Revert of Wire up send-side bandwidth estimation. (patchset #8 id:140001 of https://codereview.webrtc.org/1338203003/ )
Reason for revert: Breaking some Android bots. https://chromegw.corp.google.com/i/client.webrtc/builders/Android32%20Tests%20%28L%20Nexus5%29 Original issue's description: > Wire up send-side bandwidth estimation. > > BUG=webrtc:4173 > > Committed: https://crrev.com/ef165eefc79cf28bb67779afe303cc2365885547 > Cr-Commit-Position: refs/heads/master@{#10012} TBR=stefan@webrtc.org, kjellander@webrtc.org NOPRESUBMIT=false NOTREECHECKS=false NOTRY=false BUG=webrtc:4173 Review URL: https://codereview.webrtc.org/1362923002 . Cr-Commit-Position: refs/heads/master@{#10029}
This commit is contained in:
@ -17,7 +17,6 @@
|
||||
|
||||
#include "webrtc/base/checks.h"
|
||||
#include "webrtc/modules/rtp_rtcp/source/rtcp_utility.h"
|
||||
#include "webrtc/modules/rtp_rtcp/source/rtcp_packet/transport_feedback.h"
|
||||
#include "webrtc/modules/rtp_rtcp/source/rtp_rtcp_impl.h"
|
||||
#include "webrtc/system_wrappers/interface/critical_section_wrapper.h"
|
||||
#include "webrtc/system_wrappers/interface/logging.h"
|
||||
@ -30,15 +29,12 @@ using namespace RTCPHelp;
|
||||
// The number of RTCP time intervals needed to trigger a timeout.
|
||||
const int kRrTimeoutIntervals = 3;
|
||||
|
||||
const int64_t kMaxWarningLogIntervalMs = 10000;
|
||||
|
||||
RTCPReceiver::RTCPReceiver(
|
||||
Clock* clock,
|
||||
bool receiver_only,
|
||||
RtcpPacketTypeCounterObserver* packet_type_counter_observer,
|
||||
RtcpBandwidthObserver* rtcp_bandwidth_observer,
|
||||
RtcpIntraFrameObserver* rtcp_intra_frame_observer,
|
||||
TransportFeedbackObserver* transport_feedback_observer,
|
||||
ModuleRtpRtcpImpl* owner)
|
||||
: TMMBRHelp(),
|
||||
_clock(clock),
|
||||
@ -50,7 +46,6 @@ RTCPReceiver::RTCPReceiver(
|
||||
CriticalSectionWrapper::CreateCriticalSection()),
|
||||
_cbRtcpBandwidthObserver(rtcp_bandwidth_observer),
|
||||
_cbRtcpIntraFrameObserver(rtcp_intra_frame_observer),
|
||||
_cbTransportFeedbackObserver(transport_feedback_observer),
|
||||
_criticalSectionRTCPReceiver(
|
||||
CriticalSectionWrapper::CreateCriticalSection()),
|
||||
main_ssrc_(0),
|
||||
@ -66,9 +61,7 @@ RTCPReceiver::RTCPReceiver(
|
||||
_lastReceivedRrMs(0),
|
||||
_lastIncreasedSequenceNumberMs(0),
|
||||
stats_callback_(NULL),
|
||||
packet_type_counter_observer_(packet_type_counter_observer),
|
||||
num_skipped_packets_(0),
|
||||
last_skipped_packets_warning_(clock->TimeInMilliseconds()) {
|
||||
packet_type_counter_observer_(packet_type_counter_observer) {
|
||||
memset(&_remoteSenderInfo, 0, sizeof(_remoteSenderInfo));
|
||||
}
|
||||
|
||||
@ -356,9 +349,6 @@ RTCPReceiver::IncomingRTCPPacket(RTCPPacketInformation& rtcpPacketInformation,
|
||||
// generic application messages
|
||||
HandleAPPItem(*rtcpParser, rtcpPacketInformation);
|
||||
break;
|
||||
case RTCPPacketTypes::kTransportFeedback:
|
||||
HandleTransportFeedback(rtcpParser, &rtcpPacketInformation);
|
||||
break;
|
||||
default:
|
||||
rtcpParser->Iterate();
|
||||
break;
|
||||
@ -371,19 +361,6 @@ RTCPReceiver::IncomingRTCPPacket(RTCPPacketInformation& rtcpPacketInformation,
|
||||
main_ssrc_, packet_type_counter_);
|
||||
}
|
||||
|
||||
num_skipped_packets_ += rtcpParser->NumSkippedBlocks();
|
||||
|
||||
int64_t now = _clock->TimeInMilliseconds();
|
||||
if (now - last_skipped_packets_warning_ >= kMaxWarningLogIntervalMs &&
|
||||
num_skipped_packets_ > 0) {
|
||||
last_skipped_packets_warning_ = now;
|
||||
LOG(LS_WARNING)
|
||||
<< num_skipped_packets_
|
||||
<< " RTCP blocks were skipped due to being malformed or of "
|
||||
"unrecognized/unsupported type, during the past "
|
||||
<< (kMaxWarningLogIntervalMs / 1000) << " second period.";
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -1275,17 +1252,6 @@ void RTCPReceiver::HandleAPPItem(RTCPUtility::RTCPParserV2& rtcpParser,
|
||||
rtcpParser.Iterate();
|
||||
}
|
||||
|
||||
void RTCPReceiver::HandleTransportFeedback(
|
||||
RTCPUtility::RTCPParserV2* rtcp_parser,
|
||||
RTCPHelp::RTCPPacketInformation* rtcp_packet_information) {
|
||||
rtcp::RtcpPacket* packet = rtcp_parser->ReleaseRtcpPacket();
|
||||
RTC_DCHECK(packet != nullptr);
|
||||
rtcp_packet_information->rtcpPacketTypeFlags |= kRtcpTransportFeedback;
|
||||
rtcp_packet_information->transport_feedback_.reset(
|
||||
static_cast<rtcp::TransportFeedback*>(packet));
|
||||
|
||||
rtcp_parser->Iterate();
|
||||
}
|
||||
int32_t RTCPReceiver::UpdateTMMBR() {
|
||||
int32_t numBoundingSet = 0;
|
||||
uint32_t bitrate = 0;
|
||||
@ -1355,11 +1321,11 @@ void RTCPReceiver::TriggerCallbacksFromRTCPPacket(
|
||||
local_ssrc = main_ssrc_;
|
||||
}
|
||||
if (!receiver_only_ &&
|
||||
(rtcpPacketInformation.rtcpPacketTypeFlags & kRtcpSrReq)) {
|
||||
rtcpPacketInformation.rtcpPacketTypeFlags & kRtcpSrReq) {
|
||||
_rtpRtcp.OnRequestSendReport();
|
||||
}
|
||||
if (!receiver_only_ &&
|
||||
(rtcpPacketInformation.rtcpPacketTypeFlags & kRtcpNack)) {
|
||||
rtcpPacketInformation.rtcpPacketTypeFlags & kRtcpNack) {
|
||||
if (rtcpPacketInformation.nackSequenceNumbers.size() > 0) {
|
||||
LOG(LS_VERBOSE) << "Incoming NACK length: "
|
||||
<< rtcpPacketInformation.nackSequenceNumbers.size();
|
||||
@ -1410,17 +1376,6 @@ void RTCPReceiver::TriggerCallbacksFromRTCPPacket(
|
||||
now);
|
||||
}
|
||||
}
|
||||
if (_cbTransportFeedbackObserver &&
|
||||
(rtcpPacketInformation.rtcpPacketTypeFlags & kRtcpTransportFeedback)) {
|
||||
uint32_t media_source_ssrc =
|
||||
rtcpPacketInformation.transport_feedback_->GetMediaSourceSsrc();
|
||||
if (media_source_ssrc == main_ssrc_ ||
|
||||
registered_ssrcs_.find(media_source_ssrc) !=
|
||||
registered_ssrcs_.end()) {
|
||||
_cbTransportFeedbackObserver->OnTransportFeedback(
|
||||
*rtcpPacketInformation.transport_feedback_.get());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (!receiver_only_) {
|
||||
|
Reference in New Issue
Block a user