|
@@ -1,95 +1,387 @@
|
|
|
#include "tunnel.h"
|
|
|
|
|
|
+void data_from_local_or_fec_timeout(conn_info_t & conn_info,int is_time_out)
|
|
|
+{
|
|
|
+ fd64_t &remote_fd64=conn_info.remote_fd64;
|
|
|
+ int & local_listen_fd=conn_info.local_listen_fd;
|
|
|
+
|
|
|
+ char data[buf_len];
|
|
|
+ int data_len;
|
|
|
+ ip_port_t ip_port;
|
|
|
+ u32_t conv;
|
|
|
+ int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
|
|
|
+ dest_t dest;
|
|
|
+ dest.type=type_fd64;
|
|
|
+ dest.inner.fd64=remote_fd64;
|
|
|
+ dest.cook=1;
|
|
|
+
|
|
|
+ if(is_time_out)
|
|
|
+ {
|
|
|
+ //fd64_t fd64=events[idx].data.u64;
|
|
|
+ mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
|
|
|
+
|
|
|
+ //uint64_t value;
|
|
|
+ //if(!fd_manager.exist(fd64)) //fd64 has been closed
|
|
|
+ //{
|
|
|
+ // mylog(log_trace,"!fd_manager.exist(fd64)");
|
|
|
+ // continue;
|
|
|
+ //}
|
|
|
+ //if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
|
|
|
+ //{
|
|
|
+ // mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
|
|
|
+ // continue;
|
|
|
+ //}
|
|
|
+ //if(value==0)
|
|
|
+ //{
|
|
|
+ // mylog(log_debug,"value==0\n");
|
|
|
+ // continue;
|
|
|
+ //}
|
|
|
+ //assert(value==1);
|
|
|
+ from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
|
|
|
+ }
|
|
|
+ else//events[idx].data.u64 == (u64_t)local_listen_fd
|
|
|
+ {
|
|
|
+ mylog(log_trace,"events[idx].data.u64 == (u64_t)local_listen_fd\n");
|
|
|
+ struct sockaddr_in udp_new_addr_in={0};
|
|
|
+ socklen_t udp_new_addr_len = sizeof(sockaddr_in);
|
|
|
+ if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
|
|
|
+ (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
|
|
|
+ mylog(log_error,"recv_from error,this shouldnt happen,err=%s,but we can try to continue\n",strerror(errno));
|
|
|
+ return;
|
|
|
+ };
|
|
|
+
|
|
|
+ if(!disable_mtu_warn&&data_len>=mtu_warn)
|
|
|
+ {
|
|
|
+ mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
|
|
|
+ }
|
|
|
+ mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
|
|
|
+ ntohs(udp_new_addr_in.sin_port),data_len);
|
|
|
+
|
|
|
+ ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
|
|
|
+ ip_port.port=ntohs(udp_new_addr_in.sin_port);
|
|
|
+
|
|
|
+ u64_t u64=ip_port.to_u64();
|
|
|
+
|
|
|
+ if(!conn_info.conv_manager.is_u64_used(u64))
|
|
|
+ {
|
|
|
+ if(conn_info.conv_manager.get_size() >=max_conv_num)
|
|
|
+ {
|
|
|
+ mylog(log_warn,"ignored new udp connect bc max_conv_num exceed\n");
|
|
|
+ return;
|
|
|
+ }
|
|
|
+ conv=conn_info.conv_manager.get_new_conv();
|
|
|
+ conn_info.conv_manager.insert_conv(conv,u64);
|
|
|
+ mylog(log_info,"new packet from %s:%d,conv_id=%x\n",inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port),conv);
|
|
|
+ }
|
|
|
+ else
|
|
|
+ {
|
|
|
+ conv=conn_info.conv_manager.find_conv_by_u64(u64);
|
|
|
+ mylog(log_trace,"conv=%d\n",conv);
|
|
|
+ }
|
|
|
+ conn_info.conv_manager.update_active_time(conv);
|
|
|
+ char * new_data;
|
|
|
+ int new_len;
|
|
|
+ put_conv(conv,data,data_len,new_data,new_len);
|
|
|
+
|
|
|
+
|
|
|
+ mylog(log_trace,"data_len=%d new_len=%d\n",data_len,new_len);
|
|
|
+ from_normal_to_fec(conn_info,new_data,new_len,out_n,out_arr,out_len,out_delay);
|
|
|
+
|
|
|
+ }
|
|
|
+ mylog(log_trace,"out_n=%d\n",out_n);
|
|
|
+ for(int i=0;i<out_n;i++)
|
|
|
+ {
|
|
|
+ delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
|
|
|
+ }
|
|
|
+}
|
|
|
+static void local_listen_cb(struct ev_loop *loop, struct ev_io *watcher, int revents)
|
|
|
+{
|
|
|
+ assert(!(revents&EV_ERROR));
|
|
|
+
|
|
|
+ conn_info_t & conn_info= *((conn_info_t*)watcher->data);
|
|
|
+
|
|
|
+ data_from_local_or_fec_timeout(conn_info,0);
|
|
|
+}
|
|
|
+
|
|
|
+static void remote_cb(struct ev_loop *loop, struct ev_io *watcher, int revents)
|
|
|
+{
|
|
|
+ assert(!(revents&EV_ERROR));
|
|
|
+
|
|
|
+ conn_info_t & conn_info= *((conn_info_t*)watcher->data);
|
|
|
+
|
|
|
+ char data[buf_len];
|
|
|
+ if(!fd_manager.exist(watcher->u64)) //fd64 has been closed
|
|
|
+ {
|
|
|
+ mylog(log_trace,"!fd_manager.exist(events[idx].data.u64)");
|
|
|
+ return;
|
|
|
+ }
|
|
|
+ fd64_t &remote_fd64=conn_info.remote_fd64;
|
|
|
+ int &remote_fd=conn_info.remote_fd;
|
|
|
+
|
|
|
+ assert(watcher->u64==remote_fd64);
|
|
|
+
|
|
|
+ int fd=fd_manager.to_fd(remote_fd64);
|
|
|
+
|
|
|
+ int data_len =recv(fd,data,max_data_len,0);
|
|
|
+ mylog(log_trace, "received data from udp fd %d, len=%d\n", remote_fd,data_len);
|
|
|
+ if(data_len<0)
|
|
|
+ {
|
|
|
+ if(errno==ECONNREFUSED)
|
|
|
+ {
|
|
|
+ mylog(log_debug, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
|
|
|
+ }
|
|
|
+
|
|
|
+ mylog(log_warn, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
|
|
|
+ return;
|
|
|
+ }
|
|
|
+ if(!disable_mtu_warn&&data_len>mtu_warn)
|
|
|
+ {
|
|
|
+ mylog(log_warn,"huge packet,data len=%d (>%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
|
|
|
+ }
|
|
|
+
|
|
|
+ if(de_cook(data,data_len)!=0)
|
|
|
+ {
|
|
|
+ mylog(log_debug,"de_cook error");
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
|
|
|
+ from_fec_to_normal(conn_info,data,data_len,out_n,out_arr,out_len,out_delay);
|
|
|
+
|
|
|
+ mylog(log_trace,"out_n=%d\n",out_n);
|
|
|
+
|
|
|
+ for(int i=0;i<out_n;i++)
|
|
|
+ {
|
|
|
+ u32_t conv;
|
|
|
+ char *new_data;
|
|
|
+ int new_len;
|
|
|
+ if(get_conv(conv,out_arr[i],out_len[i],new_data,new_len)!=0)
|
|
|
+ {
|
|
|
+ mylog(log_debug,"get_conv(conv,out_arr[i],out_len[i],new_data,new_len)!=0");
|
|
|
+ continue;
|
|
|
+ }
|
|
|
+ if(!conn_info.conv_manager.is_conv_used(conv))
|
|
|
+ {
|
|
|
+ mylog(log_trace,"!conn_info.conv_manager.is_conv_used(conv)");
|
|
|
+ continue;
|
|
|
+ }
|
|
|
+
|
|
|
+ conn_info.conv_manager.update_active_time(conv);
|
|
|
+
|
|
|
+ u64_t u64=conn_info.conv_manager.find_u64_by_conv(conv);
|
|
|
+ dest_t dest;
|
|
|
+ dest.inner.fd_ip_port.fd=conn_info.local_listen_fd;
|
|
|
+ dest.inner.fd_ip_port.ip_port.from_u64(u64);
|
|
|
+ dest.type=type_fd_ip_port;
|
|
|
+
|
|
|
+ delay_send(out_delay[i],dest,new_data,new_len);
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+static void fifo_cb(struct ev_loop *loop, struct ev_io *watcher, int revents)
|
|
|
+{
|
|
|
+ assert(!(revents&EV_ERROR));
|
|
|
+ int fifo_fd=watcher->fd;
|
|
|
+
|
|
|
+ char buf[buf_len];
|
|
|
+ int len=read (fifo_fd, buf, sizeof (buf));
|
|
|
+ if(len<0)
|
|
|
+ {
|
|
|
+ mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
|
|
|
+ return;
|
|
|
+ }
|
|
|
+ buf[len]=0;
|
|
|
+ handle_command(buf);
|
|
|
+}
|
|
|
+
|
|
|
+static void delay_manager_cb(struct ev_loop *loop, struct ev_timer *watcher, int revents)
|
|
|
+{
|
|
|
+ assert(!(revents&EV_ERROR));
|
|
|
+
|
|
|
+ //do nothing
|
|
|
+}
|
|
|
+
|
|
|
+static void fec_encode_cb(struct ev_loop *loop, struct ev_timer *watcher, int revents)
|
|
|
+{
|
|
|
+ assert(!(revents&EV_ERROR));
|
|
|
+
|
|
|
+ conn_info_t & conn_info= *((conn_info_t*)watcher->data);
|
|
|
+
|
|
|
+ data_from_local_or_fec_timeout(conn_info,1);
|
|
|
+
|
|
|
+}
|
|
|
+
|
|
|
+static void conn_timer_cb(struct ev_loop *loop, struct ev_timer *watcher, int revents)
|
|
|
+{
|
|
|
+ assert(!(revents&EV_ERROR));
|
|
|
+
|
|
|
+ uint64_t value;
|
|
|
+
|
|
|
+ conn_info_t & conn_info= *((conn_info_t*)watcher->data);
|
|
|
+
|
|
|
+ //read(conn_info.timer.get_timer_fd(), &value, 8);
|
|
|
+ conn_info.conv_manager.clear_inactive();
|
|
|
+ mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
|
|
|
+
|
|
|
+ conn_info.stat.report_as_client();
|
|
|
+
|
|
|
+ if(debug_force_flush_fec)
|
|
|
+ {
|
|
|
+ int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
|
|
|
+ dest_t dest;
|
|
|
+ dest.type=type_fd64;
|
|
|
+ dest.inner.fd64=conn_info.remote_fd64;
|
|
|
+ dest.cook=1;
|
|
|
+ from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
|
|
|
+ for(int i=0;i<out_n;i++)
|
|
|
+ {
|
|
|
+ delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
|
|
|
+ }
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+static void prepare_cb(struct ev_loop *loop, struct ev_prepare *watcher, int revents)
|
|
|
+{
|
|
|
+ assert(!(revents&EV_ERROR));
|
|
|
+
|
|
|
+ delay_manager.check();
|
|
|
+}
|
|
|
+
|
|
|
int tunnel_client_event_loop()
|
|
|
{
|
|
|
int i, j, k;int ret;
|
|
|
int yes = 1;
|
|
|
- int epoll_fd;
|
|
|
- int remote_fd;
|
|
|
- fd64_t remote_fd64;
|
|
|
+ //int epoll_fd;
|
|
|
+
|
|
|
|
|
|
conn_info_t *conn_info_p=new conn_info_t;
|
|
|
conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
|
|
|
|
|
|
- int local_listen_fd;
|
|
|
+ int &local_listen_fd=conn_info.local_listen_fd;
|
|
|
new_listen_socket(local_listen_fd,local_ip_uint32,local_port);
|
|
|
|
|
|
- epoll_fd = epoll_create1(0);
|
|
|
- assert(epoll_fd>0);
|
|
|
+ //epoll_fd = epoll_create1(0);
|
|
|
+ //assert(epoll_fd>0);
|
|
|
|
|
|
- const int max_events = 4096;
|
|
|
- struct epoll_event ev, events[max_events];
|
|
|
- if (epoll_fd < 0) {
|
|
|
- mylog(log_fatal,"epoll return %d\n", epoll_fd);
|
|
|
- myexit(-1);
|
|
|
- }
|
|
|
+ //const int max_events = 4096;
|
|
|
+ //struct epoll_event ev, events[max_events];
|
|
|
+ //if (epoll_fd < 0) {
|
|
|
+ // mylog(log_fatal,"epoll return %d\n", epoll_fd);
|
|
|
+ // myexit(-1);
|
|
|
+ //}
|
|
|
|
|
|
- ev.events = EPOLLIN;
|
|
|
- ev.data.u64 = local_listen_fd;
|
|
|
- ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
|
|
|
- if (ret!=0) {
|
|
|
- mylog(log_fatal,"add udp_listen_fd error\n");
|
|
|
- myexit(-1);
|
|
|
- }
|
|
|
+ struct ev_loop * loop= ev_default_loop(0);
|
|
|
+ assert(loop != NULL);
|
|
|
+
|
|
|
+ //ev.events = EPOLLIN;
|
|
|
+ //ev.data.u64 = local_listen_fd;
|
|
|
+ //ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
|
|
|
+ //if (ret!=0) {
|
|
|
+ // mylog(log_fatal,"add udp_listen_fd error\n");
|
|
|
+ // myexit(-1);
|
|
|
+ //}
|
|
|
+ struct ev_io local_listen_watcher;
|
|
|
+ local_listen_watcher.data=&conn_info;
|
|
|
+
|
|
|
+ ev_io_init(&local_listen_watcher, local_listen_cb, local_listen_fd, EV_READ);
|
|
|
+ ev_io_start(loop, &local_listen_watcher);
|
|
|
+
|
|
|
+ int & remote_fd=conn_info.remote_fd;
|
|
|
+ fd64_t &remote_fd64=conn_info.remote_fd64;
|
|
|
|
|
|
assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
|
|
|
remote_fd64=fd_manager.create(remote_fd);
|
|
|
|
|
|
mylog(log_debug,"remote_fd64=%llu\n",remote_fd64);
|
|
|
|
|
|
- ev.events = EPOLLIN;
|
|
|
- ev.data.u64 = remote_fd64;
|
|
|
+ //ev.events = EPOLLIN;
|
|
|
+ //ev.data.u64 = remote_fd64;
|
|
|
|
|
|
- ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
|
|
|
- if (ret!= 0) {
|
|
|
- mylog(log_fatal,"add raw_fd error\n");
|
|
|
- myexit(-1);
|
|
|
- }
|
|
|
+ //ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
|
|
|
+ //if (ret!= 0) {
|
|
|
+ // mylog(log_fatal,"add raw_fd error\n");
|
|
|
+ // myexit(-1);
|
|
|
+ //}
|
|
|
|
|
|
- ev.events = EPOLLIN;
|
|
|
- ev.data.u64 = delay_manager.get_timer_fd();
|
|
|
+ struct ev_io remote_watcher;
|
|
|
+ remote_watcher.data=&conn_info;
|
|
|
+ remote_watcher.u64=remote_fd64;
|
|
|
|
|
|
- mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
|
|
|
- ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
|
|
|
- if (ret!= 0) {
|
|
|
- mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
|
|
|
- myexit(-1);
|
|
|
- }
|
|
|
+ ev_io_init(&remote_watcher, remote_cb, remote_fd, EV_READ);
|
|
|
+ ev_io_start(loop, &remote_watcher);
|
|
|
|
|
|
- u64_t tmp_fd64=conn_info.fec_encode_manager.get_timer_fd64();
|
|
|
- ev.events = EPOLLIN;
|
|
|
- ev.data.u64 = tmp_fd64;
|
|
|
|
|
|
- mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
|
|
|
- ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_fd64), &ev);
|
|
|
- if (ret!= 0) {
|
|
|
- mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
|
|
|
- myexit(-1);
|
|
|
- }
|
|
|
+ //ev.events = EPOLLIN;
|
|
|
+ //ev.data.u64 = delay_manager.get_timer_fd();
|
|
|
+
|
|
|
+ //mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
|
|
|
+ //ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
|
|
|
+ //if (ret!= 0) {
|
|
|
+ // mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
|
|
|
+ // myexit(-1);
|
|
|
+ //}
|
|
|
+
|
|
|
+ delay_manager.set_loop_and_cb(loop,delay_manager_cb);
|
|
|
+
|
|
|
+ conn_info.fec_encode_manager.set_data(&conn_info);
|
|
|
+ conn_info.fec_encode_manager.set_loop_and_cb(loop,fec_encode_cb);
|
|
|
+
|
|
|
+ //u64_t tmp_fd64=conn_info.fec_encode_manager.get_timer_fd64();
|
|
|
+ //ev.events = EPOLLIN;
|
|
|
+ //ev.data.u64 = tmp_fd64;
|
|
|
+
|
|
|
+ //mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
|
|
|
+ //ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_fd64), &ev);
|
|
|
+ //if (ret!= 0) {
|
|
|
+ // mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
|
|
|
+ // myexit(-1);
|
|
|
+ //}
|
|
|
+
|
|
|
+ conn_info.timer.data=&conn_info;
|
|
|
+ ev_init(&conn_info.timer,conn_timer_cb);
|
|
|
+ ev_timer_set(&conn_info.timer, 0, timer_interval/1000.0 );
|
|
|
+ ev_timer_start(loop,&conn_info.timer);
|
|
|
+ //conn_info.timer.add_fd_to_epoll(epoll_fd);
|
|
|
+ //conn_info.timer.set_timer_repeat_us(timer_interval*1000);
|
|
|
|
|
|
- conn_info.timer.add_fd_to_epoll(epoll_fd);
|
|
|
- conn_info.timer.set_timer_repeat_us(timer_interval*1000);
|
|
|
+ //mylog(log_debug,"conn_info.timer.get_timer_fd()=%d\n",conn_info.timer.get_timer_fd());
|
|
|
|
|
|
- mylog(log_debug,"conn_info.timer.get_timer_fd()=%d\n",conn_info.timer.get_timer_fd());
|
|
|
|
|
|
|
|
|
|
|
|
+ struct ev_io fifo_watcher;
|
|
|
+
|
|
|
int fifo_fd=-1;
|
|
|
|
|
|
if(fifo_file[0]!=0)
|
|
|
{
|
|
|
fifo_fd=create_fifo(fifo_file);
|
|
|
- ev.events = EPOLLIN;
|
|
|
- ev.data.u64 = fifo_fd;
|
|
|
+ //ev.events = EPOLLIN;
|
|
|
+ //ev.data.u64 = fifo_fd;
|
|
|
+
|
|
|
+ //ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
|
|
|
+ //if (ret!= 0) {
|
|
|
+ // mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
|
|
|
+ // myexit(-1);
|
|
|
+ //}
|
|
|
+ //mylog(log_info,"fifo_file=%s\n",fifo_file);
|
|
|
+
|
|
|
+ ev_io_init(&fifo_watcher, fifo_cb, fifo_fd, EV_READ);
|
|
|
+ ev_io_start(loop, &fifo_watcher);
|
|
|
|
|
|
- ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
|
|
|
- if (ret!= 0) {
|
|
|
- mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
|
|
|
- myexit(-1);
|
|
|
- }
|
|
|
- mylog(log_info,"fifo_file=%s\n",fifo_file);
|
|
|
}
|
|
|
|
|
|
+ ev_prepare prepare_watcher;
|
|
|
+ ev_init(&prepare_watcher,prepare_cb);
|
|
|
+ ev_prepare_start(loop,&prepare_watcher);
|
|
|
+
|
|
|
+
|
|
|
+ ev_run(loop, 0);
|
|
|
+
|
|
|
+ mylog(log_warn,"ev_run returned\n");
|
|
|
+ myexit(0);
|
|
|
+
|
|
|
+ /*
|
|
|
while(1)////////////////////////
|
|
|
{
|
|
|
if(about_to_exit) myexit(0);
|
|
@@ -110,199 +402,25 @@ int tunnel_client_event_loop()
|
|
|
for (idx = 0; idx < nfds; ++idx) {
|
|
|
if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
|
|
|
{
|
|
|
- uint64_t value;
|
|
|
- read(conn_info.timer.get_timer_fd(), &value, 8);
|
|
|
- conn_info.conv_manager.clear_inactive();
|
|
|
- mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
|
|
|
-
|
|
|
- conn_info.stat.report_as_client();
|
|
|
-
|
|
|
- if(debug_force_flush_fec)
|
|
|
- {
|
|
|
- int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
|
|
|
- dest_t dest;
|
|
|
- dest.type=type_fd64;
|
|
|
- dest.inner.fd64=remote_fd64;
|
|
|
- dest.cook=1;
|
|
|
- from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
|
|
|
- for(int i=0;i<out_n;i++)
|
|
|
- {
|
|
|
- delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
|
|
|
- }
|
|
|
- }
|
|
|
+
|
|
|
}
|
|
|
+
|
|
|
else if (events[idx].data.u64 == (u64_t)fifo_fd)
|
|
|
{
|
|
|
- char buf[buf_len];
|
|
|
- int len=read (fifo_fd, buf, sizeof (buf));
|
|
|
- if(len<0)
|
|
|
- {
|
|
|
- mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
|
|
|
- continue;
|
|
|
- }
|
|
|
- buf[len]=0;
|
|
|
- handle_command(buf);
|
|
|
+
|
|
|
}
|
|
|
else if (events[idx].data.u64 == (u64_t)local_listen_fd||events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64())
|
|
|
{
|
|
|
- char data[buf_len];
|
|
|
- int data_len;
|
|
|
- ip_port_t ip_port;
|
|
|
- u32_t conv;
|
|
|
- int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
|
|
|
- dest_t dest;
|
|
|
- dest.type=type_fd64;
|
|
|
- dest.inner.fd64=remote_fd64;
|
|
|
- dest.cook=1;
|
|
|
-
|
|
|
- if(events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64())
|
|
|
- {
|
|
|
- fd64_t fd64=events[idx].data.u64;
|
|
|
- mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
|
|
|
-
|
|
|
- uint64_t value;
|
|
|
- if(!fd_manager.exist(fd64)) //fd64 has been closed
|
|
|
- {
|
|
|
- mylog(log_trace,"!fd_manager.exist(fd64)");
|
|
|
- continue;
|
|
|
- }
|
|
|
- if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
|
|
|
- {
|
|
|
- mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
|
|
|
- continue;
|
|
|
- }
|
|
|
- if(value==0)
|
|
|
- {
|
|
|
- mylog(log_debug,"value==0\n");
|
|
|
- continue;
|
|
|
- }
|
|
|
- assert(value==1);
|
|
|
- from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
|
|
|
- }
|
|
|
- else//events[idx].data.u64 == (u64_t)local_listen_fd
|
|
|
- {
|
|
|
- mylog(log_trace,"events[idx].data.u64 == (u64_t)local_listen_fd\n");
|
|
|
- struct sockaddr_in udp_new_addr_in={0};
|
|
|
- socklen_t udp_new_addr_len = sizeof(sockaddr_in);
|
|
|
- if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
|
|
|
- (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
|
|
|
- mylog(log_error,"recv_from error,this shouldnt happen,err=%s,but we can try to continue\n",strerror(errno));
|
|
|
- continue;
|
|
|
- };
|
|
|
-
|
|
|
- if(!disable_mtu_warn&&data_len>=mtu_warn)
|
|
|
- {
|
|
|
- mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
|
|
|
- }
|
|
|
- mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
|
|
|
- ntohs(udp_new_addr_in.sin_port),data_len);
|
|
|
-
|
|
|
- ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
|
|
|
- ip_port.port=ntohs(udp_new_addr_in.sin_port);
|
|
|
-
|
|
|
- u64_t u64=ip_port.to_u64();
|
|
|
-
|
|
|
- if(!conn_info.conv_manager.is_u64_used(u64))
|
|
|
- {
|
|
|
- if(conn_info.conv_manager.get_size() >=max_conv_num)
|
|
|
- {
|
|
|
- mylog(log_warn,"ignored new udp connect bc max_conv_num exceed\n");
|
|
|
- continue;
|
|
|
- }
|
|
|
- conv=conn_info.conv_manager.get_new_conv();
|
|
|
- conn_info.conv_manager.insert_conv(conv,u64);
|
|
|
- mylog(log_info,"new packet from %s:%d,conv_id=%x\n",inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port),conv);
|
|
|
- }
|
|
|
- else
|
|
|
- {
|
|
|
- conv=conn_info.conv_manager.find_conv_by_u64(u64);
|
|
|
- mylog(log_trace,"conv=%d\n",conv);
|
|
|
- }
|
|
|
- conn_info.conv_manager.update_active_time(conv);
|
|
|
- char * new_data;
|
|
|
- int new_len;
|
|
|
- put_conv(conv,data,data_len,new_data,new_len);
|
|
|
-
|
|
|
-
|
|
|
- mylog(log_trace,"data_len=%d new_len=%d\n",data_len,new_len);
|
|
|
- from_normal_to_fec(conn_info,new_data,new_len,out_n,out_arr,out_len,out_delay);
|
|
|
-
|
|
|
- }
|
|
|
- mylog(log_trace,"out_n=%d\n",out_n);
|
|
|
- for(int i=0;i<out_n;i++)
|
|
|
- {
|
|
|
- delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
|
|
|
- }
|
|
|
+
|
|
|
}
|
|
|
else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()) {
|
|
|
- uint64_t value;
|
|
|
- read(delay_manager.get_timer_fd(), &value, 8);
|
|
|
- mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
|
|
|
+ //uint64_t value;
|
|
|
+ //read(delay_manager.get_timer_fd(), &value, 8);
|
|
|
+ //mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
|
|
|
}
|
|
|
else if(events[idx].data.u64>u32_t(-1) )
|
|
|
{
|
|
|
- char data[buf_len];
|
|
|
- if(!fd_manager.exist(events[idx].data.u64)) //fd64 has been closed
|
|
|
- {
|
|
|
- mylog(log_trace,"!fd_manager.exist(events[idx].data.u64)");
|
|
|
- continue;
|
|
|
- }
|
|
|
- assert(events[idx].data.u64==remote_fd64);
|
|
|
- int fd=fd_manager.to_fd(remote_fd64);
|
|
|
- int data_len =recv(fd,data,max_data_len,0);
|
|
|
- mylog(log_trace, "received data from udp fd %d, len=%d\n", remote_fd,data_len);
|
|
|
- if(data_len<0)
|
|
|
- {
|
|
|
- if(errno==ECONNREFUSED)
|
|
|
- {
|
|
|
- mylog(log_debug, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
|
|
|
- }
|
|
|
-
|
|
|
- mylog(log_warn, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
|
|
|
- continue;
|
|
|
- }
|
|
|
- if(!disable_mtu_warn&&data_len>mtu_warn)
|
|
|
- {
|
|
|
- mylog(log_warn,"huge packet,data len=%d (>%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
|
|
|
- }
|
|
|
-
|
|
|
- if(de_cook(data,data_len)!=0)
|
|
|
- {
|
|
|
- mylog(log_debug,"de_cook error");
|
|
|
- continue;
|
|
|
- }
|
|
|
-
|
|
|
- int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
|
|
|
- from_fec_to_normal(conn_info,data,data_len,out_n,out_arr,out_len,out_delay);
|
|
|
-
|
|
|
- mylog(log_trace,"out_n=%d\n",out_n);
|
|
|
-
|
|
|
- for(int i=0;i<out_n;i++)
|
|
|
- {
|
|
|
- u32_t conv;
|
|
|
- char *new_data;
|
|
|
- int new_len;
|
|
|
- if(get_conv(conv,out_arr[i],out_len[i],new_data,new_len)!=0)
|
|
|
- {
|
|
|
- mylog(log_debug,"get_conv(conv,out_arr[i],out_len[i],new_data,new_len)!=0");
|
|
|
- continue;
|
|
|
- }
|
|
|
- if(!conn_info.conv_manager.is_conv_used(conv))
|
|
|
- {
|
|
|
- mylog(log_trace,"!conn_info.conv_manager.is_conv_used(conv)");
|
|
|
- continue;
|
|
|
- }
|
|
|
-
|
|
|
- conn_info.conv_manager.update_active_time(conv);
|
|
|
-
|
|
|
- u64_t u64=conn_info.conv_manager.find_u64_by_conv(conv);
|
|
|
- dest_t dest;
|
|
|
- dest.inner.fd_ip_port.fd=local_listen_fd;
|
|
|
- dest.inner.fd_ip_port.ip_port.from_u64(u64);
|
|
|
- dest.type=type_fd_ip_port;
|
|
|
-
|
|
|
- delay_send(out_delay[i],dest,new_data,new_len);
|
|
|
- }
|
|
|
+
|
|
|
}
|
|
|
else
|
|
|
{
|
|
@@ -310,7 +428,7 @@ int tunnel_client_event_loop()
|
|
|
myexit(-1);
|
|
|
}
|
|
|
}
|
|
|
- delay_manager.check();
|
|
|
- }
|
|
|
+ //delay_manager.check();
|
|
|
+ }*/
|
|
|
return 0;
|
|
|
}
|