mirror of
https://github.com/mollyim/webrtc.git
synced 2025-05-13 13:50:40 +01:00

To make it available for FEC to use field trials in follow ups Bug: webrtc:355577231 Change-Id: I4a6260a38e50a70dae27db28401b08bf0160aaec Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/358680 Reviewed-by: Danil Chapovalov <danilchap@webrtc.org> Reviewed-by: Åsa Persson <asapersson@webrtc.org> Commit-Queue: Danil Chapovalov <danilchap@webrtc.org> Cr-Commit-Position: refs/heads/main@{#42740}
275 lines
11 KiB
C++
275 lines
11 KiB
C++
/*
|
|
* Copyright (c) 2012 The WebRTC project authors. All Rights Reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include "modules/rtp_rtcp/source/ulpfec_generator.h"
|
|
|
|
#include <list>
|
|
#include <memory>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "api/environment/environment.h"
|
|
#include "api/environment/environment_factory.h"
|
|
#include "modules/rtp_rtcp/source/byte_io.h"
|
|
#include "modules/rtp_rtcp/source/fec_test_helper.h"
|
|
#include "modules/rtp_rtcp/source/forward_error_correction.h"
|
|
#include "test/gtest.h"
|
|
|
|
namespace webrtc {
|
|
|
|
namespace {
|
|
using test::fec::AugmentedPacket;
|
|
using test::fec::AugmentedPacketGenerator;
|
|
|
|
constexpr int kFecPayloadType = 96;
|
|
constexpr int kRedPayloadType = 97;
|
|
constexpr uint32_t kMediaSsrc = 835424;
|
|
} // namespace
|
|
|
|
void VerifyHeader(uint16_t seq_num,
|
|
uint32_t timestamp,
|
|
int red_payload_type,
|
|
int fec_payload_type,
|
|
bool marker_bit,
|
|
const rtc::CopyOnWriteBuffer& data) {
|
|
// Marker bit not set.
|
|
EXPECT_EQ(marker_bit ? 0x80 : 0, data[1] & 0x80);
|
|
EXPECT_EQ(red_payload_type, data[1] & 0x7F);
|
|
EXPECT_EQ(seq_num, (data[2] << 8) + data[3]);
|
|
uint32_t parsed_timestamp =
|
|
(data[4] << 24) + (data[5] << 16) + (data[6] << 8) + data[7];
|
|
EXPECT_EQ(timestamp, parsed_timestamp);
|
|
EXPECT_EQ(static_cast<uint8_t>(fec_payload_type), data[kRtpHeaderSize]);
|
|
}
|
|
|
|
class UlpfecGeneratorTest : public ::testing::Test {
|
|
protected:
|
|
UlpfecGeneratorTest()
|
|
: env_(CreateEnvironment(std::make_unique<SimulatedClock>(1))),
|
|
ulpfec_generator_(env_, kRedPayloadType, kFecPayloadType),
|
|
packet_generator_(kMediaSsrc) {}
|
|
|
|
const Environment env_;
|
|
UlpfecGenerator ulpfec_generator_;
|
|
AugmentedPacketGenerator packet_generator_;
|
|
};
|
|
|
|
// Verifies bug found via fuzzing, where a gap in the packet sequence caused us
|
|
// to move past the end of the current FEC packet mask byte without moving to
|
|
// the next byte. That likely caused us to repeatedly read from the same byte,
|
|
// and if that byte didn't protect packets we would generate empty FEC.
|
|
TEST_F(UlpfecGeneratorTest, NoEmptyFecWithSeqNumGaps) {
|
|
struct Packet {
|
|
size_t header_size;
|
|
size_t payload_size;
|
|
uint16_t seq_num;
|
|
bool marker_bit;
|
|
};
|
|
std::vector<Packet> protected_packets;
|
|
protected_packets.push_back({15, 3, 41, 0});
|
|
protected_packets.push_back({14, 1, 43, 0});
|
|
protected_packets.push_back({19, 0, 48, 0});
|
|
protected_packets.push_back({19, 0, 50, 0});
|
|
protected_packets.push_back({14, 3, 51, 0});
|
|
protected_packets.push_back({13, 8, 52, 0});
|
|
protected_packets.push_back({19, 2, 53, 0});
|
|
protected_packets.push_back({12, 3, 54, 0});
|
|
protected_packets.push_back({21, 0, 55, 0});
|
|
protected_packets.push_back({13, 3, 57, 1});
|
|
FecProtectionParams params = {117, 3, kFecMaskBursty};
|
|
ulpfec_generator_.SetProtectionParameters(params, params);
|
|
for (Packet p : protected_packets) {
|
|
RtpPacketToSend packet(nullptr);
|
|
packet.SetMarker(p.marker_bit);
|
|
packet.AllocateExtension(RTPExtensionType::kRtpExtensionMid,
|
|
p.header_size - packet.headers_size());
|
|
packet.SetSequenceNumber(p.seq_num);
|
|
packet.AllocatePayload(p.payload_size);
|
|
ulpfec_generator_.AddPacketAndGenerateFec(packet);
|
|
|
|
std::vector<std::unique_ptr<RtpPacketToSend>> fec_packets =
|
|
ulpfec_generator_.GetFecPackets();
|
|
if (!p.marker_bit) {
|
|
EXPECT_TRUE(fec_packets.empty());
|
|
} else {
|
|
EXPECT_FALSE(fec_packets.empty());
|
|
}
|
|
}
|
|
}
|
|
|
|
TEST_F(UlpfecGeneratorTest, OneFrameFec) {
|
|
// The number of media packets (`kNumPackets`), number of frames (one for
|
|
// this test), and the protection factor (|params->fec_rate|) are set to make
|
|
// sure the conditions for generating FEC are satisfied. This means:
|
|
// (1) protection factor is high enough so that actual overhead over 1 frame
|
|
// of packets is within `kMaxExcessOverhead`, and (2) the total number of
|
|
// media packets for 1 frame is at least `minimum_media_packets_fec_`.
|
|
constexpr size_t kNumPackets = 4;
|
|
FecProtectionParams params = {15, 3, kFecMaskRandom};
|
|
packet_generator_.NewFrame(kNumPackets);
|
|
// Expecting one FEC packet.
|
|
ulpfec_generator_.SetProtectionParameters(params, params);
|
|
uint32_t last_timestamp = 0;
|
|
for (size_t i = 0; i < kNumPackets; ++i) {
|
|
std::unique_ptr<AugmentedPacket> packet =
|
|
packet_generator_.NextPacket(i, 10);
|
|
RtpPacketToSend rtp_packet(nullptr);
|
|
EXPECT_TRUE(rtp_packet.Parse(packet->data.data(), packet->data.size()));
|
|
ulpfec_generator_.AddPacketAndGenerateFec(rtp_packet);
|
|
last_timestamp = packet->header.timestamp;
|
|
}
|
|
std::vector<std::unique_ptr<RtpPacketToSend>> fec_packets =
|
|
ulpfec_generator_.GetFecPackets();
|
|
EXPECT_EQ(fec_packets.size(), 1u);
|
|
uint16_t seq_num = packet_generator_.NextPacketSeqNum();
|
|
fec_packets[0]->SetSequenceNumber(seq_num);
|
|
EXPECT_TRUE(ulpfec_generator_.GetFecPackets().empty());
|
|
|
|
EXPECT_EQ(fec_packets[0]->headers_size(), kRtpHeaderSize);
|
|
|
|
VerifyHeader(seq_num, last_timestamp, kRedPayloadType, kFecPayloadType, false,
|
|
fec_packets[0]->Buffer());
|
|
}
|
|
|
|
TEST_F(UlpfecGeneratorTest, TwoFrameFec) {
|
|
// The number of media packets/frame (`kNumPackets`), the number of frames
|
|
// (`kNumFrames`), and the protection factor (|params->fec_rate|) are set to
|
|
// make sure the conditions for generating FEC are satisfied. This means:
|
|
// (1) protection factor is high enough so that actual overhead over
|
|
// `kNumFrames` is within `kMaxExcessOverhead`, and (2) the total number of
|
|
// media packets for `kNumFrames` frames is at least
|
|
// `minimum_media_packets_fec_`.
|
|
constexpr size_t kNumPackets = 2;
|
|
constexpr size_t kNumFrames = 2;
|
|
|
|
FecProtectionParams params = {15, 3, kFecMaskRandom};
|
|
// Expecting one FEC packet.
|
|
ulpfec_generator_.SetProtectionParameters(params, params);
|
|
uint32_t last_timestamp = 0;
|
|
for (size_t i = 0; i < kNumFrames; ++i) {
|
|
packet_generator_.NewFrame(kNumPackets);
|
|
for (size_t j = 0; j < kNumPackets; ++j) {
|
|
std::unique_ptr<AugmentedPacket> packet =
|
|
packet_generator_.NextPacket(i * kNumPackets + j, 10);
|
|
RtpPacketToSend rtp_packet(nullptr);
|
|
EXPECT_TRUE(rtp_packet.Parse(packet->data.data(), packet->data.size()));
|
|
ulpfec_generator_.AddPacketAndGenerateFec(rtp_packet);
|
|
last_timestamp = packet->header.timestamp;
|
|
}
|
|
}
|
|
std::vector<std::unique_ptr<RtpPacketToSend>> fec_packets =
|
|
ulpfec_generator_.GetFecPackets();
|
|
EXPECT_EQ(fec_packets.size(), 1u);
|
|
const uint16_t seq_num = packet_generator_.NextPacketSeqNum();
|
|
fec_packets[0]->SetSequenceNumber(seq_num);
|
|
VerifyHeader(seq_num, last_timestamp, kRedPayloadType, kFecPayloadType, false,
|
|
fec_packets[0]->Buffer());
|
|
}
|
|
|
|
TEST_F(UlpfecGeneratorTest, MixedMediaRtpHeaderLengths) {
|
|
constexpr size_t kShortRtpHeaderLength = 12;
|
|
constexpr size_t kLongRtpHeaderLength = 16;
|
|
|
|
// Only one frame required to generate FEC.
|
|
FecProtectionParams params = {127, 1, kFecMaskRandom};
|
|
ulpfec_generator_.SetProtectionParameters(params, params);
|
|
|
|
// Fill up internal buffer with media packets with short RTP header length.
|
|
packet_generator_.NewFrame(kUlpfecMaxMediaPackets + 1);
|
|
for (size_t i = 0; i < kUlpfecMaxMediaPackets; ++i) {
|
|
std::unique_ptr<AugmentedPacket> packet =
|
|
packet_generator_.NextPacket(i, 10);
|
|
RtpPacketToSend rtp_packet(nullptr);
|
|
EXPECT_TRUE(rtp_packet.Parse(packet->data.data(), packet->data.size()));
|
|
EXPECT_EQ(rtp_packet.headers_size(), kShortRtpHeaderLength);
|
|
ulpfec_generator_.AddPacketAndGenerateFec(rtp_packet);
|
|
EXPECT_TRUE(ulpfec_generator_.GetFecPackets().empty());
|
|
}
|
|
|
|
// Kick off FEC generation with media packet with long RTP header length.
|
|
// Since the internal buffer is full, this packet will not be protected.
|
|
std::unique_ptr<AugmentedPacket> packet =
|
|
packet_generator_.NextPacket(kUlpfecMaxMediaPackets, 10);
|
|
RtpPacketToSend rtp_packet(nullptr);
|
|
EXPECT_TRUE(rtp_packet.Parse(packet->data.data(), packet->data.size()));
|
|
EXPECT_TRUE(rtp_packet.SetPayloadSize(0) != nullptr);
|
|
const uint32_t csrcs[]{1};
|
|
rtp_packet.SetCsrcs(csrcs);
|
|
|
|
EXPECT_EQ(rtp_packet.headers_size(), kLongRtpHeaderLength);
|
|
|
|
ulpfec_generator_.AddPacketAndGenerateFec(rtp_packet);
|
|
std::vector<std::unique_ptr<RtpPacketToSend>> fec_packets =
|
|
ulpfec_generator_.GetFecPackets();
|
|
EXPECT_FALSE(fec_packets.empty());
|
|
|
|
// Ensure that the RED header is placed correctly, i.e. the correct
|
|
// RTP header length was used in the RED packet creation.
|
|
uint16_t seq_num = packet_generator_.NextPacketSeqNum();
|
|
for (const auto& fec_packet : fec_packets) {
|
|
fec_packet->SetSequenceNumber(seq_num++);
|
|
EXPECT_EQ(kFecPayloadType, fec_packet->data()[kShortRtpHeaderLength]);
|
|
}
|
|
}
|
|
|
|
TEST_F(UlpfecGeneratorTest, UpdatesProtectionParameters) {
|
|
const FecProtectionParams kKeyFrameParams = {25, /*max_fec_frames=*/2,
|
|
kFecMaskRandom};
|
|
const FecProtectionParams kDeltaFrameParams = {25, /*max_fec_frames=*/5,
|
|
kFecMaskRandom};
|
|
|
|
ulpfec_generator_.SetProtectionParameters(kDeltaFrameParams, kKeyFrameParams);
|
|
|
|
// No params applied yet.
|
|
EXPECT_EQ(ulpfec_generator_.CurrentParams().max_fec_frames, 0);
|
|
|
|
// Helper function to add a single-packet frame market as either key-frame
|
|
// or delta-frame.
|
|
auto add_frame = [&](bool is_keyframe) {
|
|
packet_generator_.NewFrame(1);
|
|
std::unique_ptr<AugmentedPacket> packet =
|
|
packet_generator_.NextPacket(0, 10);
|
|
RtpPacketToSend rtp_packet(nullptr);
|
|
EXPECT_TRUE(rtp_packet.Parse(packet->data.data(), packet->data.size()));
|
|
rtp_packet.set_is_key_frame(is_keyframe);
|
|
ulpfec_generator_.AddPacketAndGenerateFec(rtp_packet);
|
|
};
|
|
|
|
// Add key-frame, keyframe params should apply, no FEC generated yet.
|
|
add_frame(true);
|
|
EXPECT_EQ(ulpfec_generator_.CurrentParams().max_fec_frames, 2);
|
|
EXPECT_TRUE(ulpfec_generator_.GetFecPackets().empty());
|
|
|
|
// Add delta-frame, generated FEC packet. Params will not be updated until
|
|
// next added packet though.
|
|
add_frame(false);
|
|
EXPECT_EQ(ulpfec_generator_.CurrentParams().max_fec_frames, 2);
|
|
EXPECT_FALSE(ulpfec_generator_.GetFecPackets().empty());
|
|
|
|
// Add delta-frame, now params get updated.
|
|
add_frame(false);
|
|
EXPECT_EQ(ulpfec_generator_.CurrentParams().max_fec_frames, 5);
|
|
EXPECT_TRUE(ulpfec_generator_.GetFecPackets().empty());
|
|
|
|
// Add yet another delta-frame.
|
|
add_frame(false);
|
|
EXPECT_EQ(ulpfec_generator_.CurrentParams().max_fec_frames, 5);
|
|
EXPECT_TRUE(ulpfec_generator_.GetFecPackets().empty());
|
|
|
|
// Add key-frame, params immediately switch to key-frame ones. The two
|
|
// buffered frames plus the key-frame is protected and fec emitted,
|
|
// even though the frame count is technically over the keyframe frame count
|
|
// threshold.
|
|
add_frame(true);
|
|
EXPECT_EQ(ulpfec_generator_.CurrentParams().max_fec_frames, 2);
|
|
EXPECT_FALSE(ulpfec_generator_.GetFecPackets().empty());
|
|
}
|
|
|
|
} // namespace webrtc
|