tun_dev.cpp 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736
  1. /*
  2. * tun.cpp
  3. *
  4. * Created on: Oct 26, 2017
  5. * Author: root
  6. */
  7. #include "common.h"
  8. #include "log.h"
  9. #include "misc.h"
  10. my_time_t last_keep_alive_time=0;
  11. int keep_alive_interval=1000;//1000ms
  12. int get_tun_fd(char * dev_name)
  13. {
  14. int tun_fd=open("/dev/net/tun",O_RDWR);
  15. if(tun_fd <0)
  16. {
  17. mylog(log_fatal,"open /dev/net/tun failed");
  18. myexit(-1);
  19. }
  20. struct ifreq ifr;
  21. memset(&ifr, 0, sizeof(ifr));
  22. ifr.ifr_flags = IFF_TUN|IFF_NO_PI;
  23. strncpy(ifr.ifr_name, dev_name, IFNAMSIZ);
  24. if(ioctl(tun_fd, TUNSETIFF, (void *)&ifr) != 0)
  25. {
  26. mylog(log_fatal,"open /dev/net/tun failed");
  27. myexit(-1);
  28. }
  29. return tun_fd;
  30. }
  31. int set_if(char *if_name,u32_t local_ip,u32_t remote_ip,int mtu)
  32. {
  33. //printf("i m here1\n");
  34. struct ifreq ifr;
  35. struct sockaddr_in sai;
  36. memset(&ifr,0,sizeof(ifr));
  37. memset(&sai, 0, sizeof(struct sockaddr));
  38. int sockfd = socket(AF_INET, SOCK_DGRAM, 0);
  39. strncpy(ifr.ifr_name, if_name, IFNAMSIZ);
  40. sai.sin_family = AF_INET;
  41. sai.sin_port = 0;
  42. sai.sin_addr.s_addr = local_ip;
  43. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  44. assert(ioctl(sockfd, SIOCSIFADDR, &ifr)==0); //set source ip
  45. sai.sin_addr.s_addr = remote_ip;
  46. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  47. assert(ioctl(sockfd, SIOCSIFDSTADDR, &ifr)==0);//set dest ip
  48. ifr.ifr_mtu=mtu;
  49. assert(ioctl(sockfd, SIOCSIFMTU, &ifr)==0);//set mtu
  50. assert(ioctl(sockfd, SIOCGIFFLAGS, &ifr)==0);
  51. // ifr.ifr_flags |= ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );
  52. ifr.ifr_flags = ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );//set interface flags
  53. assert(ioctl(sockfd, SIOCSIFFLAGS, &ifr)==0);
  54. //printf("i m here2\n");
  55. return 0;
  56. }
  57. const char header_normal=1;
  58. const char header_new_connect=2;
  59. const char header_reject=3;
  60. const char header_keep_alive=4;
  61. int put_header(char header,char * data,int &len)
  62. {
  63. assert(len>=0);
  64. data[len]=header;
  65. len+=1;
  66. return 0;
  67. }
  68. int get_header(char &header,char * data,int &len)
  69. {
  70. assert(len>=0);
  71. if(len<1) return -1;
  72. len-=1;
  73. header=data[len];
  74. return 0;
  75. }
  76. int from_normal_to_fec2(conn_info_t & conn_info,dest_t &dest,char * data,int len,char header)
  77. {
  78. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  79. from_normal_to_fec(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  80. for(int i=0;i<out_n;i++)
  81. {
  82. char tmp_buf[buf_len];
  83. int tmp_len=out_len[i];
  84. memcpy(tmp_buf,out_arr[i],out_len[i]);
  85. put_header(header,tmp_buf,tmp_len);
  86. delay_send(out_delay[i],dest,tmp_buf,tmp_len);//this is slow but safer.just use this one
  87. //put_header(header,out_arr[i],out_len[i]);//modify in place
  88. //delay_send(out_delay[i],dest,out_arr[i],out_len[i]);//warning this is currently okay,but if you modified fec encoder,you may have to use the above code
  89. }
  90. return 0;
  91. }
  92. int from_fec_to_normal2(conn_info_t & conn_info,dest_t &dest,char * data,int len)
  93. {
  94. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  95. from_fec_to_normal(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  96. for(int i=0;i<out_n;i++)
  97. {
  98. #ifndef NORES
  99. if(client_or_server==server_mode)
  100. {
  101. char * tmp_data=out_arr[i];
  102. int tmp_len=out_len[i];
  103. if(tmp_len>=20)
  104. {
  105. u32_t dest_ip=htonl(read_u32(tmp_data+16));
  106. //printf("%s\n",my_ntoa(dest_ip));
  107. if( ( ntohl(sub_net_uint32)&0xFFFFFF00 ) != ( ntohl (dest_ip) &0xFFFFFF00) )
  108. {
  109. string sub=my_ntoa(dest_ip);
  110. string dst=my_ntoa( htonl( ntohl (sub_net_uint32) &0xFFFFFF00) );
  111. mylog(log_warn,"[restriction]packet's dest ip [%s] not in subnet [%s],dropped\n", sub.c_str(), dst.c_str());
  112. continue;
  113. }
  114. }
  115. }
  116. #endif
  117. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  118. }
  119. return 0;
  120. }
  121. int do_keep_alive(dest_t & dest)
  122. {
  123. if(get_current_time()-last_keep_alive_time>u64_t(keep_alive_interval))
  124. {
  125. last_keep_alive_time=get_current_time();
  126. char data[buf_len];int len;
  127. data[0]=header_keep_alive;
  128. len=1;
  129. assert(dest.cook==1);
  130. //do_cook(data,len);
  131. delay_send(0,dest,data,len);
  132. }
  133. return 0;
  134. }
  135. int tun_dev_client_event_loop()
  136. {
  137. char data[buf_len];
  138. int len;
  139. int i,j,k,ret;
  140. int epoll_fd,tun_fd;
  141. int remote_fd;
  142. fd64_t remote_fd64;
  143. tun_fd=get_tun_fd(tun_dev);
  144. assert(tun_fd>0);
  145. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  146. remote_fd64=fd_manager.create(remote_fd);
  147. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|2),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|1),1500)==0);
  148. epoll_fd = epoll_create1(0);
  149. assert(epoll_fd>0);
  150. const int max_events = 4096;
  151. struct epoll_event ev, events[max_events];
  152. if (epoll_fd < 0) {
  153. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  154. myexit(-1);
  155. }
  156. ev.events = EPOLLIN;
  157. ev.data.u64 = remote_fd64;
  158. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  159. if (ret!=0) {
  160. mylog(log_fatal,"add remote_fd64 error\n");
  161. myexit(-1);
  162. }
  163. ev.events = EPOLLIN;
  164. ev.data.u64 = tun_fd;
  165. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  166. if (ret!=0) {
  167. mylog(log_fatal,"add tun_fd error\n");
  168. myexit(-1);
  169. }
  170. ev.events = EPOLLIN;
  171. ev.data.u64 = delay_manager.get_timer_fd();
  172. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  173. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  174. if (ret!= 0) {
  175. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  176. myexit(-1);
  177. }
  178. conn_info_t *conn_info_p=new conn_info_t;
  179. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  180. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  181. ev.events = EPOLLIN;
  182. ev.data.u64 = tmp_timer_fd64;
  183. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  184. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  185. if (ret!= 0) {
  186. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  187. myexit(-1);
  188. }
  189. conn_info.timer.add_fd_to_epoll(epoll_fd);
  190. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  191. int fifo_fd=-1;
  192. if(fifo_file[0]!=0)
  193. {
  194. fifo_fd=create_fifo(fifo_file);
  195. ev.events = EPOLLIN;
  196. ev.data.u64 = fifo_fd;
  197. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  198. if (ret!= 0) {
  199. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  200. myexit(-1);
  201. }
  202. mylog(log_info,"fifo_file=%s\n",fifo_file);
  203. }
  204. dest_t udp_dest;
  205. udp_dest.cook=1;
  206. udp_dest.type=type_fd64;
  207. udp_dest.inner.fd64=remote_fd64;
  208. dest_t tun_dest;
  209. tun_dest.type=type_write_fd;
  210. tun_dest.inner.fd=tun_fd;
  211. int got_feed_back=0;
  212. while(1)////////////////////////
  213. {
  214. if(about_to_exit) myexit(0);
  215. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  216. if (nfds < 0) { //allow zero
  217. if(errno==EINTR )
  218. {
  219. mylog(log_info,"epoll interrupted by signal\n");
  220. myexit(0);
  221. }
  222. else
  223. {
  224. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  225. myexit(-1);
  226. }
  227. }
  228. int idx;
  229. for (idx = 0; idx < nfds; ++idx)
  230. {
  231. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  232. {
  233. uint64_t value;
  234. read(conn_info.timer.get_timer_fd(), &value, 8);
  235. mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
  236. conn_info.stat.report_as_client();
  237. if(got_feed_back) do_keep_alive(udp_dest);
  238. }
  239. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  240. {
  241. fd64_t fd64=events[idx].data.u64;
  242. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  243. uint64_t value;
  244. if(!fd_manager.exist(fd64)) //fd64 has been closed
  245. {
  246. mylog(log_trace,"!fd_manager.exist(fd64)");
  247. continue;
  248. }
  249. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  250. {
  251. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  252. continue;
  253. }
  254. if(value==0)
  255. {
  256. mylog(log_debug,"value==0\n");
  257. continue;
  258. }
  259. assert(value==1);
  260. char header=(got_feed_back==0?header_new_connect:header_normal);
  261. from_normal_to_fec2(conn_info,udp_dest,0,0,header);
  262. }
  263. else if(events[idx].data.u64==(u64_t)tun_fd)
  264. {
  265. len=read(tun_fd,data,max_data_len);
  266. if(len<0)
  267. {
  268. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  269. continue;
  270. }
  271. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  272. char header=(got_feed_back==0?header_new_connect:header_normal);
  273. from_normal_to_fec2(conn_info,udp_dest,data,len,header);
  274. }
  275. else if(events[idx].data.u64==(u64_t)remote_fd64)
  276. {
  277. fd64_t fd64=events[idx].data.u64;
  278. int fd=fd_manager.to_fd(fd64);
  279. len=recv(fd,data,max_data_len,0);
  280. if(len<0)
  281. {
  282. mylog(log_warn,"recv return %d,errno=%s\n",len,strerror(errno));
  283. continue;
  284. }
  285. if(de_cook(data,len)<0)
  286. {
  287. mylog(log_warn,"de_cook(data,len)failed \n");
  288. continue;
  289. }
  290. char header=0;
  291. if(get_header(header,data,len)!=0)
  292. {
  293. mylog(log_warn,"get_header failed\n");
  294. continue;
  295. }
  296. if(header==header_keep_alive)
  297. {
  298. mylog(log_trace,"got keep_alive packet\n");
  299. continue;
  300. }
  301. if(header==header_reject)
  302. {
  303. if(keep_reconnect==0)
  304. {
  305. mylog(log_fatal,"server restarted or switched to handle another client,exited\n");
  306. myexit(-1);
  307. }
  308. else
  309. {
  310. if(got_feed_back==1)
  311. mylog(log_warn,"server restarted or switched to handle another client,but keep-reconnect enable,trying to reconnect\n");
  312. got_feed_back=0;
  313. }
  314. continue;
  315. }
  316. else if(header==header_normal)
  317. {
  318. if(got_feed_back==0)
  319. mylog(log_info,"connection accepted by server\n");
  320. got_feed_back=1;
  321. }
  322. else
  323. {
  324. mylog(log_warn,"invalid header %d %d\n",int(header),len);
  325. continue;
  326. }
  327. mylog(log_trace,"Received packet from udp,len: %d\n",len);
  328. from_fec_to_normal2(conn_info,tun_dest,data,len);
  329. }
  330. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  331. {
  332. uint64_t value;
  333. read(delay_manager.get_timer_fd(), &value, 8);
  334. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  335. }
  336. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  337. {
  338. char buf[buf_len];
  339. int len=read (fifo_fd, buf, sizeof (buf));
  340. if(len<0)
  341. {
  342. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  343. continue;
  344. }
  345. buf[len]=0;
  346. handle_command(buf);
  347. }
  348. else
  349. {
  350. assert(0==1);
  351. }
  352. }
  353. delay_manager.check();
  354. }
  355. return 0;
  356. }
  357. int tun_dev_server_event_loop()
  358. {
  359. char data[buf_len];
  360. int len;
  361. int i,j,k,ret;
  362. int epoll_fd,tun_fd;
  363. int local_listen_fd;
  364. tun_fd=get_tun_fd(tun_dev);
  365. assert(tun_fd>0);
  366. assert(new_listen_socket(local_listen_fd,local_ip_uint32,local_port)==0);
  367. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|1),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|2),1500)==0);
  368. epoll_fd = epoll_create1(0);
  369. assert(epoll_fd>0);
  370. const int max_events = 4096;
  371. struct epoll_event ev, events[max_events];
  372. if (epoll_fd < 0) {
  373. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  374. myexit(-1);
  375. }
  376. ev.events = EPOLLIN;
  377. ev.data.u64 = local_listen_fd;
  378. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  379. if (ret!=0) {
  380. mylog(log_fatal,"add udp_listen_fd error\n");
  381. myexit(-1);
  382. }
  383. ev.events = EPOLLIN;
  384. ev.data.u64 = tun_fd;
  385. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  386. if (ret!=0) {
  387. mylog(log_fatal,"add tun_fd error\n");
  388. myexit(-1);
  389. }
  390. ev.events = EPOLLIN;
  391. ev.data.u64 = delay_manager.get_timer_fd();
  392. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  393. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  394. if (ret!= 0) {
  395. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  396. myexit(-1);
  397. }
  398. conn_info_t *conn_info_p=new conn_info_t;
  399. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  400. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  401. ev.events = EPOLLIN;
  402. ev.data.u64 = tmp_timer_fd64;
  403. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  404. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  405. if (ret!= 0) {
  406. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  407. myexit(-1);
  408. }
  409. conn_info.timer.add_fd_to_epoll(epoll_fd);
  410. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  411. int fifo_fd=-1;
  412. if(fifo_file[0]!=0)
  413. {
  414. fifo_fd=create_fifo(fifo_file);
  415. ev.events = EPOLLIN;
  416. ev.data.u64 = fifo_fd;
  417. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  418. if (ret!= 0) {
  419. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  420. myexit(-1);
  421. }
  422. mylog(log_info,"fifo_file=%s\n",fifo_file);
  423. }
  424. dest_t udp_dest;
  425. udp_dest.cook=1;
  426. udp_dest.type=type_fd_ip_port;
  427. udp_dest.inner.fd_ip_port.fd=local_listen_fd;
  428. udp_dest.inner.fd_ip_port.ip_port.ip=0;
  429. udp_dest.inner.fd_ip_port.ip_port.port=0;
  430. dest_t tun_dest;
  431. tun_dest.type=type_write_fd;
  432. tun_dest.inner.fd=tun_fd;
  433. while(1)////////////////////////
  434. {
  435. if(about_to_exit) myexit(0);
  436. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  437. if (nfds < 0) { //allow zero
  438. if(errno==EINTR )
  439. {
  440. mylog(log_info,"epoll interrupted by signal\n");
  441. myexit(0);
  442. }
  443. else
  444. {
  445. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  446. myexit(-1);
  447. }
  448. }
  449. int idx;
  450. for (idx = 0; idx < nfds; ++idx)
  451. {
  452. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  453. {
  454. uint64_t value;
  455. read(conn_info.timer.get_timer_fd(), &value, 8);
  456. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  457. {
  458. continue;
  459. }
  460. conn_info.stat.report_as_server(udp_dest.inner.fd_ip_port.ip_port);
  461. do_keep_alive(udp_dest);
  462. }
  463. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  464. {
  465. assert(udp_dest.inner.fd64_ip_port.ip_port.to_u64()!=0);
  466. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  467. uint64_t fd64=events[idx].data.u64;
  468. //mylog(log_info,"timer!!!\n");
  469. uint64_t value;
  470. if(!fd_manager.exist(fd64)) //fd64 has been closed
  471. {
  472. mylog(log_trace,"!fd_manager.exist(fd64)");
  473. continue;
  474. }
  475. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  476. {
  477. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  478. continue;
  479. }
  480. if(value==0)
  481. {
  482. mylog(log_debug,"value==0\n");
  483. continue;
  484. }
  485. assert(value==1);
  486. from_normal_to_fec2(conn_info,udp_dest,0,0,header_normal);
  487. }
  488. else if(events[idx].data.u64==(u64_t)local_listen_fd)
  489. {
  490. struct sockaddr_in udp_new_addr_in={0};
  491. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  492. if ((len = recvfrom(local_listen_fd, data, max_data_len, 0,
  493. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) < 0) {
  494. mylog(log_error,"recv_from error,this shouldnt happen,err=%s,but we can try to continue\n",strerror(errno));
  495. continue;
  496. //myexit(1);
  497. };
  498. if(de_cook(data,len)<0)
  499. {
  500. mylog(log_warn,"de_cook(data,len)failed \n");
  501. continue;
  502. }
  503. char header=0;
  504. if(get_header(header,data,len)!=0)
  505. {
  506. mylog(log_warn,"get_header failed\n");
  507. continue;
  508. }
  509. if((udp_dest.inner.fd_ip_port.ip_port.ip==udp_new_addr_in.sin_addr.s_addr) && (udp_dest.inner.fd_ip_port.ip_port.port==ntohs(udp_new_addr_in.sin_port)))
  510. {
  511. if(header==header_keep_alive)
  512. {
  513. mylog(log_trace,"got keep_alive packet\n");
  514. continue;
  515. }
  516. if(header!=header_new_connect&& header!=header_normal)
  517. {
  518. mylog(log_warn,"invalid header\n");
  519. continue;
  520. }
  521. }
  522. else
  523. {
  524. if(header==header_keep_alive)
  525. {
  526. mylog(log_debug,"got keep_alive packet from unexpected client\n");
  527. continue;
  528. }
  529. if(header==header_new_connect)
  530. {
  531. mylog(log_info,"new connection from %s:%d \n", inet_ntoa(udp_new_addr_in.sin_addr),
  532. ntohs(udp_new_addr_in.sin_port));
  533. udp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  534. udp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  535. conn_info.fec_decode_manager.clear();
  536. conn_info.fec_encode_manager.clear();
  537. memset(&conn_info.stat,0,sizeof(conn_info.stat));
  538. }
  539. else if(header==header_normal)
  540. {
  541. mylog(log_debug,"rejected connection from %s:%d\n", inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port));
  542. len=1;
  543. data[0]=header_reject;
  544. do_cook(data,len);
  545. dest_t tmp_dest;
  546. tmp_dest.type=type_fd_ip_port;
  547. tmp_dest.inner.fd_ip_port.fd=local_listen_fd;
  548. tmp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  549. tmp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  550. delay_manager.add(0,tmp_dest,data,len);;
  551. continue;
  552. }
  553. else
  554. {
  555. mylog(log_warn,"invalid header\n");
  556. }
  557. }
  558. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  559. ntohs(udp_new_addr_in.sin_port),len);
  560. from_fec_to_normal2(conn_info,tun_dest,data,len);
  561. }
  562. else if(events[idx].data.u64==(u64_t)tun_fd)
  563. {
  564. len=read(tun_fd,data,max_data_len);
  565. if(len<0)
  566. {
  567. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  568. continue;
  569. }
  570. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  571. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  572. {
  573. mylog(log_debug,"received packet from tun,but there is no client yet,dropped packet\n");
  574. continue;
  575. }
  576. from_normal_to_fec2(conn_info,udp_dest,data,len,header_normal);
  577. }
  578. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  579. {
  580. uint64_t value;
  581. read(delay_manager.get_timer_fd(), &value, 8);
  582. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  583. }
  584. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  585. {
  586. char buf[buf_len];
  587. int len=read (fifo_fd, buf, sizeof (buf));
  588. if(len<0)
  589. {
  590. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  591. continue;
  592. }
  593. buf[len]=0;
  594. handle_command(buf);
  595. }
  596. else
  597. {
  598. assert(0==1);
  599. }
  600. }
  601. delay_manager.check();
  602. }
  603. return 0;
  604. }