]> code.delx.au - pulseaudio/blob - src/modules/rtp/module-rtp-recv.c
Merge commit '38ded3bb31bc49664641965f856a35f432a8a956'
[pulseaudio] / src / modules / rtp / module-rtp-recv.c
1
2 /***
3 This file is part of PulseAudio.
4
5 Copyright 2006 Lennart Poettering
6
7 PulseAudio is free software; you can redistribute it and/or modify
8 it under the terms of the GNU Lesser General Public License as published
9 by the Free Software Foundation; either version 2 of the License,
10 or (at your option) any later version.
11
12 PulseAudio is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 General Public License for more details.
16
17 You should have received a copy of the GNU Lesser General Public License
18 along with PulseAudio; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
20 USA.
21 ***/
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include <stdio.h>
28 #include <sys/socket.h>
29 #include <netinet/in.h>
30 #include <arpa/inet.h>
31 #include <errno.h>
32 #include <string.h>
33 #include <unistd.h>
34 #include <poll.h>
35
36 #include <pulse/timeval.h>
37 #include <pulse/xmalloc.h>
38
39 #include <pulsecore/core-error.h>
40 #include <pulsecore/module.h>
41 #include <pulsecore/llist.h>
42 #include <pulsecore/sink.h>
43 #include <pulsecore/sink-input.h>
44 #include <pulsecore/memblockq.h>
45 #include <pulsecore/log.h>
46 #include <pulsecore/core-util.h>
47 #include <pulsecore/modargs.h>
48 #include <pulsecore/namereg.h>
49 #include <pulsecore/sample-util.h>
50 #include <pulsecore/macro.h>
51 #include <pulsecore/atomic.h>
52 #include <pulsecore/rtclock.h>
53 #include <pulsecore/atomic.h>
54 #include <pulsecore/time-smoother.h>
55
56 #include "module-rtp-recv-symdef.h"
57
58 #include "rtp.h"
59 #include "sdp.h"
60 #include "sap.h"
61
62 PA_MODULE_AUTHOR("Lennart Poettering");
63 PA_MODULE_DESCRIPTION("Recieve data from a network via RTP/SAP/SDP");
64 PA_MODULE_VERSION(PACKAGE_VERSION);
65 PA_MODULE_LOAD_ONCE(FALSE);
66 PA_MODULE_USAGE(
67 "sink=<name of the sink> "
68 "sap_address=<multicast address to listen on> "
69 );
70
71 #define SAP_PORT 9875
72 #define DEFAULT_SAP_ADDRESS "224.0.0.56"
73 #define MEMBLOCKQ_MAXLENGTH (1024*1024*40)
74 #define MAX_SESSIONS 16
75 #define DEATH_TIMEOUT 20
76 #define RATE_UPDATE_INTERVAL (5*PA_USEC_PER_SEC)
77 #define LATENCY_USEC (500*PA_USEC_PER_MSEC)
78
79 static const char* const valid_modargs[] = {
80 "sink",
81 "sap_address",
82 NULL
83 };
84
85 struct session {
86 struct userdata *userdata;
87 PA_LLIST_FIELDS(struct session);
88
89 pa_sink_input *sink_input;
90 pa_memblockq *memblockq;
91
92 pa_bool_t first_packet;
93 uint32_t ssrc;
94 uint32_t offset;
95
96 struct pa_sdp_info sdp_info;
97
98 pa_rtp_context rtp_context;
99
100 pa_rtpoll_item *rtpoll_item;
101
102 pa_atomic_t timestamp;
103
104 pa_smoother *smoother;
105 pa_usec_t intended_latency;
106 pa_usec_t sink_latency;
107
108 pa_usec_t last_rate_update;
109 };
110
111 struct userdata {
112 pa_module *module;
113
114 pa_sap_context sap_context;
115 pa_io_event* sap_event;
116
117 pa_time_event *check_death_event;
118
119 char *sink_name;
120
121 PA_LLIST_HEAD(struct session, sessions);
122 pa_hashmap *by_origin;
123 int n_sessions;
124 };
125
126 static void session_free(struct session *s);
127
128 /* Called from I/O thread context */
129 static int sink_input_process_msg(pa_msgobject *o, int code, void *data, int64_t offset, pa_memchunk *chunk) {
130 struct session *s = PA_SINK_INPUT(o)->userdata;
131
132 switch (code) {
133 case PA_SINK_INPUT_MESSAGE_GET_LATENCY:
134 *((pa_usec_t*) data) = pa_bytes_to_usec(pa_memblockq_get_length(s->memblockq), &s->sink_input->sample_spec);
135
136 /* Fall through, the default handler will add in the extra
137 * latency added by the resampler */
138 break;
139 }
140
141 return pa_sink_input_process_msg(o, code, data, offset, chunk);
142 }
143
144 /* Called from I/O thread context */
145 static int sink_input_pop_cb(pa_sink_input *i, size_t length, pa_memchunk *chunk) {
146 struct session *s;
147 pa_sink_input_assert_ref(i);
148 pa_assert_se(s = i->userdata);
149
150 if (pa_memblockq_peek(s->memblockq, chunk) < 0)
151 return -1;
152
153 pa_memblockq_drop(s->memblockq, chunk->length);
154
155 return 0;
156 }
157
158 /* Called from I/O thread context */
159 static void sink_input_process_rewind_cb(pa_sink_input *i, size_t nbytes) {
160 struct session *s;
161
162 pa_sink_input_assert_ref(i);
163 pa_assert_se(s = i->userdata);
164
165 pa_memblockq_rewind(s->memblockq, nbytes);
166 }
167
168 /* Called from thread context */
169 static void sink_input_update_max_rewind_cb(pa_sink_input *i, size_t nbytes) {
170 struct session *s;
171
172 pa_sink_input_assert_ref(i);
173 pa_assert_se(s = i->userdata);
174
175 pa_memblockq_set_maxrewind(s->memblockq, nbytes);
176 }
177
178 /* Called from main context */
179 static void sink_input_kill(pa_sink_input* i) {
180 struct session *s;
181 pa_sink_input_assert_ref(i);
182 pa_assert_se(s = i->userdata);
183
184 session_free(s);
185 }
186
187 /* Called from I/O thread context */
188 static int rtpoll_work_cb(pa_rtpoll_item *i) {
189 pa_memchunk chunk;
190 int64_t k, j, delta;
191 struct timeval now;
192 struct session *s;
193 struct pollfd *p;
194
195 pa_assert_se(s = pa_rtpoll_item_get_userdata(i));
196
197 p = pa_rtpoll_item_get_pollfd(i, NULL);
198
199 if (p->revents & (POLLERR|POLLNVAL|POLLHUP|POLLOUT)) {
200 pa_log("poll() signalled bad revents.");
201 return -1;
202 }
203
204 if ((p->revents & POLLIN) == 0)
205 return 0;
206
207 p->revents = 0;
208
209 if (pa_rtp_recv(&s->rtp_context, &chunk, s->userdata->module->core->mempool) < 0)
210 return 0;
211
212 if (s->sdp_info.payload != s->rtp_context.payload) {
213 pa_memblock_unref(chunk.memblock);
214 return 0;
215 }
216
217 if (!s->first_packet) {
218 s->first_packet = TRUE;
219
220 s->ssrc = s->rtp_context.ssrc;
221 s->offset = s->rtp_context.timestamp;
222
223 if (s->ssrc == s->userdata->module->core->cookie)
224 pa_log_warn("Detected RTP packet loop!");
225 } else {
226 if (s->ssrc != s->rtp_context.ssrc) {
227 pa_memblock_unref(chunk.memblock);
228 return 0;
229 }
230 }
231
232 /* Check wheter there was a timestamp overflow */
233 k = (int64_t) s->rtp_context.timestamp - (int64_t) s->offset;
234 j = (int64_t) 0x100000000LL - (int64_t) s->offset + (int64_t) s->rtp_context.timestamp;
235
236 if ((k < 0 ? -k : k) < (j < 0 ? -j : j))
237 delta = k;
238 else
239 delta = j;
240
241 pa_memblockq_seek(s->memblockq, delta * (int64_t) s->rtp_context.frame_size, PA_SEEK_RELATIVE);
242
243 pa_rtclock_get(&now);
244
245 pa_smoother_put(s->smoother, pa_timeval_load(&now), pa_bytes_to_usec((uint64_t) pa_memblockq_get_write_index(s->memblockq), &s->sink_input->sample_spec));
246
247 if (pa_memblockq_push(s->memblockq, &chunk) < 0) {
248 pa_log_warn("Queue overrun");
249 pa_memblockq_seek(s->memblockq, (int64_t) chunk.length, PA_SEEK_RELATIVE);
250 }
251
252 /* pa_log("blocks in q: %u", pa_memblockq_get_nblocks(s->memblockq)); */
253
254 pa_memblock_unref(chunk.memblock);
255
256 /* The next timestamp we expect */
257 s->offset = s->rtp_context.timestamp + (uint32_t) (chunk.length / s->rtp_context.frame_size);
258
259 pa_atomic_store(&s->timestamp, (int) now.tv_sec);
260
261 if (s->last_rate_update + RATE_UPDATE_INTERVAL < pa_timeval_load(&now)) {
262 pa_usec_t wi, ri, render_delay, sink_delay = 0, latency, fix;
263 unsigned fix_samples;
264
265 pa_log("Updating sample rate");
266
267 wi = pa_smoother_get(s->smoother, pa_timeval_load(&now));
268 ri = pa_bytes_to_usec((uint64_t) pa_memblockq_get_read_index(s->memblockq), &s->sink_input->sample_spec);
269
270 if (PA_MSGOBJECT(s->sink_input->sink)->process_msg(PA_MSGOBJECT(s->sink_input->sink), PA_SINK_MESSAGE_GET_LATENCY, &sink_delay, 0, NULL) < 0)
271 sink_delay = 0;
272
273 render_delay = pa_bytes_to_usec(pa_memblockq_get_length(s->sink_input->thread_info.render_memblockq), &s->sink_input->sink->sample_spec);
274
275 if (ri > render_delay+sink_delay)
276 ri -= render_delay+sink_delay;
277 else
278 ri = 0;
279
280 if (wi < ri)
281 latency = 0;
282 else
283 latency = wi - ri;
284
285 pa_log_debug("Write index deviates by %0.2f ms, expected %0.2f ms", (double) latency/PA_USEC_PER_MSEC, (double) s->intended_latency/PA_USEC_PER_MSEC);
286
287 /* Calculate deviation */
288 if (latency < s->intended_latency)
289 fix = s->intended_latency - latency;
290 else
291 fix = latency - s->intended_latency;
292
293 /* How many samples is this per second? */
294 fix_samples = (unsigned) (fix * (pa_usec_t) s->sink_input->thread_info.sample_spec.rate / (pa_usec_t) RATE_UPDATE_INTERVAL);
295
296 /* Check if deviation is in bounds */
297 if (fix_samples > s->sink_input->sample_spec.rate*.20)
298 pa_log_debug("Hmmm, rate fix is too large (%lu Hz), not applying.", (unsigned long) fix_samples);
299
300 /* Fix up rate */
301 if (latency < s->intended_latency)
302 s->sink_input->sample_spec.rate -= fix_samples;
303 else
304 s->sink_input->sample_spec.rate += fix_samples;
305
306 pa_resampler_set_input_rate(s->sink_input->thread_info.resampler, s->sink_input->sample_spec.rate);
307
308 pa_log_debug("Updated sampling rate to %lu Hz.", (unsigned long) s->sink_input->sample_spec.rate);
309
310 s->last_rate_update = pa_timeval_load(&now);
311 }
312
313 if (pa_memblockq_is_readable(s->memblockq) &&
314 s->sink_input->thread_info.underrun_for > 0) {
315 pa_log_debug("Requesting rewind due to end of underrun");
316 pa_sink_input_request_rewind(s->sink_input, 0, FALSE, TRUE, FALSE);
317 }
318
319 return 1;
320 }
321
322 /* Called from I/O thread context */
323 static void sink_input_attach(pa_sink_input *i) {
324 struct session *s;
325 struct pollfd *p;
326
327 pa_sink_input_assert_ref(i);
328 pa_assert_se(s = i->userdata);
329
330 pa_assert(!s->rtpoll_item);
331 s->rtpoll_item = pa_rtpoll_item_new(i->sink->rtpoll, PA_RTPOLL_LATE, 1);
332
333 p = pa_rtpoll_item_get_pollfd(s->rtpoll_item, NULL);
334 p->fd = s->rtp_context.fd;
335 p->events = POLLIN;
336 p->revents = 0;
337
338 pa_rtpoll_item_set_work_callback(s->rtpoll_item, rtpoll_work_cb);
339 pa_rtpoll_item_set_userdata(s->rtpoll_item, s);
340 }
341
342 /* Called from I/O thread context */
343 static void sink_input_detach(pa_sink_input *i) {
344 struct session *s;
345 pa_sink_input_assert_ref(i);
346 pa_assert_se(s = i->userdata);
347
348 pa_assert(s->rtpoll_item);
349 pa_rtpoll_item_free(s->rtpoll_item);
350 s->rtpoll_item = NULL;
351 }
352
353 static int mcast_socket(const struct sockaddr* sa, socklen_t salen) {
354 int af, fd = -1, r, one;
355
356 pa_assert(sa);
357 pa_assert(salen > 0);
358
359 af = sa->sa_family;
360 if ((fd = socket(af, SOCK_DGRAM, 0)) < 0) {
361 pa_log("Failed to create socket: %s", pa_cstrerror(errno));
362 goto fail;
363 }
364
365 one = 1;
366 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) < 0) {
367 pa_log("SO_REUSEADDR failed: %s", pa_cstrerror(errno));
368 goto fail;
369 }
370
371 if (af == AF_INET) {
372 struct ip_mreq mr4;
373 memset(&mr4, 0, sizeof(mr4));
374 mr4.imr_multiaddr = ((const struct sockaddr_in*) sa)->sin_addr;
375 r = setsockopt(fd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mr4, sizeof(mr4));
376 #ifdef HAVE_IPV6
377 } else {
378 struct ipv6_mreq mr6;
379 memset(&mr6, 0, sizeof(mr6));
380 mr6.ipv6mr_multiaddr = ((const struct sockaddr_in6*) sa)->sin6_addr;
381 r = setsockopt(fd, IPPROTO_IPV6, IPV6_JOIN_GROUP, &mr6, sizeof(mr6));
382 #endif
383 }
384
385 if (r < 0) {
386 pa_log_info("Joining mcast group failed: %s", pa_cstrerror(errno));
387 goto fail;
388 }
389
390 if (bind(fd, sa, salen) < 0) {
391 pa_log("bind() failed: %s", pa_cstrerror(errno));
392 goto fail;
393 }
394
395 return fd;
396
397 fail:
398 if (fd >= 0)
399 close(fd);
400
401 return -1;
402 }
403
404 static struct session *session_new(struct userdata *u, const pa_sdp_info *sdp_info) {
405 struct session *s = NULL;
406 pa_sink *sink;
407 int fd = -1;
408 pa_memchunk silence;
409 pa_sink_input_new_data data;
410 struct timeval now;
411
412 pa_assert(u);
413 pa_assert(sdp_info);
414
415 if (u->n_sessions >= MAX_SESSIONS) {
416 pa_log("Session limit reached.");
417 goto fail;
418 }
419
420 if (!(sink = pa_namereg_get(u->module->core, u->sink_name, PA_NAMEREG_SINK))) {
421 pa_log("Sink does not exist.");
422 goto fail;
423 }
424
425 pa_rtclock_get(&now);
426
427 s = pa_xnew0(struct session, 1);
428 s->userdata = u;
429 s->first_packet = FALSE;
430 s->sdp_info = *sdp_info;
431 s->rtpoll_item = NULL;
432 s->intended_latency = LATENCY_USEC;
433 s->smoother = pa_smoother_new(PA_USEC_PER_SEC*5, PA_USEC_PER_SEC*2, TRUE, 10);
434 pa_smoother_set_time_offset(s->smoother, pa_timeval_load(&now));
435 s->last_rate_update = pa_timeval_load(&now);
436 pa_atomic_store(&s->timestamp, (int) now.tv_sec);
437
438 if ((fd = mcast_socket((const struct sockaddr*) &sdp_info->sa, sdp_info->salen)) < 0)
439 goto fail;
440
441 pa_sink_input_new_data_init(&data);
442 data.sink = sink;
443 data.driver = __FILE__;
444 pa_proplist_sets(data.proplist, PA_PROP_MEDIA_ROLE, "stream");
445 pa_proplist_setf(data.proplist, PA_PROP_MEDIA_NAME,
446 "RTP Stream%s%s%s",
447 sdp_info->session_name ? " (" : "",
448 sdp_info->session_name ? sdp_info->session_name : "",
449 sdp_info->session_name ? ")" : "");
450
451 if (sdp_info->session_name)
452 pa_proplist_sets(data.proplist, "rtp.session", sdp_info->session_name);
453 pa_proplist_sets(data.proplist, "rtp.origin", sdp_info->origin);
454 pa_proplist_setf(data.proplist, "rtp.payload", "%u", (unsigned) sdp_info->payload);
455 data.module = u->module;
456 pa_sink_input_new_data_set_sample_spec(&data, &sdp_info->sample_spec);
457
458 pa_sink_input_new(&s->sink_input, u->module->core, &data, PA_SINK_INPUT_VARIABLE_RATE);
459 pa_sink_input_new_data_done(&data);
460
461 if (!s->sink_input) {
462 pa_log("Failed to create sink input.");
463 goto fail;
464 }
465
466 s->sink_input->userdata = s;
467
468 s->sink_input->parent.process_msg = sink_input_process_msg;
469 s->sink_input->pop = sink_input_pop_cb;
470 s->sink_input->process_rewind = sink_input_process_rewind_cb;
471 s->sink_input->update_max_rewind = sink_input_update_max_rewind_cb;
472 s->sink_input->kill = sink_input_kill;
473 s->sink_input->attach = sink_input_attach;
474 s->sink_input->detach = sink_input_detach;
475
476 pa_sink_input_get_silence(s->sink_input, &silence);
477
478 s->sink_latency = pa_sink_input_set_requested_latency(s->sink_input, s->intended_latency/2);
479
480 if (s->intended_latency < s->sink_latency*2)
481 s->intended_latency = s->sink_latency*2;
482
483 s->memblockq = pa_memblockq_new(
484 0,
485 MEMBLOCKQ_MAXLENGTH,
486 MEMBLOCKQ_MAXLENGTH,
487 pa_frame_size(&s->sink_input->sample_spec),
488 pa_usec_to_bytes(s->intended_latency - s->sink_latency, &s->sink_input->sample_spec),
489 0,
490 0,
491 &silence);
492
493 pa_memblock_unref(silence.memblock);
494
495 pa_rtp_context_init_recv(&s->rtp_context, fd, pa_frame_size(&s->sdp_info.sample_spec));
496
497 pa_hashmap_put(s->userdata->by_origin, s->sdp_info.origin, s);
498 u->n_sessions++;
499 PA_LLIST_PREPEND(struct session, s->userdata->sessions, s);
500
501 pa_sink_input_put(s->sink_input);
502
503 pa_log_info("New session '%s'", s->sdp_info.session_name);
504
505 return s;
506
507 fail:
508 pa_xfree(s);
509
510 if (fd >= 0)
511 pa_close(fd);
512
513 return NULL;
514 }
515
516 static void session_free(struct session *s) {
517 pa_assert(s);
518
519 pa_log_info("Freeing session '%s'", s->sdp_info.session_name);
520
521 pa_sink_input_unlink(s->sink_input);
522 pa_sink_input_unref(s->sink_input);
523
524 PA_LLIST_REMOVE(struct session, s->userdata->sessions, s);
525 pa_assert(s->userdata->n_sessions >= 1);
526 s->userdata->n_sessions--;
527 pa_hashmap_remove(s->userdata->by_origin, s->sdp_info.origin);
528
529 pa_memblockq_free(s->memblockq);
530 pa_sdp_info_destroy(&s->sdp_info);
531 pa_rtp_context_destroy(&s->rtp_context);
532
533 pa_smoother_free(s->smoother);
534
535 pa_xfree(s);
536 }
537
538 static void sap_event_cb(pa_mainloop_api *m, pa_io_event *e, int fd, pa_io_event_flags_t flags, void *userdata) {
539 struct userdata *u = userdata;
540 pa_bool_t goodbye = FALSE;
541 pa_sdp_info info;
542 struct session *s;
543
544 pa_assert(m);
545 pa_assert(e);
546 pa_assert(u);
547 pa_assert(fd == u->sap_context.fd);
548 pa_assert(flags == PA_IO_EVENT_INPUT);
549
550 if (pa_sap_recv(&u->sap_context, &goodbye) < 0)
551 return;
552
553 if (!pa_sdp_parse(u->sap_context.sdp_data, &info, goodbye))
554 return;
555
556 if (goodbye) {
557
558 if ((s = pa_hashmap_get(u->by_origin, info.origin)))
559 session_free(s);
560
561 pa_sdp_info_destroy(&info);
562 } else {
563
564 if (!(s = pa_hashmap_get(u->by_origin, info.origin))) {
565 if (!session_new(u, &info))
566 pa_sdp_info_destroy(&info);
567
568 } else {
569 struct timeval now;
570 pa_rtclock_get(&now);
571 pa_atomic_store(&s->timestamp, (int) now.tv_sec);
572
573 pa_sdp_info_destroy(&info);
574 }
575 }
576 }
577
578 static void check_death_event_cb(pa_mainloop_api *m, pa_time_event *t, const struct timeval *ptv, void *userdata) {
579 struct session *s, *n;
580 struct userdata *u = userdata;
581 struct timeval now;
582 struct timeval tv;
583
584 pa_assert(m);
585 pa_assert(t);
586 pa_assert(ptv);
587 pa_assert(u);
588
589 pa_rtclock_get(&now);
590
591 pa_log_debug("Checking for dead streams ...");
592
593 for (s = u->sessions; s; s = n) {
594 int k;
595 n = s->next;
596
597 k = pa_atomic_load(&s->timestamp);
598
599 if (k + DEATH_TIMEOUT < now.tv_sec)
600 session_free(s);
601 }
602
603 /* Restart timer */
604 pa_gettimeofday(&tv);
605 pa_timeval_add(&tv, DEATH_TIMEOUT*PA_USEC_PER_SEC);
606 m->time_restart(t, &tv);
607 }
608
609 int pa__init(pa_module*m) {
610 struct userdata *u;
611 pa_modargs *ma = NULL;
612 struct sockaddr_in sa4;
613 #ifdef HAVE_IPV6
614 struct sockaddr_in6 sa6;
615 #endif
616 struct sockaddr *sa;
617 socklen_t salen;
618 const char *sap_address;
619 int fd = -1;
620 struct timeval tv;
621
622 pa_assert(m);
623
624 if (!(ma = pa_modargs_new(m->argument, valid_modargs))) {
625 pa_log("failed to parse module arguments");
626 goto fail;
627 }
628
629 sap_address = pa_modargs_get_value(ma, "sap_address", DEFAULT_SAP_ADDRESS);
630
631 if (inet_pton(AF_INET, sap_address, &sa4.sin_addr) > 0) {
632 sa4.sin_family = AF_INET;
633 sa4.sin_port = htons(SAP_PORT);
634 sa = (struct sockaddr*) &sa4;
635 salen = sizeof(sa4);
636 #ifdef HAVE_IPV6
637 } else if (inet_pton(AF_INET6, sap_address, &sa6.sin6_addr) > 0) {
638 sa6.sin6_family = AF_INET6;
639 sa6.sin6_port = htons(SAP_PORT);
640 sa = (struct sockaddr*) &sa6;
641 salen = sizeof(sa6);
642 #endif
643 } else {
644 pa_log("Invalid SAP address '%s'", sap_address);
645 goto fail;
646 }
647
648 if ((fd = mcast_socket(sa, salen)) < 0)
649 goto fail;
650
651 u = pa_xnew(struct userdata, 1);
652 m->userdata = u;
653 u->module = m;
654 u->sink_name = pa_xstrdup(pa_modargs_get_value(ma, "sink", NULL));
655
656 u->sap_event = m->core->mainloop->io_new(m->core->mainloop, fd, PA_IO_EVENT_INPUT, sap_event_cb, u);
657 pa_sap_context_init_recv(&u->sap_context, fd);
658
659 PA_LLIST_HEAD_INIT(struct session, u->sessions);
660 u->n_sessions = 0;
661 u->by_origin = pa_hashmap_new(pa_idxset_string_hash_func, pa_idxset_string_compare_func);
662
663 pa_gettimeofday(&tv);
664 pa_timeval_add(&tv, DEATH_TIMEOUT * PA_USEC_PER_SEC);
665 u->check_death_event = m->core->mainloop->time_new(m->core->mainloop, &tv, check_death_event_cb, u);
666
667 pa_modargs_free(ma);
668
669 return 0;
670
671 fail:
672 if (ma)
673 pa_modargs_free(ma);
674
675 if (fd >= 0)
676 pa_close(fd);
677
678 return -1;
679 }
680
681 void pa__done(pa_module*m) {
682 struct userdata *u;
683 struct session *s;
684
685 pa_assert(m);
686
687 if (!(u = m->userdata))
688 return;
689
690 if (u->sap_event)
691 m->core->mainloop->io_free(u->sap_event);
692
693 if (u->check_death_event)
694 m->core->mainloop->time_free(u->check_death_event);
695
696 pa_sap_context_destroy(&u->sap_context);
697
698 if (u->by_origin) {
699 while ((s = pa_hashmap_first(u->by_origin)))
700 session_free(s);
701
702 pa_hashmap_free(u->by_origin, NULL, NULL);
703 }
704
705 pa_xfree(u->sink_name);
706 pa_xfree(u);
707 }