blob: 71da31ecec8019e421736faa5171f81d0bcda9fe [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:261/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
Steve Anton10542f22019-01-11 17:11:0010#include "rtc_base/physical_socket_server.h"
henrike@webrtc.orgf0488722014-05-13 18:00:2611
Markus Handell9a21c492022-08-25 11:40:1312#include <cstdint>
Harald Alvestrand60362c12023-10-10 11:30:1813#include <utility>
Markus Handell9a21c492022-08-25 11:40:1314
henrike@webrtc.orgf0488722014-05-13 18:00:2615#if defined(_MSC_VER) && _MSC_VER < 1300
Yves Gerey665174f2018-06-19 13:03:0516#pragma warning(disable : 4786)
henrike@webrtc.orgf0488722014-05-13 18:00:2617#endif
18
pbos@webrtc.org27e58982014-10-07 17:56:5319#ifdef MEMORY_SANITIZER
20#include <sanitizer/msan_interface.h>
21#endif
22
henrike@webrtc.orgf0488722014-05-13 18:00:2623#if defined(WEBRTC_POSIX)
henrike@webrtc.orgf0488722014-05-13 18:00:2624#include <fcntl.h>
jbauchde4db112017-05-31 20:09:1825#if defined(WEBRTC_USE_EPOLL)
26// "poll" will be used to wait for the signal dispatcher.
27#include <poll.h>
Taylor Brandstetter51366002023-03-14 23:45:4928#elif defined(WEBRTC_USE_POLL)
29#include <poll.h>
jbauchde4db112017-05-31 20:09:1830#endif
Yves Gerey665174f2018-06-19 13:03:0531#include <sys/ioctl.h>
32#include <sys/select.h>
Yves Gerey665174f2018-06-19 13:03:0533#include <unistd.h>
henrike@webrtc.orgf0488722014-05-13 18:00:2634#endif
35
36#if defined(WEBRTC_WIN)
henrike@webrtc.orgf0488722014-05-13 18:00:2637#include <windows.h>
38#include <winsock2.h>
39#include <ws2tcpip.h>
Harald Alvestrand60362c12023-10-10 11:30:1840
henrike@webrtc.orgf0488722014-05-13 18:00:2641#undef SetPort
42#endif
43
Patrik Höglunda8005cf2017-12-13 15:05:4244#include <errno.h>
45
Harald Alvestrand60362c12023-10-10 11:30:1846#include "rtc_base/async_dns_resolver.h"
Mirko Bonadei92ea95e2017-09-15 04:47:3147#include "rtc_base/checks.h"
Harald Alvestrand60362c12023-10-10 11:30:1848#include "rtc_base/event.h"
49#include "rtc_base/ip_address.h"
Mirko Bonadei92ea95e2017-09-15 04:47:3150#include "rtc_base/logging.h"
Per K8df31c92024-03-11 09:21:4851#include "rtc_base/network/ecn_marking.h"
Steve Anton10542f22019-01-11 17:11:0052#include "rtc_base/network_monitor.h"
Niels Möller6d176022021-02-09 13:44:4853#include "rtc_base/synchronization/mutex.h"
Steve Anton10542f22019-01-11 17:11:0054#include "rtc_base/time_utils.h"
Per Kjellanderfdcfefa2022-11-08 11:48:5255#include "system_wrappers/include/field_trial.h"
henrike@webrtc.orgf0488722014-05-13 18:00:2656
Emilio Cobos Álvarez68065502019-05-29 13:30:3257#if defined(WEBRTC_LINUX)
58#include <linux/sockios.h>
59#endif
60
Patrik Höglunda8005cf2017-12-13 15:05:4261#if defined(WEBRTC_WIN)
62#define LAST_SYSTEM_ERROR (::GetLastError())
63#elif defined(__native_client__) && __native_client__
64#define LAST_SYSTEM_ERROR (0)
65#elif defined(WEBRTC_POSIX)
66#define LAST_SYSTEM_ERROR (errno)
67#endif // WEBRTC_WIN
68
henrike@webrtc.orgf0488722014-05-13 18:00:2669#if defined(WEBRTC_POSIX)
70#include <netinet/tcp.h> // for TCP_NODELAY
Harald Alvestrand60362c12023-10-10 11:30:1871
Yves Gerey665174f2018-06-19 13:03:0572#define IP_MTU 14 // Until this is integrated from linux/in.h to netinet/in.h
henrike@webrtc.orgf0488722014-05-13 18:00:2673typedef void* SockOptArg;
Stefan Holmer9131efd2016-05-23 16:19:2674
henrike@webrtc.orgf0488722014-05-13 18:00:2675#endif // WEBRTC_POSIX
76
Stefan Holmer3ebb3ef2016-05-23 18:26:1177#if defined(WEBRTC_POSIX) && !defined(WEBRTC_MAC) && !defined(__native_client__)
78
Stefan Holmer9131efd2016-05-23 16:19:2679int64_t GetSocketRecvTimestamp(int socket) {
80 struct timeval tv_ioctl;
81 int ret = ioctl(socket, SIOCGSTAMP, &tv_ioctl);
82 if (ret != 0)
83 return -1;
84 int64_t timestamp =
85 rtc::kNumMicrosecsPerSec * static_cast<int64_t>(tv_ioctl.tv_sec) +
86 static_cast<int64_t>(tv_ioctl.tv_usec);
87 return timestamp;
88}
89
90#else
91
92int64_t GetSocketRecvTimestamp(int socket) {
93 return -1;
94}
95#endif
96
henrike@webrtc.orgf0488722014-05-13 18:00:2697#if defined(WEBRTC_WIN)
98typedef char* SockOptArg;
99#endif
100
Byoungchan Leed86c0cd2024-04-16 02:06:08101#if defined(WEBRTC_LINUX)
jbauchde4db112017-05-31 20:09:18102// POLLRDHUP / EPOLLRDHUP are only defined starting with Linux 2.6.17.
103#if !defined(POLLRDHUP)
104#define POLLRDHUP 0x2000
Byoungchan Leed86c0cd2024-04-16 02:06:08105#endif // !defined(POLLRDHUP)
jbauchde4db112017-05-31 20:09:18106#if !defined(EPOLLRDHUP)
107#define EPOLLRDHUP 0x2000
Byoungchan Leed86c0cd2024-04-16 02:06:08108#endif // !defined(EPOLLRDHUP)
109#endif // defined(WEBRTC_LINUX)
jbauchde4db112017-05-31 20:09:18110
Taylor Brandstetter7b69a442020-08-20 23:43:13111namespace {
Per K8df31c92024-03-11 09:21:48112
113// RFC-3168, Section 5. ECN is the two least significant bits.
114static constexpr uint8_t kEcnMask = 0x03;
115
116#if defined(WEBRTC_POSIX)
117
118rtc::EcnMarking EcnFromDs(uint8_t ds) {
119 // RFC-3168, Section 5.
120 constexpr uint8_t ECN_ECT1 = 0x01;
121 constexpr uint8_t ECN_ECT0 = 0x02;
122 constexpr uint8_t ECN_CE = 0x03;
123 const uint8_t ecn = ds & kEcnMask;
124
125 if (ecn == ECN_ECT1) {
126 return rtc::EcnMarking::kEct1;
127 }
128 if (ecn == ECN_ECT0) {
129 return rtc::EcnMarking::kEct0;
130 }
131 if (ecn == ECN_CE) {
132 return rtc::EcnMarking::kCe;
133 }
134 return rtc::EcnMarking::kNotEct;
135}
136
137#endif
138
Taylor Brandstetter7b69a442020-08-20 23:43:13139class ScopedSetTrue {
140 public:
141 ScopedSetTrue(bool* value) : value_(value) {
142 RTC_DCHECK(!*value_);
143 *value_ = true;
144 }
145 ~ScopedSetTrue() { *value_ = false; }
146
147 private:
148 bool* value_;
149};
Per Kjellanderfdcfefa2022-11-08 11:48:52150
Taylor Brandstetter7b69a442020-08-20 23:43:13151} // namespace
152
henrike@webrtc.orgf0488722014-05-13 18:00:26153namespace rtc {
154
jbauch095ae152015-12-18 09:39:55155PhysicalSocket::PhysicalSocket(PhysicalSocketServer* ss, SOCKET s)
Yves Gerey665174f2018-06-19 13:03:05156 : ss_(ss),
157 s_(s),
158 error_(0),
159 state_((s == INVALID_SOCKET) ? CS_CLOSED : CS_CONNECTED),
Per K58cccc62024-04-19 06:31:23160 resolver_(nullptr) {
jbauch095ae152015-12-18 09:39:55161 if (s_ != INVALID_SOCKET) {
jbauch577f5dc2017-05-17 23:32:26162 SetEnabledEvents(DE_READ | DE_WRITE);
henrike@webrtc.orgf0488722014-05-13 18:00:26163
jbauch095ae152015-12-18 09:39:55164 int type = SOCK_STREAM;
165 socklen_t len = sizeof(type);
nissec16fa5e2017-02-07 15:18:43166 const int res =
167 getsockopt(s_, SOL_SOCKET, SO_TYPE, (SockOptArg)&type, &len);
168 RTC_DCHECK_EQ(0, res);
henrike@webrtc.orgf0488722014-05-13 18:00:26169 udp_ = (SOCK_DGRAM == type);
henrike@webrtc.orgf0488722014-05-13 18:00:26170 }
jbauch095ae152015-12-18 09:39:55171}
henrike@webrtc.orgf0488722014-05-13 18:00:26172
jbauch095ae152015-12-18 09:39:55173PhysicalSocket::~PhysicalSocket() {
174 Close();
175}
176
177bool PhysicalSocket::Create(int family, int type) {
178 Close();
179 s_ = ::socket(family, type, 0);
180 udp_ = (SOCK_DGRAM == type);
Taylor Brandstetterecd6fc82020-02-06 01:26:37181 family_ = family;
jbauch095ae152015-12-18 09:39:55182 UpdateLastError();
jbauch577f5dc2017-05-17 23:32:26183 if (udp_) {
184 SetEnabledEvents(DE_READ | DE_WRITE);
185 }
jbauch095ae152015-12-18 09:39:55186 return s_ != INVALID_SOCKET;
187}
188
189SocketAddress PhysicalSocket::GetLocalAddress() const {
Mirko Bonadei108a2f02019-11-20 18:43:38190 sockaddr_storage addr_storage = {};
jbauch095ae152015-12-18 09:39:55191 socklen_t addrlen = sizeof(addr_storage);
192 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
193 int result = ::getsockname(s_, addr, &addrlen);
194 SocketAddress address;
195 if (result >= 0) {
196 SocketAddressFromSockAddrStorage(addr_storage, &address);
197 } else {
Mirko Bonadei675513b2017-11-09 10:09:25198 RTC_LOG(LS_WARNING) << "GetLocalAddress: unable to get local addr, socket="
199 << s_;
henrike@webrtc.orgf0488722014-05-13 18:00:26200 }
jbauch095ae152015-12-18 09:39:55201 return address;
202}
henrike@webrtc.orgf0488722014-05-13 18:00:26203
jbauch095ae152015-12-18 09:39:55204SocketAddress PhysicalSocket::GetRemoteAddress() const {
Mirko Bonadei108a2f02019-11-20 18:43:38205 sockaddr_storage addr_storage = {};
jbauch095ae152015-12-18 09:39:55206 socklen_t addrlen = sizeof(addr_storage);
207 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
208 int result = ::getpeername(s_, addr, &addrlen);
209 SocketAddress address;
210 if (result >= 0) {
211 SocketAddressFromSockAddrStorage(addr_storage, &address);
212 } else {
Mirko Bonadei675513b2017-11-09 10:09:25213 RTC_LOG(LS_WARNING)
214 << "GetRemoteAddress: unable to get remote addr, socket=" << s_;
henrike@webrtc.orgf0488722014-05-13 18:00:26215 }
jbauch095ae152015-12-18 09:39:55216 return address;
217}
henrike@webrtc.orgf0488722014-05-13 18:00:26218
jbauch095ae152015-12-18 09:39:55219int PhysicalSocket::Bind(const SocketAddress& bind_addr) {
deadbeefc874d122017-02-13 23:41:59220 SocketAddress copied_bind_addr = bind_addr;
221 // If a network binder is available, use it to bind a socket to an interface
222 // instead of bind(), since this is more reliable on an OS with a weak host
223 // model.
deadbeef9ffa13f2017-02-22 00:18:00224 if (ss_->network_binder() && !bind_addr.IsAnyIP()) {
deadbeefc874d122017-02-13 23:41:59225 NetworkBindingResult result =
226 ss_->network_binder()->BindSocketToNetwork(s_, bind_addr.ipaddr());
227 if (result == NetworkBindingResult::SUCCESS) {
228 // Since the network binder handled binding the socket to the desired
229 // network interface, we don't need to (and shouldn't) include an IP in
230 // the bind() call; bind() just needs to assign a port.
231 copied_bind_addr.SetIP(GetAnyIP(copied_bind_addr.ipaddr().family()));
232 } else if (result == NetworkBindingResult::NOT_IMPLEMENTED) {
Mirko Bonadei675513b2017-11-09 10:09:25233 RTC_LOG(LS_INFO) << "Can't bind socket to network because "
234 "network binding is not implemented for this OS.";
deadbeefc874d122017-02-13 23:41:59235 } else {
236 if (bind_addr.IsLoopbackIP()) {
237 // If we couldn't bind to a loopback IP (which should only happen in
238 // test scenarios), continue on. This may be expected behavior.
Paulina Hensmanb239a2e2020-03-31 14:16:11239 RTC_LOG(LS_VERBOSE) << "Binding socket to loopback address"
Mirko Bonadei675513b2017-11-09 10:09:25240 << " failed; result: " << static_cast<int>(result);
deadbeefc874d122017-02-13 23:41:59241 } else {
Paulina Hensmanb239a2e2020-03-31 14:16:11242 RTC_LOG(LS_WARNING) << "Binding socket to network address"
Mirko Bonadei675513b2017-11-09 10:09:25243 << " failed; result: " << static_cast<int>(result);
deadbeefc874d122017-02-13 23:41:59244 // If a network binding was attempted and failed, we should stop here
245 // and not try to use the socket. Otherwise, we may end up sending
246 // packets with an invalid source address.
247 // See: https://bugs.chromium.org/p/webrtc/issues/detail?id=7026
248 return -1;
249 }
250 }
251 }
jbauch095ae152015-12-18 09:39:55252 sockaddr_storage addr_storage;
deadbeefc874d122017-02-13 23:41:59253 size_t len = copied_bind_addr.ToSockAddrStorage(&addr_storage);
jbauch095ae152015-12-18 09:39:55254 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
255 int err = ::bind(s_, addr, static_cast<int>(len));
256 UpdateLastError();
tfarinaa41ab932015-10-30 23:08:48257#if !defined(NDEBUG)
jbauch095ae152015-12-18 09:39:55258 if (0 == err) {
259 dbg_addr_ = "Bound @ ";
260 dbg_addr_.append(GetLocalAddress().ToString());
261 }
tfarinaa41ab932015-10-30 23:08:48262#endif
jbauch095ae152015-12-18 09:39:55263 return err;
264}
265
266int PhysicalSocket::Connect(const SocketAddress& addr) {
267 // TODO(pthatcher): Implicit creation is required to reconnect...
268 // ...but should we make it more explicit?
269 if (state_ != CS_CLOSED) {
270 SetError(EALREADY);
271 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26272 }
jbauch095ae152015-12-18 09:39:55273 if (addr.IsUnresolvedIP()) {
Mirko Bonadei675513b2017-11-09 10:09:25274 RTC_LOG(LS_VERBOSE) << "Resolving addr in PhysicalSocket::Connect";
Harald Alvestrand60362c12023-10-10 11:30:18275 resolver_ = std::make_unique<webrtc::AsyncDnsResolver>();
276 resolver_->Start(addr, [this] { OnResolveResult(resolver_->result()); });
jbauch095ae152015-12-18 09:39:55277 state_ = CS_CONNECTING;
henrike@webrtc.orgf0488722014-05-13 18:00:26278 return 0;
279 }
280
jbauch095ae152015-12-18 09:39:55281 return DoConnect(addr);
282}
283
284int PhysicalSocket::DoConnect(const SocketAddress& connect_addr) {
Yves Gerey665174f2018-06-19 13:03:05285 if ((s_ == INVALID_SOCKET) && !Create(connect_addr.family(), SOCK_STREAM)) {
jbauch095ae152015-12-18 09:39:55286 return SOCKET_ERROR;
287 }
288 sockaddr_storage addr_storage;
289 size_t len = connect_addr.ToSockAddrStorage(&addr_storage);
290 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
291 int err = ::connect(s_, addr, static_cast<int>(len));
292 UpdateLastError();
jbauch577f5dc2017-05-17 23:32:26293 uint8_t events = DE_READ | DE_WRITE;
jbauch095ae152015-12-18 09:39:55294 if (err == 0) {
295 state_ = CS_CONNECTED;
296 } else if (IsBlockingError(GetError())) {
297 state_ = CS_CONNECTING;
jbauch577f5dc2017-05-17 23:32:26298 events |= DE_CONNECT;
jbauch095ae152015-12-18 09:39:55299 } else {
300 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26301 }
302
jbauch577f5dc2017-05-17 23:32:26303 EnableEvents(events);
jbauch095ae152015-12-18 09:39:55304 return 0;
305}
henrike@webrtc.orgf0488722014-05-13 18:00:26306
jbauch095ae152015-12-18 09:39:55307int PhysicalSocket::GetError() const {
Niels Möller6d176022021-02-09 13:44:48308 webrtc::MutexLock lock(&mutex_);
jbauch095ae152015-12-18 09:39:55309 return error_;
310}
henrike@webrtc.orgf0488722014-05-13 18:00:26311
jbauch095ae152015-12-18 09:39:55312void PhysicalSocket::SetError(int error) {
Niels Möller6d176022021-02-09 13:44:48313 webrtc::MutexLock lock(&mutex_);
jbauch095ae152015-12-18 09:39:55314 error_ = error;
315}
316
Niels Möllerd0b88792021-08-12 08:32:30317Socket::ConnState PhysicalSocket::GetState() const {
jbauch095ae152015-12-18 09:39:55318 return state_;
319}
320
321int PhysicalSocket::GetOption(Option opt, int* value) {
322 int slevel;
323 int sopt;
324 if (TranslateOption(opt, &slevel, &sopt) == -1)
325 return -1;
326 socklen_t optlen = sizeof(*value);
327 int ret = ::getsockopt(s_, slevel, sopt, (SockOptArg)value, &optlen);
Taylor Brandstetterecd6fc82020-02-06 01:26:37328 if (ret == -1) {
329 return -1;
330 }
331 if (opt == OPT_DONTFRAGMENT) {
henrike@webrtc.orgf0488722014-05-13 18:00:26332#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 09:39:55333 *value = (*value != IP_PMTUDISC_DONT) ? 1 : 0;
henrike@webrtc.orgf0488722014-05-13 18:00:26334#endif
Taylor Brandstetterecd6fc82020-02-06 01:26:37335 } else if (opt == OPT_DSCP) {
336#if defined(WEBRTC_POSIX)
337 // unshift DSCP value to get six most significant bits of IP DiffServ field
338 *value >>= 2;
339#endif
Per K8df31c92024-03-11 09:21:48340 } else if (opt == OPT_SEND_ECN) {
341#if defined(WEBRTC_POSIX)
342 // Least 2 significant bits.
343 *value = *value & kEcnMask;
344#endif
345 } else if (opt == OPT_RECV_ECN) {
346#if defined(WEBRTC_POSIX)
347 // Least 2 significant bits.
348 *value = *value & kEcnMask;
349#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26350 }
Per K8df31c92024-03-11 09:21:48351
jbauch095ae152015-12-18 09:39:55352 return ret;
353}
henrike@webrtc.orgf0488722014-05-13 18:00:26354
jbauch095ae152015-12-18 09:39:55355int PhysicalSocket::SetOption(Option opt, int value) {
356 int slevel;
357 int sopt;
358 if (TranslateOption(opt, &slevel, &sopt) == -1)
359 return -1;
360 if (opt == OPT_DONTFRAGMENT) {
henrike@webrtc.orgf0488722014-05-13 18:00:26361#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 09:39:55362 value = (value) ? IP_PMTUDISC_DO : IP_PMTUDISC_DONT;
henrike@webrtc.orgf0488722014-05-13 18:00:26363#endif
Taylor Brandstetterecd6fc82020-02-06 01:26:37364 } else if (opt == OPT_DSCP) {
Per K8df31c92024-03-11 09:21:48365 // IP DiffServ consists of DSCP 6 most significant, ECN 2 least
366 // significant.
367 dscp_ = value << 2;
368 value = dscp_ + (ecn_ & kEcnMask);
369 } else if (opt == OPT_SEND_ECN) {
370 ecn_ = value;
371 value = dscp_ + (ecn_ & kEcnMask);
henrike@webrtc.orgf0488722014-05-13 18:00:26372 }
Taylor Brandstetterecd6fc82020-02-06 01:26:37373#if defined(WEBRTC_POSIX)
374 if (sopt == IPV6_TCLASS) {
375 // Set the IPv4 option in all cases to support dual-stack sockets.
Taylor Brandstetter9d269402020-11-25 23:24:53376 // Don't bother checking the return code, as this is expected to fail if
377 // it's not actually dual-stack.
Taylor Brandstetterecd6fc82020-02-06 01:26:37378 ::setsockopt(s_, IPPROTO_IP, IP_TOS, (SockOptArg)&value, sizeof(value));
379 }
380#endif
Taylor Brandstetter9d269402020-11-25 23:24:53381 int result =
382 ::setsockopt(s_, slevel, sopt, (SockOptArg)&value, sizeof(value));
383 if (result != 0) {
384 UpdateLastError();
385 }
386 return result;
jbauch095ae152015-12-18 09:39:55387}
henrike@webrtc.orgf0488722014-05-13 18:00:26388
jbauch095ae152015-12-18 09:39:55389int PhysicalSocket::Send(const void* pv, size_t cb) {
Yves Gerey665174f2018-06-19 13:03:05390 int sent = DoSend(
391 s_, reinterpret_cast<const char*>(pv), static_cast<int>(cb),
henrike@webrtc.orgf0488722014-05-13 18:00:26392#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
jbauch095ae152015-12-18 09:39:55393 // Suppress SIGPIPE. Without this, attempting to send on a socket whose
394 // other end is closed will result in a SIGPIPE signal being raised to
395 // our process, which by default will terminate the process, which we
396 // don't want. By specifying this flag, we'll just get the error EPIPE
397 // instead and can handle the error gracefully.
398 MSG_NOSIGNAL
henrike@webrtc.orgf0488722014-05-13 18:00:26399#else
jbauch095ae152015-12-18 09:39:55400 0
henrike@webrtc.orgf0488722014-05-13 18:00:26401#endif
Jonas Olssona4d87372019-07-05 17:08:33402 );
jbauch095ae152015-12-18 09:39:55403 UpdateLastError();
404 MaybeRemapSendError();
405 // We have seen minidumps where this may be false.
nisseede5da42017-01-12 13:15:36406 RTC_DCHECK(sent <= static_cast<int>(cb));
jbauchf2a2bf42016-02-04 00:45:32407 if ((sent > 0 && sent < static_cast<int>(cb)) ||
408 (sent < 0 && IsBlockingError(GetError()))) {
jbauch577f5dc2017-05-17 23:32:26409 EnableEvents(DE_WRITE);
henrike@webrtc.orgf0488722014-05-13 18:00:26410 }
jbauch095ae152015-12-18 09:39:55411 return sent;
412}
henrike@webrtc.orgf0488722014-05-13 18:00:26413
jbauch095ae152015-12-18 09:39:55414int PhysicalSocket::SendTo(const void* buffer,
415 size_t length,
416 const SocketAddress& addr) {
417 sockaddr_storage saddr;
418 size_t len = addr.ToSockAddrStorage(&saddr);
Yves Gerey665174f2018-06-19 13:03:05419 int sent =
420 DoSendTo(s_, static_cast<const char*>(buffer), static_cast<int>(length),
henrike@webrtc.orgf0488722014-05-13 18:00:26421#if defined(WEBRTC_LINUX) && !defined(WEBRTC_ANDROID)
Yves Gerey665174f2018-06-19 13:03:05422 // Suppress SIGPIPE. See above for explanation.
423 MSG_NOSIGNAL,
henrike@webrtc.orgf0488722014-05-13 18:00:26424#else
Yves Gerey665174f2018-06-19 13:03:05425 0,
henrike@webrtc.orgf0488722014-05-13 18:00:26426#endif
Yves Gerey665174f2018-06-19 13:03:05427 reinterpret_cast<sockaddr*>(&saddr), static_cast<int>(len));
jbauch095ae152015-12-18 09:39:55428 UpdateLastError();
429 MaybeRemapSendError();
430 // We have seen minidumps where this may be false.
nisseede5da42017-01-12 13:15:36431 RTC_DCHECK(sent <= static_cast<int>(length));
jbauchf2a2bf42016-02-04 00:45:32432 if ((sent > 0 && sent < static_cast<int>(length)) ||
433 (sent < 0 && IsBlockingError(GetError()))) {
jbauch577f5dc2017-05-17 23:32:26434 EnableEvents(DE_WRITE);
henrike@webrtc.orgf0488722014-05-13 18:00:26435 }
jbauch095ae152015-12-18 09:39:55436 return sent;
437}
henrike@webrtc.orgf0488722014-05-13 18:00:26438
Stefan Holmer9131efd2016-05-23 16:19:26439int PhysicalSocket::Recv(void* buffer, size_t length, int64_t* timestamp) {
Per K8df31c92024-03-11 09:21:48440 int received = DoReadFromSocket(buffer, length, /*out_addr*/ nullptr,
441 timestamp, /*ecn=*/nullptr);
jbauch095ae152015-12-18 09:39:55442 if ((received == 0) && (length != 0)) {
443 // Note: on graceful shutdown, recv can return 0. In this case, we
444 // pretend it is blocking, and then signal close, so that simplifying
445 // assumptions can be made about Recv.
Mirko Bonadei675513b2017-11-09 10:09:25446 RTC_LOG(LS_WARNING) << "EOF from socket; deferring close event";
jbauch095ae152015-12-18 09:39:55447 // Must turn this back on so that the select() loop will notice the close
448 // event.
jbauch577f5dc2017-05-17 23:32:26449 EnableEvents(DE_READ);
jbauch095ae152015-12-18 09:39:55450 SetError(EWOULDBLOCK);
451 return SOCKET_ERROR;
henrike@webrtc.orgf0488722014-05-13 18:00:26452 }
Per Kjellanderfdcfefa2022-11-08 11:48:52453
jbauch095ae152015-12-18 09:39:55454 UpdateLastError();
455 int error = GetError();
456 bool success = (received >= 0) || IsBlockingError(error);
457 if (udp_ || success) {
jbauch577f5dc2017-05-17 23:32:26458 EnableEvents(DE_READ);
henrike@webrtc.orgf0488722014-05-13 18:00:26459 }
jbauch095ae152015-12-18 09:39:55460 if (!success) {
Mirko Bonadei675513b2017-11-09 10:09:25461 RTC_LOG_F(LS_VERBOSE) << "Error = " << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26462 }
jbauch095ae152015-12-18 09:39:55463 return received;
464}
henrike@webrtc.orgf0488722014-05-13 18:00:26465
jbauch095ae152015-12-18 09:39:55466int PhysicalSocket::RecvFrom(void* buffer,
467 size_t length,
Stefan Holmer9131efd2016-05-23 16:19:26468 SocketAddress* out_addr,
469 int64_t* timestamp) {
Per K8df31c92024-03-11 09:21:48470 int received = DoReadFromSocket(buffer, length, out_addr, timestamp, nullptr);
Per K056782c2024-01-30 11:32:05471
472 UpdateLastError();
473 int error = GetError();
474 bool success = (received >= 0) || IsBlockingError(error);
475 if (udp_ || success) {
476 EnableEvents(DE_READ);
477 }
478 if (!success) {
479 RTC_LOG_F(LS_VERBOSE) << "Error = " << error;
480 }
481 return received;
482}
483
484int PhysicalSocket::RecvFrom(ReceiveBuffer& buffer) {
485 int64_t timestamp = -1;
486 static constexpr int BUF_SIZE = 64 * 1024;
487 buffer.payload.EnsureCapacity(BUF_SIZE);
488
Per K8df31c92024-03-11 09:21:48489 int received = DoReadFromSocket(
490 buffer.payload.data(), buffer.payload.capacity(), &buffer.source_address,
491 &timestamp, ecn_ ? &buffer.ecn : nullptr);
Per K056782c2024-01-30 11:32:05492 buffer.payload.SetSize(received > 0 ? received : 0);
493 if (received > 0 && timestamp != -1) {
494 buffer.arrival_time = webrtc::Timestamp::Micros(timestamp);
495 }
jbauch095ae152015-12-18 09:39:55496 UpdateLastError();
jbauch095ae152015-12-18 09:39:55497 int error = GetError();
498 bool success = (received >= 0) || IsBlockingError(error);
499 if (udp_ || success) {
jbauch577f5dc2017-05-17 23:32:26500 EnableEvents(DE_READ);
jbauch095ae152015-12-18 09:39:55501 }
502 if (!success) {
Mirko Bonadei675513b2017-11-09 10:09:25503 RTC_LOG_F(LS_VERBOSE) << "Error = " << error;
jbauch095ae152015-12-18 09:39:55504 }
505 return received;
506}
507
Per Kjellanderfdcfefa2022-11-08 11:48:52508int PhysicalSocket::DoReadFromSocket(void* buffer,
509 size_t length,
510 SocketAddress* out_addr,
Per K8df31c92024-03-11 09:21:48511 int64_t* timestamp,
512 EcnMarking* ecn) {
Per Kjellanderfdcfefa2022-11-08 11:48:52513 sockaddr_storage addr_storage;
514 socklen_t addr_len = sizeof(addr_storage);
515 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
516
517#if defined(WEBRTC_POSIX)
518 int received = 0;
Per K58cccc62024-04-19 06:31:23519 iovec iov = {.iov_base = buffer, .iov_len = length};
520 msghdr msg = {.msg_iov = &iov, .msg_iovlen = 1};
521 if (out_addr) {
522 out_addr->Clear();
523 msg.msg_name = addr;
524 msg.msg_namelen = addr_len;
525 }
Per K8df31c92024-03-11 09:21:48526 // TODO(bugs.webrtc.org/15368): What size is needed? IPV6_TCLASS is supposed
527 // to be an int. Why is a larger size needed?
528 char control[CMSG_SPACE(sizeof(struct timeval) + 5 * sizeof(int))] = {};
529 if (timestamp || ecn) {
Per Kjellanderfdcfefa2022-11-08 11:48:52530 *timestamp = -1;
531 msg.msg_control = &control;
532 msg.msg_controllen = sizeof(control);
533 }
534 received = ::recvmsg(s_, &msg, 0);
535 if (received <= 0) {
536 // An error occured or shut down.
537 return received;
538 }
Per K8df31c92024-03-11 09:21:48539 if (timestamp || ecn) {
Per Kjellanderfdcfefa2022-11-08 11:48:52540 struct cmsghdr* cmsg;
541 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
Per K8df31c92024-03-11 09:21:48542 if (ecn) {
543 if ((cmsg->cmsg_type == IPV6_TCLASS &&
544 cmsg->cmsg_level == IPPROTO_IPV6) ||
545 (cmsg->cmsg_type == IP_TOS && cmsg->cmsg_level == IPPROTO_IP)) {
546 *ecn = EcnFromDs(CMSG_DATA(cmsg)[0]);
547 }
548 }
Per Kjellanderfdcfefa2022-11-08 11:48:52549 if (cmsg->cmsg_level != SOL_SOCKET)
550 continue;
Per K8df31c92024-03-11 09:21:48551 if (timestamp && cmsg->cmsg_type == SCM_TIMESTAMP) {
Per Kjellanderfdcfefa2022-11-08 11:48:52552 timeval* ts = reinterpret_cast<timeval*>(CMSG_DATA(cmsg));
553 *timestamp =
554 rtc::kNumMicrosecsPerSec * static_cast<int64_t>(ts->tv_sec) +
555 static_cast<int64_t>(ts->tv_usec);
Per Kjellanderfdcfefa2022-11-08 11:48:52556 }
557 }
558 }
559 if (out_addr) {
560 SocketAddressFromSockAddrStorage(addr_storage, out_addr);
561 }
Per Kjellanderfdcfefa2022-11-08 11:48:52562 return received;
563
564#else
565 int received = 0;
566 if (out_addr) {
567 received = ::recvfrom(s_, static_cast<char*>(buffer),
568 static_cast<int>(length), 0, addr, &addr_len);
569 SocketAddressFromSockAddrStorage(addr_storage, out_addr);
570 } else {
571 received =
572 ::recv(s_, static_cast<char*>(buffer), static_cast<int>(length), 0);
573 }
574 if (timestamp) {
575 *timestamp = -1;
576 }
577 return received;
578#endif
579}
580
jbauch095ae152015-12-18 09:39:55581int PhysicalSocket::Listen(int backlog) {
582 int err = ::listen(s_, backlog);
583 UpdateLastError();
584 if (err == 0) {
585 state_ = CS_CONNECTING;
jbauch577f5dc2017-05-17 23:32:26586 EnableEvents(DE_ACCEPT);
jbauch095ae152015-12-18 09:39:55587#if !defined(NDEBUG)
588 dbg_addr_ = "Listening @ ";
589 dbg_addr_.append(GetLocalAddress().ToString());
590#endif
henrike@webrtc.orgf0488722014-05-13 18:00:26591 }
jbauch095ae152015-12-18 09:39:55592 return err;
593}
henrike@webrtc.orgf0488722014-05-13 18:00:26594
Niels Möllerd0b88792021-08-12 08:32:30595Socket* PhysicalSocket::Accept(SocketAddress* out_addr) {
jbauch095ae152015-12-18 09:39:55596 // Always re-subscribe DE_ACCEPT to make sure new incoming connections will
597 // trigger an event even if DoAccept returns an error here.
jbauch577f5dc2017-05-17 23:32:26598 EnableEvents(DE_ACCEPT);
jbauch095ae152015-12-18 09:39:55599 sockaddr_storage addr_storage;
600 socklen_t addr_len = sizeof(addr_storage);
601 sockaddr* addr = reinterpret_cast<sockaddr*>(&addr_storage);
602 SOCKET s = DoAccept(s_, addr, &addr_len);
603 UpdateLastError();
604 if (s == INVALID_SOCKET)
605 return nullptr;
606 if (out_addr != nullptr)
607 SocketAddressFromSockAddrStorage(addr_storage, out_addr);
608 return ss_->WrapSocket(s);
609}
610
611int PhysicalSocket::Close() {
612 if (s_ == INVALID_SOCKET)
613 return 0;
614 int err = ::closesocket(s_);
615 UpdateLastError();
616 s_ = INVALID_SOCKET;
617 state_ = CS_CLOSED;
jbauch577f5dc2017-05-17 23:32:26618 SetEnabledEvents(0);
jbauch095ae152015-12-18 09:39:55619 if (resolver_) {
Harald Alvestrand60362c12023-10-10 11:30:18620 resolver_.reset();
henrike@webrtc.orgf0488722014-05-13 18:00:26621 }
jbauch095ae152015-12-18 09:39:55622 return err;
623}
henrike@webrtc.orgf0488722014-05-13 18:00:26624
jbauch095ae152015-12-18 09:39:55625SOCKET PhysicalSocket::DoAccept(SOCKET socket,
626 sockaddr* addr,
627 socklen_t* addrlen) {
628 return ::accept(socket, addr, addrlen);
629}
630
jbauchf2a2bf42016-02-04 00:45:32631int PhysicalSocket::DoSend(SOCKET socket, const char* buf, int len, int flags) {
632 return ::send(socket, buf, len, flags);
633}
634
635int PhysicalSocket::DoSendTo(SOCKET socket,
636 const char* buf,
637 int len,
638 int flags,
639 const struct sockaddr* dest_addr,
640 socklen_t addrlen) {
641 return ::sendto(socket, buf, len, flags, dest_addr, addrlen);
642}
643
Harald Alvestrand60362c12023-10-10 11:30:18644void PhysicalSocket::OnResolveResult(
645 const webrtc::AsyncDnsResolverResult& result) {
646 int error = result.GetError();
jbauch095ae152015-12-18 09:39:55647 if (error == 0) {
Harald Alvestrand60362c12023-10-10 11:30:18648 SocketAddress address;
649 if (result.GetResolvedAddress(AF_INET, &address)) {
650 error = DoConnect(address);
651 } else {
652 Close();
653 }
jbauch095ae152015-12-18 09:39:55654 } else {
655 Close();
henrike@webrtc.orgf0488722014-05-13 18:00:26656 }
657
jbauch095ae152015-12-18 09:39:55658 if (error) {
659 SetError(error);
660 SignalCloseEvent(this, error);
henrike@webrtc.orgf0488722014-05-13 18:00:26661 }
jbauch095ae152015-12-18 09:39:55662}
henrike@webrtc.orgf0488722014-05-13 18:00:26663
jbauch095ae152015-12-18 09:39:55664void PhysicalSocket::UpdateLastError() {
Patrik Höglunda8005cf2017-12-13 15:05:42665 SetError(LAST_SYSTEM_ERROR);
jbauch095ae152015-12-18 09:39:55666}
667
668void PhysicalSocket::MaybeRemapSendError() {
henrike@webrtc.orgf0488722014-05-13 18:00:26669#if defined(WEBRTC_MAC)
jbauch095ae152015-12-18 09:39:55670 // https://developer.apple.com/library/mac/documentation/Darwin/
671 // Reference/ManPages/man2/sendto.2.html
672 // ENOBUFS - The output queue for a network interface is full.
673 // This generally indicates that the interface has stopped sending,
674 // but may be caused by transient congestion.
675 if (GetError() == ENOBUFS) {
676 SetError(EWOULDBLOCK);
henrike@webrtc.orgf0488722014-05-13 18:00:26677 }
jbauch095ae152015-12-18 09:39:55678#endif
679}
henrike@webrtc.orgf0488722014-05-13 18:00:26680
jbauch577f5dc2017-05-17 23:32:26681void PhysicalSocket::SetEnabledEvents(uint8_t events) {
682 enabled_events_ = events;
683}
684
685void PhysicalSocket::EnableEvents(uint8_t events) {
686 enabled_events_ |= events;
687}
688
689void PhysicalSocket::DisableEvents(uint8_t events) {
690 enabled_events_ &= ~events;
691}
692
jbauch095ae152015-12-18 09:39:55693int PhysicalSocket::TranslateOption(Option opt, int* slevel, int* sopt) {
694 switch (opt) {
695 case OPT_DONTFRAGMENT:
henrike@webrtc.orgf0488722014-05-13 18:00:26696#if defined(WEBRTC_WIN)
jbauch095ae152015-12-18 09:39:55697 *slevel = IPPROTO_IP;
698 *sopt = IP_DONTFRAGMENT;
699 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26700#elif defined(WEBRTC_MAC) || defined(BSD) || defined(__native_client__)
Mirko Bonadei675513b2017-11-09 10:09:25701 RTC_LOG(LS_WARNING) << "Socket::OPT_DONTFRAGMENT not supported.";
jbauch095ae152015-12-18 09:39:55702 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26703#elif defined(WEBRTC_POSIX)
jbauch095ae152015-12-18 09:39:55704 *slevel = IPPROTO_IP;
705 *sopt = IP_MTU_DISCOVER;
706 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26707#endif
jbauch095ae152015-12-18 09:39:55708 case OPT_RCVBUF:
709 *slevel = SOL_SOCKET;
710 *sopt = SO_RCVBUF;
711 break;
712 case OPT_SNDBUF:
713 *slevel = SOL_SOCKET;
714 *sopt = SO_SNDBUF;
715 break;
716 case OPT_NODELAY:
717 *slevel = IPPROTO_TCP;
718 *sopt = TCP_NODELAY;
719 break;
720 case OPT_DSCP:
Taylor Brandstetterecd6fc82020-02-06 01:26:37721#if defined(WEBRTC_POSIX)
722 if (family_ == AF_INET6) {
723 *slevel = IPPROTO_IPV6;
724 *sopt = IPV6_TCLASS;
725 } else {
726 *slevel = IPPROTO_IP;
727 *sopt = IP_TOS;
728 }
729 break;
730#else
Mirko Bonadei675513b2017-11-09 10:09:25731 RTC_LOG(LS_WARNING) << "Socket::OPT_DSCP not supported.";
jbauch095ae152015-12-18 09:39:55732 return -1;
Taylor Brandstetterecd6fc82020-02-06 01:26:37733#endif
Per K8df31c92024-03-11 09:21:48734 case OPT_SEND_ECN:
735#if defined(WEBRTC_POSIX)
736 if (family_ == AF_INET6) {
737 *slevel = IPPROTO_IPV6;
738 *sopt = IPV6_TCLASS;
739 } else {
740 *slevel = IPPROTO_IP;
741 *sopt = IP_TOS;
742 }
743 break;
744#else
745 RTC_LOG(LS_WARNING) << "Socket::OPT_SEND_ESN not supported.";
746 return -1;
747#endif
748 case OPT_RECV_ECN:
749#if defined(WEBRTC_POSIX)
750 if (family_ == AF_INET6) {
751 *slevel = IPPROTO_IPV6;
752 *sopt = IPV6_RECVTCLASS;
753 } else {
754 *slevel = IPPROTO_IP;
755 *sopt = IP_RECVTOS;
756 }
757 break;
758#else
759 RTC_LOG(LS_WARNING) << "Socket::OPT_RECV_ECN not supported.";
760 return -1;
761#endif
jbauch095ae152015-12-18 09:39:55762 case OPT_RTP_SENDTIME_EXTN_ID:
763 return -1; // No logging is necessary as this not a OS socket option.
Tim Na4473d752024-03-12 17:48:19764 case OPT_KEEPALIVE:
765 *slevel = SOL_SOCKET;
766 *sopt = SO_KEEPALIVE;
767 break;
768 case OPT_TCP_KEEPCNT:
769 *slevel = IPPROTO_TCP;
770 *sopt = TCP_KEEPCNT;
771 break;
772 case OPT_TCP_KEEPIDLE:
773 *slevel = IPPROTO_TCP;
774#if !defined(WEBRTC_MAC)
775 *sopt = TCP_KEEPIDLE;
776#else
777 *sopt = TCP_KEEPALIVE;
778#endif
779 break;
780 case OPT_TCP_KEEPINTVL:
781 *slevel = IPPROTO_TCP;
782 *sopt = TCP_KEEPINTVL;
783 break;
784 case OPT_TCP_USER_TIMEOUT:
785#if defined(WEBRTC_LINUX) || defined(WEBRTC_ANDROID)
786 *slevel = IPPROTO_TCP;
787 *sopt = TCP_USER_TIMEOUT;
788 break;
789#else
790 RTC_LOG(LS_WARNING) << "Socket::OPT_TCP_USER_TIMEOUT not supported.";
791 return -1;
792#endif
jbauch095ae152015-12-18 09:39:55793 default:
Artem Titovd3251962021-11-15 15:57:07794 RTC_DCHECK_NOTREACHED();
jbauch095ae152015-12-18 09:39:55795 return -1;
henrike@webrtc.orgf0488722014-05-13 18:00:26796 }
jbauch095ae152015-12-18 09:39:55797 return 0;
798}
henrike@webrtc.orgf0488722014-05-13 18:00:26799
Yves Gerey665174f2018-06-19 13:03:05800SocketDispatcher::SocketDispatcher(PhysicalSocketServer* ss)
jbauch4331fcd2016-01-07 06:20:28801#if defined(WEBRTC_WIN)
Yves Gerey665174f2018-06-19 13:03:05802 : PhysicalSocket(ss),
803 id_(0),
804 signal_close_(false)
jbauch4331fcd2016-01-07 06:20:28805#else
Yves Gerey665174f2018-06-19 13:03:05806 : PhysicalSocket(ss)
jbauch4331fcd2016-01-07 06:20:28807#endif
808{
809}
810
Yves Gerey665174f2018-06-19 13:03:05811SocketDispatcher::SocketDispatcher(SOCKET s, PhysicalSocketServer* ss)
jbauch4331fcd2016-01-07 06:20:28812#if defined(WEBRTC_WIN)
Yves Gerey665174f2018-06-19 13:03:05813 : PhysicalSocket(ss, s),
814 id_(0),
815 signal_close_(false)
jbauch4331fcd2016-01-07 06:20:28816#else
Yves Gerey665174f2018-06-19 13:03:05817 : PhysicalSocket(ss, s)
jbauch4331fcd2016-01-07 06:20:28818#endif
819{
820}
821
822SocketDispatcher::~SocketDispatcher() {
823 Close();
824}
825
826bool SocketDispatcher::Initialize() {
nisseede5da42017-01-12 13:15:36827 RTC_DCHECK(s_ != INVALID_SOCKET);
Yves Gerey665174f2018-06-19 13:03:05828// Must be a non-blocking
jbauch4331fcd2016-01-07 06:20:28829#if defined(WEBRTC_WIN)
830 u_long argp = 1;
831 ioctlsocket(s_, FIONBIO, &argp);
832#elif defined(WEBRTC_POSIX)
833 fcntl(s_, F_SETFL, fcntl(s_, F_GETFL, 0) | O_NONBLOCK);
Per K58cccc62024-04-19 06:31:23834 int value = 1;
835 // Attempt to get receive packet timestamp from the socket.
836 if (::setsockopt(s_, SOL_SOCKET, SO_TIMESTAMP, &value, sizeof(value)) != 0) {
837 RTC_DLOG(LS_ERROR) << "::setsockopt failed. errno: " << LAST_SYSTEM_ERROR;
Per Kjellanderfdcfefa2022-11-08 11:48:52838 }
jbauch4331fcd2016-01-07 06:20:28839#endif
Per Kjellanderfdcfefa2022-11-08 11:48:52840
deadbeefeae45642017-05-26 23:27:09841#if defined(WEBRTC_IOS)
842 // iOS may kill sockets when the app is moved to the background
843 // (specifically, if the app doesn't use the "voip" UIBackgroundMode). When
844 // we attempt to write to such a socket, SIGPIPE will be raised, which by
845 // default will terminate the process, which we don't want. By specifying
846 // this socket option, SIGPIPE will be disabled for the socket.
Per K58cccc62024-04-19 06:31:23847 value = 1;
Per Kjellanderfdcfefa2022-11-08 11:48:52848 if (::setsockopt(s_, SOL_SOCKET, SO_NOSIGPIPE, &value, sizeof(value)) != 0) {
849 RTC_DLOG(LS_ERROR) << "::setsockopt failed. errno: " << LAST_SYSTEM_ERROR;
850 }
Per K58cccc62024-04-19 06:31:23851
deadbeefeae45642017-05-26 23:27:09852#endif
jbauch4331fcd2016-01-07 06:20:28853 ss_->Add(this);
854 return true;
855}
856
857bool SocketDispatcher::Create(int type) {
858 return Create(AF_INET, type);
859}
860
861bool SocketDispatcher::Create(int family, int type) {
862 // Change the socket to be non-blocking.
863 if (!PhysicalSocket::Create(family, type))
864 return false;
865
866 if (!Initialize())
867 return false;
868
869#if defined(WEBRTC_WIN)
Yves Gerey665174f2018-06-19 13:03:05870 do {
871 id_ = ++next_id_;
872 } while (id_ == 0);
jbauch4331fcd2016-01-07 06:20:28873#endif
874 return true;
875}
876
877#if defined(WEBRTC_WIN)
878
879WSAEVENT SocketDispatcher::GetWSAEvent() {
880 return WSA_INVALID_EVENT;
881}
882
883SOCKET SocketDispatcher::GetSocket() {
884 return s_;
885}
886
887bool SocketDispatcher::CheckSignalClose() {
888 if (!signal_close_)
889 return false;
890
891 char ch;
892 if (recv(s_, &ch, 1, MSG_PEEK) > 0)
893 return false;
894
895 state_ = CS_CLOSED;
896 signal_close_ = false;
897 SignalCloseEvent(this, signal_err_);
898 return true;
899}
900
901int SocketDispatcher::next_id_ = 0;
902
903#elif defined(WEBRTC_POSIX)
904
905int SocketDispatcher::GetDescriptor() {
906 return s_;
907}
908
909bool SocketDispatcher::IsDescriptorClosed() {
deadbeeffaedf7f2017-02-09 23:09:22910 if (udp_) {
911 // The MSG_PEEK trick doesn't work for UDP, since (at least in some
912 // circumstances) it requires reading an entire UDP packet, which would be
Artem Titov96e3b992021-07-26 14:03:14913 // bad for performance here. So, just check whether `s_` has been closed,
deadbeeffaedf7f2017-02-09 23:09:22914 // which should be sufficient.
915 return s_ == INVALID_SOCKET;
916 }
jbauch4331fcd2016-01-07 06:20:28917 // We don't have a reliable way of distinguishing end-of-stream
918 // from readability. So test on each readable call. Is this
919 // inefficient? Probably.
920 char ch;
Taylor Brandstetter3041eb22021-11-02 19:46:40921 ssize_t res;
922 // Retry if the system call was interrupted.
923 do {
924 res = ::recv(s_, &ch, 1, MSG_PEEK);
925 } while (res < 0 && errno == EINTR);
jbauch4331fcd2016-01-07 06:20:28926 if (res > 0) {
927 // Data available, so not closed.
928 return false;
929 } else if (res == 0) {
930 // EOF, so closed.
931 return true;
932 } else { // error
933 switch (errno) {
934 // Returned if we've already closed s_.
935 case EBADF:
Taylor Brandstetter3041eb22021-11-02 19:46:40936 // This is dangerous: if we keep attempting to access a FD after close,
937 // it could be reopened by something else making us think it's still
938 // open. Note that this is only a DCHECK.
Artem Titovd3251962021-11-15 15:57:07939 RTC_DCHECK_NOTREACHED();
Taylor Brandstetter3041eb22021-11-02 19:46:40940 return true;
jbauch4331fcd2016-01-07 06:20:28941 // Returned during ungraceful peer shutdown.
942 case ECONNRESET:
943 return true;
Taylor Brandstetter3041eb22021-11-02 19:46:40944 case ECONNABORTED:
945 return true;
946 case EPIPE:
947 return true;
deadbeeffaedf7f2017-02-09 23:09:22948 // The normal blocking error; don't log anything.
949 case EWOULDBLOCK:
deadbeeffaedf7f2017-02-09 23:09:22950 return false;
jbauch4331fcd2016-01-07 06:20:28951 default:
952 // Assume that all other errors are just blocking errors, meaning the
953 // connection is still good but we just can't read from it right now.
954 // This should only happen when connecting (and at most once), because
955 // in all other cases this function is only called if the file
956 // descriptor is already known to be in the readable state. However,
957 // it's not necessary a problem if we spuriously interpret a
958 // "connection lost"-type error as a blocking error, because typically
959 // the next recv() will get EOF, so we'll still eventually notice that
960 // the socket is closed.
Mirko Bonadei675513b2017-11-09 10:09:25961 RTC_LOG_ERR(LS_WARNING) << "Assuming benign blocking error";
jbauch4331fcd2016-01-07 06:20:28962 return false;
963 }
964 }
965}
966
Yves Gerey665174f2018-06-19 13:03:05967#endif // WEBRTC_POSIX
jbauch4331fcd2016-01-07 06:20:28968
969uint32_t SocketDispatcher::GetRequestedEvents() {
jbauch577f5dc2017-05-17 23:32:26970 return enabled_events();
jbauch4331fcd2016-01-07 06:20:28971}
972
jbauch4331fcd2016-01-07 06:20:28973#if defined(WEBRTC_WIN)
974
975void SocketDispatcher::OnEvent(uint32_t ff, int err) {
Niels Möller21347452021-02-12 10:19:52976 if ((ff & DE_CONNECT) != 0)
977 state_ = CS_CONNECTED;
978
979 // We set CS_CLOSED from CheckSignalClose.
980
jbauch4331fcd2016-01-07 06:20:28981 int cache_id = id_;
982 // Make sure we deliver connect/accept first. Otherwise, consumers may see
983 // something like a READ followed by a CONNECT, which would be odd.
984 if (((ff & DE_CONNECT) != 0) && (id_ == cache_id)) {
985 if (ff != DE_CONNECT)
Mirko Bonadei675513b2017-11-09 10:09:25986 RTC_LOG(LS_VERBOSE) << "Signalled with DE_CONNECT: " << ff;
jbauch577f5dc2017-05-17 23:32:26987 DisableEvents(DE_CONNECT);
jbauch4331fcd2016-01-07 06:20:28988#if !defined(NDEBUG)
989 dbg_addr_ = "Connected @ ";
990 dbg_addr_.append(GetRemoteAddress().ToString());
991#endif
992 SignalConnectEvent(this);
993 }
994 if (((ff & DE_ACCEPT) != 0) && (id_ == cache_id)) {
jbauch577f5dc2017-05-17 23:32:26995 DisableEvents(DE_ACCEPT);
jbauch4331fcd2016-01-07 06:20:28996 SignalReadEvent(this);
997 }
998 if ((ff & DE_READ) != 0) {
jbauch577f5dc2017-05-17 23:32:26999 DisableEvents(DE_READ);
jbauch4331fcd2016-01-07 06:20:281000 SignalReadEvent(this);
1001 }
1002 if (((ff & DE_WRITE) != 0) && (id_ == cache_id)) {
jbauch577f5dc2017-05-17 23:32:261003 DisableEvents(DE_WRITE);
jbauch4331fcd2016-01-07 06:20:281004 SignalWriteEvent(this);
1005 }
1006 if (((ff & DE_CLOSE) != 0) && (id_ == cache_id)) {
1007 signal_close_ = true;
1008 signal_err_ = err;
1009 }
1010}
1011
1012#elif defined(WEBRTC_POSIX)
1013
1014void SocketDispatcher::OnEvent(uint32_t ff, int err) {
Niels Möller21347452021-02-12 10:19:521015 if ((ff & DE_CONNECT) != 0)
1016 state_ = CS_CONNECTED;
1017
1018 if ((ff & DE_CLOSE) != 0)
1019 state_ = CS_CLOSED;
1020
jbauchde4db112017-05-31 20:09:181021#if defined(WEBRTC_USE_EPOLL)
1022 // Remember currently enabled events so we can combine multiple changes
1023 // into one update call later.
1024 // The signal handlers might re-enable events disabled here, so we can't
1025 // keep a list of events to disable at the end of the method. This list
1026 // would not be updated with the events enabled by the signal handlers.
1027 StartBatchedEventUpdates();
1028#endif
jbauch4331fcd2016-01-07 06:20:281029 // Make sure we deliver connect/accept first. Otherwise, consumers may see
1030 // something like a READ followed by a CONNECT, which would be odd.
1031 if ((ff & DE_CONNECT) != 0) {
jbauch577f5dc2017-05-17 23:32:261032 DisableEvents(DE_CONNECT);
jbauch4331fcd2016-01-07 06:20:281033 SignalConnectEvent(this);
1034 }
1035 if ((ff & DE_ACCEPT) != 0) {
jbauch577f5dc2017-05-17 23:32:261036 DisableEvents(DE_ACCEPT);
jbauch4331fcd2016-01-07 06:20:281037 SignalReadEvent(this);
1038 }
1039 if ((ff & DE_READ) != 0) {
jbauch577f5dc2017-05-17 23:32:261040 DisableEvents(DE_READ);
jbauch4331fcd2016-01-07 06:20:281041 SignalReadEvent(this);
1042 }
1043 if ((ff & DE_WRITE) != 0) {
jbauch577f5dc2017-05-17 23:32:261044 DisableEvents(DE_WRITE);
jbauch4331fcd2016-01-07 06:20:281045 SignalWriteEvent(this);
1046 }
1047 if ((ff & DE_CLOSE) != 0) {
1048 // The socket is now dead to us, so stop checking it.
jbauch577f5dc2017-05-17 23:32:261049 SetEnabledEvents(0);
jbauch4331fcd2016-01-07 06:20:281050 SignalCloseEvent(this, err);
1051 }
jbauchde4db112017-05-31 20:09:181052#if defined(WEBRTC_USE_EPOLL)
1053 FinishBatchedEventUpdates();
1054#endif
jbauch4331fcd2016-01-07 06:20:281055}
1056
Yves Gerey665174f2018-06-19 13:03:051057#endif // WEBRTC_POSIX
jbauch4331fcd2016-01-07 06:20:281058
jbauchde4db112017-05-31 20:09:181059#if defined(WEBRTC_USE_EPOLL)
1060
Taylor Brandstetter7b69a442020-08-20 23:43:131061inline static int GetEpollEvents(uint32_t ff) {
jbauchde4db112017-05-31 20:09:181062 int events = 0;
1063 if (ff & (DE_READ | DE_ACCEPT)) {
1064 events |= EPOLLIN;
1065 }
1066 if (ff & (DE_WRITE | DE_CONNECT)) {
1067 events |= EPOLLOUT;
1068 }
1069 return events;
1070}
1071
1072void SocketDispatcher::StartBatchedEventUpdates() {
1073 RTC_DCHECK_EQ(saved_enabled_events_, -1);
1074 saved_enabled_events_ = enabled_events();
1075}
1076
1077void SocketDispatcher::FinishBatchedEventUpdates() {
1078 RTC_DCHECK_NE(saved_enabled_events_, -1);
1079 uint8_t old_events = static_cast<uint8_t>(saved_enabled_events_);
1080 saved_enabled_events_ = -1;
1081 MaybeUpdateDispatcher(old_events);
1082}
1083
1084void SocketDispatcher::MaybeUpdateDispatcher(uint8_t old_events) {
1085 if (GetEpollEvents(enabled_events()) != GetEpollEvents(old_events) &&
1086 saved_enabled_events_ == -1) {
1087 ss_->Update(this);
1088 }
1089}
1090
1091void SocketDispatcher::SetEnabledEvents(uint8_t events) {
1092 uint8_t old_events = enabled_events();
1093 PhysicalSocket::SetEnabledEvents(events);
1094 MaybeUpdateDispatcher(old_events);
1095}
1096
1097void SocketDispatcher::EnableEvents(uint8_t events) {
1098 uint8_t old_events = enabled_events();
1099 PhysicalSocket::EnableEvents(events);
1100 MaybeUpdateDispatcher(old_events);
1101}
1102
1103void SocketDispatcher::DisableEvents(uint8_t events) {
1104 uint8_t old_events = enabled_events();
1105 PhysicalSocket::DisableEvents(events);
1106 MaybeUpdateDispatcher(old_events);
1107}
1108
1109#endif // WEBRTC_USE_EPOLL
1110
jbauch4331fcd2016-01-07 06:20:281111int SocketDispatcher::Close() {
1112 if (s_ == INVALID_SOCKET)
1113 return 0;
1114
1115#if defined(WEBRTC_WIN)
1116 id_ = 0;
1117 signal_close_ = false;
1118#endif
mmorrison25eeda12020-04-07 22:13:131119#if defined(WEBRTC_USE_EPOLL)
1120 // If we're batching events, the socket can be closed and reopened
1121 // during the batch. Set saved_enabled_events_ to 0 here so the new
1122 // socket, if any, has the correct old events bitfield
1123 if (saved_enabled_events_ != -1) {
1124 saved_enabled_events_ = 0;
1125 }
1126#endif
jbauch4331fcd2016-01-07 06:20:281127 ss_->Remove(this);
1128 return PhysicalSocket::Close();
1129}
1130
henrike@webrtc.orgf0488722014-05-13 18:00:261131#if defined(WEBRTC_POSIX)
Niels Möller21347452021-02-12 10:19:521132// Sets the value of a boolean value to false when signaled.
1133class Signaler : public Dispatcher {
henrike@webrtc.orgf0488722014-05-13 18:00:261134 public:
Niels Möller21347452021-02-12 10:19:521135 Signaler(PhysicalSocketServer* ss, bool& flag_to_clear)
1136 : ss_(ss),
1137 afd_([] {
1138 std::array<int, 2> afd = {-1, -1};
1139
1140 if (pipe(afd.data()) < 0) {
Harald Alvestrand5f341302021-11-24 10:01:321141 RTC_LOG(LS_ERROR) << "pipe failed";
Niels Möller21347452021-02-12 10:19:521142 }
1143 return afd;
1144 }()),
1145 fSignaled_(false),
1146 flag_to_clear_(flag_to_clear) {
henrike@webrtc.orgf0488722014-05-13 18:00:261147 ss_->Add(this);
1148 }
1149
Niels Möller21347452021-02-12 10:19:521150 ~Signaler() override {
henrike@webrtc.orgf0488722014-05-13 18:00:261151 ss_->Remove(this);
1152 close(afd_[0]);
1153 close(afd_[1]);
1154 }
1155
1156 virtual void Signal() {
Niels Möller6d176022021-02-09 13:44:481157 webrtc::MutexLock lock(&mutex_);
henrike@webrtc.orgf0488722014-05-13 18:00:261158 if (!fSignaled_) {
Peter Boström0c4e06b2015-10-07 10:23:211159 const uint8_t b[1] = {0};
nissec16fa5e2017-02-07 15:18:431160 const ssize_t res = write(afd_[1], b, sizeof(b));
1161 RTC_DCHECK_EQ(1, res);
1162 fSignaled_ = true;
henrike@webrtc.orgf0488722014-05-13 18:00:261163 }
1164 }
1165
Peter Boström0c4e06b2015-10-07 10:23:211166 uint32_t GetRequestedEvents() override { return DE_READ; }
henrike@webrtc.orgf0488722014-05-13 18:00:261167
Niels Möller21347452021-02-12 10:19:521168 void OnEvent(uint32_t ff, int err) override {
henrike@webrtc.orgf0488722014-05-13 18:00:261169 // It is not possible to perfectly emulate an auto-resetting event with
1170 // pipes. This simulates it by resetting before the event is handled.
1171
Niels Möller6d176022021-02-09 13:44:481172 webrtc::MutexLock lock(&mutex_);
henrike@webrtc.orgf0488722014-05-13 18:00:261173 if (fSignaled_) {
Peter Boström0c4e06b2015-10-07 10:23:211174 uint8_t b[4]; // Allow for reading more than 1 byte, but expect 1.
nissec16fa5e2017-02-07 15:18:431175 const ssize_t res = read(afd_[0], b, sizeof(b));
1176 RTC_DCHECK_EQ(1, res);
henrike@webrtc.orgf0488722014-05-13 18:00:261177 fSignaled_ = false;
1178 }
Niels Möller21347452021-02-12 10:19:521179 flag_to_clear_ = false;
henrike@webrtc.orgf0488722014-05-13 18:00:261180 }
1181
kwiberg@webrtc.org67186fe2015-03-09 22:21:531182 int GetDescriptor() override { return afd_[0]; }
henrike@webrtc.orgf0488722014-05-13 18:00:261183
kwiberg@webrtc.org67186fe2015-03-09 22:21:531184 bool IsDescriptorClosed() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:261185
1186 private:
Niels Möller6d176022021-02-09 13:44:481187 PhysicalSocketServer* const ss_;
Niels Möller21347452021-02-12 10:19:521188 const std::array<int, 2> afd_;
Niels Möller6d176022021-02-09 13:44:481189 bool fSignaled_ RTC_GUARDED_BY(mutex_);
1190 webrtc::Mutex mutex_;
Niels Möller21347452021-02-12 10:19:521191 bool& flag_to_clear_;
henrike@webrtc.orgf0488722014-05-13 18:00:261192};
1193
Yves Gerey665174f2018-06-19 13:03:051194#endif // WEBRTC_POSIX
henrike@webrtc.orgf0488722014-05-13 18:00:261195
1196#if defined(WEBRTC_WIN)
Peter Boström0c4e06b2015-10-07 10:23:211197static uint32_t FlagsToEvents(uint32_t events) {
1198 uint32_t ffFD = FD_CLOSE;
henrike@webrtc.orgf0488722014-05-13 18:00:261199 if (events & DE_READ)
1200 ffFD |= FD_READ;
1201 if (events & DE_WRITE)
1202 ffFD |= FD_WRITE;
1203 if (events & DE_CONNECT)
1204 ffFD |= FD_CONNECT;
1205 if (events & DE_ACCEPT)
1206 ffFD |= FD_ACCEPT;
1207 return ffFD;
1208}
1209
Niels Möller21347452021-02-12 10:19:521210// Sets the value of a boolean value to false when signaled.
1211class Signaler : public Dispatcher {
henrike@webrtc.orgf0488722014-05-13 18:00:261212 public:
Niels Möller21347452021-02-12 10:19:521213 Signaler(PhysicalSocketServer* ss, bool& flag_to_clear)
1214 : ss_(ss), flag_to_clear_(flag_to_clear) {
henrike@webrtc.orgf0488722014-05-13 18:00:261215 hev_ = WSACreateEvent();
1216 if (hev_) {
1217 ss_->Add(this);
1218 }
1219 }
1220
Niels Möller21347452021-02-12 10:19:521221 ~Signaler() override {
deadbeef37f5ecf2017-02-27 22:06:411222 if (hev_ != nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:261223 ss_->Remove(this);
1224 WSACloseEvent(hev_);
deadbeef37f5ecf2017-02-27 22:06:411225 hev_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:261226 }
1227 }
1228
1229 virtual void Signal() {
deadbeef37f5ecf2017-02-27 22:06:411230 if (hev_ != nullptr)
henrike@webrtc.orgf0488722014-05-13 18:00:261231 WSASetEvent(hev_);
1232 }
1233
Steve Anton9de3aac2017-10-24 17:08:261234 uint32_t GetRequestedEvents() override { return 0; }
henrike@webrtc.orgf0488722014-05-13 18:00:261235
Niels Möller21347452021-02-12 10:19:521236 void OnEvent(uint32_t ff, int err) override {
1237 WSAResetEvent(hev_);
1238 flag_to_clear_ = false;
1239 }
henrike@webrtc.orgf0488722014-05-13 18:00:261240
Steve Anton9de3aac2017-10-24 17:08:261241 WSAEVENT GetWSAEvent() override { return hev_; }
henrike@webrtc.orgf0488722014-05-13 18:00:261242
Steve Anton9de3aac2017-10-24 17:08:261243 SOCKET GetSocket() override { return INVALID_SOCKET; }
henrike@webrtc.orgf0488722014-05-13 18:00:261244
Steve Anton9de3aac2017-10-24 17:08:261245 bool CheckSignalClose() override { return false; }
henrike@webrtc.orgf0488722014-05-13 18:00:261246
Steve Anton9de3aac2017-10-24 17:08:261247 private:
henrike@webrtc.orgf0488722014-05-13 18:00:261248 PhysicalSocketServer* ss_;
1249 WSAEVENT hev_;
Niels Möller21347452021-02-12 10:19:521250 bool& flag_to_clear_;
henrike@webrtc.orgf0488722014-05-13 18:00:261251};
honghaizcec0a082016-01-15 22:49:091252#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:261253
Niels Möller611fba42020-05-13 12:42:221254PhysicalSocketServer::PhysicalSocketServer()
1255 :
jbauchde4db112017-05-31 20:09:181256#if defined(WEBRTC_USE_EPOLL)
Niels Möller611fba42020-05-13 12:42:221257 // Since Linux 2.6.8, the size argument is ignored, but must be greater
1258 // than zero. Before that the size served as hint to the kernel for the
1259 // amount of space to initially allocate in internal data structures.
1260 epoll_fd_(epoll_create(FD_SETSIZE)),
1261#endif
1262#if defined(WEBRTC_WIN)
1263 socket_ev_(WSACreateEvent()),
1264#endif
1265 fWait_(false) {
1266#if defined(WEBRTC_USE_EPOLL)
jbauchde4db112017-05-31 20:09:181267 if (epoll_fd_ == -1) {
1268 // Not an error, will fall back to "select" below.
Mirko Bonadei675513b2017-11-09 10:09:251269 RTC_LOG_E(LS_WARNING, EN, errno) << "epoll_create";
Niels Möller611fba42020-05-13 12:42:221270 // Note that -1 == INVALID_SOCKET, the alias used by later checks.
jbauchde4db112017-05-31 20:09:181271 }
1272#endif
Niels Möller21347452021-02-12 10:19:521273 // The `fWait_` flag to be cleared by the Signaler.
1274 signal_wakeup_ = new Signaler(this, fWait_);
henrike@webrtc.orgf0488722014-05-13 18:00:261275}
1276
1277PhysicalSocketServer::~PhysicalSocketServer() {
1278#if defined(WEBRTC_WIN)
1279 WSACloseEvent(socket_ev_);
1280#endif
henrike@webrtc.orgf0488722014-05-13 18:00:261281 delete signal_wakeup_;
jbauchde4db112017-05-31 20:09:181282#if defined(WEBRTC_USE_EPOLL)
1283 if (epoll_fd_ != INVALID_SOCKET) {
1284 close(epoll_fd_);
1285 }
1286#endif
Taylor Brandstetter7b69a442020-08-20 23:43:131287 RTC_DCHECK(dispatcher_by_key_.empty());
1288 RTC_DCHECK(key_by_dispatcher_.empty());
henrike@webrtc.orgf0488722014-05-13 18:00:261289}
1290
1291void PhysicalSocketServer::WakeUp() {
1292 signal_wakeup_->Signal();
1293}
1294
henrike@webrtc.orgf0488722014-05-13 18:00:261295Socket* PhysicalSocketServer::CreateSocket(int family, int type) {
henrike@webrtc.orgf0488722014-05-13 18:00:261296 SocketDispatcher* dispatcher = new SocketDispatcher(this);
1297 if (dispatcher->Create(family, type)) {
1298 return dispatcher;
1299 } else {
1300 delete dispatcher;
jbauch095ae152015-12-18 09:39:551301 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:261302 }
1303}
1304
Niels Möllerd0b88792021-08-12 08:32:301305Socket* PhysicalSocketServer::WrapSocket(SOCKET s) {
henrike@webrtc.orgf0488722014-05-13 18:00:261306 SocketDispatcher* dispatcher = new SocketDispatcher(s, this);
1307 if (dispatcher->Initialize()) {
1308 return dispatcher;
1309 } else {
1310 delete dispatcher;
jbauch095ae152015-12-18 09:39:551311 return nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:261312 }
1313}
1314
Yves Gerey665174f2018-06-19 13:03:051315void PhysicalSocketServer::Add(Dispatcher* pdispatcher) {
henrike@webrtc.orgf0488722014-05-13 18:00:261316 CritScope cs(&crit_);
Taylor Brandstetter7b69a442020-08-20 23:43:131317 if (key_by_dispatcher_.count(pdispatcher)) {
1318 RTC_LOG(LS_WARNING)
1319 << "PhysicalSocketServer asked to add a duplicate dispatcher.";
1320 return;
jbauchde4db112017-05-31 20:09:181321 }
Taylor Brandstetter7b69a442020-08-20 23:43:131322 uint64_t key = next_dispatcher_key_++;
1323 dispatcher_by_key_.emplace(key, pdispatcher);
1324 key_by_dispatcher_.emplace(pdispatcher, key);
jbauchde4db112017-05-31 20:09:181325#if defined(WEBRTC_USE_EPOLL)
1326 if (epoll_fd_ != INVALID_SOCKET) {
Taylor Brandstetter7b69a442020-08-20 23:43:131327 AddEpoll(pdispatcher, key);
jbauchde4db112017-05-31 20:09:181328 }
1329#endif // WEBRTC_USE_EPOLL
henrike@webrtc.orgf0488722014-05-13 18:00:261330}
1331
Yves Gerey665174f2018-06-19 13:03:051332void PhysicalSocketServer::Remove(Dispatcher* pdispatcher) {
henrike@webrtc.orgf0488722014-05-13 18:00:261333 CritScope cs(&crit_);
Taylor Brandstetter7b69a442020-08-20 23:43:131334 if (!key_by_dispatcher_.count(pdispatcher)) {
Mirko Bonadei675513b2017-11-09 10:09:251335 RTC_LOG(LS_WARNING)
1336 << "PhysicalSocketServer asked to remove a unknown "
Jonas Olssonb2b20312020-01-14 11:11:311337 "dispatcher, potentially from a duplicate call to Add.";
henrike@webrtc.orgf0488722014-05-13 18:00:261338 return;
1339 }
Taylor Brandstetter7b69a442020-08-20 23:43:131340 uint64_t key = key_by_dispatcher_.at(pdispatcher);
1341 key_by_dispatcher_.erase(pdispatcher);
1342 dispatcher_by_key_.erase(key);
jbauchde4db112017-05-31 20:09:181343#if defined(WEBRTC_USE_EPOLL)
1344 if (epoll_fd_ != INVALID_SOCKET) {
1345 RemoveEpoll(pdispatcher);
1346 }
1347#endif // WEBRTC_USE_EPOLL
1348}
1349
1350void PhysicalSocketServer::Update(Dispatcher* pdispatcher) {
1351#if defined(WEBRTC_USE_EPOLL)
1352 if (epoll_fd_ == INVALID_SOCKET) {
1353 return;
1354 }
1355
Taylor Brandstetter7b69a442020-08-20 23:43:131356 // Don't update dispatchers that haven't yet been added.
jbauchde4db112017-05-31 20:09:181357 CritScope cs(&crit_);
Taylor Brandstetter7b69a442020-08-20 23:43:131358 if (!key_by_dispatcher_.count(pdispatcher)) {
jbauchde4db112017-05-31 20:09:181359 return;
1360 }
1361
Taylor Brandstetter7b69a442020-08-20 23:43:131362 UpdateEpoll(pdispatcher, key_by_dispatcher_.at(pdispatcher));
jbauchde4db112017-05-31 20:09:181363#endif
1364}
1365
Markus Handell9a21c492022-08-25 11:40:131366int PhysicalSocketServer::ToCmsWait(webrtc::TimeDelta max_wait_duration) {
1367 return max_wait_duration == Event::kForever
1368 ? kForeverMs
1369 : max_wait_duration.RoundUpTo(webrtc::TimeDelta::Millis(1)).ms();
1370}
1371
henrike@webrtc.orgf0488722014-05-13 18:00:261372#if defined(WEBRTC_POSIX)
jbauchde4db112017-05-31 20:09:181373
Markus Handell9a21c492022-08-25 11:40:131374bool PhysicalSocketServer::Wait(webrtc::TimeDelta max_wait_duration,
1375 bool process_io) {
Taylor Brandstetter7b69a442020-08-20 23:43:131376 // We don't support reentrant waiting.
1377 RTC_DCHECK(!waiting_);
1378 ScopedSetTrue s(&waiting_);
Markus Handell9a21c492022-08-25 11:40:131379 const int cmsWait = ToCmsWait(max_wait_duration);
Taylor Brandstetter51366002023-03-14 23:45:491380
1381#if defined(WEBRTC_USE_POLL)
1382 return WaitPoll(cmsWait, process_io);
1383#else
jbauchde4db112017-05-31 20:09:181384#if defined(WEBRTC_USE_EPOLL)
1385 // We don't keep a dedicated "epoll" descriptor containing only the non-IO
1386 // (i.e. signaling) dispatcher, so "poll" will be used instead of the default
1387 // "select" to support sockets larger than FD_SETSIZE.
1388 if (!process_io) {
Taylor Brandstetter51366002023-03-14 23:45:491389 return WaitPollOneDispatcher(cmsWait, signal_wakeup_);
jbauchde4db112017-05-31 20:09:181390 } else if (epoll_fd_ != INVALID_SOCKET) {
1391 return WaitEpoll(cmsWait);
1392 }
1393#endif
1394 return WaitSelect(cmsWait, process_io);
Taylor Brandstetter51366002023-03-14 23:45:491395#endif
jbauchde4db112017-05-31 20:09:181396}
1397
Taylor Brandstetter3041eb22021-11-02 19:46:401398// `error_event` is true if we are responding to an event where we know an
1399// error has occurred, which is possible with the poll/epoll implementations
1400// but not the select implementation.
1401//
1402// `check_error` is true if there is the possibility of an error.
jbauchde4db112017-05-31 20:09:181403static void ProcessEvents(Dispatcher* dispatcher,
1404 bool readable,
1405 bool writable,
Taylor Brandstetter3041eb22021-11-02 19:46:401406 bool error_event,
jbauchde4db112017-05-31 20:09:181407 bool check_error) {
Taylor Brandstetter3041eb22021-11-02 19:46:401408 RTC_DCHECK(!(error_event && !check_error));
jbauchde4db112017-05-31 20:09:181409 int errcode = 0;
jbauchde4db112017-05-31 20:09:181410 if (check_error) {
1411 socklen_t len = sizeof(errcode);
Taylor Brandstetter3041eb22021-11-02 19:46:401412 int res = ::getsockopt(dispatcher->GetDescriptor(), SOL_SOCKET, SO_ERROR,
1413 &errcode, &len);
1414 if (res < 0) {
1415 // If we are sure an error has occurred, or if getsockopt failed for a
1416 // socket descriptor, make sure we set the error code to a nonzero value.
1417 if (error_event || errno != ENOTSOCK) {
1418 errcode = EBADF;
1419 }
1420 }
jbauchde4db112017-05-31 20:09:181421 }
1422
Taylor Brandstetter7b69a442020-08-20 23:43:131423 // Most often the socket is writable or readable or both, so make a single
1424 // virtual call to get requested events
1425 const uint32_t requested_events = dispatcher->GetRequestedEvents();
jbauchde4db112017-05-31 20:09:181426 uint32_t ff = 0;
1427
1428 // Check readable descriptors. If we're waiting on an accept, signal
1429 // that. Otherwise we're waiting for data, check to see if we're
1430 // readable or really closed.
1431 // TODO(pthatcher): Only peek at TCP descriptors.
1432 if (readable) {
Taylor Brandstetter3041eb22021-11-02 19:46:401433 if (errcode || dispatcher->IsDescriptorClosed()) {
jbauchde4db112017-05-31 20:09:181434 ff |= DE_CLOSE;
Taylor Brandstetter3041eb22021-11-02 19:46:401435 } else if (requested_events & DE_ACCEPT) {
1436 ff |= DE_ACCEPT;
jbauchde4db112017-05-31 20:09:181437 } else {
1438 ff |= DE_READ;
1439 }
1440 }
1441
1442 // Check writable descriptors. If we're waiting on a connect, detect
1443 // success versus failure by the reaped error code.
1444 if (writable) {
Taylor Brandstetter7b69a442020-08-20 23:43:131445 if (requested_events & DE_CONNECT) {
jbauchde4db112017-05-31 20:09:181446 if (!errcode) {
1447 ff |= DE_CONNECT;
jbauchde4db112017-05-31 20:09:181448 }
1449 } else {
1450 ff |= DE_WRITE;
1451 }
1452 }
1453
Taylor Brandstetter3041eb22021-11-02 19:46:401454 // Make sure we report any errors regardless of whether readable or writable.
1455 if (errcode) {
1456 ff |= DE_CLOSE;
1457 }
1458
jbauchde4db112017-05-31 20:09:181459 // Tell the descriptor about the event.
1460 if (ff != 0) {
jbauchde4db112017-05-31 20:09:181461 dispatcher->OnEvent(ff, errcode);
1462 }
1463}
1464
Taylor Brandstetter51366002023-03-14 23:45:491465#if defined(WEBRTC_USE_POLL) || defined(WEBRTC_USE_EPOLL)
1466static void ProcessPollEvents(Dispatcher* dispatcher, const pollfd& pfd) {
1467 bool readable = (pfd.revents & (POLLIN | POLLPRI));
1468 bool writable = (pfd.revents & POLLOUT);
Byoungchan Leed86c0cd2024-04-16 02:06:081469
1470 // Linux and Fuchsia define POLLRDHUP, which is set when the peer has
1471 // disconnected. On other platforms, we only check for POLLHUP.
1472#if defined(WEBRTC_LINUX) || defined(WEBRTC_FUCHSIA)
1473 constexpr short kEvents = POLLRDHUP | POLLERR | POLLHUP;
1474#else
1475 constexpr short kEvents = POLLERR | POLLHUP;
1476#endif
1477 bool error = (pfd.revents & kEvents);
Taylor Brandstetter51366002023-03-14 23:45:491478
1479 ProcessEvents(dispatcher, readable, writable, error, error);
1480}
1481
1482static pollfd DispatcherToPollfd(Dispatcher* dispatcher) {
1483 pollfd fd{
1484 .fd = dispatcher->GetDescriptor(),
1485 .events = 0,
1486 .revents = 0,
1487 };
1488
1489 uint32_t ff = dispatcher->GetRequestedEvents();
1490 if (ff & (DE_READ | DE_ACCEPT)) {
1491 fd.events |= POLLIN;
1492 }
1493 if (ff & (DE_WRITE | DE_CONNECT)) {
1494 fd.events |= POLLOUT;
1495 }
1496
1497 return fd;
1498}
1499#endif // WEBRTC_USE_POLL || WEBRTC_USE_EPOLL
1500
jbauchde4db112017-05-31 20:09:181501bool PhysicalSocketServer::WaitSelect(int cmsWait, bool process_io) {
henrike@webrtc.orgf0488722014-05-13 18:00:261502 // Calculate timing information
1503
deadbeef37f5ecf2017-02-27 22:06:411504 struct timeval* ptvWait = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:261505 struct timeval tvWait;
Niels Möller689b5872018-08-29 07:55:441506 int64_t stop_us;
Markus Handell9a21c492022-08-25 11:40:131507 if (cmsWait != kForeverMs) {
henrike@webrtc.orgf0488722014-05-13 18:00:261508 // Calculate wait timeval
1509 tvWait.tv_sec = cmsWait / 1000;
1510 tvWait.tv_usec = (cmsWait % 1000) * 1000;
1511 ptvWait = &tvWait;
1512
Niels Möller689b5872018-08-29 07:55:441513 // Calculate when to return
1514 stop_us = rtc::TimeMicros() + cmsWait * 1000;
henrike@webrtc.orgf0488722014-05-13 18:00:261515 }
1516
henrike@webrtc.orgf0488722014-05-13 18:00:261517 fd_set fdsRead;
henrike@webrtc.orgf0488722014-05-13 18:00:261518 fd_set fdsWrite;
Yves Gerey665174f2018-06-19 13:03:051519// Explicitly unpoison these FDs on MemorySanitizer which doesn't handle the
1520// inline assembly in FD_ZERO.
1521// http://crbug.com/344505
pbos@webrtc.org27e58982014-10-07 17:56:531522#ifdef MEMORY_SANITIZER
1523 __msan_unpoison(&fdsRead, sizeof(fdsRead));
1524 __msan_unpoison(&fdsWrite, sizeof(fdsWrite));
1525#endif
henrike@webrtc.orgf0488722014-05-13 18:00:261526
1527 fWait_ = true;
1528
1529 while (fWait_) {
Taylor Brandstetter7b69a442020-08-20 23:43:131530 // Zero all fd_sets. Although select() zeros the descriptors not signaled,
1531 // we may need to do this for dispatchers that were deleted while
1532 // iterating.
1533 FD_ZERO(&fdsRead);
1534 FD_ZERO(&fdsWrite);
henrike@webrtc.orgf0488722014-05-13 18:00:261535 int fdmax = -1;
1536 {
1537 CritScope cr(&crit_);
Taylor Brandstetter7b69a442020-08-20 23:43:131538 current_dispatcher_keys_.clear();
1539 for (auto const& kv : dispatcher_by_key_) {
1540 uint64_t key = kv.first;
1541 Dispatcher* pdispatcher = kv.second;
henrike@webrtc.orgf0488722014-05-13 18:00:261542 if (!process_io && (pdispatcher != signal_wakeup_))
1543 continue;
Taylor Brandstetter7b69a442020-08-20 23:43:131544 current_dispatcher_keys_.push_back(key);
henrike@webrtc.orgf0488722014-05-13 18:00:261545 int fd = pdispatcher->GetDescriptor();
jbauchde4db112017-05-31 20:09:181546 // "select"ing a file descriptor that is equal to or larger than
1547 // FD_SETSIZE will result in undefined behavior.
1548 RTC_DCHECK_LT(fd, FD_SETSIZE);
henrike@webrtc.orgf0488722014-05-13 18:00:261549 if (fd > fdmax)
1550 fdmax = fd;
1551
Peter Boström0c4e06b2015-10-07 10:23:211552 uint32_t ff = pdispatcher->GetRequestedEvents();
henrike@webrtc.orgf0488722014-05-13 18:00:261553 if (ff & (DE_READ | DE_ACCEPT))
1554 FD_SET(fd, &fdsRead);
1555 if (ff & (DE_WRITE | DE_CONNECT))
1556 FD_SET(fd, &fdsWrite);
1557 }
1558 }
1559
1560 // Wait then call handlers as appropriate
1561 // < 0 means error
1562 // 0 means timeout
1563 // > 0 means count of descriptors ready
deadbeef37f5ecf2017-02-27 22:06:411564 int n = select(fdmax + 1, &fdsRead, &fdsWrite, nullptr, ptvWait);
henrike@webrtc.orgf0488722014-05-13 18:00:261565
1566 // If error, return error.
1567 if (n < 0) {
1568 if (errno != EINTR) {
Mirko Bonadei675513b2017-11-09 10:09:251569 RTC_LOG_E(LS_ERROR, EN, errno) << "select";
henrike@webrtc.orgf0488722014-05-13 18:00:261570 return false;
1571 }
1572 // Else ignore the error and keep going. If this EINTR was for one of the
1573 // signals managed by this PhysicalSocketServer, the
1574 // PosixSignalDeliveryDispatcher will be in the signaled state in the next
1575 // iteration.
1576 } else if (n == 0) {
1577 // If timeout, return success
1578 return true;
1579 } else {
1580 // We have signaled descriptors
1581 CritScope cr(&crit_);
Taylor Brandstetter51366002023-03-14 23:45:491582 // Iterate only on the dispatchers whose file descriptors were passed into
1583 // select; this avoids the ABA problem (a socket being destroyed and a new
1584 // one created with the same file descriptor).
Taylor Brandstetter7b69a442020-08-20 23:43:131585 for (uint64_t key : current_dispatcher_keys_) {
1586 if (!dispatcher_by_key_.count(key))
1587 continue;
1588 Dispatcher* pdispatcher = dispatcher_by_key_.at(key);
1589
henrike@webrtc.orgf0488722014-05-13 18:00:261590 int fd = pdispatcher->GetDescriptor();
henrike@webrtc.orgf0488722014-05-13 18:00:261591
jbauchde4db112017-05-31 20:09:181592 bool readable = FD_ISSET(fd, &fdsRead);
1593 if (readable) {
henrike@webrtc.orgf0488722014-05-13 18:00:261594 FD_CLR(fd, &fdsRead);
henrike@webrtc.orgf0488722014-05-13 18:00:261595 }
1596
jbauchde4db112017-05-31 20:09:181597 bool writable = FD_ISSET(fd, &fdsWrite);
1598 if (writable) {
henrike@webrtc.orgf0488722014-05-13 18:00:261599 FD_CLR(fd, &fdsWrite);
henrike@webrtc.orgf0488722014-05-13 18:00:261600 }
1601
jbauchde4db112017-05-31 20:09:181602 // The error code can be signaled through reads or writes.
Taylor Brandstetter3041eb22021-11-02 19:46:401603 ProcessEvents(pdispatcher, readable, writable, /*error_event=*/false,
1604 readable || writable);
henrike@webrtc.orgf0488722014-05-13 18:00:261605 }
1606 }
1607
1608 // Recalc the time remaining to wait. Doing it here means it doesn't get
1609 // calced twice the first time through the loop
1610 if (ptvWait) {
1611 ptvWait->tv_sec = 0;
1612 ptvWait->tv_usec = 0;
Niels Möller689b5872018-08-29 07:55:441613 int64_t time_left_us = stop_us - rtc::TimeMicros();
1614 if (time_left_us > 0) {
1615 ptvWait->tv_sec = time_left_us / rtc::kNumMicrosecsPerSec;
1616 ptvWait->tv_usec = time_left_us % rtc::kNumMicrosecsPerSec;
henrike@webrtc.orgf0488722014-05-13 18:00:261617 }
1618 }
1619 }
1620
1621 return true;
1622}
1623
jbauchde4db112017-05-31 20:09:181624#if defined(WEBRTC_USE_EPOLL)
1625
Taylor Brandstetter7b69a442020-08-20 23:43:131626void PhysicalSocketServer::AddEpoll(Dispatcher* pdispatcher, uint64_t key) {
jbauchde4db112017-05-31 20:09:181627 RTC_DCHECK(epoll_fd_ != INVALID_SOCKET);
1628 int fd = pdispatcher->GetDescriptor();
1629 RTC_DCHECK(fd != INVALID_SOCKET);
1630 if (fd == INVALID_SOCKET) {
1631 return;
1632 }
1633
1634 struct epoll_event event = {0};
1635 event.events = GetEpollEvents(pdispatcher->GetRequestedEvents());
Taylor Brandstetter3041eb22021-11-02 19:46:401636 if (event.events == 0u) {
1637 // Don't add at all if we don't have any requested events. Could indicate a
1638 // closed socket.
1639 return;
1640 }
Taylor Brandstetter7b69a442020-08-20 23:43:131641 event.data.u64 = key;
jbauchde4db112017-05-31 20:09:181642 int err = epoll_ctl(epoll_fd_, EPOLL_CTL_ADD, fd, &event);
1643 RTC_DCHECK_EQ(err, 0);
1644 if (err == -1) {
Mirko Bonadei675513b2017-11-09 10:09:251645 RTC_LOG_E(LS_ERROR, EN, errno) << "epoll_ctl EPOLL_CTL_ADD";
jbauchde4db112017-05-31 20:09:181646 }
1647}
1648
1649void PhysicalSocketServer::RemoveEpoll(Dispatcher* pdispatcher) {
1650 RTC_DCHECK(epoll_fd_ != INVALID_SOCKET);
1651 int fd = pdispatcher->GetDescriptor();
1652 RTC_DCHECK(fd != INVALID_SOCKET);
1653 if (fd == INVALID_SOCKET) {
1654 return;
1655 }
1656
1657 struct epoll_event event = {0};
1658 int err = epoll_ctl(epoll_fd_, EPOLL_CTL_DEL, fd, &event);
1659 RTC_DCHECK(err == 0 || errno == ENOENT);
Taylor Brandstetter3041eb22021-11-02 19:46:401660 // Ignore ENOENT, which could occur if this descriptor wasn't added due to
1661 // having no requested events.
1662 if (err == -1 && errno != ENOENT) {
1663 RTC_LOG_E(LS_ERROR, EN, errno) << "epoll_ctl EPOLL_CTL_DEL";
jbauchde4db112017-05-31 20:09:181664 }
1665}
1666
Taylor Brandstetter7b69a442020-08-20 23:43:131667void PhysicalSocketServer::UpdateEpoll(Dispatcher* pdispatcher, uint64_t key) {
jbauchde4db112017-05-31 20:09:181668 RTC_DCHECK(epoll_fd_ != INVALID_SOCKET);
1669 int fd = pdispatcher->GetDescriptor();
1670 RTC_DCHECK(fd != INVALID_SOCKET);
1671 if (fd == INVALID_SOCKET) {
1672 return;
1673 }
1674
1675 struct epoll_event event = {0};
1676 event.events = GetEpollEvents(pdispatcher->GetRequestedEvents());
Taylor Brandstetter7b69a442020-08-20 23:43:131677 event.data.u64 = key;
Taylor Brandstetter3041eb22021-11-02 19:46:401678 // Remove if we don't have any requested events. Could indicate a closed
1679 // socket.
1680 if (event.events == 0u) {
1681 epoll_ctl(epoll_fd_, EPOLL_CTL_DEL, fd, &event);
1682 } else {
1683 int err = epoll_ctl(epoll_fd_, EPOLL_CTL_MOD, fd, &event);
1684 RTC_DCHECK(err == 0 || errno == ENOENT);
1685 if (err == -1) {
1686 // Could have been removed earlier due to no requested events.
1687 if (errno == ENOENT) {
1688 err = epoll_ctl(epoll_fd_, EPOLL_CTL_ADD, fd, &event);
1689 if (err == -1) {
1690 RTC_LOG_E(LS_ERROR, EN, errno) << "epoll_ctl EPOLL_CTL_ADD";
1691 }
1692 } else {
1693 RTC_LOG_E(LS_ERROR, EN, errno) << "epoll_ctl EPOLL_CTL_MOD";
1694 }
1695 }
jbauchde4db112017-05-31 20:09:181696 }
1697}
1698
1699bool PhysicalSocketServer::WaitEpoll(int cmsWait) {
1700 RTC_DCHECK(epoll_fd_ != INVALID_SOCKET);
Taylor Brandstetter51366002023-03-14 23:45:491701 int64_t msWait = -1;
1702 int64_t msStop = -1;
Markus Handell9a21c492022-08-25 11:40:131703 if (cmsWait != kForeverMs) {
Taylor Brandstetter51366002023-03-14 23:45:491704 msWait = cmsWait;
1705 msStop = TimeAfter(cmsWait);
jbauchde4db112017-05-31 20:09:181706 }
1707
jbauchde4db112017-05-31 20:09:181708 fWait_ = true;
jbauchde4db112017-05-31 20:09:181709 while (fWait_) {
1710 // Wait then call handlers as appropriate
1711 // < 0 means error
1712 // 0 means timeout
1713 // > 0 means count of descriptors ready
Markus Handellb7c63ab2020-05-26 16:09:551714 int n = epoll_wait(epoll_fd_, epoll_events_.data(), epoll_events_.size(),
Taylor Brandstetter51366002023-03-14 23:45:491715 static_cast<int>(msWait));
jbauchde4db112017-05-31 20:09:181716 if (n < 0) {
1717 if (errno != EINTR) {
Mirko Bonadei675513b2017-11-09 10:09:251718 RTC_LOG_E(LS_ERROR, EN, errno) << "epoll";
jbauchde4db112017-05-31 20:09:181719 return false;
1720 }
1721 // Else ignore the error and keep going. If this EINTR was for one of the
1722 // signals managed by this PhysicalSocketServer, the
1723 // PosixSignalDeliveryDispatcher will be in the signaled state in the next
1724 // iteration.
1725 } else if (n == 0) {
1726 // If timeout, return success
1727 return true;
1728 } else {
1729 // We have signaled descriptors
1730 CritScope cr(&crit_);
1731 for (int i = 0; i < n; ++i) {
1732 const epoll_event& event = epoll_events_[i];
Taylor Brandstetter7b69a442020-08-20 23:43:131733 uint64_t key = event.data.u64;
1734 if (!dispatcher_by_key_.count(key)) {
jbauchde4db112017-05-31 20:09:181735 // The dispatcher for this socket no longer exists.
1736 continue;
1737 }
Taylor Brandstetter7b69a442020-08-20 23:43:131738 Dispatcher* pdispatcher = dispatcher_by_key_.at(key);
jbauchde4db112017-05-31 20:09:181739
1740 bool readable = (event.events & (EPOLLIN | EPOLLPRI));
1741 bool writable = (event.events & EPOLLOUT);
Taylor Brandstetter3041eb22021-11-02 19:46:401742 bool error = (event.events & (EPOLLRDHUP | EPOLLERR | EPOLLHUP));
jbauchde4db112017-05-31 20:09:181743
Taylor Brandstetter3041eb22021-11-02 19:46:401744 ProcessEvents(pdispatcher, readable, writable, error, error);
jbauchde4db112017-05-31 20:09:181745 }
1746 }
1747
Markus Handell9a21c492022-08-25 11:40:131748 if (cmsWait != kForeverMs) {
Taylor Brandstetter51366002023-03-14 23:45:491749 msWait = TimeDiff(msStop, TimeMillis());
1750 if (msWait <= 0) {
jbauchde4db112017-05-31 20:09:181751 // Return success on timeout.
1752 return true;
1753 }
1754 }
1755 }
1756
1757 return true;
1758}
1759
Taylor Brandstetter51366002023-03-14 23:45:491760bool PhysicalSocketServer::WaitPollOneDispatcher(int cmsWait,
1761 Dispatcher* dispatcher) {
jbauchde4db112017-05-31 20:09:181762 RTC_DCHECK(dispatcher);
Taylor Brandstetter51366002023-03-14 23:45:491763 int64_t msWait = -1;
1764 int64_t msStop = -1;
Markus Handell9a21c492022-08-25 11:40:131765 if (cmsWait != kForeverMs) {
Taylor Brandstetter51366002023-03-14 23:45:491766 msWait = cmsWait;
1767 msStop = TimeAfter(cmsWait);
jbauchde4db112017-05-31 20:09:181768 }
1769
1770 fWait_ = true;
Taylor Brandstetter51366002023-03-14 23:45:491771 const int fd = dispatcher->GetDescriptor();
jbauchde4db112017-05-31 20:09:181772
1773 while (fWait_) {
Taylor Brandstetter51366002023-03-14 23:45:491774 auto fds = DispatcherToPollfd(dispatcher);
jbauchde4db112017-05-31 20:09:181775
1776 // Wait then call handlers as appropriate
1777 // < 0 means error
1778 // 0 means timeout
1779 // > 0 means count of descriptors ready
Taylor Brandstetter51366002023-03-14 23:45:491780 int n = poll(&fds, 1, static_cast<int>(msWait));
jbauchde4db112017-05-31 20:09:181781 if (n < 0) {
1782 if (errno != EINTR) {
Mirko Bonadei675513b2017-11-09 10:09:251783 RTC_LOG_E(LS_ERROR, EN, errno) << "poll";
jbauchde4db112017-05-31 20:09:181784 return false;
1785 }
1786 // Else ignore the error and keep going. If this EINTR was for one of the
1787 // signals managed by this PhysicalSocketServer, the
1788 // PosixSignalDeliveryDispatcher will be in the signaled state in the next
1789 // iteration.
1790 } else if (n == 0) {
1791 // If timeout, return success
1792 return true;
1793 } else {
1794 // We have signaled descriptors (should only be the passed dispatcher).
1795 RTC_DCHECK_EQ(n, 1);
1796 RTC_DCHECK_EQ(fds.fd, fd);
Taylor Brandstetter51366002023-03-14 23:45:491797 ProcessPollEvents(dispatcher, fds);
jbauchde4db112017-05-31 20:09:181798 }
1799
Markus Handell9a21c492022-08-25 11:40:131800 if (cmsWait != kForeverMs) {
Taylor Brandstetter51366002023-03-14 23:45:491801 msWait = TimeDiff(msStop, TimeMillis());
1802 if (msWait < 0) {
jbauchde4db112017-05-31 20:09:181803 // Return success on timeout.
1804 return true;
1805 }
1806 }
1807 }
1808
1809 return true;
1810}
1811
Taylor Brandstetter51366002023-03-14 23:45:491812#elif defined(WEBRTC_USE_POLL)
1813
1814bool PhysicalSocketServer::WaitPoll(int cmsWait, bool process_io) {
1815 int64_t msWait = -1;
1816 int64_t msStop = -1;
1817 if (cmsWait != kForeverMs) {
1818 msWait = cmsWait;
1819 msStop = TimeAfter(cmsWait);
1820 }
1821
1822 std::vector<pollfd> pollfds;
1823 fWait_ = true;
1824
1825 while (fWait_) {
1826 {
1827 CritScope cr(&crit_);
1828 current_dispatcher_keys_.clear();
1829 pollfds.clear();
1830 pollfds.reserve(dispatcher_by_key_.size());
1831
1832 for (auto const& kv : dispatcher_by_key_) {
1833 uint64_t key = kv.first;
1834 Dispatcher* pdispatcher = kv.second;
1835 if (!process_io && (pdispatcher != signal_wakeup_))
1836 continue;
1837 current_dispatcher_keys_.push_back(key);
1838 pollfds.push_back(DispatcherToPollfd(pdispatcher));
1839 }
1840 }
1841
1842 // Wait then call handlers as appropriate
1843 // < 0 means error
1844 // 0 means timeout
1845 // > 0 means count of descriptors ready
1846 int n = poll(pollfds.data(), pollfds.size(), static_cast<int>(msWait));
1847 if (n < 0) {
1848 if (errno != EINTR) {
1849 RTC_LOG_E(LS_ERROR, EN, errno) << "poll";
1850 return false;
1851 }
1852 // Else ignore the error and keep going. If this EINTR was for one of the
1853 // signals managed by this PhysicalSocketServer, the
1854 // PosixSignalDeliveryDispatcher will be in the signaled state in the next
1855 // iteration.
1856 } else if (n == 0) {
1857 // If timeout, return success
1858 return true;
1859 } else {
1860 // We have signaled descriptors
1861 CritScope cr(&crit_);
1862 // Iterate only on the dispatchers whose file descriptors were passed into
1863 // poll; this avoids the ABA problem (a socket being destroyed and a new
1864 // one created with the same file descriptor).
1865 for (size_t i = 0; i < current_dispatcher_keys_.size(); ++i) {
1866 uint64_t key = current_dispatcher_keys_[i];
1867 if (!dispatcher_by_key_.count(key))
1868 continue;
1869 ProcessPollEvents(dispatcher_by_key_.at(key), pollfds[i]);
1870 }
1871 }
1872
1873 if (cmsWait != kForeverMs) {
1874 msWait = TimeDiff(msStop, TimeMillis());
1875 if (msWait < 0) {
1876 // Return success on timeout.
1877 return true;
1878 }
1879 }
1880 }
1881
1882 return true;
1883}
1884
1885#endif // WEBRTC_USE_EPOLL, WEBRTC_USE_POLL
jbauchde4db112017-05-31 20:09:181886
henrike@webrtc.orgf0488722014-05-13 18:00:261887#endif // WEBRTC_POSIX
1888
1889#if defined(WEBRTC_WIN)
Markus Handell9a21c492022-08-25 11:40:131890bool PhysicalSocketServer::Wait(webrtc::TimeDelta max_wait_duration,
1891 bool process_io) {
Taylor Brandstetter7b69a442020-08-20 23:43:131892 // We don't support reentrant waiting.
1893 RTC_DCHECK(!waiting_);
1894 ScopedSetTrue s(&waiting_);
1895
Markus Handell9a21c492022-08-25 11:40:131896 int cmsWait = ToCmsWait(max_wait_duration);
Honghai Zhang82d78622016-05-06 18:29:151897 int64_t cmsTotal = cmsWait;
1898 int64_t cmsElapsed = 0;
1899 int64_t msStart = Time();
henrike@webrtc.orgf0488722014-05-13 18:00:261900
1901 fWait_ = true;
1902 while (fWait_) {
1903 std::vector<WSAEVENT> events;
Taylor Brandstetter7b69a442020-08-20 23:43:131904 std::vector<uint64_t> event_owners;
henrike@webrtc.orgf0488722014-05-13 18:00:261905
1906 events.push_back(socket_ev_);
1907
1908 {
1909 CritScope cr(&crit_);
Taylor Brandstetter7b69a442020-08-20 23:43:131910 // Get a snapshot of all current dispatchers; this is used to avoid the
1911 // ABA problem (see later comment) and avoids the dispatcher_by_key_
1912 // iterator being invalidated by calling CheckSignalClose, which may
1913 // remove the dispatcher from the list.
1914 current_dispatcher_keys_.clear();
1915 for (auto const& kv : dispatcher_by_key_) {
1916 current_dispatcher_keys_.push_back(kv.first);
1917 }
1918 for (uint64_t key : current_dispatcher_keys_) {
1919 if (!dispatcher_by_key_.count(key)) {
1920 continue;
1921 }
1922 Dispatcher* disp = dispatcher_by_key_.at(key);
1923 if (!disp)
1924 continue;
henrike@webrtc.orgf0488722014-05-13 18:00:261925 if (!process_io && (disp != signal_wakeup_))
1926 continue;
1927 SOCKET s = disp->GetSocket();
1928 if (disp->CheckSignalClose()) {
Taylor Brandstetter7b69a442020-08-20 23:43:131929 // We just signalled close, don't poll this socket.
henrike@webrtc.orgf0488722014-05-13 18:00:261930 } else if (s != INVALID_SOCKET) {
Yves Gerey665174f2018-06-19 13:03:051931 WSAEventSelect(s, events[0],
henrike@webrtc.orgf0488722014-05-13 18:00:261932 FlagsToEvents(disp->GetRequestedEvents()));
1933 } else {
1934 events.push_back(disp->GetWSAEvent());
Taylor Brandstetter7b69a442020-08-20 23:43:131935 event_owners.push_back(key);
henrike@webrtc.orgf0488722014-05-13 18:00:261936 }
1937 }
henrike@webrtc.orgf0488722014-05-13 18:00:261938 }
1939
1940 // Which is shorter, the delay wait or the asked wait?
1941
Honghai Zhang82d78622016-05-06 18:29:151942 int64_t cmsNext;
Markus Handell9a21c492022-08-25 11:40:131943 if (cmsWait == kForeverMs) {
henrike@webrtc.orgf0488722014-05-13 18:00:261944 cmsNext = cmsWait;
1945 } else {
Honghai Zhang82d78622016-05-06 18:29:151946 cmsNext = std::max<int64_t>(0, cmsTotal - cmsElapsed);
henrike@webrtc.orgf0488722014-05-13 18:00:261947 }
1948
1949 // Wait for one of the events to signal
Yves Gerey665174f2018-06-19 13:03:051950 DWORD dw =
1951 WSAWaitForMultipleEvents(static_cast<DWORD>(events.size()), &events[0],
1952 false, static_cast<DWORD>(cmsNext), false);
henrike@webrtc.orgf0488722014-05-13 18:00:261953
1954 if (dw == WSA_WAIT_FAILED) {
1955 // Failed?
jbauch095ae152015-12-18 09:39:551956 // TODO(pthatcher): need a better strategy than this!
henrike@webrtc.orgf0488722014-05-13 18:00:261957 WSAGetLastError();
Artem Titovd3251962021-11-15 15:57:071958 RTC_DCHECK_NOTREACHED();
henrike@webrtc.orgf0488722014-05-13 18:00:261959 return false;
1960 } else if (dw == WSA_WAIT_TIMEOUT) {
1961 // Timeout?
1962 return true;
1963 } else {
1964 // Figure out which one it is and call it
1965 CritScope cr(&crit_);
1966 int index = dw - WSA_WAIT_EVENT_0;
1967 if (index > 0) {
Yves Gerey665174f2018-06-19 13:03:051968 --index; // The first event is the socket event
Taylor Brandstetter7b69a442020-08-20 23:43:131969 uint64_t key = event_owners[index];
1970 if (!dispatcher_by_key_.count(key)) {
1971 // The dispatcher could have been removed while waiting for events.
1972 continue;
jbauchde4db112017-05-31 20:09:181973 }
Taylor Brandstetter7b69a442020-08-20 23:43:131974 Dispatcher* disp = dispatcher_by_key_.at(key);
Taylor Brandstetter7b69a442020-08-20 23:43:131975 disp->OnEvent(0, 0);
henrike@webrtc.orgf0488722014-05-13 18:00:261976 } else if (process_io) {
Taylor Brandstetter7b69a442020-08-20 23:43:131977 // Iterate only on the dispatchers whose sockets were passed into
1978 // WSAEventSelect; this avoids the ABA problem (a socket being
1979 // destroyed and a new one created with the same SOCKET handle).
1980 for (uint64_t key : current_dispatcher_keys_) {
1981 if (!dispatcher_by_key_.count(key)) {
1982 continue;
1983 }
1984 Dispatcher* disp = dispatcher_by_key_.at(key);
henrike@webrtc.orgf0488722014-05-13 18:00:261985 SOCKET s = disp->GetSocket();
1986 if (s == INVALID_SOCKET)
1987 continue;
1988
1989 WSANETWORKEVENTS wsaEvents;
1990 int err = WSAEnumNetworkEvents(s, events[0], &wsaEvents);
1991 if (err == 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:261992 {
1993 if ((wsaEvents.lNetworkEvents & FD_READ) &&
1994 wsaEvents.iErrorCode[FD_READ_BIT] != 0) {
Harald Alvestrandef5b21e2021-11-27 21:31:081995 RTC_LOG(LS_WARNING)
Mirko Bonadei675513b2017-11-09 10:09:251996 << "PhysicalSocketServer got FD_READ_BIT error "
1997 << wsaEvents.iErrorCode[FD_READ_BIT];
henrike@webrtc.orgf0488722014-05-13 18:00:261998 }
1999 if ((wsaEvents.lNetworkEvents & FD_WRITE) &&
2000 wsaEvents.iErrorCode[FD_WRITE_BIT] != 0) {
Harald Alvestrandef5b21e2021-11-27 21:31:082001 RTC_LOG(LS_WARNING)
Mirko Bonadei675513b2017-11-09 10:09:252002 << "PhysicalSocketServer got FD_WRITE_BIT error "
2003 << wsaEvents.iErrorCode[FD_WRITE_BIT];
henrike@webrtc.orgf0488722014-05-13 18:00:262004 }
2005 if ((wsaEvents.lNetworkEvents & FD_CONNECT) &&
2006 wsaEvents.iErrorCode[FD_CONNECT_BIT] != 0) {
Harald Alvestrandef5b21e2021-11-27 21:31:082007 RTC_LOG(LS_WARNING)
Mirko Bonadei675513b2017-11-09 10:09:252008 << "PhysicalSocketServer got FD_CONNECT_BIT error "
2009 << wsaEvents.iErrorCode[FD_CONNECT_BIT];
henrike@webrtc.orgf0488722014-05-13 18:00:262010 }
2011 if ((wsaEvents.lNetworkEvents & FD_ACCEPT) &&
2012 wsaEvents.iErrorCode[FD_ACCEPT_BIT] != 0) {
Harald Alvestrandef5b21e2021-11-27 21:31:082013 RTC_LOG(LS_WARNING)
Mirko Bonadei675513b2017-11-09 10:09:252014 << "PhysicalSocketServer got FD_ACCEPT_BIT error "
2015 << wsaEvents.iErrorCode[FD_ACCEPT_BIT];
henrike@webrtc.orgf0488722014-05-13 18:00:262016 }
2017 if ((wsaEvents.lNetworkEvents & FD_CLOSE) &&
2018 wsaEvents.iErrorCode[FD_CLOSE_BIT] != 0) {
Harald Alvestrandef5b21e2021-11-27 21:31:082019 RTC_LOG(LS_WARNING)
Mirko Bonadei675513b2017-11-09 10:09:252020 << "PhysicalSocketServer got FD_CLOSE_BIT error "
2021 << wsaEvents.iErrorCode[FD_CLOSE_BIT];
henrike@webrtc.orgf0488722014-05-13 18:00:262022 }
2023 }
Peter Boström0c4e06b2015-10-07 10:23:212024 uint32_t ff = 0;
henrike@webrtc.orgf0488722014-05-13 18:00:262025 int errcode = 0;
2026 if (wsaEvents.lNetworkEvents & FD_READ)
2027 ff |= DE_READ;
2028 if (wsaEvents.lNetworkEvents & FD_WRITE)
2029 ff |= DE_WRITE;
2030 if (wsaEvents.lNetworkEvents & FD_CONNECT) {
2031 if (wsaEvents.iErrorCode[FD_CONNECT_BIT] == 0) {
2032 ff |= DE_CONNECT;
2033 } else {
2034 ff |= DE_CLOSE;
2035 errcode = wsaEvents.iErrorCode[FD_CONNECT_BIT];
2036 }
2037 }
2038 if (wsaEvents.lNetworkEvents & FD_ACCEPT)
2039 ff |= DE_ACCEPT;
2040 if (wsaEvents.lNetworkEvents & FD_CLOSE) {
2041 ff |= DE_CLOSE;
2042 errcode = wsaEvents.iErrorCode[FD_CLOSE_BIT];
2043 }
2044 if (ff != 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:262045 disp->OnEvent(ff, errcode);
2046 }
2047 }
2048 }
henrike@webrtc.orgf0488722014-05-13 18:00:262049 }
2050
2051 // Reset the network event until new activity occurs
2052 WSAResetEvent(socket_ev_);
2053 }
2054
2055 // Break?
2056 if (!fWait_)
2057 break;
2058 cmsElapsed = TimeSince(msStart);
Markus Handell9a21c492022-08-25 11:40:132059 if ((cmsWait != kForeverMs) && (cmsElapsed >= cmsWait)) {
Yves Gerey665174f2018-06-19 13:03:052060 break;
henrike@webrtc.orgf0488722014-05-13 18:00:262061 }
2062 }
2063
2064 // Done
2065 return true;
2066}
honghaizcec0a082016-01-15 22:49:092067#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:262068
2069} // namespace rtc