4 This file is part of PulseAudio.
6 Copyright 2004-2006 Lennart Poettering
7 Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB
9 PulseAudio is free software; you can redistribute it and/or modify
10 it under the terms of the GNU Lesser General Public License as published
11 by the Free Software Foundation; either version 2 of the License,
12 or (at your option) any later version.
14 PulseAudio is distributed in the hope that it will be useful, but
15 WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 General Public License for more details.
19 You should have received a copy of the GNU Lesser General Public License
20 along with PulseAudio; if not, write to the Free Software
21 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
35 #include <pulse/timeval.h>
36 #include <pulse/version.h>
37 #include <pulse/utf8.h>
38 #include <pulse/util.h>
39 #include <pulse/xmalloc.h>
41 #include <pulsecore/native-common.h>
42 #include <pulsecore/packet.h>
43 #include <pulsecore/client.h>
44 #include <pulsecore/source-output.h>
45 #include <pulsecore/sink-input.h>
46 #include <pulsecore/pstream.h>
47 #include <pulsecore/tagstruct.h>
48 #include <pulsecore/pdispatch.h>
49 #include <pulsecore/pstream-util.h>
50 #include <pulsecore/authkey.h>
51 #include <pulsecore/namereg.h>
52 #include <pulsecore/core-scache.h>
53 #include <pulsecore/core-subscribe.h>
54 #include <pulsecore/log.h>
55 #include <pulsecore/autoload.h>
56 #include <pulsecore/authkey-prop.h>
57 #include <pulsecore/strlist.h>
58 #include <pulsecore/props.h>
59 #include <pulsecore/sample-util.h>
60 #include <pulsecore/llist.h>
61 #include <pulsecore/creds.h>
62 #include <pulsecore/core-util.h>
63 #include <pulsecore/ipacl.h>
65 #include "protocol-native.h"
67 /* Kick a client if it doesn't authenticate within this time */
68 #define AUTH_TIMEOUT 60
70 /* Don't accept more connection than this */
71 #define MAX_CONNECTIONS 64
73 #define MAX_MEMBLOCKQ_LENGTH (4*1024*1024) /* 4MB */
76 struct pa_protocol_native
;
78 struct record_stream
{
79 struct connection
*connection
;
81 pa_source_output
*source_output
;
82 pa_memblockq
*memblockq
;
86 struct playback_stream
{
88 struct connection
*connection
;
90 pa_sink_input
*sink_input
;
91 pa_memblockq
*memblockq
;
92 size_t requested_bytes
;
98 /* Sync group members */
99 PA_LLIST_FIELDS(struct playback_stream
);
102 struct upload_stream
{
104 struct connection
*connection
;
106 pa_memchunk memchunk
;
109 pa_sample_spec sample_spec
;
110 pa_channel_map channel_map
;
113 struct output_stream
{
125 pa_protocol_native
*protocol
;
128 pa_pdispatch
*pdispatch
;
129 pa_idxset
*record_streams
, *output_streams
;
130 uint32_t rrobin_index
;
131 pa_subscription
*subscription
;
132 pa_time_event
*auth_timeout_event
;
135 struct pa_protocol_native
{
139 pa_socket_server
*server
;
140 pa_idxset
*connections
;
141 uint8_t auth_cookie
[PA_NATIVE_COOKIE_LENGTH
];
142 int auth_cookie_in_property
;
146 pa_ip_acl
*auth_ip_acl
;
149 static int sink_input_peek_cb(pa_sink_input
*i
, pa_memchunk
*chunk
);
150 static void sink_input_drop_cb(pa_sink_input
*i
, const pa_memchunk
*chunk
, size_t length
);
151 static void sink_input_kill_cb(pa_sink_input
*i
);
152 static pa_usec_t
sink_input_get_latency_cb(pa_sink_input
*i
);
154 static void request_bytes(struct playback_stream
*s
);
156 static void source_output_kill_cb(pa_source_output
*o
);
157 static void source_output_push_cb(pa_source_output
*o
, const pa_memchunk
*chunk
);
158 static pa_usec_t
source_output_get_latency_cb(pa_source_output
*o
);
160 static void command_exit(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
161 static void command_create_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
162 static void command_drain_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
163 static void command_create_record_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
164 static void command_delete_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
165 static void command_auth(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
166 static void command_set_client_name(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
167 static void command_lookup(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
168 static void command_stat(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
169 static void command_get_playback_latency(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
170 static void command_get_record_latency(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
171 static void command_create_upload_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
172 static void command_finish_upload_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
173 static void command_play_sample(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
174 static void command_remove_sample(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
175 static void command_get_info(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
176 static void command_get_info_list(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
177 static void command_get_server_info(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
178 static void command_subscribe(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
179 static void command_set_volume(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
180 static void command_set_mute(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
181 static void command_cork_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
182 static void command_flush_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
183 static void command_trigger_or_prebuf_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
184 static void command_set_default_sink_or_source(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
185 static void command_set_stream_name(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
186 static void command_kill(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
187 static void command_load_module(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
188 static void command_unload_module(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
189 static void command_add_autoload(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
190 static void command_remove_autoload(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
191 static void command_get_autoload_info(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
192 static void command_get_autoload_info_list(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
193 static void command_cork_record_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
194 static void command_flush_record_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
195 static void command_move_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
197 static const pa_pdispatch_cb_t command_table
[PA_COMMAND_MAX
] = {
198 [PA_COMMAND_ERROR
] = NULL
,
199 [PA_COMMAND_TIMEOUT
] = NULL
,
200 [PA_COMMAND_REPLY
] = NULL
,
201 [PA_COMMAND_CREATE_PLAYBACK_STREAM
] = command_create_playback_stream
,
202 [PA_COMMAND_DELETE_PLAYBACK_STREAM
] = command_delete_stream
,
203 [PA_COMMAND_DRAIN_PLAYBACK_STREAM
] = command_drain_playback_stream
,
204 [PA_COMMAND_CREATE_RECORD_STREAM
] = command_create_record_stream
,
205 [PA_COMMAND_DELETE_RECORD_STREAM
] = command_delete_stream
,
206 [PA_COMMAND_AUTH
] = command_auth
,
207 [PA_COMMAND_REQUEST
] = NULL
,
208 [PA_COMMAND_EXIT
] = command_exit
,
209 [PA_COMMAND_SET_CLIENT_NAME
] = command_set_client_name
,
210 [PA_COMMAND_LOOKUP_SINK
] = command_lookup
,
211 [PA_COMMAND_LOOKUP_SOURCE
] = command_lookup
,
212 [PA_COMMAND_STAT
] = command_stat
,
213 [PA_COMMAND_GET_PLAYBACK_LATENCY
] = command_get_playback_latency
,
214 [PA_COMMAND_GET_RECORD_LATENCY
] = command_get_record_latency
,
215 [PA_COMMAND_CREATE_UPLOAD_STREAM
] = command_create_upload_stream
,
216 [PA_COMMAND_DELETE_UPLOAD_STREAM
] = command_delete_stream
,
217 [PA_COMMAND_FINISH_UPLOAD_STREAM
] = command_finish_upload_stream
,
218 [PA_COMMAND_PLAY_SAMPLE
] = command_play_sample
,
219 [PA_COMMAND_REMOVE_SAMPLE
] = command_remove_sample
,
220 [PA_COMMAND_GET_SINK_INFO
] = command_get_info
,
221 [PA_COMMAND_GET_SOURCE_INFO
] = command_get_info
,
222 [PA_COMMAND_GET_CLIENT_INFO
] = command_get_info
,
223 [PA_COMMAND_GET_MODULE_INFO
] = command_get_info
,
224 [PA_COMMAND_GET_SINK_INPUT_INFO
] = command_get_info
,
225 [PA_COMMAND_GET_SOURCE_OUTPUT_INFO
] = command_get_info
,
226 [PA_COMMAND_GET_SAMPLE_INFO
] = command_get_info
,
227 [PA_COMMAND_GET_SINK_INFO_LIST
] = command_get_info_list
,
228 [PA_COMMAND_GET_SOURCE_INFO_LIST
] = command_get_info_list
,
229 [PA_COMMAND_GET_MODULE_INFO_LIST
] = command_get_info_list
,
230 [PA_COMMAND_GET_CLIENT_INFO_LIST
] = command_get_info_list
,
231 [PA_COMMAND_GET_SINK_INPUT_INFO_LIST
] = command_get_info_list
,
232 [PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST
] = command_get_info_list
,
233 [PA_COMMAND_GET_SAMPLE_INFO_LIST
] = command_get_info_list
,
234 [PA_COMMAND_GET_SERVER_INFO
] = command_get_server_info
,
235 [PA_COMMAND_SUBSCRIBE
] = command_subscribe
,
237 [PA_COMMAND_SET_SINK_VOLUME
] = command_set_volume
,
238 [PA_COMMAND_SET_SINK_INPUT_VOLUME
] = command_set_volume
,
239 [PA_COMMAND_SET_SOURCE_VOLUME
] = command_set_volume
,
241 [PA_COMMAND_SET_SINK_MUTE
] = command_set_mute
,
242 [PA_COMMAND_SET_SOURCE_MUTE
] = command_set_mute
,
244 [PA_COMMAND_CORK_PLAYBACK_STREAM
] = command_cork_playback_stream
,
245 [PA_COMMAND_FLUSH_PLAYBACK_STREAM
] = command_flush_playback_stream
,
246 [PA_COMMAND_TRIGGER_PLAYBACK_STREAM
] = command_trigger_or_prebuf_playback_stream
,
247 [PA_COMMAND_PREBUF_PLAYBACK_STREAM
] = command_trigger_or_prebuf_playback_stream
,
249 [PA_COMMAND_CORK_RECORD_STREAM
] = command_cork_record_stream
,
250 [PA_COMMAND_FLUSH_RECORD_STREAM
] = command_flush_record_stream
,
252 [PA_COMMAND_SET_DEFAULT_SINK
] = command_set_default_sink_or_source
,
253 [PA_COMMAND_SET_DEFAULT_SOURCE
] = command_set_default_sink_or_source
,
254 [PA_COMMAND_SET_PLAYBACK_STREAM_NAME
] = command_set_stream_name
,
255 [PA_COMMAND_SET_RECORD_STREAM_NAME
] = command_set_stream_name
,
256 [PA_COMMAND_KILL_CLIENT
] = command_kill
,
257 [PA_COMMAND_KILL_SINK_INPUT
] = command_kill
,
258 [PA_COMMAND_KILL_SOURCE_OUTPUT
] = command_kill
,
259 [PA_COMMAND_LOAD_MODULE
] = command_load_module
,
260 [PA_COMMAND_UNLOAD_MODULE
] = command_unload_module
,
261 [PA_COMMAND_GET_AUTOLOAD_INFO
] = command_get_autoload_info
,
262 [PA_COMMAND_GET_AUTOLOAD_INFO_LIST
] = command_get_autoload_info_list
,
263 [PA_COMMAND_ADD_AUTOLOAD
] = command_add_autoload
,
264 [PA_COMMAND_REMOVE_AUTOLOAD
] = command_remove_autoload
,
266 [PA_COMMAND_MOVE_SINK_INPUT
] = command_move_stream
,
267 [PA_COMMAND_MOVE_SOURCE_OUTPUT
] = command_move_stream
270 /* structure management */
272 static struct upload_stream
* upload_stream_new(
273 struct connection
*c
,
274 const pa_sample_spec
*ss
,
275 const pa_channel_map
*map
,
276 const char *name
, size_t length
) {
278 struct upload_stream
*s
;
279 assert(c
&& ss
&& name
&& length
);
281 s
= pa_xnew(struct upload_stream
, 1);
282 s
->type
= UPLOAD_STREAM
;
284 s
->sample_spec
= *ss
;
285 s
->channel_map
= *map
;
286 s
->name
= pa_xstrdup(name
);
288 s
->memchunk
.memblock
= NULL
;
289 s
->memchunk
.index
= 0;
290 s
->memchunk
.length
= 0;
294 pa_idxset_put(c
->output_streams
, s
, &s
->index
);
298 static void upload_stream_free(struct upload_stream
*o
) {
299 assert(o
&& o
->connection
);
301 pa_idxset_remove_by_data(o
->connection
->output_streams
, o
, NULL
);
305 if (o
->memchunk
.memblock
)
306 pa_memblock_unref(o
->memchunk
.memblock
);
311 static struct record_stream
* record_stream_new(
312 struct connection
*c
,
314 const pa_sample_spec
*ss
,
315 const pa_channel_map
*map
,
318 size_t fragment_size
) {
320 struct record_stream
*s
;
321 pa_source_output
*source_output
;
323 pa_source_output_new_data data
;
325 assert(c
&& ss
&& name
&& maxlength
);
327 pa_source_output_new_data_init(&data
);
328 data
.source
= source
;
329 data
.driver
= __FILE__
;
331 pa_source_output_new_data_set_sample_spec(&data
, ss
);
332 pa_source_output_new_data_set_channel_map(&data
, map
);
333 data
.module
= c
->protocol
->module
;
334 data
.client
= c
->client
;
336 if (!(source_output
= pa_source_output_new(c
->protocol
->core
, &data
, 0)))
339 s
= pa_xnew(struct record_stream
, 1);
341 s
->source_output
= source_output
;
342 s
->source_output
->push
= source_output_push_cb
;
343 s
->source_output
->kill
= source_output_kill_cb
;
344 s
->source_output
->get_latency
= source_output_get_latency_cb
;
345 s
->source_output
->userdata
= s
;
347 s
->memblockq
= pa_memblockq_new(
351 base
= pa_frame_size(ss
),
355 assert(s
->memblockq
);
357 s
->fragment_size
= (fragment_size
/base
)*base
;
358 if (!s
->fragment_size
)
359 s
->fragment_size
= base
;
361 pa_idxset_put(c
->record_streams
, s
, &s
->index
);
365 static void record_stream_free(struct record_stream
* r
) {
366 assert(r
&& r
->connection
);
368 pa_idxset_remove_by_data(r
->connection
->record_streams
, r
, NULL
);
369 pa_source_output_disconnect(r
->source_output
);
370 pa_source_output_unref(r
->source_output
);
371 pa_memblockq_free(r
->memblockq
);
375 static struct playback_stream
* playback_stream_new(
376 struct connection
*c
,
378 const pa_sample_spec
*ss
,
379 const pa_channel_map
*map
,
388 struct playback_stream
*s
, *ssync
;
389 pa_sink_input
*sink_input
;
390 pa_memblock
*silence
;
393 pa_sink_input_new_data data
;
395 assert(c
&& ss
&& name
&& maxlength
);
397 /* Find syncid group */
398 for (ssync
= pa_idxset_first(c
->output_streams
, &idx
); ssync
; ssync
= pa_idxset_next(c
->output_streams
, &idx
)) {
400 if (ssync
->type
!= PLAYBACK_STREAM
)
403 if (ssync
->syncid
== syncid
)
407 /* Synced streams must connect to the same sink */
409 sink
= ssync
->sink_input
->sink
;
411 pa_sink_input_new_data_init(&data
);
413 data
.driver
= __FILE__
;
415 pa_sink_input_new_data_set_sample_spec(&data
, ss
);
416 pa_sink_input_new_data_set_channel_map(&data
, map
);
417 pa_sink_input_new_data_set_volume(&data
, volume
);
418 data
.module
= c
->protocol
->module
;
419 data
.client
= c
->client
;
421 if (!(sink_input
= pa_sink_input_new(c
->protocol
->core
, &data
, 0)))
424 s
= pa_xnew(struct playback_stream
, 1);
425 s
->type
= PLAYBACK_STREAM
;
428 s
->sink_input
= sink_input
;
431 s
->sink_input
->peek
= sink_input_peek_cb
;
432 s
->sink_input
->drop
= sink_input_drop_cb
;
433 s
->sink_input
->kill
= sink_input_kill_cb
;
434 s
->sink_input
->get_latency
= sink_input_get_latency_cb
;
435 s
->sink_input
->userdata
= s
;
438 /* Sync id found, now find head of list */
439 PA_LLIST_FIND_HEAD(struct playback_stream
, ssync
, &ssync
);
441 /* Prepend ourselves */
442 PA_LLIST_PREPEND(struct playback_stream
, ssync
, s
);
444 /* Set our start index to the current read index of the other grozp member(s) */
446 start_index
= pa_memblockq_get_read_index(ssync
->next
->memblockq
);
448 /* This ia a new sync group */
449 PA_LLIST_INIT(struct playback_stream
, s
);
453 silence
= pa_silence_memblock_new(c
->protocol
->core
->mempool
, ss
, 0);
455 s
->memblockq
= pa_memblockq_new(
464 pa_memblock_unref(silence
);
466 s
->requested_bytes
= 0;
467 s
->drain_request
= 0;
469 pa_idxset_put(c
->output_streams
, s
, &s
->index
);
474 static void playback_stream_free(struct playback_stream
* p
) {
475 struct playback_stream
*head
;
476 assert(p
&& p
->connection
);
478 if (p
->drain_request
)
479 pa_pstream_send_error(p
->connection
->pstream
, p
->drain_tag
, PA_ERR_NOENTITY
);
481 PA_LLIST_FIND_HEAD(struct playback_stream
, p
, &head
);
482 PA_LLIST_REMOVE(struct playback_stream
, head
, p
);
484 pa_idxset_remove_by_data(p
->connection
->output_streams
, p
, NULL
);
485 pa_sink_input_disconnect(p
->sink_input
);
486 pa_sink_input_unref(p
->sink_input
);
487 pa_memblockq_free(p
->memblockq
);
491 static void connection_free(struct connection
*c
) {
492 struct record_stream
*r
;
493 struct output_stream
*o
;
494 assert(c
&& c
->protocol
);
496 pa_idxset_remove_by_data(c
->protocol
->connections
, c
, NULL
);
497 while ((r
= pa_idxset_first(c
->record_streams
, NULL
)))
498 record_stream_free(r
);
499 pa_idxset_free(c
->record_streams
, NULL
, NULL
);
501 while ((o
= pa_idxset_first(c
->output_streams
, NULL
)))
502 if (o
->type
== PLAYBACK_STREAM
)
503 playback_stream_free((struct playback_stream
*) o
);
505 upload_stream_free((struct upload_stream
*) o
);
506 pa_idxset_free(c
->output_streams
, NULL
, NULL
);
508 pa_pdispatch_unref(c
->pdispatch
);
509 pa_pstream_close(c
->pstream
);
510 pa_pstream_unref(c
->pstream
);
511 pa_client_free(c
->client
);
514 pa_subscription_free(c
->subscription
);
516 if (c
->auth_timeout_event
)
517 c
->protocol
->core
->mainloop
->time_free(c
->auth_timeout_event
);
522 static void request_bytes(struct playback_stream
*s
) {
527 if (!(l
= pa_memblockq_missing(s
->memblockq
)))
530 if (l
<= s
->requested_bytes
)
533 l
-= s
->requested_bytes
;
535 if (l
< pa_memblockq_get_minreq(s
->memblockq
))
538 s
->requested_bytes
+= l
;
540 t
= pa_tagstruct_new(NULL
, 0);
542 pa_tagstruct_putu32(t
, PA_COMMAND_REQUEST
);
543 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
544 pa_tagstruct_putu32(t
, s
->index
);
545 pa_tagstruct_putu32(t
, l
);
546 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
548 /* pa_log("Requesting %u bytes", l); */
551 static void send_memblock(struct connection
*c
) {
553 struct record_stream
*r
;
555 start
= PA_IDXSET_INVALID
;
559 if (!(r
= pa_idxset_rrobin(c
->record_streams
, &c
->rrobin_index
)))
562 if (start
== PA_IDXSET_INVALID
)
563 start
= c
->rrobin_index
;
564 else if (start
== c
->rrobin_index
)
567 if (pa_memblockq_peek(r
->memblockq
, &chunk
) >= 0) {
568 pa_memchunk schunk
= chunk
;
570 if (schunk
.length
> r
->fragment_size
)
571 schunk
.length
= r
->fragment_size
;
573 pa_pstream_send_memblock(c
->pstream
, r
->index
, 0, PA_SEEK_RELATIVE
, &schunk
);
574 pa_memblockq_drop(r
->memblockq
, &chunk
, schunk
.length
);
575 pa_memblock_unref(schunk
.memblock
);
582 static void send_playback_stream_killed(struct playback_stream
*p
) {
586 t
= pa_tagstruct_new(NULL
, 0);
587 pa_tagstruct_putu32(t
, PA_COMMAND_PLAYBACK_STREAM_KILLED
);
588 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
589 pa_tagstruct_putu32(t
, p
->index
);
590 pa_pstream_send_tagstruct(p
->connection
->pstream
, t
);
593 static void send_record_stream_killed(struct record_stream
*r
) {
597 t
= pa_tagstruct_new(NULL
, 0);
598 pa_tagstruct_putu32(t
, PA_COMMAND_RECORD_STREAM_KILLED
);
599 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
600 pa_tagstruct_putu32(t
, r
->index
);
601 pa_pstream_send_tagstruct(r
->connection
->pstream
, t
);
604 /*** sinkinput callbacks ***/
606 static int sink_input_peek_cb(pa_sink_input
*i
, pa_memchunk
*chunk
) {
607 struct playback_stream
*s
;
608 assert(i
&& i
->userdata
&& chunk
);
611 if (pa_memblockq_get_length(s
->memblockq
) <= 0 && !s
->underrun
) {
614 /* Report that we're empty */
616 t
= pa_tagstruct_new(NULL
, 0);
617 pa_tagstruct_putu32(t
, PA_COMMAND_UNDERFLOW
);
618 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
619 pa_tagstruct_putu32(t
, s
->index
);
620 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
625 if (pa_memblockq_peek(s
->memblockq
, chunk
) < 0) {
626 /* pa_log("peek: failure"); */
630 /* pa_log("peek: %u", chunk->length); */
635 static void sink_input_drop_cb(pa_sink_input
*i
, const pa_memchunk
*chunk
, size_t length
) {
636 struct playback_stream
*s
;
637 assert(i
&& i
->userdata
&& length
);
640 pa_memblockq_drop(s
->memblockq
, chunk
, length
);
644 if (s
->drain_request
&& !pa_memblockq_is_readable(s
->memblockq
)) {
645 pa_pstream_send_simple_ack(s
->connection
->pstream
, s
->drain_tag
);
646 s
->drain_request
= 0;
649 /* pa_log("after_drop: %u %u", pa_memblockq_get_length(s->memblockq), pa_memblockq_is_readable(s->memblockq)); */
652 static void sink_input_kill_cb(pa_sink_input
*i
) {
653 assert(i
&& i
->userdata
);
654 send_playback_stream_killed((struct playback_stream
*) i
->userdata
);
655 playback_stream_free((struct playback_stream
*) i
->userdata
);
658 static pa_usec_t
sink_input_get_latency_cb(pa_sink_input
*i
) {
659 struct playback_stream
*s
;
660 assert(i
&& i
->userdata
);
663 /*pa_log("get_latency: %u", pa_memblockq_get_length(s->memblockq));*/
665 return pa_bytes_to_usec(pa_memblockq_get_length(s
->memblockq
), &s
->sink_input
->sample_spec
);
668 /*** source_output callbacks ***/
670 static void source_output_push_cb(pa_source_output
*o
, const pa_memchunk
*chunk
) {
671 struct record_stream
*s
;
672 assert(o
&& o
->userdata
&& chunk
);
675 if (pa_memblockq_push_align(s
->memblockq
, chunk
) < 0) {
676 pa_log_warn("Failed to push data into output queue.");
680 if (!pa_pstream_is_pending(s
->connection
->pstream
))
681 send_memblock(s
->connection
);
684 static void source_output_kill_cb(pa_source_output
*o
) {
685 assert(o
&& o
->userdata
);
686 send_record_stream_killed((struct record_stream
*) o
->userdata
);
687 record_stream_free((struct record_stream
*) o
->userdata
);
690 static pa_usec_t
source_output_get_latency_cb(pa_source_output
*o
) {
691 struct record_stream
*s
;
692 assert(o
&& o
->userdata
);
695 /*pa_log("get_latency: %u", pa_memblockq_get_length(s->memblockq));*/
697 return pa_bytes_to_usec(pa_memblockq_get_length(s
->memblockq
), &o
->sample_spec
);
700 /*** pdispatch callbacks ***/
702 static void protocol_error(struct connection
*c
) {
703 pa_log("protocol error, kicking client");
707 #define CHECK_VALIDITY(pstream, expression, tag, error) do { \
708 if (!(expression)) { \
709 pa_pstream_send_error((pstream), (tag), (error)); \
714 static pa_tagstruct
*reply_new(uint32_t tag
) {
717 reply
= pa_tagstruct_new(NULL
, 0);
718 pa_tagstruct_putu32(reply
, PA_COMMAND_REPLY
);
719 pa_tagstruct_putu32(reply
, tag
);
723 static void command_create_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
724 struct connection
*c
= userdata
;
725 struct playback_stream
*s
;
726 uint32_t maxlength
, tlength
, prebuf
, minreq
, sink_index
, syncid
;
727 const char *name
, *sink_name
;
731 pa_sink
*sink
= NULL
;
735 assert(c
&& t
&& c
->protocol
&& c
->protocol
->core
);
737 if (pa_tagstruct_get(
739 PA_TAG_STRING
, &name
,
740 PA_TAG_SAMPLE_SPEC
, &ss
,
741 PA_TAG_CHANNEL_MAP
, &map
,
742 PA_TAG_U32
, &sink_index
,
743 PA_TAG_STRING
, &sink_name
,
744 PA_TAG_U32
, &maxlength
,
745 PA_TAG_BOOLEAN
, &corked
,
746 PA_TAG_U32
, &tlength
,
750 PA_TAG_CVOLUME
, &volume
,
751 PA_TAG_INVALID
) < 0 ||
752 !pa_tagstruct_eof(t
) ||
758 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
759 CHECK_VALIDITY(c
->pstream
, name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
760 CHECK_VALIDITY(c
->pstream
, sink_index
!= PA_INVALID_INDEX
|| !sink_name
|| (*sink_name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
761 CHECK_VALIDITY(c
->pstream
, pa_channel_map_valid(&map
), tag
, PA_ERR_INVALID
);
762 CHECK_VALIDITY(c
->pstream
, pa_sample_spec_valid(&ss
), tag
, PA_ERR_INVALID
);
763 CHECK_VALIDITY(c
->pstream
, pa_cvolume_valid(&volume
), tag
, PA_ERR_INVALID
);
764 CHECK_VALIDITY(c
->pstream
, map
.channels
== ss
.channels
&& volume
.channels
== ss
.channels
, tag
, PA_ERR_INVALID
);
765 CHECK_VALIDITY(c
->pstream
, maxlength
> 0 && maxlength
<= MAX_MEMBLOCKQ_LENGTH
, tag
, PA_ERR_INVALID
);
766 CHECK_VALIDITY(c
->pstream
, maxlength
>= pa_frame_size(&ss
), tag
, PA_ERR_INVALID
);
768 if (sink_index
!= PA_INVALID_INDEX
) {
769 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, sink_index
);
770 CHECK_VALIDITY(c
->pstream
, sink
, tag
, PA_ERR_NOENTITY
);
771 } else if (sink_name
) {
772 sink
= pa_namereg_get(c
->protocol
->core
, sink_name
, PA_NAMEREG_SINK
, 1);
773 CHECK_VALIDITY(c
->pstream
, sink
, tag
, PA_ERR_NOENTITY
);
776 s
= playback_stream_new(c
, sink
, &ss
, &map
, name
, maxlength
, tlength
, prebuf
, minreq
, &volume
, syncid
);
777 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_INVALID
);
779 pa_sink_input_cork(s
->sink_input
, corked
);
781 reply
= reply_new(tag
);
782 pa_tagstruct_putu32(reply
, s
->index
);
783 assert(s
->sink_input
);
784 pa_tagstruct_putu32(reply
, s
->sink_input
->index
);
785 pa_tagstruct_putu32(reply
, s
->requested_bytes
= pa_memblockq_missing(s
->memblockq
));
787 if (c
->version
>= 9) {
788 /* Since 0.9 we support sending the buffer metrics back to the client */
790 pa_tagstruct_putu32(reply
, (uint32_t) pa_memblockq_get_maxlength(s
->memblockq
));
791 pa_tagstruct_putu32(reply
, (uint32_t) pa_memblockq_get_tlength(s
->memblockq
));
792 pa_tagstruct_putu32(reply
, (uint32_t) pa_memblockq_get_prebuf(s
->memblockq
));
793 pa_tagstruct_putu32(reply
, (uint32_t) pa_memblockq_get_minreq(s
->memblockq
));
796 pa_pstream_send_tagstruct(c
->pstream
, reply
);
800 static void command_delete_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
801 struct connection
*c
= userdata
;
805 if (pa_tagstruct_getu32(t
, &channel
) < 0 ||
806 !pa_tagstruct_eof(t
)) {
811 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
813 if (command
== PA_COMMAND_DELETE_PLAYBACK_STREAM
) {
814 struct playback_stream
*s
;
815 if (!(s
= pa_idxset_get_by_index(c
->output_streams
, channel
)) || (s
->type
!= PLAYBACK_STREAM
)) {
816 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
820 playback_stream_free(s
);
821 } else if (command
== PA_COMMAND_DELETE_RECORD_STREAM
) {
822 struct record_stream
*s
;
823 if (!(s
= pa_idxset_get_by_index(c
->record_streams
, channel
))) {
824 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
828 record_stream_free(s
);
830 struct upload_stream
*s
;
831 assert(command
== PA_COMMAND_DELETE_UPLOAD_STREAM
);
832 if (!(s
= pa_idxset_get_by_index(c
->output_streams
, channel
)) || (s
->type
!= UPLOAD_STREAM
)) {
833 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
837 upload_stream_free(s
);
840 pa_pstream_send_simple_ack(c
->pstream
, tag
);
843 static void command_create_record_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
844 struct connection
*c
= userdata
;
845 struct record_stream
*s
;
846 uint32_t maxlength
, fragment_size
;
847 uint32_t source_index
;
848 const char *name
, *source_name
;
852 pa_source
*source
= NULL
;
854 assert(c
&& t
&& c
->protocol
&& c
->protocol
->core
);
856 if (pa_tagstruct_gets(t
, &name
) < 0 ||
857 pa_tagstruct_get_sample_spec(t
, &ss
) < 0 ||
858 pa_tagstruct_get_channel_map(t
, &map
) < 0 ||
859 pa_tagstruct_getu32(t
, &source_index
) < 0 ||
860 pa_tagstruct_gets(t
, &source_name
) < 0 ||
861 pa_tagstruct_getu32(t
, &maxlength
) < 0 ||
862 pa_tagstruct_get_boolean(t
, &corked
) < 0 ||
863 pa_tagstruct_getu32(t
, &fragment_size
) < 0 ||
864 !pa_tagstruct_eof(t
)) {
869 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
870 CHECK_VALIDITY(c
->pstream
, name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
871 CHECK_VALIDITY(c
->pstream
, pa_sample_spec_valid(&ss
), tag
, PA_ERR_INVALID
);
872 CHECK_VALIDITY(c
->pstream
, pa_channel_map_valid(&map
), tag
, PA_ERR_INVALID
);
873 CHECK_VALIDITY(c
->pstream
, source_index
!= PA_INVALID_INDEX
|| !source_name
|| (*source_name
&& pa_utf8_valid(source_name
)), tag
, PA_ERR_INVALID
);
874 CHECK_VALIDITY(c
->pstream
, map
.channels
== ss
.channels
, tag
, PA_ERR_INVALID
);
875 CHECK_VALIDITY(c
->pstream
, maxlength
<= MAX_MEMBLOCKQ_LENGTH
, tag
, PA_ERR_INVALID
);
877 if (source_index
!= PA_INVALID_INDEX
) {
878 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, source_index
);
879 CHECK_VALIDITY(c
->pstream
, source
, tag
, PA_ERR_NOENTITY
);
880 } else if (source_name
) {
881 source
= pa_namereg_get(c
->protocol
->core
, source_name
, PA_NAMEREG_SOURCE
, 1);
882 CHECK_VALIDITY(c
->pstream
, source
, tag
, PA_ERR_NOENTITY
);
885 s
= record_stream_new(c
, source
, &ss
, &map
, name
, maxlength
, fragment_size
);
886 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_INVALID
);
888 pa_source_output_cork(s
->source_output
, corked
);
890 reply
= reply_new(tag
);
891 pa_tagstruct_putu32(reply
, s
->index
);
892 assert(s
->source_output
);
893 pa_tagstruct_putu32(reply
, s
->source_output
->index
);
895 if (c
->version
>= 9) {
896 /* Since 0.9 we support sending the buffer metrics back to the client */
898 pa_tagstruct_putu32(reply
, (uint32_t) pa_memblockq_get_maxlength(s
->memblockq
));
899 pa_tagstruct_putu32(reply
, (uint32_t) s
->fragment_size
);
902 pa_pstream_send_tagstruct(c
->pstream
, reply
);
905 static void command_exit(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
906 struct connection
*c
= userdata
;
909 if (!pa_tagstruct_eof(t
)) {
914 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
916 assert(c
->protocol
&& c
->protocol
->core
&& c
->protocol
->core
->mainloop
);
917 c
->protocol
->core
->mainloop
->quit(c
->protocol
->core
->mainloop
, 0);
918 pa_pstream_send_simple_ack(c
->pstream
, tag
); /* nonsense */
921 static void command_auth(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
922 struct connection
*c
= userdata
;
927 if (pa_tagstruct_getu32(t
, &c
->version
) < 0 ||
928 pa_tagstruct_get_arbitrary(t
, &cookie
, PA_NATIVE_COOKIE_LENGTH
) < 0 ||
929 !pa_tagstruct_eof(t
)) {
934 /* Minimum supported version */
935 if (c
->version
< 8) {
936 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_VERSION
);
940 if (!c
->authorized
) {
944 const pa_creds
*creds
;
946 if ((creds
= pa_pdispatch_creds(pd
))) {
947 if (creds
->uid
== getuid())
949 else if (c
->protocol
->auth_group
) {
953 if ((gid
= pa_get_gid_of_group(c
->protocol
->auth_group
)) == (gid_t
) -1)
954 pa_log_warn("failed to get GID of group '%s'", c
->protocol
->auth_group
);
955 else if (gid
== creds
->gid
)
959 if ((r
= pa_uid_in_group(creds
->uid
, c
->protocol
->auth_group
)) < 0)
960 pa_log_warn("failed to check group membership.");
966 pa_log_info("Got credentials: uid=%lu gid=%lu success=%i",
967 (unsigned long) creds
->uid
,
968 (unsigned long) creds
->gid
,
971 if (c
->version
>= 10 &&
972 pa_mempool_is_shared(c
->protocol
->core
->mempool
) &&
973 creds
->uid
== getuid()) {
975 pa_pstream_use_shm(c
->pstream
, 1);
976 pa_log_info("Enabled SHM for new connection");
982 if (!success
&& memcmp(c
->protocol
->auth_cookie
, cookie
, PA_NATIVE_COOKIE_LENGTH
) == 0)
986 pa_log_warn("Denied access to client with invalid authorization data.");
987 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_ACCESS
);
992 if (c
->auth_timeout_event
) {
993 c
->protocol
->core
->mainloop
->time_free(c
->auth_timeout_event
);
994 c
->auth_timeout_event
= NULL
;
998 reply
= reply_new(tag
);
999 pa_tagstruct_putu32(reply
, PA_PROTOCOL_VERSION
);
1003 /* SHM support is only enabled after both sides made sure they are the same user. */
1007 ucred
.uid
= getuid();
1008 ucred
.gid
= getgid();
1010 pa_pstream_send_tagstruct_with_creds(c
->pstream
, reply
, &ucred
);
1013 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1017 static void command_set_client_name(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1018 struct connection
*c
= userdata
;
1022 if (pa_tagstruct_gets(t
, &name
) < 0 ||
1023 !pa_tagstruct_eof(t
)) {
1028 CHECK_VALIDITY(c
->pstream
, name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
1030 pa_client_set_name(c
->client
, name
);
1031 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1034 static void command_lookup(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1035 struct connection
*c
= userdata
;
1037 uint32_t idx
= PA_IDXSET_INVALID
;
1040 if (pa_tagstruct_gets(t
, &name
) < 0 ||
1041 !pa_tagstruct_eof(t
)) {
1046 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1047 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
1049 if (command
== PA_COMMAND_LOOKUP_SINK
) {
1051 if ((sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1)))
1055 assert(command
== PA_COMMAND_LOOKUP_SOURCE
);
1056 if ((source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1)))
1057 idx
= source
->index
;
1060 if (idx
== PA_IDXSET_INVALID
)
1061 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1063 pa_tagstruct
*reply
;
1064 reply
= reply_new(tag
);
1065 pa_tagstruct_putu32(reply
, idx
);
1066 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1070 static void command_drain_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1071 struct connection
*c
= userdata
;
1073 struct playback_stream
*s
;
1076 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1077 !pa_tagstruct_eof(t
)) {
1082 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1083 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
1084 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1085 CHECK_VALIDITY(c
->pstream
, s
->type
== PLAYBACK_STREAM
, tag
, PA_ERR_NOENTITY
);
1087 s
->drain_request
= 0;
1089 pa_memblockq_prebuf_disable(s
->memblockq
);
1091 if (!pa_memblockq_is_readable(s
->memblockq
)) {
1092 /* pa_log("immediate drain: %u", pa_memblockq_get_length(s->memblockq)); */
1093 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1095 /* pa_log("slow drain triggered"); */
1096 s
->drain_request
= 1;
1099 pa_sink_notify(s
->sink_input
->sink
);
1103 static void command_stat(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1104 struct connection
*c
= userdata
;
1105 pa_tagstruct
*reply
;
1106 const pa_mempool_stat
*stat
;
1109 if (!pa_tagstruct_eof(t
)) {
1114 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1116 stat
= pa_mempool_get_stat(c
->protocol
->core
->mempool
);
1118 reply
= reply_new(tag
);
1119 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->n_allocated
));
1120 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->allocated_size
));
1121 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->n_accumulated
));
1122 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->accumulated_size
));
1123 pa_tagstruct_putu32(reply
, pa_scache_total_size(c
->protocol
->core
));
1124 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1127 static void command_get_playback_latency(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1128 struct connection
*c
= userdata
;
1129 pa_tagstruct
*reply
;
1130 struct playback_stream
*s
;
1131 struct timeval tv
, now
;
1136 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1137 pa_tagstruct_get_timeval(t
, &tv
) < 0 ||
1138 !pa_tagstruct_eof(t
)) {
1143 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1144 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
1145 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1146 CHECK_VALIDITY(c
->pstream
, s
->type
== PLAYBACK_STREAM
, tag
, PA_ERR_NOENTITY
);
1148 reply
= reply_new(tag
);
1150 latency
= pa_sink_get_latency(s
->sink_input
->sink
);
1151 if (s
->sink_input
->resampled_chunk
.memblock
)
1152 latency
+= pa_bytes_to_usec(s
->sink_input
->resampled_chunk
.length
, &s
->sink_input
->sample_spec
);
1153 pa_tagstruct_put_usec(reply
, latency
);
1155 pa_tagstruct_put_usec(reply
, 0);
1156 pa_tagstruct_put_boolean(reply
, s
->sink_input
->state
== PA_SINK_INPUT_RUNNING
);
1157 pa_tagstruct_put_timeval(reply
, &tv
);
1158 pa_tagstruct_put_timeval(reply
, pa_gettimeofday(&now
));
1159 pa_tagstruct_puts64(reply
, pa_memblockq_get_write_index(s
->memblockq
));
1160 pa_tagstruct_puts64(reply
, pa_memblockq_get_read_index(s
->memblockq
));
1161 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1164 static void command_get_record_latency(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1165 struct connection
*c
= userdata
;
1166 pa_tagstruct
*reply
;
1167 struct record_stream
*s
;
1168 struct timeval tv
, now
;
1172 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1173 pa_tagstruct_get_timeval(t
, &tv
) < 0 ||
1174 !pa_tagstruct_eof(t
)) {
1179 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1180 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
1181 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1183 reply
= reply_new(tag
);
1184 pa_tagstruct_put_usec(reply
, s
->source_output
->source
->monitor_of
? pa_sink_get_latency(s
->source_output
->source
->monitor_of
) : 0);
1185 pa_tagstruct_put_usec(reply
, pa_source_get_latency(s
->source_output
->source
));
1186 pa_tagstruct_put_boolean(reply
, 0);
1187 pa_tagstruct_put_timeval(reply
, &tv
);
1188 pa_tagstruct_put_timeval(reply
, pa_gettimeofday(&now
));
1189 pa_tagstruct_puts64(reply
, pa_memblockq_get_write_index(s
->memblockq
));
1190 pa_tagstruct_puts64(reply
, pa_memblockq_get_read_index(s
->memblockq
));
1191 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1194 static void command_create_upload_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1195 struct connection
*c
= userdata
;
1196 struct upload_stream
*s
;
1201 pa_tagstruct
*reply
;
1202 assert(c
&& t
&& c
->protocol
&& c
->protocol
->core
);
1204 if (pa_tagstruct_gets(t
, &name
) < 0 ||
1205 pa_tagstruct_get_sample_spec(t
, &ss
) < 0 ||
1206 pa_tagstruct_get_channel_map(t
, &map
) < 0 ||
1207 pa_tagstruct_getu32(t
, &length
) < 0 ||
1208 !pa_tagstruct_eof(t
)) {
1213 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1214 CHECK_VALIDITY(c
->pstream
, pa_sample_spec_valid(&ss
), tag
, PA_ERR_INVALID
);
1215 CHECK_VALIDITY(c
->pstream
, pa_channel_map_valid(&map
), tag
, PA_ERR_INVALID
);
1216 CHECK_VALIDITY(c
->pstream
, map
.channels
== ss
.channels
, tag
, PA_ERR_INVALID
);
1217 CHECK_VALIDITY(c
->pstream
, (length
% pa_frame_size(&ss
)) == 0 && length
> 0, tag
, PA_ERR_INVALID
);
1218 CHECK_VALIDITY(c
->pstream
, length
<= PA_SCACHE_ENTRY_SIZE_MAX
, tag
, PA_ERR_TOOLARGE
);
1219 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
1221 s
= upload_stream_new(c
, &ss
, &map
, name
, length
);
1222 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_INVALID
);
1224 reply
= reply_new(tag
);
1225 pa_tagstruct_putu32(reply
, s
->index
);
1226 pa_tagstruct_putu32(reply
, length
);
1227 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1230 static void command_finish_upload_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1231 struct connection
*c
= userdata
;
1233 struct upload_stream
*s
;
1237 if (pa_tagstruct_getu32(t
, &channel
) < 0 ||
1238 !pa_tagstruct_eof(t
)) {
1243 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1245 s
= pa_idxset_get_by_index(c
->output_streams
, channel
);
1246 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1247 CHECK_VALIDITY(c
->pstream
, s
->type
== UPLOAD_STREAM
, tag
, PA_ERR_NOENTITY
);
1249 if (pa_scache_add_item(c
->protocol
->core
, s
->name
, &s
->sample_spec
, &s
->channel_map
, &s
->memchunk
, &idx
) < 0)
1250 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INTERNAL
);
1252 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1254 upload_stream_free(s
);
1257 static void command_play_sample(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1258 struct connection
*c
= userdata
;
1259 uint32_t sink_index
;
1262 const char *name
, *sink_name
;
1265 if (pa_tagstruct_getu32(t
, &sink_index
) < 0 ||
1266 pa_tagstruct_gets(t
, &sink_name
) < 0 ||
1267 pa_tagstruct_getu32(t
, &volume
) < 0 ||
1268 pa_tagstruct_gets(t
, &name
) < 0 ||
1269 !pa_tagstruct_eof(t
)) {
1274 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1275 CHECK_VALIDITY(c
->pstream
, sink_index
!= PA_INVALID_INDEX
|| !sink_name
|| (*sink_name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
1276 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
1278 if (sink_index
!= PA_INVALID_INDEX
)
1279 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, sink_index
);
1281 sink
= pa_namereg_get(c
->protocol
->core
, sink_name
, PA_NAMEREG_SINK
, 1);
1283 CHECK_VALIDITY(c
->pstream
, sink
, tag
, PA_ERR_NOENTITY
);
1285 if (pa_scache_play_item(c
->protocol
->core
, name
, sink
, volume
) < 0) {
1286 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1290 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1293 static void command_remove_sample(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1294 struct connection
*c
= userdata
;
1298 if (pa_tagstruct_gets(t
, &name
) < 0 ||
1299 !pa_tagstruct_eof(t
)) {
1304 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1305 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
1307 if (pa_scache_remove_item(c
->protocol
->core
, name
) < 0) {
1308 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1312 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1315 static void sink_fill_tagstruct(pa_tagstruct
*t
, pa_sink
*sink
) {
1319 PA_TAG_U32
, sink
->index
,
1320 PA_TAG_STRING
, sink
->name
,
1321 PA_TAG_STRING
, sink
->description
,
1322 PA_TAG_SAMPLE_SPEC
, &sink
->sample_spec
,
1323 PA_TAG_CHANNEL_MAP
, &sink
->channel_map
,
1324 PA_TAG_U32
, sink
->owner
? sink
->owner
->index
: PA_INVALID_INDEX
,
1325 PA_TAG_CVOLUME
, pa_sink_get_volume(sink
, PA_MIXER_HARDWARE
),
1326 PA_TAG_BOOLEAN
, pa_sink_get_mute(sink
, PA_MIXER_HARDWARE
),
1327 PA_TAG_U32
, sink
->monitor_source
? sink
->monitor_source
->index
: PA_INVALID_INDEX
,
1328 PA_TAG_STRING
, sink
->monitor_source
? sink
->monitor_source
->name
: NULL
,
1329 PA_TAG_USEC
, pa_sink_get_latency(sink
),
1330 PA_TAG_STRING
, sink
->driver
,
1332 (sink
->get_hw_volume
? PA_SINK_HW_VOLUME_CTRL
: 0) |
1333 (sink
->get_latency
? PA_SINK_LATENCY
: 0) |
1334 (sink
->is_hardware
? PA_SINK_HARDWARE
: 0),
1338 static void source_fill_tagstruct(pa_tagstruct
*t
, pa_source
*source
) {
1339 assert(t
&& source
);
1342 PA_TAG_U32
, source
->index
,
1343 PA_TAG_STRING
, source
->name
,
1344 PA_TAG_STRING
, source
->description
,
1345 PA_TAG_SAMPLE_SPEC
, &source
->sample_spec
,
1346 PA_TAG_CHANNEL_MAP
, &source
->channel_map
,
1347 PA_TAG_U32
, source
->owner
? source
->owner
->index
: PA_INVALID_INDEX
,
1348 PA_TAG_CVOLUME
, pa_source_get_volume(source
, PA_MIXER_HARDWARE
),
1349 PA_TAG_BOOLEAN
, pa_source_get_mute(source
, PA_MIXER_HARDWARE
),
1350 PA_TAG_U32
, source
->monitor_of
? source
->monitor_of
->index
: PA_INVALID_INDEX
,
1351 PA_TAG_STRING
, source
->monitor_of
? source
->monitor_of
->name
: NULL
,
1352 PA_TAG_USEC
, pa_source_get_latency(source
),
1353 PA_TAG_STRING
, source
->driver
,
1355 (source
->get_hw_volume
? PA_SOURCE_HW_VOLUME_CTRL
: 0) |
1356 (source
->get_latency
? PA_SOURCE_LATENCY
: 0) |
1357 (source
->is_hardware
? PA_SOURCE_HARDWARE
: 0),
1361 static void client_fill_tagstruct(pa_tagstruct
*t
, pa_client
*client
) {
1362 assert(t
&& client
);
1363 pa_tagstruct_putu32(t
, client
->index
);
1364 pa_tagstruct_puts(t
, client
->name
);
1365 pa_tagstruct_putu32(t
, client
->owner
? client
->owner
->index
: PA_INVALID_INDEX
);
1366 pa_tagstruct_puts(t
, client
->driver
);
1369 static void module_fill_tagstruct(pa_tagstruct
*t
, pa_module
*module
) {
1370 assert(t
&& module
);
1371 pa_tagstruct_putu32(t
, module
->index
);
1372 pa_tagstruct_puts(t
, module
->name
);
1373 pa_tagstruct_puts(t
, module
->argument
);
1374 pa_tagstruct_putu32(t
, module
->n_used
);
1375 pa_tagstruct_put_boolean(t
, module
->auto_unload
);
1378 static void sink_input_fill_tagstruct(pa_tagstruct
*t
, pa_sink_input
*s
) {
1380 pa_tagstruct_putu32(t
, s
->index
);
1381 pa_tagstruct_puts(t
, s
->name
);
1382 pa_tagstruct_putu32(t
, s
->module
? s
->module
->index
: PA_INVALID_INDEX
);
1383 pa_tagstruct_putu32(t
, s
->client
? s
->client
->index
: PA_INVALID_INDEX
);
1384 pa_tagstruct_putu32(t
, s
->sink
->index
);
1385 pa_tagstruct_put_sample_spec(t
, &s
->sample_spec
);
1386 pa_tagstruct_put_channel_map(t
, &s
->channel_map
);
1387 pa_tagstruct_put_cvolume(t
, &s
->volume
);
1388 pa_tagstruct_put_usec(t
, pa_sink_input_get_latency(s
));
1389 pa_tagstruct_put_usec(t
, pa_sink_get_latency(s
->sink
));
1390 pa_tagstruct_puts(t
, pa_resample_method_to_string(pa_sink_input_get_resample_method(s
)));
1391 pa_tagstruct_puts(t
, s
->driver
);
1394 static void source_output_fill_tagstruct(pa_tagstruct
*t
, pa_source_output
*s
) {
1396 pa_tagstruct_putu32(t
, s
->index
);
1397 pa_tagstruct_puts(t
, s
->name
);
1398 pa_tagstruct_putu32(t
, s
->module
? s
->module
->index
: PA_INVALID_INDEX
);
1399 pa_tagstruct_putu32(t
, s
->client
? s
->client
->index
: PA_INVALID_INDEX
);
1400 pa_tagstruct_putu32(t
, s
->source
->index
);
1401 pa_tagstruct_put_sample_spec(t
, &s
->sample_spec
);
1402 pa_tagstruct_put_channel_map(t
, &s
->channel_map
);
1403 pa_tagstruct_put_usec(t
, pa_source_output_get_latency(s
));
1404 pa_tagstruct_put_usec(t
, pa_source_get_latency(s
->source
));
1405 pa_tagstruct_puts(t
, pa_resample_method_to_string(pa_source_output_get_resample_method(s
)));
1406 pa_tagstruct_puts(t
, s
->driver
);
1409 static void scache_fill_tagstruct(pa_tagstruct
*t
, pa_scache_entry
*e
) {
1411 pa_tagstruct_putu32(t
, e
->index
);
1412 pa_tagstruct_puts(t
, e
->name
);
1413 pa_tagstruct_put_cvolume(t
, &e
->volume
);
1414 pa_tagstruct_put_usec(t
, pa_bytes_to_usec(e
->memchunk
.length
, &e
->sample_spec
));
1415 pa_tagstruct_put_sample_spec(t
, &e
->sample_spec
);
1416 pa_tagstruct_put_channel_map(t
, &e
->channel_map
);
1417 pa_tagstruct_putu32(t
, e
->memchunk
.length
);
1418 pa_tagstruct_put_boolean(t
, e
->lazy
);
1419 pa_tagstruct_puts(t
, e
->filename
);
1422 static void command_get_info(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1423 struct connection
*c
= userdata
;
1425 pa_sink
*sink
= NULL
;
1426 pa_source
*source
= NULL
;
1427 pa_client
*client
= NULL
;
1428 pa_module
*module
= NULL
;
1429 pa_sink_input
*si
= NULL
;
1430 pa_source_output
*so
= NULL
;
1431 pa_scache_entry
*sce
= NULL
;
1433 pa_tagstruct
*reply
;
1436 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1437 (command
!= PA_COMMAND_GET_CLIENT_INFO
&&
1438 command
!= PA_COMMAND_GET_MODULE_INFO
&&
1439 command
!= PA_COMMAND_GET_SINK_INPUT_INFO
&&
1440 command
!= PA_COMMAND_GET_SOURCE_OUTPUT_INFO
&&
1441 pa_tagstruct_gets(t
, &name
) < 0) ||
1442 !pa_tagstruct_eof(t
)) {
1447 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1448 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
1450 if (command
== PA_COMMAND_GET_SINK_INFO
) {
1451 if (idx
!= PA_INVALID_INDEX
)
1452 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx
);
1454 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
1455 } else if (command
== PA_COMMAND_GET_SOURCE_INFO
) {
1456 if (idx
!= PA_INVALID_INDEX
)
1457 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx
);
1459 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
1460 } else if (command
== PA_COMMAND_GET_CLIENT_INFO
)
1461 client
= pa_idxset_get_by_index(c
->protocol
->core
->clients
, idx
);
1462 else if (command
== PA_COMMAND_GET_MODULE_INFO
)
1463 module
= pa_idxset_get_by_index(c
->protocol
->core
->modules
, idx
);
1464 else if (command
== PA_COMMAND_GET_SINK_INPUT_INFO
)
1465 si
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
1466 else if (command
== PA_COMMAND_GET_SOURCE_OUTPUT_INFO
)
1467 so
= pa_idxset_get_by_index(c
->protocol
->core
->source_outputs
, idx
);
1469 assert(command
== PA_COMMAND_GET_SAMPLE_INFO
);
1470 if (idx
!= PA_INVALID_INDEX
)
1471 sce
= pa_idxset_get_by_index(c
->protocol
->core
->scache
, idx
);
1473 sce
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SAMPLE
, 0);
1476 if (!sink
&& !source
&& !client
&& !module
&& !si
&& !so
&& !sce
) {
1477 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1481 reply
= reply_new(tag
);
1483 sink_fill_tagstruct(reply
, sink
);
1485 source_fill_tagstruct(reply
, source
);
1487 client_fill_tagstruct(reply
, client
);
1489 module_fill_tagstruct(reply
, module
);
1491 sink_input_fill_tagstruct(reply
, si
);
1493 source_output_fill_tagstruct(reply
, so
);
1495 scache_fill_tagstruct(reply
, sce
);
1496 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1499 static void command_get_info_list(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1500 struct connection
*c
= userdata
;
1504 pa_tagstruct
*reply
;
1507 if (!pa_tagstruct_eof(t
)) {
1512 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1514 reply
= reply_new(tag
);
1516 if (command
== PA_COMMAND_GET_SINK_INFO_LIST
)
1517 i
= c
->protocol
->core
->sinks
;
1518 else if (command
== PA_COMMAND_GET_SOURCE_INFO_LIST
)
1519 i
= c
->protocol
->core
->sources
;
1520 else if (command
== PA_COMMAND_GET_CLIENT_INFO_LIST
)
1521 i
= c
->protocol
->core
->clients
;
1522 else if (command
== PA_COMMAND_GET_MODULE_INFO_LIST
)
1523 i
= c
->protocol
->core
->modules
;
1524 else if (command
== PA_COMMAND_GET_SINK_INPUT_INFO_LIST
)
1525 i
= c
->protocol
->core
->sink_inputs
;
1526 else if (command
== PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST
)
1527 i
= c
->protocol
->core
->source_outputs
;
1529 assert(command
== PA_COMMAND_GET_SAMPLE_INFO_LIST
);
1530 i
= c
->protocol
->core
->scache
;
1534 for (p
= pa_idxset_first(i
, &idx
); p
; p
= pa_idxset_next(i
, &idx
)) {
1535 if (command
== PA_COMMAND_GET_SINK_INFO_LIST
)
1536 sink_fill_tagstruct(reply
, p
);
1537 else if (command
== PA_COMMAND_GET_SOURCE_INFO_LIST
)
1538 source_fill_tagstruct(reply
, p
);
1539 else if (command
== PA_COMMAND_GET_CLIENT_INFO_LIST
)
1540 client_fill_tagstruct(reply
, p
);
1541 else if (command
== PA_COMMAND_GET_MODULE_INFO_LIST
)
1542 module_fill_tagstruct(reply
, p
);
1543 else if (command
== PA_COMMAND_GET_SINK_INPUT_INFO_LIST
)
1544 sink_input_fill_tagstruct(reply
, p
);
1545 else if (command
== PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST
)
1546 source_output_fill_tagstruct(reply
, p
);
1548 assert(command
== PA_COMMAND_GET_SAMPLE_INFO_LIST
);
1549 scache_fill_tagstruct(reply
, p
);
1554 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1557 static void command_get_server_info(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1558 struct connection
*c
= userdata
;
1559 pa_tagstruct
*reply
;
1564 if (!pa_tagstruct_eof(t
)) {
1569 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1571 reply
= reply_new(tag
);
1572 pa_tagstruct_puts(reply
, PACKAGE_NAME
);
1573 pa_tagstruct_puts(reply
, PACKAGE_VERSION
);
1574 pa_tagstruct_puts(reply
, pa_get_user_name(txt
, sizeof(txt
)));
1575 pa_tagstruct_puts(reply
, pa_get_fqdn(txt
, sizeof(txt
)));
1576 pa_tagstruct_put_sample_spec(reply
, &c
->protocol
->core
->default_sample_spec
);
1578 n
= pa_namereg_get_default_sink_name(c
->protocol
->core
);
1579 pa_tagstruct_puts(reply
, n
);
1580 n
= pa_namereg_get_default_source_name(c
->protocol
->core
);
1581 pa_tagstruct_puts(reply
, n
);
1583 pa_tagstruct_putu32(reply
, c
->protocol
->core
->cookie
);
1585 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1588 static void subscription_cb(pa_core
*core
, pa_subscription_event_type_t e
, uint32_t idx
, void *userdata
) {
1590 struct connection
*c
= userdata
;
1593 t
= pa_tagstruct_new(NULL
, 0);
1594 pa_tagstruct_putu32(t
, PA_COMMAND_SUBSCRIBE_EVENT
);
1595 pa_tagstruct_putu32(t
, (uint32_t) -1);
1596 pa_tagstruct_putu32(t
, e
);
1597 pa_tagstruct_putu32(t
, idx
);
1598 pa_pstream_send_tagstruct(c
->pstream
, t
);
1601 static void command_subscribe(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1602 struct connection
*c
= userdata
;
1603 pa_subscription_mask_t m
;
1606 if (pa_tagstruct_getu32(t
, &m
) < 0 ||
1607 !pa_tagstruct_eof(t
)) {
1612 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1613 CHECK_VALIDITY(c
->pstream
, (m
& ~PA_SUBSCRIPTION_MASK_ALL
) == 0, tag
, PA_ERR_INVALID
);
1615 if (c
->subscription
)
1616 pa_subscription_free(c
->subscription
);
1619 c
->subscription
= pa_subscription_new(c
->protocol
->core
, m
, subscription_cb
, c
);
1620 assert(c
->subscription
);
1622 c
->subscription
= NULL
;
1624 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1627 static void command_set_volume(
1628 PA_GCC_UNUSED pa_pdispatch
*pd
,
1634 struct connection
*c
= userdata
;
1637 pa_sink
*sink
= NULL
;
1638 pa_source
*source
= NULL
;
1639 pa_sink_input
*si
= NULL
;
1640 const char *name
= NULL
;
1643 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1644 (command
== PA_COMMAND_SET_SINK_VOLUME
&& pa_tagstruct_gets(t
, &name
) < 0) ||
1645 (command
== PA_COMMAND_SET_SOURCE_VOLUME
&& pa_tagstruct_gets(t
, &name
) < 0) ||
1646 pa_tagstruct_get_cvolume(t
, &volume
) ||
1647 !pa_tagstruct_eof(t
)) {
1652 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1653 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
1654 CHECK_VALIDITY(c
->pstream
, pa_cvolume_valid(&volume
), tag
, PA_ERR_INVALID
);
1656 if (command
== PA_COMMAND_SET_SINK_VOLUME
) {
1657 if (idx
!= PA_INVALID_INDEX
)
1658 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx
);
1660 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
1661 } else if (command
== PA_COMMAND_SET_SOURCE_VOLUME
) {
1662 if (idx
!= (uint32_t) -1)
1663 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx
);
1665 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
1667 assert(command
== PA_COMMAND_SET_SINK_INPUT_VOLUME
);
1668 si
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
1671 CHECK_VALIDITY(c
->pstream
, si
|| sink
|| source
, tag
, PA_ERR_NOENTITY
);
1674 pa_sink_set_volume(sink
, PA_MIXER_HARDWARE
, &volume
);
1676 pa_source_set_volume(source
, PA_MIXER_HARDWARE
, &volume
);
1678 pa_sink_input_set_volume(si
, &volume
);
1680 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1683 static void command_set_mute(
1684 PA_GCC_UNUSED pa_pdispatch
*pd
,
1690 struct connection
*c
= userdata
;
1693 pa_sink
*sink
= NULL
;
1694 pa_source
*source
= NULL
;
1695 const char *name
= NULL
;
1698 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1699 pa_tagstruct_gets(t
, &name
) < 0 ||
1700 pa_tagstruct_get_boolean(t
, &mute
) ||
1701 !pa_tagstruct_eof(t
)) {
1706 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1707 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
1709 if (command
== PA_COMMAND_SET_SINK_MUTE
) {
1710 if (idx
!= PA_INVALID_INDEX
)
1711 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx
);
1713 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
1715 assert(command
== PA_COMMAND_SET_SOURCE_MUTE
);
1716 if (idx
!= (uint32_t) -1)
1717 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx
);
1719 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
1722 CHECK_VALIDITY(c
->pstream
, sink
|| source
, tag
, PA_ERR_NOENTITY
);
1725 pa_sink_set_mute(sink
, PA_MIXER_HARDWARE
, mute
);
1727 pa_source_set_mute(source
, PA_MIXER_HARDWARE
, mute
);
1729 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1732 static void command_cork_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1733 struct connection
*c
= userdata
;
1736 struct playback_stream
*s
, *ssync
;
1739 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1740 pa_tagstruct_get_boolean(t
, &b
) < 0 ||
1741 !pa_tagstruct_eof(t
)) {
1746 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1747 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
, tag
, PA_ERR_INVALID
);
1748 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
1749 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1750 CHECK_VALIDITY(c
->pstream
, s
->type
== PLAYBACK_STREAM
, tag
, PA_ERR_NOENTITY
);
1752 pa_sink_input_cork(s
->sink_input
, b
);
1753 pa_memblockq_prebuf_force(s
->memblockq
);
1755 /* Do the same for all other members in the sync group */
1756 for (ssync
= s
->prev
; ssync
; ssync
= ssync
->prev
) {
1757 pa_sink_input_cork(ssync
->sink_input
, b
);
1758 pa_memblockq_prebuf_force(ssync
->memblockq
);
1761 for (ssync
= s
->next
; ssync
; ssync
= ssync
->next
) {
1762 pa_sink_input_cork(ssync
->sink_input
, b
);
1763 pa_memblockq_prebuf_force(ssync
->memblockq
);
1766 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1769 static void command_flush_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1770 struct connection
*c
= userdata
;
1772 struct playback_stream
*s
, *ssync
;
1775 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1776 !pa_tagstruct_eof(t
)) {
1781 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1782 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
, tag
, PA_ERR_INVALID
);
1783 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
1784 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1785 CHECK_VALIDITY(c
->pstream
, s
->type
== PLAYBACK_STREAM
, tag
, PA_ERR_NOENTITY
);
1787 pa_memblockq_flush(s
->memblockq
);
1790 /* Do the same for all other members in the sync group */
1791 for (ssync
= s
->prev
; ssync
; ssync
= ssync
->prev
) {
1792 pa_memblockq_flush(ssync
->memblockq
);
1793 ssync
->underrun
= 0;
1796 for (ssync
= s
->next
; ssync
; ssync
= ssync
->next
) {
1797 pa_memblockq_flush(ssync
->memblockq
);
1798 ssync
->underrun
= 0;
1801 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1802 pa_sink_notify(s
->sink_input
->sink
);
1805 for (ssync
= s
->prev
; ssync
; ssync
= ssync
->prev
)
1806 request_bytes(ssync
);
1808 for (ssync
= s
->next
; ssync
; ssync
= ssync
->next
)
1809 request_bytes(ssync
);
1812 static void command_trigger_or_prebuf_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1813 struct connection
*c
= userdata
;
1815 struct playback_stream
*s
;
1818 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1819 !pa_tagstruct_eof(t
)) {
1824 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1825 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
, tag
, PA_ERR_INVALID
);
1826 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
1827 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1828 CHECK_VALIDITY(c
->pstream
, s
->type
== PLAYBACK_STREAM
, tag
, PA_ERR_NOENTITY
);
1831 case PA_COMMAND_PREBUF_PLAYBACK_STREAM
:
1832 pa_memblockq_prebuf_force(s
->memblockq
);
1835 case PA_COMMAND_TRIGGER_PLAYBACK_STREAM
:
1836 pa_memblockq_prebuf_disable(s
->memblockq
);
1843 pa_sink_notify(s
->sink_input
->sink
);
1844 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1848 static void command_cork_record_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1849 struct connection
*c
= userdata
;
1851 struct record_stream
*s
;
1855 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1856 pa_tagstruct_get_boolean(t
, &b
) < 0 ||
1857 !pa_tagstruct_eof(t
)) {
1862 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1863 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
1864 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1866 pa_source_output_cork(s
->source_output
, b
);
1867 pa_memblockq_prebuf_force(s
->memblockq
);
1868 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1871 static void command_flush_record_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1872 struct connection
*c
= userdata
;
1874 struct record_stream
*s
;
1877 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1878 !pa_tagstruct_eof(t
)) {
1883 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1884 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
1885 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1887 pa_memblockq_flush(s
->memblockq
);
1888 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1891 static void command_set_default_sink_or_source(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1892 struct connection
*c
= userdata
;
1896 if (pa_tagstruct_gets(t
, &s
) < 0 ||
1897 !pa_tagstruct_eof(t
)) {
1902 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1903 CHECK_VALIDITY(c
->pstream
, !s
|| (*s
&& pa_utf8_valid(s
)), tag
, PA_ERR_INVALID
);
1905 pa_namereg_set_default(c
->protocol
->core
, s
, command
== PA_COMMAND_SET_DEFAULT_SOURCE
? PA_NAMEREG_SOURCE
: PA_NAMEREG_SINK
);
1906 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1909 static void command_set_stream_name(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1910 struct connection
*c
= userdata
;
1915 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1916 pa_tagstruct_gets(t
, &name
) < 0 ||
1917 !pa_tagstruct_eof(t
)) {
1922 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1923 CHECK_VALIDITY(c
->pstream
, name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
1925 if (command
== PA_COMMAND_SET_PLAYBACK_STREAM_NAME
) {
1926 struct playback_stream
*s
;
1928 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
1929 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1930 CHECK_VALIDITY(c
->pstream
, s
->type
== PLAYBACK_STREAM
, tag
, PA_ERR_NOENTITY
);
1932 pa_sink_input_set_name(s
->sink_input
, name
);
1935 struct record_stream
*s
;
1937 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
1938 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1940 pa_source_output_set_name(s
->source_output
, name
);
1943 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1946 static void command_kill(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1947 struct connection
*c
= userdata
;
1951 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
1952 !pa_tagstruct_eof(t
)) {
1957 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1959 if (command
== PA_COMMAND_KILL_CLIENT
) {
1962 client
= pa_idxset_get_by_index(c
->protocol
->core
->clients
, idx
);
1963 CHECK_VALIDITY(c
->pstream
, client
, tag
, PA_ERR_NOENTITY
);
1964 pa_client_kill(client
);
1966 } else if (command
== PA_COMMAND_KILL_SINK_INPUT
) {
1969 s
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
1970 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1972 pa_sink_input_kill(s
);
1974 pa_source_output
*s
;
1976 assert(command
== PA_COMMAND_KILL_SOURCE_OUTPUT
);
1978 s
= pa_idxset_get_by_index(c
->protocol
->core
->source_outputs
, idx
);
1979 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
1981 pa_source_output_kill(s
);
1984 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1987 static void command_load_module(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1988 struct connection
*c
= userdata
;
1990 const char *name
, *argument
;
1991 pa_tagstruct
*reply
;
1994 if (pa_tagstruct_gets(t
, &name
) < 0 ||
1995 pa_tagstruct_gets(t
, &argument
) < 0 ||
1996 !pa_tagstruct_eof(t
)) {
2001 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2002 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
) && !strchr(name
, '/'), tag
, PA_ERR_INVALID
);
2003 CHECK_VALIDITY(c
->pstream
, !argument
|| pa_utf8_valid(argument
), tag
, PA_ERR_INVALID
);
2005 if (!(m
= pa_module_load(c
->protocol
->core
, name
, argument
))) {
2006 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_MODINITFAILED
);
2010 reply
= reply_new(tag
);
2011 pa_tagstruct_putu32(reply
, m
->index
);
2012 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2015 static void command_unload_module(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2016 struct connection
*c
= userdata
;
2021 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2022 !pa_tagstruct_eof(t
)) {
2027 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2028 m
= pa_idxset_get_by_index(c
->protocol
->core
->modules
, idx
);
2029 CHECK_VALIDITY(c
->pstream
, m
, tag
, PA_ERR_NOENTITY
);
2031 pa_module_unload_request(m
);
2032 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2035 static void command_add_autoload(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2036 struct connection
*c
= userdata
;
2037 const char *name
, *module
, *argument
;
2040 pa_tagstruct
*reply
;
2043 if (pa_tagstruct_gets(t
, &name
) < 0 ||
2044 pa_tagstruct_getu32(t
, &type
) < 0 ||
2045 pa_tagstruct_gets(t
, &module
) < 0 ||
2046 pa_tagstruct_gets(t
, &argument
) < 0 ||
2047 !pa_tagstruct_eof(t
)) {
2052 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2053 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
2054 CHECK_VALIDITY(c
->pstream
, type
== 0 || type
== 1, tag
, PA_ERR_INVALID
);
2055 CHECK_VALIDITY(c
->pstream
, module
&& *module
&& pa_utf8_valid(module
), tag
, PA_ERR_INVALID
);
2056 CHECK_VALIDITY(c
->pstream
, !argument
|| pa_utf8_valid(argument
), tag
, PA_ERR_INVALID
);
2058 if (pa_autoload_add(c
->protocol
->core
, name
, type
== 0 ? PA_NAMEREG_SINK
: PA_NAMEREG_SOURCE
, module
, argument
, &idx
) < 0) {
2059 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
2063 reply
= reply_new(tag
);
2064 pa_tagstruct_putu32(reply
, idx
);
2065 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2068 static void command_remove_autoload(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2069 struct connection
*c
= userdata
;
2070 const char *name
= NULL
;
2071 uint32_t type
, idx
= PA_IDXSET_INVALID
;
2075 if ((pa_tagstruct_getu32(t
, &idx
) < 0 &&
2076 (pa_tagstruct_gets(t
, &name
) < 0 ||
2077 pa_tagstruct_getu32(t
, &type
) < 0)) ||
2078 !pa_tagstruct_eof(t
)) {
2083 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2084 CHECK_VALIDITY(c
->pstream
, name
|| idx
!= PA_IDXSET_INVALID
, tag
, PA_ERR_INVALID
);
2085 CHECK_VALIDITY(c
->pstream
, !name
|| (*name
&& pa_utf8_valid(name
) && (type
== 0 || type
== 1)), tag
, PA_ERR_INVALID
);
2088 r
= pa_autoload_remove_by_name(c
->protocol
->core
, name
, type
== 0 ? PA_NAMEREG_SINK
: PA_NAMEREG_SOURCE
);
2090 r
= pa_autoload_remove_by_index(c
->protocol
->core
, idx
);
2092 CHECK_VALIDITY(c
->pstream
, r
>= 0, tag
, PA_ERR_NOENTITY
);
2094 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2097 static void autoload_fill_tagstruct(pa_tagstruct
*t
, const pa_autoload_entry
*e
) {
2100 pa_tagstruct_putu32(t
, e
->index
);
2101 pa_tagstruct_puts(t
, e
->name
);
2102 pa_tagstruct_putu32(t
, e
->type
== PA_NAMEREG_SINK
? 0 : 1);
2103 pa_tagstruct_puts(t
, e
->module
);
2104 pa_tagstruct_puts(t
, e
->argument
);
2107 static void command_get_autoload_info(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2108 struct connection
*c
= userdata
;
2109 const pa_autoload_entry
*a
= NULL
;
2112 pa_tagstruct
*reply
;
2115 if ((pa_tagstruct_getu32(t
, &idx
) < 0 &&
2116 (pa_tagstruct_gets(t
, &name
) < 0 ||
2117 pa_tagstruct_getu32(t
, &type
) < 0)) ||
2118 !pa_tagstruct_eof(t
)) {
2123 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2124 CHECK_VALIDITY(c
->pstream
, name
|| idx
!= PA_IDXSET_INVALID
, tag
, PA_ERR_INVALID
);
2125 CHECK_VALIDITY(c
->pstream
, !name
|| (*name
&& (type
== 0 || type
== 1) && pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
2128 a
= pa_autoload_get_by_name(c
->protocol
->core
, name
, type
== 0 ? PA_NAMEREG_SINK
: PA_NAMEREG_SOURCE
);
2130 a
= pa_autoload_get_by_index(c
->protocol
->core
, idx
);
2132 CHECK_VALIDITY(c
->pstream
, a
, tag
, PA_ERR_NOENTITY
);
2134 reply
= reply_new(tag
);
2135 autoload_fill_tagstruct(reply
, a
);
2136 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2139 static void command_get_autoload_info_list(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2140 struct connection
*c
= userdata
;
2141 pa_tagstruct
*reply
;
2144 if (!pa_tagstruct_eof(t
)) {
2149 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2151 reply
= reply_new(tag
);
2153 if (c
->protocol
->core
->autoload_hashmap
) {
2154 pa_autoload_entry
*a
;
2157 while ((a
= pa_hashmap_iterate(c
->protocol
->core
->autoload_hashmap
, &state
, NULL
)))
2158 autoload_fill_tagstruct(reply
, a
);
2161 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2164 static void command_move_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2165 struct connection
*c
= userdata
;
2166 uint32_t idx
= PA_INVALID_INDEX
, idx_device
= PA_INVALID_INDEX
;
2167 const char *name
= NULL
;
2172 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2173 pa_tagstruct_getu32(t
, &idx_device
) < 0 ||
2174 pa_tagstruct_gets(t
, &name
) < 0 ||
2175 !pa_tagstruct_eof(t
)) {
2180 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2181 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
, tag
, PA_ERR_INVALID
);
2182 CHECK_VALIDITY(c
->pstream
, idx_device
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
2184 if (command
== PA_COMMAND_MOVE_SINK_INPUT
) {
2185 pa_sink_input
*si
= NULL
;
2186 pa_sink
*sink
= NULL
;
2188 si
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
2190 if (idx_device
!= PA_INVALID_INDEX
)
2191 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx_device
);
2193 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
2195 CHECK_VALIDITY(c
->pstream
, si
&& sink
, tag
, PA_ERR_NOENTITY
);
2197 if (pa_sink_input_move_to(si
, sink
, 0) < 0) {
2198 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
2202 pa_source_output
*so
= NULL
;
2205 so
= pa_idxset_get_by_index(c
->protocol
->core
->source_outputs
, idx
);
2207 if (idx_device
!= PA_INVALID_INDEX
)
2208 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx_device
);
2210 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
2212 CHECK_VALIDITY(c
->pstream
, so
&& source
, tag
, PA_ERR_NOENTITY
);
2214 if (pa_source_output_move_to(so
, source
) < 0) {
2215 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
2220 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2224 /*** pstream callbacks ***/
2226 static void pstream_packet_callback(pa_pstream
*p
, pa_packet
*packet
, const pa_creds
*creds
, void *userdata
) {
2227 struct connection
*c
= userdata
;
2228 assert(p
&& packet
&& packet
->data
&& c
);
2230 if (pa_pdispatch_run(c
->pdispatch
, packet
, creds
, c
) < 0) {
2231 pa_log("invalid packet.");
2236 static void pstream_memblock_callback(pa_pstream
*p
, uint32_t channel
, int64_t offset
, pa_seek_mode_t seek
, const pa_memchunk
*chunk
, void *userdata
) {
2237 struct connection
*c
= userdata
;
2238 struct output_stream
*stream
;
2239 assert(p
&& chunk
&& userdata
);
2241 if (!(stream
= pa_idxset_get_by_index(c
->output_streams
, channel
))) {
2242 pa_log("client sent block for invalid stream.");
2247 if (stream
->type
== PLAYBACK_STREAM
) {
2248 struct playback_stream
*ps
= (struct playback_stream
*) stream
;
2249 if (chunk
->length
>= ps
->requested_bytes
)
2250 ps
->requested_bytes
= 0;
2252 ps
->requested_bytes
-= chunk
->length
;
2254 pa_memblockq_seek(ps
->memblockq
, offset
, seek
);
2256 if (pa_memblockq_push_align(ps
->memblockq
, chunk
) < 0) {
2259 pa_log_warn("failed to push data into queue");
2261 /* Pushing this block into the queue failed, so we simulate
2262 * it by skipping ahead */
2264 pa_memblockq_seek(ps
->memblockq
, chunk
->length
, PA_SEEK_RELATIVE
);
2266 /* Notify the user */
2267 t
= pa_tagstruct_new(NULL
, 0);
2268 pa_tagstruct_putu32(t
, PA_COMMAND_OVERFLOW
);
2269 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
2270 pa_tagstruct_putu32(t
, ps
->index
);
2271 pa_pstream_send_tagstruct(p
, t
);
2276 pa_sink_notify(ps
->sink_input
->sink
);
2279 struct upload_stream
*u
= (struct upload_stream
*) stream
;
2281 assert(u
->type
== UPLOAD_STREAM
);
2283 if (!u
->memchunk
.memblock
) {
2284 if (u
->length
== chunk
->length
) {
2285 u
->memchunk
= *chunk
;
2286 pa_memblock_ref(u
->memchunk
.memblock
);
2289 u
->memchunk
.memblock
= pa_memblock_new(c
->protocol
->core
->mempool
, u
->length
);
2290 u
->memchunk
.index
= u
->memchunk
.length
= 0;
2294 assert(u
->memchunk
.memblock
);
2297 if (l
> chunk
->length
)
2301 memcpy((uint8_t*) u
->memchunk
.memblock
->data
+ u
->memchunk
.index
+ u
->memchunk
.length
,
2302 (uint8_t*) chunk
->memblock
->data
+chunk
->index
, l
);
2303 u
->memchunk
.length
+= l
;
2309 static void pstream_die_callback(pa_pstream
*p
, void *userdata
) {
2310 struct connection
*c
= userdata
;
2314 /* pa_log("connection died.");*/
2318 static void pstream_drain_callback(pa_pstream
*p
, void *userdata
) {
2319 struct connection
*c
= userdata
;
2325 /*** client callbacks ***/
2327 static void client_kill_cb(pa_client
*c
) {
2328 assert(c
&& c
->userdata
);
2329 connection_free(c
->userdata
);
2332 /*** socket server callbacks ***/
2334 static void auth_timeout(pa_mainloop_api
*m
, pa_time_event
*e
, const struct timeval
*tv
, void *userdata
) {
2335 struct connection
*c
= userdata
;
2336 assert(m
&& tv
&& c
&& c
->auth_timeout_event
== e
);
2342 static void on_connection(PA_GCC_UNUSED pa_socket_server
*s
, pa_iochannel
*io
, void *userdata
) {
2343 pa_protocol_native
*p
= userdata
;
2344 struct connection
*c
;
2345 char cname
[256], pname
[128];
2348 if (pa_idxset_size(p
->connections
)+1 > MAX_CONNECTIONS
) {
2349 pa_log_warn("Warning! Too many connections (%u), dropping incoming connection.", MAX_CONNECTIONS
);
2350 pa_iochannel_free(io
);
2354 c
= pa_xmalloc(sizeof(struct connection
));
2356 c
->authorized
= !!p
->public;
2358 if (!c
->authorized
&& p
->auth_ip_acl
&& pa_ip_acl_check(p
->auth_ip_acl
, pa_iochannel_get_recv_fd(io
)) > 0) {
2359 pa_log_info("Client authenticated by IP ACL.");
2363 if (!c
->authorized
) {
2365 pa_gettimeofday(&tv
);
2366 tv
.tv_sec
+= AUTH_TIMEOUT
;
2367 c
->auth_timeout_event
= p
->core
->mainloop
->time_new(p
->core
->mainloop
, &tv
, auth_timeout
, c
);
2369 c
->auth_timeout_event
= NULL
;
2373 pa_iochannel_socket_peer_to_string(io
, pname
, sizeof(pname
));
2374 snprintf(cname
, sizeof(cname
), "Native client (%s)", pname
);
2376 c
->client
= pa_client_new(p
->core
, __FILE__
, cname
);
2378 c
->client
->kill
= client_kill_cb
;
2379 c
->client
->userdata
= c
;
2380 c
->client
->owner
= p
->module
;
2382 c
->pstream
= pa_pstream_new(p
->core
->mainloop
, io
, p
->core
->mempool
);
2385 pa_pstream_set_recieve_packet_callback(c
->pstream
, pstream_packet_callback
, c
);
2386 pa_pstream_set_recieve_memblock_callback(c
->pstream
, pstream_memblock_callback
, c
);
2387 pa_pstream_set_die_callback(c
->pstream
, pstream_die_callback
, c
);
2388 pa_pstream_set_drain_callback(c
->pstream
, pstream_drain_callback
, c
);
2390 c
->pdispatch
= pa_pdispatch_new(p
->core
->mainloop
, command_table
, PA_COMMAND_MAX
);
2391 assert(c
->pdispatch
);
2393 c
->record_streams
= pa_idxset_new(NULL
, NULL
);
2394 c
->output_streams
= pa_idxset_new(NULL
, NULL
);
2395 assert(c
->record_streams
&& c
->output_streams
);
2397 c
->rrobin_index
= PA_IDXSET_INVALID
;
2398 c
->subscription
= NULL
;
2400 pa_idxset_put(p
->connections
, c
, NULL
);
2404 if (pa_iochannel_creds_supported(io
))
2405 pa_iochannel_creds_enable(io
);
2410 /*** module entry points ***/
2412 static int load_key(pa_protocol_native
*p
, const char*fn
) {
2415 p
->auth_cookie_in_property
= 0;
2417 if (!fn
&& pa_authkey_prop_get(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
, p
->auth_cookie
, sizeof(p
->auth_cookie
)) >= 0) {
2418 pa_log_info("using already loaded auth cookie.");
2419 pa_authkey_prop_ref(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
);
2420 p
->auth_cookie_in_property
= 1;
2425 fn
= PA_NATIVE_COOKIE_FILE
;
2427 if (pa_authkey_load_auto(fn
, p
->auth_cookie
, sizeof(p
->auth_cookie
)) < 0)
2430 pa_log_info("loading cookie from disk.");
2432 if (pa_authkey_prop_put(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
, p
->auth_cookie
, sizeof(p
->auth_cookie
)) >= 0)
2433 p
->auth_cookie_in_property
= 1;
2438 static pa_protocol_native
* protocol_new_internal(pa_core
*c
, pa_module
*m
, pa_modargs
*ma
) {
2439 pa_protocol_native
*p
;
2446 if (pa_modargs_get_value_boolean(ma
, "auth-anonymous", &public) < 0) {
2447 pa_log("auth-anonymous= expects a boolean argument.");
2451 p
= pa_xnew(pa_protocol_native
, 1);
2456 p
->auth_ip_acl
= NULL
;
2461 if (pa_modargs_get_value_boolean(ma
, "auth-group-enabled", &a
) < 0) {
2462 pa_log("auth-group-enabled= expects a boolean argument.");
2465 p
->auth_group
= a
? pa_xstrdup(pa_modargs_get_value(ma
, "auth-group", c
->is_system_instance
? PA_ACCESS_GROUP
: NULL
)) : NULL
;
2468 pa_log_info("Allowing access to group '%s'.", p
->auth_group
);
2473 if ((acl
= pa_modargs_get_value(ma
, "auth-ip-acl", NULL
))) {
2475 if (!(p
->auth_ip_acl
= pa_ip_acl_new(acl
))) {
2476 pa_log("Failed to parse IP ACL '%s'", acl
);
2481 if (load_key(p
, pa_modargs_get_value(ma
, "cookie", NULL
)) < 0)
2484 p
->connections
= pa_idxset_new(NULL
, NULL
);
2485 assert(p
->connections
);
2491 pa_xfree(p
->auth_group
);
2494 pa_ip_acl_free(p
->auth_ip_acl
);
2499 pa_protocol_native
* pa_protocol_native_new(pa_core
*core
, pa_socket_server
*server
, pa_module
*m
, pa_modargs
*ma
) {
2501 pa_protocol_native
*p
;
2503 if (!(p
= protocol_new_internal(core
, m
, ma
)))
2507 pa_socket_server_set_callback(p
->server
, on_connection
, p
);
2509 if (pa_socket_server_get_address(p
->server
, t
, sizeof(t
))) {
2511 l
= pa_property_get(core
, PA_NATIVE_SERVER_PROPERTY_NAME
);
2512 l
= pa_strlist_prepend(l
, t
);
2513 pa_property_replace(core
, PA_NATIVE_SERVER_PROPERTY_NAME
, l
);
2519 void pa_protocol_native_free(pa_protocol_native
*p
) {
2520 struct connection
*c
;
2523 while ((c
= pa_idxset_first(p
->connections
, NULL
)))
2525 pa_idxset_free(p
->connections
, NULL
, NULL
);
2530 if (pa_socket_server_get_address(p
->server
, t
, sizeof(t
))) {
2532 l
= pa_property_get(p
->core
, PA_NATIVE_SERVER_PROPERTY_NAME
);
2533 l
= pa_strlist_remove(l
, t
);
2536 pa_property_replace(p
->core
, PA_NATIVE_SERVER_PROPERTY_NAME
, l
);
2538 pa_property_remove(p
->core
, PA_NATIVE_SERVER_PROPERTY_NAME
);
2541 pa_socket_server_unref(p
->server
);
2544 if (p
->auth_cookie_in_property
)
2545 pa_authkey_prop_unref(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
);
2548 pa_ip_acl_free(p
->auth_ip_acl
);
2551 pa_xfree(p
->auth_group
);
2556 pa_protocol_native
* pa_protocol_native_new_iochannel(pa_core
*core
, pa_iochannel
*io
, pa_module
*m
, pa_modargs
*ma
) {
2557 pa_protocol_native
*p
;
2559 if (!(p
= protocol_new_internal(core
, m
, ma
)))
2562 on_connection(NULL
, io
, p
);