main.cpp 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899
  1. #include "common.h"
  2. #include "log.h"
  3. #include "git_version.h"
  4. #include "lib/rs.h"
  5. #include "packet.h"
  6. #include "connection.h"
  7. #include "fd_manager.h"
  8. #include "delay_manager.h"
  9. using namespace std;
  10. typedef unsigned long long u64_t; //this works on most platform,avoid using the PRId64
  11. typedef long long i64_t;
  12. typedef unsigned int u32_t;
  13. typedef int i32_t;
  14. int dup_num=1;
  15. int dup_delay_min=20; //0.1ms
  16. int dup_delay_max=20;
  17. int jitter_min=0;
  18. int jitter_max=0;
  19. //int random_number_fd=-1;
  20. int mtu_warn=1350;
  21. u32_t local_ip_uint32,remote_ip_uint32=0;
  22. char local_ip[100], remote_ip[100];
  23. int local_port = -1, remote_port = -1;
  24. u64_t last_report_time=0;
  25. int report_interval=0;
  26. //conn_manager_t conn_manager;
  27. delay_manager_t delay_manager;
  28. fd_manager_t fd_manager;
  29. const int disable_conv_clear=0;
  30. int socket_buf_size=1024*1024;
  31. int VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV;
  32. int init_listen_socket()
  33. {
  34. local_listen_fd =socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  35. int yes = 1;
  36. //setsockopt(udp_fd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(yes));
  37. struct sockaddr_in local_me={0};
  38. socklen_t slen = sizeof(sockaddr_in);
  39. //memset(&local_me, 0, sizeof(local_me));
  40. local_me.sin_family = AF_INET;
  41. local_me.sin_port = htons(local_port);
  42. local_me.sin_addr.s_addr = local_ip_uint32;
  43. if (bind(local_listen_fd, (struct sockaddr*) &local_me, slen) == -1) {
  44. mylog(log_fatal,"socket bind error\n");
  45. //perror("socket bind error");
  46. myexit(1);
  47. }
  48. setnonblocking(local_listen_fd);
  49. set_buf_size(local_listen_fd,socket_buf_size);
  50. return 0;
  51. }
  52. int new_connected_socket(int &fd,u32_t ip,int port)
  53. {
  54. char ip_port[40];
  55. sprintf(ip_port,"%s:%d",my_ntoa(ip),port);
  56. struct sockaddr_in remote_addr_in = { 0 };
  57. socklen_t slen = sizeof(sockaddr_in);
  58. //memset(&remote_addr_in, 0, sizeof(remote_addr_in));
  59. remote_addr_in.sin_family = AF_INET;
  60. remote_addr_in.sin_port = htons(port);
  61. remote_addr_in.sin_addr.s_addr = ip;
  62. fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  63. if (fd < 0) {
  64. mylog(log_warn, "[%s]create udp_fd error\n", ip_port);
  65. return -1;
  66. }
  67. setnonblocking(fd);
  68. set_buf_size(fd, socket_buf_size);
  69. mylog(log_debug, "[%s]created new udp_fd %d\n", ip_port, fd);
  70. int ret = connect(fd, (struct sockaddr *) &remote_addr_in, slen);
  71. if (ret != 0) {
  72. mylog(log_warn, "[%s]fd connect fail\n",ip_port);
  73. close(fd);
  74. return -1;
  75. }
  76. return 0;
  77. }
  78. int client_event_loop()
  79. {
  80. //char buf[buf_len];
  81. int i, j, k;int ret;
  82. int yes = 1;
  83. int epoll_fd;
  84. int remote_fd;
  85. conn_info_t conn_info;
  86. init_listen_socket();
  87. epoll_fd = epoll_create1(0);
  88. const int max_events = 4096;
  89. struct epoll_event ev, events[max_events];
  90. if (epoll_fd < 0) {
  91. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  92. myexit(-1);
  93. }
  94. ev.events = EPOLLIN;
  95. ev.data.u64 = local_listen_fd;
  96. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  97. if (ret!=0) {
  98. mylog(log_fatal,"add udp_listen_fd error\n");
  99. myexit(-1);
  100. }
  101. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  102. ev.events = EPOLLIN;
  103. ev.data.u64 = remote_fd;
  104. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  105. if (ret!= 0) {
  106. mylog(log_fatal,"add raw_fd error\n");
  107. myexit(-1);
  108. }
  109. while(1)////////////////////////
  110. {
  111. if(about_to_exit) myexit(0);
  112. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  113. if (nfds < 0) { //allow zero
  114. if(errno==EINTR )
  115. {
  116. mylog(log_info,"epoll interrupted by signal\n");
  117. myexit(0);
  118. }
  119. else
  120. {
  121. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  122. myexit(-1);
  123. }
  124. }
  125. int idx;
  126. for (idx = 0; idx < nfds; ++idx) {
  127. if (events[idx].data.u64 == (u64_t)remote_fd)
  128. {
  129. char data[buf_len];
  130. int data_len =recv(remote_fd,data,max_data_len,0);
  131. mylog(log_trace, "received data from udp fd %d, len=%d\n", remote_fd,data_len);
  132. if(data_len<0)
  133. {
  134. if(errno==ECONNREFUSED)
  135. {
  136. //conn_manager.clear_list.push_back(udp_fd);
  137. mylog(log_debug, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
  138. }
  139. mylog(log_warn, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
  140. continue;
  141. }
  142. if(data_len>mtu_warn)
  143. {
  144. mylog(log_warn,"huge packet,data len=%d (>%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  145. }
  146. u32_t conv;
  147. char *new_data;
  148. int new_len;
  149. get_conv(conv,data,data_len,new_data,new_len);
  150. if(!conn_info.conv_manager.is_conv_used(conv))continue;
  151. u64_t u64=conn_info.conv_manager.find_conv_by_u64(conv);
  152. dest_t dest;
  153. dest.inner.ip_port.from_u64(u64);
  154. dest.type=type_ip_port;
  155. my_send(dest,new_data,new_len);
  156. }
  157. /*
  158. else if(events[idx].data.u64 ==(u64_t)timer_fd)
  159. {
  160. u64_t value;
  161. read(timer_fd, &value, 8);
  162. client_on_timer(conn_info);
  163. mylog(log_trace,"epoll_trigger_counter: %d \n",epoll_trigger_counter);
  164. epoll_trigger_counter=0;
  165. }*/
  166. else if (events[idx].data.u64 == (u64_t)local_listen_fd)
  167. {
  168. char data[buf_len];
  169. int data_len;
  170. struct sockaddr_in udp_new_addr_in={0};
  171. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  172. if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
  173. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
  174. mylog(log_error,"recv_from error,this shouldnt happen at client\n");
  175. myexit(1);
  176. };
  177. if(data_len>=mtu_warn)
  178. {
  179. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  180. }
  181. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  182. ntohs(udp_new_addr_in.sin_port),data_len);
  183. ip_port_t ip_port;
  184. ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  185. ip_port.port=udp_new_addr_in.sin_port;
  186. u64_t u64=ip_port.to_u64();
  187. u32_t conv;
  188. if(!conn_info.conv_manager.is_u64_used(u64))
  189. {
  190. if(conn_info.conv_manager.get_size() >=max_conv_num)
  191. {
  192. mylog(log_warn,"ignored new udp connect bc max_conv_num exceed\n");
  193. continue;
  194. }
  195. conv=conn_info.conv_manager.get_new_conv();
  196. conn_info.conv_manager.insert_conv(conv,u64);
  197. mylog(log_info,"new packet from %s:%d,conv_id=%x\n",inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port),conv);
  198. }
  199. else
  200. {
  201. conv=conn_info.conv_manager.find_conv_by_u64(u64);
  202. }
  203. conn_info.conv_manager.update_active_time(conv);
  204. char *new_data;
  205. int new_len;
  206. put_conv(conv,data,data_len,new_data,new_len);
  207. dest_t dest;
  208. dest.type=type_fd;
  209. dest.inner.fd=remote_fd;
  210. my_send(dest,new_data,new_len);
  211. //send_fd(remote_fd,new_data,new_len,0);
  212. //send_data_safer(conn_info,buf,recv_len,conv);
  213. ///////////////////todo
  214. }
  215. else
  216. {
  217. mylog(log_fatal,"unknown fd,this should never happen\n");
  218. myexit(-1);
  219. }
  220. }
  221. }
  222. return 0;
  223. }
  224. int server_event_loop()
  225. {
  226. //char buf[buf_len];
  227. int i, j, k;int ret;
  228. int yes = 1;
  229. int epoll_fd;
  230. int remote_fd;
  231. conn_info_t conn_info;
  232. init_listen_socket();
  233. epoll_fd = epoll_create1(0);
  234. const int max_events = 4096;
  235. struct epoll_event ev, events[max_events];
  236. if (epoll_fd < 0) {
  237. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  238. myexit(-1);
  239. }
  240. ev.events = EPOLLIN;
  241. ev.data.u64 = local_listen_fd;
  242. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  243. if (ret!=0) {
  244. mylog(log_fatal,"add udp_listen_fd error\n");
  245. myexit(-1);
  246. }
  247. mylog(log_info,"now listening at %s:%d\n",my_ntoa(local_ip_uint32),local_port);
  248. while(1)////////////////////////
  249. {
  250. if(about_to_exit) myexit(0);
  251. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  252. if (nfds < 0) { //allow zero
  253. if(errno==EINTR )
  254. {
  255. mylog(log_info,"epoll interrupted by signal\n");
  256. myexit(0);
  257. }
  258. else
  259. {
  260. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  261. myexit(-1);
  262. }
  263. }
  264. int idx;
  265. for (idx = 0; idx < nfds; ++idx)
  266. {
  267. /*
  268. if ((events[idx].data.u64 ) == (u64_t)timer_fd)
  269. {
  270. conn_manager.clear_inactive();
  271. u64_t dummy;
  272. read(timer_fd, &dummy, 8);
  273. //current_time_rough=get_current_time();
  274. }
  275. else */if (events[idx].data.u64 == (u64_t)local_listen_fd)
  276. {
  277. //int recv_len;
  278. char data[buf_len];
  279. int data_len;
  280. struct sockaddr_in udp_new_addr_in={0};
  281. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  282. if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
  283. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
  284. mylog(log_error,"recv_from error,this shouldnt happen at client\n");
  285. myexit(1);
  286. };
  287. if(data_len>=mtu_warn)
  288. {
  289. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  290. }
  291. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  292. ntohs(udp_new_addr_in.sin_port),data_len);
  293. ip_port_t ip_port;
  294. ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  295. ip_port.port=udp_new_addr_in.sin_port;
  296. if(!conn_manager.exist_ip_port(ip_port))
  297. {
  298. conn_info_t &conn_info=conn_manager.find_insert(ip_port);
  299. conn_info.conv_manager.reserve();
  300. }
  301. conn_info_t &conn_info=conn_manager.find_insert(ip_port);
  302. u32_t conv;
  303. char *new_data;
  304. int new_len;
  305. get_conv(conv,data,data_len,new_data,new_len);
  306. /*
  307. id_t tmp_conv_id;
  308. memcpy(&tmp_conv_id,&data_[0],sizeof(tmp_conv_id));
  309. tmp_conv_id=ntohl(tmp_conv_id);*/
  310. if (!conn_info.conv_manager.is_conv_used(conv))
  311. {
  312. int new_udp_fd;
  313. ret=new_connected_socket(new_udp_fd,remote_ip_uint32,remote_port);
  314. if (ret != 0) {
  315. mylog(log_warn, "[%s:%d]new_connected_socket failed\n",my_ntoa(ip_port.ip),ip_port.port);
  316. continue;
  317. }
  318. fd64_t fd64 = fd_manager.create(new_udp_fd);
  319. ev.events = EPOLLIN;
  320. ev.data.u64 = fd64;
  321. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, new_udp_fd, &ev);
  322. conn_info.conv_manager.insert_conv(conv, fd64);
  323. fd_manager.get_info(fd64).ip_port=ip_port;
  324. //assert(!conn_manager.exist_fd64(fd64));
  325. //conn_manager.insert_fd64(fd64,ip_port);
  326. }
  327. fd64_t fd64= conn_info.conv_manager.find_u64_by_conv(conv);
  328. //int fd=fd_manager.fd64_to_fd(fd64);
  329. dest_t dest;
  330. dest.type=type_fd64;
  331. dest.inner.fd64=fd64;
  332. my_send(dest,new_data,new_len);
  333. //int fd = int((u64 << 32u) >> 32u);
  334. //////////////////////////////todo
  335. //u64_t u64=((u64_t(udp_new_addr_in.sin_addr.s_addr))<<32u)+ntohs(udp_new_addr_in.sin_port);
  336. }
  337. /*
  338. else if ((events[idx].data.u64 >>32u) == 2u)
  339. {
  340. if(debug_flag)begin_time=get_current_time();
  341. int fd=get_u64_l(events[idx].data.u64);
  342. u64_t dummy;
  343. read(fd, &dummy, 8);
  344. if(conn_manager.timer_fd_mp.find(fd)==conn_manager.timer_fd_mp.end()) //this can happen,when fd is a just closed fd
  345. {
  346. mylog(log_info,"timer_fd no longer exits\n");
  347. continue;
  348. }
  349. conn_info_t* p_conn_info=conn_manager.timer_fd_mp[fd];
  350. u32_t ip=p_conn_info->raw_info.recv_info.src_ip;
  351. u32_t port=p_conn_info->raw_info.recv_info.src_port;
  352. assert(conn_manager.exist(ip,port));//TODO remove this for peformance
  353. assert(p_conn_info->state.server_current_state == server_ready); //TODO remove this for peformance
  354. //conn_info_t &conn_info=conn_manager.find(ip,port);
  355. char ip_port[40];
  356. sprintf(ip_port,"%s:%d",my_ntoa(ip),port);
  357. server_on_timer_multi(*p_conn_info,ip_port);
  358. if(debug_flag)
  359. {
  360. end_time=get_current_time();
  361. mylog(log_debug,"(events[idx].data.u64 >>32u) == 2u ,%llu,%llu,%llu \n",begin_time,end_time,end_time-begin_time);
  362. }
  363. }*/
  364. else if (events[idx].data.u64 >u32_t(-1))
  365. {
  366. char data[buf_len];
  367. int data_len;
  368. fd64_t fd64=events[idx].data.u64;
  369. if(!fd_manager.exist(fd64)) //fd64 has been closed
  370. {
  371. continue;
  372. }
  373. //assert(conn_manager.exist_fd64(fd64));
  374. assert(fd_manager.exist_info(fd64));
  375. ip_port_t ip_port=fd_manager.get_info(fd64).ip_port;
  376. assert(conn_manager.exist_ip_port(ip_port));
  377. conn_info_t* p_conn_info=conn_manager.find_insert_p(ip_port);
  378. conn_info_t &conn_info=*p_conn_info;
  379. assert(conn_info.conv_manager.is_u64_used(fd64));
  380. u32_t conv=conn_info.conv_manager.find_conv_by_u64(fd64);
  381. int fd=fd_manager.to_fd(fd64);
  382. data_len=recv(fd,data,max_data_len,0);
  383. mylog(log_trace,"received a packet from udp_fd,len:%d\n",data_len);
  384. if(data_len<0)
  385. {
  386. mylog(log_debug,"udp fd,recv_len<0 continue,%s\n",strerror(errno));
  387. continue;
  388. }
  389. if(data_len>=mtu_warn)
  390. {
  391. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  392. }
  393. char *new_data;
  394. int new_len;
  395. put_conv(conv,data,data_len,new_data,new_len);
  396. dest_t dest;
  397. dest.type=type_ip_port;
  398. dest.inner.ip_port=ip_port;
  399. my_send(dest,new_data,new_len);
  400. ////////todo send data
  401. }
  402. else
  403. {
  404. mylog(log_fatal,"unknown fd,this should never happen\n");
  405. myexit(-1);
  406. }
  407. }
  408. }
  409. return 0;
  410. }
  411. int unit_test()
  412. {
  413. int i,j,k;
  414. void *code=fec_new(3,6);
  415. char arr[6][100]=
  416. {
  417. "aaa","bbb","ccc"
  418. ,"ddd","eee","fff"
  419. };
  420. char *data[6];
  421. for(i=0;i<6;i++)
  422. {
  423. data[i]=arr[i];
  424. }
  425. rs_encode(code,data,3);
  426. //printf("%d %d",(int)(unsigned char)arr[5][0],(int)('a'^'b'^'c'^'d'^'e'));
  427. for(i=0;i<6;i++)
  428. {
  429. printf("<%s>",data[i]);
  430. }
  431. data[0]=0;
  432. //data[1]=0;
  433. //data[5]=0;
  434. int ret=rs_decode(code,data,3);
  435. printf("ret:%d\n",ret);
  436. for(i=0;i<6;i++)
  437. {
  438. printf("<%s>",data[i]);
  439. }
  440. fec_free(code);
  441. return 0;
  442. }
  443. void print_help()
  444. {
  445. char git_version_buf[100]={0};
  446. strncpy(git_version_buf,gitversion,10);
  447. printf("UDPspeeder\n");
  448. printf("git version:%s ",git_version_buf);
  449. printf("build date:%s %s\n",__DATE__,__TIME__);
  450. printf("repository: https://github.com/wangyu-/UDPspeeder\n");
  451. printf("\n");
  452. printf("usage:\n");
  453. printf(" run as client : ./this_program -c -l local_listen_ip:local_port -r server_ip:server_port [options]\n");
  454. printf(" run as server : ./this_program -s -l server_listen_ip:server_port -r remote_ip:remote_port [options]\n");
  455. printf("\n");
  456. printf("common option,must be same on both sides:\n");
  457. printf(" -k,--key <string> key for simple xor encryption,default:\"secret key\"\n");
  458. printf("main options:\n");
  459. printf(" -d <number> duplicated packet number, -d 0 means no duplicate. default value:0\n");
  460. printf(" -t <number> duplicated packet delay time, unit: 0.1ms,default value:20(2ms)\n");
  461. printf(" -j <number> simulated jitter.randomly delay first packet for 0~jitter_value*0.1 ms,to\n");
  462. printf(" create simulated jitter.default value:0.do not use if you dont\n");
  463. printf(" know what it means\n");
  464. printf(" --report <number> turn on udp send/recv report,and set a time interval for reporting,unit:s\n");
  465. printf("advanced options:\n");
  466. printf(" -t tmin:tmax simliar to -t above,but delay randomly between tmin and tmax\n");
  467. printf(" -j jmin:jmax simliar to -j above,but create jitter randomly between jmin and jmax\n");
  468. printf(" --random-drop <number> simulate packet loss ,unit:0.01%%\n");
  469. printf(" --disable-filter disable duplicate packet filter.\n");
  470. printf(" -m <number> max pending packets,to prevent the program from eating up all your memory,\n");
  471. printf(" default value:0(disabled).\n");
  472. printf("other options:\n");
  473. printf(" --log-level <number> 0:never 1:fatal 2:error 3:warn \n");
  474. printf(" 4:info (default) 5:debug 6:trace\n");
  475. printf(" --log-position enable file name,function name,line number in log\n");
  476. printf(" --disable-color disable log color\n");
  477. printf(" --sock-buf <number> buf size for socket,>=10 and <=10240,unit:kbyte,default:1024\n");
  478. //printf(" -p use multi-process mode instead of epoll.very costly,only for test,do dont use\n");
  479. printf(" -h,--help print this help message\n");
  480. //printf("common options,these options must be same on both side\n");
  481. }
  482. void process_arg(int argc, char *argv[])
  483. {
  484. int is_client=0,is_server=0;
  485. int i, j, k;
  486. int opt;
  487. static struct option long_options[] =
  488. {
  489. {"log-level", required_argument, 0, 1},
  490. {"log-position", no_argument, 0, 1},
  491. {"disable-color", no_argument, 0, 1},
  492. {"disable-filter", no_argument, 0, 1},
  493. {"sock-buf", required_argument, 0, 1},
  494. {"random-drop", required_argument, 0, 1},
  495. {"report", required_argument, 0, 1},
  496. {NULL, 0, 0, 0}
  497. };
  498. int option_index = 0;
  499. if (argc == 1)
  500. {
  501. print_help();
  502. myexit( -1);
  503. }
  504. for (i = 0; i < argc; i++)
  505. {
  506. if(strcmp(argv[i],"--unit-test")==0)
  507. {
  508. unit_test();
  509. myexit(0);
  510. }
  511. }
  512. for (i = 0; i < argc; i++)
  513. {
  514. if(strcmp(argv[i],"-h")==0||strcmp(argv[i],"--help")==0)
  515. {
  516. print_help();
  517. myexit(0);
  518. }
  519. }
  520. for (i = 0; i < argc; i++)
  521. {
  522. if(strcmp(argv[i],"--log-level")==0)
  523. {
  524. if(i<argc -1)
  525. {
  526. sscanf(argv[i+1],"%d",&log_level);
  527. if(0<=log_level&&log_level<log_end)
  528. {
  529. }
  530. else
  531. {
  532. log_bare(log_fatal,"invalid log_level\n");
  533. myexit(-1);
  534. }
  535. }
  536. }
  537. if(strcmp(argv[i],"--disable-color")==0)
  538. {
  539. enable_log_color=0;
  540. }
  541. }
  542. mylog(log_info,"argc=%d ", argc);
  543. for (i = 0; i < argc; i++) {
  544. log_bare(log_info, "%s ", argv[i]);
  545. }
  546. log_bare(log_info, "\n");
  547. if (argc == 1)
  548. {
  549. print_help();
  550. myexit(-1);
  551. }
  552. int no_l = 1, no_r = 1;
  553. while ((opt = getopt_long(argc, argv, "l:r:d:t:hcspk:j:m:",long_options,&option_index)) != -1)
  554. {
  555. //string opt_key;
  556. //opt_key+=opt;
  557. switch (opt)
  558. {
  559. case 'p':
  560. //multi_process_mode=1;
  561. break;
  562. case 'k':
  563. sscanf(optarg,"%s\n",key_string);
  564. mylog(log_debug,"key=%s\n",key_string);
  565. if(strlen(key_string)==0)
  566. {
  567. mylog(log_fatal,"key len=0??\n");
  568. myexit(-1);
  569. }
  570. break;
  571. case 'm':
  572. sscanf(optarg,"%d\n",&max_pending_packet);
  573. if(max_pending_packet<1000)
  574. {
  575. mylog(log_fatal,"max_pending_packet must be >1000\n");
  576. myexit(-1);
  577. }
  578. break;
  579. case 'j':
  580. if (strchr(optarg, ':') == 0)
  581. {
  582. int jitter;
  583. sscanf(optarg,"%d\n",&jitter);
  584. if(jitter<0 ||jitter>1000*100)
  585. {
  586. mylog(log_fatal,"jitter must be between 0 and 100,000(10 second)\n");
  587. myexit(-1);
  588. }
  589. jitter_min=0;
  590. jitter_max=jitter;
  591. }
  592. else
  593. {
  594. sscanf(optarg,"%d:%d\n",&jitter_min,&jitter_max);
  595. if(jitter_min<0 ||jitter_max<0||jitter_min>jitter_max)
  596. {
  597. mylog(log_fatal," must satisfy 0<=jmin<=jmax\n");
  598. myexit(-1);
  599. }
  600. }
  601. break;
  602. case 't':
  603. if (strchr(optarg, ':') == 0)
  604. {
  605. int dup_delay=-1;
  606. sscanf(optarg,"%d\n",&dup_delay);
  607. if(dup_delay<1||dup_delay>1000*100)
  608. {
  609. mylog(log_fatal,"dup_delay must be between 1 and 100,000(10 second)\n");
  610. myexit(-1);
  611. }
  612. dup_delay_min=dup_delay_max=dup_delay;
  613. }
  614. else
  615. {
  616. sscanf(optarg,"%d:%d\n",&dup_delay_min,&dup_delay_max);
  617. if(dup_delay_min<1 ||dup_delay_max<1||dup_delay_min>dup_delay_max)
  618. {
  619. mylog(log_fatal," must satisfy 1<=dmin<=dmax\n");
  620. myexit(-1);
  621. }
  622. }
  623. break;
  624. case 'd':
  625. dup_num=-1;
  626. sscanf(optarg,"%d\n",&dup_num);
  627. if(dup_num<0 ||dup_num>5)
  628. {
  629. mylog(log_fatal,"dup_num must be between 0 and 5\n");
  630. myexit(-1);
  631. }
  632. dup_num+=1;
  633. break;
  634. case 'c':
  635. is_client = 1;
  636. break;
  637. case 's':
  638. is_server = 1;
  639. break;
  640. case 'l':
  641. no_l = 0;
  642. if (strchr(optarg, ':') != 0)
  643. {
  644. sscanf(optarg, "%[^:]:%d", local_ip, &local_port);
  645. }
  646. else
  647. {
  648. mylog(log_fatal," -r ip:port\n");
  649. myexit(1);
  650. strcpy(local_ip, "127.0.0.1");
  651. sscanf(optarg, "%d", &local_port);
  652. }
  653. break;
  654. case 'r':
  655. no_r = 0;
  656. if (strchr(optarg, ':') != 0)
  657. {
  658. //printf("in :\n");
  659. //printf("%s\n",optarg);
  660. sscanf(optarg, "%[^:]:%d", remote_ip, &remote_port);
  661. //printf("%d\n",remote_port);
  662. }
  663. else
  664. {
  665. mylog(log_fatal," -r ip:port\n");
  666. myexit(1);
  667. strcpy(remote_ip, "127.0.0.1");
  668. sscanf(optarg, "%d", &remote_port);
  669. }
  670. break;
  671. case 'h':
  672. break;
  673. case 1:
  674. if(strcmp(long_options[option_index].name,"log-level")==0)
  675. {
  676. }
  677. else if(strcmp(long_options[option_index].name,"disable-filter")==0)
  678. {
  679. disable_replay_filter=1;
  680. //enable_log_color=0;
  681. }
  682. else if(strcmp(long_options[option_index].name,"disable-color")==0)
  683. {
  684. //enable_log_color=0;
  685. }
  686. else if(strcmp(long_options[option_index].name,"log-position")==0)
  687. {
  688. enable_log_position=1;
  689. }
  690. else if(strcmp(long_options[option_index].name,"random-drop")==0)
  691. {
  692. sscanf(optarg,"%d",&random_drop);
  693. if(random_drop<0||random_drop>10000)
  694. {
  695. mylog(log_fatal,"random_drop must be between 0 10000 \n");
  696. myexit(-1);
  697. }
  698. }
  699. else if(strcmp(long_options[option_index].name,"report")==0)
  700. {
  701. sscanf(optarg,"%d",&report_interval);
  702. if(report_interval<=0)
  703. {
  704. mylog(log_fatal,"report_interval must be >0 \n");
  705. myexit(-1);
  706. }
  707. }
  708. else if(strcmp(long_options[option_index].name,"sock-buf")==0)
  709. {
  710. int tmp=-1;
  711. sscanf(optarg,"%d",&tmp);
  712. if(10<=tmp&&tmp<=10*1024)
  713. {
  714. socket_buf_size=tmp*1024;
  715. }
  716. else
  717. {
  718. mylog(log_fatal,"sock-buf value must be between 1 and 10240 (kbyte) \n");
  719. myexit(-1);
  720. }
  721. }
  722. else
  723. {
  724. mylog(log_fatal,"unknown option\n");
  725. myexit(-1);
  726. }
  727. break;
  728. default:
  729. mylog(log_fatal,"unknown option <%x>", opt);
  730. myexit(-1);
  731. }
  732. }
  733. if (no_l)
  734. mylog(log_fatal,"error: -i not found\n");
  735. if (no_r)
  736. mylog(log_fatal,"error: -o not found\n");
  737. if (no_l || no_r)
  738. myexit(-1);
  739. if (is_client == 0 && is_server == 0)
  740. {
  741. mylog(log_fatal,"-s -c hasnt been set\n");
  742. myexit(-1);
  743. }
  744. if (is_client == 1 && is_server == 1)
  745. {
  746. mylog(log_fatal,"-s -c cant be both set\n");
  747. myexit(-1);
  748. }
  749. if(is_client==1)
  750. {
  751. program_mode=client_mode;
  752. }
  753. else
  754. {
  755. program_mode=server_mode;
  756. }
  757. }
  758. int main(int argc, char *argv[])
  759. {
  760. /*
  761. if(argc==1||argc==0)
  762. {
  763. printf("this_program classic\n");
  764. printf("this_program fec\n");
  765. return 0;
  766. }*/
  767. /*
  768. if(argc>=2&&strcmp(argv[1],"fec")!=0)
  769. {
  770. printf("running into classic mode!\n");
  771. return classic::main(argc,argv);
  772. }*/
  773. assert(sizeof(u64_t)==8);
  774. assert(sizeof(i64_t)==8);
  775. assert(sizeof(u32_t)==4);
  776. assert(sizeof(i32_t)==4);
  777. dup2(1, 2); //redirect stderr to stdout
  778. int i, j, k;
  779. process_arg(argc,argv);
  780. delay_manager.capacity=max_pending_packet;
  781. init_random_number_fd();
  782. local_ip_uint32=inet_addr(local_ip);
  783. remote_ip_uint32=inet_addr(remote_ip);
  784. if(program_mode==client_mode)
  785. {
  786. client_event_loop();
  787. }
  788. else
  789. {
  790. server_event_loop();
  791. }
  792. return 0;
  793. }