/**
* This file is part of Hercules.
* http://herc.ws - http://github.com/HerculesWS/Hercules
*
* Copyright (C) 2012-2018 Hercules Dev Team
* Copyright (C) Athena Dev Teams
*
* Hercules is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#define HERCULES_CORE
#include "config/core.h" // SHOW_SERVER_STATS
#include "socket.h"
#include "common/HPM.h"
#include "common/cbasetypes.h"
#include "common/conf.h"
#include "common/db.h"
#include "common/memmgr.h"
#include "common/mmo.h"
#include "common/nullpo.h"
#include "common/packets.h"
#include "common/showmsg.h"
#include "common/strlib.h"
#include "common/timer.h"
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#ifdef SOCKET_EPOLL
#include <sys/epoll.h>
#endif // SOCKET_EPOLL
#ifdef WIN32
# include "common/winapi.h"
#else // WIN32
# include <arpa/inet.h>
# include <errno.h>
# include <net/if.h>
# include <netdb.h>
#if defined __linux__ || defined __linux
# include <linux/tcp.h>
#else // defined __linux__ || defined __linux
# include <netinet/in.h>
# include <netinet/tcp.h>
#endif // defined __linux__ || defined __linux
# include <sys/ioctl.h>
# include <sys/socket.h>
# include <sys/time.h>
# include <unistd.h>
#ifndef SIOCGIFCONF
# include <sys/sockio.h> // SIOCGIFCONF on Solaris, maybe others? [Shinomori]
#endif // SIOCGIFCONF
#ifndef FIONBIO
# include <sys/filio.h> // FIONBIO on Solaris [FlavioJS]
#endif // FIONBIO
#ifdef HAVE_SETRLIMIT
# include <sys/resource.h>
#endif // HAVE_SETRLIMIT
#endif // WIN32
/**
* Socket Interface Source
**/
static struct socket_interface sockt_s;
struct socket_interface *sockt;
static const char *SOCKET_CONF_FILENAME = "conf/common/socket.conf";
#ifdef SEND_SHORTLIST
// Add a fd to the shortlist so that it'll be recognized as a fd that needs
// sending done on it.
static void send_shortlist_add_fd(int fd);
// Do pending network sends (and eof handling) from the shortlist.
static void send_shortlist_do_sends(void);
#endif // SEND_SHORTLIST
/////////////////////////////////////////////////////////////////////
#if defined(WIN32)
/////////////////////////////////////////////////////////////////////
// windows portability layer
typedef int socklen_t;
#define sErrno WSAGetLastError()
#define S_ENOTSOCK WSAENOTSOCK
#define S_EWOULDBLOCK WSAEWOULDBLOCK
#define S_EINTR WSAEINTR
#define S_ECONNABORTED WSAECONNABORTED
#define SHUT_RD SD_RECEIVE
#define SHUT_WR SD_SEND
#define SHUT_RDWR SD_BOTH
// global array of sockets (emulating linux)
// fd is the position in the array
static SOCKET sock_arr[FD_SETSIZE];
static int sock_arr_len = 0;
/// Returns the socket associated with the target fd.
///
/// @param fd Target fd.
/// @return Socket
#define fd2sock(fd) sock_arr[fd]
/// Returns the first fd associated with the socket.
/// Returns -1 if the socket is not found.
///
/// @param s Socket
/// @return Fd or -1
static int sock2fd(SOCKET s)
{
int fd;
// search for the socket
for( fd = 1; fd < sock_arr_len; ++fd )
if( sock_arr[fd] == s )
break;// found the socket
if( fd == sock_arr_len )
return -1;// not found
return fd;
}
/// Inserts the socket into the global array of sockets.
/// Returns a new fd associated with the socket.
/// If there are too many sockets it closes the socket, sets an error and
// returns -1 instead.
/// Since fd 0 is reserved, it returns values in the range [1,FD_SETSIZE[.
///
/// @param s Socket
/// @return New fd or -1
static int sock2newfd(SOCKET s)
{
int fd;
// find an empty position
for( fd = 1; fd < sock_arr_len; ++fd )
if( sock_arr[fd] == INVALID_SOCKET )
break;// empty position
if( fd == ARRAYLENGTH(sock_arr) )
{// too many sockets
closesocket(s);
WSASetLastError(WSAEMFILE);
return -1;
}
sock_arr[fd] = s;
if( sock_arr_len <= fd )
sock_arr_len = fd+1;
return fd;
}
static int sAccept(int fd, struct sockaddr *addr, int *addrlen)
{
SOCKET s;
// accept connection
s = accept(fd2sock(fd), addr, addrlen);
if( s == INVALID_SOCKET )
return -1;// error
return sock2newfd(s);
}
static int sClose(int fd)
{
int ret = closesocket(fd2sock(fd));
fd2sock(fd) = INVALID_SOCKET;
return ret;
}
static int sSocket(int af, int type, int protocol)
{
SOCKET s;
// create socket
s = socket(af,type,protocol);
if( s == INVALID_SOCKET )
return -1;// error
return sock2newfd(s);
}
static char *sErr(int code)
{
static char sbuf[512];
// strerror does not handle socket codes
if( FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM|FORMAT_MESSAGE_IGNORE_INSERTS, NULL,
code, MAKELANGID(LANG_ENGLISH, SUBLANG_DEFAULT), (LPTSTR)&sbuf, sizeof(sbuf), NULL) == 0 )
snprintf(sbuf, sizeof(sbuf), "unknown error");
return sbuf;
}
#define sBind(fd,name,namelen) bind(fd2sock(fd),(name),(namelen))
#define sConnect(fd,name,namelen) connect(fd2sock(fd),(name),(namelen))
#define sIoctl(fd,cmd,argp) ioctlsocket(fd2sock(fd),(cmd),(argp))
#define sListen(fd,backlog) listen(fd2sock(fd),(backlog))
#define sRecv(fd,buf,len,flags) recv(fd2sock(fd),(buf),(len),(flags))
#define sSelect select
#define sSend(fd,buf,len,flags) send(fd2sock(fd),(buf),(len),(flags))
#define sSetsockopt(fd,level,optname,optval,optlen) setsockopt(fd2sock(fd),(level),(optname),(optval),(optlen))
#define sShutdown(fd,how) shutdown(fd2sock(fd),(how))
#define sFD_SET(fd,set) FD_SET(fd2sock(fd),(set))
#define sFD_CLR(fd,set) FD_CLR(fd2sock(fd),(set))
#define sFD_ISSET(fd,set) FD_ISSET(fd2sock(fd),(set))
#define sFD_ZERO FD_ZERO
/////////////////////////////////////////////////////////////////////
#else // defined(WIN32)
/////////////////////////////////////////////////////////////////////
// nix portability layer
#define SOCKET_ERROR (-1)
#define sErrno errno
#define S_ENOTSOCK EBADF
#define S_EWOULDBLOCK EAGAIN
#define S_EINTR EINTR
#define S_ECONNABORTED ECONNABORTED
#define sAccept accept
#define sClose close
#define sSocket socket
#define sErr strerror
#define sBind bind
#define sConnect connect
#define sIoctl ioctl
#define sListen listen
#define sRecv recv
#define sSelect select
#define sSend send
#define sSetsockopt setsockopt
#define sShutdown shutdown
#define sFD_SET FD_SET
#define sFD_CLR FD_CLR
#define sFD_ISSET FD_ISSET
#define sFD_ZERO FD_ZERO
/////////////////////////////////////////////////////////////////////
#endif // defined(WIN32)
/////////////////////////////////////////////////////////////////////
#ifndef MSG_NOSIGNAL
#define MSG_NOSIGNAL 0
#endif // MSG_NOSIGNAL
#ifndef SOCKET_EPOLL
// Select based Event Dispatcher:
static fd_set readfds;
#else // SOCKET_EPOLL
// Epoll based Event Dispatcher:
static int epoll_maxevents = (FD_SETSIZE / 2);
static int epfd = SOCKET_ERROR;
static struct epoll_event epevent;
static struct epoll_event *epevents = NULL;
#endif // SOCKET_EPOLL
// Maximum packet size in bytes, which the client is able to handle.
// Larger packets cause a buffer overflow and stack corruption.
#if PACKETVER >= 20131223
static size_t socket_max_client_packet = 0xFFFF;
#else // PACKETVER >= 20131223
static size_t socket_max_client_packet = 0x6000;
#endif // PACKETVER >= 20131223
#ifdef SHOW_SERVER_STATS
// Data I/O statistics
static size_t socket_data_i = 0, socket_data_ci = 0, socket_data_qi = 0;
static size_t socket_data_o = 0, socket_data_co = 0, socket_data_qo = 0;
static time_t socket_data_last_tick = 0;
#endif // SHOW_SERVER_STATS
// initial recv buffer size (this will also be the max. size)
// biggest known packet: S 0153 <len>.w <emblem data>.?B -> 24x24 256 color .bmp (0153 + len.w + 1618/1654/1756 bytes)
#define RFIFO_SIZE (2*1024)
// initial send buffer size (will be resized as needed)
#define WFIFO_SIZE (16*1024)
// Maximum size of pending data in the write fifo. (for non-server connections)
// The connection is closed if it goes over the limit.
#define WFIFO_MAX (1*1024*1024)
#ifdef SEND_SHORTLIST
static int send_shortlist_array[FD_SETSIZE];// we only support FD_SETSIZE sockets, limit the array to that
static int send_shortlist_count = 0;// how many fd's are in the shortlist
static uint32 send_shortlist_set[(FD_SETSIZE+31)/32];// to know if specific fd's are already in the shortlist
#endif // SEND_SHORTLIST
static int create_session(int fd, RecvFunc func_recv, SendFunc func_send, ParseFunc func_parse);
static int ip_rules = 1;
static int connect_check(uint32 ip);
static const char *error_msg(void)
{
static char buf[512];
int code = sErrno;
snprintf(buf, sizeof(buf), "error %d: %s", code, sErr(code));
return buf;
}
/*======================================
* CORE : Default processing functions
*--------------------------------------*/
static int null_recv(int fd)
{
return 0;
}
static int null_send(int fd)
{
return 0;
}
static int null_parse(int fd)
{
return 0;
}
static ParseFunc default_func_parse = null_parse;
static void set_defaultparse(ParseFunc defaultparse)
{
default_func_parse = defaultparse;
}
/*======================================
* CORE : Socket options
*--------------------------------------*/
static void set_nonblocking(int fd, unsigned long yes)
{
// FIONBIO Use with a nonzero argp parameter to enable the nonblocking mode of socket s.
// The argp parameter is zero if nonblocking is to be disabled.
if( sIoctl(fd, FIONBIO, &yes) != 0 )
ShowError("set_nonblocking: Failed to set socket #%d to non-blocking mode (%s) - Please report this!!!\n", fd, error_msg());
}
/**
* Sets the options for a socket.
*
* @param fd The socket descriptor
* @param opt Optional, additional options to set (Can be NULL).
*/
static void setsocketopts(int fd, struct hSockOpt *opt)
{
#if defined(WIN32)
BOOL yes = TRUE;
#else // not WIN32
int yes = 1;
#endif // WIN32
struct linger lopt = { 0 };
// Note: We cast the fourth argument to (char *) because, while in UNIX
// it takes a const void *, in Windows it takes a const char *.
#if !defined(WIN32)
// set SO_REAUSEADDR to true, unix only. on windows this option causes
// the previous owner of the socket to give up, which is not desirable
// in most cases, neither compatible with unix.
if (sSetsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (char *)&yes, sizeof(yes)))
ShowWarning("setsocketopts: Unable to set SO_REUSEADDR mode for connection #%d!\n", fd);
#ifdef SO_REUSEPORT
if (sSetsockopt(fd, SOL_SOCKET, SO_REUSEPORT, (char *)&yes, sizeof(yes)))
ShowWarning("setsocketopts: Unable to set SO_REUSEPORT mode for connection #%d!\n", fd);
#endif // SO_REUSEPORT
#endif // WIN32
// Set the socket into no-delay mode; otherwise packets get delayed for up to 200ms, likely creating server-side lag.
// The RO protocol is mainly single-packet request/response, plus the FIFO model already does packet grouping anyway.
if (sSetsockopt(fd, IPPROTO_TCP, TCP_NODELAY, (char *)&yes, sizeof(yes)))
ShowWarning("setsocketopts: Unable to set TCP_NODELAY mode for connection #%d!\n", fd);
if (opt && opt->setTimeo) {
#if defined(WIN32)
DWORD timeout = 5000; // https://msdn.microsoft.com/en-us/library/windows/desktop/ms740476(v=vs.85).aspx
#else // not WIN32
struct timeval timeout = { 0 };
timeout.tv_sec = 5;
#endif // WIN32
if (sSetsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout, sizeof(timeout)))
ShowWarning("setsocketopts: Unable to set SO_RCVTIMEO for connection #%d!\n", fd);
if (sSetsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout, sizeof(timeout)))
ShowWarning("setsocketopts: Unable to set SO_SNDTIMEO for connection #%d!\n", fd);
}
// force the socket into no-wait, graceful-close mode (should be the default, but better make sure)
//(http://msdn.microsoft.com/library/default.asp?url=/library/en-us/winsock/winsock/closesocket_2.asp)
lopt.l_onoff = 0; // SO_DONTLINGER
lopt.l_linger = 0; // Do not care
if (sSetsockopt(fd, SOL_SOCKET, SO_LINGER, (char *)&lopt, sizeof(lopt)))
ShowWarning("setsocketopts: Unable to set SO_LINGER mode for connection #%d!\n", fd);
#ifdef TCP_THIN_LINEAR_TIMEOUTS
if (sSetsockopt(fd, IPPROTO_TCP, TCP_THIN_LINEAR_TIMEOUTS, (char *)&yes, sizeof(yes)))
ShowWarning("setsocketopts: Unable to set TCP_THIN_LINEAR_TIMEOUTS mode for connection #%d!\n", fd);
#endif // TCP_THIN_LINEAR_TIMEOUTS
#ifdef TCP_THIN_DUPACK
if (sSetsockopt(fd, IPPROTO_TCP, TCP_THIN_DUPACK, (char *)&yes, sizeof(yes)))
ShowWarning("setsocketopts: Unable to set TCP_THIN_DUPACK mode for connection #%d!\n", fd);
#endif // TCP_THIN_DUPACK
}
/*======================================
* CORE : Socket Sub Function
*--------------------------------------*/
static void set_eof(int fd)
{
if (sockt->session_is_active(fd)) {
#ifdef SEND_SHORTLIST
// Add this socket to the shortlist for eof handling.
send_shortlist_add_fd(fd);
#endif // SEND_SHORTLIST
sockt->session[fd]->flag.eof = 1;
}
}
static int recv_to_fifo(int fd)
{
ssize_t len;
if (!sockt->session_is_active(fd))
return -1;
len = sRecv(fd, (char *) sockt->session[fd]->rdata + sockt->session[fd]->rdata_size, (int)RFIFOSPACE(fd), 0);
if( len == SOCKET_ERROR )
{//An exception has occurred
if( sErrno != S_EWOULDBLOCK ) {
//ShowDebug("recv_to_fifo: %s, closing connection #%d\n", error_msg(), fd);
sockt->eof(fd);
}
return 0;
}
if( len == 0 )
{//Normal connection end.
sockt->eof(fd);
return 0;
}
sockt->session[fd]->rdata_size += len;
sockt->session[fd]->rdata_tick = sockt->last_tick;
#ifdef SHOW_SERVER_STATS
socket_data_i += len;
socket_data_qi += len;
if (!sockt->session[fd]->flag.server)
{
socket_data_ci += len;
}
#endif // SHOW_SERVER_STATS
return 0;
}
static int send_from_fifo(int fd)
{
ssize_t len;
if (!sockt->session_is_valid(fd))
return -1;
if( sockt->session[fd]->wdata_size == 0 )
return 0; // nothing to send
len = sSend(fd, (const char *) sockt->session[fd]->wdata, (int)sockt->session[fd]->wdata_size, MSG_NOSIGNAL);
if( len == SOCKET_ERROR )
{ //An exception has occurred
if( sErrno != S_EWOULDBLOCK ) {
//ShowDebug("send_from_fifo: %s, ending connection #%d\n", error_msg(), fd);
#ifdef SHOW_SERVER_STATS
socket_data_qo -= sockt->session[fd]->wdata_size;
#endif // SHOW_SERVER_STATS
sockt->session[fd]->wdata_size = 0; //Clear the send queue as we can't send anymore. [Skotlex]
sockt->eof(fd);
}
return 0;
}
if( len > 0 )
{
// some data could not be transferred?
// shift unsent data to the beginning of the queue
if( (size_t)len < sockt->session[fd]->wdata_size )
memmove(sockt->session[fd]->wdata, sockt->session[fd]->wdata + len, sockt->session[fd]->wdata_size - len);
sockt->session[fd]->wdata_size -= len;
#ifdef SHOW_SERVER_STATS
socket_data_o += len;
socket_data_qo -= len;
if (!sockt->session[fd]->flag.server)
{
socket_data_co += len;
}
#endif // SHOW_SERVER_STATS
}
return 0;
}
/// Best effort - there's no warranty that the data will be sent.
static void flush_fifo(int fd)
{
if(sockt->session[fd] != NULL)
sockt->session[fd]->func_send(fd);
}
static void flush_fifos(void)
{
int i;
for(i = 1; i < sockt->fd_max; i++)
sockt->flush(i);
}
/*======================================
* CORE : Connection functions
*--------------------------------------*/
static int connect_client(int listen_fd)
{
int fd;
struct sockaddr_in client_address;
socklen_t len;
len = sizeof(client_address);
fd = sAccept(listen_fd, (struct sockaddr*)&client_address, &len);
if ( fd == -1 ) {
ShowError("connect_client: accept failed (%s)!\n", error_msg());
return -1;
}
if( fd == 0 ) { // reserved
ShowError("connect_client: Socket #0 is reserved - Please report this!!!\n");
sClose(fd);
return -1;
}
if( fd >= FD_SETSIZE ) { // socket number too big
ShowError("connect_client: New socket #%d is greater than can we handle! Increase the value of FD_SETSIZE (currently %d) for your OS to fix this!\n", fd, FD_SETSIZE);
sClose(fd);
return -1;
}
setsocketopts(fd,NULL);
sockt->set_nonblocking(fd, 1);
if( ip_rules && !connect_check(ntohl(client_address.sin_addr.s_addr)) ) {
sockt->close(fd);
return -1;
}
#ifndef SOCKET_EPOLL
// Select Based Event Dispatcher
sFD_SET(fd,&readfds);
#else // SOCKET_EPOLL
// Epoll based Event Dispatcher
epevent.data.fd = fd;
epevent.events = EPOLLIN;
if(epoll_ctl(epfd, EPOLL_CTL_ADD, fd, &epevent) == SOCKET_ERROR){
ShowError("connect_client: New Socket #%d failed to add to epoll event dispatcher: %s\n", fd, error_msg());
sClose(fd);
return -1;
}
#endif // SOCKET_EPOLL
if( sockt->fd_max <= fd ) sockt->fd_max = fd + 1;
create_session(fd, recv_to_fifo, send_from_fifo, default_func_parse);
sockt->session[fd]->client_addr = ntohl(client_address.sin_addr.s_addr);
sockt->session[fd]->flag.validate = sockt->validate;
return fd;
}
static int make_listen_bind(uint32 ip, uint16 port)
{
struct sockaddr_in server_address = { 0 };
int fd;
int result;
fd = sSocket(AF_INET, SOCK_STREAM, 0);
if( fd == -1 ) {
ShowError("make_listen_bind: socket creation failed (%s)!\n", error_msg());
exit(EXIT_FAILURE);
}
if( fd == 0 ) { // reserved
ShowError("make_listen_bind: Socket #0 is reserved - Please report this!!!\n");
sClose(fd);
return -1;
}
if( fd >= FD_SETSIZE ) { // socket number too big
ShowError("make_listen_bind: New socket #%d is greater than can we handle! Increase the value of FD_SETSIZE (currently %d) for your OS to fix this!\n", fd, FD_SETSIZE);
sClose(fd);
return -1;
}
setsocketopts(fd,NULL);
sockt->set_nonblocking(fd, 1);
server_address.sin_family = AF_INET;
server_address.sin_addr.s_addr = htonl(ip);
server_address.sin_port = htons(port);
result = sBind(fd, (struct sockaddr*)&server_address, sizeof(server_address));
if( result == SOCKET_ERROR ) {
ShowError("make_listen_bind: bind failed (socket #%d, %s)!\n", fd, error_msg());
exit(EXIT_FAILURE);
}
result = sListen(fd,5);
if( result == SOCKET_ERROR ) {
ShowError("make_listen_bind: listen failed (socket #%d, %s)!\n", fd, error_msg());
exit(EXIT_FAILURE);
}
#ifndef SOCKET_EPOLL
// Select Based Event Dispatcher
sFD_SET(fd,&readfds);
#else // SOCKET_EPOLL
// Epoll based Event Dispatcher
epevent.data.fd = fd;
epevent.events = EPOLLIN;
if(epoll_ctl(epfd, EPOLL_CTL_ADD, fd, &epevent) == SOCKET_ERROR){
ShowError("make_listen_bind: failed to add listener socket #%d to epoll event dispatcher: %s\n", fd, error_msg());
sClose(fd);
exit(EXIT_FAILURE);
}
#endif // SOCKET_EPOLL
if(sockt->fd_max <= fd) sockt->fd_max = fd + 1;
create_session(fd, connect_client, null_send, null_parse);
sockt->session[fd]->client_addr = 0; // just listens
sockt->session[fd]->rdata_tick = 0; // disable timeouts on this socket
return fd;
}
static int make_connection(uint32 ip, uint16 port, struct hSockOpt *opt)
{
struct sockaddr_in remote_address = { 0 };
int fd;
int result;
fd = sSocket(AF_INET, SOCK_STREAM, 0);
if (fd == -1) {
ShowError("make_connection: socket creation failed (%s)!\n", error_msg());
return -1;
}
if( fd == 0 ) {// reserved
ShowError("make_connection: Socket #0 is reserved - Please report this!!!\n");
sClose(fd);
return -1;
}
if( fd >= FD_SETSIZE ) {// socket number too big
ShowError("make_connection: New socket #%d is greater than can we handle! Increase the value of FD_SETSIZE (currently %d) for your OS to fix this!\n", fd, FD_SETSIZE);
sClose(fd);
return -1;
}
setsocketopts(fd,opt);
remote_address.sin_family = AF_INET;
remote_address.sin_addr.s_addr = htonl(ip);
remote_address.sin_port = htons(port);
if( !( opt && opt->silent ) )
ShowStatus("Connecting to %u.%u.%u.%u:%i\n", CONVIP(ip), port);
result = sConnect(fd, (struct sockaddr *)(&remote_address), sizeof(struct sockaddr_in));
if( result == SOCKET_ERROR ) {
if( !( opt && opt->silent ) )
ShowError("make_connection: connect failed (socket #%d, %s)!\n", fd, error_msg());
sockt->close(fd);
return -1;
}
//Now the socket can be made non-blocking. [Skotlex]
sockt->set_nonblocking(fd, 1);
#ifndef SOCKET_EPOLL
// Select Based Event Dispatcher
sFD_SET(fd,&readfds);
#else // SOCKET_EPOLL
// Epoll based Event Dispatcher
epevent.data.fd = fd;
epevent.events = EPOLLIN;
if(epoll_ctl(epfd, EPOLL_CTL_ADD, fd, &epevent) == SOCKET_ERROR){
ShowError("make_connection: failed to add socket #%d to epoll event dispatcher: %s\n", fd, error_msg());
sClose(fd);
return -1;
}
#endif // SOCKET_EPOLL
if(sockt->fd_max <= fd) sockt->fd_max = fd + 1;
create_session(fd, recv_to_fifo, send_from_fifo, default_func_parse);
sockt->session[fd]->client_addr = ntohl(remote_address.sin_addr.s_addr);
return fd;
}
static int create_session(int fd, RecvFunc func_recv, SendFunc func_send, ParseFunc func_parse)
{
CREATE(sockt->session[fd], struct socket_data, 1);
CREATE(sockt->session[fd]->rdata, unsigned char, RFIFO_SIZE);
CREATE(sockt->session[fd]->wdata, unsigned char, WFIFO_SIZE);
sockt->session[fd]->max_rdata = RFIFO_SIZE;
sockt->session[fd]->max_wdata = WFIFO_SIZE;
sockt->session[fd]->func_recv = func_recv;
sockt->session[fd]->func_send = func_send;
sockt->session[fd]->func_parse = func_parse;
sockt->session[fd]->rdata_tick = sockt->last_tick;
sockt->session[fd]->session_data = NULL;
sockt->session[fd]->hdata = NULL;
return 0;
}
static void delete_session(int fd)
{
if (sockt->session_is_valid(fd)) {
#ifdef SHOW_SERVER_STATS
socket_data_qi -= sockt->session[fd]->rdata_size - sockt->session[fd]->rdata_pos;
socket_data_qo -= sockt->session[fd]->wdata_size;
#endif // SHOW_SERVER_STATS
aFree(sockt->session[fd]->rdata);
aFree(sockt->session[fd]->wdata);
if( sockt->session[fd]->session_data )
aFree(sockt->session[fd]->session_data);
HPM->data_store_destroy(&sockt->session[fd]->hdata);
aFree(sockt->session[fd]);
sockt->session[fd] = NULL;
}
}
static int realloc_fifo(int fd, unsigned int rfifo_size, unsigned int wfifo_size)
{
if (!sockt->session_is_valid(fd))
return 0;
if( sockt->session[fd]->max_rdata != rfifo_size && sockt->session[fd]->rdata_size < rfifo_size) {
RECREATE(sockt->session[fd]->rdata, unsigned char, rfifo_size);
sockt->session[fd]->max_rdata = rfifo_size;
}
if( sockt->session[fd]->max_wdata != wfifo_size && sockt->session[fd]->wdata_size < wfifo_size) {
RECREATE(sockt->session[fd]->wdata, unsigned char, wfifo_size);
sockt->session[fd]->max_wdata = wfifo_size;
}
return 0;
}
static int realloc_writefifo(int fd, size_t addition)
{
size_t newsize;
if (!sockt->session_is_valid(fd)) // might not happen
return 0;
if (sockt->session[fd]->wdata_size + addition > sockt->session[fd]->max_wdata) {
// grow rule; grow in multiples of WFIFO_SIZE
newsize = WFIFO_SIZE;
while( sockt->session[fd]->wdata_size + addition > newsize ) newsize += WFIFO_SIZE;
} else if (sockt->session[fd]->max_wdata >= (size_t)2*(sockt->session[fd]->flag.server?FIFOSIZE_SERVERLINK:WFIFO_SIZE)
&& (sockt->session[fd]->wdata_size+addition)*4 < sockt->session[fd]->max_wdata
) {
// shrink rule, shrink by 2 when only a quarter of the fifo is used, don't shrink below nominal size.
newsize = sockt->session[fd]->max_wdata / 2;
} else {
// no change
return 0;
}
RECREATE(sockt->session[fd]->wdata, unsigned char, newsize);
sockt->session[fd]->max_wdata = newsize;
return 0;
}
/// advance the RFIFO cursor (marking 'len' bytes as processed)
static int rfifoskip(int fd, size_t len)
{
struct socket_data *s;
if (!sockt->session_is_active(fd))
return 0;
s = sockt->session[fd];
if (s->rdata_size < s->rdata_pos + len) {
ShowError("RFIFOSKIP: skipped past end of read buffer! Adjusting from %"PRIuS" to %"PRIuS" (session #%d)\n", len, RFIFOREST(fd), fd);
len = RFIFOREST(fd);
}
s->rdata_pos = s->rdata_pos + len;
#ifdef SHOW_SERVER_STATS
socket_data_qi -= len;
#endif // SHOW_SERVER_STATS
return 0;
}
/// advance the WFIFO cursor (marking 'len' bytes for sending)
static int wfifoset(int fd, size_t len, bool validate)
{
if (!sockt->session_is_valid(fd))
return 0;
struct socket_data* s = sockt->session[fd];
if (s == NULL || s->wdata == NULL)
return 0;
// we have written len bytes to the buffer already before calling WFIFOSET
if (s->wdata_size+len > s->max_wdata) {
// actually there was a buffer overflow already
uint32 ip = s->client_addr;
ShowFatalError("WFIFOSET: Write Buffer Overflow. Connection %d (%u.%u.%u.%u) has written %u bytes on a %u/%u bytes buffer.\n", fd, CONVIP(ip), (unsigned int)len, (unsigned int)s->wdata_size, (unsigned int)s->max_wdata);
ShowDebug("Likely command that caused it: 0x%x\n", (*(uint16*)(s->wdata + s->wdata_size)));
// no other chance, make a better fifo model
exit(EXIT_FAILURE);
}
if( len > 0xFFFF )
{
// dynamic packets allow up to UINT16_MAX bytes (<packet_id>.W <packet_len>.W ...)
// all known fixed-size packets are within this limit, so use the same limit
ShowFatalError("WFIFOSET: Packet 0x%x is too big. (len=%u, max=%u)\n", (*(uint16*)(s->wdata + s->wdata_size)), (unsigned int)len, 0xFFFFU);
exit(EXIT_FAILURE);
}
else if( len == 0 )
{
// abuses the fact, that the code that did WFIFOHEAD(fd,0), already wrote
// the packet type into memory, even if it could have overwritten vital data
// this can happen when a new packet was added on map-server, but packet len table was not updated
ShowWarning("WFIFOSET: Attempted to send zero-length packet, most likely 0x%04x (please report this).\n", WFIFOW(fd,0));
return 0;
}
if( !s->flag.server ) {
if (len > socket_max_client_packet) { // see declaration of socket_max_client_packet for details
ShowError("WFIFOSET: Dropped too large client packet 0x%04x (length=%"PRIuS", max=%"PRIuS").\n",
WFIFOW(fd,0), len, socket_max_client_packet);
return 0;
}
}
if (validate && s->flag.validate == 1)
sockt->validateWfifo(fd, len);
s->wdata_size += len;
#ifdef SHOW_SERVER_STATS
socket_data_qo += len;
#endif // SHOW_SERVER_STATS
//If the interserver has 200% of its normal size full, flush the data.
if( s->flag.server && s->wdata_size >= 2*FIFOSIZE_SERVERLINK )
sockt->flush(fd);
// always keep a WFIFO_SIZE reserve in the buffer
// For inter-server connections, let the reserve be 1/4th of the link size.
size_t newreserve = s->flag.server ? FIFOSIZE_SERVERLINK / 4 : WFIFO_SIZE;
// readjust the buffer to include the chosen reserve
sockt->realloc_writefifo(fd, newreserve);
#ifdef SEND_SHORTLIST
send_shortlist_add_fd(fd);
#endif // SEND_SHORTLIST
return 0;
}
static int do_sockets(int next)
{
#ifndef SOCKET_EPOLL
fd_set rfd;
struct timeval timeout;
#endif // SOCKET_EPOLL
int ret,i;
// PRESEND Timers are executed before do_sendrecv and can send packets and/or set sessions to eof.
// Send remaining data and process client-side disconnects here.
#ifdef SEND_SHORTLIST
send_shortlist_do_sends();
#else // SEND_SHORTLIST
for (i = 1; i < sockt->fd_max; i++) {
if (sockt->session[i] == NULL)
continue;
if (sockt->session[i]->wdata_size > 0)
sockt->session[i]->func_send(i);
}
#endif // SEND_SHORTLIST
#ifndef SOCKET_EPOLL
// Select based Event Dispatcher:
// can timeout until the next tick
timeout.tv_sec = next/1000;
timeout.tv_usec = next%1000*1000;
memcpy(&rfd, &readfds, sizeof(rfd));
ret = sSelect(sockt->fd_max, &rfd, NULL, NULL, &timeout);
if( ret == SOCKET_ERROR )
{
if( sErrno != S_EINTR )
{
ShowFatalError("do_sockets: select() failed, %s!\n", error_msg());
exit(EXIT_FAILURE);
}
return 0; // interrupted by a signal, just loop and try again
}
#else // SOCKET_EPOLL
// Epoll based Event Dispatcher
ret = epoll_wait(epfd, epevents, epoll_maxevents, next);
if(ret == SOCKET_ERROR)
{
if( sErrno != S_EINTR )
{
ShowFatalError("do_sockets: epoll_wait() failed, %s!\n", error_msg());
exit(EXIT_FAILURE);
}
return 0; // interrupted by a signal, just loop and try again
}
#endif // SOCKET_EPOLL
sockt->last_tick = time(NULL);
#if defined(WIN32)
// on windows, enumerating all members of the fd_set is way faster if we access the internals
for( i = 0; i < (int)rfd.fd_count; ++i )
{
int fd = sock2fd(rfd.fd_array[i]);
if( sockt->session[fd] )
sockt->session[fd]->func_recv(fd);
}
#elif defined(SOCKET_EPOLL)
// epoll based selection
for( i = 0; i < ret; i++ )
{
struct epoll_event *it = &epevents[i];
struct socket_data *sock = sockt->session[ it->data.fd ];
if(!sock)
continue;
if ((it->events & EPOLLERR) ||
(it->events & EPOLLHUP) ||
(!(it->events & EPOLLIN)))
{
// Got Error on this connection
sockt->eof( it->data.fd );
} else if (it->events & EPOLLIN) {
// data wainting
sock->func_recv( it->data.fd );
}
}
#else // defined(SOCKET_EPOLL)
// otherwise assume that the fd_set is a bit-array and enumerate it in a standard way
for( i = 1; ret && i < sockt->fd_max; ++i )
{
if(sFD_ISSET(i,&rfd) && sockt->session[i])
{
sockt->session[i]->func_recv(i);
--ret;
}
}
#endif // defined(SOCKET_EPOLL)
// POSTSEND Send remaining data and handle eof sessions.
#ifdef SEND_SHORTLIST
send_shortlist_do_sends();
#else // SEND_SHORTLIST
for (i = 1; i < sockt->fd_max; i++)
{
if(!sockt->session[i])
continue;
if(sockt->session[i]->wdata_size)
sockt->session[i]->func_send(i);
if (sockt->session[i]->flag.eof) { //func_send can't free a session, this is safe.
//Finally, even if there is no data to parse, connections signaled eof should be closed, so we call parse_func [Skotlex]
sockt->session[i]->func_parse(i); //This should close the session immediately.
}
}
#endif // SEND_SHORTLIST
// parse input data on each socket
for(i = 1; i < sockt->fd_max; i++)
{
if(!sockt->session[i])
continue;
if (sockt->session[i]->rdata_tick && DIFF_TICK(sockt->last_tick, sockt->session[i]->rdata_tick) > sockt->stall_time) {
if( sockt->session[i]->flag.server ) {/* server is special */
if( sockt->session[i]->flag.ping != 2 )/* only update if necessary otherwise it'd resend the ping unnecessarily */
sockt->session[i]->flag.ping = 1;
} else {
ShowInfo("Session #%d timed out\n", i);
sockt->eof(i);
}
}
sockt->session[i]->func_parse(i);
if(!sockt->session[i])
continue;
RFIFOFLUSH(i);
// after parse, check client's RFIFO size to know if there is an invalid packet (too big and not parsed)
if (sockt->session[i]->rdata_size == sockt->session[i]->max_rdata) {
sockt->eof(i);
continue;
}
}
#ifdef SHOW_SERVER_STATS
if (sockt->last_tick != socket_data_last_tick)
{
char buf[1024];
sprintf(buf, "In: %.03f kB/s (%.03f kB/s, Q: %.03f kB) | Out: %.03f kB/s (%.03f kB/s, Q: %.03f kB) | RAM: %.03f MB", socket_data_i/1024., socket_data_ci/1024., socket_data_qi/1024., socket_data_o/1024., socket_data_co/1024., socket_data_qo/1024., iMalloc->usage()/1024.);
#ifdef _WIN32
SetConsoleTitle(buf);
#else // _WIN32
ShowMessage("\033[s\033[1;1H\033[2K%s\033[u", buf);
#endif // _WIN32
socket_data_last_tick = sockt->last_tick;
socket_data_i = socket_data_ci = 0;
socket_data_o = socket_data_co = 0;
}
#endif // SHOW_SERVER_STATS
return 0;
}
// IP rules and DDoS protection
struct connect_history {
uint32 ip;
int64 tick;
int count;
unsigned ddos : 1;
};
struct access_control {
uint32 ip;
uint32 mask;
};
VECTOR_STRUCT_DECL(access_control_list, struct access_control);
enum aco {
ACO_DENY_ALLOW,
ACO_ALLOW_DENY,
ACO_MUTUAL_FAILURE
};
static struct access_control_list access_allow;
static struct access_control_list access_deny;
static int access_order = ACO_DENY_ALLOW;
static int access_debug = 0;
static int ddos_count = 10;
static int ddos_interval = 3*1000;
static int ddos_autoreset = 10*60*1000;
static struct DBMap *connect_history = NULL;
static int connect_check_(uint32 ip);
/// Verifies if the IP can connect. (with debug info)
/// @see connect_check_()
static int connect_check(uint32 ip)
{
int result = connect_check_(ip);
if( access_debug ) {
ShowInfo("connect_check: Connection from %u.%u.%u.%u %s\n", CONVIP(ip),result ? "allowed." : "denied!");
}
return result;
}
/// Verifies if the IP can connect.
/// 0 : Connection Rejected
/// 1 or 2 : Connection Accepted
static int connect_check_(uint32 ip)
{
struct connect_history *hist = NULL;
int i;
int is_allowip = 0;
int is_denyip = 0;
int connect_ok = 0;
// Search the allow list
for (i = 0; i < VECTOR_LENGTH(access_allow); ++i) {
struct access_control *entry = &VECTOR_INDEX(access_allow, i);
if (SUBNET_MATCH(ip, entry->ip, entry->mask)) {
if (access_debug) {
ShowInfo("connect_check: Found match from allow list:%u.%u.%u.%u IP:%u.%u.%u.%u Mask:%u.%u.%u.%u\n",
CONVIP(ip),
CONVIP(entry->ip),
CONVIP(entry->mask));
}
is_allowip = 1;
break;
}
}
// Search the deny list
for (i = 0; i < VECTOR_LENGTH(access_deny); ++i) {
struct access_control *entry = &VECTOR_INDEX(access_deny, i);
if (SUBNET_MATCH(ip, entry->ip, entry->mask)) {
if (access_debug) {
ShowInfo("connect_check: Found match from deny list:%u.%u.%u.%u IP:%u.%u.%u.%u Mask:%u.%u.%u.%u\n",
CONVIP(ip),
CONVIP(entry->ip),
CONVIP(entry->mask));
}
is_denyip = 1;
break;
}
}
// Decide connection status
// 0 : Reject
// 1 : Accept
// 2 : Unconditional Accept (accepts even if flagged as DDoS)
switch(access_order) {
case ACO_DENY_ALLOW:
default:
if( is_denyip )
connect_ok = 0; // Reject
else if( is_allowip )
connect_ok = 2; // Unconditional Accept
else
connect_ok = 1; // Accept
break;
case ACO_ALLOW_DENY:
if( is_allowip )
connect_ok = 2; // Unconditional Accept
else if( is_denyip )
connect_ok = 0; // Reject
else
connect_ok = 1; // Accept
break;
case ACO_MUTUAL_FAILURE:
if( is_allowip && !is_denyip )
connect_ok = 2; // Unconditional Accept
else
connect_ok = 0; // Reject
break;
}
// Inspect connection history
if( ( hist = uidb_get(connect_history, ip)) ) { //IP found
if( hist->ddos ) {// flagged as DDoS
return (connect_ok == 2 ? 1 : 0);
} else if( DIFF_TICK(timer->gettick(),hist->tick) < ddos_interval ) {// connection within ddos_interval
hist->tick = timer->gettick();
if( ++hist->count >= ddos_count ) {// DDoS attack detected
hist->ddos = 1;
ShowWarning("connect_check: DDoS Attack detected from %u.%u.%u.%u!\n", CONVIP(ip));
return (connect_ok == 2 ? 1 : 0);
}
return connect_ok;
} else {// not within ddos_interval, clear data
hist->tick = timer->gettick();
hist->count = 0;
return connect_ok;
}
}
// IP not found, add to history
CREATE(hist, struct connect_history, 1);
hist->ip = ip;
hist->tick = timer->gettick();
uidb_put(connect_history, ip, hist);
return connect_ok;
}
/// Timer function.
/// Deletes old connection history records.
static int connect_check_clear(int tid, int64 tick, int id, intptr_t data)
{
int clear = 0;
int list = 0;
struct connect_history *hist = NULL;
struct DBIterator *iter;
if( !db_size(connect_history) )
return 0;
iter = db_iterator(connect_history);
for( hist = dbi_first(iter); dbi_exists(iter); hist = dbi_next(iter) ){
if( (!hist->ddos && DIFF_TICK(tick,hist->tick) > ddos_interval*3) ||
(hist->ddos && DIFF_TICK(tick,hist->tick) > ddos_autoreset) )
{// Remove connection history
uidb_remove(connect_history, hist->ip);
clear++;
}
list++;
}
dbi_destroy(iter);
if( access_debug ){
ShowInfo("connect_check_clear: Cleared %d of %d from IP list.\n", clear, list);
}
return list;
}
/// Parses the ip address and mask and puts it into acc.
/// Returns 1 is successful, 0 otherwise.
static int access_ipmask(const char *str, struct access_control *acc)
{
uint32 ip;
uint32 mask;
nullpo_ret(str);
nullpo_ret(acc);
if( strcmp(str,"all") == 0 ) {
ip = 0;
mask = 0;
} else {
unsigned int a[4];
unsigned int m[4];
int n;
if( ((n=sscanf(str,"%u.%u.%u.%u/%u.%u.%u.%u",a,a+1,a+2,a+3,m,m+1,m+2,m+3)) != 8 && // not an ip + standard mask
(n=sscanf(str,"%u.%u.%u.%u/%u",a,a+1,a+2,a+3,m)) != 5 && // not an ip + bit mask
(n=sscanf(str,"%u.%u.%u.%u",a,a+1,a+2,a+3)) != 4 ) || // not an ip
a[0] > 255 || a[1] > 255 || a[2] > 255 || a[3] > 255 || // invalid ip
(n == 8 && (m[0] > 255 || m[1] > 255 || m[2] > 255 || m[3] > 255)) || // invalid standard mask
(n == 5 && m[0] > 32) ){ // invalid bit mask
return 0;
}
ip = MAKEIP(a[0],a[1],a[2],a[3]);
if( n == 8 )
{// standard mask
mask = MAKEIP(m[0],m[1],m[2],m[3]);
} else if( n == 5 )
{// bit mask
mask = 0;
while( m[0] ){
mask = (mask >> 1) | 0x80000000;
--m[0];
}
} else
{// just this ip
mask = 0xFFFFFFFF;
}
}
if( access_debug ){
ShowInfo("access_ipmask: Loaded IP:%u.%u.%u.%u mask:%u.%u.%u.%u\n", CONVIP(ip), CONVIP(mask));
}
acc->ip = ip;
acc->mask = mask;
return 1;
}
/**
* Adds an entry to the access list.
*
* @param setting The setting to read from.
* @param list_name The list name (used in error messages).
* @param access_list The access list to edit.
*
* @retval false in case of failure
*/
static bool access_list_add(struct config_setting_t *setting, const char *list_name, struct access_control_list *access_list)
{
const char *temp = NULL;
int i, setting_length;
nullpo_retr(false, setting);
nullpo_retr(false, list_name);
nullpo_retr(false, access_list);
if ((setting_length = libconfig->setting_length(setting)) <= 0)
return false;
VECTOR_ENSURE(*access_list, setting_length, 1);
for (i = 0; i < setting_length; i++) {
struct access_control acc;
if ((temp = libconfig->setting_get_string_elem(setting, i)) == NULL) {
continue;
}
if (!access_ipmask(temp, &acc)) {
ShowError("access_list_add: Invalid ip or ip range %s '%d'!\n", list_name, i);
continue;
}
VECTOR_PUSH(*access_list, acc);
}
return true;
}
/**
* Reads 'socket_configuration/ip_rules' and initializes required variables.
*
* @param filename Path to configuration file (used in error and warning messages).
* @param config The current config being parsed.
* @param imported Whether the current config is imported from another file.
*
* @retval false in case of error.
*/
static bool socket_config_read_iprules(const char *filename, struct config_t *config, bool imported)
{
struct config_setting_t *setting = NULL;
const char *temp = NULL;
nullpo_retr(false, filename);
nullpo_retr(false, config);
if ((setting = libconfig->lookup(config, "socket_configuration/ip_rules")) == NULL) {
if (imported)
return true;
ShowError("socket_config_read: socket_configuration/ip_rules was not found in %s!\n", filename);
return false;
}
libconfig->setting_lookup_bool(setting, "enable", &ip_rules);
if (!ip_rules)
return true;
if (libconfig->setting_lookup_string(setting, "order", &temp) == CONFIG_TRUE) {
if (strcmpi(temp, "deny,allow" ) == 0) {
access_order = ACO_DENY_ALLOW;
} else if (strcmpi(temp, "allow, deny") == 0) {
access_order = ACO_ALLOW_DENY;
} else if (strcmpi(temp, "mutual-failure") == 0) {
access_order = ACO_MUTUAL_FAILURE;
} else {
ShowWarning("socket_config_read: invalid value '%s' for socket_configuration/ip_rules/order.\n", temp);
}
}
if ((setting = libconfig->lookup(config, "socket_configuration/ip_rules/allow_list")) == NULL) {
if (!imported)
ShowError("socket_config_read: socket_configuration/ip_rules/allow_list was not found in %s!\n", filename);
} else {
access_list_add(setting, "allow_list", &access_allow);
}
if ((setting = libconfig->lookup(config, "socket_configuration/ip_rules/deny_list")) == NULL) {
if (!imported)
ShowError("socket_config_read: socket_configuration/ip_rules/deny_list was not found in %s!\n", filename);
} else {
access_list_add(setting, "deny_list", &access_deny);
}
return true;
}
/**
* Reads 'socket_configuration/ddos' and initializes required variables.
*
* @param filename Path to configuration file (used in error and warning messages).
* @param config The current config being parsed.
* @param imported Whether the current config is imported from another file.
*
* @retval false in case of error.
*/
static bool socket_config_read_ddos(const char *filename, struct config_t *config, bool imported)
{
struct config_setting_t *setting = NULL;
nullpo_retr(false, filename);
nullpo_retr(false, config);
if ((setting = libconfig->lookup(config, "socket_configuration/ddos")) == NULL) {
if (imported)
return true;
ShowError("socket_config_read: socket_configuration/ddos was not found in %s!\n", filename);
return false;
}
libconfig->setting_lookup_int(setting, "interval", &ddos_interval);
libconfig->setting_lookup_int(setting, "count", &ddos_count);
libconfig->setting_lookup_int(setting, "autoreset", &ddos_autoreset);
return true;
}
/**
* Reads 'socket_configuration' and initializes required variables.
*
* @param filename Path to configuration file.
* @param imported Whether the current config is imported from another file.
*
* @retval false in case of error.
*/
static bool socket_config_read(const char *filename, bool imported)
{
struct config_t config;
struct config_setting_t *setting = NULL;
const char *import;
int i32 = 0;
bool retval = true;
nullpo_retr(false, filename);
if (!libconfig->load_file(&config, filename))
return false;
if ((setting = libconfig->lookup(&config, "socket_configuration")) == NULL) {
libconfig->destroy(&config);
if (imported)
return true;
ShowError("socket_config_read: socket_configuration was not found in %s!\n", filename);
return false;
}
if (libconfig->setting_lookup_int(setting, "stall_time", &i32) == CONFIG_TRUE) {
if (i32 < 3)
i32 = 3; /* a minimum is required in order to refrain from killing itself */
sockt->stall_time = i32;
}
#ifdef SOCKET_EPOLL
if (libconfig->setting_lookup_int(setting, "epoll_maxevents", &i32) == CONFIG_TRUE) {
if (i32 < 16)
i32 = 16; // minimum that seems to be useful
epoll_maxevents = i32;
}
#endif // SOCKET_EPOLL
{
uint32 ui32 = 0;
libconfig->setting_lookup_bool(setting, "debug", &access_debug);
if (libconfig->setting_lookup_uint32(setting, "socket_max_client_packet", &ui32) == CONFIG_TRUE) {
socket_max_client_packet = ui32;
}
}
if (!socket_config_read_iprules(filename, &config, imported))
retval = false;
if (!socket_config_read_ddos(filename, &config, imported))
retval = false;
// import should overwrite any previous configuration, so it should be called last
if (libconfig->lookup_string(&config, "import", &import) == CONFIG_TRUE) {
if (strcmp(import, filename) == 0 || strcmp(import, SOCKET_CONF_FILENAME) == 0) {
ShowWarning("socket_config_read: Loop detected! Skipping 'import'...\n");
} else {
if (!socket_config_read(import, true))
retval = false;
}
}
libconfig->destroy(&config);
return retval;
}
static void socket_final(void)
{
int i;
if( connect_history )
db_destroy(connect_history);
VECTOR_CLEAR(access_allow);
VECTOR_CLEAR(access_deny);
for( i = 1; i < sockt->fd_max; i++ )
if(sockt->session[i])
sockt->close(i);
// sockt->session[0]
aFree(sockt->session[0]->rdata);
aFree(sockt->session[0]->wdata);
aFree(sockt->session[0]);
aFree(sockt->session);
VECTOR_CLEAR(sockt->lan_subnets);
VECTOR_CLEAR(sockt->allowed_ips);
VECTOR_CLEAR(sockt->trusted_ips);
#ifdef SOCKET_EPOLL
if(epfd != SOCKET_ERROR){
close(epfd);
epfd = SOCKET_ERROR;
}
if(epevents != NULL){
aFree(epevents);
epevents = NULL;
}
#endif // SOCKET_EPOLL
}
/// Closes a socket.
static void socket_close(int fd)
{
if( fd <= 0 ||fd >= FD_SETSIZE )
return;// invalid
sockt->flush(fd); // Try to send what's left (although it might not succeed since it's a nonblocking socket)
#ifndef SOCKET_EPOLL
// Select based Event Dispatcher
sFD_CLR(fd, &readfds);// this needs to be done before closing the socket
#else // SOCKET_EPOLL
// Epoll based Event Dispatcher
epevent.data.fd = fd;
epevent.events = EPOLLIN;
epoll_ctl(epfd, EPOLL_CTL_DEL, fd, &epevent); // removing the socket from epoll when it's being closed is not required but recommended
#endif // SOCKET_EPOLL
sShutdown(fd, SHUT_RDWR); // Disallow further reads/writes
sClose(fd); // We don't really care if these closing functions return an error, we are just shutting down and not reusing this socket.
if (sockt->session[fd]) delete_session(fd);
}
/// Retrieve local ips in host byte order.
/// Uses loopback is no address is found.
static int socket_getips(uint32 *ips, int max)
{
int num = 0;
if( ips == NULL || max <= 0 )
return 0;
#ifdef WIN32
{
char fullhost[255];
// XXX This should look up the local IP addresses in the registry
// instead of calling gethostbyname. However, the way IP addresses
// are stored in the registry is annoyingly complex, so I'll leave
// this as T.B.D. [Meruru]
if (gethostname(fullhost, sizeof(fullhost)) == SOCKET_ERROR) {
ShowError("socket_getips: No hostname defined!\n");
return 0;
} else {
u_long** a;
struct hostent *hent =gethostbyname(fullhost);
if( hent == NULL ){
ShowError("socket_getips: Cannot resolve our own hostname to an IP address\n");
return 0;
}
a = (u_long**)hent->h_addr_list;
for (; num < max && a[num] != NULL; ++num)
ips[num] = (uint32)ntohl(*a[num]);
}
}
#else // not WIN32
{
int fd;
char buf[2*16*sizeof(struct ifreq)];
struct ifconf ic;
u_long ad;
fd = sSocket(AF_INET, SOCK_STREAM, 0);
if (fd == -1) {
ShowError("socket_getips: Unable to create a socket!\n");
return 0;
}
memset(buf, 0x00, sizeof(buf));
// The ioctl call will fail with Invalid Argument if there are more
// interfaces than will fit in the buffer
ic.ifc_len = sizeof(buf);
ic.ifc_buf = buf;
if (sIoctl(fd, SIOCGIFCONF, &ic) == -1) {
ShowError("socket_getips: SIOCGIFCONF failed!\n");
sClose(fd);
return 0;
} else {
int pos;
for (pos = 0; pos < ic.ifc_len && num < max; ) {
struct ifreq *ir = (struct ifreq*)(buf+pos);
struct sockaddr_in *a = (struct sockaddr_in*) &(ir->ifr_addr);
if (a->sin_family == AF_INET) {
ad = ntohl(a->sin_addr.s_addr);
if (ad != INADDR_LOOPBACK && ad != INADDR_ANY)
ips[num++] = (uint32)ad;
}
#if (defined(BSD) && BSD >= 199103) || defined(_AIX) || defined(__APPLE__)
pos += ir->ifr_addr.sa_len + sizeof(ir->ifr_name);
#else// not AIX or APPLE
pos += sizeof(struct ifreq);
#endif//not AIX or APPLE
}
}
sClose(fd);
}
#endif // not W32
// Use loopback if no ips are found
if( num == 0 )
ips[num++] = (uint32)INADDR_LOOPBACK;
return num;
}
static void socket_init(void)
{
uint64 rlim_cur = FD_SETSIZE;
#ifdef WIN32
{// Start up windows networking
WSADATA wsaData;
WORD wVersionRequested = MAKEWORD(2, 0);
if( WSAStartup(wVersionRequested, &wsaData) != 0 )
{
ShowError("socket_init: WinSock not available!\n");
return;
}
if( LOBYTE(wsaData.wVersion) != 2 || HIBYTE(wsaData.wVersion) != 0 )
{
ShowError("socket_init: WinSock version mismatch (2.0 or compatible required)!\n");
return;
}
}
#elif defined(HAVE_SETRLIMIT) && !defined(CYGWIN)
// NOTE: getrlimit and setrlimit have bogus behavior in cygwin.
// "Number of fds is virtually unlimited in cygwin" (sys/param.h)
{// set socket limit to FD_SETSIZE
struct rlimit rlp;
if( 0 == getrlimit(RLIMIT_NOFILE, &rlp) )
{
rlp.rlim_cur = FD_SETSIZE;
if( 0 != setrlimit(RLIMIT_NOFILE, &rlp) )
{// failed, try setting the maximum too (permission to change system limits is required)
rlp.rlim_max = FD_SETSIZE;
if( 0 != setrlimit(RLIMIT_NOFILE, &rlp) )
{// failed
const char *errmsg = error_msg();
int rlim_ori;
// set to maximum allowed
getrlimit(RLIMIT_NOFILE, &rlp);
rlim_ori = (int)rlp.rlim_cur;
rlp.rlim_cur = rlp.rlim_max;
setrlimit(RLIMIT_NOFILE, &rlp);
// report limit
getrlimit(RLIMIT_NOFILE, &rlp);
rlim_cur = rlp.rlim_cur;
ShowWarning("socket_init: failed to set socket limit to %d, setting to maximum allowed (original limit=%d, current limit=%d, maximum allowed=%d, %s).\n", FD_SETSIZE, rlim_ori, (int)rlp.rlim_cur, (int)rlp.rlim_max, errmsg);
}
}
}
}
#endif // defined(HAVE_SETRLIMIT) && !defined(CYGWIN)
VECTOR_INIT(access_allow);
VECTOR_INIT(access_deny);
// Get initial local ips
sockt->naddr_ = sockt->getips(sockt->addr_,16);
socket_config_read(SOCKET_CONF_FILENAME, false);
#ifndef SOCKET_EPOLL
// Select based Event Dispatcher:
sFD_ZERO(&readfds);
ShowInfo("Server uses '" CL_WHITE "select" CL_RESET "' as event dispatcher\n");
#else // SOCKET_EPOLL
// Epoll based Event Dispatcher:
epfd = epoll_create(FD_SETSIZE); // 2.6.8 or newer ignores the expected socket amount argument
if(epfd == SOCKET_ERROR){
ShowError("Failed to Create Epoll Event Dispatcher: %s\n", error_msg());
exit(EXIT_FAILURE);
}
memset(&epevent, 0x00, sizeof(struct epoll_event));
epevents = aCalloc(epoll_maxevents, sizeof(struct epoll_event));
ShowInfo("Server uses '" CL_WHITE "epoll" CL_RESET "' with up to " CL_WHITE "%d" CL_RESET " events per cycle as event dispatcher\n", epoll_maxevents);
#endif // SOCKET_EPOLL
#if defined(SEND_SHORTLIST)
memset(send_shortlist_set, 0, sizeof(send_shortlist_set));
#endif // defined(SEND_SHORTLIST)
CREATE(sockt->session, struct socket_data *, FD_SETSIZE);
// initialize last send-receive tick
sockt->last_tick = time(NULL);
// sockt->session[0] is now currently used for disconnected sessions of the map server, and as such,
// should hold enough buffer (it is a vacuum so to speak) as it is never flushed. [Skotlex]
create_session(0, null_recv, null_send, null_parse);
// Delete old connection history every 5 minutes
connect_history = uidb_alloc(DB_OPT_RELEASE_DATA);
timer->add_func_list(connect_check_clear, "connect_check_clear");
timer->add_interval(timer->gettick()+1000, connect_check_clear, 0, 0, 5*60*1000);
ShowInfo("Server supports up to '"CL_WHITE"%"PRIu64""CL_RESET"' concurrent connections.\n", rlim_cur);
}
static bool session_is_valid(int fd)
{
return ( fd > 0 && fd < FD_SETSIZE && sockt->session[fd] != NULL );
}
static bool session_is_active(int fd)
{
return ( sockt->session_is_valid(fd) && !sockt->session[fd]->flag.eof );
}
// Resolves hostname into a numeric ip.
static uint32 host2ip(const char *hostname)
{
struct hostent* h;
nullpo_ret(hostname);
h = gethostbyname(hostname);
return (h != NULL) ? ntohl(*(uint32*)h->h_addr) : 0;
}
/**
* Converts a numeric ip into a dot-formatted string.
*
* @param ip Numeric IP to convert.
* @param ip_str Output buffer, optional (if provided, must have size greater or equal to 16).
*
* @return A pointer to the output string.
*/
static const char *ip2str(uint32 ip, char *ip_str)
{
struct in_addr addr;
addr.s_addr = htonl(ip);
return (ip_str == NULL) ? inet_ntoa(addr) : strncpy(ip_str, inet_ntoa(addr), 16);
}
// Converts a dot-formatted ip string into a numeric ip.
static uint32 str2ip(const char *ip_str)
{
return ntohl(inet_addr(ip_str));
}
// Reorders bytes from network to little endian (Windows).
// Necessary for sending port numbers to the RO client until Gravity notices that they forgot ntohs() calls.
static uint16 ntows(uint16 netshort)
{
return ((netshort & 0xFF) << 8) | ((netshort & 0xFF00) >> 8);
}
/* [Ind/Hercules] - socket_datasync */
static void socket_datasync(int fd, bool send)
{
struct {
unsigned int length;/* short is not enough for some */
} data_list[] = {
{ sizeof(struct mmo_charstatus) },
{ sizeof(struct quest) },
{ sizeof(struct item) },
{ sizeof(struct point) },
{ sizeof(struct s_skill) },
{ sizeof(struct status_change_data) },
{ sizeof(struct storage_data) },
{ sizeof(struct guild_storage) },
{ sizeof(struct s_pet) },
{ sizeof(struct s_mercenary) },
{ sizeof(struct s_homunculus) },
{ sizeof(struct s_elemental) },
{ sizeof(struct s_friend) },
{ sizeof(struct mail_message) },
{ sizeof(struct mail_data) },
{ sizeof(struct party_member) },
{ sizeof(struct party) },
{ sizeof(struct guild_member) },
{ sizeof(struct guild_position) },
{ sizeof(struct guild_alliance) },
{ sizeof(struct guild_expulsion) },
{ sizeof(struct guild_skill) },
{ sizeof(struct guild) },
{ sizeof(struct guild_castle) },
{ sizeof(struct fame_list) },
{ PACKETVER },
};
unsigned short i;
unsigned int alen = ARRAYLENGTH(data_list);
if( send ) {
unsigned short p_len = ( alen * 4 ) + 4;
WFIFOHEAD(fd, p_len);
WFIFOW(fd, 0) = 0x2b0a;
WFIFOW(fd, 2) = p_len;
for( i = 0; i < alen; i++ ) {
WFIFOL(fd, 4 + ( i * 4 ) ) = data_list[i].length;
}
WFIFOSET(fd, p_len);
} else {
for( i = 0; i < alen; i++ ) {
if( RFIFOL(fd, 4 + (i * 4) ) != data_list[i].length ) {
/* force the other to go wrong too so both are taken down */
WFIFOHEAD(fd, 8);
WFIFOW(fd, 0) = 0x2b0a;
WFIFOW(fd, 2) = 8;
WFIFOL(fd, 4) = 0;
WFIFOSET(fd, 8);
sockt->flush(fd);
/* shut down */
ShowFatalError("Servers are out of sync! recompile from scratch (%d)\n",i);
exit(EXIT_FAILURE);
}
}
}
}
#ifdef SEND_SHORTLIST
// Add a fd to the shortlist so that it'll be recognized as a fd that needs
// sending or eof handling.
static void send_shortlist_add_fd(int fd)
{
int i;
int bit;
if (!sockt->session_is_valid(fd))
return;// out of range
i = fd/32;
bit = fd%32;
if( (send_shortlist_set[i]>>bit)&1 )
return;// already in the list
if (send_shortlist_count >= ARRAYLENGTH(send_shortlist_array)) {
ShowDebug("send_shortlist_add_fd: shortlist is full, ignoring... (fd=%d shortlist.count=%d shortlist.length=%d)\n",
fd, send_shortlist_count, ARRAYLENGTH(send_shortlist_array));
return;
}
// set the bit
send_shortlist_set[i] |= 1<<bit;
// Add to the end of the shortlist array.
send_shortlist_array[send_shortlist_count++] = fd;
}
// Do pending network sends and eof handling from the shortlist.
static void send_shortlist_do_sends(void)
{
int i;
for( i = send_shortlist_count-1; i >= 0; --i )
{
int fd = send_shortlist_array[i];
int idx = fd/32;
int bit = fd%32;
// Remove fd from shortlist, move the last fd to the current position
--send_shortlist_count;
send_shortlist_array[i] = send_shortlist_array[send_shortlist_count];
send_shortlist_array[send_shortlist_count] = 0;
if( fd <= 0 || fd >= FD_SETSIZE )
{
ShowDebug("send_shortlist_do_sends: fd is out of range, corrupted memory? (fd=%d)\n", fd);
continue;
}
if( ((send_shortlist_set[idx]>>bit)&1) == 0 )
{
ShowDebug("send_shortlist_do_sends: fd is not set, why is it in the shortlist? (fd=%d)\n", fd);
continue;
}
send_shortlist_set[idx]&=~(1<<bit);// unset fd
// If this session still exists, perform send operations on it and
// check for the eof state.
if( sockt->session[fd] )
{
// Send data
if( sockt->session[fd]->wdata_size )
sockt->session[fd]->func_send(fd);
// If it's been marked as eof, call the parse func on it so that
// the socket will be immediately closed.
if( sockt->session[fd]->flag.eof )
sockt->session[fd]->func_parse(fd);
// If the session still exists, is not eof and has things left to
// be sent from it we'll re-add it to the shortlist.
if( sockt->session[fd] && !sockt->session[fd]->flag.eof && sockt->session[fd]->wdata_size )
send_shortlist_add_fd(fd);
}
}
}
#endif // SEND_SHORTLIST
/**
* Checks whether the given IP comes from LAN or WAN.
*
* @param[in] ip IP address to check.
* @param[out] info Verbose output, if requested. Filled with the matching entry. Ignored if NULL.
* @retval 0 if it is a WAN IP.
* @return the appropriate LAN server address to send, if it is a LAN IP.
*/
static uint32 socket_lan_subnet_check(uint32 ip, struct s_subnet *info)
{
int i;
ARR_FIND(0, VECTOR_LENGTH(sockt->lan_subnets), i, SUBNET_MATCH(ip, VECTOR_INDEX(sockt->lan_subnets, i).ip, VECTOR_INDEX(sockt->lan_subnets, i).mask));
if (i != VECTOR_LENGTH(sockt->lan_subnets)) {
if (info) {
info->ip = VECTOR_INDEX(sockt->lan_subnets, i).ip;
info->mask = VECTOR_INDEX(sockt->lan_subnets, i).mask;
}
return VECTOR_INDEX(sockt->lan_subnets, i).ip;
}
if (info) {
info->ip = info->mask = 0;
}
return 0;
}
/**
* Checks whether the given IP is allowed to connect as a server.
*
* @param ip IP address to check.
* @retval true if we allow server connections from the given IP.
* @retval false otherwise.
*/
static bool socket_allowed_ip_check(uint32 ip)
{
int i;
ARR_FIND(0, VECTOR_LENGTH(sockt->allowed_ips), i, SUBNET_MATCH(ip, VECTOR_INDEX(sockt->allowed_ips, i).ip, VECTOR_INDEX(sockt->allowed_ips, i).mask));
if (i != VECTOR_LENGTH(sockt->allowed_ips))
return true;
return sockt->trusted_ip_check(ip); // If an address is trusted, it's automatically also allowed.
}
/**
* Checks whether the given IP is trusted and can skip ipban checks.
*
* @param ip IP address to check.
* @retval true if we trust the given IP.
* @retval false otherwise.
*/
static bool socket_trusted_ip_check(uint32 ip)
{
int i;
ARR_FIND(0, VECTOR_LENGTH(sockt->trusted_ips), i, SUBNET_MATCH(ip, VECTOR_INDEX(sockt->trusted_ips, i).ip, VECTOR_INDEX(sockt->trusted_ips, i).mask));
if (i != VECTOR_LENGTH(sockt->trusted_ips))
return true;
return false;
}
/**
* Helper function to read a list of network.conf values.
*
* Entries will be appended to the variable-size array pointed to by list/count.
*
* @param[in] t The list to parse.
* @param[in,out] list Vector to append to. Must not be NULL (but the vector may be empty).
* @param[in] filename Current filename, for output/logging reasons.
* @param[in] groupname Current group name, for output/logging reasons.
* @return The amount of entries read, zero in case of errors.
*/
static int socket_net_config_read_sub(struct config_setting_t *t, struct s_subnet_vector *list, const char *filename, const char *groupname)
{
int i, len;
char ipbuf[64], maskbuf[64];
nullpo_retr(0, list);
if (t == NULL)
return 0;
len = libconfig->setting_length(t);
VECTOR_ENSURE(*list, len, 1);
for (i = 0; i < len; ++i) {
const char *subnet = libconfig->setting_get_string_elem(t, i);
struct s_subnet *entry = NULL;
if (sscanf(subnet, "%63[^:]:%63[^:]", ipbuf, maskbuf) != 2) {
ShowWarning("Invalid IP:Subnet entry in configuration file %s: '%s' (%s)\n", filename, subnet, groupname);
continue;
}
VECTOR_PUSHZEROED(*list);
entry = &VECTOR_LAST(*list);
entry->ip = sockt->str2ip(ipbuf);
entry->mask = sockt->str2ip(maskbuf);
}
return (int)VECTOR_LENGTH(*list);
}
/**
* Reads the network configuration file.
*
* @param filename The filename to read from.
*/
static void socket_net_config_read(const char *filename)
{
struct config_t network_config;
int i;
nullpo_retv(filename);
if (!libconfig->load_file(&network_config, filename)) {
ShowError("LAN Support configuration file is not found: '%s'. This server won't be able to accept connections from any servers.\n", filename);
return;
}
VECTOR_CLEAR(sockt->lan_subnets);
if (sockt->net_config_read_sub(libconfig->lookup(&network_config, "lan_subnets"), &sockt->lan_subnets, filename, "lan_subnets") > 0)
ShowStatus("Read information about %d LAN subnets.\n", (int)VECTOR_LENGTH(sockt->lan_subnets));
VECTOR_CLEAR(sockt->trusted_ips);
if (sockt->net_config_read_sub(libconfig->lookup(&network_config, "trusted"), &sockt->trusted_ips, filename, "trusted") > 0)
ShowStatus("Read information about %d trusted IP ranges.\n", (int)VECTOR_LENGTH(sockt->trusted_ips));
ARR_FIND(0, VECTOR_LENGTH(sockt->trusted_ips), i, SUBNET_MATCH(0, VECTOR_INDEX(sockt->trusted_ips, i).ip, VECTOR_INDEX(sockt->trusted_ips, i).mask));
if (i != VECTOR_LENGTH(sockt->trusted_ips)) {
ShowError("Using a wildcard IP range in the trusted server IPs is NOT RECOMMENDED.\n");
ShowNotice("Please edit your '%s' trusted list to fit your network configuration.\n", filename);
}
VECTOR_CLEAR(sockt->allowed_ips);
if (sockt->net_config_read_sub(libconfig->lookup(&network_config, "allowed"), &sockt->allowed_ips, filename, "allowed") > 0)
ShowStatus("Read information about %d allowed server IP ranges.\n", (int)VECTOR_LENGTH(sockt->allowed_ips));
if (VECTOR_LENGTH(sockt->allowed_ips) + VECTOR_LENGTH(sockt->trusted_ips) == 0) {
ShowError("No allowed server IP ranges configured. This server won't be able to accept connections from any char servers.\n");
}
ARR_FIND(0, VECTOR_LENGTH(sockt->allowed_ips), i, SUBNET_MATCH(0, VECTOR_INDEX(sockt->allowed_ips, i).ip, VECTOR_INDEX(sockt->allowed_ips, i).mask));
#ifndef BUILDBOT
if (i != VECTOR_LENGTH(sockt->allowed_ips)) {
ShowWarning("Using a wildcard IP range in the allowed server IPs is NOT RECOMMENDED.\n");
ShowNotice("Please edit your '%s' allowed list to fit your network configuration.\n", filename);
}
#endif // BUILDBOT
libconfig->destroy(&network_config);
return;
}
static void socket_validateWfifo(int fd, size_t len)
{
if (len < 2) {
ShowError("Sent packet with size smaller than 2\n");
Assert_retv(0);
return;
}
const uint cmd = (uint)WFIFOW(fd, 0);
if (cmd < MIN_PACKET_DB || cmd > MAX_PACKET_DB) {
ShowError("Sent wrong packet id: 0x%04X\n", cmd);
Assert_retv(0);
return;
}
if (len > 65535) {
ShowError("Sent packet with size bigger than 65535\n");
Assert_retv(0);
return;
}
int packet_len = packets->db[cmd];
const int len2 = (int)len;
if (packet_len == -1) {
if (len2 < 4) {
ShowError("Sent packet with size smaller than 2\n");
Assert_retv(0);
return;
}
packet_len = WFIFOW(fd, 2);
if (packet_len != len2) {
ShowError("Sent packet 0x%04X with dynamic size %d, but must be size %d \n", cmd, len2, packet_len);
Assert_retv(0);
}
} else if (packet_len != len2) {
ShowError("Sent packet 0x%04X with size %d, but must be size %d \n", cmd, len2, packet_len);
Assert_retv(0);
}
}
void socket_defaults(void)
{
sockt = &sockt_s;
sockt->fd_max = 0;
/* */
sockt->stall_time = 60;
sockt->last_tick = 0;
/* */
memset(&sockt->addr_, 0, sizeof(sockt->addr_));
sockt->naddr_ = 0;
sockt->validate = false;
/* */
VECTOR_INIT(sockt->lan_subnets);
VECTOR_INIT(sockt->allowed_ips);
VECTOR_INIT(sockt->trusted_ips);
sockt->init = socket_init;
sockt->final = socket_final;
/* */
sockt->perform = do_sockets;
/* */
sockt->datasync = socket_datasync;
/* */
sockt->make_listen_bind = make_listen_bind;
sockt->make_connection = make_connection;
sockt->realloc_fifo = realloc_fifo;
sockt->realloc_writefifo = realloc_writefifo;
sockt->wfifoset = wfifoset;
sockt->rfifoskip = rfifoskip;
sockt->close = socket_close;
/* */
sockt->session_is_valid = session_is_valid;
sockt->session_is_active = session_is_active;
/* */
sockt->flush = flush_fifo;
sockt->flush_fifos = flush_fifos;
sockt->set_nonblocking = set_nonblocking;
sockt->set_defaultparse = set_defaultparse;
sockt->host2ip = host2ip;
sockt->ip2str = ip2str;
sockt->str2ip = str2ip;
sockt->ntows = ntows;
sockt->getips = socket_getips;
sockt->eof = set_eof;
sockt->lan_subnet_check = socket_lan_subnet_check;
sockt->allowed_ip_check = socket_allowed_ip_check;
sockt->trusted_ip_check = socket_trusted_ip_check;
sockt->net_config_read_sub = socket_net_config_read_sub;
sockt->net_config_read = socket_net_config_read;
sockt->validateWfifo = socket_validateWfifo;
}