tun_dev.cpp 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907
  1. /*
  2. * tun.cpp
  3. *
  4. * Created on: Oct 26, 2017
  5. * Author: root
  6. */
  7. #include "common.h"
  8. #include "log.h"
  9. #include "misc.h"
  10. #include <netinet/tcp.h> //Provides declarations for tcp header
  11. #include <netinet/udp.h>
  12. #include <netinet/ip.h> //Provides declarations for ip header
  13. #include <netinet/if_ether.h>
  14. my_time_t last_keep_alive_time=0;
  15. int keep_alive_interval=1000;//1000ms
  16. int get_tun_fd(char * dev_name)
  17. {
  18. int tun_fd=open("/dev/net/tun",O_RDWR);
  19. if(tun_fd <0)
  20. {
  21. mylog(log_fatal,"open /dev/net/tun failed");
  22. myexit(-1);
  23. }
  24. struct ifreq ifr;
  25. memset(&ifr, 0, sizeof(ifr));
  26. ifr.ifr_flags = IFF_TUN|IFF_NO_PI;
  27. strncpy(ifr.ifr_name, dev_name, IFNAMSIZ);
  28. if(ioctl(tun_fd, TUNSETIFF, (void *)&ifr) != 0)
  29. {
  30. mylog(log_fatal,"open /dev/net/tun failed");
  31. myexit(-1);
  32. }
  33. return tun_fd;
  34. }
  35. int set_if(char *if_name,u32_t local_ip,u32_t remote_ip,int mtu)
  36. {
  37. //printf("i m here1\n");
  38. struct ifreq ifr;
  39. struct sockaddr_in sai;
  40. memset(&ifr,0,sizeof(ifr));
  41. memset(&sai, 0, sizeof(struct sockaddr));
  42. int sockfd = socket(AF_INET, SOCK_DGRAM, 0);
  43. strncpy(ifr.ifr_name, if_name, IFNAMSIZ);
  44. sai.sin_family = AF_INET;
  45. sai.sin_port = 0;
  46. sai.sin_addr.s_addr = local_ip;
  47. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  48. assert(ioctl(sockfd, SIOCSIFADDR, &ifr)==0); //set source ip
  49. sai.sin_addr.s_addr = remote_ip;
  50. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  51. assert(ioctl(sockfd, SIOCSIFDSTADDR, &ifr)==0);//set dest ip
  52. ifr.ifr_mtu=mtu;
  53. assert(ioctl(sockfd, SIOCSIFMTU, &ifr)==0);//set mtu
  54. assert(ioctl(sockfd, SIOCGIFFLAGS, &ifr)==0);
  55. // ifr.ifr_flags |= ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );
  56. ifr.ifr_flags = ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );//set interface flags
  57. assert(ioctl(sockfd, SIOCSIFFLAGS, &ifr)==0);
  58. //printf("i m here2\n");
  59. return 0;
  60. }
  61. const char header_normal=1;
  62. const char header_new_connect=2;
  63. const char header_reject=3;
  64. const char header_keep_alive=4;
  65. int put_header(char header,char * data,int &len)
  66. {
  67. assert(len>=0);
  68. data[len]=header;
  69. len+=1;
  70. return 0;
  71. }
  72. int get_header(char &header,char * data,int &len)
  73. {
  74. assert(len>=0);
  75. if(len<1) return -1;
  76. len-=1;
  77. header=data[len];
  78. return 0;
  79. }
  80. int from_normal_to_fec2(conn_info_t & conn_info,dest_t &dest,char * data,int len,char header)
  81. {
  82. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  83. from_normal_to_fec(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  84. for(int i=0;i<out_n;i++)
  85. {
  86. char tmp_buf[buf_len];
  87. int tmp_len=out_len[i];
  88. memcpy(tmp_buf,out_arr[i],out_len[i]);
  89. put_header(header,tmp_buf,tmp_len);
  90. delay_send(out_delay[i],dest,tmp_buf,tmp_len);//this is slow but safer.just use this one
  91. //put_header(header,out_arr[i],out_len[i]);//modify in place
  92. //delay_send(out_delay[i],dest,out_arr[i],out_len[i]);//warning this is currently okay,but if you modified fec encoder,you may have to use the above code
  93. }
  94. return 0;
  95. }
  96. int from_fec_to_normal2(conn_info_t & conn_info,dest_t &dest,char * data,int len)
  97. {
  98. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  99. from_fec_to_normal(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  100. for(int i=0;i<out_n;i++)
  101. {
  102. #ifndef NOLIMIT
  103. if(client_or_server==server_mode)
  104. {
  105. char * tmp_data=out_arr[i];
  106. int tmp_len=out_len[i];
  107. if(tmp_len>=20)
  108. {
  109. u32_t dest_ip=htonl(read_u32(tmp_data+16));
  110. //printf("%s\n",my_ntoa(dest_ip));
  111. if( ( ntohl(sub_net_uint32)&0xFFFFFF00 ) != ( ntohl (dest_ip) &0xFFFFFF00) )
  112. {
  113. string sub=my_ntoa(dest_ip);
  114. string dst=my_ntoa( htonl( ntohl (sub_net_uint32) &0xFFFFFF00) );
  115. mylog(log_warn,"[restriction]packet's dest ip [%s] not in subnet [%s],dropped\n", sub.c_str(), dst.c_str());
  116. continue;
  117. }
  118. }
  119. }
  120. #endif
  121. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  122. }
  123. return 0;
  124. }
  125. int do_mssfix(char * s,int len)
  126. {
  127. if(mssfix==0)
  128. {
  129. return 0;
  130. }
  131. if(len<20)
  132. {
  133. mylog(log_debug,"packet from tun len=%d <20\n",len);
  134. return -1;
  135. }
  136. iphdr * iph;
  137. iph = (struct iphdr *) s;
  138. if(iph->protocol!=IPPROTO_TCP)
  139. {
  140. //mylog(log_trace,"not tcp");
  141. return 0;
  142. }
  143. if (!(iph->ihl > 0 && iph->ihl <=60)) {
  144. mylog(log_debug,"iph ihl error ihl= %u\n",(u32_t)iph->ihl);
  145. return -1;
  146. }
  147. int ip_len=ntohs(iph->tot_len);
  148. int ip_hdr_len=iph->ihl*4;
  149. if(len<ip_hdr_len)
  150. {
  151. mylog(log_debug,"len<ip_hdr_len,%d %d\n",len,ip_hdr_len);
  152. return -1;
  153. }
  154. if(len<ip_len)
  155. {
  156. mylog(log_debug,"len<ip_len,%d %d\n",len,ip_len);
  157. return -1;
  158. }
  159. if(ip_hdr_len>ip_len)
  160. {
  161. mylog(log_debug,"ip_hdr_len<ip_len,%d %d\n",ip_hdr_len,ip_len);
  162. return -1;
  163. }
  164. if( ( ntohs(iph->frag_off) &(short)(0x1FFF) ) !=0 )
  165. {
  166. //not first segment
  167. //printf("line=%d %x %x \n",__LINE__,(u32_t)ntohs(iph->frag_off),u32_t( ntohs(iph->frag_off) &0xFFF8));
  168. return 0;
  169. }
  170. if( ( ntohs(iph->frag_off) &(short)(0x80FF) ) !=0 )
  171. {
  172. //not whole segment
  173. //printf("line=%d \n",__LINE__);
  174. return 0;
  175. }
  176. char * tcp_begin=s+ip_hdr_len;
  177. int tcp_len=ip_len-ip_hdr_len;
  178. if(tcp_len<20)
  179. {
  180. mylog(log_debug,"tcp_len<20,%d\n",tcp_len);
  181. return -1;
  182. }
  183. tcphdr * tcph=(struct tcphdr*)tcp_begin;
  184. if(int(tcph->syn)==0) //fast fail
  185. {
  186. mylog(log_trace,"tcph->syn==0\n");
  187. return 0;
  188. }
  189. int tcp_hdr_len = tcph->doff*4;
  190. if(tcp_len<tcp_hdr_len)
  191. {
  192. mylog(log_debug,"tcp_len <tcp_hdr_len, %d %d\n",tcp_len,tcp_hdr_len);
  193. return -1;
  194. }
  195. /*
  196. if(tcp_hdr_len==20)
  197. {
  198. //printf("line=%d\n",__LINE__);
  199. mylog(log_trace,"no tcp option\n");
  200. return 0;
  201. }*/
  202. char *ptr=tcp_begin+20;
  203. char *option_end=tcp_begin+tcp_hdr_len;
  204. while(ptr<option_end)
  205. {
  206. if(*ptr==0)
  207. {
  208. return 0;
  209. }
  210. else if(*ptr==1)
  211. {
  212. ptr++;
  213. }
  214. else if(*ptr==2)
  215. {
  216. if(ptr+1>=option_end)
  217. {
  218. mylog(log_debug,"invaild option ptr+1==option_end,for mss\n");
  219. return -1;
  220. }
  221. if(*(ptr+1)!=4)
  222. {
  223. mylog(log_debug,"invaild mss len\n");
  224. return -1;
  225. }
  226. if(ptr+3>=option_end)
  227. {
  228. mylog(log_debug,"ptr+4>option_end for mss\n");
  229. return -1;
  230. }
  231. int mss= read_u16(ptr+2);//uint8_t(ptr[2])*256+uint8_t(ptr[3]);
  232. int new_mss=mss;
  233. if(new_mss>g_fec_mtu-40-10) //minus extra 10 for safe
  234. {
  235. new_mss=g_fec_mtu-40-10;
  236. }
  237. write_u16(ptr+2,(unsigned short)new_mss);
  238. pseudo_header psh;
  239. psh.source_address =iph->saddr;
  240. psh.dest_address = iph->daddr;
  241. psh.placeholder = 0;
  242. psh.protocol = iph->protocol;
  243. psh.tcp_length = htons(tcp_len);
  244. tcph->check=0;
  245. tcph->check=tcp_csum(psh,(unsigned short *)tcph,tcp_len);
  246. mylog(log_trace,"mss=%d syn=%d ack=%d, changed mss to %d \n",mss,(int)tcph->syn,(int)tcph->ack,new_mss);
  247. //printf("test=%x\n",u32_t(1));
  248. //printf("frag=%x\n",u32_t( ntohs(iph->frag_off) ));
  249. return 0;
  250. }
  251. else
  252. {
  253. if(ptr+1>=option_end)
  254. {
  255. mylog(log_debug,"invaild option ptr+1==option_end\n");
  256. return -1;
  257. }
  258. else
  259. {
  260. //omit check
  261. ptr+=*(ptr+1);
  262. }
  263. }
  264. }
  265. return 0;
  266. }
  267. int do_keep_alive(dest_t & dest)
  268. {
  269. if(get_current_time()-last_keep_alive_time>u64_t(keep_alive_interval))
  270. {
  271. last_keep_alive_time=get_current_time();
  272. char data[buf_len];int len;
  273. data[0]=header_keep_alive;
  274. len=1;
  275. assert(dest.cook==1);
  276. //do_cook(data,len);
  277. delay_send(0,dest,data,len);
  278. }
  279. return 0;
  280. }
  281. int tun_dev_client_event_loop()
  282. {
  283. char data[buf_len];
  284. int len;
  285. int i,j,k,ret;
  286. int epoll_fd,tun_fd;
  287. int remote_fd;
  288. fd64_t remote_fd64;
  289. tun_fd=get_tun_fd(tun_dev);
  290. assert(tun_fd>0);
  291. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  292. remote_fd64=fd_manager.create(remote_fd);
  293. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|2),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|1),tun_mtu)==0);
  294. epoll_fd = epoll_create1(0);
  295. assert(epoll_fd>0);
  296. const int max_events = 4096;
  297. struct epoll_event ev, events[max_events];
  298. if (epoll_fd < 0) {
  299. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  300. myexit(-1);
  301. }
  302. ev.events = EPOLLIN;
  303. ev.data.u64 = remote_fd64;
  304. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  305. if (ret!=0) {
  306. mylog(log_fatal,"add remote_fd64 error\n");
  307. myexit(-1);
  308. }
  309. ev.events = EPOLLIN;
  310. ev.data.u64 = tun_fd;
  311. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  312. if (ret!=0) {
  313. mylog(log_fatal,"add tun_fd error\n");
  314. myexit(-1);
  315. }
  316. ev.events = EPOLLIN;
  317. ev.data.u64 = delay_manager.get_timer_fd();
  318. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  319. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  320. if (ret!= 0) {
  321. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  322. myexit(-1);
  323. }
  324. conn_info_t *conn_info_p=new conn_info_t;
  325. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  326. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  327. ev.events = EPOLLIN;
  328. ev.data.u64 = tmp_timer_fd64;
  329. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  330. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  331. if (ret!= 0) {
  332. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  333. myexit(-1);
  334. }
  335. conn_info.timer.add_fd_to_epoll(epoll_fd);
  336. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  337. int fifo_fd=-1;
  338. if(fifo_file[0]!=0)
  339. {
  340. fifo_fd=create_fifo(fifo_file);
  341. ev.events = EPOLLIN;
  342. ev.data.u64 = fifo_fd;
  343. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  344. if (ret!= 0) {
  345. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  346. myexit(-1);
  347. }
  348. mylog(log_info,"fifo_file=%s\n",fifo_file);
  349. }
  350. dest_t udp_dest;
  351. udp_dest.cook=1;
  352. udp_dest.type=type_fd64;
  353. udp_dest.inner.fd64=remote_fd64;
  354. dest_t tun_dest;
  355. tun_dest.type=type_write_fd;
  356. tun_dest.inner.fd=tun_fd;
  357. int got_feed_back=0;
  358. while(1)////////////////////////
  359. {
  360. if(about_to_exit) myexit(0);
  361. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  362. if (nfds < 0) { //allow zero
  363. if(errno==EINTR )
  364. {
  365. mylog(log_info,"epoll interrupted by signal,continue\n");
  366. //myexit(0);
  367. }
  368. else
  369. {
  370. mylog(log_fatal,"epoll_wait return %d,%s\n", nfds,strerror(errno));
  371. myexit(-1);
  372. }
  373. }
  374. int idx;
  375. for (idx = 0; idx < nfds; ++idx)
  376. {
  377. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  378. {
  379. uint64_t value;
  380. read(conn_info.timer.get_timer_fd(), &value, 8);
  381. mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
  382. conn_info.stat.report_as_client();
  383. if(got_feed_back) do_keep_alive(udp_dest);
  384. }
  385. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  386. {
  387. fd64_t fd64=events[idx].data.u64;
  388. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  389. uint64_t value;
  390. if(!fd_manager.exist(fd64)) //fd64 has been closed
  391. {
  392. mylog(log_trace,"!fd_manager.exist(fd64)");
  393. continue;
  394. }
  395. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  396. {
  397. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  398. continue;
  399. }
  400. if(value==0)
  401. {
  402. mylog(log_debug,"value==0\n");
  403. continue;
  404. }
  405. assert(value==1);
  406. char header=(got_feed_back==0?header_new_connect:header_normal);
  407. from_normal_to_fec2(conn_info,udp_dest,0,0,header);
  408. }
  409. else if(events[idx].data.u64==(u64_t)tun_fd)
  410. {
  411. len=read(tun_fd,data,max_data_len);
  412. if(len<0)
  413. {
  414. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  415. continue;
  416. }
  417. do_mssfix(data,len);
  418. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  419. char header=(got_feed_back==0?header_new_connect:header_normal);
  420. from_normal_to_fec2(conn_info,udp_dest,data,len,header);
  421. }
  422. else if(events[idx].data.u64==(u64_t)remote_fd64)
  423. {
  424. fd64_t fd64=events[idx].data.u64;
  425. int fd=fd_manager.to_fd(fd64);
  426. len=recv(fd,data,max_data_len,0);
  427. if(len<0)
  428. {
  429. mylog(log_warn,"recv return %d,errno=%s\n",len,strerror(errno));
  430. continue;
  431. }
  432. if(de_cook(data,len)<0)
  433. {
  434. mylog(log_warn,"de_cook(data,len)failed \n");
  435. continue;
  436. }
  437. char header=0;
  438. if(get_header(header,data,len)!=0)
  439. {
  440. mylog(log_warn,"get_header failed\n");
  441. continue;
  442. }
  443. if(header==header_keep_alive)
  444. {
  445. mylog(log_trace,"got keep_alive packet\n");
  446. continue;
  447. }
  448. if(header==header_reject)
  449. {
  450. if(keep_reconnect==0)
  451. {
  452. mylog(log_fatal,"server restarted or switched to handle another client,exited\n");
  453. myexit(-1);
  454. }
  455. else
  456. {
  457. if(got_feed_back==1)
  458. mylog(log_warn,"server restarted or switched to handle another client,but keep-reconnect enabled,trying to reconnect\n");
  459. got_feed_back=0;
  460. }
  461. continue;
  462. }
  463. else if(header==header_normal)
  464. {
  465. if(got_feed_back==0)
  466. mylog(log_info,"connection accepted by server\n");
  467. got_feed_back=1;
  468. }
  469. else
  470. {
  471. mylog(log_warn,"invalid header %d %d\n",int(header),len);
  472. continue;
  473. }
  474. mylog(log_trace,"Received packet from udp,len: %d\n",len);
  475. from_fec_to_normal2(conn_info,tun_dest,data,len);
  476. }
  477. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  478. {
  479. uint64_t value;
  480. read(delay_manager.get_timer_fd(), &value, 8);
  481. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  482. }
  483. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  484. {
  485. char buf[buf_len];
  486. int len=read (fifo_fd, buf, sizeof (buf));
  487. if(len<0)
  488. {
  489. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  490. continue;
  491. }
  492. buf[len]=0;
  493. handle_command(buf);
  494. }
  495. else
  496. {
  497. assert(0==1);
  498. }
  499. }
  500. delay_manager.check();
  501. }
  502. return 0;
  503. }
  504. int tun_dev_server_event_loop()
  505. {
  506. char data[buf_len];
  507. int len;
  508. int i,j,k,ret;
  509. int epoll_fd,tun_fd;
  510. int local_listen_fd;
  511. tun_fd=get_tun_fd(tun_dev);
  512. assert(tun_fd>0);
  513. assert(new_listen_socket(local_listen_fd,local_ip_uint32,local_port)==0);
  514. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|1),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|2),tun_mtu)==0);
  515. epoll_fd = epoll_create1(0);
  516. assert(epoll_fd>0);
  517. const int max_events = 4096;
  518. struct epoll_event ev, events[max_events];
  519. if (epoll_fd < 0) {
  520. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  521. myexit(-1);
  522. }
  523. ev.events = EPOLLIN;
  524. ev.data.u64 = local_listen_fd;
  525. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  526. if (ret!=0) {
  527. mylog(log_fatal,"add udp_listen_fd error\n");
  528. myexit(-1);
  529. }
  530. ev.events = EPOLLIN;
  531. ev.data.u64 = tun_fd;
  532. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  533. if (ret!=0) {
  534. mylog(log_fatal,"add tun_fd error\n");
  535. myexit(-1);
  536. }
  537. ev.events = EPOLLIN;
  538. ev.data.u64 = delay_manager.get_timer_fd();
  539. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  540. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  541. if (ret!= 0) {
  542. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  543. myexit(-1);
  544. }
  545. conn_info_t *conn_info_p=new conn_info_t;
  546. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  547. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  548. ev.events = EPOLLIN;
  549. ev.data.u64 = tmp_timer_fd64;
  550. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  551. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  552. if (ret!= 0) {
  553. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  554. myexit(-1);
  555. }
  556. conn_info.timer.add_fd_to_epoll(epoll_fd);
  557. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  558. int fifo_fd=-1;
  559. if(fifo_file[0]!=0)
  560. {
  561. fifo_fd=create_fifo(fifo_file);
  562. ev.events = EPOLLIN;
  563. ev.data.u64 = fifo_fd;
  564. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  565. if (ret!= 0) {
  566. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  567. myexit(-1);
  568. }
  569. mylog(log_info,"fifo_file=%s\n",fifo_file);
  570. }
  571. dest_t udp_dest;
  572. udp_dest.cook=1;
  573. udp_dest.type=type_fd_ip_port;
  574. udp_dest.inner.fd_ip_port.fd=local_listen_fd;
  575. udp_dest.inner.fd_ip_port.ip_port.ip=0;
  576. udp_dest.inner.fd_ip_port.ip_port.port=0;
  577. dest_t tun_dest;
  578. tun_dest.type=type_write_fd;
  579. tun_dest.inner.fd=tun_fd;
  580. while(1)////////////////////////
  581. {
  582. if(about_to_exit) myexit(0);
  583. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  584. if (nfds < 0) { //allow zero
  585. if(errno==EINTR )
  586. {
  587. mylog(log_info,"epoll interrupted by signal,continue\n");
  588. //myexit(0);
  589. }
  590. else
  591. {
  592. mylog(log_fatal,"epoll_wait return %d,%s\n", nfds,strerror(errno));
  593. myexit(-1);
  594. }
  595. }
  596. int idx;
  597. for (idx = 0; idx < nfds; ++idx)
  598. {
  599. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  600. {
  601. uint64_t value;
  602. read(conn_info.timer.get_timer_fd(), &value, 8);
  603. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  604. {
  605. continue;
  606. }
  607. conn_info.stat.report_as_server(udp_dest.inner.fd_ip_port.ip_port);
  608. do_keep_alive(udp_dest);
  609. }
  610. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  611. {
  612. assert(udp_dest.inner.fd64_ip_port.ip_port.to_u64()!=0);
  613. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  614. uint64_t fd64=events[idx].data.u64;
  615. //mylog(log_info,"timer!!!\n");
  616. uint64_t value;
  617. if(!fd_manager.exist(fd64)) //fd64 has been closed
  618. {
  619. mylog(log_trace,"!fd_manager.exist(fd64)");
  620. continue;
  621. }
  622. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  623. {
  624. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  625. continue;
  626. }
  627. if(value==0)
  628. {
  629. mylog(log_debug,"value==0\n");
  630. continue;
  631. }
  632. assert(value==1);
  633. from_normal_to_fec2(conn_info,udp_dest,0,0,header_normal);
  634. }
  635. else if(events[idx].data.u64==(u64_t)local_listen_fd)
  636. {
  637. struct sockaddr_in udp_new_addr_in={0};
  638. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  639. if ((len = recvfrom(local_listen_fd, data, max_data_len, 0,
  640. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) < 0) {
  641. mylog(log_error,"recv_from error,this shouldnt happen,err=%s,but we can try to continue\n",strerror(errno));
  642. continue;
  643. //myexit(1);
  644. };
  645. if(de_cook(data,len)<0)
  646. {
  647. mylog(log_warn,"de_cook(data,len)failed \n");
  648. continue;
  649. }
  650. char header=0;
  651. if(get_header(header,data,len)!=0)
  652. {
  653. mylog(log_warn,"get_header failed\n");
  654. continue;
  655. }
  656. if((udp_dest.inner.fd_ip_port.ip_port.ip==udp_new_addr_in.sin_addr.s_addr) && (udp_dest.inner.fd_ip_port.ip_port.port==ntohs(udp_new_addr_in.sin_port)))
  657. {
  658. if(header==header_keep_alive)
  659. {
  660. mylog(log_trace,"got keep_alive packet\n");
  661. continue;
  662. }
  663. if(header!=header_new_connect&& header!=header_normal)
  664. {
  665. mylog(log_warn,"invalid header\n");
  666. continue;
  667. }
  668. }
  669. else
  670. {
  671. if(header==header_keep_alive)
  672. {
  673. mylog(log_debug,"got keep_alive packet from unexpected client\n");
  674. continue;
  675. }
  676. if(header==header_new_connect)
  677. {
  678. mylog(log_info,"new connection from %s:%d \n", inet_ntoa(udp_new_addr_in.sin_addr),
  679. ntohs(udp_new_addr_in.sin_port));
  680. udp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  681. udp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  682. conn_info.fec_decode_manager.clear();
  683. conn_info.fec_encode_manager.clear();
  684. memset(&conn_info.stat,0,sizeof(conn_info.stat));
  685. }
  686. else if(header==header_normal)
  687. {
  688. mylog(log_debug,"rejected connection from %s:%d\n", inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port));
  689. len=1;
  690. data[0]=header_reject;
  691. do_cook(data,len);
  692. dest_t tmp_dest;
  693. tmp_dest.type=type_fd_ip_port;
  694. tmp_dest.inner.fd_ip_port.fd=local_listen_fd;
  695. tmp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  696. tmp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  697. delay_manager.add(0,tmp_dest,data,len);;
  698. continue;
  699. }
  700. else
  701. {
  702. mylog(log_warn,"invalid header\n");
  703. }
  704. }
  705. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  706. ntohs(udp_new_addr_in.sin_port),len);
  707. from_fec_to_normal2(conn_info,tun_dest,data,len);
  708. }
  709. else if(events[idx].data.u64==(u64_t)tun_fd)
  710. {
  711. len=read(tun_fd,data,max_data_len);
  712. if(len<0)
  713. {
  714. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  715. continue;
  716. }
  717. do_mssfix(data,len);
  718. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  719. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  720. {
  721. mylog(log_debug,"received packet from tun,but there is no client yet,dropped packet\n");
  722. continue;
  723. }
  724. from_normal_to_fec2(conn_info,udp_dest,data,len,header_normal);
  725. }
  726. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  727. {
  728. uint64_t value;
  729. read(delay_manager.get_timer_fd(), &value, 8);
  730. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  731. }
  732. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  733. {
  734. char buf[buf_len];
  735. int len=read (fifo_fd, buf, sizeof (buf));
  736. if(len<0)
  737. {
  738. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  739. continue;
  740. }
  741. buf[len]=0;
  742. handle_command(buf);
  743. }
  744. else
  745. {
  746. assert(0==1);
  747. }
  748. }
  749. delay_manager.check();
  750. }
  751. return 0;
  752. }