- int result = EAGAIN;
- log(DEBUG,"Processing user with fd %d",cu->fd);
- int MOD_RESULT = 0;
- int result2 = 0;
- FOREACH_RESULT(OnRawSocketRead(cu->fd,data,65535,result2));
- if (!MOD_RESULT)
- {
- result = cu->ReadData(data, 65535);
- }
- else
- {
- log(DEBUG,"Data result returned by module: %d",MOD_RESULT);
- result = result2;
- }
- log(DEBUG,"Read result: %d",result);
- if (result)
- {
- statsRecv += result;
- // perform a check on the raw buffer as an array (not a string!) to remove
- // characters 0 and 7 which are illegal in the RFC - replace them with spaces.
- // hopefully this should stop even more people whining about "Unknown command: *"
- for (int checker = 0; checker < result; checker++)
- {
- if ((data[checker] == 0) || (data[checker] == 7))
- data[checker] = ' ';
- }
- if (result > 0)
- data[result] = '\0';
- userrec* current = cu;
- int currfd = current->fd;
- int floodlines = 0;
- // add the data to the users buffer
- if (result > 0)
- {
- if (!current->AddBuffer(data))
- {
- // AddBuffer returned false, theres too much data in the user's buffer and theyre up to no good.
- if (current->registered == 7)
- {
- kill_link(current,"RecvQ exceeded");
- }
- else
- {
- WriteOpers("*** Excess flood from %s",current->ip);
- log(DEFAULT,"Excess flood from: %s",current->ip);
- add_zline(120,ServerName,"Flood from unregistered connection",current->ip);
- apply_lines();
- }
- return;
- }
- if (current->recvq.length() > (unsigned)NetBufferSize)
- {
- if (current->registered == 7)
- {
- kill_link(current,"RecvQ exceeded");
- }
- else
- {
- WriteOpers("*** Excess flood from %s",current->ip);
- log(DEFAULT,"Excess flood from: %s",current->ip);
- add_zline(120,ServerName,"Flood from unregistered connection",current->ip);
- apply_lines();
- }
- return;
- }
- // while there are complete lines to process...
- while (current->BufferIsReady())
- {
- floodlines++;
- if (TIME > current->reset_due)
- {
- current->reset_due = TIME + current->threshold;
- current->lines_in = 0;
- }
- current->lines_in++;
- if (current->lines_in > current->flood)
- {
- log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
- WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
- kill_link(current,"Excess flood");
- return;
- }
- if ((floodlines > current->flood) && (current->flood != 0))
- {
- if (current->registered == 7)
- {
- log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
- WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
- kill_link(current,"Excess flood");
- }
- else
- {
- add_zline(120,ServerName,"Flood from unregistered connection",current->ip);
- apply_lines();
- }
- return;
- }
- char sanitized[MAXBUF];
- // use GetBuffer to copy single lines into the sanitized string
- std::string single_line = current->GetBuffer();
- current->bytes_in += single_line.length();
- current->cmds_in++;
- if (single_line.length()>512)
- {
- log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
- WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
- kill_link(current,"Excess flood");
- return;
- }
- strlcpy(sanitized,single_line.c_str(),MAXBUF);
- if (*sanitized)
- {
- userrec* old_comp = fd_ref_table[currfd];
- // we're gonna re-scan to check if the nick is gone, after every
- // command - if it has, we're gonna bail
- process_buffer(sanitized,current);
- // look for the user's record in case it's changed... if theyve quit,
- // we cant do anything more with their buffer, so bail.
- // there used to be an ugly, slow loop here. Now we have a reference
- // table, life is much easier (and FASTER)
- userrec* new_comp = fd_ref_table[currfd];
- if ((currfd < 0) || (!fd_ref_table[currfd]) || (old_comp != new_comp))
- {
- return;
- }
- else
- {
- /* The user is still here, flush their buffer */
- current->FlushWriteBuf();
- }
- }
- }
- return;
- }
- if ((result == -1) && (errno != EAGAIN) && (errno != EINTR))
- {
- log(DEBUG,"killing: %s",cu->nick);
- kill_link(cu,strerror(errno));
- return;
- }
- }
- // result EAGAIN means nothing read
- else if (result == EAGAIN)
- {
- }
- else if (result == 0)
- {
- log(DEBUG,"InspIRCd: Exited: %s",cu->nick);
- kill_link(cu,"Client exited");
- log(DEBUG,"Bailing from client exit");
- return;
- }
-}
+ int result = EAGAIN;
+
+ if (cu->GetFd() == FD_MAGIC_NUMBER)
+ return;
+
+ if (this->Config->GetIOHook(cu->GetPort()))
+ {
+ int result2 = 0;
+ int MOD_RESULT = 0;
+
+ try
+ {
+ MOD_RESULT = this->Config->GetIOHook(cu->GetPort())->OnRawSocketRead(cu->GetFd(),ReadBuffer,sizeof(ReadBuffer),result2);
+ this->Log(DEBUG,"Data result returned by module: %d",MOD_RESULT);
+ }
+ catch (ModuleException& modexcept)
+ {
+ this->Log(DEBUG,"Module exception caught: %s",modexcept.GetReason());
+ }
+
+ if (MOD_RESULT < 0)
+ {
+ result = -EAGAIN;
+ }
+ else
+ {
+ result = result2;
+ }
+ }
+ else
+ {
+ result = cu->ReadData(ReadBuffer, sizeof(ReadBuffer));
+ }
+
+ this->Log(DEBUG,"Read result: %d",result);
+
+ if ((result) && (result != -EAGAIN))
+ {
+ userrec *current;
+ int currfd;
+ int floodlines = 0;
+
+ this->stats->statsRecv += result;
+ /*
+ * perform a check on the raw buffer as an array (not a string!) to remove
+ * character 0 which is illegal in the RFC - replace them with spaces.
+ * XXX - no garauntee there's not \0's in the middle of the data,
+ * and no reason for it to be terminated either. -- Om
+ */
+
+ for (int checker = 0; checker < result; checker++)
+ {
+ if (ReadBuffer[checker] == 0)
+ ReadBuffer[checker] = ' ';
+ }
+
+ if (result > 0)
+ ReadBuffer[result] = '\0';
+
+ current = cu;
+ currfd = current->GetFd();
+
+ // add the data to the users buffer
+ if (result > 0)
+ {
+ if (!current->AddBuffer(ReadBuffer))
+ {
+ // AddBuffer returned false, theres too much data in the user's buffer and theyre up to no good.
+ if (current->registered == REG_ALL)
+ {
+ // Make sure they arn't flooding long lines.
+ if (TIME > current->reset_due)
+ {
+ current->reset_due = TIME + current->threshold;
+ current->lines_in = 0;
+ }
+
+ current->lines_in++;
+
+ if (current->lines_in > current->flood)
+ {
+ this->Log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
+ this->SNO->WriteToSnoMask('f',"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
+ userrec::QuitUser(this, current,"Excess flood");
+ return;
+ }
+ else
+ {
+ current->WriteServ("NOTICE %s :Your previous line was too long and was not delivered (Over 512chars) Please shorten it.", current->nick);
+ current->recvq = "";
+ }
+ }
+ else
+ {
+ this->WriteOpers("*** Excess flood from %s",current->GetIPString());
+ this->SNO->WriteToSnoMask('f',"Excess flood from: %s",current->GetIPString());
+ XLines->add_zline(120,this->Config->ServerName,"Flood from unregistered connection",current->GetIPString());
+ XLines->apply_lines(APPLY_ZLINES);
+ }
+
+ return;
+ }
+
+ if (current->recvq.length() > (unsigned)this->Config->NetBufferSize)
+ {
+ if (current->registered == REG_ALL)
+ {
+ userrec::QuitUser(this, current,"RecvQ exceeded");
+ }
+ else
+ {
+ this->WriteOpers("*** Excess flood from %s",current->GetIPString());
+ this->SNO->WriteToSnoMask('f',"Excess flood from: %s",current->GetIPString());
+ XLines->add_zline(120,this->Config->ServerName,"Flood from unregistered connection",current->GetIPString());
+ XLines->apply_lines(APPLY_ZLINES);
+ }
+
+ return;
+ }
+
+ // while there are complete lines to process...
+ while (current->BufferIsReady())
+ {
+ if (TIME > current->reset_due)
+ {
+ current->reset_due = TIME + current->threshold;
+ current->lines_in = 0;
+ }