Restore choke lines into the netgraph, and support discontinuities so it doesn't look so weird. Also tweak realip warnings. Don't honour dupes if it would exceed rate limits (new data is better than dupe data), which can also double-up as a CBR type thing to try to reserve the bandwidth (avoiding packetloss bursts at the worst times).

git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5525 fc73d0e0-1445-4013-8a0c-d673dee63da5
This commit is contained in:
Spoike 2019-08-24 16:09:08 +00:00
parent 2377c3fa54
commit 9202c3f015
5 changed files with 124 additions and 45 deletions

View file

@ -2686,25 +2686,31 @@ void CL_Packet_f (void)
}
if (Cmd_FromGamecode()) //some mvd servers stuffcmd a packet command which lets them know which ip the client is from.
{ //unfortunatly, 50% of servers are badly configured.
if (Cmd_FromGamecode()) //some mvdsv servers stuffcmd a packet command which lets them know which ip the client is from.
{ //unfortunatly, 50% of servers are badly configured resulting in them poking local services that THEY MUST NOT HAVE ACCESS TO.
char *addrdesc;
char *realdesc;
if (cls.demoplayback)
{
Con_DPrintf ("Not sending realip packet from demo\n");
return;
}
if (adr.type == NA_IP)
if ((adr.address.ip[0] == 127 && adr.address.ip[1] == 0 && adr.address.ip[2] == 0 && adr.address.ip[3] == 1) ||
(adr.address.ip[0] == 0 && adr.address.ip[1] == 0 && adr.address.ip[2] == 0 && adr.address.ip[3] == 0))
if (!NET_CompareAdr(&adr, &cls.netchan.remote_address))
{
if (NET_ClassifyAddress(&adr, &addrdesc) < ASCOPE_LAN)
{
adr.address.ip[0] = cls.netchan.remote_address.address.ip[0];
adr.address.ip[1] = cls.netchan.remote_address.address.ip[1];
adr.address.ip[2] = cls.netchan.remote_address.address.ip[2];
adr.address.ip[3] = cls.netchan.remote_address.address.ip[3];
adr.port = cls.netchan.remote_address.port;
Con_Printf (CON_WARNING "Server is broken. Trying to send to server instead.\n");
if (NET_ClassifyAddress(&cls.netchan.remote_address, &realdesc) < ASCOPE_LAN)
{ //this isn't necessarily buggy... but its still a potential exploit so we need to block it regardless.
Con_Printf (CON_WARNING "Ignoring buggy %s realip request for %s server.\n", addrdesc, realdesc);
}
else
{
adr = cls.netchan.remote_address;
Con_Printf (CON_WARNING "Ignoring buggy %s realip request, sending to %s server instead.\n", addrdesc, realdesc);
}
}
}
cls.realserverip = adr;
Con_DPrintf ("Sending realip packet\n");

View file

@ -387,6 +387,16 @@ qboolean Netchan_CanPacket (netchan_t *chan, int rate)
return false;
}
int Netchan_CanBytes (netchan_t *chan, int rate)
{
const double slop = 0.25;
if (chan->remote_address.type == NA_LOOPBACK)
return 0x7fffffff; //don't ever drop packets due to possible routing problems when there is no routing.
if (!rate)
return 0x7fffffff;
return ((realtime+slop)-chan->cleartime)*rate;
}
void Netchan_Block (netchan_t *chan, int bytes, int rate)
{
if (rate)
@ -583,6 +593,9 @@ int Netchan_Transmit (netchan_t *chan, int length, qbyte *data, int rate)
int i;
neterr_t e;
int dupes = chan->dupe;
int availbytes = Netchan_CanBytes(chan, rate);
#ifdef NQPROT
if (chan->isnqprotocol)
{
@ -789,10 +802,11 @@ int Netchan_Transmit (netchan_t *chan, int length, qbyte *data, int rate)
#endif
{
int hsz = 10 + ((chan->sock == NS_CLIENT)?chan->qportsize:0); /*header size, if fragmentation is in use*/
dupes = min(chan->dupe, availbytes / send.cursize);
if ((!chan->pext_fragmentation))// || send.cursize < ((chan->mtu - hsz)&~7))
{ //vanilla sends
for (i = -1; i < chan->dupe && e == NETERR_SENT; i++)
for (i = -1; i < dupes && e == NETERR_SENT; i++)
e = NET_SendPacket (chan->sock, send.cursize, send.data, &chan->remote_address);
send.cursize += send.cursize * i;
@ -809,6 +823,8 @@ int Netchan_Transmit (netchan_t *chan, int length, qbyte *data, int rate)
{ //fte's fragmentaton protocol
int offset = 0, no;
qboolean more;
int outbytes = 0;
int fragbytes;
/*FIXME: splurge over a number of frames, if we have an outgoing reliable*/
@ -842,9 +858,11 @@ int Netchan_Transmit (netchan_t *chan, int length, qbyte *data, int rate)
if (e == NETERR_SENT)
{
for (i = -1; i < chan->dupe && e == NETERR_SENT; i++)
for (i = -1; i < dupes && e == NETERR_SENT; i++)
{
e = NET_SendPacket (chan->sock, (no - offset) + hsz, send.data + offset, &chan->remote_address);
fragbytes = (no - offset) + hsz;
e = NET_SendPacket (chan->sock, fragbytes, send.data + offset, &chan->remote_address);
outbytes += fragbytes;
if (e == NETERR_MTU && !offset && chan->mtu > 560)
{
chan->mtu -= 16;
@ -857,6 +875,7 @@ int Netchan_Transmit (netchan_t *chan, int length, qbyte *data, int rate)
}
offset = no;
} while(more);
send.cursize = outbytes;
}
}
@ -939,8 +958,8 @@ qboolean Netchan_Process (netchan_t *chan)
reliable_message = sequence >> 31;
reliable_ack = sequence_ack >> 31;
sequence &= ~(1<<31);
sequence_ack &= ~(1<<31);
sequence &= ~(1u<<31);
sequence_ack &= ~(1u<<31);
if (showpackets.value)
Con_Printf ("%f %s <-- s=%i(%i) a=%i(%i) %i%s\n"

View file

@ -159,7 +159,7 @@ static void QDECL NET_Enable_DTLS_Changed(struct cvar_s *var, char *oldvalue)
}
}
}
cvar_t net_enable_dtls = CVARAFCD("net_enable_dtls", "", "sv_listen_dtls", 0, NET_Enable_DTLS_Changed, "Controls serverside dtls support.\n0: dtls blocked, not advertised.\n1: available in desired.\n2: used where possible (recommended setting).\n3: disallow non-dtls clients (sv_port_tcp should be eg tls://[::]:27500 to also disallow unencrypted tcp connections).");
cvar_t net_enable_dtls = CVARAFCD("net_enable_dtls", "", "sv_listen_dtls", 0, NET_Enable_DTLS_Changed, "Controls serverside dtls support.\n0: dtls blocked, not advertised.\n1: clientside choice.\n2: used where possible (recommended setting).\n3: disallow non-dtls clients (sv_port_tcp should be eg tls://[::]:27500 to also disallow unencrypted tcp connections).");
#endif
#ifdef HAVE_CLIENT
@ -372,6 +372,8 @@ qboolean NET_CompareAdr (netadr_t *a, netadr_t *b)
if (a->type != b->type)
{
int i;
if (a->port != b->port)
return false;
if (a->type == NA_IP && b->type == NA_IPV6)
{
for (i = 0; i < 10; i++)
@ -7193,6 +7195,28 @@ int NET_EnumerateAddresses(ftenet_connections_t *collection, struct ftenet_gener
return found;
}
static enum addressscope_e NET_ClassifyAddressipv4(int ip, char **outdesc)
{
int scope = ASCOPE_NET;
char *desc = NULL;
if ((ip&BigLong(0xffff0000)) == BigLong(0xA9FE0000)) //169.254.x.x/16
scope = ASCOPE_LINK, desc = "link-local";
else if ((ip&BigLong(0xff000000)) == BigLong(0x0a000000)) //10.x.x.x/8
scope = ASCOPE_LAN, desc = "private";
else if ((ip&BigLong(0xff000000)) == BigLong(0x7f000000)) //127.x.x.x/8
scope = ASCOPE_HOST, desc = "localhost";
else if ((ip&BigLong(0xfff00000)) == BigLong(0xac100000)) //172.16.x.x/12
scope = ASCOPE_LAN, desc = "private";
else if ((ip&BigLong(0xffff0000)) == BigLong(0xc0a80000)) //192.168.x.x/16
scope = ASCOPE_LAN, desc = "private";
else if ((ip&BigLong(0xffc00000)) == BigLong(0x64400000)) //100.64.x.x/10
scope = ASCOPE_LAN, desc = "CGNAT";
else if (ip == BigLong(0x00000000)) //0.0.0.0/32
scope = ASCOPE_LAN, desc = "any";
*outdesc = desc;
return scope;
}
enum addressscope_e NET_ClassifyAddress(netadr_t *adr, char **outdesc)
{
int scope = ASCOPE_NET;
@ -7217,24 +7241,15 @@ enum addressscope_e NET_ClassifyAddress(netadr_t *adr, char **outdesc)
scope = ASCOPE_HOST, desc = "localhost";
else if (memcmp(adr->address.ip6, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 16) == 0) //::
scope = ASCOPE_NET, desc = "any";
else if (memcmp(adr->address.ip6, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12) == 0) //::ffff:x.y.z.w
{
scope = NET_ClassifyAddressipv4(*(int*)(adr->address.ip6+12), &desc);
if (!desc)
desc = "vp-mapped";
}
}
else if (adr->type == NA_IP)
{
if ((*(int*)adr->address.ip&BigLong(0xffff0000)) == BigLong(0xA9FE0000)) //169.254.x.x/16
scope = ASCOPE_LINK, desc = "link-local";
else if ((*(int*)adr->address.ip&BigLong(0xff000000)) == BigLong(0x0a000000)) //10.x.x.x/8
scope = ASCOPE_LAN, desc = "private";
else if ((*(int*)adr->address.ip&BigLong(0xff000000)) == BigLong(0x7f000000)) //127.x.x.x/8
scope = ASCOPE_HOST, desc = "localhost";
else if ((*(int*)adr->address.ip&BigLong(0xfff00000)) == BigLong(0xac100000)) //172.16.x.x/12
scope = ASCOPE_LAN, desc = "private";
else if ((*(int*)adr->address.ip&BigLong(0xffff0000)) == BigLong(0xc0a80000)) //192.168.x.x/16
scope = ASCOPE_LAN, desc = "private";
else if ((*(int*)adr->address.ip&BigLong(0xffc00000)) == BigLong(0x64400000)) //100.64.x.x/10
scope = ASCOPE_LAN, desc = "CGNAT";
else if (*(int*)adr->address.ip == BigLong(0x00000000)) //0.0.0.0/32
scope = ASCOPE_LAN, desc = "any";
}
scope = NET_ClassifyAddressipv4(*(int*)adr->address.ip, &desc);
if (outdesc)
*outdesc = desc;
return scope;

View file

@ -91,6 +91,7 @@ void R_NetGraph (void)
int a, x, i;
float y;
float pi, po, bi, bo;
int errorbar;
vec2_t p[4];
vec2_t tc[4];
@ -120,10 +121,10 @@ void R_NetGraph (void)
for (a=0 ; a<NET_TIMINGS ; a++)
{
i = (cl.movesequence-a) & NET_TIMINGSMASK;
if (packet_latency[i] != 10000)
// if (packet_latency[i] != 10000)
last = packet_latency[i];
else if (last >= 0)
last = -last;
// else if (last >= 0)
// last = -last;
R_LineGraph (NET_TIMINGS-1-a, last);
}
}
@ -188,6 +189,7 @@ void R_NetGraph (void)
Vector2Set(p[3], 0,0);
Vector4Set(rgba[2], 0,0,0,0);
Vector4Set(rgba[3], 0,0,0,0);
errorbar = 1; //first is discontinuous
for (a=0 ; a<NET_TIMINGS ; a++)
{
Vector2Copy(p[3], p[0]); Vector4Copy(rgba[3], rgba[0]);
@ -196,13 +198,22 @@ void R_NetGraph (void)
Vector2Set(p[2+0], x+a, y+(1-ngraph[a].height)*NET_GRAPHHEIGHT);
Vector2Set(p[2+1], x+a, y+NET_GRAPHHEIGHT);
Vector2Set(tc[2+0], x/(float)NET_TIMINGS, (1-ngraph[a].height));
Vector2Set(tc[2+1], x/(float)NET_TIMINGS, 1);
Vector2Set(tc[2+0], a/(float)NET_TIMINGS, (1-ngraph[a].height));
Vector2Set(tc[2+1], a/(float)NET_TIMINGS, 1);
Vector4Set(rgba[2+0], ((ngraph[a].col>>0)&0xff)/255.0, ((ngraph[a].col>>8)&0xff)/255.0, ((ngraph[a].col>>16)&0xff)/255.0, ((ngraph[a].col>>24)&0xff)/255.0);
Vector4Copy(rgba[2+0], rgba[2+1]);
if (a)
R2D_Image2dQuad((const vec2_t*)p, (const vec2_t*)tc, (const vec4_t*)rgba, shader_draw_fill);
if (ngraph[a].height==1)
errorbar = 2; //this one and the following should be discontiguous
if (errorbar --> 0)
{ //if this is a full-height bar, break the smooth curve and just make it discontinuous
p[0][1] = p[3][1];
p[1][1] = p[2][1];
Vector4Copy(rgba[3], rgba[0]);
Vector4Copy(rgba[2], rgba[1]);
}
R2D_Image2dQuad((const vec2_t*)p, (const vec2_t*)tc, (const vec4_t*)rgba, shader_draw_fill);
}
#endif
}

View file

@ -279,6 +279,30 @@ static qboolean JSON_Equals(json_t *t, const char *child, const char *expected)
return false;
}
#include <inttypes.h>
static quintptr_t JSON_GetUInteger(json_t *t, const char *child, unsigned int fallback)
{
if (child)
t = JSON_FindChild(t, child);
if (t)
{ //copy it to another buffer. can probably skip that tbh.
char tmp[MAX_QPATH];
char *trail;
size_t l = t->bodyend-t->bodystart;
quintptr_t r;
if (l > MAX_QPATH-1)
l = MAX_QPATH-1;
memcpy(tmp, t->bodystart, l);
tmp[l] = 0;
if (!strcmp(tmp, "false")) //special cases, for booleans
return 0u;
if (!strcmp(tmp, "true")) //special cases, for booleans
return 1u;
r = (quintptr_t)strtoull(tmp, &trail, 0);
if (!*trail)
return r;
}
return fallback;
}
static qintptr_t JSON_GetInteger(json_t *t, const char *child, int fallback)
{
if (child)
@ -286,7 +310,9 @@ static qintptr_t JSON_GetInteger(json_t *t, const char *child, int fallback)
if (t)
{ //copy it to another buffer. can probably skip that tbh.
char tmp[MAX_QPATH];
char *trail;
size_t l = t->bodyend-t->bodystart;
qintptr_t r;
if (l > MAX_QPATH-1)
l = MAX_QPATH-1;
memcpy(tmp, t->bodystart, l);
@ -295,7 +321,9 @@ static qintptr_t JSON_GetInteger(json_t *t, const char *child, int fallback)
return 0;
if (!strcmp(tmp, "true")) //special cases, for booleans
return 1;
return (qintptr_t)strtoll(tmp, NULL, 0);
r = (qintptr_t)strtoll(tmp, &trail, 0);
if (!*trail)
return r;
}
return fallback;
}
@ -588,7 +616,7 @@ static struct gltf_buffer *GLTF_GetBufferData(gltf_t *gltf, int bufferidx)
{
json_t *b = JSON_FindIndexedChild(gltf->r, "buffers", bufferidx);
json_t *uri = JSON_FindChild(b, "uri");
size_t length = JSON_GetInteger(b, "byteLength", 0);
size_t length = JSON_GetUInteger(b, "byteLength", 0);
struct gltf_buffer *out;
// JSON_WarnIfChild(b, "name");
@ -649,9 +677,9 @@ static qboolean GLTF_GetBufferViewData(gltf_t *gltf, int bufferview, struct gltf
buf = GLTF_GetBufferData(gltf, JSON_GetInteger(bv, "buffer", 0));
if (!buf)
return false;
offset = JSON_GetInteger(bv, "byteOffset", 0);
offset = JSON_GetUInteger(bv, "byteOffset", 0);
view->data = (char*)buf->data + offset;
view->length = JSON_GetInteger(bv, "byteLength", 0); //required
view->length = JSON_GetUInteger(bv, "byteLength", 0); //required
view->bytestride = JSON_GetInteger(bv, "byteStride", 0);
if (offset + view->length > buf->length)
return false;
@ -691,7 +719,7 @@ static qboolean GLTF_GetAccessor(gltf_t *gltf, int accessorid, struct gltf_acces
if (!GLTF_GetBufferViewData(gltf, JSON_GetInteger(a, "bufferView", 0), &bv))
return false;
offset = JSON_GetInteger(a, "byteOffset", 0);
offset = JSON_GetUInteger(a, "byteOffset", 0);
if (offset > bv.length)
return false;
out->length = bv.length - offset;