main.cpp 36 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451
  1. #include "common.h"
  2. #include "log.h"
  3. #include "git_version.h"
  4. #include "lib/rs.h"
  5. #include "packet.h"
  6. #include "connection.h"
  7. #include "fd_manager.h"
  8. #include "delay_manager.h"
  9. #include "fec_manager.h"
  10. using namespace std;
  11. typedef unsigned long long u64_t; //this works on most platform,avoid using the PRId64
  12. typedef long long i64_t;
  13. typedef unsigned int u32_t;
  14. typedef int i32_t;
  15. int dup_num=1;
  16. int dup_delay_min=20; //0.1ms
  17. int dup_delay_max=20;
  18. int jitter_min=0;
  19. int jitter_max=0;
  20. //int random_number_fd=-1;
  21. int mtu_warn=1350;
  22. int disable_mtu_warn=0;
  23. int disable_fec=0;
  24. int debug_force_flush_fec=0;
  25. int fec_data_num=20;
  26. int fec_redundant_num=8;
  27. int fec_mtu=1250;
  28. int fec_pending_num=30;
  29. int fec_pending_time=10000;
  30. int fec_type=0;
  31. u32_t local_ip_uint32,remote_ip_uint32=0;
  32. char local_ip[100], remote_ip[100];
  33. int local_port = -1, remote_port = -1;
  34. u64_t last_report_time=0;
  35. int report_interval=0;
  36. conn_manager_t conn_manager;
  37. delay_manager_t delay_manager;
  38. fd_manager_t fd_manager;
  39. const int disable_conv_clear=0;
  40. int socket_buf_size=1024*1024;
  41. int VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV;
  42. int init_listen_socket()
  43. {
  44. local_listen_fd =socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  45. int yes = 1;
  46. //setsockopt(udp_fd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(yes));
  47. struct sockaddr_in local_me={0};
  48. socklen_t slen = sizeof(sockaddr_in);
  49. //memset(&local_me, 0, sizeof(local_me));
  50. local_me.sin_family = AF_INET;
  51. local_me.sin_port = htons(local_port);
  52. local_me.sin_addr.s_addr = local_ip_uint32;
  53. if (bind(local_listen_fd, (struct sockaddr*) &local_me, slen) == -1) {
  54. mylog(log_fatal,"socket bind error\n");
  55. //perror("socket bind error");
  56. myexit(1);
  57. }
  58. setnonblocking(local_listen_fd);
  59. set_buf_size(local_listen_fd,socket_buf_size);
  60. mylog(log_debug,"local_listen_fd=%d\n,",local_listen_fd);
  61. return 0;
  62. }
  63. int new_connected_socket(int &fd,u32_t ip,int port)
  64. {
  65. char ip_port[40];
  66. sprintf(ip_port,"%s:%d",my_ntoa(ip),port);
  67. struct sockaddr_in remote_addr_in = { 0 };
  68. socklen_t slen = sizeof(sockaddr_in);
  69. //memset(&remote_addr_in, 0, sizeof(remote_addr_in));
  70. remote_addr_in.sin_family = AF_INET;
  71. remote_addr_in.sin_port = htons(port);
  72. remote_addr_in.sin_addr.s_addr = ip;
  73. fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  74. if (fd < 0) {
  75. mylog(log_warn, "[%s]create udp_fd error\n", ip_port);
  76. return -1;
  77. }
  78. setnonblocking(fd);
  79. set_buf_size(fd, socket_buf_size);
  80. mylog(log_debug, "[%s]created new udp_fd %d\n", ip_port, fd);
  81. int ret = connect(fd, (struct sockaddr *) &remote_addr_in, slen);
  82. if (ret != 0) {
  83. mylog(log_warn, "[%s]fd connect fail\n",ip_port);
  84. close(fd);
  85. return -1;
  86. }
  87. return 0;
  88. }
  89. int delay_send(my_time_t delay,const dest_t &dest,char *data,int len)
  90. {
  91. int rand=random()%100;
  92. //mylog(log_info,"rand = %d\n",rand);
  93. if (dest.cook&&random_drop != 0) {
  94. if (get_true_random_number() % 10000 < (u32_t) random_drop) {
  95. return 0;
  96. }
  97. }
  98. return delay_manager.add(delay,dest,data,len);;
  99. }
  100. int from_normal_to_fec(conn_info_t & conn_info,char *data,int len,int & out_n,char **&out_arr,int *&out_len,int *&out_delay)
  101. {
  102. static int out_delay_buf[max_fec_packet_num+100]={0};
  103. //static int out_len_buf[max_fec_packet_num+100]={0};
  104. static int counter=0;
  105. out_delay=out_delay_buf;
  106. //out_len=out_len_buf;
  107. if(disable_fec)
  108. {
  109. if(data==0) return 0;
  110. out_n=1;
  111. static char *data_static;
  112. data_static=data;
  113. static int len_static;
  114. len_static=len;
  115. out_arr=&data_static;
  116. out_len=&len_static;
  117. }
  118. else
  119. {
  120. counter++;
  121. conn_info.fec_encode_manager.input(data,len);
  122. //if(counter%5==0)
  123. //conn_info.fec_encode_manager.input(0,0);
  124. //int n;
  125. //char **s_arr;
  126. //int s_len;
  127. conn_info.fec_encode_manager.output(out_n,out_arr,out_len);
  128. for(int i=0;i<out_n;i++)
  129. {
  130. out_delay_buf[i]=0;
  131. }
  132. }
  133. mylog(log_trace,"from_normal_to_fec input_len=%d,output_n=%d\n",len,out_n);
  134. if(out_n>0)
  135. {
  136. log_bare(log_trace,"seq= %u ",read_u32(out_arr[0]));
  137. }
  138. for(int i=0;i<out_n;i++)
  139. {
  140. log_bare(log_trace,"%d ",out_len[i]);
  141. }
  142. log_bare(log_trace,"\n");
  143. //for(int i=0;i<n;i++)
  144. //{
  145. //delay_send(0,dest,s_arr[i],s_len);
  146. //}
  147. //delay_send(0,dest,data,len);
  148. //delay_send(1000*1000,dest,data,len);
  149. return 0;
  150. }
  151. int from_fec_to_normal(conn_info_t & conn_info,char *data,int len,int & out_n,char **&out_arr,int *&out_len,int *&out_delay)
  152. {
  153. static int out_delay_buf[max_fec_pending_packet_num+100]={0};
  154. out_delay=out_delay_buf;
  155. if(disable_fec)
  156. {
  157. if(data==0) return 0;
  158. out_n=1;
  159. static char *data_static;
  160. data_static=data;
  161. static int len_static;
  162. len_static=len;
  163. out_arr=&data_static;
  164. out_len=&len_static;
  165. //out_len_buf[0]=len;
  166. }
  167. else
  168. {
  169. conn_info.fec_decode_manager.input(data,len);
  170. //int n;char ** s_arr;int* len_arr;
  171. conn_info.fec_decode_manager.output(out_n,out_arr,out_len);
  172. for(int i=0;i<out_n;i++)
  173. {
  174. out_delay_buf[i]=0;
  175. }
  176. }
  177. mylog(log_trace,"from_fec_to_normal input_len=%d,output_n=%d,input_seq=%u\n",len,out_n,read_u32(data));
  178. // printf("<n:%d>",n);
  179. /*
  180. for(int i=0;i<n;i++)
  181. {
  182. delay_send(0,dest,s_arr[i],len_arr[i]);
  183. //s_arr[i][len_arr[i]]=0;
  184. //printf("<%s>\n",s_arr[i]);
  185. }*/
  186. //my_send(dest,data,len);
  187. return 0;
  188. }
  189. int client_event_loop()
  190. {
  191. //char buf[buf_len];
  192. int i, j, k;int ret;
  193. int yes = 1;
  194. int epoll_fd;
  195. int remote_fd;
  196. fd64_t remote_fd64;
  197. conn_info_t *conn_info_p=new conn_info_t;
  198. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  199. //conn_info.conv_manager.reserve();
  200. conn_info.fec_encode_manager.re_init(fec_data_num,fec_redundant_num,fec_mtu,fec_pending_num,fec_pending_time,fec_type);
  201. init_listen_socket();
  202. epoll_fd = epoll_create1(0);
  203. assert(epoll_fd>0);
  204. const int max_events = 4096;
  205. struct epoll_event ev, events[max_events];
  206. if (epoll_fd < 0) {
  207. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  208. myexit(-1);
  209. }
  210. ev.events = EPOLLIN;
  211. ev.data.u64 = local_listen_fd;
  212. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  213. if (ret!=0) {
  214. mylog(log_fatal,"add udp_listen_fd error\n");
  215. myexit(-1);
  216. }
  217. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  218. remote_fd64=fd_manager.create(remote_fd);
  219. mylog(log_debug,"remote_fd64=%llu\n",remote_fd64);
  220. ev.events = EPOLLIN;
  221. ev.data.u64 = remote_fd64;
  222. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  223. if (ret!= 0) {
  224. mylog(log_fatal,"add raw_fd error\n");
  225. myexit(-1);
  226. }
  227. ev.events = EPOLLIN;
  228. ev.data.u64 = delay_manager.get_timer_fd();
  229. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  230. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  231. if (ret!= 0) {
  232. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  233. myexit(-1);
  234. }
  235. u64_t fd64=conn_info.fec_encode_manager.get_timer_fd64();
  236. ev.events = EPOLLIN;
  237. ev.data.u64 = fd64;
  238. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  239. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(fd64), &ev);
  240. if (ret!= 0) {
  241. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  242. myexit(-1);
  243. }
  244. //my_timer_t timer;
  245. conn_info.timer.add_fd_to_epoll(epoll_fd);
  246. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  247. mylog(log_debug,"conn_info.timer.get_timer_fd()=%d\n",conn_info.timer.get_timer_fd());
  248. while(1)////////////////////////
  249. {
  250. if(about_to_exit) myexit(0);
  251. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  252. if (nfds < 0) { //allow zero
  253. if(errno==EINTR )
  254. {
  255. mylog(log_info,"epoll interrupted by signal\n");
  256. myexit(0);
  257. }
  258. else
  259. {
  260. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  261. myexit(-1);
  262. }
  263. }
  264. int idx;
  265. for (idx = 0; idx < nfds; ++idx) {
  266. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  267. {
  268. uint64_t value;
  269. read(conn_info.timer.get_timer_fd(), &value, 8);
  270. conn_info.conv_manager.clear_inactive();
  271. mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
  272. if(debug_force_flush_fec)
  273. {
  274. int out_n;char **out_arr;int *out_len;int *out_delay;
  275. dest_t dest;
  276. dest.type=type_fd64;
  277. dest.inner.fd64=remote_fd64;
  278. dest.cook=1;
  279. from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
  280. for(int i=0;i<out_n;i++)
  281. {
  282. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  283. }
  284. }
  285. }
  286. else if (events[idx].data.u64 == (u64_t)local_listen_fd||events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64())
  287. {
  288. char data[buf_len];
  289. int data_len;
  290. ip_port_t ip_port;
  291. u32_t conv;
  292. int out_n;char **out_arr;int *out_len;int *out_delay;
  293. dest_t dest;
  294. dest.type=type_fd64;
  295. dest.inner.fd64=remote_fd64;
  296. dest.cook=1;
  297. if(events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64())
  298. {
  299. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  300. //mylog(log_info,"timer!!!\n");
  301. uint64_t value;
  302. if(!fd_manager.exist(fd64)) //fd64 has been closed
  303. {
  304. mylog(log_trace,"!fd_manager.exist(fd64)");
  305. continue;
  306. }
  307. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  308. {
  309. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  310. continue;
  311. }
  312. if(value==0)
  313. {
  314. mylog(log_debug,"value==0\n");
  315. continue;
  316. }
  317. assert(value==1);
  318. from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
  319. //from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
  320. }
  321. else//events[idx].data.u64 == (u64_t)local_listen_fd
  322. {
  323. mylog(log_trace,"events[idx].data.u64 == (u64_t)local_listen_fd\n");
  324. struct sockaddr_in udp_new_addr_in={0};
  325. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  326. if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
  327. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
  328. mylog(log_error,"recv_from error,this shouldnt happen at client\n");
  329. myexit(1);
  330. };
  331. if(!disable_mtu_warn&&data_len>=mtu_warn)
  332. {
  333. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  334. }
  335. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  336. ntohs(udp_new_addr_in.sin_port),data_len);
  337. ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  338. ip_port.port=ntohs(udp_new_addr_in.sin_port);
  339. u64_t u64=ip_port.to_u64();
  340. if(!conn_info.conv_manager.is_u64_used(u64))
  341. {
  342. if(conn_info.conv_manager.get_size() >=max_conv_num)
  343. {
  344. mylog(log_warn,"ignored new udp connect bc max_conv_num exceed\n");
  345. continue;
  346. }
  347. conv=conn_info.conv_manager.get_new_conv();
  348. conn_info.conv_manager.insert_conv(conv,u64);
  349. mylog(log_info,"new packet from %s:%d,conv_id=%x\n",inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port),conv);
  350. }
  351. else
  352. {
  353. conv=conn_info.conv_manager.find_conv_by_u64(u64);
  354. mylog(log_trace,"conv=%d\n",conv);
  355. }
  356. conn_info.conv_manager.update_active_time(conv);
  357. char * new_data;
  358. int new_len;
  359. put_conv(conv,data,data_len,new_data,new_len);
  360. mylog(log_trace,"data_len=%d new_len=%d\n",data_len,new_len);
  361. //dest.conv=conv;
  362. from_normal_to_fec(conn_info,new_data,new_len,out_n,out_arr,out_len,out_delay);
  363. }
  364. mylog(log_trace,"out_n=%d\n",out_n);
  365. for(int i=0;i<out_n;i++)
  366. {
  367. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  368. }
  369. //my_send(dest,data,data_len);
  370. }
  371. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()) {
  372. uint64_t value;
  373. read(delay_manager.get_timer_fd(), &value, 8);
  374. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  375. //printf("<timerfd_triggered, %d>",delay_mp.size());
  376. //fflush(stdout);
  377. }
  378. else if(events[idx].data.u64>u32_t(-1) )
  379. {
  380. char data[buf_len];
  381. if(!fd_manager.exist(events[idx].data.u64)) //fd64 has been closed
  382. {
  383. mylog(log_trace,"!fd_manager.exist(events[idx].data.u64)");
  384. continue;
  385. }
  386. assert(events[idx].data.u64==remote_fd64);
  387. int fd=fd_manager.to_fd(remote_fd64);
  388. int data_len =recv(fd,data,max_data_len,0);
  389. mylog(log_trace, "received data from udp fd %d, len=%d\n", remote_fd,data_len);
  390. if(data_len<0)
  391. {
  392. if(errno==ECONNREFUSED)
  393. {
  394. //conn_manager.clear_list.push_back(udp_fd);
  395. mylog(log_debug, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
  396. }
  397. mylog(log_warn, "recv failed %d ,udp_fd%d,errno:%s\n", data_len,remote_fd,strerror(errno));
  398. continue;
  399. }
  400. if(!disable_mtu_warn&&data_len>mtu_warn)
  401. {
  402. mylog(log_warn,"huge packet,data len=%d (>%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  403. }
  404. if(de_cook(data,data_len)!=0)
  405. {
  406. mylog(log_debug,"de_cook error");
  407. continue;
  408. }
  409. int out_n;char **out_arr;int *out_len;int *out_delay;
  410. from_fec_to_normal(conn_info,data,data_len,out_n,out_arr,out_len,out_delay);
  411. mylog(log_trace,"out_n=%d\n",out_n);
  412. for(int i=0;i<out_n;i++)
  413. {
  414. u32_t conv;
  415. char *new_data;
  416. int new_len;
  417. if(get_conv(conv,out_arr[i],out_len[i],new_data,new_len)!=0)
  418. {
  419. mylog(log_debug,"get_conv(conv,out_arr[i],out_len[i],new_data,new_len)!=0");
  420. continue;
  421. }
  422. if(!conn_info.conv_manager.is_conv_used(conv))
  423. {
  424. mylog(log_trace,"!conn_info.conv_manager.is_conv_used(conv)");
  425. }
  426. conn_info.conv_manager.update_active_time(conv);
  427. u64_t u64=conn_info.conv_manager.find_u64_by_conv(conv);
  428. dest_t dest;
  429. dest.inner.ip_port.from_u64(u64);
  430. dest.type=type_ip_port;
  431. //dest.conv=conv;
  432. delay_send(out_delay[i],dest,new_data,new_len);
  433. }
  434. //mylog(log_trace,"[%s] send packet\n",dest.inner.ip_port.to_s());
  435. }
  436. else
  437. {
  438. mylog(log_fatal,"unknown fd,this should never happen\n");
  439. myexit(-1);
  440. }
  441. }
  442. delay_manager.check();
  443. }
  444. return 0;
  445. }
  446. int server_event_loop()
  447. {
  448. //char buf[buf_len];
  449. int i, j, k;int ret;
  450. int yes = 1;
  451. int epoll_fd;
  452. int remote_fd;
  453. // conn_info_t conn_info;
  454. init_listen_socket();
  455. epoll_fd = epoll_create1(0);
  456. assert(epoll_fd>0);
  457. const int max_events = 4096;
  458. struct epoll_event ev, events[max_events];
  459. if (epoll_fd < 0) {
  460. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  461. myexit(-1);
  462. }
  463. ev.events = EPOLLIN;
  464. ev.data.u64 = local_listen_fd;
  465. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  466. if (ret!=0) {
  467. mylog(log_fatal,"add udp_listen_fd error\n");
  468. myexit(-1);
  469. }
  470. ev.events = EPOLLIN;
  471. ev.data.u64 = delay_manager.get_timer_fd();
  472. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  473. if (ret!= 0) {
  474. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  475. myexit(-1);
  476. }
  477. mylog(log_debug," delay_manager.get_timer_fd() =%d\n", delay_manager.get_timer_fd());
  478. mylog(log_info,"now listening at %s:%d\n",my_ntoa(local_ip_uint32),local_port);
  479. my_timer_t timer;
  480. timer.add_fd_to_epoll(epoll_fd);
  481. timer.set_timer_repeat_us(timer_interval*1000);
  482. mylog(log_debug," timer.get_timer_fd() =%d\n",timer.get_timer_fd());
  483. while(1)////////////////////////
  484. {
  485. if(about_to_exit) myexit(0);
  486. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  487. if (nfds < 0) { //allow zero
  488. if(errno==EINTR )
  489. {
  490. mylog(log_info,"epoll interrupted by signal\n");
  491. myexit(0);
  492. }
  493. else
  494. {
  495. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  496. myexit(-1);
  497. }
  498. }
  499. int idx;
  500. for (idx = 0; idx < nfds; ++idx)
  501. {
  502. /*
  503. if ((events[idx].data.u64 ) == (u64_t)timer_fd)
  504. {
  505. conn_manager.clear_inactive();
  506. u64_t dummy;
  507. read(timer_fd, &dummy, 8);
  508. //current_time_rough=get_current_time();
  509. }
  510. else */
  511. if(events[idx].data.u64==(u64_t)timer.get_timer_fd())
  512. {
  513. uint64_t value;
  514. read(timer.get_timer_fd(), &value, 8);
  515. conn_manager.clear_inactive();
  516. mylog(log_trace,"events[idx].data.u64==(u64_t)timer.get_timer_fd()\n");
  517. //conn_info.conv_manager.clear_inactive();
  518. }
  519. else if (events[idx].data.u64 == (u64_t)local_listen_fd)
  520. {
  521. mylog(log_trace,"events[idx].data.u64 == (u64_t)local_listen_fd\n");
  522. //int recv_len;
  523. char data[buf_len];
  524. int data_len;
  525. struct sockaddr_in udp_new_addr_in={0};
  526. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  527. if ((data_len = recvfrom(local_listen_fd, data, max_data_len, 0,
  528. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
  529. mylog(log_error,"recv_from error,this shouldnt happen at client\n");
  530. myexit(1);
  531. };
  532. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  533. ntohs(udp_new_addr_in.sin_port),data_len);
  534. if(!disable_mtu_warn&&data_len>=mtu_warn)///////////////////////delete this for type 0 in furture
  535. {
  536. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  537. }
  538. if(de_cook(data,data_len)!=0)
  539. {
  540. mylog(log_debug,"de_cook error");
  541. continue;
  542. }
  543. ip_port_t ip_port;
  544. ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  545. ip_port.port=ntohs(udp_new_addr_in.sin_port);
  546. mylog(log_trace,"ip_port= %s\n",ip_port.to_s());
  547. if(!conn_manager.exist(ip_port))
  548. {
  549. if(conn_manager.mp.size() >=max_conn_num)
  550. {
  551. mylog(log_warn,"new connection %s ignored bc max_conn_num exceed\n",ip_port.to_s());
  552. continue;
  553. }
  554. conn_manager.insert(ip_port);
  555. conn_info_t &conn_info=conn_manager.find(ip_port);
  556. conn_info.fec_encode_manager.re_init(fec_data_num,fec_redundant_num,fec_mtu,fec_pending_num,fec_pending_time,fec_type);
  557. //conn_info.conv_manager.reserve(); //already reserved in constructor
  558. u64_t fec_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  559. mylog(log_debug,"fec_fd64=%llu\n",fec_fd64);
  560. ev.events = EPOLLIN;
  561. ev.data.u64 = fec_fd64;
  562. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(fec_fd64), &ev);
  563. fd_manager.get_info(fec_fd64).ip_port=ip_port;
  564. conn_info.timer.add_fd64_to_epoll(epoll_fd);
  565. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  566. mylog(log_debug,"conn_info.timer.get_timer_fd64()=%llu\n",conn_info.timer.get_timer_fd64());
  567. u64_t timer_fd64=conn_info.timer.get_timer_fd64();
  568. fd_manager.get_info(timer_fd64).ip_port=ip_port;
  569. mylog(log_info,"new connection from %s\n",ip_port.to_s());
  570. }
  571. conn_info_t &conn_info=conn_manager.find(ip_port);
  572. conn_info.update_active_time();
  573. int out_n;char **out_arr;int *out_len;int *out_delay;
  574. from_fec_to_normal(conn_info,data,data_len,out_n,out_arr,out_len,out_delay);
  575. mylog(log_trace,"out_n= %d\n",out_n);
  576. for(int i=0;i<out_n;i++)
  577. {
  578. u32_t conv;
  579. char *new_data;
  580. int new_len;
  581. if(get_conv(conv,out_arr[i],out_len[i],new_data,new_len)!=0)
  582. {
  583. mylog(log_debug,"get_conv failed");
  584. continue;
  585. }
  586. /*
  587. id_t tmp_conv_id;
  588. memcpy(&tmp_conv_id,&data_[0],sizeof(tmp_conv_id));
  589. tmp_conv_id=ntohl(tmp_conv_id);*/
  590. if (!conn_info.conv_manager.is_conv_used(conv))
  591. {
  592. if(conn_info.conv_manager.get_size() >=max_conv_num)
  593. {
  594. mylog(log_warn,"ignored new udp connect bc max_conv_num exceed\n");
  595. continue;
  596. }
  597. int new_udp_fd;
  598. ret=new_connected_socket(new_udp_fd,remote_ip_uint32,remote_port);
  599. if (ret != 0) {
  600. mylog(log_warn, "[%s]new_connected_socket failed\n",ip_port.to_s());
  601. continue;
  602. }
  603. fd64_t fd64 = fd_manager.create(new_udp_fd);
  604. ev.events = EPOLLIN;
  605. ev.data.u64 = fd64;
  606. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, new_udp_fd, &ev);
  607. conn_info.conv_manager.insert_conv(conv, fd64);
  608. fd_manager.get_info(fd64).ip_port=ip_port;
  609. mylog(log_info,"[%s]new conv %x,fd %d created,fd64=%llu\n",ip_port.to_s(),conv,new_udp_fd,fd64);
  610. //assert(!conn_manager.exist_fd64(fd64));
  611. //conn_manager.insert_fd64(fd64,ip_port);
  612. }
  613. conn_info.conv_manager.update_active_time(conv);
  614. fd64_t fd64= conn_info.conv_manager.find_u64_by_conv(conv);
  615. //int fd=fd_manager.fd64_to_fd(fd64);
  616. dest_t dest;
  617. dest.type=type_fd64;
  618. dest.inner.fd64=fd64;
  619. //dest.conv=conv;
  620. delay_send(out_delay[i],dest,new_data,new_len);
  621. }
  622. }
  623. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()) {
  624. uint64_t value;
  625. read(delay_manager.get_timer_fd(), &value, 8);
  626. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  627. }
  628. else if (events[idx].data.u64 >u32_t(-1))
  629. {
  630. char data[buf_len];
  631. int data_len;
  632. u32_t conv;
  633. fd64_t fd64=events[idx].data.u64;
  634. mylog(log_trace,"events[idx].data.u64 >u32_t(-1),%llu\n",(u64_t)events[idx].data.u64);
  635. if(!fd_manager.exist(fd64)) //fd64 has been closed
  636. {
  637. mylog(log_trace,"!fd_manager.exist(fd64)\n");
  638. continue;
  639. }
  640. assert(fd_manager.exist_info(fd64));
  641. ip_port_t ip_port=fd_manager.get_info(fd64).ip_port;
  642. assert(conn_manager.exist(ip_port));
  643. conn_info_t &conn_info=conn_manager.find(ip_port);
  644. //conn_info.update_active_time(); //cant put it here
  645. int out_n=-2;char **out_arr;int *out_len;int *out_delay;
  646. dest_t dest;
  647. dest.type=type_ip_port;
  648. //dest.conv=conv;
  649. dest.inner.ip_port=ip_port;
  650. dest.cook=1;
  651. if(fd64==conn_info.fec_encode_manager.get_timer_fd64())
  652. {
  653. //mylog(log_infol,"timer!!!\n");
  654. uint64_t value;
  655. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  656. {
  657. mylog(log_trace,"fd_manager.to_fd(fd64), &value, 8)!=8 ,%d\n",ret);
  658. continue;
  659. }
  660. if(value==0)
  661. {
  662. mylog(log_trace,"value==0\n");
  663. continue;
  664. }
  665. assert(value==1);
  666. from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
  667. }
  668. else if(fd64==conn_info.timer.get_timer_fd64())
  669. {
  670. uint64_t value;
  671. read(conn_info.timer.get_timer_fd(), &value, 8);
  672. conn_info.conv_manager.clear_inactive();
  673. if(debug_force_flush_fec)
  674. {
  675. from_normal_to_fec(conn_info,0,0,out_n,out_arr,out_len,out_delay);
  676. }
  677. continue;
  678. }
  679. else
  680. {
  681. assert(conn_info.conv_manager.is_u64_used(fd64));
  682. conv=conn_info.conv_manager.find_conv_by_u64(fd64);
  683. conn_info.conv_manager.update_active_time(conv);
  684. conn_info.update_active_time();
  685. int fd=fd_manager.to_fd(fd64);
  686. data_len=recv(fd,data,max_data_len,0);
  687. mylog(log_trace,"received a packet from udp_fd,len:%d,conv=%d\n",data_len,conv);
  688. if(data_len<0)
  689. {
  690. mylog(log_debug,"udp fd,recv_len<0 continue,%s\n",strerror(errno));
  691. continue;
  692. }
  693. if(!disable_mtu_warn&&data_len>=mtu_warn)
  694. {
  695. mylog(log_warn,"huge packet,data len=%d (>=%d).strongly suggested to set a smaller mtu at upper level,to get rid of this warn\n ",data_len,mtu_warn);
  696. }
  697. char * new_data;
  698. int new_len;
  699. put_conv(conv,data,data_len,new_data,new_len);
  700. from_normal_to_fec(conn_info,new_data,new_len,out_n,out_arr,out_len,out_delay);
  701. }
  702. mylog(log_trace,"out_n=%d\n",out_n);
  703. for(int i=0;i<out_n;i++)
  704. {
  705. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  706. }
  707. //mylog(log_trace,"[%s] send packet\n",ip_port.to_s());
  708. }
  709. else
  710. {
  711. mylog(log_fatal,"unknown fd,this should never happen\n");
  712. myexit(-1);
  713. }
  714. }
  715. delay_manager.check();
  716. }
  717. return 0;
  718. }
  719. int unit_test()
  720. {
  721. int i,j,k;
  722. void *code=fec_new(3,6);
  723. char arr[6][100]=
  724. {
  725. "aaa","bbb","ccc"
  726. ,"ddd","eee","fff"
  727. };
  728. char *data[6];
  729. for(i=0;i<6;i++)
  730. {
  731. data[i]=arr[i];
  732. }
  733. rs_encode2(3,6,data,3);
  734. //printf("%d %d",(int)(unsigned char)arr[5][0],(int)('a'^'b'^'c'^'d'^'e'));
  735. for(i=0;i<6;i++)
  736. {
  737. printf("<%s>",data[i]);
  738. }
  739. data[0]=0;
  740. //data[1]=0;
  741. //data[5]=0;
  742. int ret=rs_decode2(3,6,data,3);
  743. printf("ret:%d\n",ret);
  744. for(i=0;i<6;i++)
  745. {
  746. printf("<%s>",data[i]);
  747. }
  748. fec_free(code);
  749. char arr2[6][100]=
  750. {
  751. "aaa11111","","ccc333333333"
  752. ,"ddd444","eee5555","ff6666"
  753. };
  754. blob_encode_t blob_encode;
  755. for(int i=0;i<6;i++)
  756. blob_encode.input(arr2[i],strlen(arr2[i]));
  757. char **output;
  758. int shard_len;
  759. blob_encode.output(7,output,shard_len);
  760. printf("<shard_len:%d>",shard_len);
  761. blob_decode_t blob_decode;
  762. for(int i=0;i<7;i++)
  763. {
  764. blob_decode.input(output[i],shard_len);
  765. }
  766. char **decode_output;
  767. int * len_arr;
  768. int num;
  769. ret=blob_decode.output(num,decode_output,len_arr);
  770. printf("<num:%d,ret:%d>\n",num,ret);
  771. for(int i=0;i<num;i++)
  772. {
  773. char buf[1000]={0};
  774. memcpy(buf,decode_output[i],len_arr[i]);
  775. printf("<%d:%s>",len_arr[i],buf);
  776. }
  777. printf("\n");
  778. static fec_encode_manager_t fec_encode_manager;
  779. static fec_decode_manager_t fec_decode_manager;
  780. {
  781. string a = "11111";
  782. string b = "22";
  783. string c = "33333333";
  784. fec_encode_manager.input((char *) a.c_str(), a.length());
  785. fec_encode_manager.input((char *) b.c_str(), b.length());
  786. fec_encode_manager.input((char *) c.c_str(), c.length());
  787. fec_encode_manager.input(0, 0);
  788. int n;
  789. char **s_arr;
  790. int *len;
  791. fec_encode_manager.output(n,s_arr,len);
  792. printf("<n:%d,len:%d>",n,len[0]);
  793. for(int i=0;i<n;i++)
  794. {
  795. fec_decode_manager.input(s_arr[i],len[i]);
  796. }
  797. {
  798. int n;char ** s_arr;int* len_arr;
  799. fec_decode_manager.output(n,s_arr,len_arr);
  800. printf("<n:%d>",n);
  801. for(int i=0;i<n;i++)
  802. {
  803. s_arr[i][len_arr[i]]=0;
  804. printf("<%s>\n",s_arr[i]);
  805. }
  806. }
  807. }
  808. {
  809. string a = "aaaaaaa";
  810. string b = "bbbbbbbbbbbbb";
  811. string c = "ccc";
  812. fec_encode_manager.input((char *) a.c_str(), a.length());
  813. fec_encode_manager.input((char *) b.c_str(), b.length());
  814. fec_encode_manager.input((char *) c.c_str(), c.length());
  815. fec_encode_manager.input(0, 0);
  816. int n;
  817. char **s_arr;
  818. int * len;
  819. fec_encode_manager.output(n,s_arr,len);
  820. printf("<n:%d,len:%d>",n,len[0]);
  821. for(int i=0;i<n;i++)
  822. {
  823. if(i==1||i==3||i==5||i==0)
  824. fec_decode_manager.input(s_arr[i],len[i]);
  825. }
  826. {
  827. int n;char ** s_arr;int* len_arr;
  828. fec_decode_manager.output(n,s_arr,len_arr);
  829. printf("<n:%d>",n);
  830. for(int i=0;i<n;i++)
  831. {
  832. s_arr[i][len_arr[i]]=0;
  833. printf("<%s>\n",s_arr[i]);
  834. }
  835. }
  836. }
  837. for(int i=0;i<10;i++)
  838. {
  839. string a = "aaaaaaaaaaaaaaaaaaaaaaa";
  840. string b = "bbbbbbbbbbbbb";
  841. string c = "cccccccccccccccccc";
  842. printf("======\n");
  843. int n;
  844. char **s_arr;
  845. int * len;
  846. fec_decode_manager.output(n,s_arr,len);
  847. fec_encode_manager.re_init(3,2,fec_mtu,fec_pending_num,fec_pending_time,1);
  848. fec_encode_manager.input((char *) a.c_str(), a.length());
  849. fec_encode_manager.output(n,s_arr,len);
  850. assert(n==1);
  851. fec_decode_manager.input(s_arr[0],len[0]);
  852. fec_decode_manager.output(n,s_arr,len);
  853. assert(n==1);
  854. printf("%s\n",s_arr[0]);
  855. fec_encode_manager.input((char *) b.c_str(), b.length());
  856. fec_encode_manager.output(n,s_arr,len);
  857. assert(n==1);
  858. //fec_decode_manager.input(s_arr[0],len[0]);
  859. fec_encode_manager.input((char *) c.c_str(), c.length());
  860. fec_encode_manager.output(n,s_arr,len);
  861. assert(n==3);
  862. fec_decode_manager.input(s_arr[0],len[0]);
  863. //printf("n=%d\n",n);
  864. {
  865. int n;
  866. char **s_arr;
  867. int * len;
  868. fec_decode_manager.output(n,s_arr,len);
  869. assert(n==1);
  870. printf("%s\n",s_arr[0]);
  871. }
  872. fec_decode_manager.input(s_arr[1],len[1]);
  873. {
  874. int n;
  875. char **s_arr;
  876. int * len;
  877. fec_decode_manager.output(n,s_arr,len);
  878. assert(n==1);
  879. printf("n=%d\n",n);
  880. s_arr[0][len[0]]=0;
  881. printf("%s\n",s_arr[0]);
  882. }
  883. }
  884. return 0;
  885. }
  886. void print_help()
  887. {
  888. char git_version_buf[100]={0};
  889. strncpy(git_version_buf,gitversion,10);
  890. printf("UDPspeeder\n");
  891. printf("git version:%s ",git_version_buf);
  892. printf("build date:%s %s\n",__DATE__,__TIME__);
  893. printf("repository: https://github.com/wangyu-/UDPspeeder\n");
  894. printf("\n");
  895. printf("usage:\n");
  896. printf(" run as client : ./this_program -c -l local_listen_ip:local_port -r server_ip:server_port [options]\n");
  897. printf(" run as server : ./this_program -s -l server_listen_ip:server_port -r remote_ip:remote_port [options]\n");
  898. printf("\n");
  899. printf("common option,must be same on both sides:\n");
  900. printf(" -k,--key <string> key for simple xor encryption,default:\"secret key\"\n");
  901. printf("main options:\n");
  902. printf(" -d <number> duplicated packet number, -d 0 means no duplicate. default value:0\n");
  903. printf(" -t <number> duplicated packet delay time, unit: 0.1ms,default value:20(2ms)\n");
  904. printf(" -j <number> simulated jitter.randomly delay first packet for 0~jitter_value*0.1 ms,to\n");
  905. printf(" create simulated jitter.default value:0.do not use if you dont\n");
  906. printf(" know what it means\n");
  907. printf(" --report <number> turn on udp send/recv report,and set a time interval for reporting,unit:s\n");
  908. printf("advanced options:\n");
  909. printf(" -t tmin:tmax simliar to -t above,but delay randomly between tmin and tmax\n");
  910. printf(" -j jmin:jmax simliar to -j above,but create jitter randomly between jmin and jmax\n");
  911. printf(" --random-drop <number> simulate packet loss ,unit:0.01%%\n");
  912. printf(" --disable-filter disable duplicate packet filter.\n");
  913. printf(" -m <number> max pending packets,to prevent the program from eating up all your memory,\n");
  914. printf(" default value:0(disabled).\n");
  915. printf("other options:\n");
  916. printf(" --log-level <number> 0:never 1:fatal 2:error 3:warn \n");
  917. printf(" 4:info (default) 5:debug 6:trace\n");
  918. printf(" --log-position enable file name,function name,line number in log\n");
  919. printf(" --disable-color disable log color\n");
  920. printf(" --sock-buf <number> buf size for socket,>=10 and <=10240,unit:kbyte,default:1024\n");
  921. //printf(" -p use multi-process mode instead of epoll.very costly,only for test,do dont use\n");
  922. printf(" -h,--help print this help message\n");
  923. //printf("common options,these options must be same on both side\n");
  924. }
  925. void process_arg(int argc, char *argv[])
  926. {
  927. int is_client=0,is_server=0;
  928. int i, j, k;
  929. int opt;
  930. static struct option long_options[] =
  931. {
  932. {"log-level", required_argument, 0, 1},
  933. {"log-position", no_argument, 0, 1},
  934. {"disable-color", no_argument, 0, 1},
  935. {"disable-filter", no_argument, 0, 1},
  936. {"sock-buf", required_argument, 0, 1},
  937. {"random-drop", required_argument, 0, 1},
  938. {"report", required_argument, 0, 1},
  939. {NULL, 0, 0, 0}
  940. };
  941. int option_index = 0;
  942. if (argc == 1)
  943. {
  944. print_help();
  945. myexit( -1);
  946. }
  947. for (i = 0; i < argc; i++)
  948. {
  949. if(strcmp(argv[i],"--unit-test")==0)
  950. {
  951. unit_test();
  952. myexit(0);
  953. }
  954. }
  955. for (i = 0; i < argc; i++)
  956. {
  957. if(strcmp(argv[i],"-h")==0||strcmp(argv[i],"--help")==0)
  958. {
  959. print_help();
  960. myexit(0);
  961. }
  962. }
  963. for (i = 0; i < argc; i++)
  964. {
  965. if(strcmp(argv[i],"--log-level")==0)
  966. {
  967. if(i<argc -1)
  968. {
  969. sscanf(argv[i+1],"%d",&log_level);
  970. if(0<=log_level&&log_level<log_end)
  971. {
  972. }
  973. else
  974. {
  975. log_bare(log_fatal,"invalid log_level\n");
  976. myexit(-1);
  977. }
  978. }
  979. }
  980. if(strcmp(argv[i],"--disable-color")==0)
  981. {
  982. enable_log_color=0;
  983. }
  984. }
  985. mylog(log_info,"argc=%d ", argc);
  986. for (i = 0; i < argc; i++) {
  987. log_bare(log_info, "%s ", argv[i]);
  988. }
  989. log_bare(log_info, "\n");
  990. if (argc == 1)
  991. {
  992. print_help();
  993. myexit(-1);
  994. }
  995. int no_l = 1, no_r = 1;
  996. while ((opt = getopt_long(argc, argv, "l:r:d:t:hcspk:j:m:",long_options,&option_index)) != -1)
  997. {
  998. //string opt_key;
  999. //opt_key+=opt;
  1000. switch (opt)
  1001. {
  1002. case 'p':
  1003. //multi_process_mode=1;
  1004. break;
  1005. case 'k':
  1006. sscanf(optarg,"%s\n",key_string);
  1007. mylog(log_debug,"key=%s\n",key_string);
  1008. if(strlen(key_string)==0)
  1009. {
  1010. mylog(log_fatal,"key len=0??\n");
  1011. myexit(-1);
  1012. }
  1013. break;
  1014. case 'm':
  1015. sscanf(optarg,"%d\n",&max_pending_packet);
  1016. if(max_pending_packet<1000)
  1017. {
  1018. mylog(log_fatal,"max_pending_packet must be >1000\n");
  1019. myexit(-1);
  1020. }
  1021. break;
  1022. case 'j':
  1023. if (strchr(optarg, ':') == 0)
  1024. {
  1025. int jitter;
  1026. sscanf(optarg,"%d\n",&jitter);
  1027. if(jitter<0 ||jitter>1000*100)
  1028. {
  1029. mylog(log_fatal,"jitter must be between 0 and 100,000(10 second)\n");
  1030. myexit(-1);
  1031. }
  1032. jitter_min=0;
  1033. jitter_max=jitter;
  1034. }
  1035. else
  1036. {
  1037. sscanf(optarg,"%d:%d\n",&jitter_min,&jitter_max);
  1038. if(jitter_min<0 ||jitter_max<0||jitter_min>jitter_max)
  1039. {
  1040. mylog(log_fatal," must satisfy 0<=jmin<=jmax\n");
  1041. myexit(-1);
  1042. }
  1043. }
  1044. break;
  1045. case 't':
  1046. sscanf(optarg,"%d",&fec_type);
  1047. /*
  1048. if (strchr(optarg, ':') == 0)
  1049. {
  1050. int dup_delay=-1;
  1051. sscanf(optarg,"%d\n",&dup_delay);
  1052. if(dup_delay<1||dup_delay>1000*100)
  1053. {
  1054. mylog(log_fatal,"dup_delay must be between 1 and 100,000(10 second)\n");
  1055. myexit(-1);
  1056. }
  1057. dup_delay_min=dup_delay_max=dup_delay;
  1058. }
  1059. else
  1060. {
  1061. sscanf(optarg,"%d:%d\n",&dup_delay_min,&dup_delay_max);
  1062. if(dup_delay_min<1 ||dup_delay_max<1||dup_delay_min>dup_delay_max)
  1063. {
  1064. mylog(log_fatal," must satisfy 1<=dmin<=dmax\n");
  1065. myexit(-1);
  1066. }
  1067. }*/
  1068. break;
  1069. case 'd':
  1070. dup_num=-1;
  1071. sscanf(optarg,"%d\n",&dup_num);
  1072. if(dup_num<0 ||dup_num>5)
  1073. {
  1074. mylog(log_fatal,"dup_num must be between 0 and 5\n");
  1075. myexit(-1);
  1076. }
  1077. dup_num+=1;
  1078. break;
  1079. case 'c':
  1080. is_client = 1;
  1081. break;
  1082. case 's':
  1083. is_server = 1;
  1084. break;
  1085. case 'l':
  1086. no_l = 0;
  1087. if (strchr(optarg, ':') != 0)
  1088. {
  1089. sscanf(optarg, "%[^:]:%d", local_ip, &local_port);
  1090. }
  1091. else
  1092. {
  1093. mylog(log_fatal," -r ip:port\n");
  1094. myexit(1);
  1095. strcpy(local_ip, "127.0.0.1");
  1096. sscanf(optarg, "%d", &local_port);
  1097. }
  1098. break;
  1099. case 'r':
  1100. no_r = 0;
  1101. if (strchr(optarg, ':') != 0)
  1102. {
  1103. //printf("in :\n");
  1104. //printf("%s\n",optarg);
  1105. sscanf(optarg, "%[^:]:%d", remote_ip, &remote_port);
  1106. //printf("%d\n",remote_port);
  1107. }
  1108. else
  1109. {
  1110. mylog(log_fatal," -r ip:port\n");
  1111. myexit(1);
  1112. strcpy(remote_ip, "127.0.0.1");
  1113. sscanf(optarg, "%d", &remote_port);
  1114. }
  1115. break;
  1116. case 'h':
  1117. break;
  1118. case 1:
  1119. if(strcmp(long_options[option_index].name,"log-level")==0)
  1120. {
  1121. }
  1122. else if(strcmp(long_options[option_index].name,"disable-filter")==0)
  1123. {
  1124. disable_replay_filter=1;
  1125. //enable_log_color=0;
  1126. }
  1127. else if(strcmp(long_options[option_index].name,"disable-color")==0)
  1128. {
  1129. //enable_log_color=0;
  1130. }
  1131. else if(strcmp(long_options[option_index].name,"log-position")==0)
  1132. {
  1133. enable_log_position=1;
  1134. }
  1135. else if(strcmp(long_options[option_index].name,"random-drop")==0)
  1136. {
  1137. sscanf(optarg,"%d",&random_drop);
  1138. if(random_drop<0||random_drop>10000)
  1139. {
  1140. mylog(log_fatal,"random_drop must be between 0 10000 \n");
  1141. myexit(-1);
  1142. }
  1143. }
  1144. else if(strcmp(long_options[option_index].name,"report")==0)
  1145. {
  1146. sscanf(optarg,"%d",&report_interval);
  1147. if(report_interval<=0)
  1148. {
  1149. mylog(log_fatal,"report_interval must be >0 \n");
  1150. myexit(-1);
  1151. }
  1152. }
  1153. else if(strcmp(long_options[option_index].name,"sock-buf")==0)
  1154. {
  1155. int tmp=-1;
  1156. sscanf(optarg,"%d",&tmp);
  1157. if(10<=tmp&&tmp<=10*1024)
  1158. {
  1159. socket_buf_size=tmp*1024;
  1160. }
  1161. else
  1162. {
  1163. mylog(log_fatal,"sock-buf value must be between 1 and 10240 (kbyte) \n");
  1164. myexit(-1);
  1165. }
  1166. }
  1167. else
  1168. {
  1169. mylog(log_fatal,"unknown option\n");
  1170. myexit(-1);
  1171. }
  1172. break;
  1173. default:
  1174. mylog(log_fatal,"unknown option <%x>", opt);
  1175. myexit(-1);
  1176. }
  1177. }
  1178. if (no_l)
  1179. mylog(log_fatal,"error: -i not found\n");
  1180. if (no_r)
  1181. mylog(log_fatal,"error: -o not found\n");
  1182. if (no_l || no_r)
  1183. myexit(-1);
  1184. if (is_client == 0 && is_server == 0)
  1185. {
  1186. mylog(log_fatal,"-s -c hasnt been set\n");
  1187. myexit(-1);
  1188. }
  1189. if (is_client == 1 && is_server == 1)
  1190. {
  1191. mylog(log_fatal,"-s -c cant be both set\n");
  1192. myexit(-1);
  1193. }
  1194. if(is_client==1)
  1195. {
  1196. program_mode=client_mode;
  1197. }
  1198. else
  1199. {
  1200. program_mode=server_mode;
  1201. }
  1202. }
  1203. int main(int argc, char *argv[])
  1204. {
  1205. /*
  1206. if(argc==1||argc==0)
  1207. {
  1208. printf("this_program classic\n");
  1209. printf("this_program fec\n");
  1210. return 0;
  1211. }*/
  1212. /*
  1213. if(argc>=2&&strcmp(argv[1],"fec")!=0)
  1214. {
  1215. printf("running into classic mode!\n");
  1216. return classic::main(argc,argv);
  1217. }*/
  1218. assert(sizeof(u64_t)==8);
  1219. assert(sizeof(i64_t)==8);
  1220. assert(sizeof(u32_t)==4);
  1221. assert(sizeof(i32_t)==4);
  1222. assert(sizeof(u16_t)==2);
  1223. assert(sizeof(i16_t)==2);
  1224. dup2(1, 2); //redirect stderr to stdout
  1225. int i, j, k;
  1226. process_arg(argc,argv);
  1227. delay_manager.set_capacity(max_pending_packet);
  1228. local_ip_uint32=inet_addr(local_ip);
  1229. remote_ip_uint32=inet_addr(remote_ip);
  1230. if(program_mode==client_mode)
  1231. {
  1232. client_event_loop();
  1233. }
  1234. else
  1235. {
  1236. server_event_loop();
  1237. }
  1238. return 0;
  1239. }