// Copyright (c) rAthena Dev Teams - Licensed under GNU GPL // For more information, see LICENCE in the main folder #include "socket.hpp" #include #ifdef WIN32 #include "winapi.hpp" #else #include #include #include #include #include #include #include #include #if defined(__linux__) || defined(__linux) #include #ifdef SOCKET_EPOLL #include #endif #else #include #include #endif #ifndef SIOCGIFCONF #include // SIOCGIFCONF on Solaris, maybe others? [Shinomori] #endif #ifndef FIONBIO #include // FIONBIO on Solaris [FlavioJS] #endif #ifdef HAVE_SETRLIMIT #include #endif #endif #include "cbasetypes.hpp" #include "malloc.hpp" #include "mmo.hpp" #include "showmsg.hpp" #include "strlib.hpp" #include "timer.hpp" // Reuseable global packet buffer to prevent too many allocations // Take socket.cpp::socket_max_client_packet into consideration int8 packet_buffer[UINT16_MAX]; ///////////////////////////////////////////////////////////////////// #if defined(WIN32) ///////////////////////////////////////////////////////////////////// // windows portability layer typedef int32 socklen_t; #define sErrno WSAGetLastError() #define S_ENOTSOCK WSAENOTSOCK #define S_EWOULDBLOCK WSAEWOULDBLOCK #define S_EINTR WSAEINTR #define S_ECONNABORTED WSAECONNABORTED #define SHUT_RD SD_RECEIVE #define SHUT_WR SD_SEND #define SHUT_RDWR SD_BOTH // global array of sockets (emulating linux) // fd is the position in the array static SOCKET sock_arr[MAXCONN]; static int32 sock_arr_len = 0; /// Returns the socket associated with the target fd. /// /// @param fd Target fd. /// @return Socket #define fd2sock(fd) sock_arr[fd] /// Returns the first fd associated with the socket. /// Returns -1 if the socket is not found. /// /// @param s Socket /// @return Fd or -1 int32 sock2fd(SOCKET s) { int32 fd; // search for the socket for( fd = 1; fd < sock_arr_len; ++fd ) if( sock_arr[fd] == s ) break;// found the socket if( fd == sock_arr_len ) return -1;// not found return fd; } /// Inserts the socket into the global array of sockets. /// Returns a new fd associated with the socket. /// If there are too many sockets it closes the socket, sets an error and // returns -1 instead. /// Since fd 0 is reserved, it returns values in the range [1,MAXCONN[. /// /// @param s Socket /// @return New fd or -1 int32 sock2newfd(SOCKET s) { int32 fd; // find an empty position for( fd = 1; fd < sock_arr_len; ++fd ) if( sock_arr[fd] == INVALID_SOCKET ) break;// empty position if( fd == ARRAYLENGTH(sock_arr) ) {// too many sockets closesocket(s); WSASetLastError(WSAEMFILE); return -1; } sock_arr[fd] = s; if( sock_arr_len <= fd ) sock_arr_len = fd+1; return fd; } int32 sAccept(int32 fd, struct sockaddr* addr, int* addrlen) { SOCKET s; // accept connection s = accept(fd2sock(fd), addr, addrlen); if( s == INVALID_SOCKET ) return -1;// error return sock2newfd(s); } int32 sClose(int32 fd) { int32 ret = closesocket(fd2sock(fd)); fd2sock(fd) = INVALID_SOCKET; return ret; } int32 sSocket(int32 af, int32 type, int32 protocol) { SOCKET s; // create socket s = socket(af,type,protocol); if( s == INVALID_SOCKET ) return -1;// error return sock2newfd(s); } char* sErr(int32 code) { static char sbuf[512]; // strerror does not handle socket codes if( FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM|FORMAT_MESSAGE_IGNORE_INSERTS, nullptr, code, MAKELANGID(LANG_ENGLISH, SUBLANG_DEFAULT), (LPTSTR)&sbuf, sizeof(sbuf), nullptr) == 0 ) snprintf(sbuf, sizeof(sbuf), "unknown error"); return sbuf; } #define sBind(fd,name,namelen) bind(fd2sock(fd),name,namelen) #define sConnect(fd,name,namelen) connect(fd2sock(fd),name,namelen) #define sIoctl(fd,cmd,argp) ioctlsocket(fd2sock(fd),cmd,argp) #define sListen(fd,backlog) listen(fd2sock(fd),backlog) #define sRecv(fd,buf,len,flags) recv(fd2sock(fd),buf,len,flags) #define sSelect select #define sSend(fd,buf,len,flags) send(fd2sock(fd),buf,len,flags) #define sSetsockopt(fd,level,optname,optval,optlen) setsockopt(fd2sock(fd),level,optname,optval,optlen) #define sShutdown(fd,how) shutdown(fd2sock(fd),how) #define sFD_SET(fd,set) FD_SET(fd2sock(fd),set) #define sFD_CLR(fd,set) FD_CLR(fd2sock(fd),set) #define sFD_ISSET(fd,set) FD_ISSET(fd2sock(fd),set) #define sFD_ZERO FD_ZERO ///////////////////////////////////////////////////////////////////// #else ///////////////////////////////////////////////////////////////////// // nix portability layer #define SOCKET_ERROR (-1) #define sErrno errno #define S_ENOTSOCK EBADF #define S_EWOULDBLOCK EAGAIN #define S_EINTR EINTR #define S_ECONNABORTED ECONNABORTED #define sAccept accept #define sClose close #define sSocket socket #define sErr strerror #define sBind bind #define sConnect connect #define sIoctl ioctl #define sListen listen #define sRecv recv #define sSelect select #define sSend send #define sSetsockopt setsockopt #define sShutdown shutdown #define sFD_SET FD_SET #define sFD_CLR FD_CLR #define sFD_ISSET FD_ISSET #define sFD_ZERO FD_ZERO ///////////////////////////////////////////////////////////////////// #endif ///////////////////////////////////////////////////////////////////// #ifndef MSG_NOSIGNAL #define MSG_NOSIGNAL 0 #endif #ifndef SOCKET_EPOLL // Select based Event Dispatcher fd_set readfds; #else // Epoll based Event Dispatcher static int32 epoll_maxevents = (MAXCONN / 2); static int32 epfd = SOCKET_ERROR; static struct epoll_event epevent; static struct epoll_event *epevents = nullptr; #endif int32 fd_max; time_t last_tick; time_t stall_time = 60; uint32 addr_[16]; // ip addresses of local host (host byte order) int32 naddr_ = 0; // # of ip addresses // Maximum packet size in bytes, which the client is able to handle. // Larger packets cause a buffer overflow and stack corruption. #if PACKETVER < 20131223 static size_t socket_max_client_packet = 0x6000; #else static size_t socket_max_client_packet = USHRT_MAX; #endif #ifdef SHOW_SERVER_STATS // Data I/O statistics static size_t socket_data_i = 0, socket_data_ci = 0, socket_data_qi = 0; static size_t socket_data_o = 0, socket_data_co = 0, socket_data_qo = 0; static time_t socket_data_last_tick = 0; #endif // initial recv buffer size (this will also be the max. size) // biggest known packet: S 0153 .w .?B -> 24x24 256 color .bmp (0153 + len.w + 1618/1654/1756 bytes) #define RFIFO_SIZE (2*1024) // initial send buffer size (will be resized as needed) #define WFIFO_SIZE (16*1024) // Maximum size of pending data in the write fifo. (for non-server connections) // The connection is closed if it goes over the limit. #define WFIFO_MAX (1*1024*1024) struct socket_data* session[MAXCONN]; #ifdef SEND_SHORTLIST int32 send_shortlist_array[MAXCONN];// we only support MAXCONN sockets, limit the array to that size_t send_shortlist_count = 0;// how many fd's are in the shortlist uint32 send_shortlist_set[(MAXCONN+31)/32];// to know if specific fd's are already in the shortlist #endif static int32 create_session(int32 fd, RecvFunc func_recv, SendFunc func_send, ParseFunc func_parse); #ifndef MINICORE int32 ip_rules = 1; static int32 connect_check(uint32 ip); #endif const char* error_msg(void) { static char buf[512]; int32 code = sErrno; snprintf(buf, sizeof(buf), "error %d: %s", code, sErr(code)); return buf; } /*====================================== * CORE : Default processing functions *--------------------------------------*/ int32 null_recv(int32 fd) { return 0; } int32 null_send(int32 fd) { return 0; } int32 null_parse(int32 fd) { return 0; } ParseFunc default_func_parse = null_parse; void set_defaultparse(ParseFunc defaultparse) { default_func_parse = defaultparse; } /*====================================== * CORE : Socket options *--------------------------------------*/ void set_nonblocking(int32 fd, unsigned long yes) { // FIONBIO Use with a nonzero argp parameter to enable the nonblocking mode of socket s. // The argp parameter is zero if nonblocking is to be disabled. if( sIoctl(fd, FIONBIO, &yes) != 0 ) ShowError("set_nonblocking: Failed to set socket #%d to non-blocking mode (%s) - Please report this!!!\n", fd, error_msg()); } void setsocketopts(int32 fd,int32 delay_timeout){ int32 yes = 1; // reuse fix #if !defined(WIN32) // set SO_REAUSEADDR to true, unix only. on windows this option causes // the previous owner of the socket to give up, which is not desirable // in most cases, neither compatible with unix. sSetsockopt(fd,SOL_SOCKET,SO_REUSEADDR,(char *)&yes,sizeof(yes)); #ifdef SO_REUSEPORT sSetsockopt(fd,SOL_SOCKET,SO_REUSEPORT,(char *)&yes,sizeof(yes)); #endif #endif // Set the socket into no-delay mode; otherwise packets get delayed for up to 200ms, likely creating server-side lag. // The RO protocol is mainly single-packet request/response, plus the FIFO model already does packet grouping anyway. sSetsockopt(fd, IPPROTO_TCP, TCP_NODELAY, (char *)&yes, sizeof(yes)); // force the socket into no-wait, graceful-close mode (should be the default, but better make sure) //(https://msdn.microsoft.com/en-us/library/windows/desktop/ms737582%28v=vs.85%29.aspx) { struct linger opt; opt.l_onoff = 0; // SO_DONTLINGER opt.l_linger = 0; // Do not care if( sSetsockopt(fd, SOL_SOCKET, SO_LINGER, (char*)&opt, sizeof(opt)) ) ShowWarning("setsocketopts: Unable to set SO_LINGER mode for connection #%d!\n", fd); } if(delay_timeout){ #if defined(WIN32) int32 timeout = delay_timeout * 1000; #else struct timeval timeout; timeout.tv_sec = delay_timeout; timeout.tv_usec = 0; #endif if (sSetsockopt (fd, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout,sizeof(timeout)) < 0) ShowError("setsocketopts: Unable to set SO_RCVTIMEO timeout for connection #%d!\n", fd); if (sSetsockopt (fd, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout,sizeof(timeout)) < 0) ShowError("setsocketopts: Unable to set SO_SNDTIMEO timeout for connection #%d!\n", fd); } } /*====================================== * CORE : Socket Sub Function *--------------------------------------*/ void set_eof(int32 fd) { if( session_isActive(fd) ) { #ifdef SEND_SHORTLIST // Add this socket to the shortlist for eof handling. send_shortlist_add_fd(fd); #endif session[fd]->flag.eof = 1; } } int32 recv_to_fifo(int32 fd) { int32 len; if( !session_isActive(fd) ) return -1; len = sRecv(fd, (char *) session[fd]->rdata + session[fd]->rdata_size, (int32)RFIFOSPACE(fd), 0); if( len == SOCKET_ERROR ) {//An exception has occured if( sErrno != S_EWOULDBLOCK ) { //ShowDebug("recv_to_fifo: %s, closing connection #%d\n", error_msg(), fd); set_eof(fd); } return 0; } if( len == 0 ) {//Normal connection end. set_eof(fd); return 0; } session[fd]->rdata_size += len; session[fd]->rdata_tick = last_tick; #ifdef SHOW_SERVER_STATS socket_data_i += len; socket_data_qi += len; if (!session[fd]->flag.server) { socket_data_ci += len; } #endif return 0; } int32 send_from_fifo(int32 fd) { int32 len; if( !session_isValid(fd) ) return -1; if( session[fd]->wdata_size == 0 ) return 0; // nothing to send len = sSend(fd, (const char *) session[fd]->wdata, (int32)session[fd]->wdata_size, MSG_NOSIGNAL); if( len == SOCKET_ERROR ) {//An exception has occured if( sErrno != S_EWOULDBLOCK ) { //ShowDebug("send_from_fifo: %s, ending connection #%d\n", error_msg(), fd); #ifdef SHOW_SERVER_STATS socket_data_qo -= session[fd]->wdata_size; #endif session[fd]->wdata_size = 0; //Clear the send queue as we can't send anymore. [Skotlex] set_eof(fd); } return 0; } if( len > 0 ) { session[fd]->wdata_tick = last_tick; // some data could not be transferred? // shift unsent data to the beginning of the queue if( (size_t)len < session[fd]->wdata_size ) memmove(session[fd]->wdata, session[fd]->wdata + len, session[fd]->wdata_size - len); session[fd]->wdata_size -= len; #ifdef SHOW_SERVER_STATS socket_data_o += len; socket_data_qo -= len; if (!session[fd]->flag.server) { socket_data_co += len; } #endif } return 0; } /// Best effort - there's no warranty that the data will be sent. void flush_fifo(int32 fd) { if(session[fd] != nullptr) session[fd]->func_send(fd); } void flush_fifos(void) { int32 i; for(i = 1; i < fd_max; i++) flush_fifo(i); } /*====================================== * CORE : Connection functions *--------------------------------------*/ int32 connect_client(int32 listen_fd) { int32 fd; struct sockaddr_in client_address; socklen_t len; len = sizeof(client_address); fd = sAccept(listen_fd, (struct sockaddr*)&client_address, &len); if ( fd == -1 ) { ShowError("connect_client: accept failed (%s)!\n", error_msg()); return -1; } if( fd == 0 ) {// reserved ShowError("connect_client: Socket #0 is reserved - Please report this!!!\n"); sClose(fd); return -1; } if( fd >= MAXCONN ) {// socket number too big ShowError("connect_client: New socket #%d is greater than can we handle! Increase the value of MAXCONN (currently %d) for your OS to fix this!\n", fd, MAXCONN); sClose(fd); return -1; } setsocketopts(fd,0); set_nonblocking(fd, 1); #ifndef MINICORE if( ip_rules && !connect_check(ntohl(client_address.sin_addr.s_addr)) ) { do_close(fd); return -1; } #endif #ifndef SOCKET_EPOLL // Select Based Event Dispatcher sFD_SET(fd,&readfds); #else // Epoll based Event Dispatcher epevent.data.fd = fd; epevent.events = EPOLLIN; if( epoll_ctl( epfd, EPOLL_CTL_ADD, fd, &epevent ) == SOCKET_ERROR ){ ShowError( "connect_client: Failed to add to epoll event dispatcher for new socket #%d: %s\n", fd, error_msg() ); sClose( fd ); return -1; } #endif if( fd_max <= fd ) fd_max = fd + 1; create_session(fd, recv_to_fifo, send_from_fifo, default_func_parse); session[fd]->client_addr = ntohl(client_address.sin_addr.s_addr); return fd; } int32 make_listen_bind(uint32 ip, uint16 port) { struct sockaddr_in server_address; int32 fd; int32 result; fd = sSocket(AF_INET, SOCK_STREAM, 0); if( fd == -1 ) { ShowError("make_listen_bind: socket creation failed (%s)!\n", error_msg()); exit(EXIT_FAILURE); } if( fd == 0 ) {// reserved ShowError("make_listen_bind: Socket #0 is reserved - Please report this!!!\n"); sClose(fd); return -1; } if( fd >= MAXCONN ) {// socket number too big ShowError("make_listen_bind: New socket #%d is greater than can we handle! Increase the value of MAXCONN (currently %d) for your OS to fix this!\n", fd, MAXCONN); sClose(fd); return -1; } setsocketopts(fd,0); set_nonblocking(fd, 1); server_address.sin_family = AF_INET; server_address.sin_addr.s_addr = htonl(ip); server_address.sin_port = htons(port); result = sBind(fd, (struct sockaddr*)&server_address, sizeof(server_address)); if( result == SOCKET_ERROR ) { ShowError("make_listen_bind: bind failed (socket #%d, %s)!\n", fd, error_msg()); exit(EXIT_FAILURE); } result = sListen(fd,5); if( result == SOCKET_ERROR ) { ShowError("make_listen_bind: listen failed (socket #%d, %s)!\n", fd, error_msg()); exit(EXIT_FAILURE); } #ifndef SOCKET_EPOLL // Select Based Event Dispatcher sFD_SET(fd, &readfds); #else // Epoll based Event Dispatcher epevent.data.fd = fd; epevent.events = EPOLLIN; if( epoll_ctl( epfd, EPOLL_CTL_ADD, fd, &epevent ) == SOCKET_ERROR ){ ShowError( "make_listen_bind: failed to add listener socket #%d to epoll event dispatcher: %s\n", fd, error_msg() ); sClose(fd); exit(EXIT_FAILURE); } #endif if(fd_max <= fd) fd_max = fd + 1; create_session(fd, connect_client, null_send, null_parse); session[fd]->client_addr = 0; // just listens session[fd]->rdata_tick = 0; // disable timeouts on this socket session[fd]->wdata_tick = 0; return fd; } int32 make_connection(uint32 ip, uint16 port, bool silent,int32 timeout) { struct sockaddr_in remote_address; int32 fd; int32 result; fd = sSocket(AF_INET, SOCK_STREAM, 0); if (fd == -1) { ShowError("make_connection: socket creation failed (%s)!\n", error_msg()); return -1; } if( fd == 0 ) {// reserved ShowError("make_connection: Socket #0 is reserved - Please report this!!!\n"); sClose(fd); return -1; } if( fd >= MAXCONN ) {// socket number too big ShowError("make_connection: New socket #%d is greater than can we handle! Increase the value of MAXCONN (currently %d) for your OS to fix this!\n", fd, MAXCONN); sClose(fd); return -1; } setsocketopts(fd,timeout); remote_address.sin_family = AF_INET; remote_address.sin_addr.s_addr = htonl(ip); remote_address.sin_port = htons(port); if( !silent ) ShowStatus("Connecting to %d.%d.%d.%d:%i\n", CONVIP(ip), port); #ifdef WIN32 // On Windows we have to set the socket non-blocking before the connection to make timeout work. [Lemongrass] set_nonblocking(fd, 1); result = sConnect(fd, (struct sockaddr *)(&remote_address), sizeof(struct sockaddr_in)); // Only enter if a socket error occurred // Create a pseudo scope to be able to break out in case of successful connection while( result == SOCKET_ERROR ) { // Specially handle the error number for connection attempts that would block, because we want to use a timeout if( sErrno == S_EWOULDBLOCK ){ fd_set writeSet; struct timeval tv; sFD_ZERO(&writeSet); sFD_SET(fd,&writeSet); tv.tv_sec = timeout; tv.tv_usec = 0; result = sSelect(0, nullptr, &writeSet, nullptr, &tv); // Connection attempt timed out if( result == 0 ){ if( !silent ){ // Needs special handling, because it does not set an error code and therefore does not provide an error message from the API ShowError("make_connection: connection failed (socket #%d, timeout after %ds)!\n", fd, timeout); } do_close(fd); return -1; // If the select operation did not return an error }else if( result != SOCKET_ERROR ){ // Check if it is really writeable if( sFD_ISSET(fd, &writeSet) != 0 ){ // Our socket is writeable now => we have connected successfully break; // leave the pseudo scope } if( !silent ){ // Needs special handling, because it does not set an error code and therefore does not provide an error message from the API ShowError("make_connection: connection failed (socket #%d, not writeable)!\n", fd); } do_close(fd); return -1; } // The select operation failed } if( !silent ) ShowError("make_connection: connect failed (socket #%d, %s)!\n", fd, error_msg()); do_close(fd); return -1; } // Keep the socket in non-blocking mode, since we would set it to non-blocking here on unix. [Lemongrass] #else result = sConnect(fd, (struct sockaddr *)(&remote_address), sizeof(struct sockaddr_in)); if( result == SOCKET_ERROR ) { if( !silent ) ShowError("make_connection: connect failed (socket #%d, %s)!\n", fd, error_msg()); do_close(fd); return -1; } //Now the socket can be made non-blocking. [Skotlex] set_nonblocking(fd, 1); #endif #ifndef SOCKET_EPOLL // Select Based Event Dispatcher sFD_SET(fd,&readfds); #else // Epoll based Event Dispatcher epevent.data.fd = fd; epevent.events = EPOLLIN; if( epoll_ctl( epfd, EPOLL_CTL_ADD, fd, &epevent ) == SOCKET_ERROR ){ ShowError( "make_connection: failed to add socket #%d to epoll event dispatcher: %s\n", fd, error_msg() ); sClose(fd); return -1; } #endif if (fd_max <= fd) fd_max = fd + 1; create_session(fd, recv_to_fifo, send_from_fifo, default_func_parse); session[fd]->client_addr = ntohl(remote_address.sin_addr.s_addr); return fd; } static int32 create_session(int32 fd, RecvFunc func_recv, SendFunc func_send, ParseFunc func_parse) { CREATE(session[fd], struct socket_data, 1); CREATE(session[fd]->rdata, unsigned char, RFIFO_SIZE); CREATE(session[fd]->wdata, unsigned char, WFIFO_SIZE); session[fd]->max_rdata = RFIFO_SIZE; session[fd]->max_wdata = WFIFO_SIZE; session[fd]->func_recv = func_recv; session[fd]->func_send = func_send; session[fd]->func_parse = func_parse; session[fd]->rdata_tick = last_tick; session[fd]->wdata_tick = last_tick; return 0; } static void delete_session(int32 fd) { if( session_isValid(fd) ) { #ifdef SHOW_SERVER_STATS socket_data_qi -= session[fd]->rdata_size - session[fd]->rdata_pos; socket_data_qo -= session[fd]->wdata_size; #endif aFree(session[fd]->rdata); aFree(session[fd]->wdata); aFree(session[fd]->session_data); aFree(session[fd]); session[fd] = nullptr; } } int32 _realloc_fifo( int32 fd, uint32 rfifo_size, uint32 wfifo_size, const char* file, int32 line, const char* func ){ if( !session_isValid(fd) ) return 0; if( session[fd]->max_rdata != rfifo_size && session[fd]->rdata_size < rfifo_size) { RECREATE2( session[fd]->rdata, unsigned char, rfifo_size, file, line, func ); session[fd]->max_rdata = rfifo_size; } if( session[fd]->max_wdata != wfifo_size && session[fd]->wdata_size < wfifo_size) { RECREATE2( session[fd]->wdata, unsigned char, wfifo_size, file, line, func ); session[fd]->max_wdata = wfifo_size; } return 0; } int32 _realloc_writefifo( int32 fd, size_t addition, const char* file, int32 line, const char* func ){ size_t newsize; if( !session_isValid(fd) ) // might not happen return 0; if( session[fd]->wdata_size + addition > session[fd]->max_wdata ) { // grow rule; grow in multiples of WFIFO_SIZE newsize = WFIFO_SIZE; while( session[fd]->wdata_size + addition > newsize ) newsize += WFIFO_SIZE; } else if( session[fd]->max_wdata >= (size_t)2*(session[fd]->flag.server?FIFOSIZE_SERVERLINK:WFIFO_SIZE) && (session[fd]->wdata_size+addition)*4 < session[fd]->max_wdata ) { // shrink rule, shrink by 2 when only a quarter of the fifo is used, don't shrink below nominal size. newsize = session[fd]->max_wdata / 2; } else // no change return 0; RECREATE2( session[fd]->wdata, unsigned char, newsize, file, line, func ); session[fd]->max_wdata = newsize; return 0; } /// advance the RFIFO cursor (marking 'len' bytes as processed) int32 RFIFOSKIP(int32 fd, size_t len) { struct socket_data *s; if ( !session_isActive(fd) ) return 0; s = session[fd]; if ( s->rdata_size < s->rdata_pos + len ) { ShowError("RFIFOSKIP: skipped past end of read buffer! Adjusting from %" PRIuPTR " to %d (session #%d)\n", len, RFIFOREST(fd), fd); len = RFIFOREST(fd); } s->rdata_pos = s->rdata_pos + len; #ifdef SHOW_SERVER_STATS socket_data_qi -= len; #endif return 0; } /// advance the WFIFO cursor (marking 'len' bytes for sending) int32 WFIFOSET(int32 fd, size_t len) { size_t newreserve; struct socket_data* s = session[fd]; if( !session_isValid(fd) || s->wdata == nullptr ) return 0; // we have written len bytes to the buffer already before calling WFIFOSET if(s->wdata_size+len > s->max_wdata) { // actually there was a buffer overflow already uint32 ip = s->client_addr; ShowFatalError("WFIFOSET: Write Buffer Overflow. Connection %d (%d.%d.%d.%d) has written %u bytes on a %u/%u bytes buffer.\n", fd, CONVIP(ip), (uint32)len, (uint32)s->wdata_size, (uint32)s->max_wdata); ShowDebug("Likely command that caused it: 0x%x\n", (*(uint16*)(s->wdata + s->wdata_size))); // no other chance, make a better fifo model exit(EXIT_FAILURE); } if( len > 0xFFFF ) { // dynamic packets allow up to UINT16_MAX bytes (.W .W ...) // all known fixed-size packets are within this limit, so use the same limit ShowFatalError("WFIFOSET: Packet 0x%x is too big. (len=%u, max=%u)\n", (*(uint16*)(s->wdata + s->wdata_size)), (uint32)len, 0xFFFF); exit(EXIT_FAILURE); } else if( len == 0 ) { // abuses the fact, that the code that did WFIFOHEAD(fd,0), already wrote // the packet type into memory, even if it could have overwritten vital data // this can happen when a new packet was added on map-server, but packet len table was not updated ShowWarning("WFIFOSET: Attempted to send zero-length packet, most likely 0x%04x (please report this).\n", WFIFOW(fd,0)); return 0; } if( !s->flag.server ) { if( len > socket_max_client_packet ) {// see declaration of socket_max_client_packet for details ShowError("WFIFOSET: Dropped too large client packet 0x%04x (length=%" PRIuPTR ", max=%" PRIuPTR ").\n", WFIFOW(fd,0), len, socket_max_client_packet); return 0; } if( s->wdata_size+len > WFIFO_MAX ) {// reached maximum write fifo size ShowError("WFIFOSET: Maximum write buffer size for client connection %d exceeded, most likely caused by packet 0x%04x (len=%" PRIuPTR ", ip=%lu.%lu.%lu.%lu).\n", fd, WFIFOW(fd,0), len, CONVIP(s->client_addr)); set_eof(fd); return 0; } } s->wdata_size += len; #ifdef SHOW_SERVER_STATS socket_data_qo += len; #endif //If the interserver has 200% of its normal size full, flush the data. if( s->flag.server && s->wdata_size >= 2*FIFOSIZE_SERVERLINK ) flush_fifo(fd); // always keep a WFIFO_SIZE reserve in the buffer // For inter-server connections, let the reserve be 1/4th of the link size. newreserve = s->flag.server ? FIFOSIZE_SERVERLINK / 4 : WFIFO_SIZE; // readjust the buffer to include the chosen reserve realloc_writefifo(fd, newreserve); #ifdef SEND_SHORTLIST send_shortlist_add_fd(fd); #endif return 0; } int32 do_sockets(t_tick next) { #ifndef SOCKET_EPOLL fd_set rfd; struct timeval timeout; #endif int32 ret,i; // PRESEND Timers are executed before do_sendrecv and can send packets and/or set sessions to eof. // Send remaining data and process client-side disconnects here. #ifdef SEND_SHORTLIST send_shortlist_do_sends(); #else for (i = 1; i < fd_max; i++) { if(!session[i]) continue; if(session[i]->wdata_size) session[i]->func_send(i); } #endif #ifndef SOCKET_EPOLL // Select based Event Dispatcher // can timeout until the next tick timeout.tv_sec = (long)(next/1000); timeout.tv_usec = (long)(next%1000*1000); memcpy(&rfd, &readfds, sizeof(rfd)); ret = sSelect(fd_max, &rfd, nullptr, nullptr, &timeout); if( ret == SOCKET_ERROR ) { if( sErrno != S_EINTR ) { ShowFatalError("do_sockets: select() failed, %s!\n", error_msg()); exit(EXIT_FAILURE); } return 0; // interrupted by a signal, just loop and try again } #else // Epoll based Event Dispatcher ret = epoll_wait( epfd, epevents, epoll_maxevents, next ); if( ret == SOCKET_ERROR ){ if( sErrno != S_EINTR ){ ShowFatalError( "do_sockets: epoll_wait() failed, %s!\n", error_msg() ); exit( EXIT_FAILURE ); } return 0; // interrupted by a signal, just loop and try again } #endif last_tick = time(nullptr); #if defined(WIN32) // on windows, enumerating all members of the fd_set is way faster if we access the internals for( i = 0; i < (int32)rfd.fd_count; ++i ) { int32 fd = sock2fd(rfd.fd_array[i]); if( session[fd] ) session[fd]->func_recv(fd); } #elif defined(SOCKET_EPOLL) // epoll based selection for( i = 0; i < ret; i++ ){ struct epoll_event *it = &epevents[i]; int32 fd = it->data.fd; struct socket_data *sock = session[fd]; if( !sock ){ continue; } if( ( it->events & (EPOLLERR|EPOLLHUP) ) || !( it->events & EPOLLIN ) ){ // Got Error on this connection set_eof( fd ); }else if( it->events & EPOLLIN ){ // data waiting sock->func_recv( fd ); } } #else // otherwise assume that the fd_set is a bit-array and enumerate it in a standard way for( i = 1; ret && i < fd_max; ++i ) { if(sFD_ISSET(i,&rfd) && session[i]) { session[i]->func_recv(i); --ret; } } #endif // POSTSEND Send remaining data and handle eof sessions. #ifdef SEND_SHORTLIST send_shortlist_do_sends(); #else for (i = 1; i < fd_max; i++) { if(!session[i]) continue; if(session[i]->wdata_size) session[i]->func_send(i); if(session[i]->flag.eof) //func_send can't free a session, this is safe. { //Finally, even if there is no data to parse, connections signalled eof should be closed, so we call parse_func [Skotlex] session[i]->func_parse(i); //This should close the session immediately. } } #endif // parse input data on each socket for(i = 1; i < fd_max; i++) { if(!session[i]) continue; if (session[i]->rdata_tick && DIFF_TICK(last_tick, session[i]->rdata_tick) > stall_time) { if( session[i]->flag.server ) {/* server is special */ if( session[i]->flag.ping != 2 )/* only update if necessary otherwise it'd resend the ping unnecessarily */ session[i]->flag.ping = 1; } else { ShowInfo("Session #%d timed out\n", i); set_eof(i); } } session[i]->func_parse(i); if(!session[i]) continue; // after parse, check client's RFIFO size to know if there is an invalid packet (too big and not parsed) if (session[i]->rdata_size == RFIFO_SIZE && session[i]->max_rdata == RFIFO_SIZE) { set_eof(i); continue; } RFIFOFLUSH(i); } #ifdef SHOW_SERVER_STATS if (last_tick != socket_data_last_tick) { char buf[1024]; sprintf(buf, "In: %.03f kB/s (%.03f kB/s, Q: %.03f kB) | Out: %.03f kB/s (%.03f kB/s, Q: %.03f kB) | RAM: %.03f MB", socket_data_i/1024., socket_data_ci/1024., socket_data_qi/1024., socket_data_o/1024., socket_data_co/1024., socket_data_qo/1024., malloc_usage()/1024.); #ifdef _WIN32 SetConsoleTitle(buf); #else ShowMessage("\033[s\033[1;1H\033[2K%s\033[u", buf); #endif socket_data_last_tick = last_tick; socket_data_i = socket_data_ci = 0; socket_data_o = socket_data_co = 0; } #endif return 0; } ////////////////////////////// #ifndef MINICORE ////////////////////////////// // IP rules and DDoS protection typedef struct _connect_history { struct _connect_history* next; uint32 ip; t_tick tick; int32 count; unsigned ddos : 1; } ConnectHistory; typedef struct _access_control { uint32 ip; uint32 mask; } AccessControl; enum _aco { ACO_DENY_ALLOW, ACO_ALLOW_DENY, ACO_MUTUAL_FAILURE }; static AccessControl* access_allow = nullptr; static AccessControl* access_deny = nullptr; static int32 access_order = ACO_DENY_ALLOW; static int32 access_allownum = 0; static int32 access_denynum = 0; static int32 access_debug = 0; static int32 ddos_count = 10; static int32 ddos_interval = 3*1000; static int32 ddos_autoreset = 10*60*1000; /// Connection history, an array of linked lists. /// The array's index for any ip is ip&0xFFFF static ConnectHistory* connect_history[0x10000]; static int32 connect_check_(uint32 ip); /// Verifies if the IP can connect. (with debug info) /// @see connect_check_() static int32 connect_check(uint32 ip) { int32 result = connect_check_(ip); if( access_debug ) { ShowInfo("connect_check: Connection from %d.%d.%d.%d %s\n", CONVIP(ip),result ? "allowed." : "denied!"); } return result; } /// Verifies if the IP can connect. /// 0 : Connection Rejected /// 1 or 2 : Connection Accepted static int32 connect_check_(uint32 ip) { ConnectHistory* hist = connect_history[ip&0xFFFF]; int32 i; int32 is_allowip = 0; int32 is_denyip = 0; int32 connect_ok = 0; // Search the allow list for( i=0; i < access_allownum; ++i ){ if( (ip & access_allow[i].mask) == (access_allow[i].ip & access_allow[i].mask) ){ if( access_debug ){ ShowInfo("connect_check: Found match from allow list:%d.%d.%d.%d IP:%d.%d.%d.%d Mask:%d.%d.%d.%d\n", CONVIP(ip), CONVIP(access_allow[i].ip), CONVIP(access_allow[i].mask)); } is_allowip = 1; break; } } // Search the deny list for( i=0; i < access_denynum; ++i ){ if( (ip & access_deny[i].mask) == (access_deny[i].ip & access_deny[i].mask) ){ if( access_debug ){ ShowInfo("connect_check: Found match from deny list:%d.%d.%d.%d IP:%d.%d.%d.%d Mask:%d.%d.%d.%d\n", CONVIP(ip), CONVIP(access_deny[i].ip), CONVIP(access_deny[i].mask)); } is_denyip = 1; break; } } // Decide connection status // 0 : Reject // 1 : Accept // 2 : Unconditional Accept (accepts even if flagged as DDoS) switch(access_order) { case ACO_DENY_ALLOW: default: if( is_denyip ) connect_ok = 0; // Reject else if( is_allowip ) connect_ok = 2; // Unconditional Accept else connect_ok = 1; // Accept break; case ACO_ALLOW_DENY: if( is_allowip ) connect_ok = 2; // Unconditional Accept else if( is_denyip ) connect_ok = 0; // Reject else connect_ok = 1; // Accept break; case ACO_MUTUAL_FAILURE: if( is_allowip && !is_denyip ) connect_ok = 2; // Unconditional Accept else connect_ok = 0; // Reject break; } // Inspect connection history while( hist ) { if( ip == hist->ip ) {// IP found if( hist->ddos ) {// flagged as DDoS return (connect_ok == 2 ? 1 : 0); } else if( DIFF_TICK(gettick(),hist->tick) < ddos_interval ) {// connection within ddos_interval hist->tick = gettick(); if( hist->count++ >= ddos_count ) {// DDoS attack detected hist->ddos = 1; ShowWarning("connect_check: DDoS Attack detected from %d.%d.%d.%d!\n", CONVIP(ip)); return (connect_ok == 2 ? 1 : 0); } return connect_ok; } else {// not within ddos_interval, clear data hist->tick = gettick(); hist->count = 0; return connect_ok; } } hist = hist->next; } // IP not found, add to history CREATE(hist, ConnectHistory, 1); memset(hist, 0, sizeof(ConnectHistory)); hist->ip = ip; hist->tick = gettick(); hist->next = connect_history[ip&0xFFFF]; connect_history[ip&0xFFFF] = hist; return connect_ok; } /// Timer function. /// Deletes old connection history records. static TIMER_FUNC(connect_check_clear){ int32 i; int32 clear = 0; int32 list = 0; ConnectHistory root; ConnectHistory* prev_hist; ConnectHistory* hist; for( i=0; i < 0x10000 ; ++i ){ prev_hist = &root; root.next = hist = connect_history[i]; while( hist ){ if( (!hist->ddos && DIFF_TICK(tick,hist->tick) > ddos_interval*3) || (hist->ddos && DIFF_TICK(tick,hist->tick) > ddos_autoreset) ) {// Remove connection history prev_hist->next = hist->next; aFree(hist); hist = prev_hist->next; clear++; } else { prev_hist = hist; hist = hist->next; } list++; } connect_history[i] = root.next; } if( access_debug ){ ShowInfo("connect_check_clear: Cleared %d of %d from IP list.\n", clear, list); } return list; } /// Parses the ip address and mask and puts it into acc. /// Returns 1 is successful, 0 otherwise. int32 access_ipmask(const char* str, AccessControl* acc) { uint32 ip; uint32 mask; if( strcmp(str,"all") == 0 ) { ip = 0; mask = 0; } else { uint32 a[4]; uint32 m[4]; int32 n; if( ((n=sscanf(str,"%3u.%3u.%3u.%3u/%3u.%3u.%3u.%3u",a,a+1,a+2,a+3,m,m+1,m+2,m+3)) != 8 && // not an ip + standard mask (n=sscanf(str,"%3u.%3u.%3u.%3u/%3u",a,a+1,a+2,a+3,m)) != 5 && // not an ip + bit mask (n=sscanf(str,"%3u.%3u.%3u.%3u",a,a+1,a+2,a+3)) != 4 ) || // not an ip a[0] > 255 || a[1] > 255 || a[2] > 255 || a[3] > 255 || // invalid ip (n == 8 && (m[0] > 255 || m[1] > 255 || m[2] > 255 || m[3] > 255)) || // invalid standard mask (n == 5 && m[0] > 32) ){ // invalid bit mask return 0; } ip = MAKEIP(a[0],a[1],a[2],a[3]); if( n == 8 ) {// standard mask mask = MAKEIP(m[0],m[1],m[2],m[3]); } else if( n == 5 ) {// bit mask mask = 0; while( m[0] ){ mask = (mask >> 1) | 0x80000000; --m[0]; } } else {// just this ip mask = 0xFFFFFFFF; } } if( access_debug ){ ShowInfo("access_ipmask: Loaded IP:%d.%d.%d.%d mask:%d.%d.%d.%d\n", CONVIP(ip), CONVIP(mask)); } acc->ip = ip; acc->mask = mask; return 1; } ////////////////////////////// #endif ////////////////////////////// int32 socket_config_read(const char* cfgName) { char line[1024],w1[1024],w2[1024]; FILE *fp; fp = fopen(cfgName, "r"); if(fp == nullptr) { ShowError("File not found: %s\n", cfgName); return 1; } while(fgets(line, sizeof(line), fp)) { if(line[0] == '/' && line[1] == '/') continue; if(sscanf(line, "%1023[^:]: %1023[^\r\n]", w1, w2) != 2) continue; if (!strcmpi(w1, "stall_time")) { stall_time = atoi(w2); if( stall_time < 3 ) stall_time = 3;/* a minimum is required to refrain it from killing itself */ } #ifndef MINICORE else if (!strcmpi(w1, "enable_ip_rules")) { ip_rules = config_switch(w2); } else if (!strcmpi(w1, "order")) { if (!strcmpi(w2, "deny,allow")) access_order = ACO_DENY_ALLOW; else if (!strcmpi(w2, "allow,deny")) access_order = ACO_ALLOW_DENY; else if (!strcmpi(w2, "mutual-failure")) access_order = ACO_MUTUAL_FAILURE; } else if (!strcmpi(w1, "allow")) { RECREATE(access_allow, AccessControl, access_allownum+1); if (access_ipmask(w2, &access_allow[access_allownum])) ++access_allownum; else ShowError("socket_config_read: Invalid ip or ip range '%s'!\n", line); } else if (!strcmpi(w1, "deny")) { RECREATE(access_deny, AccessControl, access_denynum+1); if (access_ipmask(w2, &access_deny[access_denynum])) ++access_denynum; else ShowError("socket_config_read: Invalid ip or ip range '%s'!\n", line); } else if (!strcmpi(w1,"ddos_interval")) ddos_interval = atoi(w2); else if (!strcmpi(w1,"ddos_count")) ddos_count = atoi(w2); else if (!strcmpi(w1,"ddos_autoreset")) ddos_autoreset = atoi(w2); else if (!strcmpi(w1,"debug")) access_debug = config_switch(w2); #ifdef SOCKET_EPOLL else if( !strcmpi( w1, "epoll_maxevents" ) ){ epoll_maxevents = atoi(w2); // minimum that seems to be useful if( epoll_maxevents < 16 ){ ShowWarning( "socket_config_read: epoll_maxevents is set too low. Defaulting to 16...\n" ); epoll_maxevents = 16; } } #endif #endif else if (!strcmpi(w1, "import")) socket_config_read(w2); else ShowWarning("Unknown setting '%s' in file %s\n", w1, cfgName); } fclose(fp); return 0; } void socket_final(void) { int32 i; #ifndef MINICORE ConnectHistory* hist; ConnectHistory* next_hist; for( i=0; i < 0x10000; ++i ){ hist = connect_history[i]; while( hist ){ next_hist = hist->next; aFree(hist); hist = next_hist; } } if( access_allow ) aFree(access_allow); if( access_deny ) aFree(access_deny); #endif for( i = 1; i < fd_max; i++ ) if(session[i]) do_close(i); // session[0] aFree(session[0]->rdata); aFree(session[0]->wdata); aFree(session[0]->session_data); aFree(session[0]); session[0] = nullptr; #ifdef WIN32 // Shut down windows networking if( WSACleanup() != 0 ){ ShowError("socket_final: WinSock could not be cleaned up! %s\n", error_msg() ); } #elif defined(SOCKET_EPOLL) if( epfd != SOCKET_ERROR ){ sClose(epfd); epfd = SOCKET_ERROR; } if( epevents != nullptr ){ aFree( epevents ); epevents = nullptr; } #endif } /// Closes a socket. void do_close(int32 fd) { if( fd <= 0 ||fd >= MAXCONN ) return;// invalid flush_fifo(fd); // Try to send what's left (although it might not succeed since it's a nonblocking socket) #ifndef SOCKET_EPOLL // Select based Event Dispatcher sFD_CLR(fd, &readfds);// this needs to be done before closing the socket #else // Epoll based Event Dispatcher epevent.data.fd = fd; epevent.events = EPOLLIN; epoll_ctl( epfd, EPOLL_CTL_DEL, fd, &epevent ); // removing the socket from epoll when it's being closed is not required but recommended #endif sShutdown(fd, SHUT_RDWR); // Disallow further reads/writes sClose(fd); // We don't really care if these closing functions return an error, we are just shutting down and not reusing this socket. if (session[fd]) delete_session(fd); } /// Retrieve local ips in host byte order. /// Uses loopback is no address is found. int32 socket_getips(uint32* ips, int32 max) { int32 num = 0; if( ips == nullptr || max <= 0 ) return 0; #ifdef WIN32 { char fullhost[255]; // XXX This should look up the local IP addresses in the registry // instead of calling gethostbyname. However, the way IP addresses // are stored in the registry is annoyingly complex, so I'll leave // this as T.B.D. [Meruru] if( gethostname(fullhost, sizeof(fullhost)) == SOCKET_ERROR ) { ShowError("socket_getips: No hostname defined!\n"); return 0; } else { u_long** a; struct hostent* hent; hent = gethostbyname(fullhost); if( hent == nullptr ){ ShowError("socket_getips: Cannot resolve our own hostname to an IP address\n"); return 0; } a = (u_long**)hent->h_addr_list; for( ;num < max && a[num] != nullptr; ++num) ips[num] = (uint32)ntohl(*a[num]); } } #else // not WIN32 { int32 fd; char buf[2*16*sizeof(struct ifreq)]; struct ifconf ic; u_long ad; fd = sSocket(AF_INET, SOCK_STREAM, 0); memset(buf, 0x00, sizeof(buf)); // The ioctl call will fail with Invalid Argument if there are more // interfaces than will fit in the buffer ic.ifc_len = sizeof(buf); ic.ifc_buf = buf; if( sIoctl(fd, SIOCGIFCONF, &ic) == -1 ) { ShowError("socket_getips: SIOCGIFCONF failed!\n"); return 0; } else { int32 pos; for( pos=0; pos < ic.ifc_len && num < max; ) { struct ifreq* ir = (struct ifreq*)(buf+pos); struct sockaddr_in*a = (struct sockaddr_in*) &(ir->ifr_addr); if( a->sin_family == AF_INET ){ ad = ntohl(a->sin_addr.s_addr); if( ad != INADDR_LOOPBACK && ad != INADDR_ANY ) ips[num++] = (uint32)ad; } #if (defined(BSD) && BSD >= 199103) || defined(_AIX) || defined(__APPLE__) pos += ir->ifr_addr.sa_len + sizeof(ir->ifr_name); #else// not AIX or APPLE pos += sizeof(struct ifreq); #endif//not AIX or APPLE } } sClose(fd); } #endif // not W32 // Use loopback if no ips are found if( num == 0 ) ips[num++] = (uint32)INADDR_LOOPBACK; return num; } void socket_init(void) { const char *SOCKET_CONF_FILENAME = "conf/packet_athena.conf"; uint32 rlim_cur = MAXCONN; #ifdef WIN32 {// Start up windows networking WSADATA wsaData; WORD wVersionRequested = MAKEWORD(2, 0); if( WSAStartup(wVersionRequested, &wsaData) != 0 ) { ShowError("socket_init: WinSock not available!\n"); return; } if( LOBYTE(wsaData.wVersion) != 2 || HIBYTE(wsaData.wVersion) != 0 ) { ShowError("socket_init: WinSock version mismatch (2.0 or compatible required)!\n"); return; } } #elif defined(HAVE_SETRLIMIT) && !defined(CYGWIN) // NOTE: getrlimit and setrlimit have bogus behaviour in cygwin. // "Number of fds is virtually unlimited in cygwin" (sys/param.h) {// set socket limit to MAXCONN struct rlimit rlp; if( 0 == getrlimit(RLIMIT_NOFILE, &rlp) ) { rlp.rlim_cur = MAXCONN; if( 0 != setrlimit(RLIMIT_NOFILE, &rlp) ) {// failed, try setting the maximum too (permission to change system limits is required) rlp.rlim_max = MAXCONN; if( 0 != setrlimit(RLIMIT_NOFILE, &rlp) ) {// failed const char *errmsg = error_msg(); int32 rlim_ori; // set to maximum allowed getrlimit(RLIMIT_NOFILE, &rlp); rlim_ori = (int32)rlp.rlim_cur; rlp.rlim_cur = rlp.rlim_max; setrlimit(RLIMIT_NOFILE, &rlp); // report limit getrlimit(RLIMIT_NOFILE, &rlp); rlim_cur = rlp.rlim_cur; ShowWarning("socket_init: failed to set socket limit to %d, setting to maximum allowed (original limit=%d, current limit=%d, maximum allowed=%d, %s).\n", MAXCONN, rlim_ori, (int32)rlp.rlim_cur, (int32)rlp.rlim_max, errmsg); } } } } #endif // Get initial local ips naddr_ = socket_getips(addr_,16); #ifndef SOCKET_EPOLL // Select based Event Dispatcher: sFD_ZERO(&readfds); ShowInfo( "Server uses '" CL_WHITE "select" CL_RESET "' as event dispatcher\n" ); #else // Epoll based Event Dispatcher epfd = epoll_create( MAXCONN ); // 2.6.8 or newer ignores the expected socket amount argument if( epfd == SOCKET_ERROR ){ ShowError( "Failed to create epoll event dispatcher: %s\n", error_msg() ); exit( EXIT_FAILURE ); } memset( &epevent, 0x00, sizeof( struct epoll_event ) ); epevents = (struct epoll_event *)aCalloc( epoll_maxevents, sizeof( struct epoll_event ) ); ShowInfo( "Server uses '" CL_WHITE "epoll" CL_RESET "' with up to " CL_WHITE "%d" CL_RESET " events per cycle as event dispatcher\n", epoll_maxevents ); #endif #if defined(SEND_SHORTLIST) memset(send_shortlist_set, 0, sizeof(send_shortlist_set)); #endif socket_config_read(SOCKET_CONF_FILENAME); // initialise last send-receive tick last_tick = time(nullptr); // session[0] is now currently used for disconnected sessions of the map server, and as such, // should hold enough buffer (it is a vacuum so to speak) as it is never flushed. [Skotlex] create_session(0, null_recv, null_send, null_parse); //FIXME this is causing leak #ifndef MINICORE // Delete old connection history every 5 minutes memset(connect_history, 0, sizeof(connect_history)); add_timer_func_list(connect_check_clear, "connect_check_clear"); add_timer_interval(gettick()+1000, connect_check_clear, 0, 0, 5*60*1000); #endif ShowInfo("Server supports up to '" CL_WHITE "%u" CL_RESET "' concurrent connections.\n", rlim_cur); } bool session_isValid(int32 fd) { return ( fd > 0 && fd < MAXCONN && session[fd] != nullptr ); } bool session_isActive(int32 fd) { return ( session_isValid(fd) && !session[fd]->flag.eof ); } // Resolves hostname into a numeric ip. uint32 host2ip(const char* hostname) { struct hostent* h = gethostbyname(hostname); return (h != nullptr) ? ntohl(*(uint32*)h->h_addr) : 0; } // Converts a numeric ip into a dot-formatted string. // Result is placed either into a user-provided buffer or a static system buffer. const char* ip2str(uint32 ip, char ip_str[16]) { struct in_addr addr; addr.s_addr = htonl(ip); return (ip_str == nullptr) ? inet_ntoa(addr) : strncpy(ip_str, inet_ntoa(addr), 16); } // Converts a dot-formatted ip string into a numeric ip. uint32 str2ip(const char* ip_str) { return ntohl(inet_addr(ip_str)); } // Reorders bytes from network to little endian (Windows). // Neccessary for sending port numbers to the RO client until Gravity notices that they forgot ntohs() calls. uint16 ntows(uint16 netshort) { return ((netshort & 0xFF) << 8) | ((netshort & 0xFF00) >> 8); } #ifdef SEND_SHORTLIST // Add a fd to the shortlist so that it'll be recognized as a fd that needs // sending or eof handling. void send_shortlist_add_fd(int32 fd) { int32 i; int32 bit; if( !session_isValid(fd) ) return;// out of range i = fd/32; bit = fd%32; if( (send_shortlist_set[i]>>bit)&1 ) return;// already in the list if( send_shortlist_count >= ARRAYLENGTH(send_shortlist_array) ) { ShowDebug("send_shortlist_add_fd: shortlist is full, ignoring... (fd=%d shortlist.count=%" PRIuPTR " shortlist.length=%d)\n", fd, send_shortlist_count, ARRAYLENGTH(send_shortlist_array)); return; } // set the bit send_shortlist_set[i] |= 1<( send_shortlist_count - 1 ); i >= 0; --i ){ int32 fd = send_shortlist_array[i]; int32 idx = fd/32; int32 bit = fd%32; // Remove fd from shortlist, move the last fd to the current position --send_shortlist_count; send_shortlist_array[i] = send_shortlist_array[send_shortlist_count]; send_shortlist_array[send_shortlist_count] = 0; if( fd <= 0 || fd >= MAXCONN ) { ShowDebug("send_shortlist_do_sends: fd is out of range, corrupted memory? (fd=%d)\n", fd); continue; } if( ((send_shortlist_set[idx]>>bit)&1) == 0 ) { ShowDebug("send_shortlist_do_sends: fd is not set, why is it in the shortlist? (fd=%d)\n", fd); continue; } send_shortlist_set[idx]&=~(1<wdata_size ) session[fd]->func_send(fd); // If it's been marked as eof, call the parse func on it so that // the socket will be immediately closed. if( session[fd]->flag.eof ) session[fd]->func_parse(fd); // If the session still exists, is not eof and has things left to // be sent from it we'll re-add it to the shortlist. if( session_isActive(fd) && session[fd]->wdata_size ) send_shortlist_add_fd(fd); } } } #endif