ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/client.c
Revision: 8311
Committed: Wed Feb 28 16:55:06 2018 UTC (6 years, 1 month ago) by michael
Content type: text/x-csrc
File size: 32266 byte(s)
Log Message:
- client.c:client_free(): set client_p->connection = NULL after freeing it

File Contents

# Content
1 /*
2 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 *
4 * Copyright (c) 1997-2018 ircd-hybrid development team
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
19 * USA
20 */
21
22 /*! \file client.c
23 * \brief Controls clients.
24 * \version $Id$
25 */
26
27 #include "stdinc.h"
28 #include "list.h"
29 #include "client.h"
30 #include "event.h"
31 #include "hash.h"
32 #include "irc_string.h"
33 #include "ircd.h"
34 #include "numeric.h"
35 #include "auth.h"
36 #include "s_bsd.h"
37 #include "conf.h"
38 #include "conf_gecos.h"
39 #include "log.h"
40 #include "misc.h"
41 #include "server.h"
42 #include "send.h"
43 #include "whowas.h"
44 #include "user.h"
45 #include "memory.h"
46 #include "mempool.h"
47 #include "hostmask.h"
48 #include "listener.h"
49 #include "userhost.h"
50 #include "watch.h"
51 #include "rng_mt.h"
52 #include "parse.h"
53 #include "ipcache.h"
54
55
56 dlink_list listing_client_list;
57 dlink_list unknown_list;
58 dlink_list local_client_list;
59 dlink_list local_server_list;
60 dlink_list global_client_list;
61 dlink_list global_server_list;
62 dlink_list oper_list;
63
64 static mp_pool_t *client_pool, *connection_pool;
65 static dlink_list dead_list, abort_list;
66 static dlink_node *eac_next; /* next aborted client to exit */
67
68
69 /*
70 * make_client - create a new Client struct and set it to initial state.
71 *
72 * from == NULL, create local client (a client connected
73 * to a socket).
74 * WARNING: This leaves the client in a dangerous
75 * state where fd == -1, dead flag is not set and
76 * the client is on the unknown_list; therefore,
77 * the first thing to do after calling make_client(NULL)
78 * is setting fd to something reasonable. -adx
79 *
80 * from, create remote client (behind a socket
81 * associated with the client defined by
82 * 'from'). ('from' is a local client!!).
83 */
84 struct Client *
85 client_make(struct Client *from)
86 {
87 struct Client *const client_p = mp_pool_get(client_pool);
88
89 if (from)
90 client_p->from = from;
91 else
92 {
93 client_p->from = client_p; /* 'from' of local client is self! */
94 client_p->connection = mp_pool_get(connection_pool);
95 client_p->connection->since = CurrentTime;
96 client_p->connection->lasttime = CurrentTime;
97 client_p->connection->firsttime = CurrentTime;
98 client_p->connection->registration = REG_INIT;
99
100 /* as good a place as any... */
101 dlinkAdd(client_p, &client_p->connection->lclient_node, &unknown_list);
102 }
103
104 client_p->idhnext = client_p;
105 client_p->hnext = client_p;
106 SetUnknown(client_p);
107 strcpy(client_p->username, "unknown");
108 strcpy(client_p->account, "*");
109
110 return client_p;
111 }
112
113 /*
114 * client_free
115 *
116 * inputs - pointer to client
117 * output - NONE
118 * side effects - client pointed to has its memory freed
119 */
120 static void
121 client_free(struct Client *client_p)
122 {
123 assert(!IsMe(client_p));
124 assert(client_p != &me);
125 assert(client_p->hnext == client_p);
126 assert(client_p->idhnext == client_p);
127 assert(client_p->channel.head == NULL);
128 assert(client_p->whowas_list.head == NULL);
129 assert(client_p->svstags.head == NULL);
130 assert(dlink_list_length(&client_p->channel) == 0);
131 assert(dlink_list_length(&client_p->whowas_list) == 0);
132 assert(dlink_list_length(&client_p->svstags) == 0);
133
134 xfree(client_p->serv);
135 xfree(client_p->certfp);
136
137 if (MyConnect(client_p))
138 {
139 assert(client_p->connection->lclient_node.next == NULL);
140 assert(client_p->connection->lclient_node.prev == NULL);
141 assert(client_p->connection->list_task == NULL);
142 assert(client_p->connection->confs.head == NULL);
143 assert(client_p->connection->acceptlist.head == NULL);
144 assert(client_p->connection->invited.head == NULL);
145 assert(client_p->connection->watches.head == NULL);
146 assert(dlink_list_length(&client_p->connection->confs) == 0);
147 assert(dlink_list_length(&client_p->connection->acceptlist) == 0);
148 assert(dlink_list_length(&client_p->connection->invited) == 0);
149 assert(dlink_list_length(&client_p->connection->watches) == 0);
150 assert(HasFlag(client_p, FLAGS_CLOSING) && IsDead(client_p));
151 assert(client_p->connection->auth.node.next == NULL);
152 assert(client_p->connection->auth.node.prev == NULL);
153 assert(client_p->connection->auth.flags == 0);
154 assert(client_p->connection->auth.fd.fd == 0);
155 assert(client_p->connection->auth.client == NULL || client_p->connection->auth.client == client_p);
156
157
158 /*
159 * Clean up extra sockets from listen {} blocks which have been discarded.
160 */
161 if (client_p->connection->listener)
162 {
163 listener_release(client_p->connection->listener);
164 client_p->connection->listener = NULL;
165 }
166
167 dbuf_clear(&client_p->connection->buf_recvq);
168 dbuf_clear(&client_p->connection->buf_sendq);
169
170 mp_pool_release(client_p->connection);
171 client_p->connection = NULL;
172 }
173
174 mp_pool_release(client_p);
175 }
176
177 void
178 client_attach_svstag(struct Client *client_p, unsigned int numeric,
179 const char *umodes, const char *tag)
180 {
181 const struct user_modes *tab = NULL;
182
183 if (numeric >= ERR_LAST_ERR_MSG || *umodes != '+')
184 return;
185
186 struct ServicesTag *svstag = xcalloc(sizeof(*svstag));
187 svstag->numeric = numeric;
188 svstag->tag = xstrdup(tag);
189
190 for (const char *m = umodes + 1; *m; ++m)
191 if ((tab = umode_map[(unsigned char)*m]))
192 svstag->umodes |= tab->flag;
193
194 if (numeric != RPL_WHOISOPERATOR)
195 dlinkAddTail(svstag, &svstag->node, &client_p->svstags);
196 else
197 dlinkAdd(svstag, &svstag->node, &client_p->svstags);
198 }
199
200 void
201 client_clear_svstags(struct Client *client_p)
202 {
203 while (client_p->svstags.head)
204 {
205 struct ServicesTag *svstag = client_p->svstags.head->data;
206
207 dlinkDelete(&svstag->node, &client_p->svstags);
208 xfree(svstag->tag);
209 xfree(svstag);
210 }
211 }
212
213 /* check_pings_list()
214 *
215 * inputs - pointer to list to check
216 * output - NONE
217 * side effects -
218 */
219 static void
220 check_pings_list(dlink_list *list)
221 {
222 char buf[32] = ""; /* 32 = sizeof("Ping timeout: 999999999 seconds") */
223 unsigned int ping = 0; /* ping time value from client */
224 dlink_node *node = NULL, *node_next = NULL;
225
226 DLINK_FOREACH_SAFE(node, node_next, list->head)
227 {
228 struct Client *client_p = node->data;
229
230 if (IsDead(client_p))
231 continue; /* Ignore it, its been exited already */
232
233 if (IsClient(client_p) || IsServer(client_p))
234 ping = get_client_ping(&client_p->connection->confs);
235 else
236 ping = CONNECTTIMEOUT;
237
238 if (ping < CurrentTime - client_p->connection->lasttime)
239 {
240 if (!HasFlag(client_p, FLAGS_PINGSENT))
241 {
242 /*
243 * If we haven't PINGed the connection and we haven't
244 * heard from it in a while, PING it to make sure
245 * it is still alive.
246 */
247 AddFlag(client_p, FLAGS_PINGSENT);
248 client_p->connection->lasttime = CurrentTime - ping;
249 sendto_one(client_p, "PING :%s", ID_or_name(&me, client_p));
250 }
251 else
252 {
253 if (CurrentTime - client_p->connection->lasttime >= 2 * ping)
254 {
255 /*
256 * If the client/server hasn't talked to us in 2*ping seconds
257 * and it has a ping time, then close its connection.
258 */
259 if (IsServer(client_p) || IsHandshake(client_p))
260 {
261 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
262 "No response from %s, closing link",
263 client_get_name(client_p, SHOW_IP));
264 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
265 "No response from %s, closing link",
266 client_get_name(client_p, MASK_IP));
267 ilog(LOG_TYPE_IRCD, "No response from %s, closing link",
268 client_get_name(client_p, SHOW_IP));
269 }
270
271 snprintf(buf, sizeof(buf), "Ping timeout: %ji seconds",
272 (CurrentTime - client_p->connection->lasttime));
273 exit_client(client_p, buf);
274 }
275 }
276 }
277 }
278 }
279
280 /* check_unknowns_list()
281 *
282 * inputs - pointer to list of unknown clients
283 * output - NONE
284 * side effects - unknown clients get marked for termination after n seconds
285 */
286 static void
287 check_unknowns_list(void)
288 {
289 dlink_node *node = NULL, *node_next = NULL;
290
291 DLINK_FOREACH_SAFE(node, node_next, unknown_list.head)
292 {
293 struct Client *client_p = node->data;
294
295 /*
296 * Check UNKNOWN connections - if they have been in this state
297 * for > 30s, close them.
298 */
299 if (HasFlag(client_p, FLAGS_FINISHED_AUTH) && (CurrentTime - client_p->connection->firsttime) > 30)
300 exit_client(client_p, "Registration timed out");
301 }
302 }
303
304 /*
305 * check_pings - go through the local client list and check activity
306 * kill off stuff that should die
307 *
308 * inputs - NOT USED (from event)
309 * side effects -
310 *
311 *
312 * A PING can be sent to clients as necessary.
313 *
314 * Client/Server ping outs are handled.
315 */
316
317 /*
318 * Addon from adrian. We used to call this after nextping seconds,
319 * however I've changed it to run once a second. This is only for
320 * PING timeouts, not K/etc-line checks (thanks dianora!). Having it
321 * run once a second makes life a lot easier - when a new client connects
322 * and they need a ping in 4 seconds, if nextping was set to 20 seconds
323 * we end up waiting 20 seconds. This is stupid. :-)
324 * I will optimise (hah!) check_pings() once I've finished working on
325 * tidying up other network IO evilnesses.
326 * -- adrian
327 */
328
329 static void
330 check_pings(void *unused)
331 {
332 check_pings_list(&local_client_list);
333 check_pings_list(&local_server_list);
334 check_unknowns_list();
335 }
336
337 /* check_conf_klines()
338 *
339 * inputs - NONE
340 * output - NONE
341 * side effects - Check all connections for a pending kline against the
342 * client, exit the client if a kline matches.
343 */
344 void
345 check_conf_klines(void)
346 {
347 dlink_node *node = NULL, *node_next = NULL;
348 const void *ptr;
349
350 DLINK_FOREACH_SAFE(node, node_next, local_client_list.head)
351 {
352 struct Client *client_p = node->data;
353
354 /* If a client is already being exited */
355 if (IsDead(client_p))
356 continue;
357
358 if ((ptr = find_conf_by_address(NULL, &client_p->connection->ip, CONF_DLINE,
359 client_p->connection->aftype, NULL, NULL, 1)))
360 {
361 const struct MaskItem *conf = ptr;
362 conf_try_ban(client_p, CLIENT_BAN_DLINE, conf->reason);
363 continue; /* and go examine next Client */
364 }
365
366 if ((ptr = find_conf_by_address(client_p->host, &client_p->connection->ip,
367 CONF_KLINE, client_p->connection->aftype,
368 client_p->username, NULL, 1)))
369 {
370 const struct MaskItem *conf = ptr;
371 conf_try_ban(client_p, CLIENT_BAN_KLINE, conf->reason);
372 continue; /* and go examine next Client */
373 }
374
375 if ((ptr = gecos_find(client_p->info, match)))
376 {
377 const struct GecosItem *conf = ptr;
378 conf_try_ban(client_p, CLIENT_BAN_XLINE, conf->reason);
379 continue; /* and go examine next Client */
380 }
381 }
382
383 /* Also check the unknowns list for new dlines */
384 DLINK_FOREACH_SAFE(node, node_next, unknown_list.head)
385 {
386 struct Client *client_p = node->data;
387
388 if ((ptr = find_conf_by_address(NULL, &client_p->connection->ip, CONF_DLINE,
389 client_p->connection->aftype, NULL, NULL, 1)))
390 {
391 const struct MaskItem *conf = ptr;
392 conf_try_ban(client_p, CLIENT_BAN_DLINE, conf->reason);
393 continue; /* and go examine next Client */
394 }
395 }
396 }
397
398 /*
399 * conf_try_ban
400 *
401 * inputs - pointer to client to ban
402 * - pointer to MaskItem
403 * output - NONE
404 * side effects - given client_p is banned
405 */
406 void
407 conf_try_ban(struct Client *client_p, int type, const char *reason)
408 {
409 char ban_type = '?';
410
411 switch (type)
412 {
413 case CLIENT_BAN_KLINE:
414 if (HasFlag(client_p, FLAGS_EXEMPTKLINE))
415 {
416 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
417 "KLINE over-ruled for %s, client is kline_exempt",
418 client_get_name(client_p, HIDE_IP));
419 return;
420 }
421
422 ban_type = 'K';
423 break;
424 case CLIENT_BAN_DLINE:
425 if (find_conf_by_address(NULL, &client_p->connection->ip, CONF_EXEMPT,
426 client_p->connection->aftype, NULL, NULL, 1))
427 return;
428 ban_type = 'D';
429 break;
430 case CLIENT_BAN_XLINE:
431 if (HasFlag(client_p, FLAGS_EXEMPTXLINE))
432 {
433 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
434 "XLINE over-ruled for %s, client is xline_exempt",
435 client_get_name(client_p, HIDE_IP));
436 return;
437 }
438
439 ban_type = 'X';
440 break;
441 default:
442 assert(0);
443 break;
444 }
445
446 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE, "%c-line active for %s",
447 ban_type, client_get_name(client_p, HIDE_IP));
448
449 if (IsClient(client_p))
450 sendto_one_numeric(client_p, &me, ERR_YOUREBANNEDCREEP, reason);
451
452 exit_client(client_p, reason);
453 }
454
455 /* find_person()
456 *
457 * inputs - pointer to name
458 * output - return client pointer
459 * side effects - find person by (nick)name
460 */
461 struct Client *
462 find_person(const struct Client *source_p, const char *name)
463 {
464 struct Client *target_p = NULL;
465
466 if (IsDigit(*name))
467 {
468 if (IsServer(source_p->from))
469 target_p = hash_find_id(name);
470 }
471 else
472 target_p = hash_find_client(name);
473
474 return (target_p && IsClient(target_p)) ? target_p : NULL;
475 }
476
477 /*
478 * find_chasing - find the client structure for a nick name (name)
479 * using history mechanism if necessary. If the client is not found,
480 * an error message (NO SUCH NICK) is generated.
481 */
482 struct Client *
483 find_chasing(struct Client *source_p, const char *name)
484 {
485 struct Client *target_p = find_person(source_p, name);
486
487 if (target_p)
488 return target_p;
489
490 if (IsDigit(*name))
491 return NULL;
492
493 target_p = whowas_get_history(name, ConfigGeneral.kill_chase_time_limit);
494 if (!target_p)
495 sendto_one_numeric(source_p, &me, ERR_NOSUCHNICK, name);
496
497 return target_p;
498 }
499
500 /*
501 * client_get_name - Return the name of the client
502 * for various tracking and
503 * admin purposes. The main purpose of this function is to
504 * return the "socket host" name of the client, if that
505 * differs from the advertised name (other than case).
506 * But, this can be used to any client structure.
507 *
508 * NOTE 1:
509 * Watch out the allocation of "buf", if either source_p->name
510 * or source_p->sockhost gets changed into pointers instead of
511 * directly allocated within the structure...
512 *
513 * NOTE 2:
514 * Function return either a pointer to the structure (source_p) or
515 * to internal buffer (buf). *NEVER* use the returned pointer
516 * to modify what it points!!!
517 */
518 const char *
519 client_get_name(const struct Client *client_p, enum addr_mask_type type)
520 {
521 static char buf[HOSTLEN * 2 + USERLEN + 4]; /* +4 for [,@,],\0 */
522
523 if (!MyConnect(client_p))
524 return client_p->name;
525
526 if (IsServer(client_p) || IsConnecting(client_p) || IsHandshake(client_p))
527 {
528 if (!irccmp(client_p->name, client_p->host))
529 return client_p->name;
530 else if (ConfigServerHide.hide_server_ips)
531 type = MASK_IP;
532 }
533
534 /* And finally, let's get the host information, ip or name */
535 switch (type)
536 {
537 case SHOW_IP:
538 snprintf(buf, sizeof(buf), "%s[%s@%s]",
539 client_p->name,
540 client_p->username, client_p->sockhost);
541 break;
542 case MASK_IP:
543 if (client_p->connection->aftype == AF_INET)
544 snprintf(buf, sizeof(buf), "%s[%s@255.255.255.255]",
545 client_p->name, client_p->username);
546 else
547 snprintf(buf, sizeof(buf), "%s[%s@ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]",
548 client_p->name, client_p->username);
549 break;
550 default: /* HIDE_IP */
551 snprintf(buf, sizeof(buf), "%s[%s@%s]",
552 client_p->name,
553 client_p->username, client_p->host);
554 }
555
556 return buf;
557 }
558
559 void
560 free_exited_clients(void)
561 {
562 dlink_node *node, *node_next;
563
564 DLINK_FOREACH_SAFE(node, node_next, dead_list.head)
565 {
566 client_free(node->data);
567 dlinkDelete(node, &dead_list);
568 free_dlink_node(node);
569 }
570 }
571
572 /*
573 * Exit one client, local or remote. Assuming all dependents have
574 * been already removed, and socket closed for local client.
575 *
576 * The only messages generated are QUITs on channels.
577 */
578 static void
579 exit_one_client(struct Client *source_p, const char *comment)
580 {
581 dlink_node *node, *node_next;
582
583 assert(!IsMe(source_p));
584 assert(source_p != &me);
585
586 if (IsClient(source_p))
587 {
588 if (HasUMode(source_p, UMODE_OPER))
589 --Count.oper;
590 if (HasUMode(source_p, UMODE_INVISIBLE))
591 --Count.invisi;
592
593 dlinkDelete(&source_p->lnode, &source_p->servptr->serv->client_list);
594 dlinkDelete(&source_p->node, &global_client_list);
595
596 /*
597 * If a person is on a channel, send a QUIT notice
598 * to every client (person) on the same channel (so
599 * that the client can show the "**signoff" message).
600 * (Note: The notice is to the local clients *only*)
601 */
602 sendto_common_channels_local(source_p, 0, 0, 0, ":%s!%s@%s QUIT :%s",
603 source_p->name, source_p->username,
604 source_p->host, comment);
605
606 DLINK_FOREACH_SAFE(node, node_next, source_p->channel.head)
607 remove_user_from_channel(node->data);
608
609 client_clear_svstags(source_p);
610
611 whowas_add_history(source_p, 0);
612 whowas_off_history(source_p);
613
614 watch_check_hash(source_p, RPL_LOGOFF);
615
616 if (MyConnect(source_p))
617 {
618 clear_invite_list(&source_p->connection->invited);
619 del_all_accepts(source_p);
620 }
621 }
622 else if (IsServer(source_p))
623 {
624 sendto_realops_flags(UMODE_EXTERNAL, L_ALL, SEND_NOTICE,
625 "Server %s split from %s",
626 source_p->name, source_p->servptr->name);
627
628 dlinkDelete(&source_p->lnode, &source_p->servptr->serv->server_list);
629 dlinkDelete(&source_p->node, &global_server_list);
630 }
631
632 /* Remove source_p from the client lists */
633 if (source_p->id[0])
634 hash_del_id(source_p);
635
636 if (source_p->name[0])
637 hash_del_client(source_p);
638
639 if (HasFlag(source_p, FLAGS_USERHOST))
640 userhost_del(source_p->sockhost, !MyConnect(source_p));
641
642 /* Check to see if the client isn't already on the dead list */
643 assert(dlinkFind(&dead_list, source_p) == NULL);
644
645 /* add to dead client dlist */
646 SetDead(source_p);
647 dlinkAdd(source_p, make_dlink_node(), &dead_list);
648 }
649
650 /*
651 * Remove all clients that depend on source_p; assumes all (S)QUITs have
652 * already been sent. we make sure to exit a server's dependent clients
653 * and servers before the server itself; exit_one_client takes care of
654 * actually removing things off llists. tweaked from +CSr31 -orabidoo
655 */
656 static void
657 recurse_remove_clients(struct Client *source_p, const char *comment)
658 {
659 dlink_node *node, *node_next;
660
661 DLINK_FOREACH_SAFE(node, node_next, source_p->serv->client_list.head)
662 exit_one_client(node->data, comment);
663
664 DLINK_FOREACH_SAFE(node, node_next, source_p->serv->server_list.head)
665 {
666 recurse_remove_clients(node->data, comment);
667 exit_one_client(node->data, comment);
668 }
669 }
670
671 /*
672 * exit_client - exit a client of any type. Generally, you can use
673 * this on any struct Client, regardless of its state.
674 *
675 * Note, you shouldn't exit remote _users_ without first doing
676 * AddFlag(x, FLAGS_KILLED) and propagating a kill or similar message.
677 *
678 * However, it is perfectly correct to call exit_client to force a _server_
679 * quit (either local or remote one).
680 *
681 *
682 * inputs: - a client pointer that is going to be exited
683 * output: none
684 * side effects: the client is delinked from all lists, disconnected,
685 * and the rest of IRC network is notified of the exit.
686 * Client memory is scheduled to be freed
687 */
688 void
689 exit_client(struct Client *source_p, const char *comment)
690 {
691 assert(!IsMe(source_p));
692 assert(source_p != &me);
693
694 if (MyConnect(source_p))
695 {
696 /*
697 * DO NOT REMOVE. exit_client can be called twice after a failed read/write.
698 */
699 if (HasFlag(source_p, FLAGS_CLOSING))
700 return;
701
702 AddFlag(source_p, FLAGS_CLOSING);
703
704 if (HasFlag(source_p, FLAGS_IPHASH))
705 {
706 DelFlag(source_p, FLAGS_IPHASH);
707 ipcache_remove_address(&source_p->connection->ip);
708 }
709
710 auth_delete(&source_p->connection->auth);
711
712 if (IsClient(source_p))
713 {
714 dlink_node *node;
715
716 if (HasUMode(source_p, UMODE_OPER))
717 if ((node = dlinkFindDelete(&oper_list, source_p)))
718 free_dlink_node(node);
719
720 assert(dlinkFind(&local_client_list, source_p));
721 dlinkDelete(&source_p->connection->lclient_node, &local_client_list);
722
723 if (source_p->connection->list_task)
724 free_list_task(source_p);
725
726 watch_del_watch_list(source_p);
727
728 sendto_realops_flags(UMODE_CCONN, L_ALL, SEND_NOTICE,
729 "Client exiting: %s (%s@%s) [%s] [%s]",
730 source_p->name, source_p->username, source_p->realhost,
731 source_p->sockhost, comment);
732
733 ilog(LOG_TYPE_USER, "%s (%ju): %s!%s@%s %s %s %ju/%ju :%s",
734 date_ctime(source_p->connection->firsttime),
735 CurrentTime - source_p->connection->firsttime,
736 source_p->name, source_p->username, source_p->host,
737 source_p->sockhost, source_p->account,
738 source_p->connection->send.bytes >> 10,
739 source_p->connection->recv.bytes >> 10, source_p->info);
740 }
741 else if (IsServer(source_p))
742 {
743 assert(dlinkFind(&local_server_list, source_p));
744 dlinkDelete(&source_p->connection->lclient_node, &local_server_list);
745 }
746 else
747 {
748 assert(dlinkFind(&unknown_list, source_p));
749 dlinkDelete(&source_p->connection->lclient_node, &unknown_list);
750 }
751
752 if (!IsDead(source_p))
753 {
754 if (IsServer(source_p))
755 {
756 if (!HasFlag(source_p, FLAGS_SQUIT))
757 {
758 /* for them, we are exiting the network */
759 sendto_one(source_p, ":%s SQUIT %s :%s",
760 me.id, me.id, comment);
761 }
762 }
763
764 sendto_one(source_p, "ERROR :Closing Link: %s (%s)",
765 source_p->host, comment);
766 }
767
768 close_connection(source_p);
769 }
770 else if (IsClient(source_p) && HasFlag(source_p->servptr, FLAGS_EOB))
771 sendto_realops_flags(UMODE_FARCONNECT, L_ALL, SEND_NOTICE,
772 "Client exiting at %s: %s (%s@%s) [%s] [%s]",
773 source_p->servptr->name, source_p->name,
774 source_p->username, source_p->realhost, source_p->sockhost, comment);
775
776 if (IsServer(source_p))
777 {
778 char splitstr[HOSTLEN + HOSTLEN + 2] = "";
779
780 assert(source_p->serv);
781 assert(source_p->servptr);
782
783 if (ConfigServerHide.hide_servers)
784 /*
785 * Set netsplit message to "*.net *.split" to still show
786 * that its a split, but hide the servers splitting
787 */
788 strlcpy(splitstr, "*.net *.split", sizeof(splitstr));
789 else
790 snprintf(splitstr, sizeof(splitstr), "%s %s",
791 source_p->servptr->name, source_p->name);
792
793 /* Send SQUIT for source_p in every direction. source_p is already off of local_server_list here */
794 if (!HasFlag(source_p, FLAGS_SQUIT))
795 sendto_server(NULL, 0, 0, "SQUIT %s :%s", source_p->id, comment);
796
797 /* Now exit the clients internally */
798 recurse_remove_clients(source_p, splitstr);
799
800 if (MyConnect(source_p))
801 {
802 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
803 "%s was connected for %s. %ju/%ju sendK/recvK.",
804 source_p->name, time_dissect(CurrentTime - source_p->connection->firsttime),
805 source_p->connection->send.bytes >> 10,
806 source_p->connection->recv.bytes >> 10);
807 ilog(LOG_TYPE_IRCD, "%s was connected for %s. %ju/%ju sendK/recvK.",
808 source_p->name, time_dissect(CurrentTime - source_p->connection->firsttime),
809 source_p->connection->send.bytes >> 10,
810 source_p->connection->recv.bytes >> 10);
811 }
812 }
813 else if (IsClient(source_p) && !HasFlag(source_p, FLAGS_KILLED))
814 sendto_server(source_p->from, 0, 0, ":%s QUIT :%s", source_p->id, comment);
815
816 /* The client *better* be off all of the lists */
817 assert(dlinkFind(&unknown_list, source_p) == NULL);
818 assert(dlinkFind(&local_client_list, source_p) == NULL);
819 assert(dlinkFind(&local_server_list, source_p) == NULL);
820 assert(dlinkFind(&oper_list, source_p) == NULL);
821 assert(dlinkFind(&listing_client_list, source_p) == NULL);
822
823 exit_one_client(source_p, comment);
824 }
825
826 /*
827 * dead_link_on_write - report a write error if not already dead,
828 * mark it as dead then exit it
829 */
830 void
831 dead_link_on_write(struct Client *client_p, int ierrno)
832 {
833 dlink_node *node;
834
835 if (IsDefunct(client_p))
836 return;
837
838 dbuf_clear(&client_p->connection->buf_recvq);
839 dbuf_clear(&client_p->connection->buf_sendq);
840
841 assert(dlinkFind(&abort_list, client_p) == NULL);
842 node = make_dlink_node();
843 /* don't let exit_aborted_clients() finish yet */
844 dlinkAddTail(client_p, node, &abort_list);
845
846 if (eac_next == NULL)
847 eac_next = node;
848
849 SetDead(client_p); /* You are dead my friend */
850 }
851
852 /*
853 * dead_link_on_read - report a read error if not already dead,
854 * mark it as dead then exit it
855 */
856 void
857 dead_link_on_read(struct Client *client_p, int error)
858 {
859 char errmsg[IRCD_BUFSIZE];
860 int current_error;
861
862 if (IsDefunct(client_p))
863 return;
864
865 dbuf_clear(&client_p->connection->buf_recvq);
866 dbuf_clear(&client_p->connection->buf_sendq);
867
868 current_error = get_sockerr(client_p->connection->fd.fd);
869
870 if (IsServer(client_p) || IsHandshake(client_p))
871 {
872 if (error == 0)
873 {
874 /* Admins get the real IP */
875 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
876 "Server %s closed the connection",
877 client_get_name(client_p, SHOW_IP));
878
879 /* Opers get a masked IP */
880 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
881 "Server %s closed the connection",
882 client_get_name(client_p, MASK_IP));
883
884 ilog(LOG_TYPE_IRCD, "Server %s closed the connection",
885 client_get_name(client_p, SHOW_IP));
886 }
887 else
888 {
889 report_error(L_ADMIN, "Lost connection to %s: %s",
890 client_get_name(client_p, SHOW_IP), current_error);
891 report_error(L_OPER, "Lost connection to %s: %s",
892 client_get_name(client_p, MASK_IP), current_error);
893 }
894
895 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
896 "%s was connected for %s",
897 client_p->name, time_dissect(CurrentTime - client_p->connection->firsttime));
898 }
899
900 if (error == 0)
901 strlcpy(errmsg, "Remote host closed the connection",
902 sizeof(errmsg));
903 else
904 snprintf(errmsg, sizeof(errmsg), "Read error: %s",
905 strerror(current_error));
906
907 exit_client(client_p, errmsg);
908 }
909
910 void
911 exit_aborted_clients(void)
912 {
913 dlink_node *ptr;
914 struct Client *target_p;
915 const char *notice;
916
917 DLINK_FOREACH_SAFE(ptr, eac_next, abort_list.head)
918 {
919 target_p = ptr->data;
920 eac_next = ptr->next;
921
922 dlinkDelete(ptr, &abort_list);
923 free_dlink_node(ptr);
924
925 if (target_p == NULL)
926 {
927 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
928 "Warning: null client on abort_list!");
929 continue;
930 }
931
932 if (HasFlag(target_p, FLAGS_SENDQEX))
933 notice = "Max SendQ exceeded";
934 else
935 notice = "Write error: connection closed";
936
937 exit_client(target_p, notice);
938 }
939 }
940
941 /*
942 * accept processing, this adds a form of "caller ID" to ircd
943 *
944 * If a client puts themselves into "caller ID only" mode,
945 * only clients that match a client pointer they have put on
946 * the accept list will be allowed to message them.
947 *
948 * Diane Bruce, "Dianora" db@db.net
949 */
950
951 void
952 del_accept(struct split_nuh_item *accept_p, struct Client *client_p)
953 {
954 dlinkDelete(&accept_p->node, &client_p->connection->acceptlist);
955
956 xfree(accept_p->nickptr);
957 xfree(accept_p->userptr);
958 xfree(accept_p->hostptr);
959 xfree(accept_p);
960 }
961
962 struct split_nuh_item *
963 find_accept(const char *nick, const char *user,
964 const char *host, struct Client *client_p,
965 int (*cmpfunc)(const char *, const char *))
966 {
967 dlink_node *node;
968
969 DLINK_FOREACH(node, client_p->connection->acceptlist.head)
970 {
971 struct split_nuh_item *accept_p = node->data;
972
973 if (!cmpfunc(accept_p->nickptr, nick) &&
974 !cmpfunc(accept_p->userptr, user) &&
975 !cmpfunc(accept_p->hostptr, host))
976 return accept_p;
977 }
978
979 return NULL;
980 }
981
982 /* accept_message()
983 *
984 * inputs - pointer to source client
985 * - pointer to target client
986 * output - 1 if accept this message 0 if not
987 * side effects - See if source is on target's allow list
988 */
989 int
990 accept_message(struct Client *source,
991 struct Client *target)
992 {
993 dlink_node *node;
994
995 if (HasFlag(source, FLAGS_SERVICE) ||
996 (HasUMode(source, UMODE_OPER) && ConfigGeneral.opers_bypass_callerid))
997 return 1;
998
999 if (source == target || find_accept(source->name, source->username,
1000 source->host, target, match))
1001 return 1;
1002
1003 if (!HasUMode(target, UMODE_CALLERID) && HasUMode(target, UMODE_SOFTCALLERID))
1004 DLINK_FOREACH(node, target->channel.head)
1005 if (IsMember(source, ((struct Membership *)node->data)->chptr))
1006 return 1;
1007
1008 return 0;
1009 }
1010
1011 /* del_all_accepts()
1012 *
1013 * inputs - pointer to exiting client
1014 * output - NONE
1015 * side effects - Walk through given clients acceptlist and remove all entries
1016 */
1017 void
1018 del_all_accepts(struct Client *client_p)
1019 {
1020 dlink_node *node, *node_next;
1021
1022 DLINK_FOREACH_SAFE(node, node_next, client_p->connection->acceptlist.head)
1023 del_accept(node->data, client_p);
1024 }
1025
1026 unsigned int
1027 client_get_idle_time(const struct Client *source_p,
1028 const struct Client *target_p)
1029 {
1030 unsigned int idle = 0;
1031 const struct ClassItem *const class = get_class_ptr(&target_p->connection->confs);
1032
1033 if (!(class->flags & CLASS_FLAGS_FAKE_IDLE) || target_p == source_p)
1034 return CurrentTime - target_p->connection->last_privmsg;
1035
1036 if (HasUMode(source_p, UMODE_OPER) &&
1037 !(class->flags & CLASS_FLAGS_HIDE_IDLE_FROM_OPERS))
1038 return CurrentTime - target_p->connection->last_privmsg;
1039
1040 const unsigned int min_idle = class->min_idle;
1041 const unsigned int max_idle = class->max_idle;
1042
1043 if (min_idle == max_idle)
1044 return min_idle;
1045
1046 if (class->flags & CLASS_FLAGS_RANDOM_IDLE)
1047 idle = genrand_int32();
1048 else
1049 idle = CurrentTime - target_p->connection->last_privmsg;
1050
1051 if (max_idle)
1052 idle %= max_idle;
1053 else
1054 idle = 0;
1055
1056 if (idle < min_idle)
1057 idle = min_idle + (idle % (max_idle - min_idle));
1058
1059 return idle;
1060 }
1061
1062 /* client_init()
1063 *
1064 * inputs - NONE
1065 * output - NONE
1066 * side effects - initialize client free memory
1067 */
1068 void
1069 client_init(void)
1070 {
1071 static struct event event_ping =
1072 {
1073 .name = "check_pings",
1074 .handler = check_pings,
1075 .when = 5
1076 };
1077
1078 client_pool = mp_pool_new(sizeof(struct Client), MP_CHUNK_SIZE_CLIENT);
1079 connection_pool = mp_pool_new(sizeof(struct Connection), MP_CHUNK_SIZE_CONNECTION);
1080 event_add(&event_ping, NULL);
1081 }

Properties

Name Value
svn:eol-style native
svn:keywords Id