
With this you can now support more connections on linux, even if your system header is still set to a smaller value. Make sure to increase the limit of open file handles with ulimit or other resource related settings. You can change the compile time value of supported connections with ./configure --with-maxconn=value Windows default is still 4096.
1738 lines
47 KiB
C++
1738 lines
47 KiB
C++
// Copyright (c) rAthena Dev Teams - Licensed under GNU GPL
|
|
// For more information, see LICENCE in the main folder
|
|
|
|
#include "socket.hpp"
|
|
|
|
#include <stdlib.h>
|
|
|
|
#ifdef WIN32
|
|
#include "winapi.hpp"
|
|
#else
|
|
#include <errno.h>
|
|
#include <arpa/inet.h>
|
|
#include <net/if.h>
|
|
#include <netdb.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/time.h>
|
|
#include <unistd.h>
|
|
|
|
#if defined(__linux__) || defined(__linux)
|
|
#include <linux/tcp.h>
|
|
|
|
#ifdef SOCKET_EPOLL
|
|
#include <sys/epoll.h>
|
|
#endif
|
|
#else
|
|
#include <netinet/in.h>
|
|
#include <netinet/tcp.h>
|
|
#endif
|
|
|
|
#ifndef SIOCGIFCONF
|
|
#include <sys/sockio.h> // SIOCGIFCONF on Solaris, maybe others? [Shinomori]
|
|
#endif
|
|
#ifndef FIONBIO
|
|
#include <sys/filio.h> // FIONBIO on Solaris [FlavioJS]
|
|
#endif
|
|
|
|
#ifdef HAVE_SETRLIMIT
|
|
#include <sys/resource.h>
|
|
#endif
|
|
#endif
|
|
|
|
#include "cbasetypes.hpp"
|
|
#include "malloc.hpp"
|
|
#include "mmo.hpp"
|
|
#include "showmsg.hpp"
|
|
#include "strlib.hpp"
|
|
#include "timer.hpp"
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
#if defined(WIN32)
|
|
/////////////////////////////////////////////////////////////////////
|
|
// windows portability layer
|
|
|
|
typedef int socklen_t;
|
|
|
|
#define sErrno WSAGetLastError()
|
|
#define S_ENOTSOCK WSAENOTSOCK
|
|
#define S_EWOULDBLOCK WSAEWOULDBLOCK
|
|
#define S_EINTR WSAEINTR
|
|
#define S_ECONNABORTED WSAECONNABORTED
|
|
|
|
#define SHUT_RD SD_RECEIVE
|
|
#define SHUT_WR SD_SEND
|
|
#define SHUT_RDWR SD_BOTH
|
|
|
|
// global array of sockets (emulating linux)
|
|
// fd is the position in the array
|
|
static SOCKET sock_arr[MAXCONN];
|
|
static int sock_arr_len = 0;
|
|
|
|
/// Returns the socket associated with the target fd.
|
|
///
|
|
/// @param fd Target fd.
|
|
/// @return Socket
|
|
#define fd2sock(fd) sock_arr[fd]
|
|
|
|
/// Returns the first fd associated with the socket.
|
|
/// Returns -1 if the socket is not found.
|
|
///
|
|
/// @param s Socket
|
|
/// @return Fd or -1
|
|
int sock2fd(SOCKET s)
|
|
{
|
|
int fd;
|
|
|
|
// search for the socket
|
|
for( fd = 1; fd < sock_arr_len; ++fd )
|
|
if( sock_arr[fd] == s )
|
|
break;// found the socket
|
|
if( fd == sock_arr_len )
|
|
return -1;// not found
|
|
return fd;
|
|
}
|
|
|
|
|
|
/// Inserts the socket into the global array of sockets.
|
|
/// Returns a new fd associated with the socket.
|
|
/// If there are too many sockets it closes the socket, sets an error and
|
|
// returns -1 instead.
|
|
/// Since fd 0 is reserved, it returns values in the range [1,MAXCONN[.
|
|
///
|
|
/// @param s Socket
|
|
/// @return New fd or -1
|
|
int sock2newfd(SOCKET s)
|
|
{
|
|
int fd;
|
|
|
|
// find an empty position
|
|
for( fd = 1; fd < sock_arr_len; ++fd )
|
|
if( sock_arr[fd] == INVALID_SOCKET )
|
|
break;// empty position
|
|
if( fd == ARRAYLENGTH(sock_arr) )
|
|
{// too many sockets
|
|
closesocket(s);
|
|
WSASetLastError(WSAEMFILE);
|
|
return -1;
|
|
}
|
|
sock_arr[fd] = s;
|
|
if( sock_arr_len <= fd )
|
|
sock_arr_len = fd+1;
|
|
return fd;
|
|
}
|
|
|
|
int sAccept(int fd, struct sockaddr* addr, int* addrlen)
|
|
{
|
|
SOCKET s;
|
|
|
|
// accept connection
|
|
s = accept(fd2sock(fd), addr, addrlen);
|
|
if( s == INVALID_SOCKET )
|
|
return -1;// error
|
|
return sock2newfd(s);
|
|
}
|
|
|
|
int sClose(int fd)
|
|
{
|
|
int ret = closesocket(fd2sock(fd));
|
|
fd2sock(fd) = INVALID_SOCKET;
|
|
return ret;
|
|
}
|
|
|
|
int sSocket(int af, int type, int protocol)
|
|
{
|
|
SOCKET s;
|
|
|
|
// create socket
|
|
s = socket(af,type,protocol);
|
|
if( s == INVALID_SOCKET )
|
|
return -1;// error
|
|
return sock2newfd(s);
|
|
}
|
|
|
|
char* sErr(int code)
|
|
{
|
|
static char sbuf[512];
|
|
// strerror does not handle socket codes
|
|
if( FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM|FORMAT_MESSAGE_IGNORE_INSERTS, NULL,
|
|
code, MAKELANGID(LANG_ENGLISH, SUBLANG_DEFAULT), (LPTSTR)&sbuf, sizeof(sbuf), NULL) == 0 )
|
|
snprintf(sbuf, sizeof(sbuf), "unknown error");
|
|
return sbuf;
|
|
}
|
|
|
|
#define sBind(fd,name,namelen) bind(fd2sock(fd),name,namelen)
|
|
#define sConnect(fd,name,namelen) connect(fd2sock(fd),name,namelen)
|
|
#define sIoctl(fd,cmd,argp) ioctlsocket(fd2sock(fd),cmd,argp)
|
|
#define sListen(fd,backlog) listen(fd2sock(fd),backlog)
|
|
#define sRecv(fd,buf,len,flags) recv(fd2sock(fd),buf,len,flags)
|
|
#define sSelect select
|
|
#define sSend(fd,buf,len,flags) send(fd2sock(fd),buf,len,flags)
|
|
#define sSetsockopt(fd,level,optname,optval,optlen) setsockopt(fd2sock(fd),level,optname,optval,optlen)
|
|
#define sShutdown(fd,how) shutdown(fd2sock(fd),how)
|
|
#define sFD_SET(fd,set) FD_SET(fd2sock(fd),set)
|
|
#define sFD_CLR(fd,set) FD_CLR(fd2sock(fd),set)
|
|
#define sFD_ISSET(fd,set) FD_ISSET(fd2sock(fd),set)
|
|
#define sFD_ZERO FD_ZERO
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
#else
|
|
/////////////////////////////////////////////////////////////////////
|
|
// nix portability layer
|
|
|
|
#define SOCKET_ERROR (-1)
|
|
|
|
#define sErrno errno
|
|
#define S_ENOTSOCK EBADF
|
|
#define S_EWOULDBLOCK EAGAIN
|
|
#define S_EINTR EINTR
|
|
#define S_ECONNABORTED ECONNABORTED
|
|
|
|
#define sAccept accept
|
|
#define sClose close
|
|
#define sSocket socket
|
|
#define sErr strerror
|
|
|
|
#define sBind bind
|
|
#define sConnect connect
|
|
#define sIoctl ioctl
|
|
#define sListen listen
|
|
#define sRecv recv
|
|
#define sSelect select
|
|
#define sSend send
|
|
#define sSetsockopt setsockopt
|
|
#define sShutdown shutdown
|
|
#define sFD_SET FD_SET
|
|
#define sFD_CLR FD_CLR
|
|
#define sFD_ISSET FD_ISSET
|
|
#define sFD_ZERO FD_ZERO
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
#endif
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
#ifndef MSG_NOSIGNAL
|
|
#define MSG_NOSIGNAL 0
|
|
#endif
|
|
|
|
#ifndef SOCKET_EPOLL
|
|
// Select based Event Dispatcher
|
|
fd_set readfds;
|
|
#else
|
|
// Epoll based Event Dispatcher
|
|
static int epoll_maxevents = (MAXCONN / 2);
|
|
static int epfd = SOCKET_ERROR;
|
|
static struct epoll_event epevent;
|
|
static struct epoll_event *epevents = nullptr;
|
|
#endif
|
|
|
|
int fd_max;
|
|
time_t last_tick;
|
|
time_t stall_time = 60;
|
|
|
|
uint32 addr_[16]; // ip addresses of local host (host byte order)
|
|
int naddr_ = 0; // # of ip addresses
|
|
|
|
// Maximum packet size in bytes, which the client is able to handle.
|
|
// Larger packets cause a buffer overflow and stack corruption.
|
|
#if PACKETVER < 20131223
|
|
static size_t socket_max_client_packet = 0x6000;
|
|
#else
|
|
static size_t socket_max_client_packet = USHRT_MAX;
|
|
#endif
|
|
|
|
#ifdef SHOW_SERVER_STATS
|
|
// Data I/O statistics
|
|
static size_t socket_data_i = 0, socket_data_ci = 0, socket_data_qi = 0;
|
|
static size_t socket_data_o = 0, socket_data_co = 0, socket_data_qo = 0;
|
|
static time_t socket_data_last_tick = 0;
|
|
#endif
|
|
|
|
// initial recv buffer size (this will also be the max. size)
|
|
// biggest known packet: S 0153 <len>.w <emblem data>.?B -> 24x24 256 color .bmp (0153 + len.w + 1618/1654/1756 bytes)
|
|
#define RFIFO_SIZE (2*1024)
|
|
// initial send buffer size (will be resized as needed)
|
|
#define WFIFO_SIZE (16*1024)
|
|
|
|
// Maximum size of pending data in the write fifo. (for non-server connections)
|
|
// The connection is closed if it goes over the limit.
|
|
#define WFIFO_MAX (1*1024*1024)
|
|
|
|
struct socket_data* session[MAXCONN];
|
|
|
|
#ifdef SEND_SHORTLIST
|
|
int send_shortlist_array[MAXCONN];// we only support MAXCONN sockets, limit the array to that
|
|
size_t send_shortlist_count = 0;// how many fd's are in the shortlist
|
|
uint32 send_shortlist_set[(MAXCONN+31)/32];// to know if specific fd's are already in the shortlist
|
|
#endif
|
|
|
|
static int create_session(int fd, RecvFunc func_recv, SendFunc func_send, ParseFunc func_parse);
|
|
|
|
#ifndef MINICORE
|
|
int ip_rules = 1;
|
|
static int connect_check(uint32 ip);
|
|
#endif
|
|
|
|
const char* error_msg(void)
|
|
{
|
|
static char buf[512];
|
|
int code = sErrno;
|
|
snprintf(buf, sizeof(buf), "error %d: %s", code, sErr(code));
|
|
return buf;
|
|
}
|
|
|
|
/*======================================
|
|
* CORE : Default processing functions
|
|
*--------------------------------------*/
|
|
int null_recv(int fd) { return 0; }
|
|
int null_send(int fd) { return 0; }
|
|
int null_parse(int fd) { return 0; }
|
|
|
|
ParseFunc default_func_parse = null_parse;
|
|
|
|
void set_defaultparse(ParseFunc defaultparse)
|
|
{
|
|
default_func_parse = defaultparse;
|
|
}
|
|
|
|
|
|
/*======================================
|
|
* CORE : Socket options
|
|
*--------------------------------------*/
|
|
void set_nonblocking(int fd, unsigned long yes)
|
|
{
|
|
// FIONBIO Use with a nonzero argp parameter to enable the nonblocking mode of socket s.
|
|
// The argp parameter is zero if nonblocking is to be disabled.
|
|
if( sIoctl(fd, FIONBIO, &yes) != 0 )
|
|
ShowError("set_nonblocking: Failed to set socket #%d to non-blocking mode (%s) - Please report this!!!\n", fd, error_msg());
|
|
}
|
|
|
|
void setsocketopts(int fd,int delay_timeout){
|
|
int yes = 1; // reuse fix
|
|
|
|
#if !defined(WIN32)
|
|
// set SO_REAUSEADDR to true, unix only. on windows this option causes
|
|
// the previous owner of the socket to give up, which is not desirable
|
|
// in most cases, neither compatible with unix.
|
|
sSetsockopt(fd,SOL_SOCKET,SO_REUSEADDR,(char *)&yes,sizeof(yes));
|
|
#ifdef SO_REUSEPORT
|
|
sSetsockopt(fd,SOL_SOCKET,SO_REUSEPORT,(char *)&yes,sizeof(yes));
|
|
#endif
|
|
#endif
|
|
|
|
// Set the socket into no-delay mode; otherwise packets get delayed for up to 200ms, likely creating server-side lag.
|
|
// The RO protocol is mainly single-packet request/response, plus the FIFO model already does packet grouping anyway.
|
|
sSetsockopt(fd, IPPROTO_TCP, TCP_NODELAY, (char *)&yes, sizeof(yes));
|
|
|
|
// force the socket into no-wait, graceful-close mode (should be the default, but better make sure)
|
|
//(https://msdn.microsoft.com/en-us/library/windows/desktop/ms737582%28v=vs.85%29.aspx)
|
|
{
|
|
struct linger opt;
|
|
opt.l_onoff = 0; // SO_DONTLINGER
|
|
opt.l_linger = 0; // Do not care
|
|
if( sSetsockopt(fd, SOL_SOCKET, SO_LINGER, (char*)&opt, sizeof(opt)) )
|
|
ShowWarning("setsocketopts: Unable to set SO_LINGER mode for connection #%d!\n", fd);
|
|
}
|
|
if(delay_timeout){
|
|
#if defined(WIN32)
|
|
int timeout = delay_timeout * 1000;
|
|
#else
|
|
struct timeval timeout;
|
|
timeout.tv_sec = delay_timeout;
|
|
timeout.tv_usec = 0;
|
|
#endif
|
|
|
|
if (sSetsockopt (fd, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout,sizeof(timeout)) < 0)
|
|
ShowError("setsocketopts: Unable to set SO_RCVTIMEO timeout for connection #%d!\n", fd);
|
|
if (sSetsockopt (fd, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout,sizeof(timeout)) < 0)
|
|
ShowError("setsocketopts: Unable to set SO_SNDTIMEO timeout for connection #%d!\n", fd);
|
|
}
|
|
}
|
|
|
|
/*======================================
|
|
* CORE : Socket Sub Function
|
|
*--------------------------------------*/
|
|
void set_eof(int fd)
|
|
{
|
|
if( session_isActive(fd) )
|
|
{
|
|
#ifdef SEND_SHORTLIST
|
|
// Add this socket to the shortlist for eof handling.
|
|
send_shortlist_add_fd(fd);
|
|
#endif
|
|
session[fd]->flag.eof = 1;
|
|
}
|
|
}
|
|
|
|
int recv_to_fifo(int fd)
|
|
{
|
|
int len;
|
|
|
|
if( !session_isActive(fd) )
|
|
return -1;
|
|
|
|
len = sRecv(fd, (char *) session[fd]->rdata + session[fd]->rdata_size, (int)RFIFOSPACE(fd), 0);
|
|
|
|
if( len == SOCKET_ERROR )
|
|
{//An exception has occured
|
|
if( sErrno != S_EWOULDBLOCK ) {
|
|
//ShowDebug("recv_to_fifo: %s, closing connection #%d\n", error_msg(), fd);
|
|
set_eof(fd);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
if( len == 0 )
|
|
{//Normal connection end.
|
|
set_eof(fd);
|
|
return 0;
|
|
}
|
|
|
|
session[fd]->rdata_size += len;
|
|
session[fd]->rdata_tick = last_tick;
|
|
#ifdef SHOW_SERVER_STATS
|
|
socket_data_i += len;
|
|
socket_data_qi += len;
|
|
if (!session[fd]->flag.server)
|
|
{
|
|
socket_data_ci += len;
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
int send_from_fifo(int fd)
|
|
{
|
|
int len;
|
|
|
|
if( !session_isValid(fd) )
|
|
return -1;
|
|
|
|
if( session[fd]->wdata_size == 0 )
|
|
return 0; // nothing to send
|
|
|
|
len = sSend(fd, (const char *) session[fd]->wdata, (int)session[fd]->wdata_size, MSG_NOSIGNAL);
|
|
|
|
if( len == SOCKET_ERROR )
|
|
{//An exception has occured
|
|
if( sErrno != S_EWOULDBLOCK ) {
|
|
//ShowDebug("send_from_fifo: %s, ending connection #%d\n", error_msg(), fd);
|
|
#ifdef SHOW_SERVER_STATS
|
|
socket_data_qo -= session[fd]->wdata_size;
|
|
#endif
|
|
session[fd]->wdata_size = 0; //Clear the send queue as we can't send anymore. [Skotlex]
|
|
set_eof(fd);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
if( len > 0 )
|
|
{
|
|
// some data could not be transferred?
|
|
// shift unsent data to the beginning of the queue
|
|
if( (size_t)len < session[fd]->wdata_size )
|
|
memmove(session[fd]->wdata, session[fd]->wdata + len, session[fd]->wdata_size - len);
|
|
|
|
session[fd]->wdata_size -= len;
|
|
#ifdef SHOW_SERVER_STATS
|
|
socket_data_o += len;
|
|
socket_data_qo -= len;
|
|
if (!session[fd]->flag.server)
|
|
{
|
|
socket_data_co += len;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/// Best effort - there's no warranty that the data will be sent.
|
|
void flush_fifo(int fd)
|
|
{
|
|
if(session[fd] != NULL)
|
|
session[fd]->func_send(fd);
|
|
}
|
|
|
|
void flush_fifos(void)
|
|
{
|
|
int i;
|
|
for(i = 1; i < fd_max; i++)
|
|
flush_fifo(i);
|
|
}
|
|
|
|
/*======================================
|
|
* CORE : Connection functions
|
|
*--------------------------------------*/
|
|
int connect_client(int listen_fd)
|
|
{
|
|
int fd;
|
|
struct sockaddr_in client_address;
|
|
socklen_t len;
|
|
|
|
len = sizeof(client_address);
|
|
|
|
fd = sAccept(listen_fd, (struct sockaddr*)&client_address, &len);
|
|
if ( fd == -1 ) {
|
|
ShowError("connect_client: accept failed (%s)!\n", error_msg());
|
|
return -1;
|
|
}
|
|
if( fd == 0 )
|
|
{// reserved
|
|
ShowError("connect_client: Socket #0 is reserved - Please report this!!!\n");
|
|
sClose(fd);
|
|
return -1;
|
|
}
|
|
if( fd >= MAXCONN )
|
|
{// socket number too big
|
|
ShowError("connect_client: New socket #%d is greater than can we handle! Increase the value of MAXCONN (currently %d) for your OS to fix this!\n", fd, MAXCONN);
|
|
sClose(fd);
|
|
return -1;
|
|
}
|
|
|
|
setsocketopts(fd,0);
|
|
set_nonblocking(fd, 1);
|
|
|
|
#ifndef MINICORE
|
|
if( ip_rules && !connect_check(ntohl(client_address.sin_addr.s_addr)) ) {
|
|
do_close(fd);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
#ifndef SOCKET_EPOLL
|
|
// Select Based Event Dispatcher
|
|
sFD_SET(fd,&readfds);
|
|
#else
|
|
// Epoll based Event Dispatcher
|
|
epevent.data.fd = fd;
|
|
epevent.events = EPOLLIN;
|
|
|
|
if( epoll_ctl( epfd, EPOLL_CTL_ADD, fd, &epevent ) == SOCKET_ERROR ){
|
|
ShowError( "connect_client: Failed to add to epoll event dispatcher for new socket #%d: %s\n", fd, error_msg() );
|
|
sClose( fd );
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
if( fd_max <= fd ) fd_max = fd + 1;
|
|
|
|
create_session(fd, recv_to_fifo, send_from_fifo, default_func_parse);
|
|
session[fd]->client_addr = ntohl(client_address.sin_addr.s_addr);
|
|
|
|
return fd;
|
|
}
|
|
|
|
int make_listen_bind(uint32 ip, uint16 port)
|
|
{
|
|
struct sockaddr_in server_address;
|
|
int fd;
|
|
int result;
|
|
|
|
fd = sSocket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if( fd == -1 )
|
|
{
|
|
ShowError("make_listen_bind: socket creation failed (%s)!\n", error_msg());
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
if( fd == 0 )
|
|
{// reserved
|
|
ShowError("make_listen_bind: Socket #0 is reserved - Please report this!!!\n");
|
|
sClose(fd);
|
|
return -1;
|
|
}
|
|
if( fd >= MAXCONN )
|
|
{// socket number too big
|
|
ShowError("make_listen_bind: New socket #%d is greater than can we handle! Increase the value of MAXCONN (currently %d) for your OS to fix this!\n", fd, MAXCONN);
|
|
sClose(fd);
|
|
return -1;
|
|
}
|
|
|
|
setsocketopts(fd,0);
|
|
set_nonblocking(fd, 1);
|
|
|
|
server_address.sin_family = AF_INET;
|
|
server_address.sin_addr.s_addr = htonl(ip);
|
|
server_address.sin_port = htons(port);
|
|
|
|
result = sBind(fd, (struct sockaddr*)&server_address, sizeof(server_address));
|
|
if( result == SOCKET_ERROR ) {
|
|
ShowError("make_listen_bind: bind failed (socket #%d, %s)!\n", fd, error_msg());
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
result = sListen(fd,5);
|
|
if( result == SOCKET_ERROR ) {
|
|
ShowError("make_listen_bind: listen failed (socket #%d, %s)!\n", fd, error_msg());
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
#ifndef SOCKET_EPOLL
|
|
// Select Based Event Dispatcher
|
|
sFD_SET(fd, &readfds);
|
|
#else
|
|
// Epoll based Event Dispatcher
|
|
epevent.data.fd = fd;
|
|
epevent.events = EPOLLIN;
|
|
|
|
if( epoll_ctl( epfd, EPOLL_CTL_ADD, fd, &epevent ) == SOCKET_ERROR ){
|
|
ShowError( "make_listen_bind: failed to add listener socket #%d to epoll event dispatcher: %s\n", fd, error_msg() );
|
|
sClose(fd);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
#endif
|
|
|
|
if(fd_max <= fd) fd_max = fd + 1;
|
|
|
|
create_session(fd, connect_client, null_send, null_parse);
|
|
session[fd]->client_addr = 0; // just listens
|
|
session[fd]->rdata_tick = 0; // disable timeouts on this socket
|
|
|
|
return fd;
|
|
}
|
|
|
|
int make_connection(uint32 ip, uint16 port, bool silent,int timeout) {
|
|
struct sockaddr_in remote_address;
|
|
int fd;
|
|
int result;
|
|
|
|
fd = sSocket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if (fd == -1) {
|
|
ShowError("make_connection: socket creation failed (%s)!\n", error_msg());
|
|
return -1;
|
|
}
|
|
if( fd == 0 )
|
|
{// reserved
|
|
ShowError("make_connection: Socket #0 is reserved - Please report this!!!\n");
|
|
sClose(fd);
|
|
return -1;
|
|
}
|
|
if( fd >= MAXCONN )
|
|
{// socket number too big
|
|
ShowError("make_connection: New socket #%d is greater than can we handle! Increase the value of MAXCONN (currently %d) for your OS to fix this!\n", fd, MAXCONN);
|
|
sClose(fd);
|
|
return -1;
|
|
}
|
|
|
|
setsocketopts(fd,timeout);
|
|
|
|
remote_address.sin_family = AF_INET;
|
|
remote_address.sin_addr.s_addr = htonl(ip);
|
|
remote_address.sin_port = htons(port);
|
|
|
|
if( !silent )
|
|
ShowStatus("Connecting to %d.%d.%d.%d:%i\n", CONVIP(ip), port);
|
|
#ifdef WIN32
|
|
// On Windows we have to set the socket non-blocking before the connection to make timeout work. [Lemongrass]
|
|
set_nonblocking(fd, 1);
|
|
|
|
result = sConnect(fd, (struct sockaddr *)(&remote_address), sizeof(struct sockaddr_in));
|
|
|
|
// Only enter if a socket error occurred
|
|
// Create a pseudo scope to be able to break out in case of successful connection
|
|
while( result == SOCKET_ERROR ) {
|
|
// Specially handle the error number for connection attempts that would block, because we want to use a timeout
|
|
if( sErrno == S_EWOULDBLOCK ){
|
|
fd_set writeSet;
|
|
struct timeval tv;
|
|
|
|
sFD_ZERO(&writeSet);
|
|
sFD_SET(fd,&writeSet);
|
|
|
|
tv.tv_sec = timeout;
|
|
tv.tv_usec = 0;
|
|
|
|
result = sSelect(0, NULL, &writeSet, NULL, &tv);
|
|
|
|
// Connection attempt timed out
|
|
if( result == 0 ){
|
|
if( !silent ){
|
|
// Needs special handling, because it does not set an error code and therefore does not provide an error message from the API
|
|
ShowError("make_connection: connection failed (socket #%d, timeout after %ds)!\n", fd, timeout);
|
|
}
|
|
|
|
do_close(fd);
|
|
return -1;
|
|
// If the select operation did not return an error
|
|
}else if( result != SOCKET_ERROR ){
|
|
// Check if it is really writeable
|
|
if( sFD_ISSET(fd, &writeSet) != 0 ){
|
|
// Our socket is writeable now => we have connected successfully
|
|
break; // leave the pseudo scope
|
|
}
|
|
|
|
if( !silent ){
|
|
// Needs special handling, because it does not set an error code and therefore does not provide an error message from the API
|
|
ShowError("make_connection: connection failed (socket #%d, not writeable)!\n", fd);
|
|
}
|
|
|
|
do_close(fd);
|
|
return -1;
|
|
}
|
|
// The select operation failed
|
|
}
|
|
|
|
if( !silent )
|
|
ShowError("make_connection: connect failed (socket #%d, %s)!\n", fd, error_msg());
|
|
|
|
do_close(fd);
|
|
return -1;
|
|
}
|
|
// Keep the socket in non-blocking mode, since we would set it to non-blocking here on unix. [Lemongrass]
|
|
#else
|
|
result = sConnect(fd, (struct sockaddr *)(&remote_address), sizeof(struct sockaddr_in));
|
|
if( result == SOCKET_ERROR ) {
|
|
if( !silent )
|
|
ShowError("make_connection: connect failed (socket #%d, %s)!\n", fd, error_msg());
|
|
do_close(fd);
|
|
return -1;
|
|
}
|
|
|
|
//Now the socket can be made non-blocking. [Skotlex]
|
|
set_nonblocking(fd, 1);
|
|
#endif
|
|
|
|
#ifndef SOCKET_EPOLL
|
|
// Select Based Event Dispatcher
|
|
sFD_SET(fd,&readfds);
|
|
#else
|
|
// Epoll based Event Dispatcher
|
|
epevent.data.fd = fd;
|
|
epevent.events = EPOLLIN;
|
|
|
|
if( epoll_ctl( epfd, EPOLL_CTL_ADD, fd, &epevent ) == SOCKET_ERROR ){
|
|
ShowError( "make_connection: failed to add socket #%d to epoll event dispatcher: %s\n", fd, error_msg() );
|
|
sClose(fd);
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
if (fd_max <= fd) fd_max = fd + 1;
|
|
|
|
create_session(fd, recv_to_fifo, send_from_fifo, default_func_parse);
|
|
session[fd]->client_addr = ntohl(remote_address.sin_addr.s_addr);
|
|
|
|
return fd;
|
|
}
|
|
|
|
static int create_session(int fd, RecvFunc func_recv, SendFunc func_send, ParseFunc func_parse)
|
|
{
|
|
CREATE(session[fd], struct socket_data, 1);
|
|
CREATE(session[fd]->rdata, unsigned char, RFIFO_SIZE);
|
|
CREATE(session[fd]->wdata, unsigned char, WFIFO_SIZE);
|
|
session[fd]->max_rdata = RFIFO_SIZE;
|
|
session[fd]->max_wdata = WFIFO_SIZE;
|
|
session[fd]->func_recv = func_recv;
|
|
session[fd]->func_send = func_send;
|
|
session[fd]->func_parse = func_parse;
|
|
session[fd]->rdata_tick = last_tick;
|
|
return 0;
|
|
}
|
|
|
|
static void delete_session(int fd)
|
|
{
|
|
if( session_isValid(fd) )
|
|
{
|
|
#ifdef SHOW_SERVER_STATS
|
|
socket_data_qi -= session[fd]->rdata_size - session[fd]->rdata_pos;
|
|
socket_data_qo -= session[fd]->wdata_size;
|
|
#endif
|
|
aFree(session[fd]->rdata);
|
|
aFree(session[fd]->wdata);
|
|
aFree(session[fd]->session_data);
|
|
aFree(session[fd]);
|
|
session[fd] = NULL;
|
|
}
|
|
}
|
|
|
|
int realloc_fifo(int fd, unsigned int rfifo_size, unsigned int wfifo_size)
|
|
{
|
|
if( !session_isValid(fd) )
|
|
return 0;
|
|
|
|
if( session[fd]->max_rdata != rfifo_size && session[fd]->rdata_size < rfifo_size) {
|
|
RECREATE(session[fd]->rdata, unsigned char, rfifo_size);
|
|
session[fd]->max_rdata = rfifo_size;
|
|
}
|
|
|
|
if( session[fd]->max_wdata != wfifo_size && session[fd]->wdata_size < wfifo_size) {
|
|
RECREATE(session[fd]->wdata, unsigned char, wfifo_size);
|
|
session[fd]->max_wdata = wfifo_size;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int realloc_writefifo(int fd, size_t addition)
|
|
{
|
|
size_t newsize;
|
|
|
|
if( !session_isValid(fd) ) // might not happen
|
|
return 0;
|
|
|
|
if( session[fd]->wdata_size + addition > session[fd]->max_wdata )
|
|
{ // grow rule; grow in multiples of WFIFO_SIZE
|
|
newsize = WFIFO_SIZE;
|
|
while( session[fd]->wdata_size + addition > newsize ) newsize += WFIFO_SIZE;
|
|
}
|
|
else
|
|
if( session[fd]->max_wdata >= (size_t)2*(session[fd]->flag.server?FIFOSIZE_SERVERLINK:WFIFO_SIZE)
|
|
&& (session[fd]->wdata_size+addition)*4 < session[fd]->max_wdata )
|
|
{ // shrink rule, shrink by 2 when only a quarter of the fifo is used, don't shrink below nominal size.
|
|
newsize = session[fd]->max_wdata / 2;
|
|
}
|
|
else // no change
|
|
return 0;
|
|
|
|
RECREATE(session[fd]->wdata, unsigned char, newsize);
|
|
session[fd]->max_wdata = newsize;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/// advance the RFIFO cursor (marking 'len' bytes as processed)
|
|
int RFIFOSKIP(int fd, size_t len)
|
|
{
|
|
struct socket_data *s;
|
|
|
|
if ( !session_isActive(fd) )
|
|
return 0;
|
|
|
|
s = session[fd];
|
|
|
|
if ( s->rdata_size < s->rdata_pos + len ) {
|
|
ShowError("RFIFOSKIP: skipped past end of read buffer! Adjusting from %" PRIuPTR " to %d (session #%d)\n", len, RFIFOREST(fd), fd);
|
|
len = RFIFOREST(fd);
|
|
}
|
|
|
|
s->rdata_pos = s->rdata_pos + len;
|
|
#ifdef SHOW_SERVER_STATS
|
|
socket_data_qi -= len;
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
/// advance the WFIFO cursor (marking 'len' bytes for sending)
|
|
int WFIFOSET(int fd, size_t len)
|
|
{
|
|
size_t newreserve;
|
|
struct socket_data* s = session[fd];
|
|
|
|
if( !session_isValid(fd) || s->wdata == NULL )
|
|
return 0;
|
|
|
|
// we have written len bytes to the buffer already before calling WFIFOSET
|
|
if(s->wdata_size+len > s->max_wdata)
|
|
{ // actually there was a buffer overflow already
|
|
uint32 ip = s->client_addr;
|
|
ShowFatalError("WFIFOSET: Write Buffer Overflow. Connection %d (%d.%d.%d.%d) has written %u bytes on a %u/%u bytes buffer.\n", fd, CONVIP(ip), (unsigned int)len, (unsigned int)s->wdata_size, (unsigned int)s->max_wdata);
|
|
ShowDebug("Likely command that caused it: 0x%x\n", (*(uint16*)(s->wdata + s->wdata_size)));
|
|
// no other chance, make a better fifo model
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if( len > 0xFFFF )
|
|
{
|
|
// dynamic packets allow up to UINT16_MAX bytes (<packet_id>.W <packet_len>.W ...)
|
|
// all known fixed-size packets are within this limit, so use the same limit
|
|
ShowFatalError("WFIFOSET: Packet 0x%x is too big. (len=%u, max=%u)\n", (*(uint16*)(s->wdata + s->wdata_size)), (unsigned int)len, 0xFFFF);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
else if( len == 0 )
|
|
{
|
|
// abuses the fact, that the code that did WFIFOHEAD(fd,0), already wrote
|
|
// the packet type into memory, even if it could have overwritten vital data
|
|
// this can happen when a new packet was added on map-server, but packet len table was not updated
|
|
ShowWarning("WFIFOSET: Attempted to send zero-length packet, most likely 0x%04x (please report this).\n", WFIFOW(fd,0));
|
|
return 0;
|
|
}
|
|
|
|
if( !s->flag.server ) {
|
|
|
|
if( len > socket_max_client_packet ) {// see declaration of socket_max_client_packet for details
|
|
ShowError("WFIFOSET: Dropped too large client packet 0x%04x (length=%" PRIuPTR ", max=%" PRIuPTR ").\n", WFIFOW(fd,0), len, socket_max_client_packet);
|
|
return 0;
|
|
}
|
|
|
|
if( s->wdata_size+len > WFIFO_MAX ) {// reached maximum write fifo size
|
|
ShowError("WFIFOSET: Maximum write buffer size for client connection %d exceeded, most likely caused by packet 0x%04x (len=%" PRIuPTR ", ip=%lu.%lu.%lu.%lu).\n", fd, WFIFOW(fd,0), len, CONVIP(s->client_addr));
|
|
set_eof(fd);
|
|
return 0;
|
|
}
|
|
|
|
}
|
|
s->wdata_size += len;
|
|
#ifdef SHOW_SERVER_STATS
|
|
socket_data_qo += len;
|
|
#endif
|
|
//If the interserver has 200% of its normal size full, flush the data.
|
|
if( s->flag.server && s->wdata_size >= 2*FIFOSIZE_SERVERLINK )
|
|
flush_fifo(fd);
|
|
|
|
// always keep a WFIFO_SIZE reserve in the buffer
|
|
// For inter-server connections, let the reserve be 1/4th of the link size.
|
|
newreserve = s->flag.server ? FIFOSIZE_SERVERLINK / 4 : WFIFO_SIZE;
|
|
|
|
// readjust the buffer to include the chosen reserve
|
|
realloc_writefifo(fd, newreserve);
|
|
|
|
#ifdef SEND_SHORTLIST
|
|
send_shortlist_add_fd(fd);
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
int do_sockets(t_tick next)
|
|
{
|
|
#ifndef SOCKET_EPOLL
|
|
fd_set rfd;
|
|
struct timeval timeout;
|
|
#endif
|
|
int ret,i;
|
|
|
|
// PRESEND Timers are executed before do_sendrecv and can send packets and/or set sessions to eof.
|
|
// Send remaining data and process client-side disconnects here.
|
|
#ifdef SEND_SHORTLIST
|
|
send_shortlist_do_sends();
|
|
#else
|
|
for (i = 1; i < fd_max; i++)
|
|
{
|
|
if(!session[i])
|
|
continue;
|
|
|
|
if(session[i]->wdata_size)
|
|
session[i]->func_send(i);
|
|
}
|
|
#endif
|
|
|
|
#ifndef SOCKET_EPOLL
|
|
// Select based Event Dispatcher
|
|
|
|
// can timeout until the next tick
|
|
timeout.tv_sec = (long)(next/1000);
|
|
timeout.tv_usec = (long)(next%1000*1000);
|
|
|
|
memcpy(&rfd, &readfds, sizeof(rfd));
|
|
ret = sSelect(fd_max, &rfd, NULL, NULL, &timeout);
|
|
|
|
if( ret == SOCKET_ERROR )
|
|
{
|
|
if( sErrno != S_EINTR )
|
|
{
|
|
ShowFatalError("do_sockets: select() failed, %s!\n", error_msg());
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
return 0; // interrupted by a signal, just loop and try again
|
|
}
|
|
#else
|
|
// Epoll based Event Dispatcher
|
|
|
|
ret = epoll_wait( epfd, epevents, epoll_maxevents, next );
|
|
|
|
if( ret == SOCKET_ERROR ){
|
|
if( sErrno != S_EINTR ){
|
|
ShowFatalError( "do_sockets: epoll_wait() failed, %s!\n", error_msg() );
|
|
exit( EXIT_FAILURE );
|
|
}
|
|
|
|
return 0; // interrupted by a signal, just loop and try again
|
|
}
|
|
#endif
|
|
|
|
last_tick = time(NULL);
|
|
|
|
#if defined(WIN32)
|
|
// on windows, enumerating all members of the fd_set is way faster if we access the internals
|
|
for( i = 0; i < (int)rfd.fd_count; ++i )
|
|
{
|
|
int fd = sock2fd(rfd.fd_array[i]);
|
|
if( session[fd] )
|
|
session[fd]->func_recv(fd);
|
|
}
|
|
#elif defined(SOCKET_EPOLL)
|
|
// epoll based selection
|
|
|
|
for( i = 0; i < ret; i++ ){
|
|
struct epoll_event *it = &epevents[i];
|
|
int fd = it->data.fd;
|
|
struct socket_data *sock = session[fd];
|
|
|
|
if( !sock ){
|
|
continue;
|
|
}
|
|
|
|
if( ( it->events & (EPOLLERR|EPOLLHUP) ) || !( it->events & EPOLLIN ) ){
|
|
// Got Error on this connection
|
|
set_eof( fd );
|
|
}else if( it->events & EPOLLIN ){
|
|
// data waiting
|
|
sock->func_recv( fd );
|
|
}
|
|
}
|
|
#else
|
|
// otherwise assume that the fd_set is a bit-array and enumerate it in a standard way
|
|
for( i = 1; ret && i < fd_max; ++i )
|
|
{
|
|
if(sFD_ISSET(i,&rfd) && session[i])
|
|
{
|
|
session[i]->func_recv(i);
|
|
--ret;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
// POSTSEND Send remaining data and handle eof sessions.
|
|
#ifdef SEND_SHORTLIST
|
|
send_shortlist_do_sends();
|
|
#else
|
|
for (i = 1; i < fd_max; i++)
|
|
{
|
|
if(!session[i])
|
|
continue;
|
|
|
|
if(session[i]->wdata_size)
|
|
session[i]->func_send(i);
|
|
|
|
if(session[i]->flag.eof) //func_send can't free a session, this is safe.
|
|
{ //Finally, even if there is no data to parse, connections signalled eof should be closed, so we call parse_func [Skotlex]
|
|
session[i]->func_parse(i); //This should close the session immediately.
|
|
}
|
|
}
|
|
#endif
|
|
|
|
// parse input data on each socket
|
|
for(i = 1; i < fd_max; i++)
|
|
{
|
|
if(!session[i])
|
|
continue;
|
|
|
|
if (session[i]->rdata_tick && DIFF_TICK(last_tick, session[i]->rdata_tick) > stall_time) {
|
|
if( session[i]->flag.server ) {/* server is special */
|
|
if( session[i]->flag.ping != 2 )/* only update if necessary otherwise it'd resend the ping unnecessarily */
|
|
session[i]->flag.ping = 1;
|
|
} else {
|
|
ShowInfo("Session #%d timed out\n", i);
|
|
set_eof(i);
|
|
}
|
|
}
|
|
|
|
session[i]->func_parse(i);
|
|
|
|
if(!session[i])
|
|
continue;
|
|
|
|
// after parse, check client's RFIFO size to know if there is an invalid packet (too big and not parsed)
|
|
if (session[i]->rdata_size == RFIFO_SIZE && session[i]->max_rdata == RFIFO_SIZE) {
|
|
set_eof(i);
|
|
continue;
|
|
}
|
|
RFIFOFLUSH(i);
|
|
}
|
|
|
|
#ifdef SHOW_SERVER_STATS
|
|
if (last_tick != socket_data_last_tick)
|
|
{
|
|
char buf[1024];
|
|
|
|
sprintf(buf, "In: %.03f kB/s (%.03f kB/s, Q: %.03f kB) | Out: %.03f kB/s (%.03f kB/s, Q: %.03f kB) | RAM: %.03f MB", socket_data_i/1024., socket_data_ci/1024., socket_data_qi/1024., socket_data_o/1024., socket_data_co/1024., socket_data_qo/1024., malloc_usage()/1024.);
|
|
#ifdef _WIN32
|
|
SetConsoleTitle(buf);
|
|
#else
|
|
ShowMessage("\033[s\033[1;1H\033[2K%s\033[u", buf);
|
|
#endif
|
|
socket_data_last_tick = last_tick;
|
|
socket_data_i = socket_data_ci = 0;
|
|
socket_data_o = socket_data_co = 0;
|
|
}
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
//////////////////////////////
|
|
#ifndef MINICORE
|
|
//////////////////////////////
|
|
// IP rules and DDoS protection
|
|
|
|
typedef struct _connect_history {
|
|
struct _connect_history* next;
|
|
uint32 ip;
|
|
t_tick tick;
|
|
int count;
|
|
unsigned ddos : 1;
|
|
} ConnectHistory;
|
|
|
|
typedef struct _access_control {
|
|
uint32 ip;
|
|
uint32 mask;
|
|
} AccessControl;
|
|
|
|
enum _aco {
|
|
ACO_DENY_ALLOW,
|
|
ACO_ALLOW_DENY,
|
|
ACO_MUTUAL_FAILURE
|
|
};
|
|
|
|
static AccessControl* access_allow = NULL;
|
|
static AccessControl* access_deny = NULL;
|
|
static int access_order = ACO_DENY_ALLOW;
|
|
static int access_allownum = 0;
|
|
static int access_denynum = 0;
|
|
static int access_debug = 0;
|
|
static int ddos_count = 10;
|
|
static int ddos_interval = 3*1000;
|
|
static int ddos_autoreset = 10*60*1000;
|
|
/// Connection history, an array of linked lists.
|
|
/// The array's index for any ip is ip&0xFFFF
|
|
static ConnectHistory* connect_history[0x10000];
|
|
|
|
static int connect_check_(uint32 ip);
|
|
|
|
/// Verifies if the IP can connect. (with debug info)
|
|
/// @see connect_check_()
|
|
static int connect_check(uint32 ip)
|
|
{
|
|
int result = connect_check_(ip);
|
|
if( access_debug ) {
|
|
ShowInfo("connect_check: Connection from %d.%d.%d.%d %s\n", CONVIP(ip),result ? "allowed." : "denied!");
|
|
}
|
|
return result;
|
|
}
|
|
|
|
/// Verifies if the IP can connect.
|
|
/// 0 : Connection Rejected
|
|
/// 1 or 2 : Connection Accepted
|
|
static int connect_check_(uint32 ip)
|
|
{
|
|
ConnectHistory* hist = connect_history[ip&0xFFFF];
|
|
int i;
|
|
int is_allowip = 0;
|
|
int is_denyip = 0;
|
|
int connect_ok = 0;
|
|
|
|
// Search the allow list
|
|
for( i=0; i < access_allownum; ++i ){
|
|
if( (ip & access_allow[i].mask) == (access_allow[i].ip & access_allow[i].mask) ){
|
|
if( access_debug ){
|
|
ShowInfo("connect_check: Found match from allow list:%d.%d.%d.%d IP:%d.%d.%d.%d Mask:%d.%d.%d.%d\n",
|
|
CONVIP(ip),
|
|
CONVIP(access_allow[i].ip),
|
|
CONVIP(access_allow[i].mask));
|
|
}
|
|
is_allowip = 1;
|
|
break;
|
|
}
|
|
}
|
|
// Search the deny list
|
|
for( i=0; i < access_denynum; ++i ){
|
|
if( (ip & access_deny[i].mask) == (access_deny[i].ip & access_deny[i].mask) ){
|
|
if( access_debug ){
|
|
ShowInfo("connect_check: Found match from deny list:%d.%d.%d.%d IP:%d.%d.%d.%d Mask:%d.%d.%d.%d\n",
|
|
CONVIP(ip),
|
|
CONVIP(access_deny[i].ip),
|
|
CONVIP(access_deny[i].mask));
|
|
}
|
|
is_denyip = 1;
|
|
break;
|
|
}
|
|
}
|
|
// Decide connection status
|
|
// 0 : Reject
|
|
// 1 : Accept
|
|
// 2 : Unconditional Accept (accepts even if flagged as DDoS)
|
|
switch(access_order) {
|
|
case ACO_DENY_ALLOW:
|
|
default:
|
|
if( is_denyip )
|
|
connect_ok = 0; // Reject
|
|
else if( is_allowip )
|
|
connect_ok = 2; // Unconditional Accept
|
|
else
|
|
connect_ok = 1; // Accept
|
|
break;
|
|
case ACO_ALLOW_DENY:
|
|
if( is_allowip )
|
|
connect_ok = 2; // Unconditional Accept
|
|
else if( is_denyip )
|
|
connect_ok = 0; // Reject
|
|
else
|
|
connect_ok = 1; // Accept
|
|
break;
|
|
case ACO_MUTUAL_FAILURE:
|
|
if( is_allowip && !is_denyip )
|
|
connect_ok = 2; // Unconditional Accept
|
|
else
|
|
connect_ok = 0; // Reject
|
|
break;
|
|
}
|
|
|
|
// Inspect connection history
|
|
while( hist ) {
|
|
if( ip == hist->ip )
|
|
{// IP found
|
|
if( hist->ddos )
|
|
{// flagged as DDoS
|
|
return (connect_ok == 2 ? 1 : 0);
|
|
} else if( DIFF_TICK(gettick(),hist->tick) < ddos_interval )
|
|
{// connection within ddos_interval
|
|
hist->tick = gettick();
|
|
if( hist->count++ >= ddos_count )
|
|
{// DDoS attack detected
|
|
hist->ddos = 1;
|
|
ShowWarning("connect_check: DDoS Attack detected from %d.%d.%d.%d!\n", CONVIP(ip));
|
|
return (connect_ok == 2 ? 1 : 0);
|
|
}
|
|
return connect_ok;
|
|
} else
|
|
{// not within ddos_interval, clear data
|
|
hist->tick = gettick();
|
|
hist->count = 0;
|
|
return connect_ok;
|
|
}
|
|
}
|
|
hist = hist->next;
|
|
}
|
|
// IP not found, add to history
|
|
CREATE(hist, ConnectHistory, 1);
|
|
memset(hist, 0, sizeof(ConnectHistory));
|
|
hist->ip = ip;
|
|
hist->tick = gettick();
|
|
hist->next = connect_history[ip&0xFFFF];
|
|
connect_history[ip&0xFFFF] = hist;
|
|
return connect_ok;
|
|
}
|
|
|
|
/// Timer function.
|
|
/// Deletes old connection history records.
|
|
static TIMER_FUNC(connect_check_clear){
|
|
int i;
|
|
int clear = 0;
|
|
int list = 0;
|
|
ConnectHistory root;
|
|
ConnectHistory* prev_hist;
|
|
ConnectHistory* hist;
|
|
|
|
for( i=0; i < 0x10000 ; ++i ){
|
|
prev_hist = &root;
|
|
root.next = hist = connect_history[i];
|
|
while( hist ){
|
|
if( (!hist->ddos && DIFF_TICK(tick,hist->tick) > ddos_interval*3) ||
|
|
(hist->ddos && DIFF_TICK(tick,hist->tick) > ddos_autoreset) )
|
|
{// Remove connection history
|
|
prev_hist->next = hist->next;
|
|
aFree(hist);
|
|
hist = prev_hist->next;
|
|
clear++;
|
|
} else {
|
|
prev_hist = hist;
|
|
hist = hist->next;
|
|
}
|
|
list++;
|
|
}
|
|
connect_history[i] = root.next;
|
|
}
|
|
if( access_debug ){
|
|
ShowInfo("connect_check_clear: Cleared %d of %d from IP list.\n", clear, list);
|
|
}
|
|
return list;
|
|
}
|
|
|
|
/// Parses the ip address and mask and puts it into acc.
|
|
/// Returns 1 is successful, 0 otherwise.
|
|
int access_ipmask(const char* str, AccessControl* acc)
|
|
{
|
|
uint32 ip;
|
|
uint32 mask;
|
|
|
|
if( strcmp(str,"all") == 0 ) {
|
|
ip = 0;
|
|
mask = 0;
|
|
} else {
|
|
unsigned int a[4];
|
|
unsigned int m[4];
|
|
int n;
|
|
if( ((n=sscanf(str,"%3u.%3u.%3u.%3u/%3u.%3u.%3u.%3u",a,a+1,a+2,a+3,m,m+1,m+2,m+3)) != 8 && // not an ip + standard mask
|
|
(n=sscanf(str,"%3u.%3u.%3u.%3u/%3u",a,a+1,a+2,a+3,m)) != 5 && // not an ip + bit mask
|
|
(n=sscanf(str,"%3u.%3u.%3u.%3u",a,a+1,a+2,a+3)) != 4 ) || // not an ip
|
|
a[0] > 255 || a[1] > 255 || a[2] > 255 || a[3] > 255 || // invalid ip
|
|
(n == 8 && (m[0] > 255 || m[1] > 255 || m[2] > 255 || m[3] > 255)) || // invalid standard mask
|
|
(n == 5 && m[0] > 32) ){ // invalid bit mask
|
|
return 0;
|
|
}
|
|
ip = MAKEIP(a[0],a[1],a[2],a[3]);
|
|
if( n == 8 )
|
|
{// standard mask
|
|
mask = MAKEIP(m[0],m[1],m[2],m[3]);
|
|
} else if( n == 5 )
|
|
{// bit mask
|
|
mask = 0;
|
|
while( m[0] ){
|
|
mask = (mask >> 1) | 0x80000000;
|
|
--m[0];
|
|
}
|
|
} else
|
|
{// just this ip
|
|
mask = 0xFFFFFFFF;
|
|
}
|
|
}
|
|
if( access_debug ){
|
|
ShowInfo("access_ipmask: Loaded IP:%d.%d.%d.%d mask:%d.%d.%d.%d\n", CONVIP(ip), CONVIP(mask));
|
|
}
|
|
acc->ip = ip;
|
|
acc->mask = mask;
|
|
return 1;
|
|
}
|
|
//////////////////////////////
|
|
#endif
|
|
//////////////////////////////
|
|
|
|
int socket_config_read(const char* cfgName)
|
|
{
|
|
char line[1024],w1[1024],w2[1024];
|
|
FILE *fp;
|
|
|
|
fp = fopen(cfgName, "r");
|
|
if(fp == NULL) {
|
|
ShowError("File not found: %s\n", cfgName);
|
|
return 1;
|
|
}
|
|
|
|
while(fgets(line, sizeof(line), fp))
|
|
{
|
|
if(line[0] == '/' && line[1] == '/')
|
|
continue;
|
|
if(sscanf(line, "%1023[^:]: %1023[^\r\n]", w1, w2) != 2)
|
|
continue;
|
|
|
|
if (!strcmpi(w1, "stall_time")) {
|
|
stall_time = atoi(w2);
|
|
if( stall_time < 3 )
|
|
stall_time = 3;/* a minimum is required to refrain it from killing itself */
|
|
}
|
|
#ifndef MINICORE
|
|
else if (!strcmpi(w1, "enable_ip_rules")) {
|
|
ip_rules = config_switch(w2);
|
|
} else if (!strcmpi(w1, "order")) {
|
|
if (!strcmpi(w2, "deny,allow"))
|
|
access_order = ACO_DENY_ALLOW;
|
|
else if (!strcmpi(w2, "allow,deny"))
|
|
access_order = ACO_ALLOW_DENY;
|
|
else if (!strcmpi(w2, "mutual-failure"))
|
|
access_order = ACO_MUTUAL_FAILURE;
|
|
} else if (!strcmpi(w1, "allow")) {
|
|
RECREATE(access_allow, AccessControl, access_allownum+1);
|
|
if (access_ipmask(w2, &access_allow[access_allownum]))
|
|
++access_allownum;
|
|
else
|
|
ShowError("socket_config_read: Invalid ip or ip range '%s'!\n", line);
|
|
} else if (!strcmpi(w1, "deny")) {
|
|
RECREATE(access_deny, AccessControl, access_denynum+1);
|
|
if (access_ipmask(w2, &access_deny[access_denynum]))
|
|
++access_denynum;
|
|
else
|
|
ShowError("socket_config_read: Invalid ip or ip range '%s'!\n", line);
|
|
}
|
|
else if (!strcmpi(w1,"ddos_interval"))
|
|
ddos_interval = atoi(w2);
|
|
else if (!strcmpi(w1,"ddos_count"))
|
|
ddos_count = atoi(w2);
|
|
else if (!strcmpi(w1,"ddos_autoreset"))
|
|
ddos_autoreset = atoi(w2);
|
|
else if (!strcmpi(w1,"debug"))
|
|
access_debug = config_switch(w2);
|
|
#ifdef SOCKET_EPOLL
|
|
else if( !strcmpi( w1, "epoll_maxevents" ) ){
|
|
epoll_maxevents = atoi(w2);
|
|
|
|
// minimum that seems to be useful
|
|
if( epoll_maxevents < 16 ){
|
|
ShowWarning( "socket_config_read: epoll_maxevents is set too low. Defaulting to 16...\n" );
|
|
epoll_maxevents = 16;
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
else if (!strcmpi(w1, "import"))
|
|
socket_config_read(w2);
|
|
else
|
|
ShowWarning("Unknown setting '%s' in file %s\n", w1, cfgName);
|
|
}
|
|
|
|
fclose(fp);
|
|
return 0;
|
|
}
|
|
|
|
|
|
void socket_final(void)
|
|
{
|
|
int i;
|
|
#ifndef MINICORE
|
|
ConnectHistory* hist;
|
|
ConnectHistory* next_hist;
|
|
|
|
for( i=0; i < 0x10000; ++i ){
|
|
hist = connect_history[i];
|
|
while( hist ){
|
|
next_hist = hist->next;
|
|
aFree(hist);
|
|
hist = next_hist;
|
|
}
|
|
}
|
|
if( access_allow )
|
|
aFree(access_allow);
|
|
if( access_deny )
|
|
aFree(access_deny);
|
|
#endif
|
|
|
|
for( i = 1; i < fd_max; i++ )
|
|
if(session[i])
|
|
do_close(i);
|
|
|
|
// session[0]
|
|
aFree(session[0]->rdata);
|
|
aFree(session[0]->wdata);
|
|
aFree(session[0]->session_data);
|
|
aFree(session[0]);
|
|
session[0] = NULL;
|
|
|
|
#ifdef WIN32
|
|
// Shut down windows networking
|
|
if( WSACleanup() != 0 ){
|
|
ShowError("socket_final: WinSock could not be cleaned up! %s\n", error_msg() );
|
|
}
|
|
#elif defined(SOCKET_EPOLL)
|
|
if( epfd != SOCKET_ERROR ){
|
|
sClose(epfd);
|
|
epfd = SOCKET_ERROR;
|
|
}
|
|
|
|
if( epevents != nullptr ){
|
|
aFree( epevents );
|
|
epevents = nullptr;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/// Closes a socket.
|
|
void do_close(int fd)
|
|
{
|
|
if( fd <= 0 ||fd >= MAXCONN )
|
|
return;// invalid
|
|
|
|
flush_fifo(fd); // Try to send what's left (although it might not succeed since it's a nonblocking socket)
|
|
|
|
#ifndef SOCKET_EPOLL
|
|
// Select based Event Dispatcher
|
|
sFD_CLR(fd, &readfds);// this needs to be done before closing the socket
|
|
#else
|
|
// Epoll based Event Dispatcher
|
|
epevent.data.fd = fd;
|
|
epevent.events = EPOLLIN;
|
|
epoll_ctl( epfd, EPOLL_CTL_DEL, fd, &epevent ); // removing the socket from epoll when it's being closed is not required but recommended
|
|
#endif
|
|
|
|
sShutdown(fd, SHUT_RDWR); // Disallow further reads/writes
|
|
sClose(fd); // We don't really care if these closing functions return an error, we are just shutting down and not reusing this socket.
|
|
if (session[fd]) delete_session(fd);
|
|
}
|
|
|
|
/// Retrieve local ips in host byte order.
|
|
/// Uses loopback is no address is found.
|
|
int socket_getips(uint32* ips, int max)
|
|
{
|
|
int num = 0;
|
|
|
|
if( ips == NULL || max <= 0 )
|
|
return 0;
|
|
|
|
#ifdef WIN32
|
|
{
|
|
char fullhost[255];
|
|
|
|
// XXX This should look up the local IP addresses in the registry
|
|
// instead of calling gethostbyname. However, the way IP addresses
|
|
// are stored in the registry is annoyingly complex, so I'll leave
|
|
// this as T.B.D. [Meruru]
|
|
if( gethostname(fullhost, sizeof(fullhost)) == SOCKET_ERROR )
|
|
{
|
|
ShowError("socket_getips: No hostname defined!\n");
|
|
return 0;
|
|
}
|
|
else
|
|
{
|
|
u_long** a;
|
|
struct hostent* hent;
|
|
hent = gethostbyname(fullhost);
|
|
if( hent == NULL ){
|
|
ShowError("socket_getips: Cannot resolve our own hostname to an IP address\n");
|
|
return 0;
|
|
}
|
|
a = (u_long**)hent->h_addr_list;
|
|
for( ;num < max && a[num] != NULL; ++num)
|
|
ips[num] = (uint32)ntohl(*a[num]);
|
|
}
|
|
}
|
|
#else // not WIN32
|
|
{
|
|
int fd;
|
|
char buf[2*16*sizeof(struct ifreq)];
|
|
struct ifconf ic;
|
|
u_long ad;
|
|
|
|
fd = sSocket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
memset(buf, 0x00, sizeof(buf));
|
|
|
|
// The ioctl call will fail with Invalid Argument if there are more
|
|
// interfaces than will fit in the buffer
|
|
ic.ifc_len = sizeof(buf);
|
|
ic.ifc_buf = buf;
|
|
if( sIoctl(fd, SIOCGIFCONF, &ic) == -1 )
|
|
{
|
|
ShowError("socket_getips: SIOCGIFCONF failed!\n");
|
|
return 0;
|
|
}
|
|
else
|
|
{
|
|
int pos;
|
|
for( pos=0; pos < ic.ifc_len && num < max; )
|
|
{
|
|
struct ifreq* ir = (struct ifreq*)(buf+pos);
|
|
struct sockaddr_in*a = (struct sockaddr_in*) &(ir->ifr_addr);
|
|
if( a->sin_family == AF_INET ){
|
|
ad = ntohl(a->sin_addr.s_addr);
|
|
if( ad != INADDR_LOOPBACK && ad != INADDR_ANY )
|
|
ips[num++] = (uint32)ad;
|
|
}
|
|
#if (defined(BSD) && BSD >= 199103) || defined(_AIX) || defined(__APPLE__)
|
|
pos += ir->ifr_addr.sa_len + sizeof(ir->ifr_name);
|
|
#else// not AIX or APPLE
|
|
pos += sizeof(struct ifreq);
|
|
#endif//not AIX or APPLE
|
|
}
|
|
}
|
|
sClose(fd);
|
|
}
|
|
#endif // not W32
|
|
|
|
// Use loopback if no ips are found
|
|
if( num == 0 )
|
|
ips[num++] = (uint32)INADDR_LOOPBACK;
|
|
|
|
return num;
|
|
}
|
|
|
|
void socket_init(void)
|
|
{
|
|
const char *SOCKET_CONF_FILENAME = "conf/packet_athena.conf";
|
|
unsigned int rlim_cur = MAXCONN;
|
|
|
|
#ifdef WIN32
|
|
{// Start up windows networking
|
|
WSADATA wsaData;
|
|
WORD wVersionRequested = MAKEWORD(2, 0);
|
|
if( WSAStartup(wVersionRequested, &wsaData) != 0 )
|
|
{
|
|
ShowError("socket_init: WinSock not available!\n");
|
|
return;
|
|
}
|
|
if( LOBYTE(wsaData.wVersion) != 2 || HIBYTE(wsaData.wVersion) != 0 )
|
|
{
|
|
ShowError("socket_init: WinSock version mismatch (2.0 or compatible required)!\n");
|
|
return;
|
|
}
|
|
}
|
|
#elif defined(HAVE_SETRLIMIT) && !defined(CYGWIN)
|
|
// NOTE: getrlimit and setrlimit have bogus behaviour in cygwin.
|
|
// "Number of fds is virtually unlimited in cygwin" (sys/param.h)
|
|
{// set socket limit to MAXCONN
|
|
struct rlimit rlp;
|
|
if( 0 == getrlimit(RLIMIT_NOFILE, &rlp) )
|
|
{
|
|
rlp.rlim_cur = MAXCONN;
|
|
if( 0 != setrlimit(RLIMIT_NOFILE, &rlp) )
|
|
{// failed, try setting the maximum too (permission to change system limits is required)
|
|
rlp.rlim_max = MAXCONN;
|
|
if( 0 != setrlimit(RLIMIT_NOFILE, &rlp) )
|
|
{// failed
|
|
const char *errmsg = error_msg();
|
|
int rlim_ori;
|
|
// set to maximum allowed
|
|
getrlimit(RLIMIT_NOFILE, &rlp);
|
|
rlim_ori = (int)rlp.rlim_cur;
|
|
rlp.rlim_cur = rlp.rlim_max;
|
|
setrlimit(RLIMIT_NOFILE, &rlp);
|
|
// report limit
|
|
getrlimit(RLIMIT_NOFILE, &rlp);
|
|
rlim_cur = rlp.rlim_cur;
|
|
ShowWarning("socket_init: failed to set socket limit to %d, setting to maximum allowed (original limit=%d, current limit=%d, maximum allowed=%d, %s).\n", MAXCONN, rlim_ori, (int)rlp.rlim_cur, (int)rlp.rlim_max, errmsg);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
// Get initial local ips
|
|
naddr_ = socket_getips(addr_,16);
|
|
|
|
#ifndef SOCKET_EPOLL
|
|
// Select based Event Dispatcher:
|
|
sFD_ZERO(&readfds);
|
|
ShowInfo( "Server uses '" CL_WHITE "select" CL_RESET "' as event dispatcher\n" );
|
|
#else
|
|
// Epoll based Event Dispatcher
|
|
epfd = epoll_create( MAXCONN ); // 2.6.8 or newer ignores the expected socket amount argument
|
|
|
|
if( epfd == SOCKET_ERROR ){
|
|
ShowError( "Failed to create epoll event dispatcher: %s\n", error_msg() );
|
|
exit( EXIT_FAILURE );
|
|
}
|
|
|
|
memset( &epevent, 0x00, sizeof( struct epoll_event ) );
|
|
epevents = (struct epoll_event *)aCalloc( epoll_maxevents, sizeof( struct epoll_event ) );
|
|
|
|
ShowInfo( "Server uses '" CL_WHITE "epoll" CL_RESET "' with up to " CL_WHITE "%d" CL_RESET " events per cycle as event dispatcher\n", epoll_maxevents );
|
|
#endif
|
|
|
|
#if defined(SEND_SHORTLIST)
|
|
memset(send_shortlist_set, 0, sizeof(send_shortlist_set));
|
|
#endif
|
|
|
|
socket_config_read(SOCKET_CONF_FILENAME);
|
|
|
|
// initialise last send-receive tick
|
|
last_tick = time(NULL);
|
|
|
|
// session[0] is now currently used for disconnected sessions of the map server, and as such,
|
|
// should hold enough buffer (it is a vacuum so to speak) as it is never flushed. [Skotlex]
|
|
create_session(0, null_recv, null_send, null_parse); //FIXME this is causing leak
|
|
|
|
#ifndef MINICORE
|
|
// Delete old connection history every 5 minutes
|
|
memset(connect_history, 0, sizeof(connect_history));
|
|
add_timer_func_list(connect_check_clear, "connect_check_clear");
|
|
add_timer_interval(gettick()+1000, connect_check_clear, 0, 0, 5*60*1000);
|
|
#endif
|
|
|
|
ShowInfo("Server supports up to '" CL_WHITE "%u" CL_RESET "' concurrent connections.\n", rlim_cur);
|
|
}
|
|
|
|
|
|
bool session_isValid(int fd)
|
|
{
|
|
return ( fd > 0 && fd < MAXCONN && session[fd] != NULL );
|
|
}
|
|
|
|
bool session_isActive(int fd)
|
|
{
|
|
return ( session_isValid(fd) && !session[fd]->flag.eof );
|
|
}
|
|
|
|
// Resolves hostname into a numeric ip.
|
|
uint32 host2ip(const char* hostname)
|
|
{
|
|
struct hostent* h = gethostbyname(hostname);
|
|
return (h != NULL) ? ntohl(*(uint32*)h->h_addr) : 0;
|
|
}
|
|
|
|
// Converts a numeric ip into a dot-formatted string.
|
|
// Result is placed either into a user-provided buffer or a static system buffer.
|
|
const char* ip2str(uint32 ip, char ip_str[16])
|
|
{
|
|
struct in_addr addr;
|
|
addr.s_addr = htonl(ip);
|
|
return (ip_str == NULL) ? inet_ntoa(addr) : strncpy(ip_str, inet_ntoa(addr), 16);
|
|
}
|
|
|
|
// Converts a dot-formatted ip string into a numeric ip.
|
|
uint32 str2ip(const char* ip_str)
|
|
{
|
|
return ntohl(inet_addr(ip_str));
|
|
}
|
|
|
|
// Reorders bytes from network to little endian (Windows).
|
|
// Neccessary for sending port numbers to the RO client until Gravity notices that they forgot ntohs() calls.
|
|
uint16 ntows(uint16 netshort)
|
|
{
|
|
return ((netshort & 0xFF) << 8) | ((netshort & 0xFF00) >> 8);
|
|
}
|
|
|
|
#ifdef SEND_SHORTLIST
|
|
// Add a fd to the shortlist so that it'll be recognized as a fd that needs
|
|
// sending or eof handling.
|
|
void send_shortlist_add_fd(int fd)
|
|
{
|
|
int i;
|
|
int bit;
|
|
|
|
if( !session_isValid(fd) )
|
|
return;// out of range
|
|
|
|
i = fd/32;
|
|
bit = fd%32;
|
|
|
|
if( (send_shortlist_set[i]>>bit)&1 )
|
|
return;// already in the list
|
|
|
|
if( send_shortlist_count >= ARRAYLENGTH(send_shortlist_array) )
|
|
{
|
|
ShowDebug("send_shortlist_add_fd: shortlist is full, ignoring... (fd=%d shortlist.count=%" PRIuPTR " shortlist.length=%d)\n", fd, send_shortlist_count, ARRAYLENGTH(send_shortlist_array));
|
|
return;
|
|
}
|
|
|
|
// set the bit
|
|
send_shortlist_set[i] |= 1<<bit;
|
|
// Add to the end of the shortlist array.
|
|
send_shortlist_array[send_shortlist_count++] = fd;
|
|
}
|
|
|
|
// Do pending network sends and eof handling from the shortlist.
|
|
void send_shortlist_do_sends()
|
|
{
|
|
int i;
|
|
|
|
for( i = send_shortlist_count-1; i >= 0; --i )
|
|
{
|
|
int fd = send_shortlist_array[i];
|
|
int idx = fd/32;
|
|
int bit = fd%32;
|
|
|
|
// Remove fd from shortlist, move the last fd to the current position
|
|
--send_shortlist_count;
|
|
send_shortlist_array[i] = send_shortlist_array[send_shortlist_count];
|
|
send_shortlist_array[send_shortlist_count] = 0;
|
|
|
|
if( fd <= 0 || fd >= MAXCONN )
|
|
{
|
|
ShowDebug("send_shortlist_do_sends: fd is out of range, corrupted memory? (fd=%d)\n", fd);
|
|
continue;
|
|
}
|
|
if( ((send_shortlist_set[idx]>>bit)&1) == 0 )
|
|
{
|
|
ShowDebug("send_shortlist_do_sends: fd is not set, why is it in the shortlist? (fd=%d)\n", fd);
|
|
continue;
|
|
}
|
|
send_shortlist_set[idx]&=~(1<<bit);// unset fd
|
|
// If this session still exists, perform send operations on it and
|
|
// check for the eof state.
|
|
if( session[fd] )
|
|
{
|
|
// Send data
|
|
if( session[fd]->wdata_size )
|
|
session[fd]->func_send(fd);
|
|
|
|
// If it's been marked as eof, call the parse func on it so that
|
|
// the socket will be immediately closed.
|
|
if( session[fd]->flag.eof )
|
|
session[fd]->func_parse(fd);
|
|
|
|
// If the session still exists, is not eof and has things left to
|
|
// be sent from it we'll re-add it to the shortlist.
|
|
if( session[fd] && !session[fd]->flag.eof && session[fd]->wdata_size )
|
|
send_shortlist_add_fd(fd);
|
|
}
|
|
}
|
|
}
|
|
#endif
|