1
0

tun_dev.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694
  1. /*
  2. * tun.cpp
  3. *
  4. * Created on: Oct 26, 2017
  5. * Author: root
  6. */
  7. #include "common.h"
  8. #include "log.h"
  9. #include "misc.h"
  10. int get_tun_fd(char * dev_name)
  11. {
  12. int tun_fd=open("/dev/net/tun",O_RDWR);
  13. if(tun_fd <0)
  14. {
  15. mylog(log_fatal,"open /dev/net/tun failed");
  16. myexit(-1);
  17. }
  18. struct ifreq ifr;
  19. memset(&ifr, 0, sizeof(ifr));
  20. ifr.ifr_flags = IFF_TUN|IFF_NO_PI;
  21. strncpy(ifr.ifr_name, dev_name, IFNAMSIZ);
  22. if(ioctl(tun_fd, TUNSETIFF, (void *)&ifr) != 0)
  23. {
  24. mylog(log_fatal,"open /dev/net/tun failed");
  25. myexit(-1);
  26. }
  27. return tun_fd;
  28. }
  29. int set_if(char *if_name,u32_t local_ip,u32_t remote_ip,int mtu)
  30. {
  31. //printf("i m here1\n");
  32. struct ifreq ifr;
  33. struct sockaddr_in sai;
  34. memset(&ifr,0,sizeof(ifr));
  35. memset(&sai, 0, sizeof(struct sockaddr));
  36. int sockfd = socket(AF_INET, SOCK_DGRAM, 0);
  37. strncpy(ifr.ifr_name, if_name, IFNAMSIZ);
  38. sai.sin_family = AF_INET;
  39. sai.sin_port = 0;
  40. sai.sin_addr.s_addr = local_ip;
  41. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  42. assert(ioctl(sockfd, SIOCSIFADDR, &ifr)==0); //set source ip
  43. sai.sin_addr.s_addr = remote_ip;
  44. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  45. assert(ioctl(sockfd, SIOCSIFDSTADDR, &ifr)==0);//set dest ip
  46. ifr.ifr_mtu=mtu;
  47. assert(ioctl(sockfd, SIOCSIFMTU, &ifr)==0);//set mtu
  48. assert(ioctl(sockfd, SIOCGIFFLAGS, &ifr)==0);
  49. // ifr.ifr_flags |= ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );
  50. ifr.ifr_flags = ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );//set interface flags
  51. assert(ioctl(sockfd, SIOCSIFFLAGS, &ifr)==0);
  52. //printf("i m here2\n");
  53. return 0;
  54. }
  55. const char header_normal=1;
  56. const char header_new_connect=2;
  57. const char header_reject=3;
  58. int put_header(char header,char * data,int &len)
  59. {
  60. assert(len>=0);
  61. data[len]=header;
  62. len+=1;
  63. return 0;
  64. }
  65. int get_header(char &header,char * data,int &len)
  66. {
  67. assert(len>=0);
  68. if(len<1) return -1;
  69. len-=1;
  70. header=data[len];
  71. return 0;
  72. }
  73. int from_normal_to_fec2(conn_info_t & conn_info,dest_t &dest,char * data,int len,char header)
  74. {
  75. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  76. from_normal_to_fec(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  77. for(int i=0;i<out_n;i++)
  78. {
  79. char tmp_buf[buf_len];
  80. int tmp_len=out_len[i];
  81. memcpy(tmp_buf,out_arr[i],out_len[i]);
  82. put_header(header,tmp_buf,tmp_len);
  83. delay_send(out_delay[i],dest,tmp_buf,tmp_len);//this is slow but safer.just use this one
  84. //put_header(header,out_arr[i],out_len[i]);//modify in place
  85. //delay_send(out_delay[i],dest,out_arr[i],out_len[i]);//warning this is currently okay,but if you modified fec encoder,you may have to use the above code
  86. }
  87. return 0;
  88. }
  89. int from_fec_to_normal2(conn_info_t & conn_info,dest_t &dest,char * data,int len)
  90. {
  91. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  92. from_fec_to_normal(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  93. for(int i=0;i<out_n;i++)
  94. {
  95. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  96. #ifndef NORES
  97. char * tmp_data=out_arr[i];
  98. int tmp_len=out_len[i];
  99. if(tmp_len>=20)
  100. {
  101. u32_t dest_ip=htonl(read_u32(tmp_data+16));
  102. //printf("%s\n",my_ntoa(dest_ip));
  103. if( ( ntohl(sub_net_uint32)&0xFFFFFF00 ) != ( ntohl (dest_ip) &0xFFFFFF00) )
  104. {
  105. string sub=my_ntoa(dest_ip);
  106. string dst=my_ntoa( htonl( ntohl (sub_net_uint32) &0xFFFFFF00) );
  107. mylog(log_warn,"[restriction]packet's dest ip [%s] not in subnet [%s],dropped\n", sub.c_str(), dst.c_str());
  108. continue;
  109. }
  110. }
  111. #endif
  112. }
  113. return 0;
  114. }
  115. int tun_dev_client_event_loop()
  116. {
  117. char data[buf_len];
  118. int len;
  119. int i,j,k,ret;
  120. int epoll_fd,tun_fd;
  121. int remote_fd;
  122. fd64_t remote_fd64;
  123. tun_fd=get_tun_fd(tun_dev);
  124. assert(tun_fd>0);
  125. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  126. remote_fd64=fd_manager.create(remote_fd);
  127. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|2),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|1),g_fec_mtu)==0);
  128. epoll_fd = epoll_create1(0);
  129. assert(epoll_fd>0);
  130. const int max_events = 4096;
  131. struct epoll_event ev, events[max_events];
  132. if (epoll_fd < 0) {
  133. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  134. myexit(-1);
  135. }
  136. ev.events = EPOLLIN;
  137. ev.data.u64 = remote_fd64;
  138. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  139. if (ret!=0) {
  140. mylog(log_fatal,"add remote_fd64 error\n");
  141. myexit(-1);
  142. }
  143. ev.events = EPOLLIN;
  144. ev.data.u64 = tun_fd;
  145. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  146. if (ret!=0) {
  147. mylog(log_fatal,"add tun_fd error\n");
  148. myexit(-1);
  149. }
  150. ev.events = EPOLLIN;
  151. ev.data.u64 = delay_manager.get_timer_fd();
  152. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  153. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  154. if (ret!= 0) {
  155. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  156. myexit(-1);
  157. }
  158. conn_info_t *conn_info_p=new conn_info_t;
  159. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  160. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  161. ev.events = EPOLLIN;
  162. ev.data.u64 = tmp_timer_fd64;
  163. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  164. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  165. if (ret!= 0) {
  166. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  167. myexit(-1);
  168. }
  169. conn_info.timer.add_fd_to_epoll(epoll_fd);
  170. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  171. int fifo_fd=-1;
  172. if(fifo_file[0]!=0)
  173. {
  174. fifo_fd=create_fifo(fifo_file);
  175. ev.events = EPOLLIN;
  176. ev.data.u64 = fifo_fd;
  177. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  178. if (ret!= 0) {
  179. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  180. myexit(-1);
  181. }
  182. mylog(log_info,"fifo_file=%s\n",fifo_file);
  183. }
  184. dest_t udp_dest;
  185. udp_dest.cook=1;
  186. udp_dest.type=type_fd64;
  187. udp_dest.inner.fd64=remote_fd64;
  188. dest_t tun_dest;
  189. tun_dest.type=type_write_fd;
  190. tun_dest.inner.fd=tun_fd;
  191. int got_feed_back=0;
  192. while(1)////////////////////////
  193. {
  194. if(about_to_exit) myexit(0);
  195. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  196. if (nfds < 0) { //allow zero
  197. if(errno==EINTR )
  198. {
  199. mylog(log_info,"epoll interrupted by signal\n");
  200. myexit(0);
  201. }
  202. else
  203. {
  204. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  205. myexit(-1);
  206. }
  207. }
  208. int idx;
  209. for (idx = 0; idx < nfds; ++idx)
  210. {
  211. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  212. {
  213. uint64_t value;
  214. read(conn_info.timer.get_timer_fd(), &value, 8);
  215. mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
  216. conn_info.stat.report_as_client();
  217. }
  218. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  219. {
  220. fd64_t fd64=events[idx].data.u64;
  221. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  222. uint64_t value;
  223. if(!fd_manager.exist(fd64)) //fd64 has been closed
  224. {
  225. mylog(log_trace,"!fd_manager.exist(fd64)");
  226. continue;
  227. }
  228. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  229. {
  230. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  231. continue;
  232. }
  233. if(value==0)
  234. {
  235. mylog(log_debug,"value==0\n");
  236. continue;
  237. }
  238. assert(value==1);
  239. char header=(got_feed_back==0?header_new_connect:header_normal);
  240. from_normal_to_fec2(conn_info,udp_dest,0,0,header);
  241. }
  242. else if(events[idx].data.u64==(u64_t)tun_fd)
  243. {
  244. len=read(tun_fd,data,max_data_len);
  245. if(len<0)
  246. {
  247. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  248. continue;
  249. }
  250. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  251. char header=(got_feed_back==0?header_new_connect:header_normal);
  252. from_normal_to_fec2(conn_info,udp_dest,data,len,header);
  253. }
  254. else if(events[idx].data.u64==(u64_t)remote_fd64)
  255. {
  256. fd64_t fd64=events[idx].data.u64;
  257. int fd=fd_manager.to_fd(fd64);
  258. len=recv(fd,data,max_data_len,0);
  259. if(len<0)
  260. {
  261. mylog(log_warn,"recv return %d,errno=%s\n",len,strerror(errno));
  262. continue;
  263. }
  264. if(de_cook(data,len)<0)
  265. {
  266. mylog(log_warn,"de_cook(data,len)failed \n");
  267. continue;
  268. }
  269. char header=0;
  270. if(get_header(header,data,len)!=0)
  271. {
  272. mylog(log_warn,"get_header failed\n");
  273. continue;
  274. }
  275. if(header==header_reject)
  276. {
  277. if(keep_reconnect==0)
  278. {
  279. mylog(log_fatal,"server restarted or switched to handle another client,exited\n");
  280. myexit(-1);
  281. }
  282. else
  283. {
  284. if(got_feed_back==1)
  285. mylog(log_warn,"server restarted or switched to handle another client,but keep-reconnect enable,trying to reconnect\n");
  286. got_feed_back=0;
  287. }
  288. continue;
  289. }
  290. else if(header==header_normal)
  291. {
  292. if(got_feed_back==0)
  293. mylog(log_info,"connection accepted by server\n");
  294. got_feed_back=1;
  295. }
  296. else
  297. {
  298. mylog(log_warn,"invalid header %d %d\n",int(header),len);
  299. continue;
  300. }
  301. mylog(log_trace,"Received packet from udp,len: %d\n",len);
  302. from_fec_to_normal2(conn_info,tun_dest,data,len);
  303. }
  304. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  305. {
  306. uint64_t value;
  307. read(delay_manager.get_timer_fd(), &value, 8);
  308. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  309. }
  310. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  311. {
  312. char buf[buf_len];
  313. int len=read (fifo_fd, buf, sizeof (buf));
  314. if(len<0)
  315. {
  316. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  317. continue;
  318. }
  319. buf[len]=0;
  320. handle_command(buf);
  321. }
  322. else
  323. {
  324. assert(0==1);
  325. }
  326. }
  327. delay_manager.check();
  328. }
  329. return 0;
  330. }
  331. int tun_dev_server_event_loop()
  332. {
  333. char data[buf_len];
  334. int len;
  335. int i,j,k,ret;
  336. int epoll_fd,tun_fd;
  337. int local_listen_fd;
  338. tun_fd=get_tun_fd(tun_dev);
  339. assert(tun_fd>0);
  340. assert(new_listen_socket(local_listen_fd,local_ip_uint32,local_port)==0);
  341. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|1),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|2),g_fec_mtu)==0);
  342. epoll_fd = epoll_create1(0);
  343. assert(epoll_fd>0);
  344. const int max_events = 4096;
  345. struct epoll_event ev, events[max_events];
  346. if (epoll_fd < 0) {
  347. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  348. myexit(-1);
  349. }
  350. ev.events = EPOLLIN;
  351. ev.data.u64 = local_listen_fd;
  352. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  353. if (ret!=0) {
  354. mylog(log_fatal,"add udp_listen_fd error\n");
  355. myexit(-1);
  356. }
  357. ev.events = EPOLLIN;
  358. ev.data.u64 = tun_fd;
  359. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  360. if (ret!=0) {
  361. mylog(log_fatal,"add tun_fd error\n");
  362. myexit(-1);
  363. }
  364. ev.events = EPOLLIN;
  365. ev.data.u64 = delay_manager.get_timer_fd();
  366. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  367. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  368. if (ret!= 0) {
  369. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  370. myexit(-1);
  371. }
  372. conn_info_t *conn_info_p=new conn_info_t;
  373. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  374. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  375. ev.events = EPOLLIN;
  376. ev.data.u64 = tmp_timer_fd64;
  377. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  378. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  379. if (ret!= 0) {
  380. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  381. myexit(-1);
  382. }
  383. conn_info.timer.add_fd_to_epoll(epoll_fd);
  384. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  385. int fifo_fd=-1;
  386. if(fifo_file[0]!=0)
  387. {
  388. fifo_fd=create_fifo(fifo_file);
  389. ev.events = EPOLLIN;
  390. ev.data.u64 = fifo_fd;
  391. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  392. if (ret!= 0) {
  393. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  394. myexit(-1);
  395. }
  396. mylog(log_info,"fifo_file=%s\n",fifo_file);
  397. }
  398. dest_t udp_dest;
  399. udp_dest.cook=1;
  400. udp_dest.type=type_fd_ip_port;
  401. udp_dest.inner.fd_ip_port.fd=local_listen_fd;
  402. udp_dest.inner.fd_ip_port.ip_port.ip=0;
  403. udp_dest.inner.fd_ip_port.ip_port.port=0;
  404. dest_t tun_dest;
  405. tun_dest.type=type_write_fd;
  406. tun_dest.inner.fd=tun_fd;
  407. while(1)////////////////////////
  408. {
  409. if(about_to_exit) myexit(0);
  410. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  411. if (nfds < 0) { //allow zero
  412. if(errno==EINTR )
  413. {
  414. mylog(log_info,"epoll interrupted by signal\n");
  415. myexit(0);
  416. }
  417. else
  418. {
  419. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  420. myexit(-1);
  421. }
  422. }
  423. int idx;
  424. for (idx = 0; idx < nfds; ++idx)
  425. {
  426. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  427. {
  428. uint64_t value;
  429. read(conn_info.timer.get_timer_fd(), &value, 8);
  430. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  431. {
  432. continue;
  433. }
  434. conn_info.stat.report_as_server(udp_dest.inner.fd_ip_port.ip_port);
  435. }
  436. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  437. {
  438. assert(udp_dest.inner.fd64_ip_port.ip_port.to_u64()!=0);
  439. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  440. uint64_t fd64=events[idx].data.u64;
  441. //mylog(log_info,"timer!!!\n");
  442. uint64_t value;
  443. if(!fd_manager.exist(fd64)) //fd64 has been closed
  444. {
  445. mylog(log_trace,"!fd_manager.exist(fd64)");
  446. continue;
  447. }
  448. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  449. {
  450. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  451. continue;
  452. }
  453. if(value==0)
  454. {
  455. mylog(log_debug,"value==0\n");
  456. continue;
  457. }
  458. assert(value==1);
  459. from_normal_to_fec2(conn_info,udp_dest,0,0,header_normal);
  460. }
  461. else if(events[idx].data.u64==(u64_t)local_listen_fd)
  462. {
  463. struct sockaddr_in udp_new_addr_in={0};
  464. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  465. if ((len = recvfrom(local_listen_fd, data, max_data_len, 0,
  466. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) < 0) {
  467. mylog(log_error,"recv_from error,this shouldnt happen,err=%s,but we can try to continue\n",strerror(errno));
  468. continue;
  469. //myexit(1);
  470. };
  471. if(de_cook(data,len)<0)
  472. {
  473. mylog(log_warn,"de_cook(data,len)failed \n");
  474. continue;
  475. }
  476. char header=0;
  477. if(get_header(header,data,len)!=0)
  478. {
  479. mylog(log_warn,"get_header failed\n");
  480. continue;
  481. }
  482. if((udp_dest.inner.fd_ip_port.ip_port.ip==udp_new_addr_in.sin_addr.s_addr) && (udp_dest.inner.fd_ip_port.ip_port.port==ntohs(udp_new_addr_in.sin_port)))
  483. {
  484. if(header!=header_new_connect&& header!=header_normal)
  485. {
  486. mylog(log_warn,"invalid header\n");
  487. continue;
  488. }
  489. }
  490. else
  491. {
  492. if(header==header_new_connect)
  493. {
  494. mylog(log_info,"new connection from %s:%d \n", inet_ntoa(udp_new_addr_in.sin_addr),
  495. ntohs(udp_new_addr_in.sin_port));
  496. udp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  497. udp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  498. conn_info.fec_decode_manager.clear();
  499. conn_info.fec_encode_manager.clear();
  500. memset(&conn_info.stat,0,sizeof(conn_info.stat));
  501. }
  502. else if(header==header_normal)
  503. {
  504. mylog(log_debug,"rejected connection from %s:%d\n", inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port));
  505. len=1;
  506. data[0]=header_reject;
  507. do_cook(data,len);
  508. dest_t tmp_dest;
  509. tmp_dest.type=type_fd_ip_port;
  510. tmp_dest.inner.fd_ip_port.fd=local_listen_fd;
  511. tmp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  512. tmp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  513. delay_manager.add(0,tmp_dest,data,len);;
  514. continue;
  515. }
  516. else
  517. {
  518. mylog(log_warn,"invalid header\n");
  519. }
  520. }
  521. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  522. ntohs(udp_new_addr_in.sin_port),len);
  523. from_fec_to_normal2(conn_info,tun_dest,data,len);
  524. }
  525. else if(events[idx].data.u64==(u64_t)tun_fd)
  526. {
  527. len=read(tun_fd,data,max_data_len);
  528. if(len<0)
  529. {
  530. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  531. continue;
  532. }
  533. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  534. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  535. {
  536. mylog(log_debug,"received packet from tun,but there is no client yet,dropped packet\n");
  537. continue;
  538. }
  539. from_normal_to_fec2(conn_info,udp_dest,data,len,header_normal);
  540. }
  541. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  542. {
  543. uint64_t value;
  544. read(delay_manager.get_timer_fd(), &value, 8);
  545. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  546. }
  547. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  548. {
  549. char buf[buf_len];
  550. int len=read (fifo_fd, buf, sizeof (buf));
  551. if(len<0)
  552. {
  553. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  554. continue;
  555. }
  556. buf[len]=0;
  557. handle_command(buf);
  558. }
  559. else
  560. {
  561. assert(0==1);
  562. }
  563. }
  564. delay_manager.check();
  565. }
  566. return 0;
  567. }