diff options
Diffstat (limited to 'src')
-rw-r--r-- | src/userprocess.cpp | 540 |
1 files changed, 305 insertions, 235 deletions
diff --git a/src/userprocess.cpp b/src/userprocess.cpp index 24bb91f94..846dcaeee 100644 --- a/src/userprocess.cpp +++ b/src/userprocess.cpp @@ -82,203 +82,253 @@ extern chan_hash chanlist; void ProcessUser(userrec* cu) { - int result = EAGAIN; + int result = EAGAIN; + if (cu->fd == FD_MAGIC_NUMBER) return; - log(DEBUG,"Processing user with fd %d",cu->fd); + + log(DEBUG,"Processing user with fd %d",cu->fd); + if (Config->GetIOHook(cu->port)) { - int result2 = 0; + int result2 = 0; int MOD_RESULT = 0; + try { MOD_RESULT = Config->GetIOHook(cu->port)->OnRawSocketRead(cu->fd,data,65535,result2); - log(DEBUG,"Data result returned by module: %d",MOD_RESULT); + log(DEBUG,"Data result returned by module: %d",MOD_RESULT); } - catch (ModuleException& modexcept) - { - log(DEBUG,"Module exception cought: %s",modexcept.GetReason()); \ - } + catch (ModuleException& modexcept) + { + log(DEBUG,"Module exception cought: %s",modexcept.GetReason()); \ + } + if (MOD_RESULT < 0) { result = -EAGAIN; } else { - result = result2; + result = result2; } } else { result = cu->ReadData(data, 65535); } - log(DEBUG,"Read result: %d",result); - if ((result) && (result != -EAGAIN)) - { - ServerInstance->stats->statsRecv += result; - // perform a check on the raw buffer as an array (not a string!) to remove - // characters 0 and 7 which are illegal in the RFC - replace them with spaces. - // hopefully this should stop even more people whining about "Unknown command: *" - for (int checker = 0; checker < result; checker++) - { - if ((data[checker] == 0) || (data[checker] == 7)) - data[checker] = ' '; - } - if (result > 0) - data[result] = '\0'; - userrec* current = cu; - int currfd = current->fd; - int floodlines = 0; - // add the data to the users buffer - if (result > 0) - { - if (!current->AddBuffer(data)) - { - // AddBuffer returned false, theres too much data in the user's buffer and theyre up to no good. - if (current->registered == 7) + + log(DEBUG,"Read result: %d",result); + + if ((result) && (result != -EAGAIN)) + { + userrec *current; + int currfd; + int floodlines; + + ServerInstance->stats->statsRecv += result; + /* + * perform a check on the raw buffer as an array (not a string!) to remove + * characters 0 and 7 which are illegal in the RFC - replace them with spaces. + * hopefully this should stop even more people whining about "Unknown command: *" + */ + + /* + * XXX - potential replacement for the below using my beloved pointers. --w00t + * + * for (char *c = data; data && *data; data++) + * { + * if (*data == 0 || *data == 7) + * data = ' '; + * } + */ + + for (int checker = 0; checker < result; checker++) + { + if ((data[checker] == 0) || (data[checker] == 7)) + data[checker] = ' '; + } + + if (result > 0) + data[result] = '\0'; + + current = cu; + currfd = current->fd; + floodlines = 0; + + // add the data to the users buffer + if (result > 0) + { + if (!current->AddBuffer(data)) + { + // AddBuffer returned false, theres too much data in the user's buffer and theyre up to no good. + if (current->registered == 7) { // Make sure they arn't flooding long lines. - if (TIME > current->reset_due) - { - current->reset_due = TIME + current->threshold; - current->lines_in = 0; - } - current->lines_in++; - if (current->lines_in > current->flood) - { - log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); - WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); - kill_link(current,"Excess flood"); - return; - } else { - WriteServ(currfd, "NOTICE %s :Your previous line was too long and was not delivered (Over 512chars) Please shorten it.", current->nick); + if (TIME > current->reset_due) + { + current->reset_due = TIME + current->threshold; + current->lines_in = 0; + } + + current->lines_in++; + + if (current->lines_in > current->flood) + { + log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); + WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); + kill_link(current,"Excess flood"); + return; + } + else + { + WriteServ(currfd, "NOTICE %s :Your previous line was too long and was not delivered (Over 512chars) Please shorten it.", current->nick); current->recvq = ""; } - } - else - { - WriteOpers("*** Excess flood from %s",(char*)inet_ntoa(current->ip4)); - log(DEFAULT,"Excess flood from: %s",(char*)inet_ntoa(current->ip4)); - add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); - apply_lines(APPLY_ZLINES); - } - return; - } - if (current->recvq.length() > (unsigned)Config->NetBufferSize) - { - if (current->registered == 7) - { - kill_link(current,"RecvQ exceeded"); - } - else - { - WriteOpers("*** Excess flood from %s",(char*)inet_ntoa(current->ip4)); - log(DEFAULT,"Excess flood from: %s",(char*)inet_ntoa(current->ip4)); - add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); - apply_lines(APPLY_ZLINES); - } - return; - } - // while there are complete lines to process... - while (current->BufferIsReady()) - { - floodlines++; - if (TIME > current->reset_due) - { - current->reset_due = TIME + current->threshold; - current->lines_in = 0; - } - current->lines_in++; - if (current->lines_in > current->flood) - { - log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); - WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); - kill_link(current,"Excess flood"); - return; - } - if ((floodlines > current->flood) && (current->flood != 0)) - { - if (current->registered == 7) - { - log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); - WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); - kill_link(current,"Excess flood"); - } - else - { - add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); - apply_lines(APPLY_ZLINES); - } - return; - } - char sanitized[MAXBUF]; - // use GetBuffer to copy single lines into the sanitized string - std::string single_line = current->GetBuffer(); - current->bytes_in += single_line.length(); - current->cmds_in++; - strlcpy(sanitized,single_line.c_str(),511); - if (*sanitized) - { - userrec* old_comp = fd_ref_table[currfd]; - // we're gonna re-scan to check if the nick is gone, after every - // command - if it has, we're gonna bail - ServerInstance->Parser->ProcessBuffer(sanitized,current); - // look for the user's record in case it's changed... if theyve quit, - // we cant do anything more with their buffer, so bail. - // there used to be an ugly, slow loop here. Now we have a reference - // table, life is much easier (and FASTER) - userrec* new_comp = fd_ref_table[currfd]; - if ((currfd < 0) || (!fd_ref_table[currfd]) || (old_comp != new_comp)) - { - return; - } - else - { - /* The user is still here, flush their buffer */ - current->FlushWriteBuf(); - } - } - } - return; - } - if ((result == -1) && (errno != EAGAIN) && (errno != EINTR)) - { - log(DEBUG,"killing: %s",cu->nick); - kill_link(cu,strerror(errno)); - return; - } - } - // result EAGAIN means nothing read - else if ((result == EAGAIN) || (result == -EAGAIN)) - { - } - else if (result == 0) - { - log(DEBUG,"InspIRCd: Exited: %s",cu->nick); - kill_link(cu,"Client exited"); - log(DEBUG,"Bailing from client exit"); - return; - } + } + else + { + WriteOpers("*** Excess flood from %s",(char*)inet_ntoa(current->ip4)); + log(DEFAULT,"Excess flood from: %s",(char*)inet_ntoa(current->ip4)); + add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); + apply_lines(APPLY_ZLINES); + } + + return; + } + + if (current->recvq.length() > (unsigned)Config->NetBufferSize) + { + if (current->registered == 7) + { + kill_link(current,"RecvQ exceeded"); + } + else + { + WriteOpers("*** Excess flood from %s",(char*)inet_ntoa(current->ip4)); + log(DEFAULT,"Excess flood from: %s",(char*)inet_ntoa(current->ip4)); + add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); + apply_lines(APPLY_ZLINES); + } + + return; + } + + // while there are complete lines to process... + while (current->BufferIsReady()) + { + char sanitized[MAXBUF]; + + floodlines++; + if (TIME > current->reset_due) + { + current->reset_due = TIME + current->threshold; + current->lines_in = 0; + } + + current->lines_in++; + + if (current->lines_in > current->flood) + { + log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); + WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); + kill_link(current,"Excess flood"); + return; + } + + if ((floodlines > current->flood) && (current->flood != 0)) + { + if (current->registered == 7) + { + log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); + WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); + kill_link(current,"Excess flood"); + } + else + { + add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); + apply_lines(APPLY_ZLINES); + } + + return; + } + + // use GetBuffer to copy single lines into the sanitized string + std::string single_line = current->GetBuffer(); + current->bytes_in += single_line.length(); + current->cmds_in++; + strlcpy(sanitized,single_line.c_str(),511); + + if (*sanitized) + { + userrec* old_comp = fd_ref_table[currfd]; + + ServerInstance->Parser->ProcessBuffer(sanitized,current); + /* + * look for the user's record in case it's changed... if theyve quit, + * we cant do anything more with their buffer, so bail. + * there used to be an ugly, slow loop here. Now we have a reference + * table, life is much easier (and FASTER) + */ + userrec* new_comp = fd_ref_table[currfd]; + if ((currfd < 0) || (!fd_ref_table[currfd]) || (old_comp != new_comp)) + { + return; + } + else + { + /* The user is still here, flush their buffer */ + current->FlushWriteBuf(); + } + } + } + + return; + } + + if ((result == -1) && (errno != EAGAIN) && (errno != EINTR)) + { + log(DEBUG,"killing: %s",cu->nick); + kill_link(cu,strerror(errno)); + return; + } + } + + // result EAGAIN means nothing read + else if ((result == EAGAIN) || (result == -EAGAIN)) + { + /* do nothing */ + } + else if (result == 0) + { + log(DEBUG,"InspIRCd: Exited: %s",cu->nick); + kill_link(cu,"Client exited"); + log(DEBUG,"Bailing from client exit"); + return; + } } void DoSocketTimeouts(time_t TIME) { - unsigned int numsockets = module_sockets.size(); - SocketEngine* SE = ServerInstance->SE; - for (std::vector<InspSocket*>::iterator a = module_sockets.begin(); a < module_sockets.end(); a++) - { - InspSocket* s = (InspSocket*)*a; - if (s->Timeout(TIME)) - { - log(DEBUG,"Socket poll returned false, close and bail"); - SE->DelFd(s->GetFd()); - s->Close(); - module_sockets.erase(a); - delete s; - break; - } - if (module_sockets.size() != numsockets) break; - } + unsigned int numsockets = module_sockets.size(); + SocketEngine* SE = ServerInstance->SE; + + for (std::vector<InspSocket*>::iterator a = module_sockets.begin(); a < module_sockets.end(); a++) + { + InspSocket* s = (InspSocket*)*a; + if (s->Timeout(TIME)) + { + log(DEBUG,"Socket poll returned false, close and bail"); + SE->DelFd(s->GetFd()); + s->Close(); + module_sockets.erase(a); + delete s; + break; + } + + if (module_sockets.size() != numsockets) + break; + } } /** @@ -289,71 +339,83 @@ void DoSocketTimeouts(time_t TIME) */ void DoBackgroundUserStuff(time_t TIME) { - CullList* GlobalGoners = new CullList(); - for (std::vector<userrec*>::iterator count2 = local_users.begin(); count2 != local_users.end(); count2++) - { - /* Sanity checks for corrupted iterators (yes, really) */ - userrec* curr = NULL; - if (*count2) - curr = (userrec*)(*count2); - if ((long)curr == -1) - return; - - if (curr) - { - // registration timeout -- didnt send USER/NICK/HOST in the time specified in - // their connection class. - if (((unsigned)TIME > (unsigned)curr->timeout) && (curr->registered != 7)) - { - log(DEBUG,"InspIRCd: registration timeout: %s",curr->nick); - GlobalGoners->AddItem(curr,"Registration timeout"); - continue; - } - // user has signed on with USER/NICK/PASS, and dns has completed, all the modules - // say this user is ok to proceed, fully connect them. - if ((TIME > curr->signon) && (curr->registered == 3) && (AllModulesReportReady(curr))) - { - curr->dns_done = true; - ServerInstance->stats->statsDnsBad++; - FullConnectUser(curr,GlobalGoners); - continue; - } - if ((curr->dns_done) && (curr->registered == 3) && (AllModulesReportReady(curr))) - { - log(DEBUG,"dns done, registered=3, and modules ready, OK"); - FullConnectUser(curr,GlobalGoners); - continue; - } + CullList* GlobalGoners = new CullList(); + + for (std::vector<userrec*>::iterator count2 = local_users.begin(); count2 != local_users.end(); count2++) + { + /* Sanity checks for corrupted iterators (yes, really) */ + userrec* curr = NULL; + + if (*count2) + curr = (userrec*)(*count2); + if ((long)curr == -1) + return; + + if (curr) + { + /* + * registration timeout -- didnt send USER/NICK/HOST + * in the time specified in their connection class. + */ + if (((unsigned)TIME > (unsigned)curr->timeout) && (curr->registered != 7)) + { + log(DEBUG,"InspIRCd: registration timeout: %s",curr->nick); + GlobalGoners->AddItem(curr,"Registration timeout"); + continue; + } + + /* + * user has signed on with USER/NICK/PASS, and dns has completed, all the modules + * say this user is ok to proceed, fully connect them. + */ + if ((TIME > curr->signon) && (curr->registered == 3) && (AllModulesReportReady(curr))) + { + curr->dns_done = true; + ServerInstance->stats->statsDnsBad++; + FullConnectUser(curr,GlobalGoners); + continue; + } + + if ((curr->dns_done) && (curr->registered == 3) && (AllModulesReportReady(curr))) + { + log(DEBUG,"dns done, registered=3, and modules ready, OK"); + FullConnectUser(curr,GlobalGoners); + continue; + } + // It's time to PING this user. Send them a ping. - if ((TIME > curr->nping) && (curr->registered == 7)) - { + if ((TIME > curr->nping) && (curr->registered == 7)) + { // This user didn't answer the last ping, remove them if (!curr->lastping) { GlobalGoners->AddItem(curr,"Ping timeout"); continue; } + Write(curr->fd,"PING :%s",Config->ServerName); curr->lastping = 0; curr->nping = TIME+curr->pingmax; } - // We can flush the write buffer as the last thing we do, because if they - // match any of the above conditions its no use flushing their buffer anyway. + + /* + * We can flush the write buffer as the last thing we do, because if they + * match any of the above conditions its no use flushing their buffer anyway. + */ curr->FlushWriteBuf(); + if (curr->GetWriteError() != "") { GlobalGoners->AddItem(curr,curr->GetWriteError()); continue; } - } - } - /** Remove all the queued users who are due to be quit - */ + } + } + + /* Remove all the queued users who are due to be quit, free memory used. */ GlobalGoners->Apply(); - /** Free to memory used - */ delete GlobalGoners; - return; + return; } void OpenLog(char** argv, int argc) @@ -362,25 +424,29 @@ void OpenLog(char** argv, int argc) { if (Config->logpath == "") { - Config->logpath = GetFullProgDir(argv,argc) + "/ircd.log"; + Config->logpath = GetFullProgDir(argv,argc) + "/ircd.log"; } } else { Config->log_file = fopen(LOG_FILE,"a+"); + if (!Config->log_file) { printf("ERROR: Could not write to logfile %s, bailing!\n\n",Config->logpath.c_str()); Exit(ERROR); } + return; } - Config->log_file = fopen(Config->logpath.c_str(),"a+"); - if (!Config->log_file) - { - printf("ERROR: Could not write to logfile %s, bailing!\n\n",Config->logpath.c_str()); - Exit(ERROR); - } + + Config->log_file = fopen(Config->logpath.c_str(),"a+"); + + if (!Config->log_file) + { + printf("ERROR: Could not write to logfile %s, bailing!\n\n",Config->logpath.c_str()); + Exit(ERROR); + } } @@ -405,23 +471,27 @@ void CheckDie() } } +/* We must load the modules AFTER initializing the socket engine, now */ void LoadAllModules(InspIRCd* ServerInstance) { - /* We must load the modules AFTER initializing the socket engine, now */ - MODCOUNT = -1; char configToken[MAXBUF]; - for (int count = 0; count < Config->ConfValueEnum("module",&Config->config_f); count++) - { - Config->ConfValue("module","name",count,configToken,&Config->config_f); - printf("[\033[1;32m*\033[0m] Loading module:\t\033[1;32m%s\033[0m\n",configToken); - if (!ServerInstance->LoadModule(configToken)) - { - log(DEFAULT,"Exiting due to a module loader error."); - printf("\nThere was an error loading a module: %s\n\n",ServerInstance->ModuleError()); - Exit(0); - } - } - log(DEFAULT,"Total loaded modules: %lu",(unsigned long)MODCOUNT+1); + + MODCOUNT = -1; + + for (int count = 0; count < Config->ConfValueEnum("module",&Config->config_f); count++) + { + Config->ConfValue("module","name",count,configToken,&Config->config_f); + printf("[\033[1;32m*\033[0m] Loading module:\t\033[1;32m%s\033[0m\n",configToken); + + if (!ServerInstance->LoadModule(configToken)) + { + log(DEFAULT,"Exiting due to a module loader error."); + printf("\nThere was an error loading a module: %s\n\n",ServerInstance->ModuleError()); + Exit(0); + } + } + + log(DEFAULT,"Total loaded modules: %lu",(unsigned long)MODCOUNT+1); } |