tun_dev.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697
  1. /*
  2. * tun.cpp
  3. *
  4. * Created on: Oct 26, 2017
  5. * Author: root
  6. */
  7. #include "common.h"
  8. #include "log.h"
  9. #include "misc.h"
  10. int get_tun_fd(char * dev_name)
  11. {
  12. int tun_fd=open("/dev/net/tun",O_RDWR);
  13. if(tun_fd <0)
  14. {
  15. mylog(log_fatal,"open /dev/net/tun failed");
  16. myexit(-1);
  17. }
  18. struct ifreq ifr;
  19. memset(&ifr, 0, sizeof(ifr));
  20. ifr.ifr_flags = IFF_TUN|IFF_NO_PI;
  21. strncpy(ifr.ifr_name, dev_name, IFNAMSIZ);
  22. if(ioctl(tun_fd, TUNSETIFF, (void *)&ifr) != 0)
  23. {
  24. mylog(log_fatal,"open /dev/net/tun failed");
  25. myexit(-1);
  26. }
  27. return tun_fd;
  28. }
  29. int set_if(char *if_name,u32_t local_ip,u32_t remote_ip,int mtu)
  30. {
  31. //printf("i m here1\n");
  32. struct ifreq ifr;
  33. struct sockaddr_in sai;
  34. memset(&ifr,0,sizeof(ifr));
  35. memset(&sai, 0, sizeof(struct sockaddr));
  36. int sockfd = socket(AF_INET, SOCK_DGRAM, 0);
  37. strncpy(ifr.ifr_name, if_name, IFNAMSIZ);
  38. sai.sin_family = AF_INET;
  39. sai.sin_port = 0;
  40. sai.sin_addr.s_addr = local_ip;
  41. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  42. assert(ioctl(sockfd, SIOCSIFADDR, &ifr)==0);
  43. //sai.sin_addr.s_addr = local_ip;
  44. //memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  45. //assert(ioctl(sockfd, SIOCSIFADDR, &ifr)==0);
  46. sai.sin_addr.s_addr = remote_ip;
  47. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  48. assert(ioctl(sockfd, SIOCSIFDSTADDR, &ifr)==0);
  49. ifr.ifr_mtu=mtu;
  50. assert(ioctl(sockfd, SIOCSIFMTU, &ifr)==0);
  51. assert(ioctl(sockfd, SIOCGIFFLAGS, &ifr)==0);
  52. // ifr.ifr_flags |= ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );
  53. ifr.ifr_flags |= ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );
  54. assert(ioctl(sockfd, SIOCSIFFLAGS, &ifr)==0);
  55. //printf("i m here2\n");
  56. return 0;
  57. }
  58. //enum tun_header_t {header_reserved=0,header_normal=1,header_new=2,header_reject=3};
  59. const char header_normal=1;
  60. const char header_new_connect=2;
  61. const char header_reject=3;
  62. int put_header(char header,char * data,int &len)
  63. {
  64. assert(len>=0);
  65. data[len]=header;
  66. len+=1;
  67. //data=data-1;
  68. //data[0]=header;
  69. //len+=1;
  70. return 0;
  71. }
  72. int get_header(char &header,char * data,int &len)
  73. {
  74. assert(len>=0);
  75. if(len<1) return -1;
  76. len-=1;
  77. header=data[len];
  78. return 0;
  79. }
  80. int from_normal_to_fec2(conn_info_t & conn_info,dest_t &dest,char * data,int len,char header)
  81. {
  82. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  83. from_normal_to_fec(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  84. for(int i=0;i<out_n;i++)
  85. {
  86. //put_header(header,out_arr[i],out_len[i]);
  87. char tmp_buf[buf_len];
  88. int tmp_len=out_len[i];
  89. memcpy(tmp_buf,out_arr[i],out_len[i]);
  90. put_header(header,tmp_buf,tmp_len);
  91. delay_send(out_delay[i],dest,tmp_buf,tmp_len);
  92. //put_header(header,out_arr[i],out_len[i]);
  93. //delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  94. }
  95. return 0;
  96. }
  97. int from_fec_to_normal2(conn_info_t & conn_info,dest_t &dest,char * data,int len)
  98. {
  99. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  100. from_fec_to_normal(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  101. for(int i=0;i<out_n;i++)
  102. {
  103. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  104. }
  105. return 0;
  106. }
  107. int tun_dev_client_event_loop()
  108. {
  109. char buf0[buf_len+100];
  110. char *data=buf0+100;
  111. int len;
  112. int i,j,k,ret;
  113. int epoll_fd,tun_fd;
  114. int remote_fd;
  115. fd64_t remote_fd64;
  116. tun_fd=get_tun_fd(tun_dev);
  117. assert(tun_fd>0);
  118. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  119. remote_fd64=fd_manager.create(remote_fd);
  120. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|2),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|1),g_fec_mtu)==0);
  121. epoll_fd = epoll_create1(0);
  122. assert(epoll_fd>0);
  123. const int max_events = 4096;
  124. struct epoll_event ev, events[max_events];
  125. if (epoll_fd < 0) {
  126. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  127. myexit(-1);
  128. }
  129. ev.events = EPOLLIN;
  130. ev.data.u64 = remote_fd64;
  131. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  132. if (ret!=0) {
  133. mylog(log_fatal,"add remote_fd64 error\n");
  134. myexit(-1);
  135. }
  136. ev.events = EPOLLIN;
  137. ev.data.u64 = tun_fd;
  138. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  139. if (ret!=0) {
  140. mylog(log_fatal,"add tun_fd error\n");
  141. myexit(-1);
  142. }
  143. ev.events = EPOLLIN;
  144. ev.data.u64 = delay_manager.get_timer_fd();
  145. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  146. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  147. if (ret!= 0) {
  148. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  149. myexit(-1);
  150. }
  151. conn_info_t *conn_info_p=new conn_info_t;
  152. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  153. u64_t fd64=conn_info.fec_encode_manager.get_timer_fd64();
  154. ev.events = EPOLLIN;
  155. ev.data.u64 = fd64;
  156. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  157. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(fd64), &ev);
  158. if (ret!= 0) {
  159. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  160. myexit(-1);
  161. }
  162. //my_timer_t timer;
  163. conn_info.timer.add_fd_to_epoll(epoll_fd);
  164. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  165. int fifo_fd=-1;
  166. if(fifo_file[0]!=0)
  167. {
  168. fifo_fd=create_fifo(fifo_file);
  169. ev.events = EPOLLIN;
  170. ev.data.u64 = fifo_fd;
  171. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  172. if (ret!= 0) {
  173. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  174. myexit(-1);
  175. }
  176. mylog(log_info,"fifo_file=%s\n",fifo_file);
  177. }
  178. //dest.conv=conv;
  179. //dest.inner.ip_port=dest_ip_port;
  180. //dest.cook=1;
  181. dest_t udp_dest;
  182. udp_dest.cook=1;
  183. udp_dest.type=type_fd64;
  184. udp_dest.inner.fd64=remote_fd64;
  185. dest_t tun_dest;
  186. tun_dest.type=type_write_fd;
  187. tun_dest.inner.fd=tun_fd;
  188. int got_feed_back=0;
  189. while(1)////////////////////////
  190. {
  191. if(about_to_exit) myexit(0);
  192. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  193. if (nfds < 0) { //allow zero
  194. if(errno==EINTR )
  195. {
  196. mylog(log_info,"epoll interrupted by signal\n");
  197. myexit(0);
  198. }
  199. else
  200. {
  201. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  202. myexit(-1);
  203. }
  204. }
  205. int idx;
  206. for (idx = 0; idx < nfds; ++idx)
  207. {
  208. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  209. {
  210. uint64_t value;
  211. read(conn_info.timer.get_timer_fd(), &value, 8);
  212. mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
  213. conn_info.stat.report_as_client();
  214. }
  215. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  216. {
  217. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  218. //mylog(log_info,"timer!!!\n");
  219. uint64_t value;
  220. if(!fd_manager.exist(fd64)) //fd64 has been closed
  221. {
  222. mylog(log_trace,"!fd_manager.exist(fd64)");
  223. continue;
  224. }
  225. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  226. {
  227. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  228. continue;
  229. }
  230. if(value==0)
  231. {
  232. mylog(log_debug,"value==0\n");
  233. continue;
  234. }
  235. assert(value==1);
  236. char header=(got_feed_back==0?header_new_connect:header_normal);
  237. from_normal_to_fec2(conn_info,udp_dest,0,0,header);
  238. }
  239. else if(events[idx].data.u64==(u64_t)tun_fd)
  240. {
  241. len=read(tun_fd,data,max_data_len);
  242. if(len<0)
  243. {
  244. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  245. continue;
  246. }
  247. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  248. char header=(got_feed_back==0?header_new_connect:header_normal);
  249. from_normal_to_fec2(conn_info,udp_dest,data,len,header);
  250. }
  251. else if(events[idx].data.u64==(u64_t)remote_fd64)
  252. {
  253. fd64_t fd64=events[idx].data.u64;
  254. int fd=fd_manager.to_fd(fd64);
  255. len=recv(fd,data,max_data_len,0);
  256. if(len<0)
  257. {
  258. mylog(log_warn,"recv return %d,errno=%s\n",len,strerror(errno));
  259. continue;
  260. }
  261. if(de_cook(data,len)<0)
  262. {
  263. mylog(log_warn,"de_cook(data,len)failed \n");
  264. continue;
  265. }
  266. char header=0;
  267. if(get_header(header,data,len)!=0)
  268. {
  269. mylog(log_warn,"get_header failed\n");
  270. continue;
  271. }
  272. if(header==header_reject)
  273. {
  274. mylog(log_fatal,"server restarted or switched to handle another client,exited\n");
  275. myexit(-1);
  276. continue;
  277. }
  278. else if(header==header_normal)
  279. {
  280. if(got_feed_back==0)
  281. mylog(log_info,"connect accepted by server %d\n",int(header));
  282. got_feed_back=1;
  283. }
  284. else
  285. {
  286. mylog(log_warn,"invalid header %d %d\n",int(header),len);
  287. continue;
  288. }
  289. mylog(log_trace,"Received packet from udp,len: %d\n",len);
  290. from_fec_to_normal2(conn_info,tun_dest,data,len);
  291. }
  292. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  293. {
  294. uint64_t value;
  295. read(delay_manager.get_timer_fd(), &value, 8);
  296. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  297. }
  298. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  299. {
  300. char buf[buf_len];
  301. int len=read (fifo_fd, buf, sizeof (buf));
  302. if(len<0)
  303. {
  304. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  305. continue;
  306. }
  307. buf[len]=0;
  308. handle_command(buf);
  309. }
  310. else
  311. {
  312. //assert(0==1);
  313. }
  314. }
  315. delay_manager.check();
  316. }
  317. return 0;
  318. }
  319. int tun_dev_server_event_loop()
  320. {
  321. char buf0[buf_len+100];
  322. char *data=buf0+100;
  323. int len;
  324. int i,j,k,ret;
  325. int epoll_fd,tun_fd;
  326. int local_listen_fd;
  327. //fd64_t local_listen_fd64;
  328. tun_fd=get_tun_fd(tun_dev);
  329. assert(tun_fd>0);
  330. assert(new_listen_socket(local_listen_fd,local_ip_uint32,local_port)==0);
  331. // local_listen_fd64=fd_manager.create(local_listen_fd);
  332. //assert(set_if("tun11","10.0.0.1","10.0.0.2",1000)==0);
  333. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|1),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|2),g_fec_mtu)==0);
  334. epoll_fd = epoll_create1(0);
  335. assert(epoll_fd>0);
  336. const int max_events = 4096;
  337. struct epoll_event ev, events[max_events];
  338. if (epoll_fd < 0) {
  339. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  340. myexit(-1);
  341. }
  342. ev.events = EPOLLIN;
  343. ev.data.u64 = local_listen_fd;
  344. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  345. if (ret!=0) {
  346. mylog(log_fatal,"add udp_listen_fd error\n");
  347. myexit(-1);
  348. }
  349. ev.events = EPOLLIN;
  350. ev.data.u64 = tun_fd;
  351. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  352. if (ret!=0) {
  353. mylog(log_fatal,"add tun_fd error\n");
  354. myexit(-1);
  355. }
  356. ev.events = EPOLLIN;
  357. ev.data.u64 = delay_manager.get_timer_fd();
  358. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  359. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  360. if (ret!= 0) {
  361. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  362. myexit(-1);
  363. }
  364. conn_info_t *conn_info_p=new conn_info_t;
  365. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  366. u64_t fd64=conn_info.fec_encode_manager.get_timer_fd64();
  367. ev.events = EPOLLIN;
  368. ev.data.u64 = fd64;
  369. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  370. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(fd64), &ev);
  371. if (ret!= 0) {
  372. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  373. myexit(-1);
  374. }
  375. //my_timer_t timer;
  376. conn_info.timer.add_fd_to_epoll(epoll_fd);
  377. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  378. int fifo_fd=-1;
  379. if(fifo_file[0]!=0)
  380. {
  381. fifo_fd=create_fifo(fifo_file);
  382. ev.events = EPOLLIN;
  383. ev.data.u64 = fifo_fd;
  384. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  385. if (ret!= 0) {
  386. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  387. myexit(-1);
  388. }
  389. mylog(log_info,"fifo_file=%s\n",fifo_file);
  390. }
  391. dest_t udp_dest;
  392. udp_dest.cook=1;
  393. udp_dest.type=type_fd_ip_port;
  394. udp_dest.inner.fd_ip_port.fd=local_listen_fd;
  395. udp_dest.inner.fd_ip_port.ip_port.ip=0;
  396. udp_dest.inner.fd_ip_port.ip_port.port=0;
  397. dest_t tun_dest;
  398. tun_dest.type=type_write_fd;
  399. tun_dest.inner.fd=tun_fd;
  400. while(1)////////////////////////
  401. {
  402. if(about_to_exit) myexit(0);
  403. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  404. if (nfds < 0) { //allow zero
  405. if(errno==EINTR )
  406. {
  407. mylog(log_info,"epoll interrupted by signal\n");
  408. myexit(0);
  409. }
  410. else
  411. {
  412. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  413. myexit(-1);
  414. }
  415. }
  416. int idx;
  417. for (idx = 0; idx < nfds; ++idx)
  418. {
  419. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  420. {
  421. uint64_t value;
  422. read(conn_info.timer.get_timer_fd(), &value, 8);
  423. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  424. {
  425. continue;
  426. }
  427. conn_info.stat.report_as_server(udp_dest.inner.fd_ip_port.ip_port);
  428. }
  429. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  430. {
  431. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  432. //mylog(log_info,"timer!!!\n");
  433. uint64_t value;
  434. if(!fd_manager.exist(fd64)) //fd64 has been closed
  435. {
  436. mylog(log_trace,"!fd_manager.exist(fd64)");
  437. continue;
  438. }
  439. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  440. {
  441. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  442. continue;
  443. }
  444. if(value==0)
  445. {
  446. mylog(log_debug,"value==0\n");
  447. continue;
  448. }
  449. assert(value==1);
  450. from_normal_to_fec2(conn_info,udp_dest,0,0,header_normal);
  451. }
  452. else if(events[idx].data.u64==(u64_t)local_listen_fd)
  453. {
  454. struct sockaddr_in udp_new_addr_in={0};
  455. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  456. if ((len = recvfrom(local_listen_fd, data, max_data_len, 0,
  457. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) < 0) {
  458. mylog(log_error,"recv_from error,this shouldnt happen,err=%s,but we can try to continue\n",strerror(errno));
  459. continue;
  460. //myexit(1);
  461. };
  462. if(de_cook(data,len)<0)
  463. {
  464. mylog(log_warn,"de_cook(data,len)failed \n");
  465. continue;
  466. }
  467. char header=0;
  468. if(get_header(header,data,len)!=0)
  469. {
  470. mylog(log_warn,"get_header failed\n");
  471. continue;
  472. }
  473. if((udp_dest.inner.fd_ip_port.ip_port.ip==udp_new_addr_in.sin_addr.s_addr) && (udp_dest.inner.fd_ip_port.ip_port.port==ntohs(udp_new_addr_in.sin_port)))
  474. {
  475. if(header!=header_new_connect&& header!=header_normal)
  476. {
  477. mylog(log_warn,"invalid header\n");
  478. continue;
  479. }
  480. }
  481. else
  482. {
  483. if(header==header_new_connect)
  484. {
  485. mylog(log_info,"new connection from %s:%d \n", inet_ntoa(udp_new_addr_in.sin_addr),
  486. ntohs(udp_new_addr_in.sin_port));
  487. udp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  488. udp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  489. conn_info.fec_decode_manager.clear();
  490. conn_info.fec_encode_manager.clear();
  491. memset(&conn_info.stat,0,sizeof(conn_info.stat));
  492. }
  493. else if(header==header_normal)
  494. {
  495. mylog(log_info,"rejected connection from %s:%d\n", inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port));
  496. len=1;
  497. data[0]=header_reject;
  498. do_cook(data,len);
  499. dest_t tmp_dest;
  500. tmp_dest.type=type_fd_ip_port;
  501. tmp_dest.inner.fd_ip_port.fd=local_listen_fd;
  502. tmp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  503. tmp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  504. delay_manager.add(0,tmp_dest,data,len);;
  505. continue;
  506. }
  507. else
  508. {
  509. mylog(log_warn,"invalid header\n");
  510. }
  511. }
  512. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  513. ntohs(udp_new_addr_in.sin_port),len);
  514. from_fec_to_normal2(conn_info,tun_dest,data,len);
  515. }
  516. else if(events[idx].data.u64==(u64_t)tun_fd)
  517. {
  518. len=read(tun_fd,data,max_data_len);
  519. assert(len>=0);
  520. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  521. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  522. {
  523. mylog(log_debug,"received packet from tun,but there is no client yet,dropped packet\n");
  524. continue;
  525. }
  526. from_normal_to_fec2(conn_info,udp_dest,data,len,header_normal);
  527. }
  528. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  529. {
  530. uint64_t value;
  531. read(delay_manager.get_timer_fd(), &value, 8);
  532. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  533. }
  534. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  535. {
  536. char buf[buf_len];
  537. int len=read (fifo_fd, buf, sizeof (buf));
  538. if(len<0)
  539. {
  540. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  541. continue;
  542. }
  543. buf[len]=0;
  544. handle_command(buf);
  545. }
  546. else
  547. {
  548. //assert(0==1);
  549. }
  550. }
  551. delay_manager.check();
  552. }
  553. return 0;
  554. }