main.cpp 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906
  1. #include "common.h"
  2. #include "log.h"
  3. #include "git_version.h"
  4. #include "lib/rs.h"
  5. #include "packet.h"
  6. #include "connection.h"
  7. #include "fd_manager.h"
  8. #include "delay_manager.h"
  9. using namespace std;
  10. typedef unsigned long long u64_t; //this works on most platform,avoid using the PRId64
  11. typedef long long i64_t;
  12. typedef unsigned int u32_t;
  13. typedef int i32_t;
  14. int dup_num=1;
  15. int dup_delay_min=20; //0.1ms
  16. int dup_delay_max=20;
  17. int jitter_min=0;
  18. int jitter_max=0;
  19. //int random_number_fd=-1;
  20. int mtu_warn=1350;
  21. u32_t local_ip_uint32,remote_ip_uint32=0;
  22. char local_ip[100], remote_ip[100];
  23. int local_port = -1, remote_port = -1;
  24. u64_t last_report_time=0;
  25. int report_interval=0;
  26. //conn_manager_t conn_manager;
  27. delay_manager_t delay_manager;
  28. fd_manager_t fd_manager;
  29. const int disable_conv_clear=0;
  30. int socket_buf_size=1024*1024;
  31. int VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV;
  32. int init_listen_socket()
  33. {
  34. local_listen_fd =socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  35. int yes = 1;
  36. //setsockopt(udp_fd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(yes));
  37. struct sockaddr_in local_me={0};
  38. socklen_t slen = sizeof(sockaddr_in);
  39. //memset(&local_me, 0, sizeof(local_me));
  40. local_me.sin_family = AF_INET;
  41. local_me.sin_port = htons(local_port);
  42. local_me.sin_addr.s_addr = local_ip_uint32;
  43. if (bind(local_listen_fd, (struct sockaddr*) &local_me, slen) == -1) {
  44. mylog(log_fatal,"socket bind error\n");
  45. //perror("socket bind error");
  46. myexit(1);
  47. }
  48. setnonblocking(local_listen_fd);
  49. set_buf_size(local_listen_fd,socket_buf_size);
  50. return 0;
  51. }
  52. int new_connected_socket(int &fd,u32_t ip,int port)
  53. {
  54. char ip_port[40];
  55. sprintf(ip_port,"%s:%d",my_ntoa(ip),port);
  56. struct sockaddr_in remote_addr_in = { 0 };
  57. socklen_t slen = sizeof(sockaddr_in);
  58. //memset(&remote_addr_in, 0, sizeof(remote_addr_in));
  59. remote_addr_in.sin_family = AF_INET;
  60. remote_addr_in.sin_port = htons(port);
  61. remote_addr_in.sin_addr.s_addr = ip;
  62. fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  63. if (fd < 0) {
  64. mylog(log_warn, "[%s]create udp_fd error\n", ip_port);
  65. return -1;
  66. }
  67. setnonblocking(fd);
  68. set_buf_size(fd, socket_buf_size);
  69. mylog(log_debug, "[%s]created new udp_fd %d\n", ip_port, fd);
  70. int ret = connect(fd, (struct sockaddr *) &remote_addr_in, slen);
  71. if (ret != 0) {
  72. mylog(log_warn, "[%s]fd connect fail\n",ip_port);
  73. close(fd);
  74. return -1;
  75. }
  76. return 0;
  77. }
  78. int client_event_loop()
  79. {
  80. //char buf[buf_len];
  81. int i, j, k;int ret;
  82. int yes = 1;
  83. int epoll_fd;
  84. int remote_fd;
  85. conn_info_t conn_info;
  86. init_listen_socket();
  87. epoll_fd = epoll_create1(0);
  88. const int max_events = 4096;
  89. struct epoll_event ev, events[max_events];
  90. if (epoll_fd < 0) {
  91. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  92. myexit(-1);
  93. }
  94. ev.events = EPOLLIN;
  95. ev.data.u64 = local_listen_fd;
  96. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  97. if (ret!=0) {
  98. mylog(log_fatal,"add udp_listen_fd error\n");
  99. myexit(-1);
  100. }
  101. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  102. ev.events = EPOLLIN;
  103. ev.data.u64 = remote_fd;
  104. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  105. if (ret!= 0) {
  106. mylog(log_fatal,"add raw_fd error\n");
  107. myexit(-1);
  108. }
  109. while(1)////////////////////////
  110. {
  111. if(about_to_exit) myexit(0);
  112. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  113. if (nfds < 0) { //allow zero
  114. if(errno==EINTR )
  115. {
  116. mylog(log_info,"epoll interrupted by signal\n");
  117. myexit(0);
  118. }
  119. else
  120. {
  121. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  122. myexit(-1);
  123. }
  124. }
  125. int idx;
  126. for (idx = 0; idx < nfds; ++idx) {
  127. if (events[idx].data.u64 == (u64_t)remote_fd)
  128. {
  129. char data[buf_len];
  130. int data_len =recv(remote_fd,data,max_data_len,0);
  131. mylog(log_trace, "received data from udp fd %d, len=%d\n", remote_fd,data_len);
  132. if(data_len<0)
  133. {
  134. if(errno==ECONNREFUSED)
  135. {
  136. //conn_manager.clear_list.push_back(udp_fd);
  137. mylog(log_debug, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
  138. }
  139. mylog(log_warn, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
  140. continue;
  141. }
  142. if(data_len>mtu_warn)
  143. {
  144. mylog(log_warn,"huge packet,data len=%d (>%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  145. }
  146. u32_t conv;
  147. char *new_data;
  148. int new_len;
  149. get_conv(conv,data,data_len,new_data,new_len);
  150. if(!conn_info.conv_manager.is_conv_used(conv))continue;
  151. u64_t u64=conn_info.conv_manager.find_conv_by_u64(conv);
  152. u32_t ip=get_u64_h(u64);
  153. int port=get_u64_l(u64);
  154. dest_t dest;
  155. dest.type=type_ip_port;
  156. dest.inner.ip_port.ip=ip;
  157. dest.inner.ip_port.port=port;
  158. my_send(dest,new_data,new_len);
  159. //sendto_ip_port(ip,port,new_data,new_len,0);
  160. //////////////////todo
  161. }
  162. /*
  163. else if(events[idx].data.u64 ==(u64_t)timer_fd)
  164. {
  165. u64_t value;
  166. read(timer_fd, &value, 8);
  167. client_on_timer(conn_info);
  168. mylog(log_trace,"epoll_trigger_counter: %d \n",epoll_trigger_counter);
  169. epoll_trigger_counter=0;
  170. }*/
  171. else if (events[idx].data.u64 == (u64_t)local_listen_fd)
  172. {
  173. char data[buf_len];
  174. int data_len;
  175. struct sockaddr_in udp_new_addr_in={0};
  176. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  177. if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
  178. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
  179. mylog(log_error,"recv_from error,this shouldnt happen at client\n");
  180. myexit(1);
  181. };
  182. if(data_len>=mtu_warn)
  183. {
  184. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  185. }
  186. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  187. ntohs(udp_new_addr_in.sin_port),data_len);
  188. u64_t u64=((u64_t(udp_new_addr_in.sin_addr.s_addr))<<32u)+ntohs(udp_new_addr_in.sin_port);
  189. u32_t conv;
  190. if(!conn_info.conv_manager.is_u64_used(u64))
  191. {
  192. if(conn_info.conv_manager.get_size() >=max_conv_num)
  193. {
  194. mylog(log_warn,"ignored new udp connect bc max_conv_num exceed\n");
  195. continue;
  196. }
  197. conv=conn_info.conv_manager.get_new_conv();
  198. conn_info.conv_manager.insert_conv(conv,u64);
  199. mylog(log_info,"new packet from %s:%d,conv_id=%x\n",inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port),conv);
  200. }
  201. else
  202. {
  203. conv=conn_info.conv_manager.find_conv_by_u64(u64);
  204. }
  205. conn_info.conv_manager.update_active_time(conv);
  206. char *new_data;
  207. int new_len;
  208. put_conv(conv,data,data_len,new_data,new_len);
  209. dest_t dest;
  210. dest.type=type_fd;
  211. dest.inner.fd=remote_fd;
  212. my_send(dest,new_data,new_len);
  213. //send_fd(remote_fd,new_data,new_len,0);
  214. //send_data_safer(conn_info,buf,recv_len,conv);
  215. ///////////////////todo
  216. }
  217. else
  218. {
  219. mylog(log_fatal,"unknown fd,this should never happen\n");
  220. myexit(-1);
  221. }
  222. }
  223. }
  224. return 0;
  225. }
  226. int server_event_loop()
  227. {
  228. //char buf[buf_len];
  229. int i, j, k;int ret;
  230. int yes = 1;
  231. int epoll_fd;
  232. int remote_fd;
  233. conn_info_t conn_info;
  234. init_listen_socket();
  235. epoll_fd = epoll_create1(0);
  236. const int max_events = 4096;
  237. struct epoll_event ev, events[max_events];
  238. if (epoll_fd < 0) {
  239. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  240. myexit(-1);
  241. }
  242. ev.events = EPOLLIN;
  243. ev.data.u64 = local_listen_fd;
  244. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  245. if (ret!=0) {
  246. mylog(log_fatal,"add udp_listen_fd error\n");
  247. myexit(-1);
  248. }
  249. mylog(log_info,"now listening at %s:%d\n",my_ntoa(local_ip_uint32),local_port);
  250. while(1)////////////////////////
  251. {
  252. if(about_to_exit) myexit(0);
  253. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  254. if (nfds < 0) { //allow zero
  255. if(errno==EINTR )
  256. {
  257. mylog(log_info,"epoll interrupted by signal\n");
  258. myexit(0);
  259. }
  260. else
  261. {
  262. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  263. myexit(-1);
  264. }
  265. }
  266. int idx;
  267. for (idx = 0; idx < nfds; ++idx)
  268. {
  269. /*
  270. if ((events[idx].data.u64 ) == (u64_t)timer_fd)
  271. {
  272. conn_manager.clear_inactive();
  273. u64_t dummy;
  274. read(timer_fd, &dummy, 8);
  275. //current_time_rough=get_current_time();
  276. }
  277. else */if (events[idx].data.u64 == (u64_t)local_listen_fd)
  278. {
  279. //int recv_len;
  280. char data[buf_len];
  281. int data_len;
  282. struct sockaddr_in udp_new_addr_in={0};
  283. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  284. if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
  285. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
  286. mylog(log_error,"recv_from error,this shouldnt happen at client\n");
  287. myexit(1);
  288. };
  289. if(data_len>=mtu_warn)
  290. {
  291. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  292. }
  293. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  294. ntohs(udp_new_addr_in.sin_port),data_len);
  295. ip_port_t ip_port;
  296. ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  297. ip_port.port=udp_new_addr_in.sin_port;
  298. if(!conn_manager.exist_ip_port(ip_port))
  299. {
  300. conn_info_t &conn_info=conn_manager.find_insert(ip_port);
  301. conn_info.conv_manager.reserve();
  302. }
  303. conn_info_t &conn_info=conn_manager.find_insert(ip_port);
  304. u32_t conv;
  305. char *new_data;
  306. int new_len;
  307. get_conv(conv,data,data_len,new_data,new_len);
  308. /*
  309. id_t tmp_conv_id;
  310. memcpy(&tmp_conv_id,&data_[0],sizeof(tmp_conv_id));
  311. tmp_conv_id=ntohl(tmp_conv_id);*/
  312. if (!conn_info.conv_manager.is_conv_used(conv))
  313. {
  314. int new_udp_fd;
  315. new_connected_socket(new_udp_fd,remote_ip_uint32,remote_port);
  316. if (ret != 0) {
  317. mylog(log_warn, "[%s:%d]add udp_fd error\n",my_ntoa(ip_port.ip),ip_port.port);
  318. close(new_udp_fd);
  319. return -1;
  320. }
  321. fd64_t fd64 = fd_manager.insert_fd(new_udp_fd);
  322. ev.events = EPOLLIN;
  323. ev.data.u64 = fd64;
  324. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, new_udp_fd, &ev);
  325. conn_info.conv_manager.insert_conv(conv, fd64);
  326. assert(!conn_manager.exist_fd64(fd64));
  327. conn_manager.insert_fd64(fd64,ip_port);
  328. }
  329. fd64_t fd64= conn_info.conv_manager.find_u64_by_conv(conv);
  330. //int fd=fd_manager.fd64_to_fd(fd64);
  331. dest_t dest;
  332. dest.type=type_fd64;
  333. dest.inner.fd64=fd64;
  334. my_send(dest,new_data,new_len);
  335. //int fd = int((u64 << 32u) >> 32u);
  336. //////////////////////////////todo
  337. //u64_t u64=((u64_t(udp_new_addr_in.sin_addr.s_addr))<<32u)+ntohs(udp_new_addr_in.sin_port);
  338. }
  339. /*
  340. else if ((events[idx].data.u64 >>32u) == 2u)
  341. {
  342. if(debug_flag)begin_time=get_current_time();
  343. int fd=get_u64_l(events[idx].data.u64);
  344. u64_t dummy;
  345. read(fd, &dummy, 8);
  346. if(conn_manager.timer_fd_mp.find(fd)==conn_manager.timer_fd_mp.end()) //this can happen,when fd is a just closed fd
  347. {
  348. mylog(log_info,"timer_fd no longer exits\n");
  349. continue;
  350. }
  351. conn_info_t* p_conn_info=conn_manager.timer_fd_mp[fd];
  352. u32_t ip=p_conn_info->raw_info.recv_info.src_ip;
  353. u32_t port=p_conn_info->raw_info.recv_info.src_port;
  354. assert(conn_manager.exist(ip,port));//TODO remove this for peformance
  355. assert(p_conn_info->state.server_current_state == server_ready); //TODO remove this for peformance
  356. //conn_info_t &conn_info=conn_manager.find(ip,port);
  357. char ip_port[40];
  358. sprintf(ip_port,"%s:%d",my_ntoa(ip),port);
  359. server_on_timer_multi(*p_conn_info,ip_port);
  360. if(debug_flag)
  361. {
  362. end_time=get_current_time();
  363. mylog(log_debug,"(events[idx].data.u64 >>32u) == 2u ,%llu,%llu,%llu \n",begin_time,end_time,end_time-begin_time);
  364. }
  365. }*/
  366. else if (events[idx].data.u64 >u32_t(-1))
  367. {
  368. char data[buf_len];
  369. int data_len;
  370. fd64_t fd64=events[idx].data.u64;
  371. if(!fd_manager.fd64_exist(fd64))
  372. {
  373. continue;
  374. }
  375. int fd=fd_manager.fd64_to_fd(fd64);
  376. if(!conn_manager.exist_fd64(fd64)) //this can happen,when fd is a just closed fd
  377. {
  378. mylog(log_debug,"fd no longer exists in udp_fd_mp,udp fd64 %lld\n",fd64);
  379. recv(fd,0,0,0);
  380. continue;
  381. }
  382. ip_port_t ip_port=conn_manager.find_by_fd64(fd64);
  383. conn_info_t* p_conn_info=conn_manager.find_insert_p(ip_port);
  384. if(!conn_manager.exist_ip_port(ip_port))//TODO remove this for peformance
  385. {
  386. mylog(log_fatal,"ip port no longer exits 2!!!this shouldnt happen\n");
  387. myexit(-1);
  388. }
  389. conn_info_t &conn_info=*p_conn_info;
  390. if(!conn_info.conv_manager.is_u64_used(fd))
  391. {
  392. mylog(log_debug,"conv no longer exists,udp fd %d\n",fd);
  393. int recv_len=recv(fd,0,0,0); ///////////TODO ,delete this
  394. continue;
  395. }
  396. u32_t conv_id=conn_info.conv_manager.find_conv_by_u64(fd);
  397. data_len=recv(fd,data,max_data_len,0);
  398. mylog(log_trace,"received a packet from udp_fd,len:%d\n",data_len);
  399. if(data_len<0)
  400. {
  401. mylog(log_debug,"udp fd,recv_len<0 continue,%s\n",strerror(errno));
  402. continue;
  403. }
  404. if(data_len>=mtu_warn)
  405. {
  406. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  407. }
  408. ////////todo send data
  409. }
  410. else
  411. {
  412. mylog(log_fatal,"unknown fd,this should never happen\n");
  413. myexit(-1);
  414. }
  415. }
  416. }
  417. return 0;
  418. }
  419. int unit_test()
  420. {
  421. int i,j,k;
  422. void *code=fec_new(3,6);
  423. char arr[6][100]=
  424. {
  425. "aaa","bbb","ccc"
  426. ,"ddd","eee","fff"
  427. };
  428. char *data[6];
  429. for(i=0;i<6;i++)
  430. {
  431. data[i]=arr[i];
  432. }
  433. rs_encode(code,data,3);
  434. //printf("%d %d",(int)(unsigned char)arr[5][0],(int)('a'^'b'^'c'^'d'^'e'));
  435. for(i=0;i<6;i++)
  436. {
  437. printf("<%s>",data[i]);
  438. }
  439. data[0]=0;
  440. //data[1]=0;
  441. //data[5]=0;
  442. int ret=rs_decode(code,data,3);
  443. printf("ret:%d\n",ret);
  444. for(i=0;i<6;i++)
  445. {
  446. printf("<%s>",data[i]);
  447. }
  448. fec_free(code);
  449. return 0;
  450. }
  451. void print_help()
  452. {
  453. char git_version_buf[100]={0};
  454. strncpy(git_version_buf,gitversion,10);
  455. printf("UDPspeeder\n");
  456. printf("git version:%s ",git_version_buf);
  457. printf("build date:%s %s\n",__DATE__,__TIME__);
  458. printf("repository: https://github.com/wangyu-/UDPspeeder\n");
  459. printf("\n");
  460. printf("usage:\n");
  461. printf(" run as client : ./this_program -c -l local_listen_ip:local_port -r server_ip:server_port [options]\n");
  462. printf(" run as server : ./this_program -s -l server_listen_ip:server_port -r remote_ip:remote_port [options]\n");
  463. printf("\n");
  464. printf("common option,must be same on both sides:\n");
  465. printf(" -k,--key <string> key for simple xor encryption,default:\"secret key\"\n");
  466. printf("main options:\n");
  467. printf(" -d <number> duplicated packet number, -d 0 means no duplicate. default value:0\n");
  468. printf(" -t <number> duplicated packet delay time, unit: 0.1ms,default value:20(2ms)\n");
  469. printf(" -j <number> simulated jitter.randomly delay first packet for 0~jitter_value*0.1 ms,to\n");
  470. printf(" create simulated jitter.default value:0.do not use if you dont\n");
  471. printf(" know what it means\n");
  472. printf(" --report <number> turn on udp send/recv report,and set a time interval for reporting,unit:s\n");
  473. printf("advanced options:\n");
  474. printf(" -t tmin:tmax simliar to -t above,but delay randomly between tmin and tmax\n");
  475. printf(" -j jmin:jmax simliar to -j above,but create jitter randomly between jmin and jmax\n");
  476. printf(" --random-drop <number> simulate packet loss ,unit:0.01%%\n");
  477. printf(" --disable-filter disable duplicate packet filter.\n");
  478. printf(" -m <number> max pending packets,to prevent the program from eating up all your memory,\n");
  479. printf(" default value:0(disabled).\n");
  480. printf("other options:\n");
  481. printf(" --log-level <number> 0:never 1:fatal 2:error 3:warn \n");
  482. printf(" 4:info (default) 5:debug 6:trace\n");
  483. printf(" --log-position enable file name,function name,line number in log\n");
  484. printf(" --disable-color disable log color\n");
  485. printf(" --sock-buf <number> buf size for socket,>=10 and <=10240,unit:kbyte,default:1024\n");
  486. //printf(" -p use multi-process mode instead of epoll.very costly,only for test,do dont use\n");
  487. printf(" -h,--help print this help message\n");
  488. //printf("common options,these options must be same on both side\n");
  489. }
  490. void process_arg(int argc, char *argv[])
  491. {
  492. int is_client=0,is_server=0;
  493. int i, j, k;
  494. int opt;
  495. static struct option long_options[] =
  496. {
  497. {"log-level", required_argument, 0, 1},
  498. {"log-position", no_argument, 0, 1},
  499. {"disable-color", no_argument, 0, 1},
  500. {"disable-filter", no_argument, 0, 1},
  501. {"sock-buf", required_argument, 0, 1},
  502. {"random-drop", required_argument, 0, 1},
  503. {"report", required_argument, 0, 1},
  504. {NULL, 0, 0, 0}
  505. };
  506. int option_index = 0;
  507. if (argc == 1)
  508. {
  509. print_help();
  510. myexit( -1);
  511. }
  512. for (i = 0; i < argc; i++)
  513. {
  514. if(strcmp(argv[i],"--unit-test")==0)
  515. {
  516. unit_test();
  517. myexit(0);
  518. }
  519. }
  520. for (i = 0; i < argc; i++)
  521. {
  522. if(strcmp(argv[i],"-h")==0||strcmp(argv[i],"--help")==0)
  523. {
  524. print_help();
  525. myexit(0);
  526. }
  527. }
  528. for (i = 0; i < argc; i++)
  529. {
  530. if(strcmp(argv[i],"--log-level")==0)
  531. {
  532. if(i<argc -1)
  533. {
  534. sscanf(argv[i+1],"%d",&log_level);
  535. if(0<=log_level&&log_level<log_end)
  536. {
  537. }
  538. else
  539. {
  540. log_bare(log_fatal,"invalid log_level\n");
  541. myexit(-1);
  542. }
  543. }
  544. }
  545. if(strcmp(argv[i],"--disable-color")==0)
  546. {
  547. enable_log_color=0;
  548. }
  549. }
  550. mylog(log_info,"argc=%d ", argc);
  551. for (i = 0; i < argc; i++) {
  552. log_bare(log_info, "%s ", argv[i]);
  553. }
  554. log_bare(log_info, "\n");
  555. if (argc == 1)
  556. {
  557. print_help();
  558. myexit(-1);
  559. }
  560. int no_l = 1, no_r = 1;
  561. while ((opt = getopt_long(argc, argv, "l:r:d:t:hcspk:j:m:",long_options,&option_index)) != -1)
  562. {
  563. //string opt_key;
  564. //opt_key+=opt;
  565. switch (opt)
  566. {
  567. case 'p':
  568. //multi_process_mode=1;
  569. break;
  570. case 'k':
  571. sscanf(optarg,"%s\n",key_string);
  572. mylog(log_debug,"key=%s\n",key_string);
  573. if(strlen(key_string)==0)
  574. {
  575. mylog(log_fatal,"key len=0??\n");
  576. myexit(-1);
  577. }
  578. break;
  579. case 'm':
  580. sscanf(optarg,"%d\n",&max_pending_packet);
  581. if(max_pending_packet<1000)
  582. {
  583. mylog(log_fatal,"max_pending_packet must be >1000\n");
  584. myexit(-1);
  585. }
  586. break;
  587. case 'j':
  588. if (strchr(optarg, ':') == 0)
  589. {
  590. int jitter;
  591. sscanf(optarg,"%d\n",&jitter);
  592. if(jitter<0 ||jitter>1000*100)
  593. {
  594. mylog(log_fatal,"jitter must be between 0 and 100,000(10 second)\n");
  595. myexit(-1);
  596. }
  597. jitter_min=0;
  598. jitter_max=jitter;
  599. }
  600. else
  601. {
  602. sscanf(optarg,"%d:%d\n",&jitter_min,&jitter_max);
  603. if(jitter_min<0 ||jitter_max<0||jitter_min>jitter_max)
  604. {
  605. mylog(log_fatal," must satisfy 0<=jmin<=jmax\n");
  606. myexit(-1);
  607. }
  608. }
  609. break;
  610. case 't':
  611. if (strchr(optarg, ':') == 0)
  612. {
  613. int dup_delay=-1;
  614. sscanf(optarg,"%d\n",&dup_delay);
  615. if(dup_delay<1||dup_delay>1000*100)
  616. {
  617. mylog(log_fatal,"dup_delay must be between 1 and 100,000(10 second)\n");
  618. myexit(-1);
  619. }
  620. dup_delay_min=dup_delay_max=dup_delay;
  621. }
  622. else
  623. {
  624. sscanf(optarg,"%d:%d\n",&dup_delay_min,&dup_delay_max);
  625. if(dup_delay_min<1 ||dup_delay_max<1||dup_delay_min>dup_delay_max)
  626. {
  627. mylog(log_fatal," must satisfy 1<=dmin<=dmax\n");
  628. myexit(-1);
  629. }
  630. }
  631. break;
  632. case 'd':
  633. dup_num=-1;
  634. sscanf(optarg,"%d\n",&dup_num);
  635. if(dup_num<0 ||dup_num>5)
  636. {
  637. mylog(log_fatal,"dup_num must be between 0 and 5\n");
  638. myexit(-1);
  639. }
  640. dup_num+=1;
  641. break;
  642. case 'c':
  643. is_client = 1;
  644. break;
  645. case 's':
  646. is_server = 1;
  647. break;
  648. case 'l':
  649. no_l = 0;
  650. if (strchr(optarg, ':') != 0)
  651. {
  652. sscanf(optarg, "%[^:]:%d", local_ip, &local_port);
  653. }
  654. else
  655. {
  656. mylog(log_fatal," -r ip:port\n");
  657. myexit(1);
  658. strcpy(local_ip, "127.0.0.1");
  659. sscanf(optarg, "%d", &local_port);
  660. }
  661. break;
  662. case 'r':
  663. no_r = 0;
  664. if (strchr(optarg, ':') != 0)
  665. {
  666. //printf("in :\n");
  667. //printf("%s\n",optarg);
  668. sscanf(optarg, "%[^:]:%d", remote_ip, &remote_port);
  669. //printf("%d\n",remote_port);
  670. }
  671. else
  672. {
  673. mylog(log_fatal," -r ip:port\n");
  674. myexit(1);
  675. strcpy(remote_ip, "127.0.0.1");
  676. sscanf(optarg, "%d", &remote_port);
  677. }
  678. break;
  679. case 'h':
  680. break;
  681. case 1:
  682. if(strcmp(long_options[option_index].name,"log-level")==0)
  683. {
  684. }
  685. else if(strcmp(long_options[option_index].name,"disable-filter")==0)
  686. {
  687. disable_replay_filter=1;
  688. //enable_log_color=0;
  689. }
  690. else if(strcmp(long_options[option_index].name,"disable-color")==0)
  691. {
  692. //enable_log_color=0;
  693. }
  694. else if(strcmp(long_options[option_index].name,"log-position")==0)
  695. {
  696. enable_log_position=1;
  697. }
  698. else if(strcmp(long_options[option_index].name,"random-drop")==0)
  699. {
  700. sscanf(optarg,"%d",&random_drop);
  701. if(random_drop<0||random_drop>10000)
  702. {
  703. mylog(log_fatal,"random_drop must be between 0 10000 \n");
  704. myexit(-1);
  705. }
  706. }
  707. else if(strcmp(long_options[option_index].name,"report")==0)
  708. {
  709. sscanf(optarg,"%d",&report_interval);
  710. if(report_interval<=0)
  711. {
  712. mylog(log_fatal,"report_interval must be >0 \n");
  713. myexit(-1);
  714. }
  715. }
  716. else if(strcmp(long_options[option_index].name,"sock-buf")==0)
  717. {
  718. int tmp=-1;
  719. sscanf(optarg,"%d",&tmp);
  720. if(10<=tmp&&tmp<=10*1024)
  721. {
  722. socket_buf_size=tmp*1024;
  723. }
  724. else
  725. {
  726. mylog(log_fatal,"sock-buf value must be between 1 and 10240 (kbyte) \n");
  727. myexit(-1);
  728. }
  729. }
  730. else
  731. {
  732. mylog(log_fatal,"unknown option\n");
  733. myexit(-1);
  734. }
  735. break;
  736. default:
  737. mylog(log_fatal,"unknown option <%x>", opt);
  738. myexit(-1);
  739. }
  740. }
  741. if (no_l)
  742. mylog(log_fatal,"error: -i not found\n");
  743. if (no_r)
  744. mylog(log_fatal,"error: -o not found\n");
  745. if (no_l || no_r)
  746. myexit(-1);
  747. if (is_client == 0 && is_server == 0)
  748. {
  749. mylog(log_fatal,"-s -c hasnt been set\n");
  750. myexit(-1);
  751. }
  752. if (is_client == 1 && is_server == 1)
  753. {
  754. mylog(log_fatal,"-s -c cant be both set\n");
  755. myexit(-1);
  756. }
  757. if(is_client==1)
  758. {
  759. program_mode=client_mode;
  760. }
  761. else
  762. {
  763. program_mode=server_mode;
  764. }
  765. }
  766. int main(int argc, char *argv[])
  767. {
  768. /*
  769. if(argc==1||argc==0)
  770. {
  771. printf("this_program classic\n");
  772. printf("this_program fec\n");
  773. return 0;
  774. }*/
  775. /*
  776. if(argc>=2&&strcmp(argv[1],"fec")!=0)
  777. {
  778. printf("running into classic mode!\n");
  779. return classic::main(argc,argv);
  780. }*/
  781. assert(sizeof(u64_t)==8);
  782. assert(sizeof(i64_t)==8);
  783. assert(sizeof(u32_t)==4);
  784. assert(sizeof(i32_t)==4);
  785. dup2(1, 2); //redirect stderr to stdout
  786. int i, j, k;
  787. process_arg(argc,argv);
  788. delay_manager.capacity=max_pending_packet;
  789. init_random_number_fd();
  790. local_ip_uint32=inet_addr(local_ip);
  791. remote_ip_uint32=inet_addr(remote_ip);
  792. if(program_mode==client_mode)
  793. {
  794. client_event_loop();
  795. }
  796. else
  797. {
  798. server_event_loop();
  799. }
  800. return 0;
  801. }