4 This file is part of PulseAudio.
6 Copyright 2004-2006 Lennart Poettering
7 Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB
9 PulseAudio is free software; you can redistribute it and/or modify
10 it under the terms of the GNU Lesser General Public License as published
11 by the Free Software Foundation; either version 2 of the License,
12 or (at your option) any later version.
14 PulseAudio is distributed in the hope that it will be useful, but
15 WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 General Public License for more details.
19 You should have received a copy of the GNU Lesser General Public License
20 along with PulseAudio; if not, write to the Free Software
21 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
34 #include <pulse/timeval.h>
35 #include <pulse/version.h>
36 #include <pulse/utf8.h>
37 #include <pulse/util.h>
38 #include <pulse/xmalloc.h>
40 #include <pulsecore/native-common.h>
41 #include <pulsecore/packet.h>
42 #include <pulsecore/client.h>
43 #include <pulsecore/source-output.h>
44 #include <pulsecore/sink-input.h>
45 #include <pulsecore/pstream.h>
46 #include <pulsecore/tagstruct.h>
47 #include <pulsecore/pdispatch.h>
48 #include <pulsecore/pstream-util.h>
49 #include <pulsecore/authkey.h>
50 #include <pulsecore/namereg.h>
51 #include <pulsecore/core-scache.h>
52 #include <pulsecore/core-subscribe.h>
53 #include <pulsecore/log.h>
54 #include <pulsecore/autoload.h>
55 #include <pulsecore/authkey-prop.h>
56 #include <pulsecore/strlist.h>
57 #include <pulsecore/props.h>
58 #include <pulsecore/sample-util.h>
59 #include <pulsecore/llist.h>
60 #include <pulsecore/creds.h>
61 #include <pulsecore/core-util.h>
62 #include <pulsecore/ipacl.h>
63 #include <pulsecore/thread-mq.h>
65 #include "protocol-native.h"
67 /* Kick a client if it doesn't authenticate within this time */
68 #define AUTH_TIMEOUT 60
70 /* Don't accept more connection than this */
71 #define MAX_CONNECTIONS 64
73 #define MAX_MEMBLOCKQ_LENGTH (4*1024*1024) /* 4MB */
74 #define DEFAULT_TLENGTH_MSEC 2000 /* 2s */
75 #define DEFAULT_PROCESS_MSEC 20 /* 20ms */
76 #define DEFAULT_FRAGSIZE_MSEC DEFAULT_TLENGTH_MSEC
78 typedef struct connection connection
;
79 struct pa_protocol_native
;
81 typedef struct record_stream
{
84 connection
*connection
;
87 pa_source_output
*source_output
;
88 pa_memblockq
*memblockq
;
90 pa_usec_t source_latency
;
93 typedef struct output_stream
{
97 typedef struct playback_stream
{
100 connection
*connection
;
103 pa_sink_input
*sink_input
;
104 pa_memblockq
*memblockq
;
105 pa_bool_t drain_request
;
108 uint64_t underrun
; /* length of underrun */
112 pa_usec_t sink_latency
;
114 /* Only updated after SINK_INPUT_MESSAGE_UPDATE_LATENCY */
115 int64_t read_index
, write_index
;
116 size_t render_memblockq_length
;
119 typedef struct upload_stream
{
120 output_stream parent
;
122 connection
*connection
;
125 pa_memchunk memchunk
;
128 pa_sample_spec sample_spec
;
129 pa_channel_map channel_map
;
130 pa_proplist
*proplist
;
136 pa_bool_t authorized
;
138 pa_protocol_native
*protocol
;
141 pa_pdispatch
*pdispatch
;
142 pa_idxset
*record_streams
, *output_streams
;
143 uint32_t rrobin_index
;
144 pa_subscription
*subscription
;
145 pa_time_event
*auth_timeout_event
;
148 PA_DECLARE_CLASS(record_stream
);
149 #define RECORD_STREAM(o) (record_stream_cast(o))
150 static PA_DEFINE_CHECK_TYPE(record_stream
, pa_msgobject
);
152 PA_DECLARE_CLASS(output_stream
);
153 #define OUTPUT_STREAM(o) (output_stream_cast(o))
154 static PA_DEFINE_CHECK_TYPE(output_stream
, pa_msgobject
);
156 PA_DECLARE_CLASS(playback_stream
);
157 #define PLAYBACK_STREAM(o) (playback_stream_cast(o))
158 static PA_DEFINE_CHECK_TYPE(playback_stream
, output_stream
);
160 PA_DECLARE_CLASS(upload_stream
);
161 #define UPLOAD_STREAM(o) (upload_stream_cast(o))
162 static PA_DEFINE_CHECK_TYPE(upload_stream
, output_stream
);
164 PA_DECLARE_CLASS(connection
);
165 #define CONNECTION(o) (connection_cast(o))
166 static PA_DEFINE_CHECK_TYPE(connection
, pa_msgobject
);
168 struct pa_protocol_native
{
172 pa_socket_server
*server
;
173 pa_idxset
*connections
;
174 uint8_t auth_cookie
[PA_NATIVE_COOKIE_LENGTH
];
175 pa_bool_t auth_cookie_in_property
;
179 pa_ip_acl
*auth_ip_acl
;
183 SINK_INPUT_MESSAGE_POST_DATA
= PA_SINK_INPUT_MESSAGE_MAX
, /* data from main loop to sink input */
184 SINK_INPUT_MESSAGE_DRAIN
, /* disabled prebuf, get playback started. */
185 SINK_INPUT_MESSAGE_FLUSH
,
186 SINK_INPUT_MESSAGE_TRIGGER
,
187 SINK_INPUT_MESSAGE_SEEK
,
188 SINK_INPUT_MESSAGE_PREBUF_FORCE
,
189 SINK_INPUT_MESSAGE_UPDATE_LATENCY
193 PLAYBACK_STREAM_MESSAGE_REQUEST_DATA
, /* data requested from sink input from the main loop */
194 PLAYBACK_STREAM_MESSAGE_UNDERFLOW
,
195 PLAYBACK_STREAM_MESSAGE_OVERFLOW
,
196 PLAYBACK_STREAM_MESSAGE_DRAIN_ACK
200 RECORD_STREAM_MESSAGE_POST_DATA
/* data from source output to main loop */
204 CONNECTION_MESSAGE_RELEASE
,
205 CONNECTION_MESSAGE_REVOKE
208 static int sink_input_pop_cb(pa_sink_input
*i
, size_t length
, pa_memchunk
*chunk
);
209 static void sink_input_kill_cb(pa_sink_input
*i
);
210 static void sink_input_suspend_cb(pa_sink_input
*i
, pa_bool_t suspend
);
211 static void sink_input_moved_cb(pa_sink_input
*i
);
212 static void sink_input_process_rewind_cb(pa_sink_input
*i
, size_t nbytes
);
213 static void sink_input_update_max_rewind_cb(pa_sink_input
*i
, size_t nbytes
);
216 static void send_memblock(connection
*c
);
217 static void request_bytes(struct playback_stream
*s
);
219 static void source_output_kill_cb(pa_source_output
*o
);
220 static void source_output_push_cb(pa_source_output
*o
, const pa_memchunk
*chunk
);
221 static void source_output_suspend_cb(pa_source_output
*o
, pa_bool_t suspend
);
222 static void source_output_moved_cb(pa_source_output
*o
);
223 static pa_usec_t
source_output_get_latency_cb(pa_source_output
*o
);
225 static int sink_input_process_msg(pa_msgobject
*o
, int code
, void *userdata
, int64_t offset
, pa_memchunk
*chunk
);
227 static void command_exit(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
228 static void command_create_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
229 static void command_drain_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
230 static void command_create_record_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
231 static void command_delete_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
232 static void command_auth(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
233 static void command_set_client_name(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
234 static void command_lookup(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
235 static void command_stat(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
236 static void command_get_playback_latency(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
237 static void command_get_record_latency(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
238 static void command_create_upload_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
239 static void command_finish_upload_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
240 static void command_play_sample(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
241 static void command_remove_sample(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
242 static void command_get_info(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
243 static void command_get_info_list(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
244 static void command_get_server_info(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
245 static void command_subscribe(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
246 static void command_set_volume(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
247 static void command_set_mute(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
248 static void command_cork_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
249 static void command_trigger_or_flush_or_prebuf_playback_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
250 static void command_set_default_sink_or_source(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
251 static void command_set_stream_name(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
252 static void command_kill(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
253 static void command_load_module(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
254 static void command_unload_module(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
255 static void command_add_autoload(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
256 static void command_remove_autoload(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
257 static void command_get_autoload_info(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
258 static void command_get_autoload_info_list(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
259 static void command_cork_record_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
260 static void command_flush_record_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
261 static void command_move_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
262 static void command_suspend(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
263 static void command_set_stream_buffer_attr(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
264 static void command_update_stream_sample_rate(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
265 static void command_update_proplist(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
266 static void command_remove_proplist(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
);
268 static const pa_pdispatch_cb_t command_table
[PA_COMMAND_MAX
] = {
269 [PA_COMMAND_ERROR
] = NULL
,
270 [PA_COMMAND_TIMEOUT
] = NULL
,
271 [PA_COMMAND_REPLY
] = NULL
,
272 [PA_COMMAND_CREATE_PLAYBACK_STREAM
] = command_create_playback_stream
,
273 [PA_COMMAND_DELETE_PLAYBACK_STREAM
] = command_delete_stream
,
274 [PA_COMMAND_DRAIN_PLAYBACK_STREAM
] = command_drain_playback_stream
,
275 [PA_COMMAND_CREATE_RECORD_STREAM
] = command_create_record_stream
,
276 [PA_COMMAND_DELETE_RECORD_STREAM
] = command_delete_stream
,
277 [PA_COMMAND_AUTH
] = command_auth
,
278 [PA_COMMAND_REQUEST
] = NULL
,
279 [PA_COMMAND_EXIT
] = command_exit
,
280 [PA_COMMAND_SET_CLIENT_NAME
] = command_set_client_name
,
281 [PA_COMMAND_LOOKUP_SINK
] = command_lookup
,
282 [PA_COMMAND_LOOKUP_SOURCE
] = command_lookup
,
283 [PA_COMMAND_STAT
] = command_stat
,
284 [PA_COMMAND_GET_PLAYBACK_LATENCY
] = command_get_playback_latency
,
285 [PA_COMMAND_GET_RECORD_LATENCY
] = command_get_record_latency
,
286 [PA_COMMAND_CREATE_UPLOAD_STREAM
] = command_create_upload_stream
,
287 [PA_COMMAND_DELETE_UPLOAD_STREAM
] = command_delete_stream
,
288 [PA_COMMAND_FINISH_UPLOAD_STREAM
] = command_finish_upload_stream
,
289 [PA_COMMAND_PLAY_SAMPLE
] = command_play_sample
,
290 [PA_COMMAND_REMOVE_SAMPLE
] = command_remove_sample
,
291 [PA_COMMAND_GET_SINK_INFO
] = command_get_info
,
292 [PA_COMMAND_GET_SOURCE_INFO
] = command_get_info
,
293 [PA_COMMAND_GET_CLIENT_INFO
] = command_get_info
,
294 [PA_COMMAND_GET_MODULE_INFO
] = command_get_info
,
295 [PA_COMMAND_GET_SINK_INPUT_INFO
] = command_get_info
,
296 [PA_COMMAND_GET_SOURCE_OUTPUT_INFO
] = command_get_info
,
297 [PA_COMMAND_GET_SAMPLE_INFO
] = command_get_info
,
298 [PA_COMMAND_GET_SINK_INFO_LIST
] = command_get_info_list
,
299 [PA_COMMAND_GET_SOURCE_INFO_LIST
] = command_get_info_list
,
300 [PA_COMMAND_GET_MODULE_INFO_LIST
] = command_get_info_list
,
301 [PA_COMMAND_GET_CLIENT_INFO_LIST
] = command_get_info_list
,
302 [PA_COMMAND_GET_SINK_INPUT_INFO_LIST
] = command_get_info_list
,
303 [PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST
] = command_get_info_list
,
304 [PA_COMMAND_GET_SAMPLE_INFO_LIST
] = command_get_info_list
,
305 [PA_COMMAND_GET_SERVER_INFO
] = command_get_server_info
,
306 [PA_COMMAND_SUBSCRIBE
] = command_subscribe
,
308 [PA_COMMAND_SET_SINK_VOLUME
] = command_set_volume
,
309 [PA_COMMAND_SET_SINK_INPUT_VOLUME
] = command_set_volume
,
310 [PA_COMMAND_SET_SOURCE_VOLUME
] = command_set_volume
,
312 [PA_COMMAND_SET_SINK_MUTE
] = command_set_mute
,
313 [PA_COMMAND_SET_SINK_INPUT_MUTE
] = command_set_mute
,
314 [PA_COMMAND_SET_SOURCE_MUTE
] = command_set_mute
,
316 [PA_COMMAND_SUSPEND_SINK
] = command_suspend
,
317 [PA_COMMAND_SUSPEND_SOURCE
] = command_suspend
,
319 [PA_COMMAND_CORK_PLAYBACK_STREAM
] = command_cork_playback_stream
,
320 [PA_COMMAND_FLUSH_PLAYBACK_STREAM
] = command_trigger_or_flush_or_prebuf_playback_stream
,
321 [PA_COMMAND_TRIGGER_PLAYBACK_STREAM
] = command_trigger_or_flush_or_prebuf_playback_stream
,
322 [PA_COMMAND_PREBUF_PLAYBACK_STREAM
] = command_trigger_or_flush_or_prebuf_playback_stream
,
324 [PA_COMMAND_CORK_RECORD_STREAM
] = command_cork_record_stream
,
325 [PA_COMMAND_FLUSH_RECORD_STREAM
] = command_flush_record_stream
,
327 [PA_COMMAND_SET_DEFAULT_SINK
] = command_set_default_sink_or_source
,
328 [PA_COMMAND_SET_DEFAULT_SOURCE
] = command_set_default_sink_or_source
,
329 [PA_COMMAND_SET_PLAYBACK_STREAM_NAME
] = command_set_stream_name
,
330 [PA_COMMAND_SET_RECORD_STREAM_NAME
] = command_set_stream_name
,
331 [PA_COMMAND_KILL_CLIENT
] = command_kill
,
332 [PA_COMMAND_KILL_SINK_INPUT
] = command_kill
,
333 [PA_COMMAND_KILL_SOURCE_OUTPUT
] = command_kill
,
334 [PA_COMMAND_LOAD_MODULE
] = command_load_module
,
335 [PA_COMMAND_UNLOAD_MODULE
] = command_unload_module
,
336 [PA_COMMAND_GET_AUTOLOAD_INFO
] = command_get_autoload_info
,
337 [PA_COMMAND_GET_AUTOLOAD_INFO_LIST
] = command_get_autoload_info_list
,
338 [PA_COMMAND_ADD_AUTOLOAD
] = command_add_autoload
,
339 [PA_COMMAND_REMOVE_AUTOLOAD
] = command_remove_autoload
,
341 [PA_COMMAND_MOVE_SINK_INPUT
] = command_move_stream
,
342 [PA_COMMAND_MOVE_SOURCE_OUTPUT
] = command_move_stream
,
344 [PA_COMMAND_SET_PLAYBACK_STREAM_BUFFER_ATTR
] = command_set_stream_buffer_attr
,
345 [PA_COMMAND_SET_RECORD_STREAM_BUFFER_ATTR
] = command_set_stream_buffer_attr
,
347 [PA_COMMAND_UPDATE_PLAYBACK_STREAM_SAMPLE_RATE
] = command_update_stream_sample_rate
,
348 [PA_COMMAND_UPDATE_RECORD_STREAM_SAMPLE_RATE
] = command_update_stream_sample_rate
,
350 [PA_COMMAND_UPDATE_RECORD_STREAM_PROPLIST
] = command_update_proplist
,
351 [PA_COMMAND_UPDATE_PLAYBACK_STREAM_PROPLIST
] = command_update_proplist
,
352 [PA_COMMAND_UPDATE_CLIENT_PROPLIST
] = command_update_proplist
,
354 [PA_COMMAND_REMOVE_RECORD_STREAM_PROPLIST
] = command_remove_proplist
,
355 [PA_COMMAND_REMOVE_PLAYBACK_STREAM_PROPLIST
] = command_remove_proplist
,
356 [PA_COMMAND_REMOVE_CLIENT_PROPLIST
] = command_remove_proplist
,
359 /* structure management */
361 static void upload_stream_unlink(upload_stream
*s
) {
367 pa_assert_se(pa_idxset_remove_by_data(s
->connection
->output_streams
, s
, NULL
) == s
);
368 s
->connection
= NULL
;
369 upload_stream_unref(s
);
372 static void upload_stream_free(pa_object
*o
) {
373 upload_stream
*s
= UPLOAD_STREAM(o
);
376 upload_stream_unlink(s
);
381 pa_proplist_free(s
->proplist
);
383 if (s
->memchunk
.memblock
)
384 pa_memblock_unref(s
->memchunk
.memblock
);
389 static upload_stream
* upload_stream_new(
391 const pa_sample_spec
*ss
,
392 const pa_channel_map
*map
,
402 pa_assert(length
> 0);
405 s
= pa_msgobject_new(upload_stream
);
406 s
->parent
.parent
.parent
.free
= upload_stream_free
;
408 s
->sample_spec
= *ss
;
409 s
->channel_map
= *map
;
410 s
->name
= pa_xstrdup(name
);
411 pa_memchunk_reset(&s
->memchunk
);
413 s
->proplist
= pa_proplist_copy(p
);
414 pa_proplist_update(s
->proplist
, PA_UPDATE_MERGE
, c
->client
->proplist
);
416 pa_idxset_put(c
->output_streams
, s
, &s
->index
);
421 static void record_stream_unlink(record_stream
*s
) {
427 if (s
->source_output
) {
428 pa_source_output_unlink(s
->source_output
);
429 pa_source_output_unref(s
->source_output
);
430 s
->source_output
= NULL
;
433 pa_assert_se(pa_idxset_remove_by_data(s
->connection
->record_streams
, s
, NULL
) == s
);
434 s
->connection
= NULL
;
435 record_stream_unref(s
);
438 static void record_stream_free(pa_object
*o
) {
439 record_stream
*s
= RECORD_STREAM(o
);
442 record_stream_unlink(s
);
444 pa_memblockq_free(s
->memblockq
);
448 static int record_stream_process_msg(pa_msgobject
*o
, int code
, void*userdata
, int64_t offset
, pa_memchunk
*chunk
) {
449 record_stream
*s
= RECORD_STREAM(o
);
450 record_stream_assert_ref(s
);
457 case RECORD_STREAM_MESSAGE_POST_DATA
:
459 if (pa_memblockq_push_align(s
->memblockq
, chunk
) < 0) {
460 /* pa_log_warn("Failed to push data into output queue."); */
464 if (!pa_pstream_is_pending(s
->connection
->pstream
))
465 send_memblock(s
->connection
);
473 static void fix_record_buffer_attr_pre(record_stream
*s
, pa_bool_t adjust_latency
, uint32_t *maxlength
, uint32_t *fragsize
) {
475 pa_assert(maxlength
);
478 if (*maxlength
<= 0 || *maxlength
> MAX_MEMBLOCKQ_LENGTH
)
479 *maxlength
= MAX_MEMBLOCKQ_LENGTH
;
482 *fragsize
= pa_usec_to_bytes(DEFAULT_FRAGSIZE_MSEC
*PA_USEC_PER_MSEC
, &s
->source_output
->sample_spec
);
484 if (adjust_latency
) {
485 pa_usec_t fragsize_usec
;
487 /* So, the user asked us to adjust the latency according to
488 * the what the source can provide. Half the latency will be
489 * spent on the hw buffer, half of it in the async buffer
490 * queue we maintain for each client. */
492 fragsize_usec
= pa_bytes_to_usec(*fragsize
, &s
->source_output
->sample_spec
);
494 s
->source_latency
= pa_source_output_set_requested_latency(s
->source_output
, fragsize_usec
/2);
496 if (fragsize_usec
>= s
->source_latency
*2)
497 fragsize_usec
-= s
->source_latency
;
499 fragsize_usec
= s
->source_latency
;
501 *fragsize
= pa_usec_to_bytes(fragsize_usec
, &s
->source_output
->sample_spec
);
505 static void fix_record_buffer_attr_post(record_stream
*s
, uint32_t *maxlength
, uint32_t *fragsize
) {
509 pa_assert(maxlength
);
512 *maxlength
= pa_memblockq_get_maxlength(s
->memblockq
);
514 base
= pa_frame_size(&s
->source_output
->sample_spec
);
516 s
->fragment_size
= (*fragsize
/base
)*base
;
517 if (s
->fragment_size
<= 0)
518 s
->fragment_size
= base
;
520 if (s
->fragment_size
> *maxlength
)
521 s
->fragment_size
= *maxlength
;
523 *fragsize
= s
->fragment_size
;
526 static record_stream
* record_stream_new(
531 pa_bool_t peak_detect
,
534 pa_source_output_flags_t flags
,
536 pa_bool_t adjust_latency
) {
539 pa_source_output
*source_output
;
541 pa_source_output_new_data data
;
545 pa_assert(maxlength
);
548 pa_source_output_new_data_init(&data
);
550 pa_proplist_update(data
.proplist
, PA_UPDATE_REPLACE
, p
);
551 pa_proplist_update(data
.proplist
, PA_UPDATE_MERGE
, c
->client
->proplist
);
552 data
.driver
= __FILE__
;
553 data
.module
= c
->protocol
->module
;
554 data
.client
= c
->client
;
555 data
.source
= source
;
556 pa_source_output_new_data_set_sample_spec(&data
, ss
);
557 pa_source_output_new_data_set_channel_map(&data
, map
);
559 data
.resample_method
= PA_RESAMPLER_PEAKS
;
561 source_output
= pa_source_output_new(c
->protocol
->core
, &data
, flags
);
563 pa_source_output_new_data_done(&data
);
568 s
= pa_msgobject_new(record_stream
);
569 s
->parent
.parent
.free
= record_stream_free
;
570 s
->parent
.process_msg
= record_stream_process_msg
;
572 s
->source_output
= source_output
;
574 s
->source_output
->push
= source_output_push_cb
;
575 s
->source_output
->kill
= source_output_kill_cb
;
576 s
->source_output
->get_latency
= source_output_get_latency_cb
;
577 s
->source_output
->moved
= source_output_moved_cb
;
578 s
->source_output
->suspend
= source_output_suspend_cb
;
579 s
->source_output
->userdata
= s
;
581 fix_record_buffer_attr_pre(s
, adjust_latency
, maxlength
, fragsize
);
583 s
->memblockq
= pa_memblockq_new(
587 base
= pa_frame_size(&source_output
->sample_spec
),
593 fix_record_buffer_attr_post(s
, maxlength
, fragsize
);
595 *ss
= s
->source_output
->sample_spec
;
596 *map
= s
->source_output
->channel_map
;
598 pa_idxset_put(c
->record_streams
, s
, &s
->index
);
600 pa_source_output_put(s
->source_output
);
604 static void playback_stream_unlink(playback_stream
*s
) {
611 pa_sink_input_unlink(s
->sink_input
);
612 pa_sink_input_unref(s
->sink_input
);
613 s
->sink_input
= NULL
;
616 if (s
->drain_request
)
617 pa_pstream_send_error(s
->connection
->pstream
, s
->drain_tag
, PA_ERR_NOENTITY
);
619 pa_assert_se(pa_idxset_remove_by_data(s
->connection
->output_streams
, s
, NULL
) == s
);
620 s
->connection
= NULL
;
621 playback_stream_unref(s
);
624 static void playback_stream_free(pa_object
* o
) {
625 playback_stream
*s
= PLAYBACK_STREAM(o
);
628 playback_stream_unlink(s
);
630 pa_memblockq_free(s
->memblockq
);
634 static int playback_stream_process_msg(pa_msgobject
*o
, int code
, void*userdata
, int64_t offset
, pa_memchunk
*chunk
) {
635 playback_stream
*s
= PLAYBACK_STREAM(o
);
636 playback_stream_assert_ref(s
);
642 case PLAYBACK_STREAM_MESSAGE_REQUEST_DATA
: {
647 if ((l
= pa_atomic_load(&s
->missing
)) <= 0)
650 if (pa_atomic_cmpxchg(&s
->missing
, l
, 0))
657 t
= pa_tagstruct_new(NULL
, 0);
658 pa_tagstruct_putu32(t
, PA_COMMAND_REQUEST
);
659 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
660 pa_tagstruct_putu32(t
, s
->index
);
661 pa_tagstruct_putu32(t
, l
);
662 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
664 /* pa_log("Requesting %lu bytes", (unsigned long) l); */
668 case PLAYBACK_STREAM_MESSAGE_UNDERFLOW
: {
671 /* Report that we're empty */
672 t
= pa_tagstruct_new(NULL
, 0);
673 pa_tagstruct_putu32(t
, PA_COMMAND_UNDERFLOW
);
674 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
675 pa_tagstruct_putu32(t
, s
->index
);
676 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
680 case PLAYBACK_STREAM_MESSAGE_OVERFLOW
: {
683 /* Notify the user we're overflowed*/
684 t
= pa_tagstruct_new(NULL
, 0);
685 pa_tagstruct_putu32(t
, PA_COMMAND_OVERFLOW
);
686 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
687 pa_tagstruct_putu32(t
, s
->index
);
688 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
692 case PLAYBACK_STREAM_MESSAGE_DRAIN_ACK
:
693 pa_pstream_send_simple_ack(s
->connection
->pstream
, PA_PTR_TO_UINT(userdata
));
701 static void fix_playback_buffer_attr_pre(playback_stream
*s
, pa_bool_t adjust_latency
, uint32_t *maxlength
, uint32_t *tlength
, uint32_t* prebuf
, uint32_t* minreq
) {
703 pa_usec_t tlength_usec
, minreq_usec
, sink_usec
;
706 pa_assert(maxlength
);
711 if (*maxlength
<= 0 || *maxlength
> MAX_MEMBLOCKQ_LENGTH
)
712 *maxlength
= MAX_MEMBLOCKQ_LENGTH
;
714 *tlength
= pa_usec_to_bytes(DEFAULT_TLENGTH_MSEC
*PA_USEC_PER_MSEC
, &s
->sink_input
->sample_spec
);
716 *minreq
= pa_usec_to_bytes(DEFAULT_PROCESS_MSEC
*PA_USEC_PER_MSEC
, &s
->sink_input
->sample_spec
);
718 frame_size
= pa_frame_size(&s
->sink_input
->sample_spec
);
720 *minreq
= frame_size
;
721 if (*tlength
< *minreq
+frame_size
)
722 *tlength
= *minreq
+frame_size
;
724 tlength_usec
= pa_bytes_to_usec(*tlength
, &s
->sink_input
->sample_spec
);
725 minreq_usec
= pa_bytes_to_usec(*minreq
, &s
->sink_input
->sample_spec
);
727 pa_log_info("Requested tlength=%0.2f ms, minreq=%0.2f ms",
728 (double) tlength_usec
/ PA_USEC_PER_MSEC
,
729 (double) minreq_usec
/ PA_USEC_PER_MSEC
);
731 if (adjust_latency
) {
733 /* So, the user asked us to adjust the latency of the stream
734 * buffer according to the what the sink can provide. The
735 * tlength passed in shall be the overall latency. Roughly
736 * half the latency will be spent on the hw buffer, the other
737 * half of it in the async buffer queue we maintain for each
738 * client. In between we'll have a safety space of size
739 * 2*minreq. Why the 2*minreq? When the hw buffer is completey
740 * empty and needs to be filled, then our buffer must have
741 * enough data to fulfill this request immediatly and thus
742 * have at least the same tlength as the size of the hw
743 * buffer. It additionally needs space for 2 times minreq
744 * because if the buffer ran empty and a partial fillup
745 * happens immediately on the next iteration we need to be
746 * able to fulfill it and give the application also minreq
747 * time to fill it up again for the next request Makes 2 times
748 * minreq in plus.. */
750 if (tlength_usec
> minreq_usec
*2)
751 sink_usec
= (tlength_usec
- minreq_usec
*2)/2;
757 /* Ok, the user didn't ask us to adjust the latency, but we
758 * still need to make sure that the parameters from the user
761 if (tlength_usec
> minreq_usec
*2)
762 sink_usec
= (tlength_usec
- minreq_usec
*2);
767 s
->sink_latency
= pa_sink_input_set_requested_latency(s
->sink_input
, sink_usec
);
769 if (adjust_latency
) {
770 /* Ok, we didn't necessarily get what we were asking for, so
771 * let's subtract from what we asked for for the remaining
774 if (tlength_usec
>= s
->sink_latency
)
775 tlength_usec
-= s
->sink_latency
;
778 if (tlength_usec
< s
->sink_latency
+ 2*minreq_usec
)
779 tlength_usec
= s
->sink_latency
+ 2*minreq_usec
;
781 *tlength
= pa_usec_to_bytes(tlength_usec
, &s
->sink_input
->sample_spec
);
782 *minreq
= pa_usec_to_bytes(minreq_usec
, &s
->sink_input
->sample_spec
);
785 *minreq
+= frame_size
;
786 *tlength
+= frame_size
*2;
789 if (*tlength
<= *minreq
)
790 *tlength
= *minreq
*2 + frame_size
;
796 static void fix_playback_buffer_attr_post(playback_stream
*s
, uint32_t *maxlength
, uint32_t *tlength
, uint32_t* prebuf
, uint32_t* minreq
) {
798 pa_assert(maxlength
);
803 *maxlength
= (uint32_t) pa_memblockq_get_maxlength(s
->memblockq
);
804 *tlength
= (uint32_t) pa_memblockq_get_tlength(s
->memblockq
);
805 *prebuf
= (uint32_t) pa_memblockq_get_prebuf(s
->memblockq
);
806 *minreq
= (uint32_t) pa_memblockq_get_minreq(s
->memblockq
);
809 static playback_stream
* playback_stream_new(
822 pa_sink_input_flags_t flags
,
824 pa_bool_t adjust_latency
) {
826 playback_stream
*s
, *ssync
;
827 pa_sink_input
*sink_input
;
831 pa_sink_input_new_data data
;
835 pa_assert(maxlength
);
843 /* Find syncid group */
844 for (ssync
= pa_idxset_first(c
->output_streams
, &idx
); ssync
; ssync
= pa_idxset_next(c
->output_streams
, &idx
)) {
846 if (!playback_stream_isinstance(ssync
))
849 if (ssync
->syncid
== syncid
)
853 /* Synced streams must connect to the same sink */
857 sink
= ssync
->sink_input
->sink
;
858 else if (sink
!= ssync
->sink_input
->sink
)
862 pa_sink_input_new_data_init(&data
);
864 pa_proplist_update(data
.proplist
, PA_UPDATE_REPLACE
, p
);
865 pa_proplist_update(data
.proplist
, PA_UPDATE_MERGE
, c
->client
->proplist
);
866 data
.driver
= __FILE__
;
867 data
.module
= c
->protocol
->module
;
868 data
.client
= c
->client
;
870 pa_sink_input_new_data_set_sample_spec(&data
, ss
);
871 pa_sink_input_new_data_set_channel_map(&data
, map
);
872 pa_sink_input_new_data_set_volume(&data
, volume
);
873 pa_sink_input_new_data_set_muted(&data
, muted
);
874 data
.sync_base
= ssync
? ssync
->sink_input
: NULL
;
876 sink_input
= pa_sink_input_new(c
->protocol
->core
, &data
, flags
);
878 pa_sink_input_new_data_done(&data
);
883 s
= pa_msgobject_new(playback_stream
);
884 s
->parent
.parent
.parent
.free
= playback_stream_free
;
885 s
->parent
.parent
.process_msg
= playback_stream_process_msg
;
888 s
->sink_input
= sink_input
;
889 s
->underrun
= (uint64_t) -1;
891 s
->sink_input
->parent
.process_msg
= sink_input_process_msg
;
892 s
->sink_input
->pop
= sink_input_pop_cb
;
893 s
->sink_input
->process_rewind
= sink_input_process_rewind_cb
;
894 s
->sink_input
->update_max_rewind
= sink_input_update_max_rewind_cb
;
895 s
->sink_input
->kill
= sink_input_kill_cb
;
896 s
->sink_input
->moved
= sink_input_moved_cb
;
897 s
->sink_input
->suspend
= sink_input_suspend_cb
;
898 s
->sink_input
->userdata
= s
;
900 start_index
= ssync
? pa_memblockq_get_read_index(ssync
->memblockq
) : 0;
902 fix_playback_buffer_attr_pre(s
, adjust_latency
, maxlength
, tlength
, prebuf
, minreq
);
903 pa_sink_input_get_silence(sink_input
, &silence
);
905 s
->memblockq
= pa_memblockq_new(
909 pa_frame_size(&sink_input
->sample_spec
),
915 pa_memblock_unref(silence
.memblock
);
916 fix_playback_buffer_attr_post(s
, maxlength
, tlength
, prebuf
, minreq
);
918 *missing
= (uint32_t) pa_memblockq_pop_missing(s
->memblockq
);
920 *ss
= s
->sink_input
->sample_spec
;
921 *map
= s
->sink_input
->channel_map
;
924 pa_atomic_store(&s
->missing
, 0);
925 s
->drain_request
= FALSE
;
927 pa_idxset_put(c
->output_streams
, s
, &s
->index
);
929 pa_log_info("Final latency %0.2f ms = %0.2f ms + 2*%0.2f ms + %0.2f ms",
930 ((double) pa_bytes_to_usec(*tlength
, &sink_input
->sample_spec
) + (double) s
->sink_latency
) / PA_USEC_PER_MSEC
,
931 (double) pa_bytes_to_usec(*tlength
-*minreq
*2, &sink_input
->sample_spec
) / PA_USEC_PER_MSEC
,
932 (double) pa_bytes_to_usec(*minreq
, &sink_input
->sample_spec
) / PA_USEC_PER_MSEC
,
933 (double) s
->sink_latency
/ PA_USEC_PER_MSEC
);
935 pa_sink_input_put(s
->sink_input
);
939 static int connection_process_msg(pa_msgobject
*o
, int code
, void*userdata
, int64_t offset
, pa_memchunk
*chunk
) {
940 connection
*c
= CONNECTION(o
);
941 connection_assert_ref(c
);
948 case CONNECTION_MESSAGE_REVOKE
:
949 pa_pstream_send_revoke(c
->pstream
, PA_PTR_TO_UINT(userdata
));
952 case CONNECTION_MESSAGE_RELEASE
:
953 pa_pstream_send_release(c
->pstream
, PA_PTR_TO_UINT(userdata
));
960 static void connection_unlink(connection
*c
) {
969 while ((r
= pa_idxset_first(c
->record_streams
, NULL
)))
970 record_stream_unlink(r
);
972 while ((o
= pa_idxset_first(c
->output_streams
, NULL
)))
973 if (playback_stream_isinstance(o
))
974 playback_stream_unlink(PLAYBACK_STREAM(o
));
976 upload_stream_unlink(UPLOAD_STREAM(o
));
979 pa_subscription_free(c
->subscription
);
982 pa_pstream_unlink(c
->pstream
);
984 if (c
->auth_timeout_event
) {
985 c
->protocol
->core
->mainloop
->time_free(c
->auth_timeout_event
);
986 c
->auth_timeout_event
= NULL
;
989 pa_assert_se(pa_idxset_remove_by_data(c
->protocol
->connections
, c
, NULL
) == c
);
994 static void connection_free(pa_object
*o
) {
995 connection
*c
= CONNECTION(o
);
999 connection_unlink(c
);
1001 pa_idxset_free(c
->record_streams
, NULL
, NULL
);
1002 pa_idxset_free(c
->output_streams
, NULL
, NULL
);
1004 pa_pdispatch_unref(c
->pdispatch
);
1005 pa_pstream_unref(c
->pstream
);
1006 pa_client_free(c
->client
);
1011 /* Called from thread context */
1012 static void request_bytes(playback_stream
*s
) {
1013 size_t m
, previous_missing
;
1015 playback_stream_assert_ref(s
);
1017 m
= pa_memblockq_pop_missing(s
->memblockq
);
1022 /* pa_log("request_bytes(%lu)", (unsigned long) m); */
1024 previous_missing
= pa_atomic_add(&s
->missing
, m
);
1026 if (pa_memblockq_prebuf_active(s
->memblockq
) ||
1027 (previous_missing
< s
->minreq
&& previous_missing
+m
>= s
->minreq
)) {
1028 pa_assert(pa_thread_mq_get());
1029 pa_asyncmsgq_post(pa_thread_mq_get()->outq
, PA_MSGOBJECT(s
), PLAYBACK_STREAM_MESSAGE_REQUEST_DATA
, NULL
, 0, NULL
, NULL
);
1033 static void send_memblock(connection
*c
) {
1037 start
= PA_IDXSET_INVALID
;
1041 if (!(r
= RECORD_STREAM(pa_idxset_rrobin(c
->record_streams
, &c
->rrobin_index
))))
1044 if (start
== PA_IDXSET_INVALID
)
1045 start
= c
->rrobin_index
;
1046 else if (start
== c
->rrobin_index
)
1049 if (pa_memblockq_peek(r
->memblockq
, &chunk
) >= 0) {
1050 pa_memchunk schunk
= chunk
;
1052 if (schunk
.length
> r
->fragment_size
)
1053 schunk
.length
= r
->fragment_size
;
1055 pa_pstream_send_memblock(c
->pstream
, r
->index
, 0, PA_SEEK_RELATIVE
, &schunk
);
1057 pa_memblockq_drop(r
->memblockq
, schunk
.length
);
1058 pa_memblock_unref(schunk
.memblock
);
1065 static void send_playback_stream_killed(playback_stream
*p
) {
1067 playback_stream_assert_ref(p
);
1069 t
= pa_tagstruct_new(NULL
, 0);
1070 pa_tagstruct_putu32(t
, PA_COMMAND_PLAYBACK_STREAM_KILLED
);
1071 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
1072 pa_tagstruct_putu32(t
, p
->index
);
1073 pa_pstream_send_tagstruct(p
->connection
->pstream
, t
);
1076 static void send_record_stream_killed(record_stream
*r
) {
1078 record_stream_assert_ref(r
);
1080 t
= pa_tagstruct_new(NULL
, 0);
1081 pa_tagstruct_putu32(t
, PA_COMMAND_RECORD_STREAM_KILLED
);
1082 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
1083 pa_tagstruct_putu32(t
, r
->index
);
1084 pa_pstream_send_tagstruct(r
->connection
->pstream
, t
);
1087 /*** sink input callbacks ***/
1089 static void handle_seek(playback_stream
*s
, int64_t indexw
) {
1090 playback_stream_assert_ref(s
);
1092 /* pa_log("handle_seek: %llu -- %i", (unsigned long long) s->underrun, pa_memblockq_is_readable(s->memblockq)); */
1094 if (s
->underrun
!= 0) {
1096 /* pa_log("%lu vs. %lu", (unsigned long) pa_memblockq_get_length(s->memblockq), (unsigned long) pa_memblockq_get_prebuf(s->memblockq)); */
1098 if (pa_memblockq_is_readable(s
->memblockq
)) {
1100 size_t u
= pa_memblockq_get_length(s
->memblockq
);
1102 if (u
>= s
->underrun
)
1105 /* We just ended an underrun, let's ask the sink
1107 s
->sink_input
->thread_info
.ignore_rewind
= TRUE
;
1108 pa_sink_input_request_rewind(s
->sink_input
, u
, TRUE
);
1114 indexr
= pa_memblockq_get_read_index(s
->memblockq
);
1116 if (indexw
< indexr
)
1117 /* OK, the sink already asked for this data, so
1118 * let's have it usk us again */
1120 pa_sink_input_request_rewind(s
->sink_input
, indexr
- indexw
, FALSE
);
1126 /* Called from thread context */
1127 static int sink_input_process_msg(pa_msgobject
*o
, int code
, void *userdata
, int64_t offset
, pa_memchunk
*chunk
) {
1128 pa_sink_input
*i
= PA_SINK_INPUT(o
);
1131 pa_sink_input_assert_ref(i
);
1132 s
= PLAYBACK_STREAM(i
->userdata
);
1133 playback_stream_assert_ref(s
);
1137 case SINK_INPUT_MESSAGE_SEEK
: {
1140 windex
= pa_memblockq_get_write_index(s
->memblockq
);
1141 pa_memblockq_seek(s
->memblockq
, offset
, PA_PTR_TO_UINT(userdata
));
1143 handle_seek(s
, windex
);
1147 case SINK_INPUT_MESSAGE_POST_DATA
: {
1152 /* pa_log("sink input post: %lu", (unsigned long) chunk->length); */
1154 windex
= pa_memblockq_get_write_index(s
->memblockq
);
1156 if (pa_memblockq_push_align(s
->memblockq
, chunk
) < 0) {
1157 pa_log_warn("Failed to push data into queue");
1158 pa_asyncmsgq_post(pa_thread_mq_get()->outq
, PA_MSGOBJECT(s
), PLAYBACK_STREAM_MESSAGE_OVERFLOW
, NULL
, 0, NULL
, NULL
);
1159 pa_memblockq_seek(s
->memblockq
, chunk
->length
, PA_SEEK_RELATIVE
);
1162 handle_seek(s
, windex
);
1167 case SINK_INPUT_MESSAGE_DRAIN
:
1168 case SINK_INPUT_MESSAGE_FLUSH
:
1169 case SINK_INPUT_MESSAGE_PREBUF_FORCE
:
1170 case SINK_INPUT_MESSAGE_TRIGGER
: {
1173 pa_sink_input
*isync
;
1174 void (*func
)(pa_memblockq
*bq
);
1177 case SINK_INPUT_MESSAGE_FLUSH
:
1178 func
= pa_memblockq_flush
;
1181 case SINK_INPUT_MESSAGE_PREBUF_FORCE
:
1182 func
= pa_memblockq_prebuf_force
;
1185 case SINK_INPUT_MESSAGE_DRAIN
:
1186 case SINK_INPUT_MESSAGE_TRIGGER
:
1187 func
= pa_memblockq_prebuf_disable
;
1191 pa_assert_not_reached();
1194 windex
= pa_memblockq_get_write_index(s
->memblockq
);
1196 handle_seek(s
, windex
);
1198 /* Do the same for all other members in the sync group */
1199 for (isync
= i
->sync_prev
; isync
; isync
= isync
->sync_prev
) {
1200 playback_stream
*ssync
= PLAYBACK_STREAM(isync
->userdata
);
1201 windex
= pa_memblockq_get_write_index(ssync
->memblockq
);
1202 func(ssync
->memblockq
);
1203 handle_seek(ssync
, windex
);
1206 for (isync
= i
->sync_next
; isync
; isync
= isync
->sync_next
) {
1207 playback_stream
*ssync
= PLAYBACK_STREAM(isync
->userdata
);
1208 windex
= pa_memblockq_get_write_index(ssync
->memblockq
);
1209 func(ssync
->memblockq
);
1210 handle_seek(ssync
, windex
);
1213 if (code
== SINK_INPUT_MESSAGE_DRAIN
) {
1214 if (!pa_memblockq_is_readable(s
->memblockq
))
1215 pa_asyncmsgq_post(pa_thread_mq_get()->outq
, PA_MSGOBJECT(s
), PLAYBACK_STREAM_MESSAGE_DRAIN_ACK
, userdata
, 0, NULL
, NULL
);
1217 s
->drain_tag
= PA_PTR_TO_UINT(userdata
);
1218 s
->drain_request
= TRUE
;
1225 case SINK_INPUT_MESSAGE_UPDATE_LATENCY
:
1227 s
->read_index
= pa_memblockq_get_read_index(s
->memblockq
);
1228 s
->write_index
= pa_memblockq_get_write_index(s
->memblockq
);
1229 s
->render_memblockq_length
= pa_memblockq_get_length(s
->sink_input
->thread_info
.render_memblockq
);
1232 case PA_SINK_INPUT_MESSAGE_SET_STATE
: {
1235 windex
= pa_memblockq_get_write_index(s
->memblockq
);
1237 pa_memblockq_prebuf_force(s
->memblockq
);
1239 handle_seek(s
, windex
);
1241 /* Fall through to the default handler */
1245 case PA_SINK_INPUT_MESSAGE_GET_LATENCY
: {
1246 pa_usec_t
*r
= userdata
;
1248 *r
= pa_bytes_to_usec(pa_memblockq_get_length(s
->memblockq
), &i
->sample_spec
);
1250 /* Fall through, the default handler will add in the extra
1251 * latency added by the resampler */
1256 return pa_sink_input_process_msg(o
, code
, userdata
, offset
, chunk
);
1259 /* Called from thread context */
1260 static int sink_input_pop_cb(pa_sink_input
*i
, size_t nbytes
, pa_memchunk
*chunk
) {
1263 pa_sink_input_assert_ref(i
);
1264 s
= PLAYBACK_STREAM(i
->userdata
);
1265 playback_stream_assert_ref(s
);
1268 if (pa_memblockq_peek(s
->memblockq
, chunk
) < 0) {
1270 /* pa_log("UNDERRUN"); */
1272 if (s
->drain_request
&& pa_sink_input_safe_to_remove(i
)) {
1273 s
->drain_request
= FALSE
;
1274 pa_asyncmsgq_post(pa_thread_mq_get()->outq
, PA_MSGOBJECT(s
), PLAYBACK_STREAM_MESSAGE_DRAIN_ACK
, PA_UINT_TO_PTR(s
->drain_tag
), 0, NULL
, NULL
);
1275 } else if (s
->underrun
== 0)
1276 pa_asyncmsgq_post(pa_thread_mq_get()->outq
, PA_MSGOBJECT(s
), PLAYBACK_STREAM_MESSAGE_UNDERFLOW
, NULL
, 0, NULL
, NULL
);
1278 if (s
->underrun
!= (size_t) -1)
1279 s
->underrun
+= nbytes
;
1281 /* pa_log("added %llu bytes, total is %llu", (unsigned long long) nbytes, (unsigned long long) s->underrun); */
1288 /* pa_log("NOTUNDERRUN"); */
1292 pa_memblockq_drop(s
->memblockq
, chunk
->length
);
1298 static void sink_input_process_rewind_cb(pa_sink_input
*i
, size_t nbytes
) {
1301 pa_sink_input_assert_ref(i
);
1302 s
= PLAYBACK_STREAM(i
->userdata
);
1303 playback_stream_assert_ref(s
);
1305 /* If we are in an underrun, then we don't rewind */
1306 if (s
->underrun
!= 0)
1309 pa_memblockq_rewind(s
->memblockq
, nbytes
);
1312 static void sink_input_update_max_rewind_cb(pa_sink_input
*i
, size_t nbytes
) {
1315 pa_sink_input_assert_ref(i
);
1316 s
= PLAYBACK_STREAM(i
->userdata
);
1317 playback_stream_assert_ref(s
);
1319 pa_memblockq_set_maxrewind(s
->memblockq
, nbytes
);
1322 /* Called from main context */
1323 static void sink_input_kill_cb(pa_sink_input
*i
) {
1326 pa_sink_input_assert_ref(i
);
1327 s
= PLAYBACK_STREAM(i
->userdata
);
1328 playback_stream_assert_ref(s
);
1330 send_playback_stream_killed(s
);
1331 playback_stream_unlink(s
);
1334 /* Called from main context */
1335 static void sink_input_suspend_cb(pa_sink_input
*i
, pa_bool_t suspend
) {
1339 pa_sink_input_assert_ref(i
);
1340 s
= PLAYBACK_STREAM(i
->userdata
);
1341 playback_stream_assert_ref(s
);
1343 if (s
->connection
->version
< 12)
1346 t
= pa_tagstruct_new(NULL
, 0);
1347 pa_tagstruct_putu32(t
, PA_COMMAND_PLAYBACK_STREAM_SUSPENDED
);
1348 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
1349 pa_tagstruct_putu32(t
, s
->index
);
1350 pa_tagstruct_put_boolean(t
, suspend
);
1351 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
1354 /* Called from main context */
1355 static void sink_input_moved_cb(pa_sink_input
*i
) {
1359 pa_sink_input_assert_ref(i
);
1360 s
= PLAYBACK_STREAM(i
->userdata
);
1361 playback_stream_assert_ref(s
);
1363 if (s
->connection
->version
< 12)
1366 t
= pa_tagstruct_new(NULL
, 0);
1367 pa_tagstruct_putu32(t
, PA_COMMAND_PLAYBACK_STREAM_MOVED
);
1368 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
1369 pa_tagstruct_putu32(t
, s
->index
);
1370 pa_tagstruct_putu32(t
, i
->sink
->index
);
1371 pa_tagstruct_puts(t
, i
->sink
->name
);
1372 pa_tagstruct_put_boolean(t
, pa_sink_get_state(i
->sink
) == PA_SINK_SUSPENDED
);
1373 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
1376 /*** source_output callbacks ***/
1378 /* Called from thread context */
1379 static void source_output_push_cb(pa_source_output
*o
, const pa_memchunk
*chunk
) {
1382 pa_source_output_assert_ref(o
);
1383 s
= RECORD_STREAM(o
->userdata
);
1384 record_stream_assert_ref(s
);
1387 pa_asyncmsgq_post(pa_thread_mq_get()->outq
, PA_MSGOBJECT(s
), RECORD_STREAM_MESSAGE_POST_DATA
, NULL
, 0, chunk
, NULL
);
1390 static void source_output_kill_cb(pa_source_output
*o
) {
1393 pa_source_output_assert_ref(o
);
1394 s
= RECORD_STREAM(o
->userdata
);
1395 record_stream_assert_ref(s
);
1397 send_record_stream_killed(s
);
1398 record_stream_unlink(s
);
1401 static pa_usec_t
source_output_get_latency_cb(pa_source_output
*o
) {
1404 pa_source_output_assert_ref(o
);
1405 s
= RECORD_STREAM(o
->userdata
);
1406 record_stream_assert_ref(s
);
1408 /*pa_log("get_latency: %u", pa_memblockq_get_length(s->memblockq));*/
1410 return pa_bytes_to_usec(pa_memblockq_get_length(s
->memblockq
), &o
->sample_spec
);
1413 /* Called from main context */
1414 static void source_output_suspend_cb(pa_source_output
*o
, pa_bool_t suspend
) {
1418 pa_source_output_assert_ref(o
);
1419 s
= RECORD_STREAM(o
->userdata
);
1420 record_stream_assert_ref(s
);
1422 if (s
->connection
->version
< 12)
1425 t
= pa_tagstruct_new(NULL
, 0);
1426 pa_tagstruct_putu32(t
, PA_COMMAND_RECORD_STREAM_SUSPENDED
);
1427 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
1428 pa_tagstruct_putu32(t
, s
->index
);
1429 pa_tagstruct_put_boolean(t
, suspend
);
1430 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
1433 /* Called from main context */
1434 static void source_output_moved_cb(pa_source_output
*o
) {
1438 pa_source_output_assert_ref(o
);
1439 s
= RECORD_STREAM(o
->userdata
);
1440 record_stream_assert_ref(s
);
1442 if (s
->connection
->version
< 12)
1445 t
= pa_tagstruct_new(NULL
, 0);
1446 pa_tagstruct_putu32(t
, PA_COMMAND_RECORD_STREAM_MOVED
);
1447 pa_tagstruct_putu32(t
, (uint32_t) -1); /* tag */
1448 pa_tagstruct_putu32(t
, s
->index
);
1449 pa_tagstruct_putu32(t
, o
->source
->index
);
1450 pa_tagstruct_puts(t
, o
->source
->name
);
1451 pa_tagstruct_put_boolean(t
, pa_source_get_state(o
->source
) == PA_SOURCE_SUSPENDED
);
1452 pa_pstream_send_tagstruct(s
->connection
->pstream
, t
);
1455 /*** pdispatch callbacks ***/
1457 static void protocol_error(connection
*c
) {
1458 pa_log("protocol error, kicking client");
1459 connection_unlink(c
);
1462 #define CHECK_VALIDITY(pstream, expression, tag, error) do { \
1463 if (!(expression)) { \
1464 pa_pstream_send_error((pstream), (tag), (error)); \
1469 static pa_tagstruct
*reply_new(uint32_t tag
) {
1470 pa_tagstruct
*reply
;
1472 reply
= pa_tagstruct_new(NULL
, 0);
1473 pa_tagstruct_putu32(reply
, PA_COMMAND_REPLY
);
1474 pa_tagstruct_putu32(reply
, tag
);
1478 static void command_create_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1479 connection
*c
= CONNECTION(userdata
);
1481 uint32_t maxlength
, tlength
, prebuf
, minreq
, sink_index
, syncid
, missing
;
1482 const char *name
= NULL
, *sink_name
;
1485 pa_tagstruct
*reply
;
1486 pa_sink
*sink
= NULL
;
1494 fix_channels
= FALSE
,
1496 variable_rate
= FALSE
,
1498 adjust_latency
= FALSE
;
1500 pa_sink_input_flags_t flags
= 0;
1503 connection_assert_ref(c
);
1506 if ((c
->version
< 13 && (pa_tagstruct_gets(t
, &name
) < 0 || !name
)) ||
1509 PA_TAG_SAMPLE_SPEC
, &ss
,
1510 PA_TAG_CHANNEL_MAP
, &map
,
1511 PA_TAG_U32
, &sink_index
,
1512 PA_TAG_STRING
, &sink_name
,
1513 PA_TAG_U32
, &maxlength
,
1514 PA_TAG_BOOLEAN
, &corked
,
1515 PA_TAG_U32
, &tlength
,
1516 PA_TAG_U32
, &prebuf
,
1517 PA_TAG_U32
, &minreq
,
1518 PA_TAG_U32
, &syncid
,
1519 PA_TAG_CVOLUME
, &volume
,
1520 PA_TAG_INVALID
) < 0) {
1526 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1527 CHECK_VALIDITY(c
->pstream
, sink_index
!= PA_INVALID_INDEX
|| !sink_name
|| (*sink_name
&& pa_utf8_valid(sink_name
)), tag
, PA_ERR_INVALID
);
1528 CHECK_VALIDITY(c
->pstream
, pa_channel_map_valid(&map
), tag
, PA_ERR_INVALID
);
1529 CHECK_VALIDITY(c
->pstream
, pa_sample_spec_valid(&ss
), tag
, PA_ERR_INVALID
);
1530 CHECK_VALIDITY(c
->pstream
, pa_cvolume_valid(&volume
), tag
, PA_ERR_INVALID
);
1531 CHECK_VALIDITY(c
->pstream
, map
.channels
== ss
.channels
&& volume
.channels
== ss
.channels
, tag
, PA_ERR_INVALID
);
1533 p
= pa_proplist_new();
1536 pa_proplist_sets(p
, PA_PROP_MEDIA_NAME
, name
);
1538 if (c
->version
>= 12) {
1539 /* Since 0.9.8 the user can ask for a couple of additional flags */
1541 if (pa_tagstruct_get_boolean(t
, &no_remap
) < 0 ||
1542 pa_tagstruct_get_boolean(t
, &no_remix
) < 0 ||
1543 pa_tagstruct_get_boolean(t
, &fix_format
) < 0 ||
1544 pa_tagstruct_get_boolean(t
, &fix_rate
) < 0 ||
1545 pa_tagstruct_get_boolean(t
, &fix_channels
) < 0 ||
1546 pa_tagstruct_get_boolean(t
, &no_move
) < 0 ||
1547 pa_tagstruct_get_boolean(t
, &variable_rate
) < 0) {
1550 pa_proplist_free(p
);
1555 if (c
->version
>= 13) {
1557 if (pa_tagstruct_get_boolean(t
, &muted
) < 0 ||
1558 pa_tagstruct_get_boolean(t
, &adjust_latency
) < 0 ||
1559 pa_tagstruct_get_proplist(t
, p
) < 0) {
1561 pa_proplist_free(p
);
1566 if (!pa_tagstruct_eof(t
)) {
1568 pa_proplist_free(p
);
1572 if (sink_index
!= PA_INVALID_INDEX
) {
1574 if (!(sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, sink_index
))) {
1575 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1576 pa_proplist_free(p
);
1580 } else if (sink_name
) {
1582 if (!(sink
= pa_namereg_get(c
->protocol
->core
, sink_name
, PA_NAMEREG_SINK
, 1))) {
1583 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1584 pa_proplist_free(p
);
1590 (corked
? PA_SINK_INPUT_START_CORKED
: 0) |
1591 (no_remap
? PA_SINK_INPUT_NO_REMAP
: 0) |
1592 (no_remix
? PA_SINK_INPUT_NO_REMIX
: 0) |
1593 (fix_format
? PA_SINK_INPUT_FIX_FORMAT
: 0) |
1594 (fix_rate
? PA_SINK_INPUT_FIX_RATE
: 0) |
1595 (fix_channels
? PA_SINK_INPUT_FIX_CHANNELS
: 0) |
1596 (no_move
? PA_SINK_INPUT_DONT_MOVE
: 0) |
1597 (variable_rate
? PA_SINK_INPUT_VARIABLE_RATE
: 0);
1599 s
= playback_stream_new(c
, sink
, &ss
, &map
, &maxlength
, &tlength
, &prebuf
, &minreq
, &volume
, muted
, syncid
, &missing
, flags
, p
, adjust_latency
);
1600 pa_proplist_free(p
);
1602 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_INVALID
);
1604 reply
= reply_new(tag
);
1605 pa_tagstruct_putu32(reply
, s
->index
);
1606 pa_assert(s
->sink_input
);
1607 pa_tagstruct_putu32(reply
, s
->sink_input
->index
);
1608 pa_tagstruct_putu32(reply
, missing
);
1610 /* pa_log("initial request is %u", missing); */
1612 if (c
->version
>= 9) {
1613 /* Since 0.9.0 we support sending the buffer metrics back to the client */
1615 pa_tagstruct_putu32(reply
, (uint32_t) maxlength
);
1616 pa_tagstruct_putu32(reply
, (uint32_t) tlength
);
1617 pa_tagstruct_putu32(reply
, (uint32_t) prebuf
);
1618 pa_tagstruct_putu32(reply
, (uint32_t) minreq
);
1621 if (c
->version
>= 12) {
1622 /* Since 0.9.8 we support sending the chosen sample
1623 * spec/channel map/device/suspend status back to the
1626 pa_tagstruct_put_sample_spec(reply
, &ss
);
1627 pa_tagstruct_put_channel_map(reply
, &map
);
1629 pa_tagstruct_putu32(reply
, s
->sink_input
->sink
->index
);
1630 pa_tagstruct_puts(reply
, s
->sink_input
->sink
->name
);
1632 pa_tagstruct_put_boolean(reply
, pa_sink_get_state(s
->sink_input
->sink
) == PA_SINK_SUSPENDED
);
1635 if (c
->version
>= 13)
1636 pa_tagstruct_put_usec(reply
, s
->sink_latency
);
1638 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1641 static void command_delete_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1642 connection
*c
= CONNECTION(userdata
);
1645 connection_assert_ref(c
);
1648 if (pa_tagstruct_getu32(t
, &channel
) < 0 ||
1649 !pa_tagstruct_eof(t
)) {
1654 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1658 case PA_COMMAND_DELETE_PLAYBACK_STREAM
: {
1660 if (!(s
= pa_idxset_get_by_index(c
->output_streams
, channel
)) || !playback_stream_isinstance(s
)) {
1661 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
1665 playback_stream_unlink(s
);
1669 case PA_COMMAND_DELETE_RECORD_STREAM
: {
1671 if (!(s
= pa_idxset_get_by_index(c
->record_streams
, channel
))) {
1672 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
1676 record_stream_unlink(s
);
1680 case PA_COMMAND_DELETE_UPLOAD_STREAM
: {
1683 if (!(s
= pa_idxset_get_by_index(c
->output_streams
, channel
)) || !upload_stream_isinstance(s
)) {
1684 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
1688 upload_stream_unlink(s
);
1693 pa_assert_not_reached();
1696 pa_pstream_send_simple_ack(c
->pstream
, tag
);
1699 static void command_create_record_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1700 connection
*c
= CONNECTION(userdata
);
1702 uint32_t maxlength
, fragment_size
;
1703 uint32_t source_index
;
1704 const char *name
, *source_name
;
1707 pa_tagstruct
*reply
;
1708 pa_source
*source
= NULL
;
1715 fix_channels
= FALSE
,
1717 variable_rate
= FALSE
,
1718 adjust_latency
= FALSE
,
1719 peak_detect
= FALSE
;
1720 pa_source_output_flags_t flags
= 0;
1723 connection_assert_ref(c
);
1726 if ((c
->version
< 13 && (pa_tagstruct_gets(t
, &name
) < 0 || !name
)) ||
1727 pa_tagstruct_get_sample_spec(t
, &ss
) < 0 ||
1728 pa_tagstruct_get_channel_map(t
, &map
) < 0 ||
1729 pa_tagstruct_getu32(t
, &source_index
) < 0 ||
1730 pa_tagstruct_gets(t
, &source_name
) < 0 ||
1731 pa_tagstruct_getu32(t
, &maxlength
) < 0 ||
1732 pa_tagstruct_get_boolean(t
, &corked
) < 0 ||
1733 pa_tagstruct_getu32(t
, &fragment_size
) < 0) {
1738 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1739 CHECK_VALIDITY(c
->pstream
, pa_sample_spec_valid(&ss
), tag
, PA_ERR_INVALID
);
1740 CHECK_VALIDITY(c
->pstream
, pa_channel_map_valid(&map
), tag
, PA_ERR_INVALID
);
1741 CHECK_VALIDITY(c
->pstream
, source_index
!= PA_INVALID_INDEX
|| !source_name
|| (*source_name
&& pa_utf8_valid(source_name
)), tag
, PA_ERR_INVALID
);
1742 CHECK_VALIDITY(c
->pstream
, map
.channels
== ss
.channels
, tag
, PA_ERR_INVALID
);
1744 p
= pa_proplist_new();
1747 pa_proplist_sets(p
, PA_PROP_MEDIA_NAME
, name
);
1749 if (c
->version
>= 12) {
1750 /* Since 0.9.8 the user can ask for a couple of additional flags */
1752 if (pa_tagstruct_get_boolean(t
, &no_remap
) < 0 ||
1753 pa_tagstruct_get_boolean(t
, &no_remix
) < 0 ||
1754 pa_tagstruct_get_boolean(t
, &fix_format
) < 0 ||
1755 pa_tagstruct_get_boolean(t
, &fix_rate
) < 0 ||
1756 pa_tagstruct_get_boolean(t
, &fix_channels
) < 0 ||
1757 pa_tagstruct_get_boolean(t
, &no_move
) < 0 ||
1758 pa_tagstruct_get_boolean(t
, &variable_rate
) < 0) {
1761 pa_proplist_free(p
);
1766 if (c
->version
>= 13) {
1768 if (pa_tagstruct_get_boolean(t
, &peak_detect
) < 0 ||
1769 pa_tagstruct_get_boolean(t
, &adjust_latency
) < 0 ||
1770 pa_tagstruct_get_proplist(t
, p
) < 0) {
1772 pa_proplist_free(p
);
1777 if (!pa_tagstruct_eof(t
)) {
1779 pa_proplist_free(p
);
1783 if (source_index
!= PA_INVALID_INDEX
) {
1785 if (!(source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, source_index
))) {
1786 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1787 pa_proplist_free(p
);
1791 } else if (source_name
) {
1793 if (!(source
= pa_namereg_get(c
->protocol
->core
, source_name
, PA_NAMEREG_SOURCE
, 1))) {
1794 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
1795 pa_proplist_free(p
);
1801 (corked
? PA_SOURCE_OUTPUT_START_CORKED
: 0) |
1802 (no_remap
? PA_SOURCE_OUTPUT_NO_REMAP
: 0) |
1803 (no_remix
? PA_SOURCE_OUTPUT_NO_REMIX
: 0) |
1804 (fix_format
? PA_SOURCE_OUTPUT_FIX_FORMAT
: 0) |
1805 (fix_rate
? PA_SOURCE_OUTPUT_FIX_RATE
: 0) |
1806 (fix_channels
? PA_SOURCE_OUTPUT_FIX_CHANNELS
: 0) |
1807 (no_move
? PA_SOURCE_OUTPUT_DONT_MOVE
: 0) |
1808 (variable_rate
? PA_SOURCE_OUTPUT_VARIABLE_RATE
: 0);
1810 s
= record_stream_new(c
, source
, &ss
, &map
, peak_detect
, &maxlength
, &fragment_size
, flags
, p
, adjust_latency
);
1811 pa_proplist_free(p
);
1813 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_INVALID
);
1815 reply
= reply_new(tag
);
1816 pa_tagstruct_putu32(reply
, s
->index
);
1817 pa_assert(s
->source_output
);
1818 pa_tagstruct_putu32(reply
, s
->source_output
->index
);
1820 if (c
->version
>= 9) {
1821 /* Since 0.9 we support sending the buffer metrics back to the client */
1823 pa_tagstruct_putu32(reply
, (uint32_t) maxlength
);
1824 pa_tagstruct_putu32(reply
, (uint32_t) fragment_size
);
1827 if (c
->version
>= 12) {
1828 /* Since 0.9.8 we support sending the chosen sample
1829 * spec/channel map/device/suspend status back to the
1832 pa_tagstruct_put_sample_spec(reply
, &ss
);
1833 pa_tagstruct_put_channel_map(reply
, &map
);
1835 pa_tagstruct_putu32(reply
, s
->source_output
->source
->index
);
1836 pa_tagstruct_puts(reply
, s
->source_output
->source
->name
);
1838 pa_tagstruct_put_boolean(reply
, pa_source_get_state(s
->source_output
->source
) == PA_SOURCE_SUSPENDED
);
1841 if (c
->version
>= 13)
1842 pa_tagstruct_put_usec(reply
, s
->source_latency
);
1844 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1847 static void command_exit(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1848 connection
*c
= CONNECTION(userdata
);
1850 connection_assert_ref(c
);
1853 if (!pa_tagstruct_eof(t
)) {
1858 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
1860 c
->protocol
->core
->mainloop
->quit(c
->protocol
->core
->mainloop
, 0);
1861 pa_pstream_send_simple_ack(c
->pstream
, tag
); /* nonsense */
1864 static void command_auth(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1865 connection
*c
= CONNECTION(userdata
);
1867 pa_tagstruct
*reply
;
1870 connection_assert_ref(c
);
1873 if (pa_tagstruct_getu32(t
, &c
->version
) < 0 ||
1874 pa_tagstruct_get_arbitrary(t
, &cookie
, PA_NATIVE_COOKIE_LENGTH
) < 0 ||
1875 !pa_tagstruct_eof(t
)) {
1880 /* Minimum supported version */
1881 if (c
->version
< 8) {
1882 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_VERSION
);
1886 pa_snprintf(tmp
, sizeof(tmp
), "%u", c
->version
);
1887 pa_proplist_sets(c
->client
->proplist
, "native-protocol.version", tmp
);
1889 if (!c
->authorized
) {
1893 const pa_creds
*creds
;
1895 if ((creds
= pa_pdispatch_creds(pd
))) {
1896 if (creds
->uid
== getuid())
1898 else if (c
->protocol
->auth_group
) {
1902 if ((gid
= pa_get_gid_of_group(c
->protocol
->auth_group
)) == (gid_t
) -1)
1903 pa_log_warn("failed to get GID of group '%s'", c
->protocol
->auth_group
);
1904 else if (gid
== creds
->gid
)
1907 if ((r
= pa_uid_in_group(creds
->uid
, c
->protocol
->auth_group
)) < 0)
1908 pa_log_warn("failed to check group membership.");
1914 pa_log_info("Got credentials: uid=%lu gid=%lu success=%i",
1915 (unsigned long) creds
->uid
,
1916 (unsigned long) creds
->gid
,
1919 if (c
->version
>= 10 &&
1920 pa_mempool_is_shared(c
->protocol
->core
->mempool
) &&
1921 creds
->uid
== getuid()) {
1923 pa_pstream_enable_shm(c
->pstream
, TRUE
);
1924 pa_log_info("Enabled SHM for new connection");
1930 if (!success
&& memcmp(c
->protocol
->auth_cookie
, cookie
, PA_NATIVE_COOKIE_LENGTH
) == 0)
1934 pa_log_warn("Denied access to client with invalid authorization data.");
1935 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_ACCESS
);
1939 c
->authorized
= TRUE
;
1940 if (c
->auth_timeout_event
) {
1941 c
->protocol
->core
->mainloop
->time_free(c
->auth_timeout_event
);
1942 c
->auth_timeout_event
= NULL
;
1946 reply
= reply_new(tag
);
1947 pa_tagstruct_putu32(reply
, PA_PROTOCOL_VERSION
);
1951 /* SHM support is only enabled after both sides made sure they are the same user. */
1955 ucred
.uid
= getuid();
1956 ucred
.gid
= getgid();
1958 pa_pstream_send_tagstruct_with_creds(c
->pstream
, reply
, &ucred
);
1961 pa_pstream_send_tagstruct(c
->pstream
, reply
);
1965 static void command_set_client_name(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
1966 connection
*c
= CONNECTION(userdata
);
1967 const char *name
= NULL
;
1969 pa_tagstruct
*reply
;
1971 connection_assert_ref(c
);
1974 p
= pa_proplist_new();
1976 if ((c
->version
< 13 && pa_tagstruct_gets(t
, &name
) < 0) ||
1977 (c
->version
>= 13 && pa_tagstruct_get_proplist(t
, p
) < 0) ||
1978 !pa_tagstruct_eof(t
)) {
1981 pa_proplist_free(p
);
1986 if (pa_proplist_sets(p
, PA_PROP_APPLICATION_NAME
, name
) < 0) {
1987 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
1988 pa_proplist_free(p
);
1992 pa_proplist_update(c
->client
->proplist
, PA_UPDATE_REPLACE
, p
);
1993 pa_proplist_free(p
);
1995 pa_subscription_post(c
->protocol
->core
, PA_SUBSCRIPTION_EVENT_CLIENT
|PA_SUBSCRIPTION_EVENT_CHANGE
, c
->client
->index
);
1997 reply
= reply_new(tag
);
1999 if (c
->version
>= 13)
2000 pa_tagstruct_putu32(reply
, c
->client
->index
);
2002 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2005 static void command_lookup(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2006 connection
*c
= CONNECTION(userdata
);
2008 uint32_t idx
= PA_IDXSET_INVALID
;
2010 connection_assert_ref(c
);
2013 if (pa_tagstruct_gets(t
, &name
) < 0 ||
2014 !pa_tagstruct_eof(t
)) {
2019 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2020 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
2022 if (command
== PA_COMMAND_LOOKUP_SINK
) {
2024 if ((sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1)))
2028 pa_assert(command
== PA_COMMAND_LOOKUP_SOURCE
);
2029 if ((source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1)))
2030 idx
= source
->index
;
2033 if (idx
== PA_IDXSET_INVALID
)
2034 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
2036 pa_tagstruct
*reply
;
2037 reply
= reply_new(tag
);
2038 pa_tagstruct_putu32(reply
, idx
);
2039 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2043 static void command_drain_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2044 connection
*c
= CONNECTION(userdata
);
2048 connection_assert_ref(c
);
2051 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2052 !pa_tagstruct_eof(t
)) {
2057 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2058 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
2059 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2060 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
2062 pa_asyncmsgq_post(s
->sink_input
->sink
->asyncmsgq
, PA_MSGOBJECT(s
->sink_input
), SINK_INPUT_MESSAGE_DRAIN
, PA_UINT_TO_PTR(tag
), 0, NULL
, NULL
);
2065 static void command_stat(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2066 connection
*c
= CONNECTION(userdata
);
2067 pa_tagstruct
*reply
;
2068 const pa_mempool_stat
*stat
;
2070 connection_assert_ref(c
);
2073 if (!pa_tagstruct_eof(t
)) {
2078 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2080 stat
= pa_mempool_get_stat(c
->protocol
->core
->mempool
);
2082 reply
= reply_new(tag
);
2083 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->n_allocated
));
2084 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->allocated_size
));
2085 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->n_accumulated
));
2086 pa_tagstruct_putu32(reply
, (uint32_t) pa_atomic_load(&stat
->accumulated_size
));
2087 pa_tagstruct_putu32(reply
, pa_scache_total_size(c
->protocol
->core
));
2088 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2091 static void command_get_playback_latency(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2092 connection
*c
= CONNECTION(userdata
);
2093 pa_tagstruct
*reply
;
2095 struct timeval tv
, now
;
2099 connection_assert_ref(c
);
2102 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2103 pa_tagstruct_get_timeval(t
, &tv
) < 0 ||
2104 !pa_tagstruct_eof(t
)) {
2109 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2110 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
2111 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2112 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
2113 CHECK_VALIDITY(c
->pstream
, pa_asyncmsgq_send(s
->sink_input
->sink
->asyncmsgq
, PA_MSGOBJECT(s
->sink_input
), SINK_INPUT_MESSAGE_UPDATE_LATENCY
, s
, 0, NULL
) == 0, tag
, PA_ERR_NOENTITY
)
2115 reply
= reply_new(tag
);
2117 latency
= pa_sink_get_latency(s
->sink_input
->sink
);
2118 latency
+= pa_bytes_to_usec(s
->render_memblockq_length
, &s
->sink_input
->sample_spec
);
2120 pa_tagstruct_put_usec(reply
, latency
);
2122 pa_tagstruct_put_usec(reply
, 0);
2123 pa_tagstruct_put_boolean(reply
, pa_sink_input_get_state(s
->sink_input
) == PA_SINK_INPUT_RUNNING
);
2124 pa_tagstruct_put_timeval(reply
, &tv
);
2125 pa_tagstruct_put_timeval(reply
, pa_gettimeofday(&now
));
2126 pa_tagstruct_puts64(reply
, s
->write_index
);
2127 pa_tagstruct_puts64(reply
, s
->read_index
);
2128 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2131 static void command_get_record_latency(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2132 connection
*c
= CONNECTION(userdata
);
2133 pa_tagstruct
*reply
;
2135 struct timeval tv
, now
;
2138 connection_assert_ref(c
);
2141 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2142 pa_tagstruct_get_timeval(t
, &tv
) < 0 ||
2143 !pa_tagstruct_eof(t
)) {
2148 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2149 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
2150 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2152 reply
= reply_new(tag
);
2153 pa_tagstruct_put_usec(reply
, s
->source_output
->source
->monitor_of
? pa_sink_get_latency(s
->source_output
->source
->monitor_of
) : 0);
2154 pa_tagstruct_put_usec(reply
, pa_source_get_latency(s
->source_output
->source
));
2155 pa_tagstruct_put_boolean(reply
, FALSE
);
2156 pa_tagstruct_put_timeval(reply
, &tv
);
2157 pa_tagstruct_put_timeval(reply
, pa_gettimeofday(&now
));
2158 pa_tagstruct_puts64(reply
, pa_memblockq_get_write_index(s
->memblockq
));
2159 pa_tagstruct_puts64(reply
, pa_memblockq_get_read_index(s
->memblockq
));
2160 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2163 static void command_create_upload_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2164 connection
*c
= CONNECTION(userdata
);
2167 const char *name
= NULL
;
2170 pa_tagstruct
*reply
;
2173 connection_assert_ref(c
);
2176 if ((c
->version
< 13 && pa_tagstruct_gets(t
, &name
) < 0) ||
2177 pa_tagstruct_get_sample_spec(t
, &ss
) < 0 ||
2178 pa_tagstruct_get_channel_map(t
, &map
) < 0 ||
2179 pa_tagstruct_getu32(t
, &length
) < 0) {
2184 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2185 CHECK_VALIDITY(c
->pstream
, pa_sample_spec_valid(&ss
), tag
, PA_ERR_INVALID
);
2186 CHECK_VALIDITY(c
->pstream
, pa_channel_map_valid(&map
), tag
, PA_ERR_INVALID
);
2187 CHECK_VALIDITY(c
->pstream
, map
.channels
== ss
.channels
, tag
, PA_ERR_INVALID
);
2188 CHECK_VALIDITY(c
->pstream
, (length
% pa_frame_size(&ss
)) == 0 && length
> 0, tag
, PA_ERR_INVALID
);
2189 CHECK_VALIDITY(c
->pstream
, length
<= PA_SCACHE_ENTRY_SIZE_MAX
, tag
, PA_ERR_TOOLARGE
);
2191 if (c
->version
< 13)
2192 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
2194 p
= pa_proplist_new();
2196 if (c
->version
>= 13 && pa_tagstruct_get_proplist(t
, p
) < 0) {
2198 pa_proplist_free(p
);
2202 if (c
->version
< 13)
2203 pa_proplist_sets(p
, PA_PROP_MEDIA_NAME
, name
);
2205 s
= upload_stream_new(c
, &ss
, &map
, name
, length
, p
);
2206 pa_proplist_free(p
);
2208 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_INVALID
);
2210 reply
= reply_new(tag
);
2211 pa_tagstruct_putu32(reply
, s
->index
);
2212 pa_tagstruct_putu32(reply
, length
);
2213 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2216 static void command_finish_upload_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2217 connection
*c
= CONNECTION(userdata
);
2222 connection_assert_ref(c
);
2225 if (pa_tagstruct_getu32(t
, &channel
) < 0 ||
2226 !pa_tagstruct_eof(t
)) {
2231 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2233 s
= pa_idxset_get_by_index(c
->output_streams
, channel
);
2234 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2235 CHECK_VALIDITY(c
->pstream
, upload_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
2237 if (pa_scache_add_item(c
->protocol
->core
, s
->name
, &s
->sample_spec
, &s
->channel_map
, &s
->memchunk
, s
->proplist
, &idx
) < 0)
2238 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INTERNAL
);
2240 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2242 upload_stream_unlink(s
);
2245 static void command_play_sample(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2246 connection
*c
= CONNECTION(userdata
);
2247 uint32_t sink_index
;
2250 const char *name
, *sink_name
;
2253 pa_tagstruct
*reply
;
2255 connection_assert_ref(c
);
2258 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2260 if (pa_tagstruct_getu32(t
, &sink_index
) < 0 ||
2261 pa_tagstruct_gets(t
, &sink_name
) < 0 ||
2262 pa_tagstruct_getu32(t
, &volume
) < 0 ||
2263 pa_tagstruct_gets(t
, &name
) < 0) {
2268 CHECK_VALIDITY(c
->pstream
, sink_index
!= PA_INVALID_INDEX
|| !sink_name
|| (*sink_name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
2269 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
2271 if (sink_index
!= PA_INVALID_INDEX
)
2272 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, sink_index
);
2274 sink
= pa_namereg_get(c
->protocol
->core
, sink_name
, PA_NAMEREG_SINK
, 1);
2276 CHECK_VALIDITY(c
->pstream
, sink
, tag
, PA_ERR_NOENTITY
);
2278 p
= pa_proplist_new();
2280 if ((c
->version
>= 13 && pa_tagstruct_get_proplist(t
, p
) < 0) ||
2281 !pa_tagstruct_eof(t
)) {
2283 pa_proplist_free(p
);
2287 if (pa_scache_play_item(c
->protocol
->core
, name
, sink
, volume
, p
, &idx
) < 0) {
2288 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
2289 pa_proplist_free(p
);
2293 pa_proplist_free(p
);
2295 reply
= reply_new(tag
);
2297 if (c
->version
>= 13)
2298 pa_tagstruct_putu32(reply
, idx
);
2300 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2303 static void command_remove_sample(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2304 connection
*c
= CONNECTION(userdata
);
2307 connection_assert_ref(c
);
2310 if (pa_tagstruct_gets(t
, &name
) < 0 ||
2311 !pa_tagstruct_eof(t
)) {
2316 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2317 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
2319 if (pa_scache_remove_item(c
->protocol
->core
, name
) < 0) {
2320 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
2324 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2327 static void fixup_sample_spec(connection
*c
, pa_sample_spec
*fixed
, const pa_sample_spec
*original
) {
2330 pa_assert(original
);
2334 if (c
->version
< 12) {
2335 /* Before protocol version 12 we didn't support S32 samples,
2336 * so we need to lie about this to the client */
2338 if (fixed
->format
== PA_SAMPLE_S32LE
)
2339 fixed
->format
= PA_SAMPLE_FLOAT32LE
;
2340 if (fixed
->format
== PA_SAMPLE_S32BE
)
2341 fixed
->format
= PA_SAMPLE_FLOAT32BE
;
2345 static void sink_fill_tagstruct(connection
*c
, pa_tagstruct
*t
, pa_sink
*sink
) {
2346 pa_sample_spec fixed_ss
;
2349 pa_sink_assert_ref(sink
);
2351 fixup_sample_spec(c
, &fixed_ss
, &sink
->sample_spec
);
2355 PA_TAG_U32
, sink
->index
,
2356 PA_TAG_STRING
, sink
->name
,
2357 PA_TAG_STRING
, pa_strnull(pa_proplist_gets(sink
->proplist
, PA_PROP_DEVICE_DESCRIPTION
)),
2358 PA_TAG_SAMPLE_SPEC
, &fixed_ss
,
2359 PA_TAG_CHANNEL_MAP
, &sink
->channel_map
,
2360 PA_TAG_U32
, sink
->module
? sink
->module
->index
: PA_INVALID_INDEX
,
2361 PA_TAG_CVOLUME
, pa_sink_get_volume(sink
),
2362 PA_TAG_BOOLEAN
, pa_sink_get_mute(sink
),
2363 PA_TAG_U32
, sink
->monitor_source
? sink
->monitor_source
->index
: PA_INVALID_INDEX
,
2364 PA_TAG_STRING
, sink
->monitor_source
? sink
->monitor_source
->name
: NULL
,
2365 PA_TAG_USEC
, pa_sink_get_latency(sink
),
2366 PA_TAG_STRING
, sink
->driver
,
2367 PA_TAG_U32
, sink
->flags
,
2370 if (c
->version
>= 13) {
2371 pa_tagstruct_put_proplist(t
, sink
->proplist
);
2372 pa_tagstruct_put_usec(t
, pa_sink_get_requested_latency(sink
));
2376 static void source_fill_tagstruct(connection
*c
, pa_tagstruct
*t
, pa_source
*source
) {
2377 pa_sample_spec fixed_ss
;
2380 pa_source_assert_ref(source
);
2382 fixup_sample_spec(c
, &fixed_ss
, &source
->sample_spec
);
2386 PA_TAG_U32
, source
->index
,
2387 PA_TAG_STRING
, source
->name
,
2388 PA_TAG_STRING
, pa_strnull(pa_proplist_gets(source
->proplist
, PA_PROP_DEVICE_DESCRIPTION
)),
2389 PA_TAG_SAMPLE_SPEC
, &fixed_ss
,
2390 PA_TAG_CHANNEL_MAP
, &source
->channel_map
,
2391 PA_TAG_U32
, source
->module
? source
->module
->index
: PA_INVALID_INDEX
,
2392 PA_TAG_CVOLUME
, pa_source_get_volume(source
),
2393 PA_TAG_BOOLEAN
, pa_source_get_mute(source
),
2394 PA_TAG_U32
, source
->monitor_of
? source
->monitor_of
->index
: PA_INVALID_INDEX
,
2395 PA_TAG_STRING
, source
->monitor_of
? source
->monitor_of
->name
: NULL
,
2396 PA_TAG_USEC
, pa_source_get_latency(source
),
2397 PA_TAG_STRING
, source
->driver
,
2398 PA_TAG_U32
, source
->flags
,
2401 if (c
->version
>= 13) {
2402 pa_tagstruct_put_proplist(t
, source
->proplist
);
2403 pa_tagstruct_put_usec(t
, pa_source_get_requested_latency(source
));
2408 static void client_fill_tagstruct(connection
*c
, pa_tagstruct
*t
, pa_client
*client
) {
2412 pa_tagstruct_putu32(t
, client
->index
);
2413 pa_tagstruct_puts(t
, pa_strnull(pa_proplist_gets(client
->proplist
, PA_PROP_APPLICATION_NAME
)));
2414 pa_tagstruct_putu32(t
, client
->module
? client
->module
->index
: PA_INVALID_INDEX
);
2415 pa_tagstruct_puts(t
, client
->driver
);
2417 if (c
->version
>= 13)
2418 pa_tagstruct_put_proplist(t
, client
->proplist
);
2422 static void module_fill_tagstruct(pa_tagstruct
*t
, pa_module
*module
) {
2426 pa_tagstruct_putu32(t
, module
->index
);
2427 pa_tagstruct_puts(t
, module
->name
);
2428 pa_tagstruct_puts(t
, module
->argument
);
2429 pa_tagstruct_putu32(t
, module
->n_used
);
2430 pa_tagstruct_put_boolean(t
, module
->auto_unload
);
2433 static void sink_input_fill_tagstruct(connection
*c
, pa_tagstruct
*t
, pa_sink_input
*s
) {
2434 pa_sample_spec fixed_ss
;
2437 pa_sink_input_assert_ref(s
);
2439 fixup_sample_spec(c
, &fixed_ss
, &s
->sample_spec
);
2441 pa_tagstruct_putu32(t
, s
->index
);
2442 pa_tagstruct_puts(t
, pa_strnull(pa_proplist_gets(s
->proplist
, PA_PROP_MEDIA_NAME
)));
2443 pa_tagstruct_putu32(t
, s
->module
? s
->module
->index
: PA_INVALID_INDEX
);
2444 pa_tagstruct_putu32(t
, s
->client
? s
->client
->index
: PA_INVALID_INDEX
);
2445 pa_tagstruct_putu32(t
, s
->sink
->index
);
2446 pa_tagstruct_put_sample_spec(t
, &fixed_ss
);
2447 pa_tagstruct_put_channel_map(t
, &s
->channel_map
);
2448 pa_tagstruct_put_cvolume(t
, &s
->volume
);
2449 pa_tagstruct_put_usec(t
, pa_sink_input_get_latency(s
));
2450 pa_tagstruct_put_usec(t
, pa_sink_get_latency(s
->sink
));
2451 pa_tagstruct_puts(t
, pa_resample_method_to_string(pa_sink_input_get_resample_method(s
)));
2452 pa_tagstruct_puts(t
, s
->driver
);
2453 if (c
->version
>= 11)
2454 pa_tagstruct_put_boolean(t
, pa_sink_input_get_mute(s
));
2455 if (c
->version
>= 13)
2456 pa_tagstruct_put_proplist(t
, s
->proplist
);
2459 static void source_output_fill_tagstruct(connection
*c
, pa_tagstruct
*t
, pa_source_output
*s
) {
2460 pa_sample_spec fixed_ss
;
2463 pa_source_output_assert_ref(s
);
2465 fixup_sample_spec(c
, &fixed_ss
, &s
->sample_spec
);
2467 pa_tagstruct_putu32(t
, s
->index
);
2468 pa_tagstruct_puts(t
, pa_strnull(pa_proplist_gets(s
->proplist
, PA_PROP_MEDIA_NAME
)));
2469 pa_tagstruct_putu32(t
, s
->module
? s
->module
->index
: PA_INVALID_INDEX
);
2470 pa_tagstruct_putu32(t
, s
->client
? s
->client
->index
: PA_INVALID_INDEX
);
2471 pa_tagstruct_putu32(t
, s
->source
->index
);
2472 pa_tagstruct_put_sample_spec(t
, &fixed_ss
);
2473 pa_tagstruct_put_channel_map(t
, &s
->channel_map
);
2474 pa_tagstruct_put_usec(t
, pa_source_output_get_latency(s
));
2475 pa_tagstruct_put_usec(t
, pa_source_get_latency(s
->source
));
2476 pa_tagstruct_puts(t
, pa_resample_method_to_string(pa_source_output_get_resample_method(s
)));
2477 pa_tagstruct_puts(t
, s
->driver
);
2479 if (c
->version
>= 13)
2480 pa_tagstruct_put_proplist(t
, s
->proplist
);
2483 static void scache_fill_tagstruct(connection
*c
, pa_tagstruct
*t
, pa_scache_entry
*e
) {
2484 pa_sample_spec fixed_ss
;
2489 fixup_sample_spec(c
, &fixed_ss
, &e
->sample_spec
);
2491 pa_tagstruct_putu32(t
, e
->index
);
2492 pa_tagstruct_puts(t
, e
->name
);
2493 pa_tagstruct_put_cvolume(t
, &e
->volume
);
2494 pa_tagstruct_put_usec(t
, pa_bytes_to_usec(e
->memchunk
.length
, &e
->sample_spec
));
2495 pa_tagstruct_put_sample_spec(t
, &fixed_ss
);
2496 pa_tagstruct_put_channel_map(t
, &e
->channel_map
);
2497 pa_tagstruct_putu32(t
, e
->memchunk
.length
);
2498 pa_tagstruct_put_boolean(t
, e
->lazy
);
2499 pa_tagstruct_puts(t
, e
->filename
);
2501 if (c
->version
>= 13)
2502 pa_tagstruct_put_proplist(t
, e
->proplist
);
2505 static void command_get_info(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2506 connection
*c
= CONNECTION(userdata
);
2508 pa_sink
*sink
= NULL
;
2509 pa_source
*source
= NULL
;
2510 pa_client
*client
= NULL
;
2511 pa_module
*module
= NULL
;
2512 pa_sink_input
*si
= NULL
;
2513 pa_source_output
*so
= NULL
;
2514 pa_scache_entry
*sce
= NULL
;
2516 pa_tagstruct
*reply
;
2518 connection_assert_ref(c
);
2521 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2522 (command
!= PA_COMMAND_GET_CLIENT_INFO
&&
2523 command
!= PA_COMMAND_GET_MODULE_INFO
&&
2524 command
!= PA_COMMAND_GET_SINK_INPUT_INFO
&&
2525 command
!= PA_COMMAND_GET_SOURCE_OUTPUT_INFO
&&
2526 pa_tagstruct_gets(t
, &name
) < 0) ||
2527 !pa_tagstruct_eof(t
)) {
2532 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2533 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
2535 if (command
== PA_COMMAND_GET_SINK_INFO
) {
2536 if (idx
!= PA_INVALID_INDEX
)
2537 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx
);
2539 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
2540 } else if (command
== PA_COMMAND_GET_SOURCE_INFO
) {
2541 if (idx
!= PA_INVALID_INDEX
)
2542 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx
);
2544 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
2545 } else if (command
== PA_COMMAND_GET_CLIENT_INFO
)
2546 client
= pa_idxset_get_by_index(c
->protocol
->core
->clients
, idx
);
2547 else if (command
== PA_COMMAND_GET_MODULE_INFO
)
2548 module
= pa_idxset_get_by_index(c
->protocol
->core
->modules
, idx
);
2549 else if (command
== PA_COMMAND_GET_SINK_INPUT_INFO
)
2550 si
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
2551 else if (command
== PA_COMMAND_GET_SOURCE_OUTPUT_INFO
)
2552 so
= pa_idxset_get_by_index(c
->protocol
->core
->source_outputs
, idx
);
2554 pa_assert(command
== PA_COMMAND_GET_SAMPLE_INFO
);
2555 if (idx
!= PA_INVALID_INDEX
)
2556 sce
= pa_idxset_get_by_index(c
->protocol
->core
->scache
, idx
);
2558 sce
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SAMPLE
, 0);
2561 if (!sink
&& !source
&& !client
&& !module
&& !si
&& !so
&& !sce
) {
2562 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_NOENTITY
);
2566 reply
= reply_new(tag
);
2568 sink_fill_tagstruct(c
, reply
, sink
);
2570 source_fill_tagstruct(c
, reply
, source
);
2572 client_fill_tagstruct(c
, reply
, client
);
2574 module_fill_tagstruct(reply
, module
);
2576 sink_input_fill_tagstruct(c
, reply
, si
);
2578 source_output_fill_tagstruct(c
, reply
, so
);
2580 scache_fill_tagstruct(c
, reply
, sce
);
2581 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2584 static void command_get_info_list(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2585 connection
*c
= CONNECTION(userdata
);
2589 pa_tagstruct
*reply
;
2591 connection_assert_ref(c
);
2594 if (!pa_tagstruct_eof(t
)) {
2599 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2601 reply
= reply_new(tag
);
2603 if (command
== PA_COMMAND_GET_SINK_INFO_LIST
)
2604 i
= c
->protocol
->core
->sinks
;
2605 else if (command
== PA_COMMAND_GET_SOURCE_INFO_LIST
)
2606 i
= c
->protocol
->core
->sources
;
2607 else if (command
== PA_COMMAND_GET_CLIENT_INFO_LIST
)
2608 i
= c
->protocol
->core
->clients
;
2609 else if (command
== PA_COMMAND_GET_MODULE_INFO_LIST
)
2610 i
= c
->protocol
->core
->modules
;
2611 else if (command
== PA_COMMAND_GET_SINK_INPUT_INFO_LIST
)
2612 i
= c
->protocol
->core
->sink_inputs
;
2613 else if (command
== PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST
)
2614 i
= c
->protocol
->core
->source_outputs
;
2616 pa_assert(command
== PA_COMMAND_GET_SAMPLE_INFO_LIST
);
2617 i
= c
->protocol
->core
->scache
;
2621 for (p
= pa_idxset_first(i
, &idx
); p
; p
= pa_idxset_next(i
, &idx
)) {
2622 if (command
== PA_COMMAND_GET_SINK_INFO_LIST
)
2623 sink_fill_tagstruct(c
, reply
, p
);
2624 else if (command
== PA_COMMAND_GET_SOURCE_INFO_LIST
)
2625 source_fill_tagstruct(c
, reply
, p
);
2626 else if (command
== PA_COMMAND_GET_CLIENT_INFO_LIST
)
2627 client_fill_tagstruct(c
, reply
, p
);
2628 else if (command
== PA_COMMAND_GET_MODULE_INFO_LIST
)
2629 module_fill_tagstruct(reply
, p
);
2630 else if (command
== PA_COMMAND_GET_SINK_INPUT_INFO_LIST
)
2631 sink_input_fill_tagstruct(c
, reply
, p
);
2632 else if (command
== PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST
)
2633 source_output_fill_tagstruct(c
, reply
, p
);
2635 pa_assert(command
== PA_COMMAND_GET_SAMPLE_INFO_LIST
);
2636 scache_fill_tagstruct(c
, reply
, p
);
2641 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2644 static void command_get_server_info(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2645 connection
*c
= CONNECTION(userdata
);
2646 pa_tagstruct
*reply
;
2649 pa_sample_spec fixed_ss
;
2651 connection_assert_ref(c
);
2654 if (!pa_tagstruct_eof(t
)) {
2659 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2661 reply
= reply_new(tag
);
2662 pa_tagstruct_puts(reply
, PACKAGE_NAME
);
2663 pa_tagstruct_puts(reply
, PACKAGE_VERSION
);
2664 pa_tagstruct_puts(reply
, pa_get_user_name(txt
, sizeof(txt
)));
2665 pa_tagstruct_puts(reply
, pa_get_host_name(txt
, sizeof(txt
)));
2667 fixup_sample_spec(c
, &fixed_ss
, &c
->protocol
->core
->default_sample_spec
);
2668 pa_tagstruct_put_sample_spec(reply
, &fixed_ss
);
2670 n
= pa_namereg_get_default_sink_name(c
->protocol
->core
);
2671 pa_tagstruct_puts(reply
, n
);
2672 n
= pa_namereg_get_default_source_name(c
->protocol
->core
);
2673 pa_tagstruct_puts(reply
, n
);
2675 pa_tagstruct_putu32(reply
, c
->protocol
->core
->cookie
);
2677 pa_pstream_send_tagstruct(c
->pstream
, reply
);
2680 static void subscription_cb(pa_core
*core
, pa_subscription_event_type_t e
, uint32_t idx
, void *userdata
) {
2682 connection
*c
= CONNECTION(userdata
);
2684 connection_assert_ref(c
);
2686 t
= pa_tagstruct_new(NULL
, 0);
2687 pa_tagstruct_putu32(t
, PA_COMMAND_SUBSCRIBE_EVENT
);
2688 pa_tagstruct_putu32(t
, (uint32_t) -1);
2689 pa_tagstruct_putu32(t
, e
);
2690 pa_tagstruct_putu32(t
, idx
);
2691 pa_pstream_send_tagstruct(c
->pstream
, t
);
2694 static void command_subscribe(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2695 connection
*c
= CONNECTION(userdata
);
2696 pa_subscription_mask_t m
;
2698 connection_assert_ref(c
);
2701 if (pa_tagstruct_getu32(t
, &m
) < 0 ||
2702 !pa_tagstruct_eof(t
)) {
2707 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2708 CHECK_VALIDITY(c
->pstream
, (m
& ~PA_SUBSCRIPTION_MASK_ALL
) == 0, tag
, PA_ERR_INVALID
);
2710 if (c
->subscription
)
2711 pa_subscription_free(c
->subscription
);
2714 c
->subscription
= pa_subscription_new(c
->protocol
->core
, m
, subscription_cb
, c
);
2715 pa_assert(c
->subscription
);
2717 c
->subscription
= NULL
;
2719 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2722 static void command_set_volume(
2723 PA_GCC_UNUSED pa_pdispatch
*pd
,
2729 connection
*c
= CONNECTION(userdata
);
2732 pa_sink
*sink
= NULL
;
2733 pa_source
*source
= NULL
;
2734 pa_sink_input
*si
= NULL
;
2735 const char *name
= NULL
;
2737 connection_assert_ref(c
);
2740 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2741 (command
== PA_COMMAND_SET_SINK_VOLUME
&& pa_tagstruct_gets(t
, &name
) < 0) ||
2742 (command
== PA_COMMAND_SET_SOURCE_VOLUME
&& pa_tagstruct_gets(t
, &name
) < 0) ||
2743 pa_tagstruct_get_cvolume(t
, &volume
) ||
2744 !pa_tagstruct_eof(t
)) {
2749 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2750 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
2751 CHECK_VALIDITY(c
->pstream
, pa_cvolume_valid(&volume
), tag
, PA_ERR_INVALID
);
2755 case PA_COMMAND_SET_SINK_VOLUME
:
2756 if (idx
!= PA_INVALID_INDEX
)
2757 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx
);
2759 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
2762 case PA_COMMAND_SET_SOURCE_VOLUME
:
2763 if (idx
!= PA_INVALID_INDEX
)
2764 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx
);
2766 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
2769 case PA_COMMAND_SET_SINK_INPUT_VOLUME
:
2770 si
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
2774 pa_assert_not_reached();
2777 CHECK_VALIDITY(c
->pstream
, si
|| sink
|| source
, tag
, PA_ERR_NOENTITY
);
2780 pa_sink_set_volume(sink
, &volume
);
2782 pa_source_set_volume(source
, &volume
);
2784 pa_sink_input_set_volume(si
, &volume
);
2786 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2789 static void command_set_mute(
2790 PA_GCC_UNUSED pa_pdispatch
*pd
,
2796 connection
*c
= CONNECTION(userdata
);
2799 pa_sink
*sink
= NULL
;
2800 pa_source
*source
= NULL
;
2801 pa_sink_input
*si
= NULL
;
2802 const char *name
= NULL
;
2804 connection_assert_ref(c
);
2807 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2808 (command
== PA_COMMAND_SET_SINK_MUTE
&& pa_tagstruct_gets(t
, &name
) < 0) ||
2809 (command
== PA_COMMAND_SET_SOURCE_MUTE
&& pa_tagstruct_gets(t
, &name
) < 0) ||
2810 pa_tagstruct_get_boolean(t
, &mute
) ||
2811 !pa_tagstruct_eof(t
)) {
2816 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2817 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
2821 case PA_COMMAND_SET_SINK_MUTE
:
2823 if (idx
!= PA_INVALID_INDEX
)
2824 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx
);
2826 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
2830 case PA_COMMAND_SET_SOURCE_MUTE
:
2831 if (idx
!= PA_INVALID_INDEX
)
2832 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx
);
2834 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
2838 case PA_COMMAND_SET_SINK_INPUT_MUTE
:
2839 si
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
2843 pa_assert_not_reached();
2846 CHECK_VALIDITY(c
->pstream
, si
|| sink
|| source
, tag
, PA_ERR_NOENTITY
);
2849 pa_sink_set_mute(sink
, mute
);
2851 pa_source_set_mute(source
, mute
);
2853 pa_sink_input_set_mute(si
, mute
);
2855 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2858 static void command_cork_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2859 connection
*c
= CONNECTION(userdata
);
2864 connection_assert_ref(c
);
2867 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2868 pa_tagstruct_get_boolean(t
, &b
) < 0 ||
2869 !pa_tagstruct_eof(t
)) {
2874 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2875 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
, tag
, PA_ERR_INVALID
);
2876 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
2877 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2878 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
2880 pa_sink_input_cork(s
->sink_input
, b
);
2881 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2884 static void command_trigger_or_flush_or_prebuf_playback_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2885 connection
*c
= CONNECTION(userdata
);
2889 connection_assert_ref(c
);
2892 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2893 !pa_tagstruct_eof(t
)) {
2898 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2899 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
, tag
, PA_ERR_INVALID
);
2900 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
2901 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2902 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
2905 case PA_COMMAND_FLUSH_PLAYBACK_STREAM
:
2906 pa_asyncmsgq_send(s
->sink_input
->sink
->asyncmsgq
, PA_MSGOBJECT(s
->sink_input
), SINK_INPUT_MESSAGE_FLUSH
, NULL
, 0, NULL
);
2909 case PA_COMMAND_PREBUF_PLAYBACK_STREAM
:
2910 pa_asyncmsgq_send(s
->sink_input
->sink
->asyncmsgq
, PA_MSGOBJECT(s
->sink_input
), SINK_INPUT_MESSAGE_PREBUF_FORCE
, NULL
, 0, NULL
);
2913 case PA_COMMAND_TRIGGER_PLAYBACK_STREAM
:
2914 pa_asyncmsgq_send(s
->sink_input
->sink
->asyncmsgq
, PA_MSGOBJECT(s
->sink_input
), SINK_INPUT_MESSAGE_TRIGGER
, NULL
, 0, NULL
);
2918 pa_assert_not_reached();
2921 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2924 static void command_cork_record_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2925 connection
*c
= CONNECTION(userdata
);
2930 connection_assert_ref(c
);
2933 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2934 pa_tagstruct_get_boolean(t
, &b
) < 0 ||
2935 !pa_tagstruct_eof(t
)) {
2940 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2941 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
2942 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2944 pa_source_output_cork(s
->source_output
, b
);
2945 pa_memblockq_prebuf_force(s
->memblockq
);
2946 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2949 static void command_flush_record_stream(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2950 connection
*c
= CONNECTION(userdata
);
2954 connection_assert_ref(c
);
2957 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
2958 !pa_tagstruct_eof(t
)) {
2963 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2964 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
2965 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2967 pa_memblockq_flush(s
->memblockq
);
2968 pa_pstream_send_simple_ack(c
->pstream
, tag
);
2971 static void command_set_stream_buffer_attr(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
2972 connection
*c
= CONNECTION(userdata
);
2974 uint32_t maxlength
, tlength
, prebuf
, minreq
, fragsize
;
2975 pa_tagstruct
*reply
;
2977 connection_assert_ref(c
);
2980 if (pa_tagstruct_getu32(t
, &idx
) < 0) {
2985 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
2987 if (command
== PA_COMMAND_SET_PLAYBACK_STREAM_BUFFER_ATTR
) {
2989 pa_bool_t adjust_latency
= FALSE
;
2991 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
2992 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
2993 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
2995 if (pa_tagstruct_get(
2997 PA_TAG_U32
, &maxlength
,
2998 PA_TAG_U32
, &tlength
,
2999 PA_TAG_U32
, &prebuf
,
3000 PA_TAG_U32
, &minreq
,
3001 PA_TAG_INVALID
) < 0 ||
3002 (c
->version
>= 13 && pa_tagstruct_get_boolean(t
, &adjust_latency
) < 0) ||
3003 !pa_tagstruct_eof(t
)) {
3008 fix_playback_buffer_attr_pre(s
, adjust_latency
, &maxlength
, &tlength
, &prebuf
, &minreq
);
3009 pa_memblockq_set_maxlength(s
->memblockq
, maxlength
);
3010 pa_memblockq_set_tlength(s
->memblockq
, tlength
);
3011 pa_memblockq_set_prebuf(s
->memblockq
, prebuf
);
3012 pa_memblockq_set_minreq(s
->memblockq
, minreq
);
3013 fix_playback_buffer_attr_post(s
, &maxlength
, &tlength
, &prebuf
, &minreq
);
3015 reply
= reply_new(tag
);
3016 pa_tagstruct_putu32(reply
, maxlength
);
3017 pa_tagstruct_putu32(reply
, tlength
);
3018 pa_tagstruct_putu32(reply
, prebuf
);
3019 pa_tagstruct_putu32(reply
, minreq
);
3023 pa_bool_t adjust_latency
= FALSE
;
3024 pa_assert(command
== PA_COMMAND_SET_RECORD_STREAM_BUFFER_ATTR
);
3026 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
3027 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3029 if (pa_tagstruct_get(
3031 PA_TAG_U32
, &maxlength
,
3032 PA_TAG_U32
, &fragsize
,
3033 PA_TAG_INVALID
) < 0 ||
3034 (c
->version
>= 13 && pa_tagstruct_get_boolean(t
, &adjust_latency
) < 0) ||
3035 !pa_tagstruct_eof(t
)) {
3040 fix_record_buffer_attr_pre(s
, adjust_latency
, &maxlength
, &fragsize
);
3041 pa_memblockq_set_maxlength(s
->memblockq
, maxlength
);
3042 fix_record_buffer_attr_post(s
, &maxlength
, &fragsize
);
3044 reply
= reply_new(tag
);
3045 pa_tagstruct_putu32(reply
, maxlength
);
3046 pa_tagstruct_putu32(reply
, fragsize
);
3049 pa_pstream_send_tagstruct(c
->pstream
, reply
);
3052 static void command_update_stream_sample_rate(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3053 connection
*c
= CONNECTION(userdata
);
3057 connection_assert_ref(c
);
3060 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
3061 pa_tagstruct_getu32(t
, &rate
) < 0 ||
3062 !pa_tagstruct_eof(t
)) {
3067 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3068 CHECK_VALIDITY(c
->pstream
, rate
> 0 && rate
<= PA_RATE_MAX
, tag
, PA_ERR_INVALID
);
3070 if (command
== PA_COMMAND_UPDATE_PLAYBACK_STREAM_SAMPLE_RATE
) {
3073 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
3074 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3075 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
3077 pa_sink_input_set_rate(s
->sink_input
, rate
);
3081 pa_assert(command
== PA_COMMAND_UPDATE_RECORD_STREAM_SAMPLE_RATE
);
3083 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
3084 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3086 pa_source_output_set_rate(s
->source_output
, rate
);
3089 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3092 static void command_update_proplist(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3093 connection
*c
= CONNECTION(userdata
);
3098 connection_assert_ref(c
);
3101 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3103 p
= pa_proplist_new();
3105 if (command
== PA_COMMAND_UPDATE_CLIENT_PROPLIST
) {
3107 if (pa_tagstruct_getu32(t
, &mode
) < 0 ||
3108 pa_tagstruct_get_proplist(t
, p
) < 0 ||
3109 !pa_tagstruct_eof(t
)) {
3111 pa_proplist_free(p
);
3117 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
3118 pa_tagstruct_getu32(t
, &mode
) < 0 ||
3119 pa_tagstruct_get_proplist(t
, p
) < 0 ||
3120 !pa_tagstruct_eof(t
)) {
3122 pa_proplist_free(p
);
3127 CHECK_VALIDITY(c
->pstream
, mode
== PA_UPDATE_SET
|| mode
== PA_UPDATE_MERGE
|| mode
== PA_UPDATE_REPLACE
, tag
, PA_ERR_INVALID
);
3129 if (command
== PA_COMMAND_UPDATE_PLAYBACK_STREAM_PROPLIST
) {
3132 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
3133 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3134 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
3136 pa_proplist_update(s
->sink_input
->proplist
, mode
, p
);
3137 pa_subscription_post(c
->protocol
->core
, PA_SUBSCRIPTION_EVENT_SINK_INPUT
|PA_SUBSCRIPTION_EVENT_CHANGE
, s
->sink_input
->index
);
3139 } else if (command
== PA_COMMAND_UPDATE_RECORD_STREAM_PROPLIST
) {
3142 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
3143 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3145 pa_proplist_update(s
->source_output
->proplist
, mode
, p
);
3146 pa_subscription_post(c
->protocol
->core
, PA_SUBSCRIPTION_EVENT_SOURCE_OUTPUT
|PA_SUBSCRIPTION_EVENT_CHANGE
, s
->source_output
->index
);
3148 pa_assert(command
== PA_COMMAND_UPDATE_CLIENT_PROPLIST
);
3150 pa_proplist_update(c
->client
->proplist
, mode
, p
);
3151 pa_subscription_post(c
->protocol
->core
, PA_SUBSCRIPTION_EVENT_CLIENT
|PA_SUBSCRIPTION_EVENT_CHANGE
, c
->client
->index
);
3154 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3157 static void command_remove_proplist(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3158 connection
*c
= CONNECTION(userdata
);
3160 unsigned changed
= 0;
3162 pa_strlist
*l
= NULL
;
3164 connection_assert_ref(c
);
3167 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3169 if (command
!= PA_COMMAND_REMOVE_CLIENT_PROPLIST
) {
3171 if (pa_tagstruct_getu32(t
, &idx
) < 0) {
3177 if (command
== PA_COMMAND_REMOVE_PLAYBACK_STREAM_PROPLIST
) {
3180 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
3181 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3182 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
3184 p
= s
->sink_input
->proplist
;
3186 } else if (command
== PA_COMMAND_REMOVE_RECORD_STREAM_PROPLIST
) {
3189 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
3190 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3192 p
= s
->source_output
->proplist
;
3194 pa_assert(command
== PA_COMMAND_REMOVE_CLIENT_PROPLIST
);
3196 p
= c
->client
->proplist
;
3202 if (pa_tagstruct_gets(t
, &k
) < 0) {
3211 l
= pa_strlist_prepend(l
, k
);
3214 if (!pa_tagstruct_eof(t
)) {
3223 l
= pa_strlist_pop(l
, &z
);
3228 changed
+= pa_proplist_unset(p
, z
) >= 0;
3232 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3235 if (command
== PA_COMMAND_REMOVE_PLAYBACK_STREAM_PROPLIST
) {
3238 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
3239 pa_subscription_post(c
->protocol
->core
, PA_SUBSCRIPTION_EVENT_SINK_INPUT
|PA_SUBSCRIPTION_EVENT_CHANGE
, s
->sink_input
->index
);
3241 } else if (command
== PA_COMMAND_REMOVE_RECORD_STREAM_PROPLIST
) {
3244 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
3245 pa_subscription_post(c
->protocol
->core
, PA_SUBSCRIPTION_EVENT_SOURCE_OUTPUT
|PA_SUBSCRIPTION_EVENT_CHANGE
, s
->source_output
->index
);
3248 pa_assert(command
== PA_COMMAND_REMOVE_CLIENT_PROPLIST
);
3249 pa_subscription_post(c
->protocol
->core
, PA_SUBSCRIPTION_EVENT_CLIENT
|PA_SUBSCRIPTION_EVENT_CHANGE
, c
->client
->index
);
3254 static void command_set_default_sink_or_source(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3255 connection
*c
= CONNECTION(userdata
);
3258 connection_assert_ref(c
);
3261 if (pa_tagstruct_gets(t
, &s
) < 0 ||
3262 !pa_tagstruct_eof(t
)) {
3267 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3268 CHECK_VALIDITY(c
->pstream
, !s
|| (*s
&& pa_utf8_valid(s
)), tag
, PA_ERR_INVALID
);
3270 pa_namereg_set_default(c
->protocol
->core
, s
, command
== PA_COMMAND_SET_DEFAULT_SOURCE
? PA_NAMEREG_SOURCE
: PA_NAMEREG_SINK
);
3271 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3274 static void command_set_stream_name(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3275 connection
*c
= CONNECTION(userdata
);
3279 connection_assert_ref(c
);
3282 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
3283 pa_tagstruct_gets(t
, &name
) < 0 ||
3284 !pa_tagstruct_eof(t
)) {
3289 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3290 CHECK_VALIDITY(c
->pstream
, name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
3292 if (command
== PA_COMMAND_SET_PLAYBACK_STREAM_NAME
) {
3295 s
= pa_idxset_get_by_index(c
->output_streams
, idx
);
3296 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3297 CHECK_VALIDITY(c
->pstream
, playback_stream_isinstance(s
), tag
, PA_ERR_NOENTITY
);
3299 pa_sink_input_set_name(s
->sink_input
, name
);
3303 pa_assert(command
== PA_COMMAND_SET_RECORD_STREAM_NAME
);
3305 s
= pa_idxset_get_by_index(c
->record_streams
, idx
);
3306 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3308 pa_source_output_set_name(s
->source_output
, name
);
3311 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3314 static void command_kill(PA_GCC_UNUSED pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3315 connection
*c
= CONNECTION(userdata
);
3318 connection_assert_ref(c
);
3321 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
3322 !pa_tagstruct_eof(t
)) {
3327 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3329 if (command
== PA_COMMAND_KILL_CLIENT
) {
3332 client
= pa_idxset_get_by_index(c
->protocol
->core
->clients
, idx
);
3333 CHECK_VALIDITY(c
->pstream
, client
, tag
, PA_ERR_NOENTITY
);
3336 pa_client_kill(client
);
3338 } else if (command
== PA_COMMAND_KILL_SINK_INPUT
) {
3341 s
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
3342 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3345 pa_sink_input_kill(s
);
3347 pa_source_output
*s
;
3349 pa_assert(command
== PA_COMMAND_KILL_SOURCE_OUTPUT
);
3351 s
= pa_idxset_get_by_index(c
->protocol
->core
->source_outputs
, idx
);
3352 CHECK_VALIDITY(c
->pstream
, s
, tag
, PA_ERR_NOENTITY
);
3355 pa_source_output_kill(s
);
3358 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3359 connection_unref(c
);
3362 static void command_load_module(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3363 connection
*c
= CONNECTION(userdata
);
3365 const char *name
, *argument
;
3366 pa_tagstruct
*reply
;
3368 connection_assert_ref(c
);
3371 if (pa_tagstruct_gets(t
, &name
) < 0 ||
3372 pa_tagstruct_gets(t
, &argument
) < 0 ||
3373 !pa_tagstruct_eof(t
)) {
3378 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3379 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
) && !strchr(name
, '/'), tag
, PA_ERR_INVALID
);
3380 CHECK_VALIDITY(c
->pstream
, !argument
|| pa_utf8_valid(argument
), tag
, PA_ERR_INVALID
);
3382 if (!(m
= pa_module_load(c
->protocol
->core
, name
, argument
))) {
3383 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_MODINITFAILED
);
3387 reply
= reply_new(tag
);
3388 pa_tagstruct_putu32(reply
, m
->index
);
3389 pa_pstream_send_tagstruct(c
->pstream
, reply
);
3392 static void command_unload_module(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3393 connection
*c
= CONNECTION(userdata
);
3397 connection_assert_ref(c
);
3400 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
3401 !pa_tagstruct_eof(t
)) {
3406 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3407 m
= pa_idxset_get_by_index(c
->protocol
->core
->modules
, idx
);
3408 CHECK_VALIDITY(c
->pstream
, m
, tag
, PA_ERR_NOENTITY
);
3410 pa_module_unload_request(m
);
3411 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3414 static void command_add_autoload(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3415 connection
*c
= CONNECTION(userdata
);
3416 const char *name
, *module
, *argument
;
3419 pa_tagstruct
*reply
;
3421 connection_assert_ref(c
);
3424 if (pa_tagstruct_gets(t
, &name
) < 0 ||
3425 pa_tagstruct_getu32(t
, &type
) < 0 ||
3426 pa_tagstruct_gets(t
, &module
) < 0 ||
3427 pa_tagstruct_gets(t
, &argument
) < 0 ||
3428 !pa_tagstruct_eof(t
)) {
3433 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3434 CHECK_VALIDITY(c
->pstream
, name
&& *name
&& pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
3435 CHECK_VALIDITY(c
->pstream
, type
== 0 || type
== 1, tag
, PA_ERR_INVALID
);
3436 CHECK_VALIDITY(c
->pstream
, module
&& *module
&& pa_utf8_valid(module
), tag
, PA_ERR_INVALID
);
3437 CHECK_VALIDITY(c
->pstream
, !argument
|| pa_utf8_valid(argument
), tag
, PA_ERR_INVALID
);
3439 if (pa_autoload_add(c
->protocol
->core
, name
, type
== 0 ? PA_NAMEREG_SINK
: PA_NAMEREG_SOURCE
, module
, argument
, &idx
) < 0) {
3440 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_EXIST
);
3444 reply
= reply_new(tag
);
3445 pa_tagstruct_putu32(reply
, idx
);
3446 pa_pstream_send_tagstruct(c
->pstream
, reply
);
3449 static void command_remove_autoload(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3450 connection
*c
= CONNECTION(userdata
);
3451 const char *name
= NULL
;
3452 uint32_t type
, idx
= PA_IDXSET_INVALID
;
3455 connection_assert_ref(c
);
3458 if ((pa_tagstruct_getu32(t
, &idx
) < 0 &&
3459 (pa_tagstruct_gets(t
, &name
) < 0 ||
3460 pa_tagstruct_getu32(t
, &type
) < 0)) ||
3461 !pa_tagstruct_eof(t
)) {
3466 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3467 CHECK_VALIDITY(c
->pstream
, name
|| idx
!= PA_IDXSET_INVALID
, tag
, PA_ERR_INVALID
);
3468 CHECK_VALIDITY(c
->pstream
, !name
|| (*name
&& pa_utf8_valid(name
) && (type
== 0 || type
== 1)), tag
, PA_ERR_INVALID
);
3471 r
= pa_autoload_remove_by_name(c
->protocol
->core
, name
, type
== 0 ? PA_NAMEREG_SINK
: PA_NAMEREG_SOURCE
);
3473 r
= pa_autoload_remove_by_index(c
->protocol
->core
, idx
);
3475 CHECK_VALIDITY(c
->pstream
, r
>= 0, tag
, PA_ERR_NOENTITY
);
3477 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3480 static void autoload_fill_tagstruct(pa_tagstruct
*t
, const pa_autoload_entry
*e
) {
3483 pa_tagstruct_putu32(t
, e
->index
);
3484 pa_tagstruct_puts(t
, e
->name
);
3485 pa_tagstruct_putu32(t
, e
->type
== PA_NAMEREG_SINK
? 0 : 1);
3486 pa_tagstruct_puts(t
, e
->module
);
3487 pa_tagstruct_puts(t
, e
->argument
);
3490 static void command_get_autoload_info(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3491 connection
*c
= CONNECTION(userdata
);
3492 const pa_autoload_entry
*a
= NULL
;
3495 pa_tagstruct
*reply
;
3497 connection_assert_ref(c
);
3500 if ((pa_tagstruct_getu32(t
, &idx
) < 0 &&
3501 (pa_tagstruct_gets(t
, &name
) < 0 ||
3502 pa_tagstruct_getu32(t
, &type
) < 0)) ||
3503 !pa_tagstruct_eof(t
)) {
3508 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3509 CHECK_VALIDITY(c
->pstream
, name
|| idx
!= PA_IDXSET_INVALID
, tag
, PA_ERR_INVALID
);
3510 CHECK_VALIDITY(c
->pstream
, !name
|| (*name
&& (type
== 0 || type
== 1) && pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
3513 a
= pa_autoload_get_by_name(c
->protocol
->core
, name
, type
== 0 ? PA_NAMEREG_SINK
: PA_NAMEREG_SOURCE
);
3515 a
= pa_autoload_get_by_index(c
->protocol
->core
, idx
);
3517 CHECK_VALIDITY(c
->pstream
, a
, tag
, PA_ERR_NOENTITY
);
3519 reply
= reply_new(tag
);
3520 autoload_fill_tagstruct(reply
, a
);
3521 pa_pstream_send_tagstruct(c
->pstream
, reply
);
3524 static void command_get_autoload_info_list(PA_GCC_UNUSED pa_pdispatch
*pd
, PA_GCC_UNUSED
uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3525 connection
*c
= CONNECTION(userdata
);
3526 pa_tagstruct
*reply
;
3528 connection_assert_ref(c
);
3531 if (!pa_tagstruct_eof(t
)) {
3536 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3538 reply
= reply_new(tag
);
3540 if (c
->protocol
->core
->autoload_hashmap
) {
3541 pa_autoload_entry
*a
;
3544 while ((a
= pa_hashmap_iterate(c
->protocol
->core
->autoload_hashmap
, &state
, NULL
)))
3545 autoload_fill_tagstruct(reply
, a
);
3548 pa_pstream_send_tagstruct(c
->pstream
, reply
);
3551 static void command_move_stream(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3552 connection
*c
= CONNECTION(userdata
);
3553 uint32_t idx
= PA_INVALID_INDEX
, idx_device
= PA_INVALID_INDEX
;
3554 const char *name
= NULL
;
3556 connection_assert_ref(c
);
3559 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
3560 pa_tagstruct_getu32(t
, &idx_device
) < 0 ||
3561 pa_tagstruct_gets(t
, &name
) < 0 ||
3562 !pa_tagstruct_eof(t
)) {
3567 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3568 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
, tag
, PA_ERR_INVALID
);
3569 CHECK_VALIDITY(c
->pstream
, idx_device
!= PA_INVALID_INDEX
|| !name
|| (*name
&& pa_utf8_valid(name
)), tag
, PA_ERR_INVALID
);
3571 if (command
== PA_COMMAND_MOVE_SINK_INPUT
) {
3572 pa_sink_input
*si
= NULL
;
3573 pa_sink
*sink
= NULL
;
3575 si
= pa_idxset_get_by_index(c
->protocol
->core
->sink_inputs
, idx
);
3577 if (idx_device
!= PA_INVALID_INDEX
)
3578 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx_device
);
3580 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
3582 CHECK_VALIDITY(c
->pstream
, si
&& sink
, tag
, PA_ERR_NOENTITY
);
3584 if (pa_sink_input_move_to(si
, sink
, 0) < 0) {
3585 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
3589 pa_source_output
*so
= NULL
;
3592 pa_assert(command
== PA_COMMAND_MOVE_SOURCE_OUTPUT
);
3594 so
= pa_idxset_get_by_index(c
->protocol
->core
->source_outputs
, idx
);
3596 if (idx_device
!= PA_INVALID_INDEX
)
3597 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx_device
);
3599 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
3601 CHECK_VALIDITY(c
->pstream
, so
&& source
, tag
, PA_ERR_NOENTITY
);
3603 if (pa_source_output_move_to(so
, source
) < 0) {
3604 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
3609 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3612 static void command_suspend(pa_pdispatch
*pd
, uint32_t command
, uint32_t tag
, pa_tagstruct
*t
, void *userdata
) {
3613 connection
*c
= CONNECTION(userdata
);
3614 uint32_t idx
= PA_INVALID_INDEX
;
3615 const char *name
= NULL
;
3618 connection_assert_ref(c
);
3621 if (pa_tagstruct_getu32(t
, &idx
) < 0 ||
3622 pa_tagstruct_gets(t
, &name
) < 0 ||
3623 pa_tagstruct_get_boolean(t
, &b
) < 0 ||
3624 !pa_tagstruct_eof(t
)) {
3629 CHECK_VALIDITY(c
->pstream
, c
->authorized
, tag
, PA_ERR_ACCESS
);
3630 CHECK_VALIDITY(c
->pstream
, idx
!= PA_INVALID_INDEX
|| !name
|| !*name
|| pa_utf8_valid(name
), tag
, PA_ERR_INVALID
);
3632 if (command
== PA_COMMAND_SUSPEND_SINK
) {
3634 if (idx
== PA_INVALID_INDEX
&& name
&& !*name
) {
3636 if (pa_sink_suspend_all(c
->protocol
->core
, b
) < 0) {
3637 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
3641 pa_sink
*sink
= NULL
;
3643 if (idx
!= PA_INVALID_INDEX
)
3644 sink
= pa_idxset_get_by_index(c
->protocol
->core
->sinks
, idx
);
3646 sink
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SINK
, 1);
3648 CHECK_VALIDITY(c
->pstream
, sink
, tag
, PA_ERR_NOENTITY
);
3650 if (pa_sink_suspend(sink
, b
) < 0) {
3651 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
3657 pa_assert(command
== PA_COMMAND_SUSPEND_SOURCE
);
3659 if (idx
== PA_INVALID_INDEX
&& name
&& !*name
) {
3661 if (pa_source_suspend_all(c
->protocol
->core
, b
) < 0) {
3662 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
3669 if (idx
!= PA_INVALID_INDEX
)
3670 source
= pa_idxset_get_by_index(c
->protocol
->core
->sources
, idx
);
3672 source
= pa_namereg_get(c
->protocol
->core
, name
, PA_NAMEREG_SOURCE
, 1);
3674 CHECK_VALIDITY(c
->pstream
, source
, tag
, PA_ERR_NOENTITY
);
3676 if (pa_source_suspend(source
, b
) < 0) {
3677 pa_pstream_send_error(c
->pstream
, tag
, PA_ERR_INVALID
);
3683 pa_pstream_send_simple_ack(c
->pstream
, tag
);
3686 /*** pstream callbacks ***/
3688 static void pstream_packet_callback(pa_pstream
*p
, pa_packet
*packet
, const pa_creds
*creds
, void *userdata
) {
3689 connection
*c
= CONNECTION(userdata
);
3693 connection_assert_ref(c
);
3695 if (pa_pdispatch_run(c
->pdispatch
, packet
, creds
, c
) < 0) {
3696 pa_log("invalid packet.");
3697 connection_unlink(c
);
3701 static void pstream_memblock_callback(pa_pstream
*p
, uint32_t channel
, int64_t offset
, pa_seek_mode_t seek
, const pa_memchunk
*chunk
, void *userdata
) {
3702 connection
*c
= CONNECTION(userdata
);
3703 output_stream
*stream
;
3707 connection_assert_ref(c
);
3709 if (!(stream
= OUTPUT_STREAM(pa_idxset_get_by_index(c
->output_streams
, channel
)))) {
3710 pa_log("client sent block for invalid stream.");
3715 if (playback_stream_isinstance(stream
)) {
3716 playback_stream
*ps
= PLAYBACK_STREAM(stream
);
3718 if (seek
!= PA_SEEK_RELATIVE
|| offset
!= 0)
3719 pa_asyncmsgq_post(ps
->sink_input
->sink
->asyncmsgq
, PA_MSGOBJECT(ps
->sink_input
), SINK_INPUT_MESSAGE_SEEK
, PA_UINT_TO_PTR(seek
), offset
, NULL
, NULL
);
3721 pa_asyncmsgq_post(ps
->sink_input
->sink
->asyncmsgq
, PA_MSGOBJECT(ps
->sink_input
), SINK_INPUT_MESSAGE_POST_DATA
, NULL
, 0, chunk
, NULL
);
3724 upload_stream
*u
= UPLOAD_STREAM(stream
);
3727 if (!u
->memchunk
.memblock
) {
3728 if (u
->length
== chunk
->length
) {
3729 u
->memchunk
= *chunk
;
3730 pa_memblock_ref(u
->memchunk
.memblock
);
3733 u
->memchunk
.memblock
= pa_memblock_new(c
->protocol
->core
->mempool
, u
->length
);
3734 u
->memchunk
.index
= u
->memchunk
.length
= 0;
3738 pa_assert(u
->memchunk
.memblock
);
3741 if (l
> chunk
->length
)
3747 dst
= pa_memblock_acquire(u
->memchunk
.memblock
);
3748 src
= pa_memblock_acquire(chunk
->memblock
);
3750 memcpy((uint8_t*) dst
+ u
->memchunk
.index
+ u
->memchunk
.length
,
3751 (uint8_t*) src
+chunk
->index
, l
);
3753 pa_memblock_release(u
->memchunk
.memblock
);
3754 pa_memblock_release(chunk
->memblock
);
3756 u
->memchunk
.length
+= l
;
3762 static void pstream_die_callback(pa_pstream
*p
, void *userdata
) {
3763 connection
*c
= CONNECTION(userdata
);
3766 connection_assert_ref(c
);
3768 connection_unlink(c
);
3769 pa_log_info("connection died.");
3772 static void pstream_drain_callback(pa_pstream
*p
, void *userdata
) {
3773 connection
*c
= CONNECTION(userdata
);
3776 connection_assert_ref(c
);
3781 static void pstream_revoke_callback(pa_pstream
*p
, uint32_t block_id
, void *userdata
) {
3784 if (!(q
= pa_thread_mq_get()))
3785 pa_pstream_send_revoke(p
, block_id
);
3787 pa_asyncmsgq_post(q
->outq
, PA_MSGOBJECT(userdata
), CONNECTION_MESSAGE_REVOKE
, PA_UINT_TO_PTR(block_id
), 0, NULL
, NULL
);
3790 static void pstream_release_callback(pa_pstream
*p
, uint32_t block_id
, void *userdata
) {
3793 if (!(q
= pa_thread_mq_get()))
3794 pa_pstream_send_release(p
, block_id
);
3796 pa_asyncmsgq_post(q
->outq
, PA_MSGOBJECT(userdata
), CONNECTION_MESSAGE_RELEASE
, PA_UINT_TO_PTR(block_id
), 0, NULL
, NULL
);
3799 /*** client callbacks ***/
3801 static void client_kill_cb(pa_client
*c
) {
3804 connection_unlink(CONNECTION(c
->userdata
));
3807 /*** socket server callbacks ***/
3809 static void auth_timeout(pa_mainloop_api
*m
, pa_time_event
*e
, const struct timeval
*tv
, void *userdata
) {
3810 connection
*c
= CONNECTION(userdata
);
3814 connection_assert_ref(c
);
3815 pa_assert(c
->auth_timeout_event
== e
);
3818 connection_unlink(c
);
3821 static void on_connection(PA_GCC_UNUSED pa_socket_server
*s
, pa_iochannel
*io
, void *userdata
) {
3822 pa_protocol_native
*p
= userdata
;
3824 char cname
[256], pname
[128];
3830 if (pa_idxset_size(p
->connections
)+1 > MAX_CONNECTIONS
) {
3831 pa_log_warn("Warning! Too many connections (%u), dropping incoming connection.", MAX_CONNECTIONS
);
3832 pa_iochannel_free(io
);
3836 c
= pa_msgobject_new(connection
);
3837 c
->parent
.parent
.free
= connection_free
;
3838 c
->parent
.process_msg
= connection_process_msg
;
3840 c
->authorized
= p
->public;
3842 if (!c
->authorized
&& p
->auth_ip_acl
&& pa_ip_acl_check(p
->auth_ip_acl
, pa_iochannel_get_recv_fd(io
)) > 0) {
3843 pa_log_info("Client authenticated by IP ACL.");
3844 c
->authorized
= TRUE
;
3847 if (!c
->authorized
) {
3849 pa_gettimeofday(&tv
);
3850 tv
.tv_sec
+= AUTH_TIMEOUT
;
3851 c
->auth_timeout_event
= p
->core
->mainloop
->time_new(p
->core
->mainloop
, &tv
, auth_timeout
, c
);
3853 c
->auth_timeout_event
= NULL
;
3857 pa_iochannel_socket_peer_to_string(io
, pname
, sizeof(pname
));
3858 pa_snprintf(cname
, sizeof(cname
), "Native client (%s)", pname
);
3859 c
->client
= pa_client_new(p
->core
, __FILE__
, cname
);
3860 c
->client
->kill
= client_kill_cb
;
3861 c
->client
->userdata
= c
;
3862 c
->client
->module
= p
->module
;
3864 c
->pstream
= pa_pstream_new(p
->core
->mainloop
, io
, p
->core
->mempool
);
3866 pa_pstream_set_recieve_packet_callback(c
->pstream
, pstream_packet_callback
, c
);
3867 pa_pstream_set_recieve_memblock_callback(c
->pstream
, pstream_memblock_callback
, c
);
3868 pa_pstream_set_die_callback(c
->pstream
, pstream_die_callback
, c
);
3869 pa_pstream_set_drain_callback(c
->pstream
, pstream_drain_callback
, c
);
3870 pa_pstream_set_revoke_callback(c
->pstream
, pstream_revoke_callback
, c
);
3871 pa_pstream_set_release_callback(c
->pstream
, pstream_release_callback
, c
);
3873 c
->pdispatch
= pa_pdispatch_new(p
->core
->mainloop
, command_table
, PA_COMMAND_MAX
);
3875 c
->record_streams
= pa_idxset_new(NULL
, NULL
);
3876 c
->output_streams
= pa_idxset_new(NULL
, NULL
);
3878 c
->rrobin_index
= PA_IDXSET_INVALID
;
3879 c
->subscription
= NULL
;
3881 pa_idxset_put(p
->connections
, c
, NULL
);
3884 if (pa_iochannel_creds_supported(io
))
3885 pa_iochannel_creds_enable(io
);
3890 /*** module entry points ***/
3892 static int load_key(pa_protocol_native
*p
, const char*fn
) {
3895 p
->auth_cookie_in_property
= FALSE
;
3897 if (!fn
&& pa_authkey_prop_get(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
, p
->auth_cookie
, sizeof(p
->auth_cookie
)) >= 0) {
3898 pa_log_info("using already loaded auth cookie.");
3899 pa_authkey_prop_ref(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
);
3900 p
->auth_cookie_in_property
= TRUE
;
3905 fn
= PA_NATIVE_COOKIE_FILE
;
3907 if (pa_authkey_load_auto(fn
, p
->auth_cookie
, sizeof(p
->auth_cookie
)) < 0)
3910 pa_log_info("loading cookie from disk.");
3912 if (pa_authkey_prop_put(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
, p
->auth_cookie
, sizeof(p
->auth_cookie
)) >= 0)
3913 p
->auth_cookie_in_property
= TRUE
;
3918 static pa_protocol_native
* protocol_new_internal(pa_core
*c
, pa_module
*m
, pa_modargs
*ma
) {
3919 pa_protocol_native
*p
;
3920 pa_bool_t
public = FALSE
;
3926 if (pa_modargs_get_value_boolean(ma
, "auth-anonymous", &public) < 0) {
3927 pa_log("auth-anonymous= expects a boolean argument.");
3931 p
= pa_xnew(pa_protocol_native
, 1);
3936 p
->auth_ip_acl
= NULL
;
3941 if (pa_modargs_get_value_boolean(ma
, "auth-group-enabled", &a
) < 0) {
3942 pa_log("auth-group-enabled= expects a boolean argument.");
3945 p
->auth_group
= a
? pa_xstrdup(pa_modargs_get_value(ma
, "auth-group", c
->is_system_instance
? PA_ACCESS_GROUP
: NULL
)) : NULL
;
3948 pa_log_info("Allowing access to group '%s'.", p
->auth_group
);
3953 if ((acl
= pa_modargs_get_value(ma
, "auth-ip-acl", NULL
))) {
3955 if (!(p
->auth_ip_acl
= pa_ip_acl_new(acl
))) {
3956 pa_log("Failed to parse IP ACL '%s'", acl
);
3961 if (load_key(p
, pa_modargs_get_value(ma
, "cookie", NULL
)) < 0)
3964 p
->connections
= pa_idxset_new(NULL
, NULL
);
3970 pa_xfree(p
->auth_group
);
3973 pa_ip_acl_free(p
->auth_ip_acl
);
3978 pa_protocol_native
* pa_protocol_native_new(pa_core
*core
, pa_socket_server
*server
, pa_module
*m
, pa_modargs
*ma
) {
3980 pa_protocol_native
*p
;
3982 if (!(p
= protocol_new_internal(core
, m
, ma
)))
3986 pa_socket_server_set_callback(p
->server
, on_connection
, p
);
3988 if (pa_socket_server_get_address(p
->server
, t
, sizeof(t
))) {
3990 l
= pa_property_get(core
, PA_NATIVE_SERVER_PROPERTY_NAME
);
3991 l
= pa_strlist_prepend(l
, t
);
3992 pa_property_replace(core
, PA_NATIVE_SERVER_PROPERTY_NAME
, l
);
3998 void pa_protocol_native_free(pa_protocol_native
*p
) {
4002 while ((c
= pa_idxset_first(p
->connections
, NULL
)))
4003 connection_unlink(c
);
4004 pa_idxset_free(p
->connections
, NULL
, NULL
);
4009 if (pa_socket_server_get_address(p
->server
, t
, sizeof(t
))) {
4011 l
= pa_property_get(p
->core
, PA_NATIVE_SERVER_PROPERTY_NAME
);
4012 l
= pa_strlist_remove(l
, t
);
4015 pa_property_replace(p
->core
, PA_NATIVE_SERVER_PROPERTY_NAME
, l
);
4017 pa_property_remove(p
->core
, PA_NATIVE_SERVER_PROPERTY_NAME
);
4020 pa_socket_server_unref(p
->server
);
4023 if (p
->auth_cookie_in_property
)
4024 pa_authkey_prop_unref(p
->core
, PA_NATIVE_COOKIE_PROPERTY_NAME
);
4027 pa_ip_acl_free(p
->auth_ip_acl
);
4030 pa_xfree(p
->auth_group
);
4035 pa_protocol_native
* pa_protocol_native_new_iochannel(
4041 pa_protocol_native
*p
;
4043 if (!(p
= protocol_new_internal(core
, m
, ma
)))
4046 on_connection(NULL
, io
, p
);