Closed
Bug 1251214
Opened 9 years ago
Closed 9 years ago
R_WOULDBLOCK can cause STUN client failure in nr_stun_client_send_request
Categories
(Core :: WebRTC: Networking, defect)
Core
WebRTC: Networking
Tracking
()
RESOLVED
FIXED
mozilla47
Tracking | Status | |
---|---|---|
firefox47 | --- | fixed |
People
(Reporter: bwc, Assigned: bwc)
Details
Attachments
(1 file)
Any failure in the call to nr_socket_sendto (including R_WOULDBLOCK) causes permanent failure in the STUN ctx. I'm pretty sure this is not what we want.
Assignee | ||
Comment 1•9 years ago
|
||
Review commit: https://reviewboard.mozilla.org/r/36647/diff/#index_header
See other reviews: https://reviewboard.mozilla.org/r/36647/
Assignee | ||
Updated•9 years ago
|
Assignee: nobody → docfaraday
Comment 2•9 years ago
|
||
Comment on attachment 8723639 [details]
MozReview Request: Bug 1251214: Ignore R_WOULDBLOCK in nr_stun_client_send_request
https://reviewboard.mozilla.org/r/36647/#review33267
::: media/mtransport/third_party/nICEr/src/stun/stun_client_ctx.c:387
(Diff revision 1)
> - if(r=nr_socket_sendto(ctx->sock, ctx->request->buffer, ctx->request->length, 0, &ctx->peer_addr))
> + if(r=nr_socket_sendto(ctx->sock, ctx->request->buffer, ctx->request->length, 0, &ctx->peer_addr)) {
> + if (r != R_WOULDBLOCK) {
> - ABORT(r);
> + ABORT(r);
> + }
> + r_log(NR_LOG_STUN,LOG_WARNING,"STUN-CLIENT(%s): nr_socket_sendto blocked, treating as dropped packet",ctx->label);
> + }
>
Yes this seems fine. Though note that UDP sockets don't block so this was reasonable behavior pre-TCP
Attachment #8723639 -
Flags: review+
Comment 4•9 years ago
|
||
bugherder |
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla47
You need to log in
before you can comment on or make changes to this bug.
Description
•