]> code.delx.au - pulseaudio/blob - src/daemon/main.c
c18524ffb1c71b2f5c19b17c5e4e5b8adfd16249
[pulseaudio] / src / daemon / main.c
1 /***
2 This file is part of PulseAudio.
3
4 Copyright 2004-2006 Lennart Poettering
5 Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB
6
7 PulseAudio is free software; you can redistribute it and/or modify
8 it under the terms of the GNU Lesser General Public License as published
9 by the Free Software Foundation; either version 2.1 of the License,
10 or (at your option) any later version.
11
12 PulseAudio is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 General Public License for more details.
16
17 You should have received a copy of the GNU Lesser General Public License
18 along with PulseAudio; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
20 USA.
21 ***/
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include <unistd.h>
28 #include <errno.h>
29 #include <string.h>
30 #include <stdlib.h>
31 #include <stdio.h>
32 #include <signal.h>
33 #include <stddef.h>
34 #include <ltdl.h>
35 #include <limits.h>
36 #include <unistd.h>
37 #include <locale.h>
38 #include <sys/types.h>
39 #include <sys/stat.h>
40
41 #ifdef HAVE_SYS_MMAN_H
42 #include <sys/mman.h>
43 #endif
44
45 #ifdef HAVE_PWD_H
46 #include <pwd.h>
47 #endif
48 #ifdef HAVE_GRP_H
49 #include <grp.h>
50 #endif
51
52 #ifdef HAVE_LIBWRAP
53 #include <syslog.h>
54 #include <tcpd.h>
55 #endif
56
57 #ifdef HAVE_DBUS
58 #include <dbus/dbus.h>
59 #endif
60
61 #include <pulse/client-conf.h>
62 #ifdef HAVE_X11
63 #include <pulse/client-conf-x11.h>
64 #endif
65 #include <pulse/mainloop.h>
66 #include <pulse/mainloop-signal.h>
67 #include <pulse/timeval.h>
68 #include <pulse/xmalloc.h>
69
70 #include <pulsecore/i18n.h>
71 #include <pulsecore/lock-autospawn.h>
72 #include <pulsecore/socket.h>
73 #include <pulsecore/core-error.h>
74 #include <pulsecore/core-rtclock.h>
75 #include <pulsecore/core-scache.h>
76 #include <pulsecore/core.h>
77 #include <pulsecore/module.h>
78 #include <pulsecore/cli-command.h>
79 #include <pulsecore/log.h>
80 #include <pulsecore/core-util.h>
81 #include <pulsecore/sioman.h>
82 #include <pulsecore/cli-text.h>
83 #include <pulsecore/pid.h>
84 #include <pulsecore/random.h>
85 #include <pulsecore/macro.h>
86 #include <pulsecore/shm.h>
87 #include <pulsecore/memtrap.h>
88 #include <pulsecore/strlist.h>
89 #ifdef HAVE_DBUS
90 #include <pulsecore/dbus-shared.h>
91 #endif
92 #include <pulsecore/cpu-arm.h>
93 #include <pulsecore/cpu-x86.h>
94 #include <pulsecore/cpu-orc.h>
95
96 #include "cmdline.h"
97 #include "cpulimit.h"
98 #include "daemon-conf.h"
99 #include "dumpmodules.h"
100 #include "caps.h"
101 #include "ltdl-bind-now.h"
102 #include "server-lookup.h"
103
104 #ifdef HAVE_LIBWRAP
105 /* Only one instance of these variables */
106 int allow_severity = LOG_INFO;
107 int deny_severity = LOG_WARNING;
108 #endif
109
110 #ifdef HAVE_OSS_WRAPPER
111 /* padsp looks for this symbol in the running process and disables
112 * itself if it finds it and it is set to 7 (which is actually a bit
113 * mask). For details see padsp. */
114 int __padsp_disabled__ = 7;
115 #endif
116
117 #ifdef OS_IS_WIN32
118
119 static void message_cb(pa_mainloop_api*a, pa_time_event*e, const struct timeval *tv, void *userdata) {
120 MSG msg;
121 struct timeval tvnext;
122
123 while (PeekMessage(&msg, NULL, 0, 0, PM_REMOVE)) {
124 if (msg.message == WM_QUIT)
125 raise(SIGTERM);
126 else {
127 TranslateMessage(&msg);
128 DispatchMessage(&msg);
129 }
130 }
131
132 pa_timeval_add(pa_gettimeofday(&tvnext), 100000);
133 a->time_restart(e, &tvnext);
134 }
135
136 #endif
137
138 static void signal_callback(pa_mainloop_api*m, pa_signal_event *e, int sig, void *userdata) {
139 pa_log_info(_("Got signal %s."), pa_sig2str(sig));
140
141 switch (sig) {
142 #ifdef SIGUSR1
143 case SIGUSR1:
144 pa_module_load(userdata, "module-cli", NULL);
145 break;
146 #endif
147
148 #ifdef SIGUSR2
149 case SIGUSR2:
150 pa_module_load(userdata, "module-cli-protocol-unix", NULL);
151 break;
152 #endif
153
154 #ifdef SIGHUP
155 case SIGHUP: {
156 char *c = pa_full_status_string(userdata);
157 pa_log_notice("%s", c);
158 pa_xfree(c);
159 return;
160 }
161 #endif
162
163 case SIGINT:
164 case SIGTERM:
165 default:
166 pa_log_info(_("Exiting."));
167 m->quit(m, 1);
168 break;
169 }
170 }
171
172 #if defined(HAVE_PWD_H) && defined(HAVE_GRP_H)
173
174 static int change_user(void) {
175 struct passwd *pw;
176 struct group * gr;
177 int r;
178
179 /* This function is called only in system-wide mode. It creates a
180 * runtime dir in /var/run/ with proper UID/GID and drops privs
181 * afterwards. */
182
183 if (!(pw = getpwnam(PA_SYSTEM_USER))) {
184 pa_log(_("Failed to find user '%s'."), PA_SYSTEM_USER);
185 return -1;
186 }
187
188 if (!(gr = getgrnam(PA_SYSTEM_GROUP))) {
189 pa_log(_("Failed to find group '%s'."), PA_SYSTEM_GROUP);
190 return -1;
191 }
192
193 pa_log_info(_("Found user '%s' (UID %lu) and group '%s' (GID %lu)."),
194 PA_SYSTEM_USER, (unsigned long) pw->pw_uid,
195 PA_SYSTEM_GROUP, (unsigned long) gr->gr_gid);
196
197 if (pw->pw_gid != gr->gr_gid) {
198 pa_log(_("GID of user '%s' and of group '%s' don't match."), PA_SYSTEM_USER, PA_SYSTEM_GROUP);
199 return -1;
200 }
201
202 if (!pa_streq(pw->pw_dir, PA_SYSTEM_RUNTIME_PATH))
203 pa_log_warn(_("Home directory of user '%s' is not '%s', ignoring."), PA_SYSTEM_USER, PA_SYSTEM_RUNTIME_PATH);
204
205 if (pa_make_secure_dir(PA_SYSTEM_RUNTIME_PATH, 0755, pw->pw_uid, gr->gr_gid, TRUE) < 0) {
206 pa_log(_("Failed to create '%s': %s"), PA_SYSTEM_RUNTIME_PATH, pa_cstrerror(errno));
207 return -1;
208 }
209
210 if (pa_make_secure_dir(PA_SYSTEM_STATE_PATH, 0700, pw->pw_uid, gr->gr_gid, TRUE) < 0) {
211 pa_log(_("Failed to create '%s': %s"), PA_SYSTEM_STATE_PATH, pa_cstrerror(errno));
212 return -1;
213 }
214
215 /* We don't create the config dir here, because we don't need to write to it */
216
217 if (initgroups(PA_SYSTEM_USER, gr->gr_gid) != 0) {
218 pa_log(_("Failed to change group list: %s"), pa_cstrerror(errno));
219 return -1;
220 }
221
222 #if defined(HAVE_SETRESGID)
223 r = setresgid(gr->gr_gid, gr->gr_gid, gr->gr_gid);
224 #elif defined(HAVE_SETEGID)
225 if ((r = setgid(gr->gr_gid)) >= 0)
226 r = setegid(gr->gr_gid);
227 #elif defined(HAVE_SETREGID)
228 r = setregid(gr->gr_gid, gr->gr_gid);
229 #else
230 #error "No API to drop privileges"
231 #endif
232
233 if (r < 0) {
234 pa_log(_("Failed to change GID: %s"), pa_cstrerror(errno));
235 return -1;
236 }
237
238 #if defined(HAVE_SETRESUID)
239 r = setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid);
240 #elif defined(HAVE_SETEUID)
241 if ((r = setuid(pw->pw_uid)) >= 0)
242 r = seteuid(pw->pw_uid);
243 #elif defined(HAVE_SETREUID)
244 r = setreuid(pw->pw_uid, pw->pw_uid);
245 #else
246 #error "No API to drop privileges"
247 #endif
248
249 if (r < 0) {
250 pa_log(_("Failed to change UID: %s"), pa_cstrerror(errno));
251 return -1;
252 }
253
254 pa_drop_caps();
255
256 pa_set_env("USER", PA_SYSTEM_USER);
257 pa_set_env("USERNAME", PA_SYSTEM_USER);
258 pa_set_env("LOGNAME", PA_SYSTEM_USER);
259 pa_set_env("HOME", PA_SYSTEM_RUNTIME_PATH);
260
261 /* Relevant for pa_runtime_path() */
262 if (!getenv("PULSE_RUNTIME_PATH"))
263 pa_set_env("PULSE_RUNTIME_PATH", PA_SYSTEM_RUNTIME_PATH);
264
265 if (!getenv("PULSE_CONFIG_PATH"))
266 pa_set_env("PULSE_CONFIG_PATH", PA_SYSTEM_CONFIG_PATH);
267
268 if (!getenv("PULSE_STATE_PATH"))
269 pa_set_env("PULSE_STATE_PATH", PA_SYSTEM_STATE_PATH);
270
271 pa_log_info(_("Successfully changed user to \"" PA_SYSTEM_USER "\"."));
272
273 return 0;
274 }
275
276 #else /* HAVE_PWD_H && HAVE_GRP_H */
277
278 static int change_user(void) {
279 pa_log(_("System wide mode unsupported on this platform."));
280 return -1;
281 }
282
283 #endif /* HAVE_PWD_H && HAVE_GRP_H */
284
285 #ifdef HAVE_SYS_RESOURCE_H
286
287 static int set_one_rlimit(const pa_rlimit *r, int resource, const char *name) {
288 struct rlimit rl;
289 pa_assert(r);
290
291 if (!r->is_set)
292 return 0;
293
294 rl.rlim_cur = rl.rlim_max = r->value;
295
296 if (setrlimit(resource, &rl) < 0) {
297 pa_log_info(_("setrlimit(%s, (%u, %u)) failed: %s"), name, (unsigned) r->value, (unsigned) r->value, pa_cstrerror(errno));
298 return -1;
299 }
300
301 return 0;
302 }
303
304 static void set_all_rlimits(const pa_daemon_conf *conf) {
305 set_one_rlimit(&conf->rlimit_fsize, RLIMIT_FSIZE, "RLIMIT_FSIZE");
306 set_one_rlimit(&conf->rlimit_data, RLIMIT_DATA, "RLIMIT_DATA");
307 set_one_rlimit(&conf->rlimit_stack, RLIMIT_STACK, "RLIMIT_STACK");
308 set_one_rlimit(&conf->rlimit_core, RLIMIT_CORE, "RLIMIT_CORE");
309 #ifdef RLIMIT_RSS
310 set_one_rlimit(&conf->rlimit_rss, RLIMIT_RSS, "RLIMIT_RSS");
311 #endif
312 #ifdef RLIMIT_NPROC
313 set_one_rlimit(&conf->rlimit_nproc, RLIMIT_NPROC, "RLIMIT_NPROC");
314 #endif
315 #ifdef RLIMIT_NOFILE
316 set_one_rlimit(&conf->rlimit_nofile, RLIMIT_NOFILE, "RLIMIT_NOFILE");
317 #endif
318 #ifdef RLIMIT_MEMLOCK
319 set_one_rlimit(&conf->rlimit_memlock, RLIMIT_MEMLOCK, "RLIMIT_MEMLOCK");
320 #endif
321 #ifdef RLIMIT_AS
322 set_one_rlimit(&conf->rlimit_as, RLIMIT_AS, "RLIMIT_AS");
323 #endif
324 #ifdef RLIMIT_LOCKS
325 set_one_rlimit(&conf->rlimit_locks, RLIMIT_LOCKS, "RLIMIT_LOCKS");
326 #endif
327 #ifdef RLIMIT_SIGPENDING
328 set_one_rlimit(&conf->rlimit_sigpending, RLIMIT_SIGPENDING, "RLIMIT_SIGPENDING");
329 #endif
330 #ifdef RLIMIT_MSGQUEUE
331 set_one_rlimit(&conf->rlimit_msgqueue, RLIMIT_MSGQUEUE, "RLIMIT_MSGQUEUE");
332 #endif
333 #ifdef RLIMIT_NICE
334 set_one_rlimit(&conf->rlimit_nice, RLIMIT_NICE, "RLIMIT_NICE");
335 #endif
336 #ifdef RLIMIT_RTPRIO
337 set_one_rlimit(&conf->rlimit_rtprio, RLIMIT_RTPRIO, "RLIMIT_RTPRIO");
338 #endif
339 #ifdef RLIMIT_RTTIME
340 set_one_rlimit(&conf->rlimit_rttime, RLIMIT_RTTIME, "RLIMIT_RTTIME");
341 #endif
342 }
343 #endif
344
345 static char *check_configured_address(void) {
346 char *default_server = NULL;
347 pa_client_conf *c = pa_client_conf_new();
348
349 pa_client_conf_load(c, NULL);
350 #ifdef HAVE_X11
351 pa_client_conf_from_x11(c, NULL);
352 #endif
353 pa_client_conf_env(c);
354
355 if (c->default_server && *c->default_server)
356 default_server = pa_xstrdup(c->default_server);
357
358 pa_client_conf_free(c);
359
360 return default_server;
361 }
362
363 #ifdef HAVE_DBUS
364 static pa_dbus_connection *register_dbus_name(pa_core *c, DBusBusType bus, const char* name) {
365 DBusError error;
366 pa_dbus_connection *conn;
367
368 dbus_error_init(&error);
369
370 if (!(conn = pa_dbus_bus_get(c, bus, &error)) || dbus_error_is_set(&error)) {
371 pa_log_warn("Unable to contact D-Bus: %s: %s", error.name, error.message);
372 goto fail;
373 }
374
375 if (dbus_bus_request_name(pa_dbus_connection_get(conn), name, DBUS_NAME_FLAG_DO_NOT_QUEUE, &error) == DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER) {
376 pa_log_debug("Got %s!", name);
377 return conn;
378 }
379
380 if (dbus_error_is_set(&error))
381 pa_log_error("Failed to acquire %s: %s: %s", name, error.name, error.message);
382 else
383 pa_log_error("D-Bus name %s already taken.", name);
384
385 /* PA cannot be started twice by the same user and hence we can
386 * ignore mostly the case that a name is already taken. */
387
388 fail:
389 if (conn)
390 pa_dbus_connection_unref(conn);
391
392 dbus_error_free(&error);
393 return NULL;
394 }
395 #endif
396
397 int main(int argc, char *argv[]) {
398 pa_core *c = NULL;
399 pa_strbuf *buf = NULL;
400 pa_daemon_conf *conf = NULL;
401 pa_mainloop *mainloop = NULL;
402 char *s;
403 char *configured_address;
404 int r = 0, retval = 1, d = 0;
405 pa_bool_t valid_pid_file = FALSE;
406 pa_bool_t ltdl_init = FALSE;
407 int passed_fd = -1;
408 const char *e;
409 #ifdef HAVE_FORK
410 int daemon_pipe[2] = { -1, -1 };
411 int daemon_pipe2[2] = { -1, -1 };
412 #endif
413 #ifdef OS_IS_WIN32
414 pa_time_event *win32_timer;
415 struct timeval win32_tv;
416 #endif
417 int autospawn_fd = -1;
418 pa_bool_t autospawn_locked = FALSE;
419 #ifdef HAVE_DBUS
420 pa_dbusobj_server_lookup *server_lookup = NULL; /* /org/pulseaudio/server_lookup */
421 pa_dbus_connection *lookup_service_bus = NULL; /* Always the user bus. */
422 pa_dbus_connection *server_bus = NULL; /* The bus where we reserve org.pulseaudio.Server, either the user or the system bus. */
423 pa_bool_t start_server;
424 #endif
425
426 pa_log_set_ident("pulseaudio");
427 pa_log_set_level(PA_LOG_NOTICE);
428 pa_log_set_flags(PA_LOG_COLORS|PA_LOG_PRINT_FILE|PA_LOG_PRINT_LEVEL, PA_LOG_RESET);
429
430 #if defined(__linux__) && defined(__OPTIMIZE__)
431 /*
432 Disable lazy relocations to make usage of external libraries
433 more deterministic for our RT threads. We abuse __OPTIMIZE__ as
434 a check whether we are a debug build or not. This all is
435 admittedly a bit snake-oilish.
436 */
437
438 if (!getenv("LD_BIND_NOW")) {
439 char *rp;
440 char *canonical_rp;
441
442 /* We have to execute ourselves, because the libc caches the
443 * value of $LD_BIND_NOW on initialization. */
444
445 pa_set_env("LD_BIND_NOW", "1");
446
447 if ((canonical_rp = pa_realpath(PA_BINARY))) {
448
449 if ((rp = pa_readlink("/proc/self/exe"))) {
450
451 if (pa_streq(rp, canonical_rp))
452 pa_assert_se(execv(rp, argv) == 0);
453 else
454 pa_log_warn("/proc/self/exe does not point to %s, cannot self execute. Are you playing games?", canonical_rp);
455
456 pa_xfree(rp);
457
458 } else
459 pa_log_warn("Couldn't read /proc/self/exe, cannot self execute. Running in a chroot()?");
460
461 pa_xfree(canonical_rp);
462
463 } else
464 pa_log_warn("Couldn't canonicalize binary path, cannot self execute.");
465 }
466 #endif
467
468 if ((e = getenv("PULSE_PASSED_FD"))) {
469 passed_fd = atoi(e);
470
471 if (passed_fd <= 2)
472 passed_fd = -1;
473 }
474
475 /* We might be autospawned, in which case have no idea in which
476 * context we have been started. Let's cleanup our execution
477 * context as good as possible */
478
479 pa_reset_personality();
480 pa_drop_root();
481 pa_close_all(passed_fd, -1);
482 pa_reset_sigs(-1);
483 pa_unblock_sigs(-1);
484 pa_reset_priority();
485
486 setlocale(LC_ALL, "");
487 pa_init_i18n();
488
489 conf = pa_daemon_conf_new();
490
491 if (pa_daemon_conf_load(conf, NULL) < 0)
492 goto finish;
493
494 if (pa_daemon_conf_env(conf) < 0)
495 goto finish;
496
497 if (pa_cmdline_parse(conf, argc, argv, &d) < 0) {
498 pa_log(_("Failed to parse command line."));
499 goto finish;
500 }
501
502 pa_log_set_level(conf->log_level);
503 pa_log_set_target(conf->auto_log_target ? PA_LOG_STDERR : conf->log_target);
504 if (conf->log_meta)
505 pa_log_set_flags(PA_LOG_PRINT_META, PA_LOG_SET);
506 if (conf->log_time)
507 pa_log_set_flags(PA_LOG_PRINT_TIME, PA_LOG_SET);
508 pa_log_set_show_backtrace(conf->log_backtrace);
509
510 #ifdef HAVE_DBUS
511 /* conf->system_instance and conf->local_server_type control almost the
512 * same thing; make them agree about what is requested. */
513 switch (conf->local_server_type) {
514 case PA_SERVER_TYPE_UNSET:
515 conf->local_server_type = conf->system_instance ? PA_SERVER_TYPE_SYSTEM : PA_SERVER_TYPE_USER;
516 break;
517 case PA_SERVER_TYPE_USER:
518 case PA_SERVER_TYPE_NONE:
519 conf->system_instance = FALSE;
520 break;
521 case PA_SERVER_TYPE_SYSTEM:
522 conf->system_instance = TRUE;
523 break;
524 default:
525 pa_assert_not_reached();
526 }
527
528 start_server = conf->local_server_type == PA_SERVER_TYPE_USER || (getuid() == 0 && conf->local_server_type == PA_SERVER_TYPE_SYSTEM);
529
530 if (!start_server && conf->local_server_type == PA_SERVER_TYPE_SYSTEM) {
531 pa_log_notice(_("System mode refused for non-root user. Only starting the D-Bus server lookup service."));
532 conf->system_instance = FALSE;
533 }
534 #endif
535
536 LTDL_SET_PRELOADED_SYMBOLS();
537 pa_ltdl_init();
538 ltdl_init = TRUE;
539
540 if (conf->dl_search_path)
541 lt_dlsetsearchpath(conf->dl_search_path);
542
543 #ifdef OS_IS_WIN32
544 {
545 WSADATA data;
546 WSAStartup(MAKEWORD(2, 0), &data);
547 }
548 #endif
549
550 pa_random_seed();
551
552 switch (conf->cmd) {
553 case PA_CMD_DUMP_MODULES:
554 pa_dump_modules(conf, argc-d, argv+d);
555 retval = 0;
556 goto finish;
557
558 case PA_CMD_DUMP_CONF: {
559
560 if (d < argc) {
561 pa_log("Too many arguments.\n");
562 goto finish;
563 }
564
565 s = pa_daemon_conf_dump(conf);
566 fputs(s, stdout);
567 pa_xfree(s);
568 retval = 0;
569 goto finish;
570 }
571
572 case PA_CMD_DUMP_RESAMPLE_METHODS: {
573 int i;
574
575 if (d < argc) {
576 pa_log("Too many arguments.\n");
577 goto finish;
578 }
579
580 for (i = 0; i < PA_RESAMPLER_MAX; i++)
581 if (pa_resample_method_supported(i))
582 printf("%s\n", pa_resample_method_to_string(i));
583
584 retval = 0;
585 goto finish;
586 }
587
588 case PA_CMD_HELP :
589 pa_cmdline_help(argv[0]);
590 retval = 0;
591 goto finish;
592
593 case PA_CMD_VERSION :
594
595 if (d < argc) {
596 pa_log("Too many arguments.\n");
597 goto finish;
598 }
599
600 printf(PACKAGE_NAME" "PACKAGE_VERSION"\n");
601 retval = 0;
602 goto finish;
603
604 case PA_CMD_CHECK: {
605 pid_t pid;
606
607 if (d < argc) {
608 pa_log("Too many arguments.\n");
609 goto finish;
610 }
611
612 if (pa_pid_file_check_running(&pid, "pulseaudio") < 0)
613 pa_log_info(_("Daemon not running"));
614 else {
615 pa_log_info(_("Daemon running as PID %u"), pid);
616 retval = 0;
617 }
618
619 goto finish;
620
621 }
622 case PA_CMD_KILL:
623
624 if (d < argc) {
625 pa_log("Too many arguments.\n");
626 goto finish;
627 }
628
629 if (pa_pid_file_kill(SIGINT, NULL, "pulseaudio") < 0)
630 pa_log(_("Failed to kill daemon: %s"), pa_cstrerror(errno));
631 else
632 retval = 0;
633
634 goto finish;
635
636 case PA_CMD_CLEANUP_SHM:
637
638 if (d < argc) {
639 pa_log("Too many arguments.\n");
640 goto finish;
641 }
642
643 if (pa_shm_cleanup() >= 0)
644 retval = 0;
645
646 goto finish;
647
648 default:
649 pa_assert(conf->cmd == PA_CMD_DAEMON || conf->cmd == PA_CMD_START);
650 }
651
652 if (d < argc) {
653 pa_log("Too many arguments.\n");
654 goto finish;
655 }
656
657 #ifdef HAVE_GETUID
658 if (getuid() == 0 && !conf->system_instance)
659 pa_log_warn(_("This program is not intended to be run as root (unless --system is specified)."));
660 #ifndef HAVE_DBUS /* A similar, only a notice worthy check was done earlier, if D-Bus is enabled. */
661 else if (getuid() != 0 && conf->system_instance) {
662 pa_log(_("Root privileges required."));
663 goto finish;
664 }
665 #endif
666 #endif /* HAVE_GETUID */
667
668 if (conf->cmd == PA_CMD_START && conf->system_instance) {
669 pa_log(_("--start not supported for system instances."));
670 goto finish;
671 }
672
673 if (conf->cmd == PA_CMD_START && (configured_address = check_configured_address())) {
674 /* There is an server address in our config, but where did it come from?
675 * By default a standard X11 login will load module-x11-publish which will
676 * inject PULSE_SERVER X11 property. If the PA daemon crashes, we will end
677 * up hitting this code path. So we have to check to see if our configured_address
678 * is the same as the value that would go into this property so that we can
679 * recover (i.e. autospawn) from a crash.
680 */
681 char *ufn;
682 pa_bool_t start_anyway = FALSE;
683
684 if ((ufn = pa_runtime_path(PA_NATIVE_DEFAULT_UNIX_SOCKET))) {
685 char *id;
686
687 if ((id = pa_machine_id())) {
688 pa_strlist *server_list;
689 char formatted_ufn[256];
690
691 pa_snprintf(formatted_ufn, sizeof(formatted_ufn), "{%s}unix:%s", id, ufn);
692 pa_xfree(id);
693
694 if ((server_list = pa_strlist_parse(configured_address))) {
695 char *u = NULL;
696
697 /* We only need to check the first server */
698 server_list = pa_strlist_pop(server_list, &u);
699 pa_strlist_free(server_list);
700
701 start_anyway = (u && pa_streq(formatted_ufn, u));
702 pa_xfree(u);
703 }
704 }
705 pa_xfree(ufn);
706 }
707
708 if (!start_anyway) {
709 pa_log_notice(_("User-configured server at %s, refusing to start/autospawn."), configured_address);
710 pa_xfree(configured_address);
711 retval = 0;
712 goto finish;
713 }
714
715 pa_log_notice(_("User-configured server at %s, which appears to be local. Probing deeper."), configured_address);
716 pa_xfree(configured_address);
717 }
718
719 if (conf->system_instance && !conf->disallow_exit)
720 pa_log_warn(_("Running in system mode, but --disallow-exit not set!"));
721
722 if (conf->system_instance && !conf->disallow_module_loading)
723 pa_log_warn(_("Running in system mode, but --disallow-module-loading not set!"));
724
725 if (conf->system_instance && !conf->disable_shm) {
726 pa_log_notice(_("Running in system mode, forcibly disabling SHM mode!"));
727 conf->disable_shm = TRUE;
728 }
729
730 if (conf->system_instance && conf->exit_idle_time >= 0) {
731 pa_log_notice(_("Running in system mode, forcibly disabling exit idle time!"));
732 conf->exit_idle_time = -1;
733 }
734
735 if (conf->cmd == PA_CMD_START) {
736 /* If we shall start PA only when it is not running yet, we
737 * first take the autospawn lock to make things
738 * synchronous. */
739
740 if ((autospawn_fd = pa_autospawn_lock_init()) < 0) {
741 pa_log("Failed to initialize autospawn lock");
742 goto finish;
743 }
744
745 if ((pa_autospawn_lock_acquire(TRUE) < 0)) {
746 pa_log("Failed to acquire autospawn lock");
747 goto finish;
748 }
749
750 autospawn_locked = TRUE;
751 }
752
753 if (conf->daemonize) {
754 #ifdef HAVE_FORK
755 pid_t child;
756 #endif
757
758 if (pa_stdio_acquire() < 0) {
759 pa_log(_("Failed to acquire stdio."));
760 goto finish;
761 }
762
763 #ifdef HAVE_FORK
764 if (pipe(daemon_pipe) < 0) {
765 pa_log(_("pipe() failed: %s"), pa_cstrerror(errno));
766 goto finish;
767 }
768
769 if ((child = fork()) < 0) {
770 pa_log(_("fork() failed: %s"), pa_cstrerror(errno));
771 pa_close_pipe(daemon_pipe);
772 goto finish;
773 }
774
775 if (child != 0) {
776 ssize_t n;
777 /* Father */
778
779 pa_assert_se(pa_close(daemon_pipe[1]) == 0);
780 daemon_pipe[1] = -1;
781
782 if ((n = pa_loop_read(daemon_pipe[0], &retval, sizeof(retval), NULL)) != sizeof(retval)) {
783
784 if (n < 0)
785 pa_log(_("read() failed: %s"), pa_cstrerror(errno));
786
787 retval = 1;
788 }
789
790 if (retval)
791 pa_log(_("Daemon startup failed."));
792 else
793 pa_log_info(_("Daemon startup successful."));
794
795 goto finish;
796 }
797
798 if (autospawn_fd >= 0) {
799 /* The lock file is unlocked from the parent, so we need
800 * to close it in the child */
801
802 pa_autospawn_lock_release();
803 pa_autospawn_lock_done(TRUE);
804
805 autospawn_locked = FALSE;
806 autospawn_fd = -1;
807 }
808
809 pa_assert_se(pa_close(daemon_pipe[0]) == 0);
810 daemon_pipe[0] = -1;
811 #endif
812
813 if (conf->auto_log_target)
814 pa_log_set_target(PA_LOG_SYSLOG);
815
816 #ifdef HAVE_SETSID
817 if (setsid() < 0) {
818 pa_log(_("setsid() failed: %s"), pa_cstrerror(errno));
819 goto finish;
820 }
821 #endif
822
823 #ifdef HAVE_FORK
824 /* We now are a session and process group leader. Let's fork
825 * again and let the father die, so that we'll become a
826 * process that can never acquire a TTY again, in a session and
827 * process group without leader */
828
829 if (pipe(daemon_pipe2) < 0) {
830 pa_log(_("pipe() failed: %s"), pa_cstrerror(errno));
831 goto finish;
832 }
833
834 if ((child = fork()) < 0) {
835 pa_log(_("fork() failed: %s"), pa_cstrerror(errno));
836 pa_close_pipe(daemon_pipe2);
837 goto finish;
838 }
839
840 if (child != 0) {
841 ssize_t n;
842 /* Father */
843
844 pa_assert_se(pa_close(daemon_pipe2[1]) == 0);
845 daemon_pipe2[1] = -1;
846
847 if ((n = pa_loop_read(daemon_pipe2[0], &retval, sizeof(retval), NULL)) != sizeof(retval)) {
848
849 if (n < 0)
850 pa_log(_("read() failed: %s"), pa_cstrerror(errno));
851
852 retval = 1;
853 }
854
855 /* We now have to take care of signalling the first fork with
856 * the return value we've received from this fork... */
857 pa_assert(daemon_pipe[1] >= 0);
858
859 pa_loop_write(daemon_pipe[1], &retval, sizeof(retval), NULL);
860 pa_close(daemon_pipe[1]);
861 daemon_pipe[1] = -1;
862
863 goto finish;
864 }
865
866 pa_assert_se(pa_close(daemon_pipe2[0]) == 0);
867 daemon_pipe2[0] = -1;
868
869 /* We no longer need the (first) daemon_pipe as it's handled in our child above */
870 pa_close_pipe(daemon_pipe);
871 #endif
872
873 #ifdef SIGTTOU
874 signal(SIGTTOU, SIG_IGN);
875 #endif
876 #ifdef SIGTTIN
877 signal(SIGTTIN, SIG_IGN);
878 #endif
879 #ifdef SIGTSTP
880 signal(SIGTSTP, SIG_IGN);
881 #endif
882
883 pa_nullify_stdfds();
884 }
885
886 pa_set_env_and_record("PULSE_INTERNAL", "1");
887 pa_assert_se(chdir("/") == 0);
888 umask(0022);
889
890 #ifdef HAVE_SYS_RESOURCE_H
891 set_all_rlimits(conf);
892 #endif
893 pa_rtclock_hrtimer_enable();
894
895 pa_raise_priority(conf->nice_level);
896
897 if (conf->system_instance)
898 if (change_user() < 0)
899 goto finish;
900
901 pa_set_env_and_record("PULSE_SYSTEM", conf->system_instance ? "1" : "0");
902
903 pa_log_info(_("This is PulseAudio %s"), PACKAGE_VERSION);
904 pa_log_debug(_("Compilation host: %s"), CANONICAL_HOST);
905 pa_log_debug(_("Compilation CFLAGS: %s"), PA_CFLAGS);
906
907 s = pa_uname_string();
908 pa_log_debug(_("Running on host: %s"), s);
909 pa_xfree(s);
910
911 pa_log_debug(_("Found %u CPUs."), pa_ncpus());
912
913 pa_log_info(_("Page size is %lu bytes"), (unsigned long) PA_PAGE_SIZE);
914
915 #ifdef HAVE_VALGRIND_MEMCHECK_H
916 pa_log_debug(_("Compiled with Valgrind support: yes"));
917 #else
918 pa_log_debug(_("Compiled with Valgrind support: no"));
919 #endif
920
921 pa_log_debug(_("Running in valgrind mode: %s"), pa_yes_no(pa_in_valgrind()));
922
923 pa_log_debug(_("Running in VM: %s"), pa_yes_no(pa_running_in_vm()));
924
925 #ifdef __OPTIMIZE__
926 pa_log_debug(_("Optimized build: yes"));
927 #else
928 pa_log_debug(_("Optimized build: no"));
929 #endif
930
931 #ifdef NDEBUG
932 pa_log_debug(_("NDEBUG defined, all asserts disabled."));
933 #elif defined(FASTPATH)
934 pa_log_debug(_("FASTPATH defined, only fast path asserts disabled."));
935 #else
936 pa_log_debug(_("All asserts enabled."));
937 #endif
938
939 if (!(s = pa_machine_id())) {
940 pa_log(_("Failed to get machine ID"));
941 goto finish;
942 }
943 pa_log_info(_("Machine ID is %s."), s);
944 pa_xfree(s);
945
946 if ((s = pa_session_id())) {
947 pa_log_info(_("Session ID is %s."), s);
948 pa_xfree(s);
949 }
950
951 if (!(s = pa_get_runtime_dir()))
952 goto finish;
953 pa_log_info(_("Using runtime directory %s."), s);
954 pa_xfree(s);
955
956 if (!(s = pa_get_state_dir()))
957 goto finish;
958 pa_log_info(_("Using state directory %s."), s);
959 pa_xfree(s);
960
961 pa_log_info(_("Using modules directory %s."), conf->dl_search_path);
962
963 pa_log_info(_("Running in system mode: %s"), pa_yes_no(pa_in_system_mode()));
964
965 if (pa_in_system_mode())
966 pa_log_warn(_("OK, so you are running PA in system mode. Please note that you most likely shouldn't be doing that.\n"
967 "If you do it nonetheless then it's your own fault if things don't work as expected.\n"
968 "Please read http://pulseaudio.org/wiki/WhatIsWrongWithSystemMode for an explanation why system mode is usually a bad idea."));
969
970 if (conf->use_pid_file) {
971 int z;
972
973 if ((z = pa_pid_file_create("pulseaudio")) != 0) {
974
975 if (conf->cmd == PA_CMD_START && z > 0) {
976 /* If we are already running and with are run in
977 * --start mode, then let's return this as success. */
978
979 retval = 0;
980 goto finish;
981 }
982
983 pa_log(_("pa_pid_file_create() failed."));
984 goto finish;
985 }
986
987 valid_pid_file = TRUE;
988 }
989
990 pa_disable_sigpipe();
991
992 if (pa_rtclock_hrtimer())
993 pa_log_info(_("Fresh high-resolution timers available! Bon appetit!"));
994 else
995 pa_log_info(_("Dude, your kernel stinks! The chef's recommendation today is Linux with high-resolution timers enabled!"));
996
997 if (conf->lock_memory) {
998 #ifdef HAVE_SYS_MMAN_H
999 if (mlockall(MCL_FUTURE) < 0)
1000 pa_log_warn("mlockall() failed: %s", pa_cstrerror(errno));
1001 else
1002 pa_log_info("Successfully locked process into memory.");
1003 #else
1004 pa_log_warn("Memory locking requested but not supported on platform.");
1005 #endif
1006 }
1007
1008 pa_memtrap_install();
1009
1010 pa_assert_se(mainloop = pa_mainloop_new());
1011
1012 if (!(c = pa_core_new(pa_mainloop_get_api(mainloop), !conf->disable_shm, conf->shm_size))) {
1013 pa_log(_("pa_core_new() failed."));
1014 goto finish;
1015 }
1016
1017 c->default_sample_spec = conf->default_sample_spec;
1018 c->alternate_sample_rate = conf->alternate_sample_rate;
1019 c->default_channel_map = conf->default_channel_map;
1020 c->default_n_fragments = conf->default_n_fragments;
1021 c->default_fragment_size_msec = conf->default_fragment_size_msec;
1022 c->deferred_volume_safety_margin_usec = conf->deferred_volume_safety_margin_usec;
1023 c->deferred_volume_extra_delay_usec = conf->deferred_volume_extra_delay_usec;
1024 c->exit_idle_time = conf->exit_idle_time;
1025 c->scache_idle_time = conf->scache_idle_time;
1026 c->resample_method = conf->resample_method;
1027 c->realtime_priority = conf->realtime_priority;
1028 c->realtime_scheduling = !!conf->realtime_scheduling;
1029 c->disable_remixing = !!conf->disable_remixing;
1030 c->disable_lfe_remixing = !!conf->disable_lfe_remixing;
1031 c->deferred_volume = !!conf->deferred_volume;
1032 c->running_as_daemon = !!conf->daemonize;
1033 c->disallow_exit = conf->disallow_exit;
1034 c->flat_volumes = conf->flat_volumes;
1035 #ifdef HAVE_DBUS
1036 c->server_type = conf->local_server_type;
1037 #endif
1038
1039 c->cpu_info.cpu_type = PA_CPU_UNDEFINED;
1040 if (!getenv("PULSE_NO_SIMD")) {
1041 if (pa_cpu_init_x86(&(c->cpu_info.flags.x86)))
1042 c->cpu_info.cpu_type = PA_CPU_X86;
1043 if (pa_cpu_init_arm(&(c->cpu_info.flags.arm)))
1044 c->cpu_info.cpu_type = PA_CPU_ARM;
1045 pa_cpu_init_orc(c->cpu_info);
1046 }
1047
1048 pa_assert_se(pa_signal_init(pa_mainloop_get_api(mainloop)) == 0);
1049 pa_signal_new(SIGINT, signal_callback, c);
1050 pa_signal_new(SIGTERM, signal_callback, c);
1051 #ifdef SIGUSR1
1052 pa_signal_new(SIGUSR1, signal_callback, c);
1053 #endif
1054 #ifdef SIGUSR2
1055 pa_signal_new(SIGUSR2, signal_callback, c);
1056 #endif
1057 #ifdef SIGHUP
1058 pa_signal_new(SIGHUP, signal_callback, c);
1059 #endif
1060
1061 #ifdef OS_IS_WIN32
1062 win32_timer = pa_mainloop_get_api(mainloop)->time_new(pa_mainloop_get_api(mainloop), pa_gettimeofday(&win32_tv), message_cb, NULL);
1063 #endif
1064
1065 if (!conf->no_cpu_limit)
1066 pa_assert_se(pa_cpu_limit_init(pa_mainloop_get_api(mainloop)) == 0);
1067
1068 buf = pa_strbuf_new();
1069
1070 #ifdef HAVE_DBUS
1071 pa_assert_se(dbus_threads_init_default());
1072
1073 if (start_server) {
1074 #endif
1075 if (conf->load_default_script_file) {
1076 FILE *f;
1077
1078 if ((f = pa_daemon_conf_open_default_script_file(conf))) {
1079 r = pa_cli_command_execute_file_stream(c, f, buf, &conf->fail);
1080 fclose(f);
1081 }
1082 }
1083
1084 if (r >= 0)
1085 r = pa_cli_command_execute(c, conf->script_commands, buf, &conf->fail);
1086
1087 pa_log_error("%s", s = pa_strbuf_tostring_free(buf));
1088 pa_xfree(s);
1089
1090 if (r < 0 && conf->fail) {
1091 pa_log(_("Failed to initialize daemon."));
1092 goto finish;
1093 }
1094
1095 if (!c->modules || pa_idxset_size(c->modules) == 0) {
1096 pa_log(_("Daemon startup without any loaded modules, refusing to work."));
1097 goto finish;
1098 }
1099 #ifdef HAVE_DBUS
1100 } else {
1101 /* When we just provide the D-Bus server lookup service, we don't want
1102 * any modules to be loaded. We haven't loaded any so far, so one might
1103 * think there's no way to contact the server, but receiving certain
1104 * signals could still cause modules to load. */
1105 conf->disallow_module_loading = TRUE;
1106 }
1107 #endif
1108
1109 /* We completed the initial module loading, so let's disable it
1110 * from now on, if requested */
1111 c->disallow_module_loading = !!conf->disallow_module_loading;
1112
1113 #ifdef HAVE_DBUS
1114 if (!conf->system_instance) {
1115 if ((server_lookup = pa_dbusobj_server_lookup_new(c))) {
1116 if (!(lookup_service_bus = register_dbus_name(c, DBUS_BUS_SESSION, "org.PulseAudio1")))
1117 goto finish;
1118 }
1119 }
1120
1121 if (start_server)
1122 server_bus = register_dbus_name(c, conf->system_instance ? DBUS_BUS_SYSTEM : DBUS_BUS_SESSION, "org.pulseaudio.Server");
1123 #endif
1124
1125 #ifdef HAVE_FORK
1126 if (daemon_pipe2[1] >= 0) {
1127 int ok = 0;
1128 pa_loop_write(daemon_pipe2[1], &ok, sizeof(ok), NULL);
1129 pa_close(daemon_pipe2[1]);
1130 daemon_pipe2[1] = -1;
1131 }
1132 #endif
1133
1134 pa_log_info(_("Daemon startup complete."));
1135
1136 retval = 0;
1137 if (pa_mainloop_run(mainloop, &retval) < 0)
1138 goto finish;
1139
1140 pa_log_info(_("Daemon shutdown initiated."));
1141
1142 finish:
1143 #ifdef HAVE_DBUS
1144 if (server_bus)
1145 pa_dbus_connection_unref(server_bus);
1146 if (lookup_service_bus)
1147 pa_dbus_connection_unref(lookup_service_bus);
1148 if (server_lookup)
1149 pa_dbusobj_server_lookup_free(server_lookup);
1150 #endif
1151
1152 if (autospawn_fd >= 0) {
1153 if (autospawn_locked)
1154 pa_autospawn_lock_release();
1155
1156 pa_autospawn_lock_done(FALSE);
1157 }
1158
1159 #ifdef OS_IS_WIN32
1160 if (mainloop && win32_timer)
1161 pa_mainloop_get_api(mainloop)->time_free(win32_timer);
1162 #endif
1163
1164 if (c) {
1165 /* Ensure all the modules/samples are unloaded when the core is still ref'ed,
1166 * as unlink callback hooks in modules may need the core to be ref'ed */
1167 pa_module_unload_all(c);
1168 pa_scache_free_all(c);
1169
1170 pa_core_unref(c);
1171 pa_log_info(_("Daemon terminated."));
1172 }
1173
1174 if (!conf->no_cpu_limit)
1175 pa_cpu_limit_done();
1176
1177 pa_signal_done();
1178
1179 #ifdef HAVE_FORK
1180 /* If we have daemon_pipe[1] still open, this means we've failed after
1181 * the first fork, but before the second. Therefore just write to it. */
1182 if (daemon_pipe[1] >= 0)
1183 pa_loop_write(daemon_pipe[1], &retval, sizeof(retval), NULL);
1184 else if (daemon_pipe2[1] >= 0)
1185 pa_loop_write(daemon_pipe2[1], &retval, sizeof(retval), NULL);
1186
1187 pa_close_pipe(daemon_pipe2);
1188 pa_close_pipe(daemon_pipe);
1189 #endif
1190
1191 if (mainloop)
1192 pa_mainloop_free(mainloop);
1193
1194 if (conf)
1195 pa_daemon_conf_free(conf);
1196
1197 if (valid_pid_file)
1198 pa_pid_file_remove();
1199
1200 /* This has no real purpose except making things valgrind-clean */
1201 pa_unset_env_recorded();
1202
1203 #ifdef OS_IS_WIN32
1204 WSACleanup();
1205 #endif
1206
1207 if (ltdl_init)
1208 pa_ltdl_done();
1209
1210 #ifdef HAVE_DBUS
1211 dbus_shutdown();
1212 #endif
1213
1214 return retval;
1215 }