4 This file is part of PulseAudio.
6 PulseAudio is free software; you can redistribute it and/or modify
7 it under the terms of the GNU Lesser General Public License as
8 published by the Free Software Foundation; either version 2.1 of the
9 License, or (at your option) any later version.
11 PulseAudio is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public
17 License along with PulseAudio; if not, write to the Free Software
18 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
38 #include <sys/types.h>
46 #ifdef HAVE_SYS_RESOURCE_H
47 #include <sys/resource.h>
70 #include <samplerate.h>
72 #include <pulse/xmalloc.h>
73 #include <pulse/util.h>
75 #include <pulsecore/core-error.h>
76 #include <pulsecore/winsock.h>
77 #include <pulsecore/log.h>
79 #include "core-util.h"
81 /* Not all platforms have this */
83 #define MSG_NOSIGNAL 0
87 #define PA_USER_RUNTIME_PATH_PREFIX "/tmp/pulse-"
90 #define PA_USER_RUNTIME_PATH_PREFIX "%TEMP%\\pulse-"
96 #define PULSE_ROOTENV "PULSE_ROOT"
98 int pa_set_root(HANDLE handle
) {
99 char library_path
[MAX_PATH
+ sizeof(PULSE_ROOTENV
) + 1], *sep
;
101 strcpy(library_path
, PULSE_ROOTENV
"=");
103 if (!GetModuleFileName(handle
, library_path
+ sizeof(PULSE_ROOTENV
), MAX_PATH
))
106 sep
= strrchr(library_path
, '\\');
110 if (_putenv(library_path
) < 0)
118 /** Make a file descriptor nonblock. Doesn't do any error checking */
119 void pa_make_nonblock_fd(int fd
) {
124 if ((v
= fcntl(fd
, F_GETFL
)) >= 0)
125 if (!(v
& O_NONBLOCK
))
126 fcntl(fd
, F_SETFL
, v
|O_NONBLOCK
);
127 #elif defined(OS_IS_WIN32)
129 if (ioctlsocket(fd
, FIONBIO
, &arg
) < 0) {
130 if (WSAGetLastError() == WSAENOTSOCK
)
131 pa_log_warn(__FILE__
": WARNING: Only sockets can be made non-blocking!");
134 pa_log_warn(__FILE__
": WARNING: Non-blocking I/O not supported.!");
138 /** Creates a directory securely */
139 int pa_make_secure_dir(const char* dir
, mode_t m
, uid_t uid
, gid_t gid
) {
156 if (r
< 0 && errno
!= EEXIST
)
160 chown(dir
, uid
, gid
);
168 if (lstat(dir
, &st
) < 0)
170 if (stat(dir
, &st
) < 0)
175 if (!S_ISDIR(st
.st_mode
) ||
176 (st
.st_uid
!= uid
) ||
177 (st
.st_gid
!= gid
) ||
178 ((st
.st_mode
& 0777) != m
)) {
183 fprintf(stderr
, "FIXME: pa_make_secure_dir()\n");
193 /* Return a newly allocated sting containing the parent directory of the specified file */
194 char *pa_parent_dir(const char *fn
) {
195 char *slash
, *dir
= pa_xstrdup(fn
);
197 if ((slash
= (char*) pa_path_get_filename(dir
)) == dir
) {
206 /* Creates a the parent directory of the specified path securely */
207 int pa_make_secure_parent_dir(const char *fn
, mode_t m
, uid_t uid
, gid_t gid
) {
211 if (!(dir
= pa_parent_dir(fn
)))
214 if (pa_make_secure_dir(dir
, m
, uid
, gid
) < 0)
224 /** Platform independent read function. Necessary since not all
225 * systems treat all file descriptors equal. If type is
226 * non-NULL it is used to cache the type of the fd. This is
227 * useful for making sure that only a single syscall is executed per
228 * function call. The variable pointed to should be initialized to 0
230 ssize_t
pa_read(int fd
, void *buf
, size_t count
, int *type
) {
234 if (!type
|| *type
== 0) {
237 if ((r
= recv(fd
, buf
, count
, 0)) >= 0)
240 if (WSAGetLastError() != WSAENOTSOCK
) {
241 errno
= WSAGetLastError();
251 return read(fd
, buf
, count
);
254 /** Similar to pa_read(), but handles writes */
255 ssize_t
pa_write(int fd
, const void *buf
, size_t count
, int *type
) {
257 if (!type
|| *type
== 0) {
260 if ((r
= send(fd
, buf
, count
, MSG_NOSIGNAL
)) >= 0)
264 if (WSAGetLastError() != WSAENOTSOCK
) {
265 errno
= WSAGetLastError();
269 if (errno
!= ENOTSOCK
)
277 return write(fd
, buf
, count
);
280 /** Calls read() in a loop. Makes sure that as much as 'size' bytes,
281 * unless EOF is reached or an error occured */
282 ssize_t
pa_loop_read(int fd
, void*data
, size_t size
, int *type
) {
298 if ((r
= pa_read(fd
, data
, size
, type
)) < 0)
305 data
= (uint8_t*) data
+ r
;
312 /** Similar to pa_loop_read(), but wraps write() */
313 ssize_t
pa_loop_write(int fd
, const void*data
, size_t size
, int *type
) {
329 if ((r
= pa_write(fd
, data
, size
, type
)) < 0)
336 data
= (const uint8_t*) data
+ r
;
343 /* Print a warning messages in case that the given signal is not
344 * blocked or trapped */
345 void pa_check_signal_is_blocked(int sig
) {
346 #ifdef HAVE_SIGACTION
350 /* If POSIX threads are supported use thread-aware
351 * pthread_sigmask() function, to check if the signal is
352 * blocked. Otherwise fall back to sigprocmask() */
355 if (pthread_sigmask(SIG_SETMASK
, NULL
, &set
) < 0) {
357 if (sigprocmask(SIG_SETMASK
, NULL
, &set
) < 0) {
358 pa_log(__FILE__
": sigprocmask(): %s", pa_cstrerror(errno
));
365 if (sigismember(&set
, sig
))
368 /* Check whether the signal is trapped */
370 if (sigaction(sig
, NULL
, &sa
) < 0) {
371 pa_log(__FILE__
": sigaction(): %s", pa_cstrerror(errno
));
375 if (sa
.sa_handler
!= SIG_DFL
)
378 pa_log(__FILE__
": WARNING: %s is not trapped. This might cause malfunction!", pa_strsignal(sig
));
379 #else /* HAVE_SIGACTION */
380 pa_log(__FILE__
": WARNING: %s might not be trapped. This might cause malfunction!", pa_strsignal(sig
));
384 /* The following function is based on an example from the GNU libc
385 * documentation. This function is similar to GNU's asprintf(). */
386 char *pa_sprintf_malloc(const char *format
, ...) {
396 c
= pa_xrealloc(c
, size
);
398 va_start(ap
, format
);
399 r
= vsnprintf(c
, size
, format
, ap
);
402 if (r
> -1 && r
< size
)
405 if (r
> -1) /* glibc 2.1 */
412 /* Same as the previous function, but use a va_list instead of an
414 char *pa_vsprintf_malloc(const char *format
, va_list ap
) {
426 c
= pa_xrealloc(c
, size
);
427 r
= vsnprintf(c
, size
, format
, aq
);
431 if (r
> -1 && r
< size
)
434 if (r
> -1) /* glibc 2.1 */
441 /* Similar to OpenBSD's strlcpy() function */
442 char *pa_strlcpy(char *b
, const char *s
, size_t l
) {
443 assert(b
&& s
&& l
> 0);
450 #define NICE_LEVEL (-15)
452 /* Raise the priority of the current process as much as possible and
453 sensible: set the nice level to -15 and enable realtime scheduling if
455 void pa_raise_priority(void) {
457 #ifdef HAVE_SYS_RESOURCE_H
458 if (setpriority(PRIO_PROCESS
, 0, NICE_LEVEL
) < 0)
459 pa_log_warn(__FILE__
": setpriority(): %s", pa_cstrerror(errno
));
461 pa_log_info(__FILE__
": Successfully gained nice level %i.", NICE_LEVEL
);
464 #ifdef _POSIX_PRIORITY_SCHEDULING
466 struct sched_param sp
;
468 if (sched_getparam(0, &sp
) < 0) {
469 pa_log(__FILE__
": sched_getparam(): %s", pa_cstrerror(errno
));
473 sp
.sched_priority
= 1;
474 if (sched_setscheduler(0, SCHED_FIFO
, &sp
) < 0) {
475 pa_log_warn(__FILE__
": sched_setscheduler(): %s", pa_cstrerror(errno
));
479 pa_log_info(__FILE__
": Successfully enabled SCHED_FIFO scheduling.");
484 if (!SetPriorityClass(GetCurrentProcess(), HIGH_PRIORITY_CLASS
))
485 pa_log_warn(__FILE__
": SetPriorityClass() failed: 0x%08X", GetLastError());
487 pa_log_info(__FILE__
": Successfully gained high priority class.");
491 /* Reset the priority to normal, inverting the changes made by pa_raise_priority() */
492 void pa_reset_priority(void) {
494 SetPriorityClass(GetCurrentProcess(), NORMAL_PRIORITY_CLASS
);
497 #ifdef _POSIX_PRIORITY_SCHEDULING
499 struct sched_param sp
;
500 sched_getparam(0, &sp
);
501 sp
.sched_priority
= 0;
502 sched_setscheduler(0, SCHED_OTHER
, &sp
);
506 #ifdef HAVE_SYS_RESOURCE_H
507 setpriority(PRIO_PROCESS
, 0, 0);
511 /* Set the FD_CLOEXEC flag for a fd */
512 int pa_fd_set_cloexec(int fd
, int b
) {
518 if ((v
= fcntl(fd
, F_GETFD
, 0)) < 0)
521 v
= (v
& ~FD_CLOEXEC
) | (b
? FD_CLOEXEC
: 0);
523 if (fcntl(fd
, F_SETFD
, v
) < 0)
530 /* Try to parse a boolean string value.*/
531 int pa_parse_boolean(const char *v
) {
533 if (!strcmp(v
, "1") || v
[0] == 'y' || v
[0] == 'Y' || v
[0] == 't' || v
[0] == 'T' || !strcasecmp(v
, "on"))
535 else if (!strcmp(v
, "0") || v
[0] == 'n' || v
[0] == 'N' || v
[0] == 'f' || v
[0] == 'F' || !strcasecmp(v
, "off"))
541 /* Split the specified string wherever one of the strings in delimiter
542 * occurs. Each time it is called returns a newly allocated string
543 * with pa_xmalloc(). The variable state points to, should be
544 * initiallized to NULL before the first call. */
545 char *pa_split(const char *c
, const char *delimiter
, const char**state
) {
546 const char *current
= *state
? *state
: c
;
552 l
= strcspn(current
, delimiter
);
558 return pa_xstrndup(current
, l
);
561 /* What is interpreted as whitespace? */
562 #define WHITESPACE " \t\n"
564 /* Split a string into words. Otherwise similar to pa_split(). */
565 char *pa_split_spaces(const char *c
, const char **state
) {
566 const char *current
= *state
? *state
: c
;
569 if (!*current
|| *c
== 0)
572 current
+= strspn(current
, WHITESPACE
);
573 l
= strcspn(current
, WHITESPACE
);
577 return pa_xstrndup(current
, l
);
580 /* Return the name of an UNIX signal. Similar to GNU's strsignal() */
581 const char *pa_strsignal(int sig
) {
583 case SIGINT
: return "SIGINT";
584 case SIGTERM
: return "SIGTERM";
586 case SIGUSR1
: return "SIGUSR1";
589 case SIGUSR2
: return "SIGUSR2";
592 case SIGXCPU
: return "SIGXCPU";
595 case SIGPIPE
: return "SIGPIPE";
598 case SIGCHLD
: return "SIGCHLD";
601 case SIGHUP
: return "SIGHUP";
603 default: return "UNKNOWN SIGNAL";
609 /* Check whether the specified GID and the group name match */
610 static int is_group(gid_t gid
, const char *name
) {
611 struct group group
, *result
= NULL
;
616 #ifdef HAVE_GETGRGID_R
617 #ifdef _SC_GETGR_R_SIZE_MAX
618 n
= sysconf(_SC_GETGR_R_SIZE_MAX
);
623 data
= pa_xmalloc(n
);
625 if (getgrgid_r(gid
, &group
, data
, n
, &result
) < 0 || !result
) {
626 pa_log(__FILE__
": getgrgid_r(%u): %s", (unsigned)gid
, pa_cstrerror(errno
));
630 r
= strcmp(name
, result
->gr_name
) == 0;
635 /* XXX Not thread-safe, but needed on OSes (e.g. FreeBSD 4.X) that do not
636 * support getgrgid_r. */
637 if ((result
= getgrgid(gid
)) == NULL
) {
638 pa_log(__FILE__
": getgrgid(%u): %s", gid
, pa_cstrerror(errno
));
642 r
= strcmp(name
, result
->gr_name
) == 0;
650 /* Check the current user is member of the specified group */
651 int pa_own_uid_in_group(const char *name
, gid_t
*gid
) {
652 GETGROUPS_T
*gids
, tgid
;
653 int n
= sysconf(_SC_NGROUPS_MAX
);
658 gids
= pa_xmalloc(sizeof(GETGROUPS_T
)*n
);
660 if ((n
= getgroups(n
, gids
)) < 0) {
661 pa_log(__FILE__
": getgroups(): %s", pa_cstrerror(errno
));
665 for (i
= 0; i
< n
; i
++) {
666 if (is_group(gids
[i
], name
) > 0) {
673 if (is_group(tgid
= getgid(), name
) > 0) {
687 /* Check whether the specifc user id is a member of the specified group */
688 int pa_uid_in_group(uid_t uid
, const char *name
) {
691 struct group grbuf
, *gr
;
695 g_n
= sysconf(_SC_GETGR_R_SIZE_MAX
);
696 g_buf
= pa_xmalloc(g_n
);
698 p_n
= sysconf(_SC_GETPW_R_SIZE_MAX
);
699 p_buf
= pa_xmalloc(p_n
);
701 if (getgrnam_r(name
, &grbuf
, g_buf
, (size_t) g_n
, &gr
) != 0 || !gr
)
705 for (i
= gr
->gr_mem
; *i
; i
++) {
706 struct passwd pwbuf
, *pw
;
708 if (getpwnam_r(*i
, &pwbuf
, p_buf
, (size_t) p_n
, &pw
) != 0 || !pw
)
711 if (pw
->pw_uid
== uid
) {
724 /* Get the GID of a gfiven group, return (gid_t) -1 on failure. */
725 gid_t
pa_get_gid_of_group(const char *name
) {
726 gid_t ret
= (gid_t
) -1;
729 struct group grbuf
, *gr
;
731 g_n
= sysconf(_SC_GETGR_R_SIZE_MAX
);
732 g_buf
= pa_xmalloc(g_n
);
734 if (getgrnam_r(name
, &grbuf
, g_buf
, (size_t) g_n
, &gr
) != 0 || !gr
)
744 #else /* HAVE_GRP_H */
746 int pa_own_uid_in_group(const char *name
, gid_t
*gid
) {
751 int pa_uid_in_group(uid_t uid
, const char *name
) {
757 /* Lock or unlock a file entirely.
758 (advisory on UNIX, mandatory on Windows) */
759 int pa_lock_fd(int fd
, int b
) {
763 /* Try a R/W lock first */
765 flock
.l_type
= b
? F_WRLCK
: F_UNLCK
;
766 flock
.l_whence
= SEEK_SET
;
770 if (fcntl(fd
, F_SETLKW
, &flock
) >= 0)
773 /* Perhaps the file descriptor qas opened for read only, than try again with a read lock. */
774 if (b
&& errno
== EBADF
) {
775 flock
.l_type
= F_RDLCK
;
776 if (fcntl(fd
, F_SETLKW
, &flock
) >= 0)
780 pa_log(__FILE__
": %slock: %s", !b
? "un" : "",
781 pa_cstrerror(errno
));
785 HANDLE h
= (HANDLE
)_get_osfhandle(fd
);
787 if (b
&& LockFile(h
, 0, 0, 0xFFFFFFFF, 0xFFFFFFFF))
789 if (!b
&& UnlockFile(h
, 0, 0, 0xFFFFFFFF, 0xFFFFFFFF))
792 pa_log(__FILE__
": %slock failed: 0x%08X", !b
? "un" : "", GetLastError());
798 /* Remove trailing newlines from a string */
799 char* pa_strip_nl(char *s
) {
802 s
[strcspn(s
, "\r\n")] = 0;
806 /* Create a temporary lock file and lock it. */
807 int pa_lock_lockfile(const char *fn
) {
814 if ((fd
= open(fn
, O_CREAT
|O_RDWR
, S_IRUSR
|S_IWUSR
)) < 0) {
815 pa_log(__FILE__
": failed to create lock file '%s': %s", fn
,
816 pa_cstrerror(errno
));
820 if (pa_lock_fd(fd
, 1) < 0) {
821 pa_log(__FILE__
": failed to lock file '%s'.", fn
);
825 if (fstat(fd
, &st
) < 0) {
826 pa_log(__FILE__
": failed to fstat() file '%s'.", fn
);
830 /* Check wheter the file has been removed meanwhile. When yes, restart this loop, otherwise, we're done */
831 if (st
.st_nlink
>= 1)
834 if (pa_lock_fd(fd
, 0) < 0) {
835 pa_log(__FILE__
": failed to unlock file '%s'.", fn
);
840 pa_log(__FILE__
": failed to close file '%s'.", fn
);
857 /* Unlock a temporary lcok file */
858 int pa_unlock_lockfile(const char *fn
, int fd
) {
860 assert(fn
&& fd
>= 0);
862 if (unlink(fn
) < 0) {
863 pa_log_warn(__FILE__
": WARNING: unable to remove lock file '%s': %s",
864 fn
, pa_cstrerror(errno
));
868 if (pa_lock_fd(fd
, 0) < 0) {
869 pa_log_warn(__FILE__
": WARNING: failed to unlock file '%s'.", fn
);
874 pa_log_warn(__FILE__
": WARNING: failed to close lock file '%s': %s",
875 fn
, pa_cstrerror(errno
));
882 /* Try to open a configuration file. If "env" is specified, open the
883 * value of the specified environment variable. Otherwise look for a
884 * file "local" in the home directory or a file "global" in global
885 * file system. If "result" is non-NULL, a pointer to a newly
886 * allocated buffer containing the used configuration file is
888 FILE *pa_open_config_file(const char *global
, const char *local
, const char *env
, char **result
, const char *mode
) {
895 if (!getenv(PULSE_ROOTENV
))
899 if (env
&& (fn
= getenv(env
))) {
901 if (!ExpandEnvironmentStrings(fn
, buf
, PATH_MAX
))
907 *result
= pa_xstrdup(fn
);
909 return fopen(fn
, mode
);
912 if (local
&& pa_get_home_dir(h
, sizeof(h
))) {
916 fn
= lfn
= pa_sprintf_malloc("%s/%s", h
, local
);
919 if (!ExpandEnvironmentStrings(lfn
, buf
, PATH_MAX
))
926 if (f
|| errno
!= ENOENT
) {
928 *result
= pa_xstrdup(fn
);
944 if (!ExpandEnvironmentStrings(global
, buf
, PATH_MAX
))
950 *result
= pa_xstrdup(global
);
952 return fopen(global
, mode
);
955 /* Format the specified data as a hexademical string */
956 char *pa_hexstr(const uint8_t* d
, size_t dlength
, char *s
, size_t slength
) {
958 const char hex
[] = "0123456789abcdef";
959 assert(d
&& s
&& slength
> 0);
961 while (i
< dlength
&& j
+3 <= slength
) {
962 s
[j
++] = hex
[*d
>> 4];
963 s
[j
++] = hex
[*d
& 0xF];
969 s
[j
< slength
? j
: slength
] = 0;
973 /* Convert a hexadecimal digit to a number or -1 if invalid */
974 static int hexc(char c
) {
975 if (c
>= '0' && c
<= '9')
978 if (c
>= 'A' && c
<= 'F')
981 if (c
>= 'a' && c
<= 'f')
987 /* Parse a hexadecimal string as created by pa_hexstr() to a BLOB */
988 size_t pa_parsehex(const char *p
, uint8_t *d
, size_t dlength
) {
992 while (j
< dlength
&& *p
) {
995 if ((b
= hexc(*(p
++))) < 0)
998 d
[j
] = (uint8_t) (b
<< 4);
1003 if ((b
= hexc(*(p
++))) < 0)
1006 d
[j
] |= (uint8_t) b
;
1013 /* Returns nonzero when *s starts with *pfx */
1014 int pa_startswith(const char *s
, const char *pfx
) {
1022 return strlen(s
) >= l
&& strncmp(s
, pfx
, l
) == 0;
1025 /* Returns nonzero when *s ends with *sfx */
1026 int pa_endswith(const char *s
, const char *sfx
) {
1035 return l1
>= l2
&& strcmp(s
+l1
-l2
, sfx
) == 0;
1038 /* if fn is null return the PulseAudio run time path in s (/tmp/pulse)
1039 * if fn is non-null and starts with / return fn in s
1040 * otherwise append fn to the run time path and return it in s */
1041 char *pa_runtime_path(const char *fn
, char *s
, size_t l
) {
1045 if (fn
&& *fn
== '/')
1047 if (fn
&& strlen(fn
) >= 3 && isalpha(fn
[0]) && fn
[1] == ':' && fn
[2] == '\\')
1049 return pa_strlcpy(s
, fn
, l
);
1051 if ((e
= getenv("PULSE_RUNTIME_PATH"))) {
1054 snprintf(s
, l
, "%s%c%s", e
, PATH_SEP
, fn
);
1056 snprintf(s
, l
, "%s", e
);
1062 snprintf(s
, l
, "%s%s%c%s", PA_USER_RUNTIME_PATH_PREFIX
, pa_get_user_name(u
, sizeof(u
)), PATH_SEP
, fn
);
1064 snprintf(s
, l
, "%s%s", PA_USER_RUNTIME_PATH_PREFIX
, pa_get_user_name(u
, sizeof(u
)));
1072 ExpandEnvironmentStrings(buf
, s
, l
);
1079 /* Convert the string s to a signed integer in *ret_i */
1080 int pa_atoi(const char *s
, int32_t *ret_i
) {
1085 l
= strtol(s
, &x
, 0);
1090 *ret_i
= (int32_t) l
;
1095 /* Convert the string s to an unsigned integer in *ret_u */
1096 int pa_atou(const char *s
, uint32_t *ret_u
) {
1101 l
= strtoul(s
, &x
, 0);
1106 *ret_u
= (uint32_t) l
;