting at 0, and are recycled as theyre freed.
89 * therefore if there is ever an fd over 65535, 65536 clients must be connected to the
90 * irc server at once (or the irc server otherwise initiating this many connections, files etc)
91 * which for the time being is a physical impossibility (even the largest networks dont have more
92 * than about 10,000 users on ONE server!)
94 if (incomingSockfd >= ServerInstance->SE->GetMaxFds())
96 ServerInstance->Logs->Log("SOCKET", DEBUG, "Server is full");
97 ServerInstance->SE->Shutdown(incomingSockfd, 2);
98 ServerInstance->SE->Close(incomingSockfd);
99 ServerInstance->stats->statsRefused++;
103 if (client.sa.sa_family == AF_INET6)
106 * This case is the be all and end all patch to catch and nuke 4in6
107 * instead of special-casing shit all over the place and wreaking merry
108 * havoc with crap, instead, we just recreate sockaddr and strip ::ffff: prefix
111 * This is, of course, much improved over the older way of handling this
112 * (pretend it doesn't exist + hack around it -- yes, both were done!)
114 * Big, big thanks to danieldg for his work on this.
117 static const unsigned char prefix4in6[12] = { 0,0,0,0, 0,0,0,0, 0,0,0xFF,0xFF };
118 if (!memcmp(prefix4in6, &client.in6.sin6_addr, 12))
120 // recreate as a sockaddr_in using the IPv4 IP
121 uint16_t sport = client.in6.sin6_port;
122 uint32_t addr = *reinterpret_cast<uint32_t*>(client.in6.sin6_addr.s6_addr + 12);
123 client.in4.sin_family = AF_INET;
124 client.in4.sin_port = sport;
125 client.in4.sin_addr.s_addr = addr;
127 sport = server.in6.sin6_port;
128 addr = *reinterpret_cast<uint32_t*>(server.in6.sin6_addr.s6_addr + 12);
129 server.in4.sin_family = AF_INET;
130 server.in4.sin_port = sport;
131 server.in4.sin_addr.s_addr = addr;
135 ServerInstance->SE->NonBlocking(incomingSockfd);
138 FIRST_MOD_RESULT(OnAcceptConnection, res, (incomingSockfd, this, &client, &server));
139 if (res == MOD_RES_PASSTHRU)
141 std::string type = bind_tag->getString("type", "clients");
142 if (type == "clients")
144 ServerInstance->Users->AddUser(incomingSockfd, this, &client, &server);
148 if (res == MOD_RES_ALLOW)
150 ServerInstance->stats->statsAccept++;
154 ServerInstance->stats->statsRefused++;
155 ServerInstance->Logs->Log("SOCKET",DEFAULT,"Refusing connection on %s - %s",
156 bind_desc.c_str(), res == MOD_RES_DENY ? "Connection refused by module" : "Module for this port not found");
157 ServerInstance->SE->Close(incomingSockfd);
161 void ListenSocket::HandleEvent(EventType e, int err)
166 ServerInstance->Logs->Log("SOCKET",DEFAULT,"ListenSocket::HandleEvent() received a socket engine error event! well shit! '%s'", strerror(err));
169 ServerInstance->Logs->Log("SOCKET",DEBUG,"*** BUG *** ListenSocket::HandleEvent() got a WRITE event!!!");
172 this->AcceptInternal();