blob: c94b9a3dedcbc9a99ad280dc480297a0cc245e0f [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
honghaizcec0a082016-01-15 14:49:09 -080010#include "webrtc/base/physicalsocketserver.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000011
12#if defined(_MSC_VER) && _MSC_VER < 1300
13#pragma warning(disable:4786)
14#endif
15
16#include <assert.h>
17
pbos@webrtc.org27e58982014-10-07 17:56:53 +000018#ifdef MEMORY_SANITIZER
19#include <sanitizer/msan_interface.h>
20#endif
21
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000022#if defined(WEBRTC_POSIX)
23#include <string.h>
24#include <errno.h>
25#include <fcntl.h>
Stefan Holmer9131efd2016-05-23 18:19:26 +020026#include <sys/ioctl.h>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000027#include <sys/time.h>
28#include <sys/select.h>
29#include <unistd.h>
30#include <signal.h>
31#endif
32
33#if defined(WEBRTC_WIN)
34#define WIN32_LEAN_AND_MEAN
35#include <windows.h>
36#include <winsock2.h>
37#include <ws2tcpip.h>
38#undef SetPort
39#endif
40
41#include <algorithm>
42#include <map>
43
tfarina5237aaf2015-11-10 23:44:30 -080044#include "webrtc/base/arraysize.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000045#include "webrtc/base/basictypes.h"
46#include "webrtc/base/byteorder.h"
47#include "webrtc/base/common.h"
48#include "webrtc/base/logging.h"
honghaizcec0a082016-01-15 14:49:09 -080049#include "webrtc/base/networkmonitor.h"
danilchapbebf54c2016-04-28 01:32:48 -070050#include "webrtc/base/nullsocketserver.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000051#include "webrtc/base/timeutils.h"
52#include "webrtc/base/winping.h"
53#include "webrtc/base/win32socketinit.h"
54
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000055#if defined(WEBRTC_POSIX)
56#include <netinet/tcp.h> // for TCP_NODELAY
57#define IP_MTU 14 // Until this is integrated from linux/in.h to netinet/in.h
58typedef void* SockOptArg;
Stefan Holmer9131efd2016-05-23 18:19:26 +020059
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000060#endif // WEBRTC_POSIX
61
Stefan Holmer3ebb3ef2016-05-23 20:26:11 +020062#if defined(WEBRTC_POSIX) && !defined(WEBRTC_MAC) && !defined(__native_client__)
63
Stefan Holmer9131efd2016-05-23 18:19:26 +020064int64_t GetSocketRecvTimestamp(int socket) {
65 struct timeval tv_ioctl;
66 int ret = ioctl(socket, SIOCGSTAMP, &tv_ioctl);
67 if (ret != 0)
68 return -1;
69 int64_t timestamp =
70 rtc::kNumMicrosecsPerSec * static_cast<int64_t>(tv_ioctl.tv_sec) +
71 static_cast<int64_t>(tv_ioctl.tv_usec);
72 return timestamp;
73}
74
75#else
76
77int64_t GetSocketRecvTimestamp(int socket) {
78 return -1;
79}
80#endif
81
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000082#if defined(WEBRTC_WIN)
83typedef char* SockOptArg;
84#endif
85
86namespace rtc {
87
danilchapbebf54c2016-04-28 01:32:48 -070088std::unique_ptr<SocketServer> SocketServer::CreateDefault() {
89#if defined(__native_client__)
90 return std::unique_ptr<SocketServer>(new rtc::NullSocketServer);
91#else
92 return std::unique_ptr<SocketServer>(new rtc::PhysicalSocketServer);
93#endif
94}
95
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000096#if defined(WEBRTC_WIN)
97// Standard MTUs, from RFC 1191
Peter Boström0c4e06b2015-10-07 12:23:21 +020098const uint16_t PACKET_MAXIMUMS[] = {
99 65535, // Theoretical maximum, Hyperchannel
100 32000, // Nothing
101 17914, // 16Mb IBM Token Ring
102 8166, // IEEE 802.4
103 // 4464, // IEEE 802.5 (4Mb max)
104 4352, // FDDI
105 // 2048, // Wideband Network
106 2002, // IEEE 802.5 (4Mb recommended)
107 // 1536, // Expermental Ethernet Networks
108 // 1500, // Ethernet, Point-to-Point (default)
109 1492, // IEEE 802.3
110 1006, // SLIP, ARPANET
111 // 576, // X.25 Networks
112 // 544, // DEC IP Portal
113 // 512, // NETBIOS
114 508, // IEEE 802/Source-Rt Bridge, ARCNET
115 296, // Point-to-Point (low delay)
116 68, // Official minimum
117 0, // End of list marker
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000118};
119
120static const int IP_HEADER_SIZE = 20u;
121static const int IPV6_HEADER_SIZE = 40u;
122static const int ICMP_HEADER_SIZE = 8u;
123static const int ICMP_PING_TIMEOUT_MILLIS = 10000u;
124#endif
125
jbauch095ae152015-12-18 01:39:55 -0800126PhysicalSocket::PhysicalSocket(PhysicalSocketServer* ss, SOCKET s)
127 : ss_(ss), s_(s), enabled_events_(0), error_(0),
128 state_((s == INVALID_SOCKET) ? CS_CLOSED : CS_CONNECTED),
129 resolver_(nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000130#if defined(WEBRTC_WIN)
jbauch095ae152015-12-18 01:39:55 -0800131 // EnsureWinsockInit() ensures that winsock is initialized. The default
132 // version of this function doesn't do anything because winsock is
133 // initialized by constructor of a static object. If neccessary libjingle
134 // users can link it with a different version of this function by replacing
135 // win32socketinit.cc. See win32socketinit.cc for more details.
136 EnsureWinsockInit();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000137#endif
jbauch095ae152015-12-18 01:39:55 -0800138 if (s_ != INVALID_SOCKET) {
139 enabled_events_ = DE_READ | DE_WRITE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000140
jbauch095ae152015-12-18 01:39:55 -0800141 int type = SOCK_STREAM;
142 socklen_t len = sizeof(type);
143 VERIFY(0 == getsockopt(s_, SOL_SOCKET, SO_TYPE, (SockOptArg)&type, &len));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000144 udp_ = (SOCK_DGRAM == type);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000145 }
jbauch095ae152015-12-18 01:39:55 -0800146}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000147
jbauch095ae152015-12-18 01:39:55 -0800148PhysicalSocket::~PhysicalSocket() {
149 Close();
150}
151
152bool PhysicalSocket::Create(int family, int type) {
153 Close();
154 s_ = ::socket(family, type, 0);
155 udp_ = (SOCK_DGRAM == type);
156 UpdateLastError();
157 if (udp_)
158 enabled_events_ = DE_READ | DE_WRITE;
159 return s_ != INVALID_SOCKET;
160}
161
162SocketAddress PhysicalSocket::GetLocalAddress() const {
163 sockaddr_storage addr_storage = {0};
164 socklen_t addrlen = sizeof(addr_storage);
165 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
166 int result = ::getsockname(s_, addr, &addrlen);
167 SocketAddress address;
168 if (result >= 0) {
169 SocketAddressFromSockAddrStorage(addr_storage, &address);
170 } else {
171 LOG(LS_WARNING) << "GetLocalAddress: unable to get local addr, socket="
172 << s_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000173 }
jbauch095ae152015-12-18 01:39:55 -0800174 return address;
175}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000176
jbauch095ae152015-12-18 01:39:55 -0800177SocketAddress PhysicalSocket::GetRemoteAddress() const {
178 sockaddr_storage addr_storage = {0};
179 socklen_t addrlen = sizeof(addr_storage);
180 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
181 int result = ::getpeername(s_, addr, &addrlen);
182 SocketAddress address;
183 if (result >= 0) {
184 SocketAddressFromSockAddrStorage(addr_storage, &address);
185 } else {
186 LOG(LS_WARNING) << "GetRemoteAddress: unable to get remote addr, socket="
187 << s_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000188 }
jbauch095ae152015-12-18 01:39:55 -0800189 return address;
190}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000191
jbauch095ae152015-12-18 01:39:55 -0800192int PhysicalSocket::Bind(const SocketAddress& bind_addr) {
193 sockaddr_storage addr_storage;
194 size_t len = bind_addr.ToSockAddrStorage(&addr_storage);
195 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
196 int err = ::bind(s_, addr, static_cast<int>(len));
197 UpdateLastError();
tfarinaa41ab932015-10-30 16:08:48 -0700198#if !defined(NDEBUG)
jbauch095ae152015-12-18 01:39:55 -0800199 if (0 == err) {
200 dbg_addr_ = "Bound @ ";
201 dbg_addr_.append(GetLocalAddress().ToString());
202 }
tfarinaa41ab932015-10-30 16:08:48 -0700203#endif
honghaizcec0a082016-01-15 14:49:09 -0800204 if (ss_->network_binder()) {
205 int result =
206 ss_->network_binder()->BindSocketToNetwork(s_, bind_addr.ipaddr());
207 if (result < 0) {
208 LOG(LS_INFO) << "Binding socket to network address "
209 << bind_addr.ipaddr().ToString() << " result " << result;
210 }
211 }
jbauch095ae152015-12-18 01:39:55 -0800212 return err;
213}
214
215int PhysicalSocket::Connect(const SocketAddress& addr) {
216 // TODO(pthatcher): Implicit creation is required to reconnect...
217 // ...but should we make it more explicit?
218 if (state_ != CS_CLOSED) {
219 SetError(EALREADY);
220 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000221 }
jbauch095ae152015-12-18 01:39:55 -0800222 if (addr.IsUnresolvedIP()) {
223 LOG(LS_VERBOSE) << "Resolving addr in PhysicalSocket::Connect";
224 resolver_ = new AsyncResolver();
225 resolver_->SignalDone.connect(this, &PhysicalSocket::OnResolveResult);
226 resolver_->Start(addr);
227 state_ = CS_CONNECTING;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000228 return 0;
229 }
230
jbauch095ae152015-12-18 01:39:55 -0800231 return DoConnect(addr);
232}
233
234int PhysicalSocket::DoConnect(const SocketAddress& connect_addr) {
235 if ((s_ == INVALID_SOCKET) &&
236 !Create(connect_addr.family(), SOCK_STREAM)) {
237 return SOCKET_ERROR;
238 }
239 sockaddr_storage addr_storage;
240 size_t len = connect_addr.ToSockAddrStorage(&addr_storage);
241 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
242 int err = ::connect(s_, addr, static_cast<int>(len));
243 UpdateLastError();
244 if (err == 0) {
245 state_ = CS_CONNECTED;
246 } else if (IsBlockingError(GetError())) {
247 state_ = CS_CONNECTING;
248 enabled_events_ |= DE_CONNECT;
249 } else {
250 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000251 }
252
jbauch095ae152015-12-18 01:39:55 -0800253 enabled_events_ |= DE_READ | DE_WRITE;
254 return 0;
255}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000256
jbauch095ae152015-12-18 01:39:55 -0800257int PhysicalSocket::GetError() const {
258 CritScope cs(&crit_);
259 return error_;
260}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000261
jbauch095ae152015-12-18 01:39:55 -0800262void PhysicalSocket::SetError(int error) {
263 CritScope cs(&crit_);
264 error_ = error;
265}
266
267AsyncSocket::ConnState PhysicalSocket::GetState() const {
268 return state_;
269}
270
271int PhysicalSocket::GetOption(Option opt, int* value) {
272 int slevel;
273 int sopt;
274 if (TranslateOption(opt, &slevel, &sopt) == -1)
275 return -1;
276 socklen_t optlen = sizeof(*value);
277 int ret = ::getsockopt(s_, slevel, sopt, (SockOptArg)value, &optlen);
278 if (ret != -1 && opt == OPT_DONTFRAGMENT) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000279#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800280 *value = (*value != IP_PMTUDISC_DONT) ? 1 : 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000281#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000282 }
jbauch095ae152015-12-18 01:39:55 -0800283 return ret;
284}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000285
jbauch095ae152015-12-18 01:39:55 -0800286int PhysicalSocket::SetOption(Option opt, int value) {
287 int slevel;
288 int sopt;
289 if (TranslateOption(opt, &slevel, &sopt) == -1)
290 return -1;
291 if (opt == OPT_DONTFRAGMENT) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000292#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800293 value = (value) ? IP_PMTUDISC_DO : IP_PMTUDISC_DONT;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000294#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000295 }
jbauch095ae152015-12-18 01:39:55 -0800296 return ::setsockopt(s_, slevel, sopt, (SockOptArg)&value, sizeof(value));
297}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000298
jbauch095ae152015-12-18 01:39:55 -0800299int PhysicalSocket::Send(const void* pv, size_t cb) {
jbauchf2a2bf42016-02-03 16:45:32 -0800300 int sent = DoSend(s_, reinterpret_cast<const char *>(pv),
301 static_cast<int>(cb),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000302#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800303 // Suppress SIGPIPE. Without this, attempting to send on a socket whose
304 // other end is closed will result in a SIGPIPE signal being raised to
305 // our process, which by default will terminate the process, which we
306 // don't want. By specifying this flag, we'll just get the error EPIPE
307 // instead and can handle the error gracefully.
308 MSG_NOSIGNAL
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000309#else
jbauch095ae152015-12-18 01:39:55 -0800310 0
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000311#endif
jbauch095ae152015-12-18 01:39:55 -0800312 );
313 UpdateLastError();
314 MaybeRemapSendError();
315 // We have seen minidumps where this may be false.
316 ASSERT(sent <= static_cast<int>(cb));
jbauchf2a2bf42016-02-03 16:45:32 -0800317 if ((sent > 0 && sent < static_cast<int>(cb)) ||
318 (sent < 0 && IsBlockingError(GetError()))) {
jbauch095ae152015-12-18 01:39:55 -0800319 enabled_events_ |= DE_WRITE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000320 }
jbauch095ae152015-12-18 01:39:55 -0800321 return sent;
322}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000323
jbauch095ae152015-12-18 01:39:55 -0800324int PhysicalSocket::SendTo(const void* buffer,
325 size_t length,
326 const SocketAddress& addr) {
327 sockaddr_storage saddr;
328 size_t len = addr.ToSockAddrStorage(&saddr);
jbauchf2a2bf42016-02-03 16:45:32 -0800329 int sent = DoSendTo(
jbauch095ae152015-12-18 01:39:55 -0800330 s_, static_cast<const char *>(buffer), static_cast<int>(length),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000331#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800332 // Suppress SIGPIPE. See above for explanation.
333 MSG_NOSIGNAL,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000334#else
jbauch095ae152015-12-18 01:39:55 -0800335 0,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000336#endif
jbauch095ae152015-12-18 01:39:55 -0800337 reinterpret_cast<sockaddr*>(&saddr), static_cast<int>(len));
338 UpdateLastError();
339 MaybeRemapSendError();
340 // We have seen minidumps where this may be false.
341 ASSERT(sent <= static_cast<int>(length));
jbauchf2a2bf42016-02-03 16:45:32 -0800342 if ((sent > 0 && sent < static_cast<int>(length)) ||
343 (sent < 0 && IsBlockingError(GetError()))) {
jbauch095ae152015-12-18 01:39:55 -0800344 enabled_events_ |= DE_WRITE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000345 }
jbauch095ae152015-12-18 01:39:55 -0800346 return sent;
347}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000348
Stefan Holmer9131efd2016-05-23 18:19:26 +0200349int PhysicalSocket::Recv(void* buffer, size_t length, int64_t* timestamp) {
jbauch095ae152015-12-18 01:39:55 -0800350 int received = ::recv(s_, static_cast<char*>(buffer),
351 static_cast<int>(length), 0);
352 if ((received == 0) && (length != 0)) {
353 // Note: on graceful shutdown, recv can return 0. In this case, we
354 // pretend it is blocking, and then signal close, so that simplifying
355 // assumptions can be made about Recv.
356 LOG(LS_WARNING) << "EOF from socket; deferring close event";
357 // Must turn this back on so that the select() loop will notice the close
358 // event.
359 enabled_events_ |= DE_READ;
360 SetError(EWOULDBLOCK);
361 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000362 }
Stefan Holmer9131efd2016-05-23 18:19:26 +0200363 if (timestamp) {
364 *timestamp = GetSocketRecvTimestamp(s_);
365 }
jbauch095ae152015-12-18 01:39:55 -0800366 UpdateLastError();
367 int error = GetError();
368 bool success = (received >= 0) || IsBlockingError(error);
369 if (udp_ || success) {
370 enabled_events_ |= DE_READ;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000371 }
jbauch095ae152015-12-18 01:39:55 -0800372 if (!success) {
373 LOG_F(LS_VERBOSE) << "Error = " << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000374 }
jbauch095ae152015-12-18 01:39:55 -0800375 return received;
376}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000377
jbauch095ae152015-12-18 01:39:55 -0800378int PhysicalSocket::RecvFrom(void* buffer,
379 size_t length,
Stefan Holmer9131efd2016-05-23 18:19:26 +0200380 SocketAddress* out_addr,
381 int64_t* timestamp) {
jbauch095ae152015-12-18 01:39:55 -0800382 sockaddr_storage addr_storage;
383 socklen_t addr_len = sizeof(addr_storage);
384 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
385 int received = ::recvfrom(s_, static_cast<char*>(buffer),
386 static_cast<int>(length), 0, addr, &addr_len);
Stefan Holmer9131efd2016-05-23 18:19:26 +0200387 if (timestamp) {
388 *timestamp = GetSocketRecvTimestamp(s_);
389 }
jbauch095ae152015-12-18 01:39:55 -0800390 UpdateLastError();
391 if ((received >= 0) && (out_addr != nullptr))
392 SocketAddressFromSockAddrStorage(addr_storage, out_addr);
393 int error = GetError();
394 bool success = (received >= 0) || IsBlockingError(error);
395 if (udp_ || success) {
396 enabled_events_ |= DE_READ;
397 }
398 if (!success) {
399 LOG_F(LS_VERBOSE) << "Error = " << error;
400 }
401 return received;
402}
403
404int PhysicalSocket::Listen(int backlog) {
405 int err = ::listen(s_, backlog);
406 UpdateLastError();
407 if (err == 0) {
408 state_ = CS_CONNECTING;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000409 enabled_events_ |= DE_ACCEPT;
jbauch095ae152015-12-18 01:39:55 -0800410#if !defined(NDEBUG)
411 dbg_addr_ = "Listening @ ";
412 dbg_addr_.append(GetLocalAddress().ToString());
413#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000414 }
jbauch095ae152015-12-18 01:39:55 -0800415 return err;
416}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000417
jbauch095ae152015-12-18 01:39:55 -0800418AsyncSocket* PhysicalSocket::Accept(SocketAddress* out_addr) {
419 // Always re-subscribe DE_ACCEPT to make sure new incoming connections will
420 // trigger an event even if DoAccept returns an error here.
421 enabled_events_ |= DE_ACCEPT;
422 sockaddr_storage addr_storage;
423 socklen_t addr_len = sizeof(addr_storage);
424 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
425 SOCKET s = DoAccept(s_, addr, &addr_len);
426 UpdateLastError();
427 if (s == INVALID_SOCKET)
428 return nullptr;
429 if (out_addr != nullptr)
430 SocketAddressFromSockAddrStorage(addr_storage, out_addr);
431 return ss_->WrapSocket(s);
432}
433
434int PhysicalSocket::Close() {
435 if (s_ == INVALID_SOCKET)
436 return 0;
437 int err = ::closesocket(s_);
438 UpdateLastError();
439 s_ = INVALID_SOCKET;
440 state_ = CS_CLOSED;
441 enabled_events_ = 0;
442 if (resolver_) {
443 resolver_->Destroy(false);
444 resolver_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000445 }
jbauch095ae152015-12-18 01:39:55 -0800446 return err;
447}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000448
jbauch095ae152015-12-18 01:39:55 -0800449int PhysicalSocket::EstimateMTU(uint16_t* mtu) {
450 SocketAddress addr = GetRemoteAddress();
451 if (addr.IsAnyIP()) {
452 SetError(ENOTCONN);
453 return -1;
454 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000455
456#if defined(WEBRTC_WIN)
jbauch095ae152015-12-18 01:39:55 -0800457 // Gets the interface MTU (TTL=1) for the interface used to reach |addr|.
458 WinPing ping;
459 if (!ping.IsValid()) {
460 SetError(EINVAL); // can't think of a better error ID
461 return -1;
462 }
463 int header_size = ICMP_HEADER_SIZE;
464 if (addr.family() == AF_INET6) {
465 header_size += IPV6_HEADER_SIZE;
466 } else if (addr.family() == AF_INET) {
467 header_size += IP_HEADER_SIZE;
468 }
469
470 for (int level = 0; PACKET_MAXIMUMS[level + 1] > 0; ++level) {
471 int32_t size = PACKET_MAXIMUMS[level] - header_size;
472 WinPing::PingResult result = ping.Ping(addr.ipaddr(), size,
473 ICMP_PING_TIMEOUT_MILLIS,
474 1, false);
475 if (result == WinPing::PING_FAIL) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000476 SetError(EINVAL); // can't think of a better error ID
477 return -1;
jbauch095ae152015-12-18 01:39:55 -0800478 } else if (result != WinPing::PING_TOO_LARGE) {
479 *mtu = PACKET_MAXIMUMS[level];
480 return 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000481 }
jbauch095ae152015-12-18 01:39:55 -0800482 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000483
jbauch095ae152015-12-18 01:39:55 -0800484 ASSERT(false);
485 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000486#elif defined(WEBRTC_MAC)
jbauch095ae152015-12-18 01:39:55 -0800487 // No simple way to do this on Mac OS X.
488 // SIOCGIFMTU would work if we knew which interface would be used, but
489 // figuring that out is pretty complicated. For now we'll return an error
490 // and let the caller pick a default MTU.
491 SetError(EINVAL);
492 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000493#elif defined(WEBRTC_LINUX)
jbauch095ae152015-12-18 01:39:55 -0800494 // Gets the path MTU.
495 int value;
496 socklen_t vlen = sizeof(value);
497 int err = getsockopt(s_, IPPROTO_IP, IP_MTU, &value, &vlen);
498 if (err < 0) {
499 UpdateLastError();
500 return err;
501 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000502
jbauch095ae152015-12-18 01:39:55 -0800503 ASSERT((0 <= value) && (value <= 65536));
504 *mtu = value;
505 return 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000506#elif defined(__native_client__)
jbauch095ae152015-12-18 01:39:55 -0800507 // Most socket operations, including this, will fail in NaCl's sandbox.
508 error_ = EACCES;
509 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000510#endif
jbauch095ae152015-12-18 01:39:55 -0800511}
512
jbauch095ae152015-12-18 01:39:55 -0800513SOCKET PhysicalSocket::DoAccept(SOCKET socket,
514 sockaddr* addr,
515 socklen_t* addrlen) {
516 return ::accept(socket, addr, addrlen);
517}
518
jbauchf2a2bf42016-02-03 16:45:32 -0800519int PhysicalSocket::DoSend(SOCKET socket, const char* buf, int len, int flags) {
520 return ::send(socket, buf, len, flags);
521}
522
523int PhysicalSocket::DoSendTo(SOCKET socket,
524 const char* buf,
525 int len,
526 int flags,
527 const struct sockaddr* dest_addr,
528 socklen_t addrlen) {
529 return ::sendto(socket, buf, len, flags, dest_addr, addrlen);
530}
531
jbauch095ae152015-12-18 01:39:55 -0800532void PhysicalSocket::OnResolveResult(AsyncResolverInterface* resolver) {
533 if (resolver != resolver_) {
534 return;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000535 }
536
jbauch095ae152015-12-18 01:39:55 -0800537 int error = resolver_->GetError();
538 if (error == 0) {
539 error = DoConnect(resolver_->address());
540 } else {
541 Close();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000542 }
543
jbauch095ae152015-12-18 01:39:55 -0800544 if (error) {
545 SetError(error);
546 SignalCloseEvent(this, error);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000547 }
jbauch095ae152015-12-18 01:39:55 -0800548}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000549
jbauch095ae152015-12-18 01:39:55 -0800550void PhysicalSocket::UpdateLastError() {
551 SetError(LAST_SYSTEM_ERROR);
552}
553
554void PhysicalSocket::MaybeRemapSendError() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000555#if defined(WEBRTC_MAC)
jbauch095ae152015-12-18 01:39:55 -0800556 // https://developer.apple.com/library/mac/documentation/Darwin/
557 // Reference/ManPages/man2/sendto.2.html
558 // ENOBUFS - The output queue for a network interface is full.
559 // This generally indicates that the interface has stopped sending,
560 // but may be caused by transient congestion.
561 if (GetError() == ENOBUFS) {
562 SetError(EWOULDBLOCK);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000563 }
jbauch095ae152015-12-18 01:39:55 -0800564#endif
565}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000566
jbauch095ae152015-12-18 01:39:55 -0800567int PhysicalSocket::TranslateOption(Option opt, int* slevel, int* sopt) {
568 switch (opt) {
569 case OPT_DONTFRAGMENT:
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000570#if defined(WEBRTC_WIN)
jbauch095ae152015-12-18 01:39:55 -0800571 *slevel = IPPROTO_IP;
572 *sopt = IP_DONTFRAGMENT;
573 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000574#elif defined(WEBRTC_MAC) || defined(BSD) || defined(__native_client__)
jbauch095ae152015-12-18 01:39:55 -0800575 LOG(LS_WARNING) << "Socket::OPT_DONTFRAGMENT not supported.";
576 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000577#elif defined(WEBRTC_POSIX)
jbauch095ae152015-12-18 01:39:55 -0800578 *slevel = IPPROTO_IP;
579 *sopt = IP_MTU_DISCOVER;
580 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000581#endif
jbauch095ae152015-12-18 01:39:55 -0800582 case OPT_RCVBUF:
583 *slevel = SOL_SOCKET;
584 *sopt = SO_RCVBUF;
585 break;
586 case OPT_SNDBUF:
587 *slevel = SOL_SOCKET;
588 *sopt = SO_SNDBUF;
589 break;
590 case OPT_NODELAY:
591 *slevel = IPPROTO_TCP;
592 *sopt = TCP_NODELAY;
593 break;
594 case OPT_DSCP:
595 LOG(LS_WARNING) << "Socket::OPT_DSCP not supported.";
596 return -1;
597 case OPT_RTP_SENDTIME_EXTN_ID:
598 return -1; // No logging is necessary as this not a OS socket option.
599 default:
600 ASSERT(false);
601 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000602 }
jbauch095ae152015-12-18 01:39:55 -0800603 return 0;
604}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000605
jbauch4331fcd2016-01-06 22:20:28 -0800606SocketDispatcher::SocketDispatcher(PhysicalSocketServer *ss)
607#if defined(WEBRTC_WIN)
608 : PhysicalSocket(ss), id_(0), signal_close_(false)
609#else
610 : PhysicalSocket(ss)
611#endif
612{
613}
614
615SocketDispatcher::SocketDispatcher(SOCKET s, PhysicalSocketServer *ss)
616#if defined(WEBRTC_WIN)
617 : PhysicalSocket(ss, s), id_(0), signal_close_(false)
618#else
619 : PhysicalSocket(ss, s)
620#endif
621{
622}
623
624SocketDispatcher::~SocketDispatcher() {
625 Close();
626}
627
628bool SocketDispatcher::Initialize() {
629 ASSERT(s_ != INVALID_SOCKET);
630 // Must be a non-blocking
631#if defined(WEBRTC_WIN)
632 u_long argp = 1;
633 ioctlsocket(s_, FIONBIO, &argp);
634#elif defined(WEBRTC_POSIX)
635 fcntl(s_, F_SETFL, fcntl(s_, F_GETFL, 0) | O_NONBLOCK);
636#endif
637 ss_->Add(this);
638 return true;
639}
640
641bool SocketDispatcher::Create(int type) {
642 return Create(AF_INET, type);
643}
644
645bool SocketDispatcher::Create(int family, int type) {
646 // Change the socket to be non-blocking.
647 if (!PhysicalSocket::Create(family, type))
648 return false;
649
650 if (!Initialize())
651 return false;
652
653#if defined(WEBRTC_WIN)
654 do { id_ = ++next_id_; } while (id_ == 0);
655#endif
656 return true;
657}
658
659#if defined(WEBRTC_WIN)
660
661WSAEVENT SocketDispatcher::GetWSAEvent() {
662 return WSA_INVALID_EVENT;
663}
664
665SOCKET SocketDispatcher::GetSocket() {
666 return s_;
667}
668
669bool SocketDispatcher::CheckSignalClose() {
670 if (!signal_close_)
671 return false;
672
673 char ch;
674 if (recv(s_, &ch, 1, MSG_PEEK) > 0)
675 return false;
676
677 state_ = CS_CLOSED;
678 signal_close_ = false;
679 SignalCloseEvent(this, signal_err_);
680 return true;
681}
682
683int SocketDispatcher::next_id_ = 0;
684
685#elif defined(WEBRTC_POSIX)
686
687int SocketDispatcher::GetDescriptor() {
688 return s_;
689}
690
691bool SocketDispatcher::IsDescriptorClosed() {
692 // We don't have a reliable way of distinguishing end-of-stream
693 // from readability. So test on each readable call. Is this
694 // inefficient? Probably.
695 char ch;
696 ssize_t res = ::recv(s_, &ch, 1, MSG_PEEK);
697 if (res > 0) {
698 // Data available, so not closed.
699 return false;
700 } else if (res == 0) {
701 // EOF, so closed.
702 return true;
703 } else { // error
704 switch (errno) {
705 // Returned if we've already closed s_.
706 case EBADF:
707 // Returned during ungraceful peer shutdown.
708 case ECONNRESET:
709 return true;
710 default:
711 // Assume that all other errors are just blocking errors, meaning the
712 // connection is still good but we just can't read from it right now.
713 // This should only happen when connecting (and at most once), because
714 // in all other cases this function is only called if the file
715 // descriptor is already known to be in the readable state. However,
716 // it's not necessary a problem if we spuriously interpret a
717 // "connection lost"-type error as a blocking error, because typically
718 // the next recv() will get EOF, so we'll still eventually notice that
719 // the socket is closed.
720 LOG_ERR(LS_WARNING) << "Assuming benign blocking error";
721 return false;
722 }
723 }
724}
725
726#endif // WEBRTC_POSIX
727
728uint32_t SocketDispatcher::GetRequestedEvents() {
729 return enabled_events_;
730}
731
732void SocketDispatcher::OnPreEvent(uint32_t ff) {
733 if ((ff & DE_CONNECT) != 0)
734 state_ = CS_CONNECTED;
735
736#if defined(WEBRTC_WIN)
737 // We set CS_CLOSED from CheckSignalClose.
738#elif defined(WEBRTC_POSIX)
739 if ((ff & DE_CLOSE) != 0)
740 state_ = CS_CLOSED;
741#endif
742}
743
744#if defined(WEBRTC_WIN)
745
746void SocketDispatcher::OnEvent(uint32_t ff, int err) {
747 int cache_id = id_;
748 // Make sure we deliver connect/accept first. Otherwise, consumers may see
749 // something like a READ followed by a CONNECT, which would be odd.
750 if (((ff & DE_CONNECT) != 0) && (id_ == cache_id)) {
751 if (ff != DE_CONNECT)
752 LOG(LS_VERBOSE) << "Signalled with DE_CONNECT: " << ff;
753 enabled_events_ &= ~DE_CONNECT;
754#if !defined(NDEBUG)
755 dbg_addr_ = "Connected @ ";
756 dbg_addr_.append(GetRemoteAddress().ToString());
757#endif
758 SignalConnectEvent(this);
759 }
760 if (((ff & DE_ACCEPT) != 0) && (id_ == cache_id)) {
761 enabled_events_ &= ~DE_ACCEPT;
762 SignalReadEvent(this);
763 }
764 if ((ff & DE_READ) != 0) {
765 enabled_events_ &= ~DE_READ;
766 SignalReadEvent(this);
767 }
768 if (((ff & DE_WRITE) != 0) && (id_ == cache_id)) {
769 enabled_events_ &= ~DE_WRITE;
770 SignalWriteEvent(this);
771 }
772 if (((ff & DE_CLOSE) != 0) && (id_ == cache_id)) {
773 signal_close_ = true;
774 signal_err_ = err;
775 }
776}
777
778#elif defined(WEBRTC_POSIX)
779
780void SocketDispatcher::OnEvent(uint32_t ff, int err) {
781 // Make sure we deliver connect/accept first. Otherwise, consumers may see
782 // something like a READ followed by a CONNECT, which would be odd.
783 if ((ff & DE_CONNECT) != 0) {
784 enabled_events_ &= ~DE_CONNECT;
785 SignalConnectEvent(this);
786 }
787 if ((ff & DE_ACCEPT) != 0) {
788 enabled_events_ &= ~DE_ACCEPT;
789 SignalReadEvent(this);
790 }
791 if ((ff & DE_READ) != 0) {
792 enabled_events_ &= ~DE_READ;
793 SignalReadEvent(this);
794 }
795 if ((ff & DE_WRITE) != 0) {
796 enabled_events_ &= ~DE_WRITE;
797 SignalWriteEvent(this);
798 }
799 if ((ff & DE_CLOSE) != 0) {
800 // The socket is now dead to us, so stop checking it.
801 enabled_events_ = 0;
802 SignalCloseEvent(this, err);
803 }
804}
805
806#endif // WEBRTC_POSIX
807
808int SocketDispatcher::Close() {
809 if (s_ == INVALID_SOCKET)
810 return 0;
811
812#if defined(WEBRTC_WIN)
813 id_ = 0;
814 signal_close_ = false;
815#endif
816 ss_->Remove(this);
817 return PhysicalSocket::Close();
818}
819
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000820#if defined(WEBRTC_POSIX)
821class EventDispatcher : public Dispatcher {
822 public:
823 EventDispatcher(PhysicalSocketServer* ss) : ss_(ss), fSignaled_(false) {
824 if (pipe(afd_) < 0)
825 LOG(LERROR) << "pipe failed";
826 ss_->Add(this);
827 }
828
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000829 ~EventDispatcher() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000830 ss_->Remove(this);
831 close(afd_[0]);
832 close(afd_[1]);
833 }
834
835 virtual void Signal() {
836 CritScope cs(&crit_);
837 if (!fSignaled_) {
Peter Boström0c4e06b2015-10-07 12:23:21 +0200838 const uint8_t b[1] = {0};
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000839 if (VERIFY(1 == write(afd_[1], b, sizeof(b)))) {
840 fSignaled_ = true;
841 }
842 }
843 }
844
Peter Boström0c4e06b2015-10-07 12:23:21 +0200845 uint32_t GetRequestedEvents() override { return DE_READ; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000846
Peter Boström0c4e06b2015-10-07 12:23:21 +0200847 void OnPreEvent(uint32_t ff) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000848 // It is not possible to perfectly emulate an auto-resetting event with
849 // pipes. This simulates it by resetting before the event is handled.
850
851 CritScope cs(&crit_);
852 if (fSignaled_) {
Peter Boström0c4e06b2015-10-07 12:23:21 +0200853 uint8_t b[4]; // Allow for reading more than 1 byte, but expect 1.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000854 VERIFY(1 == read(afd_[0], b, sizeof(b)));
855 fSignaled_ = false;
856 }
857 }
858
Peter Boström0c4e06b2015-10-07 12:23:21 +0200859 void OnEvent(uint32_t ff, int err) override { ASSERT(false); }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000860
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000861 int GetDescriptor() override { return afd_[0]; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000862
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000863 bool IsDescriptorClosed() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000864
865 private:
866 PhysicalSocketServer *ss_;
867 int afd_[2];
868 bool fSignaled_;
869 CriticalSection crit_;
870};
871
872// These two classes use the self-pipe trick to deliver POSIX signals to our
873// select loop. This is the only safe, reliable, cross-platform way to do
874// non-trivial things with a POSIX signal in an event-driven program (until
875// proper pselect() implementations become ubiquitous).
876
877class PosixSignalHandler {
878 public:
879 // POSIX only specifies 32 signals, but in principle the system might have
880 // more and the programmer might choose to use them, so we size our array
881 // for 128.
882 static const int kNumPosixSignals = 128;
883
884 // There is just a single global instance. (Signal handlers do not get any
885 // sort of user-defined void * parameter, so they can't access anything that
886 // isn't global.)
887 static PosixSignalHandler* Instance() {
Andrew MacDonald469c2c02015-05-22 17:50:26 -0700888 RTC_DEFINE_STATIC_LOCAL(PosixSignalHandler, instance, ());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000889 return &instance;
890 }
891
892 // Returns true if the given signal number is set.
893 bool IsSignalSet(int signum) const {
tfarina5237aaf2015-11-10 23:44:30 -0800894 ASSERT(signum < static_cast<int>(arraysize(received_signal_)));
895 if (signum < static_cast<int>(arraysize(received_signal_))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000896 return received_signal_[signum];
897 } else {
898 return false;
899 }
900 }
901
902 // Clears the given signal number.
903 void ClearSignal(int signum) {
tfarina5237aaf2015-11-10 23:44:30 -0800904 ASSERT(signum < static_cast<int>(arraysize(received_signal_)));
905 if (signum < static_cast<int>(arraysize(received_signal_))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000906 received_signal_[signum] = false;
907 }
908 }
909
910 // Returns the file descriptor to monitor for signal events.
911 int GetDescriptor() const {
912 return afd_[0];
913 }
914
915 // This is called directly from our real signal handler, so it must be
916 // signal-handler-safe. That means it cannot assume anything about the
917 // user-level state of the process, since the handler could be executed at any
918 // time on any thread.
919 void OnPosixSignalReceived(int signum) {
tfarina5237aaf2015-11-10 23:44:30 -0800920 if (signum >= static_cast<int>(arraysize(received_signal_))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000921 // We don't have space in our array for this.
922 return;
923 }
924 // Set a flag saying we've seen this signal.
925 received_signal_[signum] = true;
926 // Notify application code that we got a signal.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200927 const uint8_t b[1] = {0};
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000928 if (-1 == write(afd_[1], b, sizeof(b))) {
929 // Nothing we can do here. If there's an error somehow then there's
930 // nothing we can safely do from a signal handler.
931 // No, we can't even safely log it.
932 // But, we still have to check the return value here. Otherwise,
933 // GCC 4.4.1 complains ignoring return value. Even (void) doesn't help.
934 return;
935 }
936 }
937
938 private:
939 PosixSignalHandler() {
940 if (pipe(afd_) < 0) {
941 LOG_ERR(LS_ERROR) << "pipe failed";
942 return;
943 }
944 if (fcntl(afd_[0], F_SETFL, O_NONBLOCK) < 0) {
945 LOG_ERR(LS_WARNING) << "fcntl #1 failed";
946 }
947 if (fcntl(afd_[1], F_SETFL, O_NONBLOCK) < 0) {
948 LOG_ERR(LS_WARNING) << "fcntl #2 failed";
949 }
950 memset(const_cast<void *>(static_cast<volatile void *>(received_signal_)),
951 0,
952 sizeof(received_signal_));
953 }
954
955 ~PosixSignalHandler() {
956 int fd1 = afd_[0];
957 int fd2 = afd_[1];
958 // We clobber the stored file descriptor numbers here or else in principle
959 // a signal that happens to be delivered during application termination
960 // could erroneously write a zero byte to an unrelated file handle in
961 // OnPosixSignalReceived() if some other file happens to be opened later
962 // during shutdown and happens to be given the same file descriptor number
963 // as our pipe had. Unfortunately even with this precaution there is still a
964 // race where that could occur if said signal happens to be handled
965 // concurrently with this code and happens to have already read the value of
966 // afd_[1] from memory before we clobber it, but that's unlikely.
967 afd_[0] = -1;
968 afd_[1] = -1;
969 close(fd1);
970 close(fd2);
971 }
972
973 int afd_[2];
974 // These are boolean flags that will be set in our signal handler and read
975 // and cleared from Wait(). There is a race involved in this, but it is
976 // benign. The signal handler sets the flag before signaling the pipe, so
977 // we'll never end up blocking in select() while a flag is still true.
978 // However, if two of the same signal arrive close to each other then it's
979 // possible that the second time the handler may set the flag while it's still
980 // true, meaning that signal will be missed. But the first occurrence of it
981 // will still be handled, so this isn't a problem.
982 // Volatile is not necessary here for correctness, but this data _is_ volatile
983 // so I've marked it as such.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200984 volatile uint8_t received_signal_[kNumPosixSignals];
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000985};
986
987class PosixSignalDispatcher : public Dispatcher {
988 public:
989 PosixSignalDispatcher(PhysicalSocketServer *owner) : owner_(owner) {
990 owner_->Add(this);
991 }
992
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000993 ~PosixSignalDispatcher() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000994 owner_->Remove(this);
995 }
996
Peter Boström0c4e06b2015-10-07 12:23:21 +0200997 uint32_t GetRequestedEvents() override { return DE_READ; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000998
Peter Boström0c4e06b2015-10-07 12:23:21 +0200999 void OnPreEvent(uint32_t ff) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001000 // Events might get grouped if signals come very fast, so we read out up to
1001 // 16 bytes to make sure we keep the pipe empty.
Peter Boström0c4e06b2015-10-07 12:23:21 +02001002 uint8_t b[16];
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001003 ssize_t ret = read(GetDescriptor(), b, sizeof(b));
1004 if (ret < 0) {
1005 LOG_ERR(LS_WARNING) << "Error in read()";
1006 } else if (ret == 0) {
1007 LOG(LS_WARNING) << "Should have read at least one byte";
1008 }
1009 }
1010
Peter Boström0c4e06b2015-10-07 12:23:21 +02001011 void OnEvent(uint32_t ff, int err) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001012 for (int signum = 0; signum < PosixSignalHandler::kNumPosixSignals;
1013 ++signum) {
1014 if (PosixSignalHandler::Instance()->IsSignalSet(signum)) {
1015 PosixSignalHandler::Instance()->ClearSignal(signum);
1016 HandlerMap::iterator i = handlers_.find(signum);
1017 if (i == handlers_.end()) {
1018 // This can happen if a signal is delivered to our process at around
1019 // the same time as we unset our handler for it. It is not an error
1020 // condition, but it's unusual enough to be worth logging.
1021 LOG(LS_INFO) << "Received signal with no handler: " << signum;
1022 } else {
1023 // Otherwise, execute our handler.
1024 (*i->second)(signum);
1025 }
1026 }
1027 }
1028 }
1029
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001030 int GetDescriptor() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001031 return PosixSignalHandler::Instance()->GetDescriptor();
1032 }
1033
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001034 bool IsDescriptorClosed() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001035
1036 void SetHandler(int signum, void (*handler)(int)) {
1037 handlers_[signum] = handler;
1038 }
1039
1040 void ClearHandler(int signum) {
1041 handlers_.erase(signum);
1042 }
1043
1044 bool HasHandlers() {
1045 return !handlers_.empty();
1046 }
1047
1048 private:
1049 typedef std::map<int, void (*)(int)> HandlerMap;
1050
1051 HandlerMap handlers_;
1052 // Our owner.
1053 PhysicalSocketServer *owner_;
1054};
1055
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001056class FileDispatcher: public Dispatcher, public AsyncFile {
1057 public:
1058 FileDispatcher(int fd, PhysicalSocketServer *ss) : ss_(ss), fd_(fd) {
1059 set_readable(true);
1060
1061 ss_->Add(this);
1062
1063 fcntl(fd_, F_SETFL, fcntl(fd_, F_GETFL, 0) | O_NONBLOCK);
1064 }
1065
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001066 ~FileDispatcher() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001067 ss_->Remove(this);
1068 }
1069
1070 SocketServer* socketserver() { return ss_; }
1071
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001072 int GetDescriptor() override { return fd_; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001073
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001074 bool IsDescriptorClosed() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001075
Peter Boström0c4e06b2015-10-07 12:23:21 +02001076 uint32_t GetRequestedEvents() override { return flags_; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001077
Peter Boström0c4e06b2015-10-07 12:23:21 +02001078 void OnPreEvent(uint32_t ff) override {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001079
Peter Boström0c4e06b2015-10-07 12:23:21 +02001080 void OnEvent(uint32_t ff, int err) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001081 if ((ff & DE_READ) != 0)
1082 SignalReadEvent(this);
1083 if ((ff & DE_WRITE) != 0)
1084 SignalWriteEvent(this);
1085 if ((ff & DE_CLOSE) != 0)
1086 SignalCloseEvent(this, err);
1087 }
1088
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001089 bool readable() override { return (flags_ & DE_READ) != 0; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001090
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001091 void set_readable(bool value) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001092 flags_ = value ? (flags_ | DE_READ) : (flags_ & ~DE_READ);
1093 }
1094
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001095 bool writable() override { return (flags_ & DE_WRITE) != 0; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001096
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001097 void set_writable(bool value) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001098 flags_ = value ? (flags_ | DE_WRITE) : (flags_ & ~DE_WRITE);
1099 }
1100
1101 private:
1102 PhysicalSocketServer* ss_;
1103 int fd_;
1104 int flags_;
1105};
1106
1107AsyncFile* PhysicalSocketServer::CreateFile(int fd) {
1108 return new FileDispatcher(fd, this);
1109}
1110
1111#endif // WEBRTC_POSIX
1112
1113#if defined(WEBRTC_WIN)
Peter Boström0c4e06b2015-10-07 12:23:21 +02001114static uint32_t FlagsToEvents(uint32_t events) {
1115 uint32_t ffFD = FD_CLOSE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001116 if (events & DE_READ)
1117 ffFD |= FD_READ;
1118 if (events & DE_WRITE)
1119 ffFD |= FD_WRITE;
1120 if (events & DE_CONNECT)
1121 ffFD |= FD_CONNECT;
1122 if (events & DE_ACCEPT)
1123 ffFD |= FD_ACCEPT;
1124 return ffFD;
1125}
1126
1127class EventDispatcher : public Dispatcher {
1128 public:
1129 EventDispatcher(PhysicalSocketServer *ss) : ss_(ss) {
1130 hev_ = WSACreateEvent();
1131 if (hev_) {
1132 ss_->Add(this);
1133 }
1134 }
1135
1136 ~EventDispatcher() {
1137 if (hev_ != NULL) {
1138 ss_->Remove(this);
1139 WSACloseEvent(hev_);
1140 hev_ = NULL;
1141 }
1142 }
1143
1144 virtual void Signal() {
1145 if (hev_ != NULL)
1146 WSASetEvent(hev_);
1147 }
1148
Peter Boström0c4e06b2015-10-07 12:23:21 +02001149 virtual uint32_t GetRequestedEvents() { return 0; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001150
Peter Boström0c4e06b2015-10-07 12:23:21 +02001151 virtual void OnPreEvent(uint32_t ff) { WSAResetEvent(hev_); }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001152
Peter Boström0c4e06b2015-10-07 12:23:21 +02001153 virtual void OnEvent(uint32_t ff, int err) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001154
1155 virtual WSAEVENT GetWSAEvent() {
1156 return hev_;
1157 }
1158
1159 virtual SOCKET GetSocket() {
1160 return INVALID_SOCKET;
1161 }
1162
1163 virtual bool CheckSignalClose() { return false; }
1164
1165private:
1166 PhysicalSocketServer* ss_;
1167 WSAEVENT hev_;
1168};
honghaizcec0a082016-01-15 14:49:09 -08001169#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001170
1171// Sets the value of a boolean value to false when signaled.
1172class Signaler : public EventDispatcher {
1173 public:
1174 Signaler(PhysicalSocketServer* ss, bool* pf)
1175 : EventDispatcher(ss), pf_(pf) {
1176 }
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001177 ~Signaler() override { }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001178
Peter Boström0c4e06b2015-10-07 12:23:21 +02001179 void OnEvent(uint32_t ff, int err) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001180 if (pf_)
1181 *pf_ = false;
1182 }
1183
1184 private:
1185 bool *pf_;
1186};
1187
1188PhysicalSocketServer::PhysicalSocketServer()
1189 : fWait_(false) {
1190 signal_wakeup_ = new Signaler(this, &fWait_);
1191#if defined(WEBRTC_WIN)
1192 socket_ev_ = WSACreateEvent();
1193#endif
1194}
1195
1196PhysicalSocketServer::~PhysicalSocketServer() {
1197#if defined(WEBRTC_WIN)
1198 WSACloseEvent(socket_ev_);
1199#endif
1200#if defined(WEBRTC_POSIX)
1201 signal_dispatcher_.reset();
1202#endif
1203 delete signal_wakeup_;
1204 ASSERT(dispatchers_.empty());
1205}
1206
1207void PhysicalSocketServer::WakeUp() {
1208 signal_wakeup_->Signal();
1209}
1210
1211Socket* PhysicalSocketServer::CreateSocket(int type) {
1212 return CreateSocket(AF_INET, type);
1213}
1214
1215Socket* PhysicalSocketServer::CreateSocket(int family, int type) {
1216 PhysicalSocket* socket = new PhysicalSocket(this);
1217 if (socket->Create(family, type)) {
1218 return socket;
1219 } else {
1220 delete socket;
jbauch095ae152015-12-18 01:39:55 -08001221 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001222 }
1223}
1224
1225AsyncSocket* PhysicalSocketServer::CreateAsyncSocket(int type) {
1226 return CreateAsyncSocket(AF_INET, type);
1227}
1228
1229AsyncSocket* PhysicalSocketServer::CreateAsyncSocket(int family, int type) {
1230 SocketDispatcher* dispatcher = new SocketDispatcher(this);
1231 if (dispatcher->Create(family, type)) {
1232 return dispatcher;
1233 } else {
1234 delete dispatcher;
jbauch095ae152015-12-18 01:39:55 -08001235 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001236 }
1237}
1238
1239AsyncSocket* PhysicalSocketServer::WrapSocket(SOCKET s) {
1240 SocketDispatcher* dispatcher = new SocketDispatcher(s, this);
1241 if (dispatcher->Initialize()) {
1242 return dispatcher;
1243 } else {
1244 delete dispatcher;
jbauch095ae152015-12-18 01:39:55 -08001245 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001246 }
1247}
1248
1249void PhysicalSocketServer::Add(Dispatcher *pdispatcher) {
1250 CritScope cs(&crit_);
1251 // Prevent duplicates. This can cause dead dispatchers to stick around.
1252 DispatcherList::iterator pos = std::find(dispatchers_.begin(),
1253 dispatchers_.end(),
1254 pdispatcher);
1255 if (pos != dispatchers_.end())
1256 return;
1257 dispatchers_.push_back(pdispatcher);
1258}
1259
1260void PhysicalSocketServer::Remove(Dispatcher *pdispatcher) {
1261 CritScope cs(&crit_);
1262 DispatcherList::iterator pos = std::find(dispatchers_.begin(),
1263 dispatchers_.end(),
1264 pdispatcher);
1265 // We silently ignore duplicate calls to Add, so we should silently ignore
1266 // the (expected) symmetric calls to Remove. Note that this may still hide
1267 // a real issue, so we at least log a warning about it.
1268 if (pos == dispatchers_.end()) {
1269 LOG(LS_WARNING) << "PhysicalSocketServer asked to remove a unknown "
1270 << "dispatcher, potentially from a duplicate call to Add.";
1271 return;
1272 }
1273 size_t index = pos - dispatchers_.begin();
1274 dispatchers_.erase(pos);
1275 for (IteratorList::iterator it = iterators_.begin(); it != iterators_.end();
1276 ++it) {
1277 if (index < **it) {
1278 --**it;
1279 }
1280 }
1281}
1282
1283#if defined(WEBRTC_POSIX)
1284bool PhysicalSocketServer::Wait(int cmsWait, bool process_io) {
1285 // Calculate timing information
1286
1287 struct timeval *ptvWait = NULL;
1288 struct timeval tvWait;
1289 struct timeval tvStop;
1290 if (cmsWait != kForever) {
1291 // Calculate wait timeval
1292 tvWait.tv_sec = cmsWait / 1000;
1293 tvWait.tv_usec = (cmsWait % 1000) * 1000;
1294 ptvWait = &tvWait;
1295
1296 // Calculate when to return in a timeval
1297 gettimeofday(&tvStop, NULL);
1298 tvStop.tv_sec += tvWait.tv_sec;
1299 tvStop.tv_usec += tvWait.tv_usec;
1300 if (tvStop.tv_usec >= 1000000) {
1301 tvStop.tv_usec -= 1000000;
1302 tvStop.tv_sec += 1;
1303 }
1304 }
1305
1306 // Zero all fd_sets. Don't need to do this inside the loop since
1307 // select() zeros the descriptors not signaled
1308
1309 fd_set fdsRead;
1310 FD_ZERO(&fdsRead);
1311 fd_set fdsWrite;
1312 FD_ZERO(&fdsWrite);
pbos@webrtc.org27e58982014-10-07 17:56:53 +00001313 // Explicitly unpoison these FDs on MemorySanitizer which doesn't handle the
1314 // inline assembly in FD_ZERO.
1315 // http://crbug.com/344505
1316#ifdef MEMORY_SANITIZER
1317 __msan_unpoison(&fdsRead, sizeof(fdsRead));
1318 __msan_unpoison(&fdsWrite, sizeof(fdsWrite));
1319#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001320
1321 fWait_ = true;
1322
1323 while (fWait_) {
1324 int fdmax = -1;
1325 {
1326 CritScope cr(&crit_);
1327 for (size_t i = 0; i < dispatchers_.size(); ++i) {
1328 // Query dispatchers for read and write wait state
1329 Dispatcher *pdispatcher = dispatchers_[i];
1330 ASSERT(pdispatcher);
1331 if (!process_io && (pdispatcher != signal_wakeup_))
1332 continue;
1333 int fd = pdispatcher->GetDescriptor();
1334 if (fd > fdmax)
1335 fdmax = fd;
1336
Peter Boström0c4e06b2015-10-07 12:23:21 +02001337 uint32_t ff = pdispatcher->GetRequestedEvents();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001338 if (ff & (DE_READ | DE_ACCEPT))
1339 FD_SET(fd, &fdsRead);
1340 if (ff & (DE_WRITE | DE_CONNECT))
1341 FD_SET(fd, &fdsWrite);
1342 }
1343 }
1344
1345 // Wait then call handlers as appropriate
1346 // < 0 means error
1347 // 0 means timeout
1348 // > 0 means count of descriptors ready
1349 int n = select(fdmax + 1, &fdsRead, &fdsWrite, NULL, ptvWait);
1350
1351 // If error, return error.
1352 if (n < 0) {
1353 if (errno != EINTR) {
1354 LOG_E(LS_ERROR, EN, errno) << "select";
1355 return false;
1356 }
1357 // Else ignore the error and keep going. If this EINTR was for one of the
1358 // signals managed by this PhysicalSocketServer, the
1359 // PosixSignalDeliveryDispatcher will be in the signaled state in the next
1360 // iteration.
1361 } else if (n == 0) {
1362 // If timeout, return success
1363 return true;
1364 } else {
1365 // We have signaled descriptors
1366 CritScope cr(&crit_);
1367 for (size_t i = 0; i < dispatchers_.size(); ++i) {
1368 Dispatcher *pdispatcher = dispatchers_[i];
1369 int fd = pdispatcher->GetDescriptor();
Peter Boström0c4e06b2015-10-07 12:23:21 +02001370 uint32_t ff = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001371 int errcode = 0;
1372
1373 // Reap any error code, which can be signaled through reads or writes.
jbauch095ae152015-12-18 01:39:55 -08001374 // TODO(pthatcher): Should we set errcode if getsockopt fails?
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001375 if (FD_ISSET(fd, &fdsRead) || FD_ISSET(fd, &fdsWrite)) {
1376 socklen_t len = sizeof(errcode);
1377 ::getsockopt(fd, SOL_SOCKET, SO_ERROR, &errcode, &len);
1378 }
1379
1380 // Check readable descriptors. If we're waiting on an accept, signal
1381 // that. Otherwise we're waiting for data, check to see if we're
1382 // readable or really closed.
jbauch095ae152015-12-18 01:39:55 -08001383 // TODO(pthatcher): Only peek at TCP descriptors.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001384 if (FD_ISSET(fd, &fdsRead)) {
1385 FD_CLR(fd, &fdsRead);
1386 if (pdispatcher->GetRequestedEvents() & DE_ACCEPT) {
1387 ff |= DE_ACCEPT;
1388 } else if (errcode || pdispatcher->IsDescriptorClosed()) {
1389 ff |= DE_CLOSE;
1390 } else {
1391 ff |= DE_READ;
1392 }
1393 }
1394
1395 // Check writable descriptors. If we're waiting on a connect, detect
1396 // success versus failure by the reaped error code.
1397 if (FD_ISSET(fd, &fdsWrite)) {
1398 FD_CLR(fd, &fdsWrite);
1399 if (pdispatcher->GetRequestedEvents() & DE_CONNECT) {
1400 if (!errcode) {
1401 ff |= DE_CONNECT;
1402 } else {
1403 ff |= DE_CLOSE;
1404 }
1405 } else {
1406 ff |= DE_WRITE;
1407 }
1408 }
1409
1410 // Tell the descriptor about the event.
1411 if (ff != 0) {
1412 pdispatcher->OnPreEvent(ff);
1413 pdispatcher->OnEvent(ff, errcode);
1414 }
1415 }
1416 }
1417
1418 // Recalc the time remaining to wait. Doing it here means it doesn't get
1419 // calced twice the first time through the loop
1420 if (ptvWait) {
1421 ptvWait->tv_sec = 0;
1422 ptvWait->tv_usec = 0;
1423 struct timeval tvT;
1424 gettimeofday(&tvT, NULL);
1425 if ((tvStop.tv_sec > tvT.tv_sec)
1426 || ((tvStop.tv_sec == tvT.tv_sec)
1427 && (tvStop.tv_usec > tvT.tv_usec))) {
1428 ptvWait->tv_sec = tvStop.tv_sec - tvT.tv_sec;
1429 ptvWait->tv_usec = tvStop.tv_usec - tvT.tv_usec;
1430 if (ptvWait->tv_usec < 0) {
1431 ASSERT(ptvWait->tv_sec > 0);
1432 ptvWait->tv_usec += 1000000;
1433 ptvWait->tv_sec -= 1;
1434 }
1435 }
1436 }
1437 }
1438
1439 return true;
1440}
1441
1442static void GlobalSignalHandler(int signum) {
1443 PosixSignalHandler::Instance()->OnPosixSignalReceived(signum);
1444}
1445
1446bool PhysicalSocketServer::SetPosixSignalHandler(int signum,
1447 void (*handler)(int)) {
1448 // If handler is SIG_IGN or SIG_DFL then clear our user-level handler,
1449 // otherwise set one.
1450 if (handler == SIG_IGN || handler == SIG_DFL) {
1451 if (!InstallSignal(signum, handler)) {
1452 return false;
1453 }
1454 if (signal_dispatcher_) {
1455 signal_dispatcher_->ClearHandler(signum);
1456 if (!signal_dispatcher_->HasHandlers()) {
1457 signal_dispatcher_.reset();
1458 }
1459 }
1460 } else {
1461 if (!signal_dispatcher_) {
1462 signal_dispatcher_.reset(new PosixSignalDispatcher(this));
1463 }
1464 signal_dispatcher_->SetHandler(signum, handler);
1465 if (!InstallSignal(signum, &GlobalSignalHandler)) {
1466 return false;
1467 }
1468 }
1469 return true;
1470}
1471
1472Dispatcher* PhysicalSocketServer::signal_dispatcher() {
1473 return signal_dispatcher_.get();
1474}
1475
1476bool PhysicalSocketServer::InstallSignal(int signum, void (*handler)(int)) {
1477 struct sigaction act;
1478 // It doesn't really matter what we set this mask to.
1479 if (sigemptyset(&act.sa_mask) != 0) {
1480 LOG_ERR(LS_ERROR) << "Couldn't set mask";
1481 return false;
1482 }
1483 act.sa_handler = handler;
1484#if !defined(__native_client__)
1485 // Use SA_RESTART so that our syscalls don't get EINTR, since we don't need it
1486 // and it's a nuisance. Though some syscalls still return EINTR and there's no
1487 // real standard for which ones. :(
1488 act.sa_flags = SA_RESTART;
1489#else
1490 act.sa_flags = 0;
1491#endif
1492 if (sigaction(signum, &act, NULL) != 0) {
1493 LOG_ERR(LS_ERROR) << "Couldn't set sigaction";
1494 return false;
1495 }
1496 return true;
1497}
1498#endif // WEBRTC_POSIX
1499
1500#if defined(WEBRTC_WIN)
1501bool PhysicalSocketServer::Wait(int cmsWait, bool process_io) {
Honghai Zhang82d78622016-05-06 11:29:15 -07001502 int64_t cmsTotal = cmsWait;
1503 int64_t cmsElapsed = 0;
1504 int64_t msStart = Time();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001505
1506 fWait_ = true;
1507 while (fWait_) {
1508 std::vector<WSAEVENT> events;
1509 std::vector<Dispatcher *> event_owners;
1510
1511 events.push_back(socket_ev_);
1512
1513 {
1514 CritScope cr(&crit_);
1515 size_t i = 0;
1516 iterators_.push_back(&i);
1517 // Don't track dispatchers_.size(), because we want to pick up any new
1518 // dispatchers that were added while processing the loop.
1519 while (i < dispatchers_.size()) {
1520 Dispatcher* disp = dispatchers_[i++];
1521 if (!process_io && (disp != signal_wakeup_))
1522 continue;
1523 SOCKET s = disp->GetSocket();
1524 if (disp->CheckSignalClose()) {
1525 // We just signalled close, don't poll this socket
1526 } else if (s != INVALID_SOCKET) {
1527 WSAEventSelect(s,
1528 events[0],
1529 FlagsToEvents(disp->GetRequestedEvents()));
1530 } else {
1531 events.push_back(disp->GetWSAEvent());
1532 event_owners.push_back(disp);
1533 }
1534 }
1535 ASSERT(iterators_.back() == &i);
1536 iterators_.pop_back();
1537 }
1538
1539 // Which is shorter, the delay wait or the asked wait?
1540
Honghai Zhang82d78622016-05-06 11:29:15 -07001541 int64_t cmsNext;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001542 if (cmsWait == kForever) {
1543 cmsNext = cmsWait;
1544 } else {
Honghai Zhang82d78622016-05-06 11:29:15 -07001545 cmsNext = std::max<int64_t>(0, cmsTotal - cmsElapsed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001546 }
1547
1548 // Wait for one of the events to signal
1549 DWORD dw = WSAWaitForMultipleEvents(static_cast<DWORD>(events.size()),
1550 &events[0],
1551 false,
Honghai Zhang82d78622016-05-06 11:29:15 -07001552 static_cast<DWORD>(cmsNext),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001553 false);
1554
1555 if (dw == WSA_WAIT_FAILED) {
1556 // Failed?
jbauch095ae152015-12-18 01:39:55 -08001557 // TODO(pthatcher): need a better strategy than this!
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001558 WSAGetLastError();
1559 ASSERT(false);
1560 return false;
1561 } else if (dw == WSA_WAIT_TIMEOUT) {
1562 // Timeout?
1563 return true;
1564 } else {
1565 // Figure out which one it is and call it
1566 CritScope cr(&crit_);
1567 int index = dw - WSA_WAIT_EVENT_0;
1568 if (index > 0) {
1569 --index; // The first event is the socket event
1570 event_owners[index]->OnPreEvent(0);
1571 event_owners[index]->OnEvent(0, 0);
1572 } else if (process_io) {
1573 size_t i = 0, end = dispatchers_.size();
1574 iterators_.push_back(&i);
1575 iterators_.push_back(&end); // Don't iterate over new dispatchers.
1576 while (i < end) {
1577 Dispatcher* disp = dispatchers_[i++];
1578 SOCKET s = disp->GetSocket();
1579 if (s == INVALID_SOCKET)
1580 continue;
1581
1582 WSANETWORKEVENTS wsaEvents;
1583 int err = WSAEnumNetworkEvents(s, events[0], &wsaEvents);
1584 if (err == 0) {
1585
1586#if LOGGING
1587 {
1588 if ((wsaEvents.lNetworkEvents & FD_READ) &&
1589 wsaEvents.iErrorCode[FD_READ_BIT] != 0) {
1590 LOG(WARNING) << "PhysicalSocketServer got FD_READ_BIT error "
1591 << wsaEvents.iErrorCode[FD_READ_BIT];
1592 }
1593 if ((wsaEvents.lNetworkEvents & FD_WRITE) &&
1594 wsaEvents.iErrorCode[FD_WRITE_BIT] != 0) {
1595 LOG(WARNING) << "PhysicalSocketServer got FD_WRITE_BIT error "
1596 << wsaEvents.iErrorCode[FD_WRITE_BIT];
1597 }
1598 if ((wsaEvents.lNetworkEvents & FD_CONNECT) &&
1599 wsaEvents.iErrorCode[FD_CONNECT_BIT] != 0) {
1600 LOG(WARNING) << "PhysicalSocketServer got FD_CONNECT_BIT error "
1601 << wsaEvents.iErrorCode[FD_CONNECT_BIT];
1602 }
1603 if ((wsaEvents.lNetworkEvents & FD_ACCEPT) &&
1604 wsaEvents.iErrorCode[FD_ACCEPT_BIT] != 0) {
1605 LOG(WARNING) << "PhysicalSocketServer got FD_ACCEPT_BIT error "
1606 << wsaEvents.iErrorCode[FD_ACCEPT_BIT];
1607 }
1608 if ((wsaEvents.lNetworkEvents & FD_CLOSE) &&
1609 wsaEvents.iErrorCode[FD_CLOSE_BIT] != 0) {
1610 LOG(WARNING) << "PhysicalSocketServer got FD_CLOSE_BIT error "
1611 << wsaEvents.iErrorCode[FD_CLOSE_BIT];
1612 }
1613 }
1614#endif
Peter Boström0c4e06b2015-10-07 12:23:21 +02001615 uint32_t ff = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001616 int errcode = 0;
1617 if (wsaEvents.lNetworkEvents & FD_READ)
1618 ff |= DE_READ;
1619 if (wsaEvents.lNetworkEvents & FD_WRITE)
1620 ff |= DE_WRITE;
1621 if (wsaEvents.lNetworkEvents & FD_CONNECT) {
1622 if (wsaEvents.iErrorCode[FD_CONNECT_BIT] == 0) {
1623 ff |= DE_CONNECT;
1624 } else {
1625 ff |= DE_CLOSE;
1626 errcode = wsaEvents.iErrorCode[FD_CONNECT_BIT];
1627 }
1628 }
1629 if (wsaEvents.lNetworkEvents & FD_ACCEPT)
1630 ff |= DE_ACCEPT;
1631 if (wsaEvents.lNetworkEvents & FD_CLOSE) {
1632 ff |= DE_CLOSE;
1633 errcode = wsaEvents.iErrorCode[FD_CLOSE_BIT];
1634 }
1635 if (ff != 0) {
1636 disp->OnPreEvent(ff);
1637 disp->OnEvent(ff, errcode);
1638 }
1639 }
1640 }
1641 ASSERT(iterators_.back() == &end);
1642 iterators_.pop_back();
1643 ASSERT(iterators_.back() == &i);
1644 iterators_.pop_back();
1645 }
1646
1647 // Reset the network event until new activity occurs
1648 WSAResetEvent(socket_ev_);
1649 }
1650
1651 // Break?
1652 if (!fWait_)
1653 break;
1654 cmsElapsed = TimeSince(msStart);
1655 if ((cmsWait != kForever) && (cmsElapsed >= cmsWait)) {
1656 break;
1657 }
1658 }
1659
1660 // Done
1661 return true;
1662}
honghaizcec0a082016-01-15 14:49:09 -08001663#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001664
1665} // namespace rtc