blob: 708499df531f076af2210137c0eb2ed4795c6bab [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
honghaizcec0a082016-01-15 14:49:09 -080010#include "webrtc/base/physicalsocketserver.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000011
12#if defined(_MSC_VER) && _MSC_VER < 1300
13#pragma warning(disable:4786)
14#endif
15
16#include <assert.h>
17
pbos@webrtc.org27e58982014-10-07 17:56:53 +000018#ifdef MEMORY_SANITIZER
19#include <sanitizer/msan_interface.h>
20#endif
21
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000022#if defined(WEBRTC_POSIX)
23#include <string.h>
24#include <errno.h>
25#include <fcntl.h>
26#include <sys/time.h>
27#include <sys/select.h>
28#include <unistd.h>
29#include <signal.h>
30#endif
31
32#if defined(WEBRTC_WIN)
33#define WIN32_LEAN_AND_MEAN
34#include <windows.h>
35#include <winsock2.h>
36#include <ws2tcpip.h>
37#undef SetPort
38#endif
39
40#include <algorithm>
41#include <map>
42
tfarina5237aaf2015-11-10 23:44:30 -080043#include "webrtc/base/arraysize.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000044#include "webrtc/base/basictypes.h"
45#include "webrtc/base/byteorder.h"
46#include "webrtc/base/common.h"
47#include "webrtc/base/logging.h"
honghaizcec0a082016-01-15 14:49:09 -080048#include "webrtc/base/networkmonitor.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000049#include "webrtc/base/timeutils.h"
50#include "webrtc/base/winping.h"
51#include "webrtc/base/win32socketinit.h"
52
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000053#if defined(WEBRTC_POSIX)
54#include <netinet/tcp.h> // for TCP_NODELAY
55#define IP_MTU 14 // Until this is integrated from linux/in.h to netinet/in.h
56typedef void* SockOptArg;
57#endif // WEBRTC_POSIX
58
59#if defined(WEBRTC_WIN)
60typedef char* SockOptArg;
61#endif
62
63namespace rtc {
64
65#if defined(WEBRTC_WIN)
66// Standard MTUs, from RFC 1191
Peter Boström0c4e06b2015-10-07 12:23:21 +020067const uint16_t PACKET_MAXIMUMS[] = {
68 65535, // Theoretical maximum, Hyperchannel
69 32000, // Nothing
70 17914, // 16Mb IBM Token Ring
71 8166, // IEEE 802.4
72 // 4464, // IEEE 802.5 (4Mb max)
73 4352, // FDDI
74 // 2048, // Wideband Network
75 2002, // IEEE 802.5 (4Mb recommended)
76 // 1536, // Expermental Ethernet Networks
77 // 1500, // Ethernet, Point-to-Point (default)
78 1492, // IEEE 802.3
79 1006, // SLIP, ARPANET
80 // 576, // X.25 Networks
81 // 544, // DEC IP Portal
82 // 512, // NETBIOS
83 508, // IEEE 802/Source-Rt Bridge, ARCNET
84 296, // Point-to-Point (low delay)
85 68, // Official minimum
86 0, // End of list marker
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000087};
88
89static const int IP_HEADER_SIZE = 20u;
90static const int IPV6_HEADER_SIZE = 40u;
91static const int ICMP_HEADER_SIZE = 8u;
92static const int ICMP_PING_TIMEOUT_MILLIS = 10000u;
93#endif
94
jbauch095ae152015-12-18 01:39:55 -080095PhysicalSocket::PhysicalSocket(PhysicalSocketServer* ss, SOCKET s)
96 : ss_(ss), s_(s), enabled_events_(0), error_(0),
97 state_((s == INVALID_SOCKET) ? CS_CLOSED : CS_CONNECTED),
98 resolver_(nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000099#if defined(WEBRTC_WIN)
jbauch095ae152015-12-18 01:39:55 -0800100 // EnsureWinsockInit() ensures that winsock is initialized. The default
101 // version of this function doesn't do anything because winsock is
102 // initialized by constructor of a static object. If neccessary libjingle
103 // users can link it with a different version of this function by replacing
104 // win32socketinit.cc. See win32socketinit.cc for more details.
105 EnsureWinsockInit();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000106#endif
jbauch095ae152015-12-18 01:39:55 -0800107 if (s_ != INVALID_SOCKET) {
108 enabled_events_ = DE_READ | DE_WRITE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000109
jbauch095ae152015-12-18 01:39:55 -0800110 int type = SOCK_STREAM;
111 socklen_t len = sizeof(type);
112 VERIFY(0 == getsockopt(s_, SOL_SOCKET, SO_TYPE, (SockOptArg)&type, &len));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000113 udp_ = (SOCK_DGRAM == type);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000114 }
jbauch095ae152015-12-18 01:39:55 -0800115}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000116
jbauch095ae152015-12-18 01:39:55 -0800117PhysicalSocket::~PhysicalSocket() {
118 Close();
119}
120
121bool PhysicalSocket::Create(int family, int type) {
122 Close();
123 s_ = ::socket(family, type, 0);
124 udp_ = (SOCK_DGRAM == type);
125 UpdateLastError();
126 if (udp_)
127 enabled_events_ = DE_READ | DE_WRITE;
128 return s_ != INVALID_SOCKET;
129}
130
131SocketAddress PhysicalSocket::GetLocalAddress() const {
132 sockaddr_storage addr_storage = {0};
133 socklen_t addrlen = sizeof(addr_storage);
134 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
135 int result = ::getsockname(s_, addr, &addrlen);
136 SocketAddress address;
137 if (result >= 0) {
138 SocketAddressFromSockAddrStorage(addr_storage, &address);
139 } else {
140 LOG(LS_WARNING) << "GetLocalAddress: unable to get local addr, socket="
141 << s_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000142 }
jbauch095ae152015-12-18 01:39:55 -0800143 return address;
144}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000145
jbauch095ae152015-12-18 01:39:55 -0800146SocketAddress PhysicalSocket::GetRemoteAddress() const {
147 sockaddr_storage addr_storage = {0};
148 socklen_t addrlen = sizeof(addr_storage);
149 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
150 int result = ::getpeername(s_, addr, &addrlen);
151 SocketAddress address;
152 if (result >= 0) {
153 SocketAddressFromSockAddrStorage(addr_storage, &address);
154 } else {
155 LOG(LS_WARNING) << "GetRemoteAddress: unable to get remote addr, socket="
156 << s_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000157 }
jbauch095ae152015-12-18 01:39:55 -0800158 return address;
159}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000160
jbauch095ae152015-12-18 01:39:55 -0800161int PhysicalSocket::Bind(const SocketAddress& bind_addr) {
162 sockaddr_storage addr_storage;
163 size_t len = bind_addr.ToSockAddrStorage(&addr_storage);
164 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
165 int err = ::bind(s_, addr, static_cast<int>(len));
166 UpdateLastError();
tfarinaa41ab932015-10-30 16:08:48 -0700167#if !defined(NDEBUG)
jbauch095ae152015-12-18 01:39:55 -0800168 if (0 == err) {
169 dbg_addr_ = "Bound @ ";
170 dbg_addr_.append(GetLocalAddress().ToString());
171 }
tfarinaa41ab932015-10-30 16:08:48 -0700172#endif
honghaizcec0a082016-01-15 14:49:09 -0800173 if (ss_->network_binder()) {
174 int result =
175 ss_->network_binder()->BindSocketToNetwork(s_, bind_addr.ipaddr());
176 if (result < 0) {
177 LOG(LS_INFO) << "Binding socket to network address "
178 << bind_addr.ipaddr().ToString() << " result " << result;
179 }
180 }
jbauch095ae152015-12-18 01:39:55 -0800181 return err;
182}
183
184int PhysicalSocket::Connect(const SocketAddress& addr) {
185 // TODO(pthatcher): Implicit creation is required to reconnect...
186 // ...but should we make it more explicit?
187 if (state_ != CS_CLOSED) {
188 SetError(EALREADY);
189 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000190 }
jbauch095ae152015-12-18 01:39:55 -0800191 if (addr.IsUnresolvedIP()) {
192 LOG(LS_VERBOSE) << "Resolving addr in PhysicalSocket::Connect";
193 resolver_ = new AsyncResolver();
194 resolver_->SignalDone.connect(this, &PhysicalSocket::OnResolveResult);
195 resolver_->Start(addr);
196 state_ = CS_CONNECTING;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000197 return 0;
198 }
199
jbauch095ae152015-12-18 01:39:55 -0800200 return DoConnect(addr);
201}
202
203int PhysicalSocket::DoConnect(const SocketAddress& connect_addr) {
204 if ((s_ == INVALID_SOCKET) &&
205 !Create(connect_addr.family(), SOCK_STREAM)) {
206 return SOCKET_ERROR;
207 }
208 sockaddr_storage addr_storage;
209 size_t len = connect_addr.ToSockAddrStorage(&addr_storage);
210 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
211 int err = ::connect(s_, addr, static_cast<int>(len));
212 UpdateLastError();
213 if (err == 0) {
214 state_ = CS_CONNECTED;
215 } else if (IsBlockingError(GetError())) {
216 state_ = CS_CONNECTING;
217 enabled_events_ |= DE_CONNECT;
218 } else {
219 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000220 }
221
jbauch095ae152015-12-18 01:39:55 -0800222 enabled_events_ |= DE_READ | DE_WRITE;
223 return 0;
224}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000225
jbauch095ae152015-12-18 01:39:55 -0800226int PhysicalSocket::GetError() const {
227 CritScope cs(&crit_);
228 return error_;
229}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000230
jbauch095ae152015-12-18 01:39:55 -0800231void PhysicalSocket::SetError(int error) {
232 CritScope cs(&crit_);
233 error_ = error;
234}
235
236AsyncSocket::ConnState PhysicalSocket::GetState() const {
237 return state_;
238}
239
240int PhysicalSocket::GetOption(Option opt, int* value) {
241 int slevel;
242 int sopt;
243 if (TranslateOption(opt, &slevel, &sopt) == -1)
244 return -1;
245 socklen_t optlen = sizeof(*value);
246 int ret = ::getsockopt(s_, slevel, sopt, (SockOptArg)value, &optlen);
247 if (ret != -1 && opt == OPT_DONTFRAGMENT) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000248#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800249 *value = (*value != IP_PMTUDISC_DONT) ? 1 : 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000250#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000251 }
jbauch095ae152015-12-18 01:39:55 -0800252 return ret;
253}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000254
jbauch095ae152015-12-18 01:39:55 -0800255int PhysicalSocket::SetOption(Option opt, int value) {
256 int slevel;
257 int sopt;
258 if (TranslateOption(opt, &slevel, &sopt) == -1)
259 return -1;
260 if (opt == OPT_DONTFRAGMENT) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000261#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800262 value = (value) ? IP_PMTUDISC_DO : IP_PMTUDISC_DONT;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000263#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000264 }
jbauch095ae152015-12-18 01:39:55 -0800265 return ::setsockopt(s_, slevel, sopt, (SockOptArg)&value, sizeof(value));
266}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000267
jbauch095ae152015-12-18 01:39:55 -0800268int PhysicalSocket::Send(const void* pv, size_t cb) {
jbauchf2a2bf42016-02-03 16:45:32 -0800269 int sent = DoSend(s_, reinterpret_cast<const char *>(pv),
270 static_cast<int>(cb),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000271#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800272 // Suppress SIGPIPE. Without this, attempting to send on a socket whose
273 // other end is closed will result in a SIGPIPE signal being raised to
274 // our process, which by default will terminate the process, which we
275 // don't want. By specifying this flag, we'll just get the error EPIPE
276 // instead and can handle the error gracefully.
277 MSG_NOSIGNAL
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000278#else
jbauch095ae152015-12-18 01:39:55 -0800279 0
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000280#endif
jbauch095ae152015-12-18 01:39:55 -0800281 );
282 UpdateLastError();
283 MaybeRemapSendError();
284 // We have seen minidumps where this may be false.
285 ASSERT(sent <= static_cast<int>(cb));
jbauchf2a2bf42016-02-03 16:45:32 -0800286 if ((sent > 0 && sent < static_cast<int>(cb)) ||
287 (sent < 0 && IsBlockingError(GetError()))) {
jbauch095ae152015-12-18 01:39:55 -0800288 enabled_events_ |= DE_WRITE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000289 }
jbauch095ae152015-12-18 01:39:55 -0800290 return sent;
291}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000292
jbauch095ae152015-12-18 01:39:55 -0800293int PhysicalSocket::SendTo(const void* buffer,
294 size_t length,
295 const SocketAddress& addr) {
296 sockaddr_storage saddr;
297 size_t len = addr.ToSockAddrStorage(&saddr);
jbauchf2a2bf42016-02-03 16:45:32 -0800298 int sent = DoSendTo(
jbauch095ae152015-12-18 01:39:55 -0800299 s_, static_cast<const char *>(buffer), static_cast<int>(length),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000300#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 01:39:55 -0800301 // Suppress SIGPIPE. See above for explanation.
302 MSG_NOSIGNAL,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000303#else
jbauch095ae152015-12-18 01:39:55 -0800304 0,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000305#endif
jbauch095ae152015-12-18 01:39:55 -0800306 reinterpret_cast<sockaddr*>(&saddr), static_cast<int>(len));
307 UpdateLastError();
308 MaybeRemapSendError();
309 // We have seen minidumps where this may be false.
310 ASSERT(sent <= static_cast<int>(length));
jbauchf2a2bf42016-02-03 16:45:32 -0800311 if ((sent > 0 && sent < static_cast<int>(length)) ||
312 (sent < 0 && IsBlockingError(GetError()))) {
jbauch095ae152015-12-18 01:39:55 -0800313 enabled_events_ |= DE_WRITE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000314 }
jbauch095ae152015-12-18 01:39:55 -0800315 return sent;
316}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000317
jbauch095ae152015-12-18 01:39:55 -0800318int PhysicalSocket::Recv(void* buffer, size_t length) {
319 int received = ::recv(s_, static_cast<char*>(buffer),
320 static_cast<int>(length), 0);
321 if ((received == 0) && (length != 0)) {
322 // Note: on graceful shutdown, recv can return 0. In this case, we
323 // pretend it is blocking, and then signal close, so that simplifying
324 // assumptions can be made about Recv.
325 LOG(LS_WARNING) << "EOF from socket; deferring close event";
326 // Must turn this back on so that the select() loop will notice the close
327 // event.
328 enabled_events_ |= DE_READ;
329 SetError(EWOULDBLOCK);
330 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000331 }
jbauch095ae152015-12-18 01:39:55 -0800332 UpdateLastError();
333 int error = GetError();
334 bool success = (received >= 0) || IsBlockingError(error);
335 if (udp_ || success) {
336 enabled_events_ |= DE_READ;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000337 }
jbauch095ae152015-12-18 01:39:55 -0800338 if (!success) {
339 LOG_F(LS_VERBOSE) << "Error = " << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000340 }
jbauch095ae152015-12-18 01:39:55 -0800341 return received;
342}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000343
jbauch095ae152015-12-18 01:39:55 -0800344int PhysicalSocket::RecvFrom(void* buffer,
345 size_t length,
346 SocketAddress* out_addr) {
347 sockaddr_storage addr_storage;
348 socklen_t addr_len = sizeof(addr_storage);
349 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
350 int received = ::recvfrom(s_, static_cast<char*>(buffer),
351 static_cast<int>(length), 0, addr, &addr_len);
352 UpdateLastError();
353 if ((received >= 0) && (out_addr != nullptr))
354 SocketAddressFromSockAddrStorage(addr_storage, out_addr);
355 int error = GetError();
356 bool success = (received >= 0) || IsBlockingError(error);
357 if (udp_ || success) {
358 enabled_events_ |= DE_READ;
359 }
360 if (!success) {
361 LOG_F(LS_VERBOSE) << "Error = " << error;
362 }
363 return received;
364}
365
366int PhysicalSocket::Listen(int backlog) {
367 int err = ::listen(s_, backlog);
368 UpdateLastError();
369 if (err == 0) {
370 state_ = CS_CONNECTING;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000371 enabled_events_ |= DE_ACCEPT;
jbauch095ae152015-12-18 01:39:55 -0800372#if !defined(NDEBUG)
373 dbg_addr_ = "Listening @ ";
374 dbg_addr_.append(GetLocalAddress().ToString());
375#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000376 }
jbauch095ae152015-12-18 01:39:55 -0800377 return err;
378}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000379
jbauch095ae152015-12-18 01:39:55 -0800380AsyncSocket* PhysicalSocket::Accept(SocketAddress* out_addr) {
381 // Always re-subscribe DE_ACCEPT to make sure new incoming connections will
382 // trigger an event even if DoAccept returns an error here.
383 enabled_events_ |= DE_ACCEPT;
384 sockaddr_storage addr_storage;
385 socklen_t addr_len = sizeof(addr_storage);
386 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
387 SOCKET s = DoAccept(s_, addr, &addr_len);
388 UpdateLastError();
389 if (s == INVALID_SOCKET)
390 return nullptr;
391 if (out_addr != nullptr)
392 SocketAddressFromSockAddrStorage(addr_storage, out_addr);
393 return ss_->WrapSocket(s);
394}
395
396int PhysicalSocket::Close() {
397 if (s_ == INVALID_SOCKET)
398 return 0;
399 int err = ::closesocket(s_);
400 UpdateLastError();
401 s_ = INVALID_SOCKET;
402 state_ = CS_CLOSED;
403 enabled_events_ = 0;
404 if (resolver_) {
405 resolver_->Destroy(false);
406 resolver_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000407 }
jbauch095ae152015-12-18 01:39:55 -0800408 return err;
409}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000410
jbauch095ae152015-12-18 01:39:55 -0800411int PhysicalSocket::EstimateMTU(uint16_t* mtu) {
412 SocketAddress addr = GetRemoteAddress();
413 if (addr.IsAnyIP()) {
414 SetError(ENOTCONN);
415 return -1;
416 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000417
418#if defined(WEBRTC_WIN)
jbauch095ae152015-12-18 01:39:55 -0800419 // Gets the interface MTU (TTL=1) for the interface used to reach |addr|.
420 WinPing ping;
421 if (!ping.IsValid()) {
422 SetError(EINVAL); // can't think of a better error ID
423 return -1;
424 }
425 int header_size = ICMP_HEADER_SIZE;
426 if (addr.family() == AF_INET6) {
427 header_size += IPV6_HEADER_SIZE;
428 } else if (addr.family() == AF_INET) {
429 header_size += IP_HEADER_SIZE;
430 }
431
432 for (int level = 0; PACKET_MAXIMUMS[level + 1] > 0; ++level) {
433 int32_t size = PACKET_MAXIMUMS[level] - header_size;
434 WinPing::PingResult result = ping.Ping(addr.ipaddr(), size,
435 ICMP_PING_TIMEOUT_MILLIS,
436 1, false);
437 if (result == WinPing::PING_FAIL) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000438 SetError(EINVAL); // can't think of a better error ID
439 return -1;
jbauch095ae152015-12-18 01:39:55 -0800440 } else if (result != WinPing::PING_TOO_LARGE) {
441 *mtu = PACKET_MAXIMUMS[level];
442 return 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000443 }
jbauch095ae152015-12-18 01:39:55 -0800444 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000445
jbauch095ae152015-12-18 01:39:55 -0800446 ASSERT(false);
447 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000448#elif defined(WEBRTC_MAC)
jbauch095ae152015-12-18 01:39:55 -0800449 // No simple way to do this on Mac OS X.
450 // SIOCGIFMTU would work if we knew which interface would be used, but
451 // figuring that out is pretty complicated. For now we'll return an error
452 // and let the caller pick a default MTU.
453 SetError(EINVAL);
454 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000455#elif defined(WEBRTC_LINUX)
jbauch095ae152015-12-18 01:39:55 -0800456 // Gets the path MTU.
457 int value;
458 socklen_t vlen = sizeof(value);
459 int err = getsockopt(s_, IPPROTO_IP, IP_MTU, &value, &vlen);
460 if (err < 0) {
461 UpdateLastError();
462 return err;
463 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000464
jbauch095ae152015-12-18 01:39:55 -0800465 ASSERT((0 <= value) && (value <= 65536));
466 *mtu = value;
467 return 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000468#elif defined(__native_client__)
jbauch095ae152015-12-18 01:39:55 -0800469 // Most socket operations, including this, will fail in NaCl's sandbox.
470 error_ = EACCES;
471 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000472#endif
jbauch095ae152015-12-18 01:39:55 -0800473}
474
jbauch095ae152015-12-18 01:39:55 -0800475SOCKET PhysicalSocket::DoAccept(SOCKET socket,
476 sockaddr* addr,
477 socklen_t* addrlen) {
478 return ::accept(socket, addr, addrlen);
479}
480
jbauchf2a2bf42016-02-03 16:45:32 -0800481int PhysicalSocket::DoSend(SOCKET socket, const char* buf, int len, int flags) {
482 return ::send(socket, buf, len, flags);
483}
484
485int PhysicalSocket::DoSendTo(SOCKET socket,
486 const char* buf,
487 int len,
488 int flags,
489 const struct sockaddr* dest_addr,
490 socklen_t addrlen) {
491 return ::sendto(socket, buf, len, flags, dest_addr, addrlen);
492}
493
jbauch095ae152015-12-18 01:39:55 -0800494void PhysicalSocket::OnResolveResult(AsyncResolverInterface* resolver) {
495 if (resolver != resolver_) {
496 return;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000497 }
498
jbauch095ae152015-12-18 01:39:55 -0800499 int error = resolver_->GetError();
500 if (error == 0) {
501 error = DoConnect(resolver_->address());
502 } else {
503 Close();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000504 }
505
jbauch095ae152015-12-18 01:39:55 -0800506 if (error) {
507 SetError(error);
508 SignalCloseEvent(this, error);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000509 }
jbauch095ae152015-12-18 01:39:55 -0800510}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000511
jbauch095ae152015-12-18 01:39:55 -0800512void PhysicalSocket::UpdateLastError() {
513 SetError(LAST_SYSTEM_ERROR);
514}
515
516void PhysicalSocket::MaybeRemapSendError() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000517#if defined(WEBRTC_MAC)
jbauch095ae152015-12-18 01:39:55 -0800518 // https://developer.apple.com/library/mac/documentation/Darwin/
519 // Reference/ManPages/man2/sendto.2.html
520 // ENOBUFS - The output queue for a network interface is full.
521 // This generally indicates that the interface has stopped sending,
522 // but may be caused by transient congestion.
523 if (GetError() == ENOBUFS) {
524 SetError(EWOULDBLOCK);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000525 }
jbauch095ae152015-12-18 01:39:55 -0800526#endif
527}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000528
jbauch095ae152015-12-18 01:39:55 -0800529int PhysicalSocket::TranslateOption(Option opt, int* slevel, int* sopt) {
530 switch (opt) {
531 case OPT_DONTFRAGMENT:
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000532#if defined(WEBRTC_WIN)
jbauch095ae152015-12-18 01:39:55 -0800533 *slevel = IPPROTO_IP;
534 *sopt = IP_DONTFRAGMENT;
535 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000536#elif defined(WEBRTC_MAC) || defined(BSD) || defined(__native_client__)
jbauch095ae152015-12-18 01:39:55 -0800537 LOG(LS_WARNING) << "Socket::OPT_DONTFRAGMENT not supported.";
538 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000539#elif defined(WEBRTC_POSIX)
jbauch095ae152015-12-18 01:39:55 -0800540 *slevel = IPPROTO_IP;
541 *sopt = IP_MTU_DISCOVER;
542 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000543#endif
jbauch095ae152015-12-18 01:39:55 -0800544 case OPT_RCVBUF:
545 *slevel = SOL_SOCKET;
546 *sopt = SO_RCVBUF;
547 break;
548 case OPT_SNDBUF:
549 *slevel = SOL_SOCKET;
550 *sopt = SO_SNDBUF;
551 break;
552 case OPT_NODELAY:
553 *slevel = IPPROTO_TCP;
554 *sopt = TCP_NODELAY;
555 break;
556 case OPT_DSCP:
557 LOG(LS_WARNING) << "Socket::OPT_DSCP not supported.";
558 return -1;
559 case OPT_RTP_SENDTIME_EXTN_ID:
560 return -1; // No logging is necessary as this not a OS socket option.
561 default:
562 ASSERT(false);
563 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000564 }
jbauch095ae152015-12-18 01:39:55 -0800565 return 0;
566}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000567
jbauch4331fcd2016-01-06 22:20:28 -0800568SocketDispatcher::SocketDispatcher(PhysicalSocketServer *ss)
569#if defined(WEBRTC_WIN)
570 : PhysicalSocket(ss), id_(0), signal_close_(false)
571#else
572 : PhysicalSocket(ss)
573#endif
574{
575}
576
577SocketDispatcher::SocketDispatcher(SOCKET s, PhysicalSocketServer *ss)
578#if defined(WEBRTC_WIN)
579 : PhysicalSocket(ss, s), id_(0), signal_close_(false)
580#else
581 : PhysicalSocket(ss, s)
582#endif
583{
584}
585
586SocketDispatcher::~SocketDispatcher() {
587 Close();
588}
589
590bool SocketDispatcher::Initialize() {
591 ASSERT(s_ != INVALID_SOCKET);
592 // Must be a non-blocking
593#if defined(WEBRTC_WIN)
594 u_long argp = 1;
595 ioctlsocket(s_, FIONBIO, &argp);
596#elif defined(WEBRTC_POSIX)
597 fcntl(s_, F_SETFL, fcntl(s_, F_GETFL, 0) | O_NONBLOCK);
598#endif
599 ss_->Add(this);
600 return true;
601}
602
603bool SocketDispatcher::Create(int type) {
604 return Create(AF_INET, type);
605}
606
607bool SocketDispatcher::Create(int family, int type) {
608 // Change the socket to be non-blocking.
609 if (!PhysicalSocket::Create(family, type))
610 return false;
611
612 if (!Initialize())
613 return false;
614
615#if defined(WEBRTC_WIN)
616 do { id_ = ++next_id_; } while (id_ == 0);
617#endif
618 return true;
619}
620
621#if defined(WEBRTC_WIN)
622
623WSAEVENT SocketDispatcher::GetWSAEvent() {
624 return WSA_INVALID_EVENT;
625}
626
627SOCKET SocketDispatcher::GetSocket() {
628 return s_;
629}
630
631bool SocketDispatcher::CheckSignalClose() {
632 if (!signal_close_)
633 return false;
634
635 char ch;
636 if (recv(s_, &ch, 1, MSG_PEEK) > 0)
637 return false;
638
639 state_ = CS_CLOSED;
640 signal_close_ = false;
641 SignalCloseEvent(this, signal_err_);
642 return true;
643}
644
645int SocketDispatcher::next_id_ = 0;
646
647#elif defined(WEBRTC_POSIX)
648
649int SocketDispatcher::GetDescriptor() {
650 return s_;
651}
652
653bool SocketDispatcher::IsDescriptorClosed() {
654 // We don't have a reliable way of distinguishing end-of-stream
655 // from readability. So test on each readable call. Is this
656 // inefficient? Probably.
657 char ch;
658 ssize_t res = ::recv(s_, &ch, 1, MSG_PEEK);
659 if (res > 0) {
660 // Data available, so not closed.
661 return false;
662 } else if (res == 0) {
663 // EOF, so closed.
664 return true;
665 } else { // error
666 switch (errno) {
667 // Returned if we've already closed s_.
668 case EBADF:
669 // Returned during ungraceful peer shutdown.
670 case ECONNRESET:
671 return true;
672 default:
673 // Assume that all other errors are just blocking errors, meaning the
674 // connection is still good but we just can't read from it right now.
675 // This should only happen when connecting (and at most once), because
676 // in all other cases this function is only called if the file
677 // descriptor is already known to be in the readable state. However,
678 // it's not necessary a problem if we spuriously interpret a
679 // "connection lost"-type error as a blocking error, because typically
680 // the next recv() will get EOF, so we'll still eventually notice that
681 // the socket is closed.
682 LOG_ERR(LS_WARNING) << "Assuming benign blocking error";
683 return false;
684 }
685 }
686}
687
688#endif // WEBRTC_POSIX
689
690uint32_t SocketDispatcher::GetRequestedEvents() {
691 return enabled_events_;
692}
693
694void SocketDispatcher::OnPreEvent(uint32_t ff) {
695 if ((ff & DE_CONNECT) != 0)
696 state_ = CS_CONNECTED;
697
698#if defined(WEBRTC_WIN)
699 // We set CS_CLOSED from CheckSignalClose.
700#elif defined(WEBRTC_POSIX)
701 if ((ff & DE_CLOSE) != 0)
702 state_ = CS_CLOSED;
703#endif
704}
705
706#if defined(WEBRTC_WIN)
707
708void SocketDispatcher::OnEvent(uint32_t ff, int err) {
709 int cache_id = id_;
710 // Make sure we deliver connect/accept first. Otherwise, consumers may see
711 // something like a READ followed by a CONNECT, which would be odd.
712 if (((ff & DE_CONNECT) != 0) && (id_ == cache_id)) {
713 if (ff != DE_CONNECT)
714 LOG(LS_VERBOSE) << "Signalled with DE_CONNECT: " << ff;
715 enabled_events_ &= ~DE_CONNECT;
716#if !defined(NDEBUG)
717 dbg_addr_ = "Connected @ ";
718 dbg_addr_.append(GetRemoteAddress().ToString());
719#endif
720 SignalConnectEvent(this);
721 }
722 if (((ff & DE_ACCEPT) != 0) && (id_ == cache_id)) {
723 enabled_events_ &= ~DE_ACCEPT;
724 SignalReadEvent(this);
725 }
726 if ((ff & DE_READ) != 0) {
727 enabled_events_ &= ~DE_READ;
728 SignalReadEvent(this);
729 }
730 if (((ff & DE_WRITE) != 0) && (id_ == cache_id)) {
731 enabled_events_ &= ~DE_WRITE;
732 SignalWriteEvent(this);
733 }
734 if (((ff & DE_CLOSE) != 0) && (id_ == cache_id)) {
735 signal_close_ = true;
736 signal_err_ = err;
737 }
738}
739
740#elif defined(WEBRTC_POSIX)
741
742void SocketDispatcher::OnEvent(uint32_t ff, int err) {
743 // Make sure we deliver connect/accept first. Otherwise, consumers may see
744 // something like a READ followed by a CONNECT, which would be odd.
745 if ((ff & DE_CONNECT) != 0) {
746 enabled_events_ &= ~DE_CONNECT;
747 SignalConnectEvent(this);
748 }
749 if ((ff & DE_ACCEPT) != 0) {
750 enabled_events_ &= ~DE_ACCEPT;
751 SignalReadEvent(this);
752 }
753 if ((ff & DE_READ) != 0) {
754 enabled_events_ &= ~DE_READ;
755 SignalReadEvent(this);
756 }
757 if ((ff & DE_WRITE) != 0) {
758 enabled_events_ &= ~DE_WRITE;
759 SignalWriteEvent(this);
760 }
761 if ((ff & DE_CLOSE) != 0) {
762 // The socket is now dead to us, so stop checking it.
763 enabled_events_ = 0;
764 SignalCloseEvent(this, err);
765 }
766}
767
768#endif // WEBRTC_POSIX
769
770int SocketDispatcher::Close() {
771 if (s_ == INVALID_SOCKET)
772 return 0;
773
774#if defined(WEBRTC_WIN)
775 id_ = 0;
776 signal_close_ = false;
777#endif
778 ss_->Remove(this);
779 return PhysicalSocket::Close();
780}
781
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000782#if defined(WEBRTC_POSIX)
783class EventDispatcher : public Dispatcher {
784 public:
785 EventDispatcher(PhysicalSocketServer* ss) : ss_(ss), fSignaled_(false) {
786 if (pipe(afd_) < 0)
787 LOG(LERROR) << "pipe failed";
788 ss_->Add(this);
789 }
790
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000791 ~EventDispatcher() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000792 ss_->Remove(this);
793 close(afd_[0]);
794 close(afd_[1]);
795 }
796
797 virtual void Signal() {
798 CritScope cs(&crit_);
799 if (!fSignaled_) {
Peter Boström0c4e06b2015-10-07 12:23:21 +0200800 const uint8_t b[1] = {0};
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000801 if (VERIFY(1 == write(afd_[1], b, sizeof(b)))) {
802 fSignaled_ = true;
803 }
804 }
805 }
806
Peter Boström0c4e06b2015-10-07 12:23:21 +0200807 uint32_t GetRequestedEvents() override { return DE_READ; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000808
Peter Boström0c4e06b2015-10-07 12:23:21 +0200809 void OnPreEvent(uint32_t ff) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000810 // It is not possible to perfectly emulate an auto-resetting event with
811 // pipes. This simulates it by resetting before the event is handled.
812
813 CritScope cs(&crit_);
814 if (fSignaled_) {
Peter Boström0c4e06b2015-10-07 12:23:21 +0200815 uint8_t b[4]; // Allow for reading more than 1 byte, but expect 1.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000816 VERIFY(1 == read(afd_[0], b, sizeof(b)));
817 fSignaled_ = false;
818 }
819 }
820
Peter Boström0c4e06b2015-10-07 12:23:21 +0200821 void OnEvent(uint32_t ff, int err) override { ASSERT(false); }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000822
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000823 int GetDescriptor() override { return afd_[0]; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000824
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000825 bool IsDescriptorClosed() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000826
827 private:
828 PhysicalSocketServer *ss_;
829 int afd_[2];
830 bool fSignaled_;
831 CriticalSection crit_;
832};
833
834// These two classes use the self-pipe trick to deliver POSIX signals to our
835// select loop. This is the only safe, reliable, cross-platform way to do
836// non-trivial things with a POSIX signal in an event-driven program (until
837// proper pselect() implementations become ubiquitous).
838
839class PosixSignalHandler {
840 public:
841 // POSIX only specifies 32 signals, but in principle the system might have
842 // more and the programmer might choose to use them, so we size our array
843 // for 128.
844 static const int kNumPosixSignals = 128;
845
846 // There is just a single global instance. (Signal handlers do not get any
847 // sort of user-defined void * parameter, so they can't access anything that
848 // isn't global.)
849 static PosixSignalHandler* Instance() {
Andrew MacDonald469c2c02015-05-22 17:50:26 -0700850 RTC_DEFINE_STATIC_LOCAL(PosixSignalHandler, instance, ());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000851 return &instance;
852 }
853
854 // Returns true if the given signal number is set.
855 bool IsSignalSet(int signum) const {
tfarina5237aaf2015-11-10 23:44:30 -0800856 ASSERT(signum < static_cast<int>(arraysize(received_signal_)));
857 if (signum < static_cast<int>(arraysize(received_signal_))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000858 return received_signal_[signum];
859 } else {
860 return false;
861 }
862 }
863
864 // Clears the given signal number.
865 void ClearSignal(int signum) {
tfarina5237aaf2015-11-10 23:44:30 -0800866 ASSERT(signum < static_cast<int>(arraysize(received_signal_)));
867 if (signum < static_cast<int>(arraysize(received_signal_))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000868 received_signal_[signum] = false;
869 }
870 }
871
872 // Returns the file descriptor to monitor for signal events.
873 int GetDescriptor() const {
874 return afd_[0];
875 }
876
877 // This is called directly from our real signal handler, so it must be
878 // signal-handler-safe. That means it cannot assume anything about the
879 // user-level state of the process, since the handler could be executed at any
880 // time on any thread.
881 void OnPosixSignalReceived(int signum) {
tfarina5237aaf2015-11-10 23:44:30 -0800882 if (signum >= static_cast<int>(arraysize(received_signal_))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000883 // We don't have space in our array for this.
884 return;
885 }
886 // Set a flag saying we've seen this signal.
887 received_signal_[signum] = true;
888 // Notify application code that we got a signal.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200889 const uint8_t b[1] = {0};
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000890 if (-1 == write(afd_[1], b, sizeof(b))) {
891 // Nothing we can do here. If there's an error somehow then there's
892 // nothing we can safely do from a signal handler.
893 // No, we can't even safely log it.
894 // But, we still have to check the return value here. Otherwise,
895 // GCC 4.4.1 complains ignoring return value. Even (void) doesn't help.
896 return;
897 }
898 }
899
900 private:
901 PosixSignalHandler() {
902 if (pipe(afd_) < 0) {
903 LOG_ERR(LS_ERROR) << "pipe failed";
904 return;
905 }
906 if (fcntl(afd_[0], F_SETFL, O_NONBLOCK) < 0) {
907 LOG_ERR(LS_WARNING) << "fcntl #1 failed";
908 }
909 if (fcntl(afd_[1], F_SETFL, O_NONBLOCK) < 0) {
910 LOG_ERR(LS_WARNING) << "fcntl #2 failed";
911 }
912 memset(const_cast<void *>(static_cast<volatile void *>(received_signal_)),
913 0,
914 sizeof(received_signal_));
915 }
916
917 ~PosixSignalHandler() {
918 int fd1 = afd_[0];
919 int fd2 = afd_[1];
920 // We clobber the stored file descriptor numbers here or else in principle
921 // a signal that happens to be delivered during application termination
922 // could erroneously write a zero byte to an unrelated file handle in
923 // OnPosixSignalReceived() if some other file happens to be opened later
924 // during shutdown and happens to be given the same file descriptor number
925 // as our pipe had. Unfortunately even with this precaution there is still a
926 // race where that could occur if said signal happens to be handled
927 // concurrently with this code and happens to have already read the value of
928 // afd_[1] from memory before we clobber it, but that's unlikely.
929 afd_[0] = -1;
930 afd_[1] = -1;
931 close(fd1);
932 close(fd2);
933 }
934
935 int afd_[2];
936 // These are boolean flags that will be set in our signal handler and read
937 // and cleared from Wait(). There is a race involved in this, but it is
938 // benign. The signal handler sets the flag before signaling the pipe, so
939 // we'll never end up blocking in select() while a flag is still true.
940 // However, if two of the same signal arrive close to each other then it's
941 // possible that the second time the handler may set the flag while it's still
942 // true, meaning that signal will be missed. But the first occurrence of it
943 // will still be handled, so this isn't a problem.
944 // Volatile is not necessary here for correctness, but this data _is_ volatile
945 // so I've marked it as such.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200946 volatile uint8_t received_signal_[kNumPosixSignals];
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000947};
948
949class PosixSignalDispatcher : public Dispatcher {
950 public:
951 PosixSignalDispatcher(PhysicalSocketServer *owner) : owner_(owner) {
952 owner_->Add(this);
953 }
954
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000955 ~PosixSignalDispatcher() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000956 owner_->Remove(this);
957 }
958
Peter Boström0c4e06b2015-10-07 12:23:21 +0200959 uint32_t GetRequestedEvents() override { return DE_READ; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000960
Peter Boström0c4e06b2015-10-07 12:23:21 +0200961 void OnPreEvent(uint32_t ff) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000962 // Events might get grouped if signals come very fast, so we read out up to
963 // 16 bytes to make sure we keep the pipe empty.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200964 uint8_t b[16];
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000965 ssize_t ret = read(GetDescriptor(), b, sizeof(b));
966 if (ret < 0) {
967 LOG_ERR(LS_WARNING) << "Error in read()";
968 } else if (ret == 0) {
969 LOG(LS_WARNING) << "Should have read at least one byte";
970 }
971 }
972
Peter Boström0c4e06b2015-10-07 12:23:21 +0200973 void OnEvent(uint32_t ff, int err) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000974 for (int signum = 0; signum < PosixSignalHandler::kNumPosixSignals;
975 ++signum) {
976 if (PosixSignalHandler::Instance()->IsSignalSet(signum)) {
977 PosixSignalHandler::Instance()->ClearSignal(signum);
978 HandlerMap::iterator i = handlers_.find(signum);
979 if (i == handlers_.end()) {
980 // This can happen if a signal is delivered to our process at around
981 // the same time as we unset our handler for it. It is not an error
982 // condition, but it's unusual enough to be worth logging.
983 LOG(LS_INFO) << "Received signal with no handler: " << signum;
984 } else {
985 // Otherwise, execute our handler.
986 (*i->second)(signum);
987 }
988 }
989 }
990 }
991
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000992 int GetDescriptor() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000993 return PosixSignalHandler::Instance()->GetDescriptor();
994 }
995
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +0000996 bool IsDescriptorClosed() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000997
998 void SetHandler(int signum, void (*handler)(int)) {
999 handlers_[signum] = handler;
1000 }
1001
1002 void ClearHandler(int signum) {
1003 handlers_.erase(signum);
1004 }
1005
1006 bool HasHandlers() {
1007 return !handlers_.empty();
1008 }
1009
1010 private:
1011 typedef std::map<int, void (*)(int)> HandlerMap;
1012
1013 HandlerMap handlers_;
1014 // Our owner.
1015 PhysicalSocketServer *owner_;
1016};
1017
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001018class FileDispatcher: public Dispatcher, public AsyncFile {
1019 public:
1020 FileDispatcher(int fd, PhysicalSocketServer *ss) : ss_(ss), fd_(fd) {
1021 set_readable(true);
1022
1023 ss_->Add(this);
1024
1025 fcntl(fd_, F_SETFL, fcntl(fd_, F_GETFL, 0) | O_NONBLOCK);
1026 }
1027
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001028 ~FileDispatcher() override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001029 ss_->Remove(this);
1030 }
1031
1032 SocketServer* socketserver() { return ss_; }
1033
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001034 int GetDescriptor() override { return fd_; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001035
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001036 bool IsDescriptorClosed() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001037
Peter Boström0c4e06b2015-10-07 12:23:21 +02001038 uint32_t GetRequestedEvents() override { return flags_; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001039
Peter Boström0c4e06b2015-10-07 12:23:21 +02001040 void OnPreEvent(uint32_t ff) override {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001041
Peter Boström0c4e06b2015-10-07 12:23:21 +02001042 void OnEvent(uint32_t ff, int err) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001043 if ((ff & DE_READ) != 0)
1044 SignalReadEvent(this);
1045 if ((ff & DE_WRITE) != 0)
1046 SignalWriteEvent(this);
1047 if ((ff & DE_CLOSE) != 0)
1048 SignalCloseEvent(this, err);
1049 }
1050
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001051 bool readable() override { return (flags_ & DE_READ) != 0; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001052
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001053 void set_readable(bool value) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001054 flags_ = value ? (flags_ | DE_READ) : (flags_ & ~DE_READ);
1055 }
1056
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001057 bool writable() override { return (flags_ & DE_WRITE) != 0; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001058
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001059 void set_writable(bool value) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001060 flags_ = value ? (flags_ | DE_WRITE) : (flags_ & ~DE_WRITE);
1061 }
1062
1063 private:
1064 PhysicalSocketServer* ss_;
1065 int fd_;
1066 int flags_;
1067};
1068
1069AsyncFile* PhysicalSocketServer::CreateFile(int fd) {
1070 return new FileDispatcher(fd, this);
1071}
1072
1073#endif // WEBRTC_POSIX
1074
1075#if defined(WEBRTC_WIN)
Peter Boström0c4e06b2015-10-07 12:23:21 +02001076static uint32_t FlagsToEvents(uint32_t events) {
1077 uint32_t ffFD = FD_CLOSE;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001078 if (events & DE_READ)
1079 ffFD |= FD_READ;
1080 if (events & DE_WRITE)
1081 ffFD |= FD_WRITE;
1082 if (events & DE_CONNECT)
1083 ffFD |= FD_CONNECT;
1084 if (events & DE_ACCEPT)
1085 ffFD |= FD_ACCEPT;
1086 return ffFD;
1087}
1088
1089class EventDispatcher : public Dispatcher {
1090 public:
1091 EventDispatcher(PhysicalSocketServer *ss) : ss_(ss) {
1092 hev_ = WSACreateEvent();
1093 if (hev_) {
1094 ss_->Add(this);
1095 }
1096 }
1097
1098 ~EventDispatcher() {
1099 if (hev_ != NULL) {
1100 ss_->Remove(this);
1101 WSACloseEvent(hev_);
1102 hev_ = NULL;
1103 }
1104 }
1105
1106 virtual void Signal() {
1107 if (hev_ != NULL)
1108 WSASetEvent(hev_);
1109 }
1110
Peter Boström0c4e06b2015-10-07 12:23:21 +02001111 virtual uint32_t GetRequestedEvents() { return 0; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001112
Peter Boström0c4e06b2015-10-07 12:23:21 +02001113 virtual void OnPreEvent(uint32_t ff) { WSAResetEvent(hev_); }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001114
Peter Boström0c4e06b2015-10-07 12:23:21 +02001115 virtual void OnEvent(uint32_t ff, int err) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001116
1117 virtual WSAEVENT GetWSAEvent() {
1118 return hev_;
1119 }
1120
1121 virtual SOCKET GetSocket() {
1122 return INVALID_SOCKET;
1123 }
1124
1125 virtual bool CheckSignalClose() { return false; }
1126
1127private:
1128 PhysicalSocketServer* ss_;
1129 WSAEVENT hev_;
1130};
honghaizcec0a082016-01-15 14:49:09 -08001131#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001132
1133// Sets the value of a boolean value to false when signaled.
1134class Signaler : public EventDispatcher {
1135 public:
1136 Signaler(PhysicalSocketServer* ss, bool* pf)
1137 : EventDispatcher(ss), pf_(pf) {
1138 }
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001139 ~Signaler() override { }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001140
Peter Boström0c4e06b2015-10-07 12:23:21 +02001141 void OnEvent(uint32_t ff, int err) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001142 if (pf_)
1143 *pf_ = false;
1144 }
1145
1146 private:
1147 bool *pf_;
1148};
1149
1150PhysicalSocketServer::PhysicalSocketServer()
1151 : fWait_(false) {
1152 signal_wakeup_ = new Signaler(this, &fWait_);
1153#if defined(WEBRTC_WIN)
1154 socket_ev_ = WSACreateEvent();
1155#endif
1156}
1157
1158PhysicalSocketServer::~PhysicalSocketServer() {
1159#if defined(WEBRTC_WIN)
1160 WSACloseEvent(socket_ev_);
1161#endif
1162#if defined(WEBRTC_POSIX)
1163 signal_dispatcher_.reset();
1164#endif
1165 delete signal_wakeup_;
1166 ASSERT(dispatchers_.empty());
1167}
1168
1169void PhysicalSocketServer::WakeUp() {
1170 signal_wakeup_->Signal();
1171}
1172
1173Socket* PhysicalSocketServer::CreateSocket(int type) {
1174 return CreateSocket(AF_INET, type);
1175}
1176
1177Socket* PhysicalSocketServer::CreateSocket(int family, int type) {
1178 PhysicalSocket* socket = new PhysicalSocket(this);
1179 if (socket->Create(family, type)) {
1180 return socket;
1181 } else {
1182 delete socket;
jbauch095ae152015-12-18 01:39:55 -08001183 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001184 }
1185}
1186
1187AsyncSocket* PhysicalSocketServer::CreateAsyncSocket(int type) {
1188 return CreateAsyncSocket(AF_INET, type);
1189}
1190
1191AsyncSocket* PhysicalSocketServer::CreateAsyncSocket(int family, int type) {
1192 SocketDispatcher* dispatcher = new SocketDispatcher(this);
1193 if (dispatcher->Create(family, type)) {
1194 return dispatcher;
1195 } else {
1196 delete dispatcher;
jbauch095ae152015-12-18 01:39:55 -08001197 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001198 }
1199}
1200
1201AsyncSocket* PhysicalSocketServer::WrapSocket(SOCKET s) {
1202 SocketDispatcher* dispatcher = new SocketDispatcher(s, this);
1203 if (dispatcher->Initialize()) {
1204 return dispatcher;
1205 } else {
1206 delete dispatcher;
jbauch095ae152015-12-18 01:39:55 -08001207 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001208 }
1209}
1210
1211void PhysicalSocketServer::Add(Dispatcher *pdispatcher) {
1212 CritScope cs(&crit_);
1213 // Prevent duplicates. This can cause dead dispatchers to stick around.
1214 DispatcherList::iterator pos = std::find(dispatchers_.begin(),
1215 dispatchers_.end(),
1216 pdispatcher);
1217 if (pos != dispatchers_.end())
1218 return;
1219 dispatchers_.push_back(pdispatcher);
1220}
1221
1222void PhysicalSocketServer::Remove(Dispatcher *pdispatcher) {
1223 CritScope cs(&crit_);
1224 DispatcherList::iterator pos = std::find(dispatchers_.begin(),
1225 dispatchers_.end(),
1226 pdispatcher);
1227 // We silently ignore duplicate calls to Add, so we should silently ignore
1228 // the (expected) symmetric calls to Remove. Note that this may still hide
1229 // a real issue, so we at least log a warning about it.
1230 if (pos == dispatchers_.end()) {
1231 LOG(LS_WARNING) << "PhysicalSocketServer asked to remove a unknown "
1232 << "dispatcher, potentially from a duplicate call to Add.";
1233 return;
1234 }
1235 size_t index = pos - dispatchers_.begin();
1236 dispatchers_.erase(pos);
1237 for (IteratorList::iterator it = iterators_.begin(); it != iterators_.end();
1238 ++it) {
1239 if (index < **it) {
1240 --**it;
1241 }
1242 }
1243}
1244
1245#if defined(WEBRTC_POSIX)
1246bool PhysicalSocketServer::Wait(int cmsWait, bool process_io) {
1247 // Calculate timing information
1248
1249 struct timeval *ptvWait = NULL;
1250 struct timeval tvWait;
1251 struct timeval tvStop;
1252 if (cmsWait != kForever) {
1253 // Calculate wait timeval
1254 tvWait.tv_sec = cmsWait / 1000;
1255 tvWait.tv_usec = (cmsWait % 1000) * 1000;
1256 ptvWait = &tvWait;
1257
1258 // Calculate when to return in a timeval
1259 gettimeofday(&tvStop, NULL);
1260 tvStop.tv_sec += tvWait.tv_sec;
1261 tvStop.tv_usec += tvWait.tv_usec;
1262 if (tvStop.tv_usec >= 1000000) {
1263 tvStop.tv_usec -= 1000000;
1264 tvStop.tv_sec += 1;
1265 }
1266 }
1267
1268 // Zero all fd_sets. Don't need to do this inside the loop since
1269 // select() zeros the descriptors not signaled
1270
1271 fd_set fdsRead;
1272 FD_ZERO(&fdsRead);
1273 fd_set fdsWrite;
1274 FD_ZERO(&fdsWrite);
pbos@webrtc.org27e58982014-10-07 17:56:53 +00001275 // Explicitly unpoison these FDs on MemorySanitizer which doesn't handle the
1276 // inline assembly in FD_ZERO.
1277 // http://crbug.com/344505
1278#ifdef MEMORY_SANITIZER
1279 __msan_unpoison(&fdsRead, sizeof(fdsRead));
1280 __msan_unpoison(&fdsWrite, sizeof(fdsWrite));
1281#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001282
1283 fWait_ = true;
1284
1285 while (fWait_) {
1286 int fdmax = -1;
1287 {
1288 CritScope cr(&crit_);
1289 for (size_t i = 0; i < dispatchers_.size(); ++i) {
1290 // Query dispatchers for read and write wait state
1291 Dispatcher *pdispatcher = dispatchers_[i];
1292 ASSERT(pdispatcher);
1293 if (!process_io && (pdispatcher != signal_wakeup_))
1294 continue;
1295 int fd = pdispatcher->GetDescriptor();
1296 if (fd > fdmax)
1297 fdmax = fd;
1298
Peter Boström0c4e06b2015-10-07 12:23:21 +02001299 uint32_t ff = pdispatcher->GetRequestedEvents();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001300 if (ff & (DE_READ | DE_ACCEPT))
1301 FD_SET(fd, &fdsRead);
1302 if (ff & (DE_WRITE | DE_CONNECT))
1303 FD_SET(fd, &fdsWrite);
1304 }
1305 }
1306
1307 // Wait then call handlers as appropriate
1308 // < 0 means error
1309 // 0 means timeout
1310 // > 0 means count of descriptors ready
1311 int n = select(fdmax + 1, &fdsRead, &fdsWrite, NULL, ptvWait);
1312
1313 // If error, return error.
1314 if (n < 0) {
1315 if (errno != EINTR) {
1316 LOG_E(LS_ERROR, EN, errno) << "select";
1317 return false;
1318 }
1319 // Else ignore the error and keep going. If this EINTR was for one of the
1320 // signals managed by this PhysicalSocketServer, the
1321 // PosixSignalDeliveryDispatcher will be in the signaled state in the next
1322 // iteration.
1323 } else if (n == 0) {
1324 // If timeout, return success
1325 return true;
1326 } else {
1327 // We have signaled descriptors
1328 CritScope cr(&crit_);
1329 for (size_t i = 0; i < dispatchers_.size(); ++i) {
1330 Dispatcher *pdispatcher = dispatchers_[i];
1331 int fd = pdispatcher->GetDescriptor();
Peter Boström0c4e06b2015-10-07 12:23:21 +02001332 uint32_t ff = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001333 int errcode = 0;
1334
1335 // Reap any error code, which can be signaled through reads or writes.
jbauch095ae152015-12-18 01:39:55 -08001336 // TODO(pthatcher): Should we set errcode if getsockopt fails?
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001337 if (FD_ISSET(fd, &fdsRead) || FD_ISSET(fd, &fdsWrite)) {
1338 socklen_t len = sizeof(errcode);
1339 ::getsockopt(fd, SOL_SOCKET, SO_ERROR, &errcode, &len);
1340 }
1341
1342 // Check readable descriptors. If we're waiting on an accept, signal
1343 // that. Otherwise we're waiting for data, check to see if we're
1344 // readable or really closed.
jbauch095ae152015-12-18 01:39:55 -08001345 // TODO(pthatcher): Only peek at TCP descriptors.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001346 if (FD_ISSET(fd, &fdsRead)) {
1347 FD_CLR(fd, &fdsRead);
1348 if (pdispatcher->GetRequestedEvents() & DE_ACCEPT) {
1349 ff |= DE_ACCEPT;
1350 } else if (errcode || pdispatcher->IsDescriptorClosed()) {
1351 ff |= DE_CLOSE;
1352 } else {
1353 ff |= DE_READ;
1354 }
1355 }
1356
1357 // Check writable descriptors. If we're waiting on a connect, detect
1358 // success versus failure by the reaped error code.
1359 if (FD_ISSET(fd, &fdsWrite)) {
1360 FD_CLR(fd, &fdsWrite);
1361 if (pdispatcher->GetRequestedEvents() & DE_CONNECT) {
1362 if (!errcode) {
1363 ff |= DE_CONNECT;
1364 } else {
1365 ff |= DE_CLOSE;
1366 }
1367 } else {
1368 ff |= DE_WRITE;
1369 }
1370 }
1371
1372 // Tell the descriptor about the event.
1373 if (ff != 0) {
1374 pdispatcher->OnPreEvent(ff);
1375 pdispatcher->OnEvent(ff, errcode);
1376 }
1377 }
1378 }
1379
1380 // Recalc the time remaining to wait. Doing it here means it doesn't get
1381 // calced twice the first time through the loop
1382 if (ptvWait) {
1383 ptvWait->tv_sec = 0;
1384 ptvWait->tv_usec = 0;
1385 struct timeval tvT;
1386 gettimeofday(&tvT, NULL);
1387 if ((tvStop.tv_sec > tvT.tv_sec)
1388 || ((tvStop.tv_sec == tvT.tv_sec)
1389 && (tvStop.tv_usec > tvT.tv_usec))) {
1390 ptvWait->tv_sec = tvStop.tv_sec - tvT.tv_sec;
1391 ptvWait->tv_usec = tvStop.tv_usec - tvT.tv_usec;
1392 if (ptvWait->tv_usec < 0) {
1393 ASSERT(ptvWait->tv_sec > 0);
1394 ptvWait->tv_usec += 1000000;
1395 ptvWait->tv_sec -= 1;
1396 }
1397 }
1398 }
1399 }
1400
1401 return true;
1402}
1403
1404static void GlobalSignalHandler(int signum) {
1405 PosixSignalHandler::Instance()->OnPosixSignalReceived(signum);
1406}
1407
1408bool PhysicalSocketServer::SetPosixSignalHandler(int signum,
1409 void (*handler)(int)) {
1410 // If handler is SIG_IGN or SIG_DFL then clear our user-level handler,
1411 // otherwise set one.
1412 if (handler == SIG_IGN || handler == SIG_DFL) {
1413 if (!InstallSignal(signum, handler)) {
1414 return false;
1415 }
1416 if (signal_dispatcher_) {
1417 signal_dispatcher_->ClearHandler(signum);
1418 if (!signal_dispatcher_->HasHandlers()) {
1419 signal_dispatcher_.reset();
1420 }
1421 }
1422 } else {
1423 if (!signal_dispatcher_) {
1424 signal_dispatcher_.reset(new PosixSignalDispatcher(this));
1425 }
1426 signal_dispatcher_->SetHandler(signum, handler);
1427 if (!InstallSignal(signum, &GlobalSignalHandler)) {
1428 return false;
1429 }
1430 }
1431 return true;
1432}
1433
1434Dispatcher* PhysicalSocketServer::signal_dispatcher() {
1435 return signal_dispatcher_.get();
1436}
1437
1438bool PhysicalSocketServer::InstallSignal(int signum, void (*handler)(int)) {
1439 struct sigaction act;
1440 // It doesn't really matter what we set this mask to.
1441 if (sigemptyset(&act.sa_mask) != 0) {
1442 LOG_ERR(LS_ERROR) << "Couldn't set mask";
1443 return false;
1444 }
1445 act.sa_handler = handler;
1446#if !defined(__native_client__)
1447 // Use SA_RESTART so that our syscalls don't get EINTR, since we don't need it
1448 // and it's a nuisance. Though some syscalls still return EINTR and there's no
1449 // real standard for which ones. :(
1450 act.sa_flags = SA_RESTART;
1451#else
1452 act.sa_flags = 0;
1453#endif
1454 if (sigaction(signum, &act, NULL) != 0) {
1455 LOG_ERR(LS_ERROR) << "Couldn't set sigaction";
1456 return false;
1457 }
1458 return true;
1459}
1460#endif // WEBRTC_POSIX
1461
1462#if defined(WEBRTC_WIN)
1463bool PhysicalSocketServer::Wait(int cmsWait, bool process_io) {
1464 int cmsTotal = cmsWait;
1465 int cmsElapsed = 0;
Peter Boström0c4e06b2015-10-07 12:23:21 +02001466 uint32_t msStart = Time();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001467
1468 fWait_ = true;
1469 while (fWait_) {
1470 std::vector<WSAEVENT> events;
1471 std::vector<Dispatcher *> event_owners;
1472
1473 events.push_back(socket_ev_);
1474
1475 {
1476 CritScope cr(&crit_);
1477 size_t i = 0;
1478 iterators_.push_back(&i);
1479 // Don't track dispatchers_.size(), because we want to pick up any new
1480 // dispatchers that were added while processing the loop.
1481 while (i < dispatchers_.size()) {
1482 Dispatcher* disp = dispatchers_[i++];
1483 if (!process_io && (disp != signal_wakeup_))
1484 continue;
1485 SOCKET s = disp->GetSocket();
1486 if (disp->CheckSignalClose()) {
1487 // We just signalled close, don't poll this socket
1488 } else if (s != INVALID_SOCKET) {
1489 WSAEventSelect(s,
1490 events[0],
1491 FlagsToEvents(disp->GetRequestedEvents()));
1492 } else {
1493 events.push_back(disp->GetWSAEvent());
1494 event_owners.push_back(disp);
1495 }
1496 }
1497 ASSERT(iterators_.back() == &i);
1498 iterators_.pop_back();
1499 }
1500
1501 // Which is shorter, the delay wait or the asked wait?
1502
1503 int cmsNext;
1504 if (cmsWait == kForever) {
1505 cmsNext = cmsWait;
1506 } else {
andresp@webrtc.orgff689be2015-02-12 11:54:26 +00001507 cmsNext = std::max(0, cmsTotal - cmsElapsed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001508 }
1509
1510 // Wait for one of the events to signal
1511 DWORD dw = WSAWaitForMultipleEvents(static_cast<DWORD>(events.size()),
1512 &events[0],
1513 false,
1514 cmsNext,
1515 false);
1516
1517 if (dw == WSA_WAIT_FAILED) {
1518 // Failed?
jbauch095ae152015-12-18 01:39:55 -08001519 // TODO(pthatcher): need a better strategy than this!
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001520 WSAGetLastError();
1521 ASSERT(false);
1522 return false;
1523 } else if (dw == WSA_WAIT_TIMEOUT) {
1524 // Timeout?
1525 return true;
1526 } else {
1527 // Figure out which one it is and call it
1528 CritScope cr(&crit_);
1529 int index = dw - WSA_WAIT_EVENT_0;
1530 if (index > 0) {
1531 --index; // The first event is the socket event
1532 event_owners[index]->OnPreEvent(0);
1533 event_owners[index]->OnEvent(0, 0);
1534 } else if (process_io) {
1535 size_t i = 0, end = dispatchers_.size();
1536 iterators_.push_back(&i);
1537 iterators_.push_back(&end); // Don't iterate over new dispatchers.
1538 while (i < end) {
1539 Dispatcher* disp = dispatchers_[i++];
1540 SOCKET s = disp->GetSocket();
1541 if (s == INVALID_SOCKET)
1542 continue;
1543
1544 WSANETWORKEVENTS wsaEvents;
1545 int err = WSAEnumNetworkEvents(s, events[0], &wsaEvents);
1546 if (err == 0) {
1547
1548#if LOGGING
1549 {
1550 if ((wsaEvents.lNetworkEvents & FD_READ) &&
1551 wsaEvents.iErrorCode[FD_READ_BIT] != 0) {
1552 LOG(WARNING) << "PhysicalSocketServer got FD_READ_BIT error "
1553 << wsaEvents.iErrorCode[FD_READ_BIT];
1554 }
1555 if ((wsaEvents.lNetworkEvents & FD_WRITE) &&
1556 wsaEvents.iErrorCode[FD_WRITE_BIT] != 0) {
1557 LOG(WARNING) << "PhysicalSocketServer got FD_WRITE_BIT error "
1558 << wsaEvents.iErrorCode[FD_WRITE_BIT];
1559 }
1560 if ((wsaEvents.lNetworkEvents & FD_CONNECT) &&
1561 wsaEvents.iErrorCode[FD_CONNECT_BIT] != 0) {
1562 LOG(WARNING) << "PhysicalSocketServer got FD_CONNECT_BIT error "
1563 << wsaEvents.iErrorCode[FD_CONNECT_BIT];
1564 }
1565 if ((wsaEvents.lNetworkEvents & FD_ACCEPT) &&
1566 wsaEvents.iErrorCode[FD_ACCEPT_BIT] != 0) {
1567 LOG(WARNING) << "PhysicalSocketServer got FD_ACCEPT_BIT error "
1568 << wsaEvents.iErrorCode[FD_ACCEPT_BIT];
1569 }
1570 if ((wsaEvents.lNetworkEvents & FD_CLOSE) &&
1571 wsaEvents.iErrorCode[FD_CLOSE_BIT] != 0) {
1572 LOG(WARNING) << "PhysicalSocketServer got FD_CLOSE_BIT error "
1573 << wsaEvents.iErrorCode[FD_CLOSE_BIT];
1574 }
1575 }
1576#endif
Peter Boström0c4e06b2015-10-07 12:23:21 +02001577 uint32_t ff = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001578 int errcode = 0;
1579 if (wsaEvents.lNetworkEvents & FD_READ)
1580 ff |= DE_READ;
1581 if (wsaEvents.lNetworkEvents & FD_WRITE)
1582 ff |= DE_WRITE;
1583 if (wsaEvents.lNetworkEvents & FD_CONNECT) {
1584 if (wsaEvents.iErrorCode[FD_CONNECT_BIT] == 0) {
1585 ff |= DE_CONNECT;
1586 } else {
1587 ff |= DE_CLOSE;
1588 errcode = wsaEvents.iErrorCode[FD_CONNECT_BIT];
1589 }
1590 }
1591 if (wsaEvents.lNetworkEvents & FD_ACCEPT)
1592 ff |= DE_ACCEPT;
1593 if (wsaEvents.lNetworkEvents & FD_CLOSE) {
1594 ff |= DE_CLOSE;
1595 errcode = wsaEvents.iErrorCode[FD_CLOSE_BIT];
1596 }
1597 if (ff != 0) {
1598 disp->OnPreEvent(ff);
1599 disp->OnEvent(ff, errcode);
1600 }
1601 }
1602 }
1603 ASSERT(iterators_.back() == &end);
1604 iterators_.pop_back();
1605 ASSERT(iterators_.back() == &i);
1606 iterators_.pop_back();
1607 }
1608
1609 // Reset the network event until new activity occurs
1610 WSAResetEvent(socket_ev_);
1611 }
1612
1613 // Break?
1614 if (!fWait_)
1615 break;
1616 cmsElapsed = TimeSince(msStart);
1617 if ((cmsWait != kForever) && (cmsElapsed >= cmsWait)) {
1618 break;
1619 }
1620 }
1621
1622 // Done
1623 return true;
1624}
honghaizcec0a082016-01-15 14:49:09 -08001625#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001626
1627} // namespace rtc