chiark / gitweb /
update disobedience.1 for latest changes
[disorder] / clients / playrtp.c
CommitLineData
e83d0967
RK
1/*
2 * This file is part of DisOrder.
3 * Copyright (C) 2007 Richard Kettlewell
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
18 * USA
19 */
28bacdc0
RK
20/** @file clients/playrtp.c
21 * @brief RTP player
22 *
b0fdc63d 23 * This player supports Linux (<a href="http://www.alsa-project.org/">ALSA</a>)
24 * and Apple Mac (<a
25 * href="http://developer.apple.com/audio/coreaudio.html">Core Audio</a>)
26 * systems. There is no support for Microsoft Windows yet, and that will in
27 * fact probably an entirely separate program.
28 *
189e9830
RK
29 * The program runs (at least) three threads. listen_thread() is responsible
30 * for reading RTP packets off the wire and adding them to the linked list @ref
31 * received_packets, assuming they are basically sound. queue_thread() takes
32 * packets off this linked list and adds them to @ref packets (an operation
33 * which might be much slower due to contention for @ref lock).
b0fdc63d 34 *
35 * The main thread is responsible for actually playing audio. In ALSA this
36 * means it waits until ALSA says it's ready for more audio which it then
c593cf7c 37 * plays. See @ref clients/playrtp-alsa.c.
b0fdc63d 38 *
8e3fe3d8 39 * In Core Audio the main thread is only responsible for starting and stopping
b0fdc63d 40 * play: the system does the actual playback in its own private thread, and
c593cf7c 41 * calls adioproc() to fetch the audio data. See @ref
42 * clients/playrtp-coreaudio.c.
b0fdc63d 43 *
44 * Sometimes it happens that there is no audio available to play. This may
45 * because the server went away, or a packet was dropped, or the server
46 * deliberately did not send any sound because it encountered a silence.
189e9830
RK
47 *
48 * Assumptions:
49 * - it is safe to read uint32_t values without a lock protecting them
28bacdc0 50 */
e83d0967
RK
51
52#include <config.h>
53#include "types.h"
54
55#include <getopt.h>
56#include <stdio.h>
57#include <stdlib.h>
58#include <sys/socket.h>
59#include <sys/types.h>
60#include <sys/socket.h>
61#include <netdb.h>
62#include <pthread.h>
0b75463f 63#include <locale.h>
2c7c9eae 64#include <sys/uio.h>
28bacdc0 65#include <string.h>
8e3fe3d8 66#include <assert.h>
c593cf7c 67#include <errno.h>
e3426f7b 68#include <netinet/in.h>
2d2effe2 69#include <sys/time.h>
a99c4e9a 70#include <sys/un.h>
e83d0967
RK
71
72#include "log.h"
73#include "mem.h"
74#include "configuration.h"
75#include "addr.h"
76#include "syscalls.h"
77#include "rtp.h"
0b75463f 78#include "defs.h"
28bacdc0
RK
79#include "vector.h"
80#include "heap.h"
189e9830 81#include "timeval.h"
a7e9570a 82#include "client.h"
8e3fe3d8 83#include "playrtp.h"
a99c4e9a 84#include "inputline.h"
e83d0967 85
1153fd23 86#define readahead linux_headers_are_borked
87
e3426f7b
RK
88/** @brief Obsolete synonym */
89#ifndef IPV6_JOIN_GROUP
90# define IPV6_JOIN_GROUP IPV6_ADD_MEMBERSHIP
91#endif
92
0b75463f 93/** @brief RTP socket */
e83d0967
RK
94static int rtpfd;
95
345ebe66
RK
96/** @brief Log output */
97static FILE *logfp;
98
0b75463f 99/** @brief Output device */
8e3fe3d8 100const char *device;
0b75463f 101
9086a105 102/** @brief Minimum low watermark
0b75463f 103 *
104 * We'll stop playing if there's only this many samples in the buffer. */
c593cf7c 105unsigned minbuffer = 2 * 44100 / 10; /* 0.2 seconds */
0b75463f 106
9086a105 107/** @brief Buffer high watermark
1153fd23 108 *
109 * We'll only start playing when this many samples are available. */
8d0c14d7 110static unsigned readahead = 2 * 2 * 44100;
0b75463f 111
9086a105
RK
112/** @brief Maximum buffer size
113 *
114 * We'll stop reading from the network if we have this many samples. */
115static unsigned maxbuffer;
116
189e9830
RK
117/** @brief Received packets
118 * Protected by @ref receive_lock
119 *
120 * Received packets are added to this list, and queue_thread() picks them off
121 * it and adds them to @ref packets. Whenever a packet is added to it, @ref
122 * receive_cond is signalled.
123 */
8e3fe3d8 124struct packet *received_packets;
189e9830
RK
125
126/** @brief Tail of @ref received_packets
127 * Protected by @ref receive_lock
128 */
8e3fe3d8 129struct packet **received_tail = &received_packets;
189e9830
RK
130
131/** @brief Lock protecting @ref received_packets
132 *
133 * Only listen_thread() and queue_thread() ever hold this lock. It is vital
134 * that queue_thread() not hold it any longer than it strictly has to. */
8e3fe3d8 135pthread_mutex_t receive_lock = PTHREAD_MUTEX_INITIALIZER;
189e9830
RK
136
137/** @brief Condition variable signalled when @ref received_packets is updated
138 *
139 * Used by listen_thread() to notify queue_thread() that it has added another
140 * packet to @ref received_packets. */
8e3fe3d8 141pthread_cond_t receive_cond = PTHREAD_COND_INITIALIZER;
189e9830
RK
142
143/** @brief Length of @ref received_packets */
8e3fe3d8 144uint32_t nreceived;
28bacdc0
RK
145
146/** @brief Binary heap of received packets */
8e3fe3d8 147struct pheap packets;
28bacdc0 148
189e9830
RK
149/** @brief Total number of samples available
150 *
151 * We make this volatile because we inspect it without a protecting lock,
152 * so the usual pthread_* guarantees aren't available.
153 */
8e3fe3d8 154volatile uint32_t nsamples;
0b75463f 155
156/** @brief Timestamp of next packet to play.
157 *
158 * This is set to the timestamp of the last packet, plus the number of
09ee2f0d 159 * samples it contained. Only valid if @ref active is nonzero.
0b75463f 160 */
8e3fe3d8 161uint32_t next_timestamp;
e83d0967 162
09ee2f0d 163/** @brief True if actively playing
164 *
165 * This is true when playing and false when just buffering. */
8e3fe3d8 166int active;
09ee2f0d 167
189e9830 168/** @brief Lock protecting @ref packets */
8e3fe3d8 169pthread_mutex_t lock = PTHREAD_MUTEX_INITIALIZER;
189e9830
RK
170
171/** @brief Condition variable signalled whenever @ref packets is changed */
8e3fe3d8 172pthread_cond_t cond = PTHREAD_COND_INITIALIZER;
2c7c9eae 173
146e86fb 174#if HAVE_ALSA_ASOUNDLIB_H
c593cf7c 175# define DEFAULT_BACKEND playrtp_alsa
a9f0ad12 176#elif HAVE_SYS_SOUNDCARD_H || EMPEG_HOST
c593cf7c 177# define DEFAULT_BACKEND playrtp_oss
178#elif HAVE_COREAUDIO_AUDIOHARDWARE_H
179# define DEFAULT_BACKEND playrtp_coreaudio
180#else
181# error No known backend
182#endif
183
184/** @brief Backend to play with */
185static void (*backend)(void) = &DEFAULT_BACKEND;
186
8e3fe3d8 187HEAP_DEFINE(pheap, struct packet *, lt_packet);
e83d0967 188
a99c4e9a
RK
189/** @brief Control socket or NULL */
190const char *control_socket;
191
e83d0967
RK
192static const struct option options[] = {
193 { "help", no_argument, 0, 'h' },
194 { "version", no_argument, 0, 'V' },
195 { "debug", no_argument, 0, 'd' },
0b75463f 196 { "device", required_argument, 0, 'D' },
1153fd23 197 { "min", required_argument, 0, 'm' },
9086a105 198 { "max", required_argument, 0, 'x' },
1153fd23 199 { "buffer", required_argument, 0, 'b' },
1f10f780 200 { "rcvbuf", required_argument, 0, 'R' },
23205f9c 201 { "multicast", required_argument, 0, 'M' },
a9f0ad12 202#if HAVE_SYS_SOUNDCARD_H || EMPEG_HOST
c593cf7c 203 { "oss", no_argument, 0, 'o' },
204#endif
146e86fb 205#if HAVE_ALSA_ASOUNDLIB_H
c593cf7c 206 { "alsa", no_argument, 0, 'a' },
207#endif
208#if HAVE_COREAUDIO_AUDIOHARDWARE_H
209 { "core-audio", no_argument, 0, 'c' },
210#endif
a99c4e9a 211 { "socket", required_argument, 0, 's' },
a7e9570a 212 { "config", required_argument, 0, 'C' },
e83d0967
RK
213 { 0, 0, 0, 0 }
214};
215
a99c4e9a
RK
216/** @brief Control thread
217 *
218 * This thread is responsible for accepting control commands from Disobedience
219 * (or other controllers) over an AF_UNIX stream socket with a path specified
220 * by the @c --socket option. The protocol uses simple string commands and
221 * replies:
222 *
223 * - @c stop will shut the player down
224 * - @c query will send back the reply @c running
225 * - anything else is ignored
226 *
227 * Commands and response strings terminated by shutting down the connection or
228 * by a newline. No attempt is made to multiplex multiple clients so it is
229 * important that the command be sent as soon as the connection is made - it is
230 * assumed that both parties to the protocol are entirely cooperating with one
231 * another.
232 */
233static void *control_thread(void attribute((unused)) *arg) {
234 struct sockaddr_un sa;
235 int sfd, cfd;
236 char *line;
237 socklen_t salen;
238 FILE *fp;
239
240 assert(control_socket);
241 unlink(control_socket);
242 memset(&sa, 0, sizeof sa);
243 sa.sun_family = AF_UNIX;
244 strcpy(sa.sun_path, control_socket);
245 sfd = xsocket(PF_UNIX, SOCK_STREAM, 0);
246 if(bind(sfd, (const struct sockaddr *)&sa, sizeof sa) < 0)
247 fatal(errno, "error binding to %s", control_socket);
248 if(listen(sfd, 128) < 0)
249 fatal(errno, "error calling listen on %s", control_socket);
250 info("listening on %s", control_socket);
251 for(;;) {
252 salen = sizeof sa;
253 cfd = accept(sfd, (struct sockaddr *)&sa, &salen);
254 if(cfd < 0) {
255 switch(errno) {
256 case EINTR:
257 case EAGAIN:
258 break;
259 default:
260 fatal(errno, "error calling accept on %s", control_socket);
261 }
262 }
263 if(!(fp = fdopen(cfd, "r+"))) {
264 error(errno, "error calling fdopen for %s connection", control_socket);
265 close(cfd);
266 continue;
267 }
268 if(!inputline(control_socket, fp, &line, '\n')) {
269 if(!strcmp(line, "stop")) {
270 info("stopped via %s", control_socket);
271 exit(0); /* terminate immediately */
272 }
273 if(!strcmp(line, "query"))
274 fprintf(fp, "running");
275 xfree(line);
276 }
277 if(fclose(fp) < 0)
278 error(errno, "error closing %s connection", control_socket);
279 }
280}
281
28bacdc0
RK
282/** @brief Drop the first packet
283 *
284 * Assumes that @ref lock is held.
285 */
286static void drop_first_packet(void) {
287 if(pheap_count(&packets)) {
288 struct packet *const p = pheap_remove(&packets);
289 nsamples -= p->nsamples;
c593cf7c 290 playrtp_free_packet(p);
2c7c9eae 291 pthread_cond_broadcast(&cond);
2c7c9eae 292 }
9086a105
RK
293}
294
189e9830
RK
295/** @brief Background thread adding packets to heap
296 *
297 * This just transfers packets from @ref received_packets to @ref packets. It
298 * is important that it holds @ref receive_lock for as little time as possible,
299 * in order to minimize the interval between calls to read() in
300 * listen_thread().
301 */
302static void *queue_thread(void attribute((unused)) *arg) {
303 struct packet *p;
304
305 for(;;) {
306 /* Get the next packet */
307 pthread_mutex_lock(&receive_lock);
308 while(!received_packets)
309 pthread_cond_wait(&receive_cond, &receive_lock);
310 p = received_packets;
311 received_packets = p->next;
312 if(!received_packets)
313 received_tail = &received_packets;
314 --nreceived;
315 pthread_mutex_unlock(&receive_lock);
316 /* Add it to the heap */
317 pthread_mutex_lock(&lock);
318 pheap_insert(&packets, p);
319 nsamples += p->nsamples;
320 pthread_cond_broadcast(&cond);
321 pthread_mutex_unlock(&lock);
322 }
323}
324
09ee2f0d 325/** @brief Background thread collecting samples
0b75463f 326 *
327 * This function collects samples, perhaps converts them to the target format,
b0fdc63d 328 * and adds them to the packet list.
329 *
330 * It is crucial that the gap between successive calls to read() is as small as
331 * possible: otherwise packets will be dropped.
332 *
333 * We use a binary heap to ensure that the unavoidable effort is at worst
334 * logarithmic in the total number of packets - in fact if packets are mostly
335 * received in order then we will largely do constant work per packet since the
336 * newest packet will always be last.
337 *
338 * Of more concern is that we must acquire the lock on the heap to add a packet
339 * to it. If this proves a problem in practice then the answer would be
340 * (probably doubly) linked list with new packets added the end and a second
341 * thread which reads packets off the list and adds them to the heap.
342 *
343 * We keep memory allocation (mostly) very fast by keeping pre-allocated
c593cf7c 344 * packets around; see @ref playrtp_new_packet().
b0fdc63d 345 */
0b75463f 346static void *listen_thread(void attribute((unused)) *arg) {
2c7c9eae 347 struct packet *p = 0;
0b75463f 348 int n;
2c7c9eae
RK
349 struct rtp_header header;
350 uint16_t seq;
351 uint32_t timestamp;
352 struct iovec iov[2];
e83d0967
RK
353
354 for(;;) {
189e9830 355 if(!p)
c593cf7c 356 p = playrtp_new_packet();
2c7c9eae
RK
357 iov[0].iov_base = &header;
358 iov[0].iov_len = sizeof header;
359 iov[1].iov_base = p->samples_raw;
b64efe7e 360 iov[1].iov_len = sizeof p->samples_raw / sizeof *p->samples_raw;
2c7c9eae 361 n = readv(rtpfd, iov, 2);
e83d0967
RK
362 if(n < 0) {
363 switch(errno) {
364 case EINTR:
365 continue;
366 default:
367 fatal(errno, "error reading from socket");
368 }
369 }
0b75463f 370 /* Ignore too-short packets */
345ebe66
RK
371 if((size_t)n <= sizeof (struct rtp_header)) {
372 info("ignored a short packet");
0b75463f 373 continue;
345ebe66 374 }
2c7c9eae
RK
375 timestamp = htonl(header.timestamp);
376 seq = htons(header.seq);
09ee2f0d 377 /* Ignore packets in the past */
2c7c9eae 378 if(active && lt(timestamp, next_timestamp)) {
c0e41690 379 info("dropping old packet, timestamp=%"PRIx32" < %"PRIx32,
2c7c9eae 380 timestamp, next_timestamp);
09ee2f0d 381 continue;
c0e41690 382 }
189e9830 383 p->next = 0;
58b5a68f 384 p->flags = 0;
2c7c9eae 385 p->timestamp = timestamp;
e83d0967 386 /* Convert to target format */
58b5a68f
RK
387 if(header.mpt & 0x80)
388 p->flags |= IDLE;
2c7c9eae 389 switch(header.mpt & 0x7F) {
e83d0967 390 case 10:
2c7c9eae 391 p->nsamples = (n - sizeof header) / sizeof(uint16_t);
e83d0967
RK
392 break;
393 /* TODO support other RFC3551 media types (when the speaker does) */
394 default:
0b75463f 395 fatal(0, "unsupported RTP payload type %d",
2c7c9eae 396 header.mpt & 0x7F);
e83d0967 397 }
345ebe66
RK
398 if(logfp)
399 fprintf(logfp, "sequence %u timestamp %"PRIx32" length %"PRIx32" end %"PRIx32"\n",
2c7c9eae 400 seq, timestamp, p->nsamples, timestamp + p->nsamples);
0b75463f 401 /* Stop reading if we've reached the maximum.
402 *
403 * This is rather unsatisfactory: it means that if packets get heavily
404 * out of order then we guarantee dropouts. But for now... */
345ebe66 405 if(nsamples >= maxbuffer) {
189e9830 406 pthread_mutex_lock(&lock);
345ebe66
RK
407 while(nsamples >= maxbuffer)
408 pthread_cond_wait(&cond, &lock);
189e9830 409 pthread_mutex_unlock(&lock);
345ebe66 410 }
189e9830
RK
411 /* Add the packet to the receive queue */
412 pthread_mutex_lock(&receive_lock);
413 *received_tail = p;
414 received_tail = &p->next;
415 ++nreceived;
416 pthread_cond_signal(&receive_cond);
417 pthread_mutex_unlock(&receive_lock);
58b5a68f
RK
418 /* We'll need a new packet */
419 p = 0;
e83d0967
RK
420 }
421}
422
5626f6d2
RK
423/** @brief Wait until the buffer is adequately full
424 *
425 * Must be called with @ref lock held.
426 */
c593cf7c 427void playrtp_fill_buffer(void) {
bfd27c14
RK
428 while(nsamples)
429 drop_first_packet();
5626f6d2
RK
430 info("Buffering...");
431 while(nsamples < readahead)
432 pthread_cond_wait(&cond, &lock);
433 next_timestamp = pheap_first(&packets)->timestamp;
434 active = 1;
435}
436
437/** @brief Find next packet
438 * @return Packet to play or NULL if none found
439 *
440 * The return packet is merely guaranteed not to be in the past: it might be
441 * the first packet in the future rather than one that is actually suitable to
442 * play.
443 *
444 * Must be called with @ref lock held.
445 */
c593cf7c 446struct packet *playrtp_next_packet(void) {
5626f6d2
RK
447 while(pheap_count(&packets)) {
448 struct packet *const p = pheap_first(&packets);
449 if(le(p->timestamp + p->nsamples, next_timestamp)) {
450 /* This packet is in the past. Drop it and try another one. */
451 drop_first_packet();
452 } else
453 /* This packet is NOT in the past. (It might be in the future
454 * however.) */
455 return p;
456 }
457 return 0;
458}
459
09ee2f0d 460/** @brief Play an RTP stream
461 *
462 * This is the guts of the program. It is responsible for:
463 * - starting the listening thread
464 * - opening the audio device
465 * - reading ahead to build up a buffer
466 * - arranging for audio to be played
467 * - detecting when the buffer has got too small and re-buffering
468 */
0b75463f 469static void play_rtp(void) {
470 pthread_t ltid;
a99c4e9a 471 int err;
e83d0967
RK
472
473 /* We receive and convert audio data in a background thread */
a99c4e9a
RK
474 if((err = pthread_create(&ltid, 0, listen_thread, 0)))
475 fatal(err, "pthread_create listen_thread");
189e9830 476 /* We have a second thread to add received packets to the queue */
a99c4e9a
RK
477 if((err = pthread_create(&ltid, 0, queue_thread, 0)))
478 fatal(err, "pthread_create queue_thread");
c593cf7c 479 /* The rest of the work is backend-specific */
480 backend();
e83d0967
RK
481}
482
483/* display usage message and terminate */
484static void help(void) {
485 xprintf("Usage:\n"
486 " disorder-playrtp [OPTIONS] ADDRESS [PORT]\n"
487 "Options:\n"
1153fd23 488 " --device, -D DEVICE Output device\n"
489 " --min, -m FRAMES Buffer low water mark\n"
9086a105
RK
490 " --buffer, -b FRAMES Buffer high water mark\n"
491 " --max, -x FRAMES Buffer maximum size\n"
1f10f780 492 " --rcvbuf, -R BYTES Socket receive buffer size\n"
23205f9c 493 " --multicast, -M GROUP Join multicast group\n"
a7e9570a 494 " --config, -C PATH Set configuration file\n"
146e86fb 495#if HAVE_ALSA_ASOUNDLIB_H
c593cf7c 496 " --alsa, -a Use ALSA to play audio\n"
497#endif
a9f0ad12 498#if HAVE_SYS_SOUNDCARD_H || EMPEG_HOST
c593cf7c 499 " --oss, -o Use OSS to play audio\n"
500#endif
501#if HAVE_COREAUDIO_AUDIOHARDWARE_H
502 " --core-audio, -c Use Core Audio to play audio\n"
503#endif
9086a105
RK
504 " --help, -h Display usage message\n"
505 " --version, -V Display version number\n"
506 );
e83d0967
RK
507 xfclose(stdout);
508 exit(0);
509}
510
511/* display version number and terminate */
512static void version(void) {
513 xprintf("disorder-playrtp version %s\n", disorder_version_string);
514 xfclose(stdout);
515 exit(0);
516}
517
518int main(int argc, char **argv) {
a99c4e9a 519 int n, err;
e83d0967
RK
520 struct addrinfo *res;
521 struct stringlist sl;
0b75463f 522 char *sockname;
1f10f780
RK
523 int rcvbuf, target_rcvbuf = 131072;
524 socklen_t len;
23205f9c
RK
525 char *multicast_group = 0;
526 struct ip_mreq mreq;
527 struct ipv6_mreq mreq6;
a7e9570a
RK
528 disorder_client *c;
529 char *address, *port;
e83d0967 530
0b75463f 531 static const struct addrinfo prefs = {
e83d0967
RK
532 AI_PASSIVE,
533 PF_INET,
534 SOCK_DGRAM,
535 IPPROTO_UDP,
536 0,
537 0,
538 0,
539 0
540 };
541
542 mem_init();
543 if(!setlocale(LC_CTYPE, "")) fatal(errno, "error calling setlocale");
a7e9570a 544 while((n = getopt_long(argc, argv, "hVdD:m:b:x:L:R:M:aocC:", options, 0)) >= 0) {
e83d0967
RK
545 switch(n) {
546 case 'h': help();
547 case 'V': version();
548 case 'd': debugging = 1; break;
0b75463f 549 case 'D': device = optarg; break;
1153fd23 550 case 'm': minbuffer = 2 * atol(optarg); break;
551 case 'b': readahead = 2 * atol(optarg); break;
9086a105 552 case 'x': maxbuffer = 2 * atol(optarg); break;
345ebe66 553 case 'L': logfp = fopen(optarg, "w"); break;
1f10f780 554 case 'R': target_rcvbuf = atoi(optarg); break;
23205f9c 555 case 'M': multicast_group = optarg; break;
146e86fb 556#if HAVE_ALSA_ASOUNDLIB_H
c593cf7c 557 case 'a': backend = playrtp_alsa; break;
558#endif
a9f0ad12 559#if HAVE_SYS_SOUNDCARD_H || EMPEG_HOST
c593cf7c 560 case 'o': backend = playrtp_oss; break;
561#endif
562#if HAVE_COREAUDIO_AUDIOHARDWARE_H
563 case 'c': backend = playrtp_coreaudio; break;
c593cf7c 564#endif
a7e9570a 565 case 'C': configfile = optarg; break;
a99c4e9a 566 case 's': control_socket = optarg; break;
e83d0967
RK
567 default: fatal(0, "invalid option");
568 }
569 }
a7e9570a 570 if(config_read(0)) fatal(0, "cannot read configuration");
9086a105
RK
571 if(!maxbuffer)
572 maxbuffer = 4 * readahead;
e83d0967
RK
573 argc -= optind;
574 argv += optind;
a7e9570a
RK
575 switch(argc) {
576 case 0:
577 case 1:
578 if(!(c = disorder_new(1))) exit(EXIT_FAILURE);
579 if(disorder_connect(c)) exit(EXIT_FAILURE);
580 if(disorder_rtp_address(c, &address, &port)) exit(EXIT_FAILURE);
581 sl.n = 1;
582 sl.s = &port;
583 /* set multicast_group if address is a multicast address */
584 break;
585 case 2:
586 sl.n = argc;
587 sl.s = argv;
588 break;
589 default:
590 fatal(0, "usage: disorder-playrtp [OPTIONS] [ADDRESS [PORT]]");
591 }
e83d0967 592 /* Listen for inbound audio data */
0b75463f 593 if(!(res = get_address(&sl, &prefs, &sockname)))
e83d0967 594 exit(1);
a7e9570a 595 info("listening on %s", sockname);
e83d0967
RK
596 if((rtpfd = socket(res->ai_family,
597 res->ai_socktype,
598 res->ai_protocol)) < 0)
599 fatal(errno, "error creating socket");
600 if(bind(rtpfd, res->ai_addr, res->ai_addrlen) < 0)
601 fatal(errno, "error binding socket to %s", sockname);
23205f9c
RK
602 if(multicast_group) {
603 if((n = getaddrinfo(multicast_group, 0, &prefs, &res)))
604 fatal(0, "getaddrinfo %s: %s", multicast_group, gai_strerror(n));
605 switch(res->ai_family) {
606 case PF_INET:
607 mreq.imr_multiaddr = ((struct sockaddr_in *)res->ai_addr)->sin_addr;
608 mreq.imr_interface.s_addr = 0; /* use primary interface */
609 if(setsockopt(rtpfd, IPPROTO_IP, IP_ADD_MEMBERSHIP,
610 &mreq, sizeof mreq) < 0)
611 fatal(errno, "error calling setsockopt IP_ADD_MEMBERSHIP");
612 break;
613 case PF_INET6:
614 mreq6.ipv6mr_multiaddr = ((struct sockaddr_in6 *)res->ai_addr)->sin6_addr;
615 memset(&mreq6.ipv6mr_interface, 0, sizeof mreq6.ipv6mr_interface);
616 if(setsockopt(rtpfd, IPPROTO_IPV6, IPV6_JOIN_GROUP,
617 &mreq6, sizeof mreq6) < 0)
618 fatal(errno, "error calling setsockopt IPV6_JOIN_GROUP");
619 break;
620 default:
621 fatal(0, "unsupported address family %d", res->ai_family);
622 }
623 }
1f10f780
RK
624 len = sizeof rcvbuf;
625 if(getsockopt(rtpfd, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &len) < 0)
626 fatal(errno, "error calling getsockopt SO_RCVBUF");
f0bae611 627 if(target_rcvbuf > rcvbuf) {
1f10f780
RK
628 if(setsockopt(rtpfd, SOL_SOCKET, SO_RCVBUF,
629 &target_rcvbuf, sizeof target_rcvbuf) < 0)
630 error(errno, "error calling setsockopt SO_RCVBUF %d",
631 target_rcvbuf);
632 /* We try to carry on anyway */
633 else
634 info("changed socket receive buffer from %d to %d",
635 rcvbuf, target_rcvbuf);
636 } else
637 info("default socket receive buffer %d", rcvbuf);
638 if(logfp)
639 info("WARNING: -L option can impact performance");
a99c4e9a
RK
640 if(control_socket) {
641 pthread_t tid;
642
643 if((err = pthread_create(&tid, 0, control_thread, 0)))
644 fatal(err, "pthread_create control_thread");
645 }
e83d0967
RK
646 play_rtp();
647 return 0;
648}
649
650/*
651Local Variables:
652c-basic-offset:2
653comment-column:40
654fill-column:79
655indent-tabs-mode:nil
656End:
657*/