tun_dev.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697
  1. /*
  2. * tun.cpp
  3. *
  4. * Created on: Oct 26, 2017
  5. * Author: root
  6. */
  7. #include "common.h"
  8. #include "log.h"
  9. #include "misc.h"
  10. int get_tun_fd(char * dev_name)
  11. {
  12. int tun_fd=open("/dev/net/tun",O_RDWR);
  13. if(tun_fd <0)
  14. {
  15. mylog(log_fatal,"open /dev/net/tun failed");
  16. myexit(-1);
  17. }
  18. struct ifreq ifr;
  19. memset(&ifr, 0, sizeof(ifr));
  20. ifr.ifr_flags = IFF_TUN|IFF_NO_PI;
  21. strncpy(ifr.ifr_name, dev_name, IFNAMSIZ);
  22. if(ioctl(tun_fd, TUNSETIFF, (void *)&ifr) != 0)
  23. {
  24. mylog(log_fatal,"open /dev/net/tun failed");
  25. myexit(-1);
  26. }
  27. return tun_fd;
  28. }
  29. int set_if(char *if_name,u32_t local_ip,u32_t remote_ip,int mtu)
  30. {
  31. //printf("i m here1\n");
  32. struct ifreq ifr;
  33. struct sockaddr_in sai;
  34. memset(&ifr,0,sizeof(ifr));
  35. memset(&sai, 0, sizeof(struct sockaddr));
  36. int sockfd = socket(AF_INET, SOCK_DGRAM, 0);
  37. strncpy(ifr.ifr_name, if_name, IFNAMSIZ);
  38. sai.sin_family = AF_INET;
  39. sai.sin_port = 0;
  40. sai.sin_addr.s_addr = local_ip;
  41. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  42. assert(ioctl(sockfd, SIOCSIFADDR, &ifr)==0); //set source ip
  43. sai.sin_addr.s_addr = remote_ip;
  44. memcpy(&ifr.ifr_addr,&sai, sizeof(struct sockaddr));
  45. assert(ioctl(sockfd, SIOCSIFDSTADDR, &ifr)==0);//set dest ip
  46. ifr.ifr_mtu=mtu;
  47. assert(ioctl(sockfd, SIOCSIFMTU, &ifr)==0);//set mtu
  48. assert(ioctl(sockfd, SIOCGIFFLAGS, &ifr)==0);
  49. // ifr.ifr_flags |= ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );
  50. ifr.ifr_flags = ( IFF_UP|IFF_POINTOPOINT|IFF_RUNNING|IFF_NOARP|IFF_MULTICAST );//set interface flags
  51. assert(ioctl(sockfd, SIOCSIFFLAGS, &ifr)==0);
  52. //printf("i m here2\n");
  53. return 0;
  54. }
  55. const char header_normal=1;
  56. const char header_new_connect=2;
  57. const char header_reject=3;
  58. int put_header(char header,char * data,int &len)
  59. {
  60. assert(len>=0);
  61. data[len]=header;
  62. len+=1;
  63. return 0;
  64. }
  65. int get_header(char &header,char * data,int &len)
  66. {
  67. assert(len>=0);
  68. if(len<1) return -1;
  69. len-=1;
  70. header=data[len];
  71. return 0;
  72. }
  73. int from_normal_to_fec2(conn_info_t & conn_info,dest_t &dest,char * data,int len,char header)
  74. {
  75. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  76. from_normal_to_fec(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  77. for(int i=0;i<out_n;i++)
  78. {
  79. char tmp_buf[buf_len];
  80. int tmp_len=out_len[i];
  81. memcpy(tmp_buf,out_arr[i],out_len[i]);
  82. put_header(header,tmp_buf,tmp_len);
  83. delay_send(out_delay[i],dest,tmp_buf,tmp_len);//this is slow but safer.just use this one
  84. //put_header(header,out_arr[i],out_len[i]);//modify in place
  85. //delay_send(out_delay[i],dest,out_arr[i],out_len[i]);//warning this is currently okay,but if you modified fec encoder,you may have to use the above code
  86. }
  87. return 0;
  88. }
  89. int from_fec_to_normal2(conn_info_t & conn_info,dest_t &dest,char * data,int len)
  90. {
  91. int out_n;char **out_arr;int *out_len;my_time_t *out_delay;
  92. from_fec_to_normal(conn_info,data,len,out_n,out_arr,out_len,out_delay);
  93. for(int i=0;i<out_n;i++)
  94. {
  95. delay_send(out_delay[i],dest,out_arr[i],out_len[i]);
  96. #ifndef NORES
  97. if(client_or_server==server_mode)
  98. {
  99. char * tmp_data=out_arr[i];
  100. int tmp_len=out_len[i];
  101. if(tmp_len>=20)
  102. {
  103. u32_t dest_ip=htonl(read_u32(tmp_data+16));
  104. //printf("%s\n",my_ntoa(dest_ip));
  105. if( ( ntohl(sub_net_uint32)&0xFFFFFF00 ) != ( ntohl (dest_ip) &0xFFFFFF00) )
  106. {
  107. string sub=my_ntoa(dest_ip);
  108. string dst=my_ntoa( htonl( ntohl (sub_net_uint32) &0xFFFFFF00) );
  109. mylog(log_warn,"[restriction]packet's dest ip [%s] not in subnet [%s],dropped\n", sub.c_str(), dst.c_str());
  110. continue;
  111. }
  112. }
  113. }
  114. #endif
  115. }
  116. return 0;
  117. }
  118. int tun_dev_client_event_loop()
  119. {
  120. char data[buf_len];
  121. int len;
  122. int i,j,k,ret;
  123. int epoll_fd,tun_fd;
  124. int remote_fd;
  125. fd64_t remote_fd64;
  126. tun_fd=get_tun_fd(tun_dev);
  127. assert(tun_fd>0);
  128. assert(new_connected_socket(remote_fd,remote_ip_uint32,remote_port)==0);
  129. remote_fd64=fd_manager.create(remote_fd);
  130. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|2),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|1),g_fec_mtu)==0);
  131. epoll_fd = epoll_create1(0);
  132. assert(epoll_fd>0);
  133. const int max_events = 4096;
  134. struct epoll_event ev, events[max_events];
  135. if (epoll_fd < 0) {
  136. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  137. myexit(-1);
  138. }
  139. ev.events = EPOLLIN;
  140. ev.data.u64 = remote_fd64;
  141. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, remote_fd, &ev);
  142. if (ret!=0) {
  143. mylog(log_fatal,"add remote_fd64 error\n");
  144. myexit(-1);
  145. }
  146. ev.events = EPOLLIN;
  147. ev.data.u64 = tun_fd;
  148. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  149. if (ret!=0) {
  150. mylog(log_fatal,"add tun_fd error\n");
  151. myexit(-1);
  152. }
  153. ev.events = EPOLLIN;
  154. ev.data.u64 = delay_manager.get_timer_fd();
  155. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  156. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  157. if (ret!= 0) {
  158. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  159. myexit(-1);
  160. }
  161. conn_info_t *conn_info_p=new conn_info_t;
  162. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  163. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  164. ev.events = EPOLLIN;
  165. ev.data.u64 = tmp_timer_fd64;
  166. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  167. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  168. if (ret!= 0) {
  169. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  170. myexit(-1);
  171. }
  172. conn_info.timer.add_fd_to_epoll(epoll_fd);
  173. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  174. int fifo_fd=-1;
  175. if(fifo_file[0]!=0)
  176. {
  177. fifo_fd=create_fifo(fifo_file);
  178. ev.events = EPOLLIN;
  179. ev.data.u64 = fifo_fd;
  180. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  181. if (ret!= 0) {
  182. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  183. myexit(-1);
  184. }
  185. mylog(log_info,"fifo_file=%s\n",fifo_file);
  186. }
  187. dest_t udp_dest;
  188. udp_dest.cook=1;
  189. udp_dest.type=type_fd64;
  190. udp_dest.inner.fd64=remote_fd64;
  191. dest_t tun_dest;
  192. tun_dest.type=type_write_fd;
  193. tun_dest.inner.fd=tun_fd;
  194. int got_feed_back=0;
  195. while(1)////////////////////////
  196. {
  197. if(about_to_exit) myexit(0);
  198. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  199. if (nfds < 0) { //allow zero
  200. if(errno==EINTR )
  201. {
  202. mylog(log_info,"epoll interrupted by signal\n");
  203. myexit(0);
  204. }
  205. else
  206. {
  207. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  208. myexit(-1);
  209. }
  210. }
  211. int idx;
  212. for (idx = 0; idx < nfds; ++idx)
  213. {
  214. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  215. {
  216. uint64_t value;
  217. read(conn_info.timer.get_timer_fd(), &value, 8);
  218. mylog(log_trace,"events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd()\n");
  219. conn_info.stat.report_as_client();
  220. }
  221. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  222. {
  223. fd64_t fd64=events[idx].data.u64;
  224. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  225. uint64_t value;
  226. if(!fd_manager.exist(fd64)) //fd64 has been closed
  227. {
  228. mylog(log_trace,"!fd_manager.exist(fd64)");
  229. continue;
  230. }
  231. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  232. {
  233. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  234. continue;
  235. }
  236. if(value==0)
  237. {
  238. mylog(log_debug,"value==0\n");
  239. continue;
  240. }
  241. assert(value==1);
  242. char header=(got_feed_back==0?header_new_connect:header_normal);
  243. from_normal_to_fec2(conn_info,udp_dest,0,0,header);
  244. }
  245. else if(events[idx].data.u64==(u64_t)tun_fd)
  246. {
  247. len=read(tun_fd,data,max_data_len);
  248. if(len<0)
  249. {
  250. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  251. continue;
  252. }
  253. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  254. char header=(got_feed_back==0?header_new_connect:header_normal);
  255. from_normal_to_fec2(conn_info,udp_dest,data,len,header);
  256. }
  257. else if(events[idx].data.u64==(u64_t)remote_fd64)
  258. {
  259. fd64_t fd64=events[idx].data.u64;
  260. int fd=fd_manager.to_fd(fd64);
  261. len=recv(fd,data,max_data_len,0);
  262. if(len<0)
  263. {
  264. mylog(log_warn,"recv return %d,errno=%s\n",len,strerror(errno));
  265. continue;
  266. }
  267. if(de_cook(data,len)<0)
  268. {
  269. mylog(log_warn,"de_cook(data,len)failed \n");
  270. continue;
  271. }
  272. char header=0;
  273. if(get_header(header,data,len)!=0)
  274. {
  275. mylog(log_warn,"get_header failed\n");
  276. continue;
  277. }
  278. if(header==header_reject)
  279. {
  280. if(keep_reconnect==0)
  281. {
  282. mylog(log_fatal,"server restarted or switched to handle another client,exited\n");
  283. myexit(-1);
  284. }
  285. else
  286. {
  287. if(got_feed_back==1)
  288. mylog(log_warn,"server restarted or switched to handle another client,but keep-reconnect enable,trying to reconnect\n");
  289. got_feed_back=0;
  290. }
  291. continue;
  292. }
  293. else if(header==header_normal)
  294. {
  295. if(got_feed_back==0)
  296. mylog(log_info,"connection accepted by server\n");
  297. got_feed_back=1;
  298. }
  299. else
  300. {
  301. mylog(log_warn,"invalid header %d %d\n",int(header),len);
  302. continue;
  303. }
  304. mylog(log_trace,"Received packet from udp,len: %d\n",len);
  305. from_fec_to_normal2(conn_info,tun_dest,data,len);
  306. }
  307. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  308. {
  309. uint64_t value;
  310. read(delay_manager.get_timer_fd(), &value, 8);
  311. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  312. }
  313. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  314. {
  315. char buf[buf_len];
  316. int len=read (fifo_fd, buf, sizeof (buf));
  317. if(len<0)
  318. {
  319. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  320. continue;
  321. }
  322. buf[len]=0;
  323. handle_command(buf);
  324. }
  325. else
  326. {
  327. assert(0==1);
  328. }
  329. }
  330. delay_manager.check();
  331. }
  332. return 0;
  333. }
  334. int tun_dev_server_event_loop()
  335. {
  336. char data[buf_len];
  337. int len;
  338. int i,j,k,ret;
  339. int epoll_fd,tun_fd;
  340. int local_listen_fd;
  341. tun_fd=get_tun_fd(tun_dev);
  342. assert(tun_fd>0);
  343. assert(new_listen_socket(local_listen_fd,local_ip_uint32,local_port)==0);
  344. assert(set_if(tun_dev,htonl((ntohl(sub_net_uint32)&0xFFFFFF00)|1),htonl((ntohl(sub_net_uint32)&0xFFFFFF00 )|2),g_fec_mtu)==0);
  345. epoll_fd = epoll_create1(0);
  346. assert(epoll_fd>0);
  347. const int max_events = 4096;
  348. struct epoll_event ev, events[max_events];
  349. if (epoll_fd < 0) {
  350. mylog(log_fatal,"epoll return %d\n", epoll_fd);
  351. myexit(-1);
  352. }
  353. ev.events = EPOLLIN;
  354. ev.data.u64 = local_listen_fd;
  355. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, local_listen_fd, &ev);
  356. if (ret!=0) {
  357. mylog(log_fatal,"add udp_listen_fd error\n");
  358. myexit(-1);
  359. }
  360. ev.events = EPOLLIN;
  361. ev.data.u64 = tun_fd;
  362. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, tun_fd, &ev);
  363. if (ret!=0) {
  364. mylog(log_fatal,"add tun_fd error\n");
  365. myexit(-1);
  366. }
  367. ev.events = EPOLLIN;
  368. ev.data.u64 = delay_manager.get_timer_fd();
  369. mylog(log_debug,"delay_manager.get_timer_fd()=%d\n",delay_manager.get_timer_fd());
  370. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, delay_manager.get_timer_fd(), &ev);
  371. if (ret!= 0) {
  372. mylog(log_fatal,"add delay_manager.get_timer_fd() error\n");
  373. myexit(-1);
  374. }
  375. conn_info_t *conn_info_p=new conn_info_t;
  376. conn_info_t &conn_info=*conn_info_p; //huge size of conn_info,do not allocate on stack
  377. u64_t tmp_timer_fd64=conn_info.fec_encode_manager.get_timer_fd64();
  378. ev.events = EPOLLIN;
  379. ev.data.u64 = tmp_timer_fd64;
  380. mylog(log_debug,"conn_info.fec_encode_manager.get_timer_fd64()=%llu\n",conn_info.fec_encode_manager.get_timer_fd64());
  381. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd_manager.to_fd(tmp_timer_fd64), &ev);
  382. if (ret!= 0) {
  383. mylog(log_fatal,"add fec_encode_manager.get_timer_fd64() error\n");
  384. myexit(-1);
  385. }
  386. conn_info.timer.add_fd_to_epoll(epoll_fd);
  387. conn_info.timer.set_timer_repeat_us(timer_interval*1000);
  388. int fifo_fd=-1;
  389. if(fifo_file[0]!=0)
  390. {
  391. fifo_fd=create_fifo(fifo_file);
  392. ev.events = EPOLLIN;
  393. ev.data.u64 = fifo_fd;
  394. ret = epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fifo_fd, &ev);
  395. if (ret!= 0) {
  396. mylog(log_fatal,"add fifo_fd to epoll error %s\n",strerror(errno));
  397. myexit(-1);
  398. }
  399. mylog(log_info,"fifo_file=%s\n",fifo_file);
  400. }
  401. dest_t udp_dest;
  402. udp_dest.cook=1;
  403. udp_dest.type=type_fd_ip_port;
  404. udp_dest.inner.fd_ip_port.fd=local_listen_fd;
  405. udp_dest.inner.fd_ip_port.ip_port.ip=0;
  406. udp_dest.inner.fd_ip_port.ip_port.port=0;
  407. dest_t tun_dest;
  408. tun_dest.type=type_write_fd;
  409. tun_dest.inner.fd=tun_fd;
  410. while(1)////////////////////////
  411. {
  412. if(about_to_exit) myexit(0);
  413. int nfds = epoll_wait(epoll_fd, events, max_events, 180 * 1000);
  414. if (nfds < 0) { //allow zero
  415. if(errno==EINTR )
  416. {
  417. mylog(log_info,"epoll interrupted by signal\n");
  418. myexit(0);
  419. }
  420. else
  421. {
  422. mylog(log_fatal,"epoll_wait return %d\n", nfds);
  423. myexit(-1);
  424. }
  425. }
  426. int idx;
  427. for (idx = 0; idx < nfds; ++idx)
  428. {
  429. if(events[idx].data.u64==(u64_t)conn_info.timer.get_timer_fd())
  430. {
  431. uint64_t value;
  432. read(conn_info.timer.get_timer_fd(), &value, 8);
  433. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  434. {
  435. continue;
  436. }
  437. conn_info.stat.report_as_server(udp_dest.inner.fd_ip_port.ip_port);
  438. }
  439. else if(events[idx].data.u64==conn_info.fec_encode_manager.get_timer_fd64())
  440. {
  441. assert(udp_dest.inner.fd64_ip_port.ip_port.to_u64()!=0);
  442. mylog(log_trace,"events[idx].data.u64 == conn_info.fec_encode_manager.get_timer_fd64()\n");
  443. uint64_t fd64=events[idx].data.u64;
  444. //mylog(log_info,"timer!!!\n");
  445. uint64_t value;
  446. if(!fd_manager.exist(fd64)) //fd64 has been closed
  447. {
  448. mylog(log_trace,"!fd_manager.exist(fd64)");
  449. continue;
  450. }
  451. if((ret=read(fd_manager.to_fd(fd64), &value, 8))!=8)
  452. {
  453. mylog(log_trace,"(ret=read(fd_manager.to_fd(fd64), &value, 8))!=8,ret=%d\n",ret);
  454. continue;
  455. }
  456. if(value==0)
  457. {
  458. mylog(log_debug,"value==0\n");
  459. continue;
  460. }
  461. assert(value==1);
  462. from_normal_to_fec2(conn_info,udp_dest,0,0,header_normal);
  463. }
  464. else if(events[idx].data.u64==(u64_t)local_listen_fd)
  465. {
  466. struct sockaddr_in udp_new_addr_in={0};
  467. socklen_t udp_new_addr_len = sizeof(sockaddr_in);
  468. if ((len = recvfrom(local_listen_fd, data, max_data_len, 0,
  469. (struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) < 0) {
  470. mylog(log_error,"recv_from error,this shouldnt happen,err=%s,but we can try to continue\n",strerror(errno));
  471. continue;
  472. //myexit(1);
  473. };
  474. if(de_cook(data,len)<0)
  475. {
  476. mylog(log_warn,"de_cook(data,len)failed \n");
  477. continue;
  478. }
  479. char header=0;
  480. if(get_header(header,data,len)!=0)
  481. {
  482. mylog(log_warn,"get_header failed\n");
  483. continue;
  484. }
  485. if((udp_dest.inner.fd_ip_port.ip_port.ip==udp_new_addr_in.sin_addr.s_addr) && (udp_dest.inner.fd_ip_port.ip_port.port==ntohs(udp_new_addr_in.sin_port)))
  486. {
  487. if(header!=header_new_connect&& header!=header_normal)
  488. {
  489. mylog(log_warn,"invalid header\n");
  490. continue;
  491. }
  492. }
  493. else
  494. {
  495. if(header==header_new_connect)
  496. {
  497. mylog(log_info,"new connection from %s:%d \n", inet_ntoa(udp_new_addr_in.sin_addr),
  498. ntohs(udp_new_addr_in.sin_port));
  499. udp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  500. udp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  501. conn_info.fec_decode_manager.clear();
  502. conn_info.fec_encode_manager.clear();
  503. memset(&conn_info.stat,0,sizeof(conn_info.stat));
  504. }
  505. else if(header==header_normal)
  506. {
  507. mylog(log_debug,"rejected connection from %s:%d\n", inet_ntoa(udp_new_addr_in.sin_addr),ntohs(udp_new_addr_in.sin_port));
  508. len=1;
  509. data[0]=header_reject;
  510. do_cook(data,len);
  511. dest_t tmp_dest;
  512. tmp_dest.type=type_fd_ip_port;
  513. tmp_dest.inner.fd_ip_port.fd=local_listen_fd;
  514. tmp_dest.inner.fd_ip_port.ip_port.ip=udp_new_addr_in.sin_addr.s_addr;
  515. tmp_dest.inner.fd_ip_port.ip_port.port=ntohs(udp_new_addr_in.sin_port);
  516. delay_manager.add(0,tmp_dest,data,len);;
  517. continue;
  518. }
  519. else
  520. {
  521. mylog(log_warn,"invalid header\n");
  522. }
  523. }
  524. mylog(log_trace,"Received packet from %s:%d,len: %d\n", inet_ntoa(udp_new_addr_in.sin_addr),
  525. ntohs(udp_new_addr_in.sin_port),len);
  526. from_fec_to_normal2(conn_info,tun_dest,data,len);
  527. }
  528. else if(events[idx].data.u64==(u64_t)tun_fd)
  529. {
  530. len=read(tun_fd,data,max_data_len);
  531. if(len<0)
  532. {
  533. mylog(log_warn,"read from tun_fd return %d,errno=%s\n",len,strerror(errno));
  534. continue;
  535. }
  536. mylog(log_trace,"Received packet from tun,len: %d\n",len);
  537. if(udp_dest.inner.fd64_ip_port.ip_port.to_u64()==0)
  538. {
  539. mylog(log_debug,"received packet from tun,but there is no client yet,dropped packet\n");
  540. continue;
  541. }
  542. from_normal_to_fec2(conn_info,udp_dest,data,len,header_normal);
  543. }
  544. else if (events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd())
  545. {
  546. uint64_t value;
  547. read(delay_manager.get_timer_fd(), &value, 8);
  548. mylog(log_trace,"events[idx].data.u64 == (u64_t)delay_manager.get_timer_fd()\n");
  549. }
  550. else if (events[idx].data.u64 == (u64_t)fifo_fd)
  551. {
  552. char buf[buf_len];
  553. int len=read (fifo_fd, buf, sizeof (buf));
  554. if(len<0)
  555. {
  556. mylog(log_warn,"fifo read failed len=%d,errno=%s\n",len,strerror(errno));
  557. continue;
  558. }
  559. buf[len]=0;
  560. handle_command(buf);
  561. }
  562. else
  563. {
  564. assert(0==1);
  565. }
  566. }
  567. delay_manager.check();
  568. }
  569. return 0;
  570. }