summaryrefslogtreecommitdiffstats
path: root/src/modules/module-protocol-native.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/modules/module-protocol-native.c1528
1 files changed, 1528 insertions, 0 deletions
diff --git a/src/modules/module-protocol-native.c b/src/modules/module-protocol-native.c
new file mode 100644
index 0000000..6fdc79b
--- /dev/null
+++ b/src/modules/module-protocol-native.c
@@ -0,0 +1,1528 @@
+/* PipeWire
+ *
+ * Copyright © 2018 Wim Taymans
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining a
+ * copy of this software and associated documentation files (the "Software"),
+ * to deal in the Software without restriction, including without limitation
+ * the rights to use, copy, modify, merge, publish, distribute, sublicense,
+ * and/or sell copies of the Software, and to permit persons to whom the
+ * Software is furnished to do so, subject to the following conditions:
+ *
+ * The above copyright notice and this permission notice (including the next
+ * paragraph) shall be included in all copies or substantial portions of the
+ * Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
+ * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
+ * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
+ * DEALINGS IN THE SOFTWARE.
+ */
+
+#include "config.h"
+
+#include <string.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <errno.h>
+#include <sys/socket.h>
+#include <sys/types.h>
+#include <sys/un.h>
+#include <sys/stat.h>
+#include <fcntl.h>
+#include <sys/file.h>
+#include <ctype.h>
+#ifdef HAVE_PWD_H
+#include <pwd.h>
+#endif
+#if defined(__FreeBSD__) || defined(__MidnightBSD__)
+#include <sys/ucred.h>
+#endif
+
+#include <spa/pod/iter.h>
+#include <spa/utils/result.h>
+#include <spa/utils/string.h>
+
+#ifdef HAVE_SYSTEMD
+#include <systemd/sd-daemon.h>
+#endif
+
+#include <pipewire/impl.h>
+#include <pipewire/extensions/protocol-native.h>
+
+#include "pipewire/private.h"
+
+#include "modules/module-protocol-native/connection.h"
+#include "modules/module-protocol-native/defs.h"
+#include "modules/module-protocol-native/protocol-footer.h"
+
+
+#define NAME "protocol-native"
+PW_LOG_TOPIC(mod_topic, "mod." NAME);
+#define PW_LOG_TOPIC_DEFAULT mod_topic
+PW_LOG_TOPIC(mod_topic_connection, "conn." NAME);
+
+#undef spa_debug
+#define spa_debug(...) pw_logt_debug(mod_topic_connection, __VA_ARGS__)
+
+#include <spa/debug/pod.h>
+#include <spa/debug/types.h>
+
+/** \page page_module_protocol_native PipeWire Module: Protocol Native
+ *
+ * The native protocol module implements the PipeWire communication between
+ * a client and a server using unix local sockets.
+ *
+ * Normally this module is loaded in both client and server config files
+ * so that they cam communicate.
+ *
+ * ## Module Options
+ *
+ * The module has no options.
+ *
+ * ## General Options
+ *
+ * The name of the core is obtained as:
+ *
+ * - PIPEWIRE_CORE : the environment variable with the name of the core
+ * - \ref PW_KEY_CORE_NAME : in the context properties
+ * - a name based on the process id
+ *
+ * The context will also become a server if:
+ *
+ * - PIPEWIRE_DAEMON : the environment is true
+ * - \ref PW_KEY_CORE_DAEMON : in the context properties is true
+ *
+ * The socket will be located in the directory obtained by looking at the
+ * following environment variables:
+ *
+ * - PIPEWIRE_RUNTIME_DIR
+ * - XDG_RUNTIME_DIR
+ * - USERPROFILE
+ *
+ * The socket address will be written into the notification file descriptor
+ * if the following environment variable is set:
+ *
+ * - PIPEWIRE_NOTIFICATION_FD
+ *
+ * When a client connect, the connection will be made to:
+ *
+ * - PIPEWIRE_REMOTE : the environment with the remote name
+ * - \ref PW_KEY_REMOTE_NAME : the property in the context.
+ * - The default remote named "pipewire-0"
+ *
+ * A Special remote named "internal" can be used to make a connection to the
+ * local context. This can be done even when the server is not a daemon. It can
+ * be used to treat a local context as if it was a server.
+ *
+ * ## Example configuration
+ *
+ *\code{.unparsed}
+ * context.modules = [
+ { name = libpipewire-module-protocol-native }
+ * ]
+ *\endcode
+ */
+
+#ifndef UNIX_PATH_MAX
+#define UNIX_PATH_MAX 108
+#endif
+
+static const struct spa_dict_item module_props[] = {
+ { PW_KEY_MODULE_AUTHOR, "Wim Taymans <wim.taymans@gmail.com>" },
+ { PW_KEY_MODULE_DESCRIPTION, "Native protocol using unix sockets" },
+ { PW_KEY_MODULE_VERSION, PACKAGE_VERSION },
+};
+
+/* Required for s390x */
+#ifndef SO_PEERSEC
+#define SO_PEERSEC 31
+#endif
+
+static bool debug_messages = 0;
+
+#define LOCK_SUFFIX ".lock"
+#define LOCK_SUFFIXLEN 5
+
+void pw_protocol_native_init(struct pw_protocol *protocol);
+void pw_protocol_native0_init(struct pw_protocol *protocol);
+
+struct protocol_data {
+ struct pw_impl_module *module;
+ struct spa_hook module_listener;
+ struct pw_protocol *protocol;
+
+ struct server *local;
+};
+
+struct client {
+ struct pw_protocol_client this;
+ struct pw_context *context;
+
+ struct spa_source *source;
+
+ struct pw_protocol_native_connection *connection;
+ struct spa_hook conn_listener;
+
+ int ref;
+
+ struct footer_core_global_state footer_state;
+
+ unsigned int connected:1;
+ unsigned int disconnecting:1;
+ unsigned int need_flush:1;
+ unsigned int paused:1;
+};
+
+static void client_unref(struct client *impl)
+{
+ if (--impl->ref == 0)
+ free(impl);
+}
+
+struct server {
+ struct pw_protocol_server this;
+
+ int fd_lock;
+ struct sockaddr_un addr;
+ char lock_addr[UNIX_PATH_MAX + LOCK_SUFFIXLEN];
+
+ struct pw_loop *loop;
+ struct spa_source *source;
+ struct spa_source *resume;
+ unsigned int activated:1;
+};
+
+struct client_data {
+ struct pw_impl_client *client;
+ struct spa_hook client_listener;
+
+ struct spa_list protocol_link;
+ struct server *server;
+
+ struct spa_source *source;
+ struct pw_protocol_native_connection *connection;
+ struct spa_hook conn_listener;
+
+ struct footer_client_global_state footer_state;
+
+ unsigned int busy:1;
+ unsigned int need_flush:1;
+
+ struct protocol_compat_v2 compat_v2;
+};
+
+static void debug_msg(const char *prefix, const struct pw_protocol_native_message *msg, bool hex)
+{
+ struct spa_pod *pod;
+ pw_logt_debug(mod_topic_connection,
+ "%s: id:%d op:%d size:%d seq:%d", prefix,
+ msg->id, msg->opcode, msg->size, msg->seq);
+
+ if ((pod = get_first_pod_from_data(msg->data, msg->size, 0)) != NULL)
+ spa_debug_pod(0, NULL, pod);
+ else
+ hex = true;
+ if (hex)
+ spa_debug_mem(0, msg->data, msg->size);
+
+ pw_logt_debug(mod_topic_connection, "%s ****", prefix);
+
+}
+
+static void pre_demarshal(struct pw_protocol_native_connection *conn,
+ const struct pw_protocol_native_message *msg,
+ void *object, const struct footer_demarshal *opcodes, size_t n_opcodes)
+{
+ struct spa_pod *footer = NULL;
+ struct spa_pod_parser parser;
+ struct spa_pod_frame f[2];
+ uint32_t opcode;
+ int ret;
+
+ footer = pw_protocol_native_connection_get_footer(conn, msg);
+ if (footer == NULL)
+ return; /* No valid footer. Ignore silently. */
+
+ /*
+ * Version 3 footer
+ *
+ * spa_pod Struct { [Id opcode, Struct { ... }]* }
+ */
+
+ spa_pod_parser_pod(&parser, footer);
+ if (spa_pod_parser_push_struct(&parser, &f[0]) < 0) {
+ pw_log_error("malformed message footer");
+ return;
+ }
+
+ while (1) {
+ if (spa_pod_parser_get_id(&parser, &opcode) < 0)
+ break;
+ if (spa_pod_parser_push_struct(&parser, &f[1]) < 0)
+ break;
+ if (opcode < n_opcodes) {
+ if ((ret = opcodes[opcode].demarshal(object, &parser)) < 0)
+ pw_log_error("failed processing message footer (opcode %u): %d (%s)",
+ opcode, ret, spa_strerror(ret));
+ } else {
+ /* Ignore (don't log errors), in case we need to extend this later. */
+ pw_log_debug("unknown message footer opcode %u", opcode);
+ }
+ spa_pod_parser_pop(&parser, &f[1]);
+ }
+}
+
+static int
+process_messages(struct client_data *data)
+{
+ struct pw_protocol_native_connection *conn = data->connection;
+ struct pw_impl_client *client = data->client;
+ struct pw_context *context = client->context;
+ const struct pw_protocol_native_message *msg;
+ struct pw_resource *resource;
+ int res;
+
+ context->current_client = client;
+
+ /* when the client is busy processing an async action, stop processing messages
+ * for the client until it finishes the action */
+ while (!data->busy) {
+ const struct pw_protocol_native_demarshal *demarshal;
+ const struct pw_protocol_marshal *marshal;
+ uint32_t permissions, required;
+
+ res = pw_protocol_native_connection_get_next(conn, &msg);
+ if (res < 0) {
+ if (res == -EAGAIN)
+ break;
+ goto error;
+ }
+ if (res == 0)
+ break;
+
+ if (client->core_resource == NULL) {
+ res = -EPROTO;
+ goto error;
+ }
+
+ client->recv_seq = msg->seq;
+
+ pw_log_trace("%p: got message %d from %u", client->protocol,
+ msg->opcode, msg->id);
+
+ if (debug_messages)
+ debug_msg("<<<<<< in", msg, false);
+
+ pre_demarshal(conn, msg, client, footer_client_demarshal,
+ SPA_N_ELEMENTS(footer_client_demarshal));
+
+ resource = pw_impl_client_find_resource(client, msg->id);
+ if (resource == NULL) {
+ pw_resource_errorf(client->core_resource,
+ -ENOENT, "unknown resource %u op:%u", msg->id, msg->opcode);
+ continue;
+ }
+
+ marshal = pw_resource_get_marshal(resource);
+ if (marshal == NULL || msg->opcode >= marshal->n_client_methods) {
+ pw_resource_errorf_id(resource, msg->id,
+ -ENOSYS, "invalid method id:%u op:%u",
+ msg->id, msg->opcode);
+ continue;
+ }
+
+ demarshal = marshal->server_demarshal;
+ if (!demarshal[msg->opcode].func) {
+ pw_resource_errorf_id(resource, msg->id,
+ -ENOTSUP, "function not supported id:%u op:%u",
+ msg->id, msg->opcode);
+ continue;
+ }
+
+ permissions = pw_resource_get_permissions(resource);
+ required = demarshal[msg->opcode].permissions | PW_PERM_X;
+
+ if ((required & permissions) != required) {
+ pw_resource_errorf_id(resource, msg->id,
+ -EACCES, "no permission to call method %u on %u "
+ "(requires "PW_PERMISSION_FORMAT", have "PW_PERMISSION_FORMAT")",
+ msg->opcode, msg->id,
+ PW_PERMISSION_ARGS(required), PW_PERMISSION_ARGS(permissions));
+ continue;
+ }
+
+ resource->refcount++;
+ pw_protocol_native_connection_enter(conn);
+ res = demarshal[msg->opcode].func(resource, msg);
+ pw_protocol_native_connection_leave(conn);
+ pw_resource_unref(resource);
+
+ if (res < 0) {
+ pw_resource_errorf_id(resource, msg->id,
+ res, "invalid message id:%u op:%u (%s)",
+ msg->id, msg->opcode, spa_strerror(res));
+ debug_msg("*invalid message*", msg, true);
+ }
+ }
+ res = 0;
+done:
+ context->current_client = NULL;
+
+ return res;
+
+error:
+ pw_resource_errorf(client->core_resource, res, "client error %d (%s)",
+ res, spa_strerror(res));
+ goto done;
+}
+
+static void
+client_busy_changed(void *data, bool busy)
+{
+ struct client_data *c = data;
+ struct server *s = c->server;
+ struct pw_impl_client *client = c->client;
+ uint32_t mask = c->source->mask;
+
+ c->busy = busy;
+
+ SPA_FLAG_UPDATE(mask, SPA_IO_IN, !busy);
+
+ pw_log_debug("%p: busy changed %d", client->protocol, busy);
+ pw_loop_update_io(client->context->main_loop, c->source, mask);
+
+ if (!busy)
+ pw_loop_signal_event(s->loop, s->resume);
+}
+
+static void handle_client_error(struct pw_impl_client *client, int res, const char *msg)
+{
+ if (res == -EPIPE || res == -ECONNRESET)
+ pw_log_info("%p: %s: client %p disconnected", client->protocol, msg, client);
+ else
+ pw_log_error("%p: %s: client %p error %d (%s)", client->protocol, msg,
+ client, res, spa_strerror(res));
+ if (!client->destroyed)
+ pw_impl_client_destroy(client);
+}
+
+static void
+connection_data(void *data, int fd, uint32_t mask)
+{
+ struct client_data *this = data;
+ struct pw_impl_client *client = this->client;
+ int res;
+
+ client->refcount++;
+
+ if (mask & SPA_IO_HUP) {
+ res = -EPIPE;
+ goto error;
+ }
+ if (mask & SPA_IO_ERR) {
+ res = -EIO;
+ goto error;
+ }
+ if (mask & SPA_IO_IN) {
+ if ((res = process_messages(this)) < 0)
+ goto error;
+ }
+ if (mask & SPA_IO_OUT || this->need_flush) {
+ this->need_flush = false;
+ res = pw_protocol_native_connection_flush(this->connection);
+ if (res >= 0) {
+ pw_loop_update_io(client->context->main_loop,
+ this->source, this->source->mask & ~SPA_IO_OUT);
+ } else if (res != -EAGAIN)
+ goto error;
+ }
+done:
+ pw_impl_client_unref(client);
+ return;
+error:
+ handle_client_error(client, res, "connection_data");
+ goto done;
+}
+
+static void client_destroy(void *data)
+{
+ struct client_data *this = data;
+ pw_log_debug("%p: destroy", this);
+ spa_list_remove(&this->protocol_link);
+}
+
+static void client_free(void *data)
+{
+ struct client_data *this = data;
+ struct pw_impl_client *client = this->client;
+
+ pw_log_debug("%p: free", this);
+ spa_hook_remove(&this->client_listener);
+
+ if (this->source)
+ pw_loop_destroy_source(client->context->main_loop, this->source);
+ if (this->connection)
+ pw_protocol_native_connection_destroy(this->connection);
+
+ pw_map_clear(&this->compat_v2.types);
+}
+
+static const struct pw_impl_client_events client_events = {
+ PW_VERSION_IMPL_CLIENT_EVENTS,
+ .destroy = client_destroy,
+ .free = client_free,
+ .busy_changed = client_busy_changed,
+};
+
+static void on_server_connection_destroy(void *data)
+{
+ struct client_data *this = data;
+ spa_hook_remove(&this->conn_listener);
+}
+
+static void on_start(void *data, uint32_t version)
+{
+ struct client_data *this = data;
+ struct pw_impl_client *client = this->client;
+
+ pw_log_debug("version %d", version);
+
+ if (client->core_resource != NULL)
+ pw_resource_remove(client->core_resource);
+
+ if (pw_global_bind(pw_impl_core_get_global(client->core), client,
+ PW_PERM_ALL, version, 0) < 0)
+ return;
+
+ if (version == 0)
+ client->compat_v2 = &this->compat_v2;
+
+ return;
+}
+
+static void on_server_need_flush(void *data)
+{
+ struct client_data *this = data;
+ struct pw_impl_client *client = this->client;
+
+ pw_log_trace("need flush");
+ this->need_flush = true;
+
+ if (this->source && !(this->source->mask & SPA_IO_OUT)) {
+ pw_loop_update_io(client->context->main_loop,
+ this->source, this->source->mask | SPA_IO_OUT);
+ }
+}
+
+static const struct pw_protocol_native_connection_events server_conn_events = {
+ PW_VERSION_PROTOCOL_NATIVE_CONNECTION_EVENTS,
+ .destroy = on_server_connection_destroy,
+ .start = on_start,
+ .need_flush = on_server_need_flush,
+};
+
+static bool check_print(const uint8_t *buffer, int len)
+{
+ int i;
+ while (len > 1 && buffer[len-1] == 0)
+ len--;
+ for (i = 0; i < len; i++)
+ if (!isprint(buffer[i]))
+ return false;
+ return true;
+}
+
+static struct client_data *client_new(struct server *s, int fd)
+{
+ struct client_data *this;
+ struct pw_impl_client *client;
+ struct pw_protocol *protocol = s->this.protocol;
+ socklen_t len;
+#if defined(__FreeBSD__) || defined(__MidnightBSD__)
+ struct xucred xucred;
+#else
+ struct ucred ucred;
+#endif
+ struct pw_context *context = protocol->context;
+ struct pw_properties *props;
+ uint8_t buffer[1024];
+ struct protocol_data *d = pw_protocol_get_user_data(protocol);
+ int i, res;
+
+ props = pw_properties_new(PW_KEY_PROTOCOL, "protocol-native", NULL);
+ if (props == NULL)
+ goto exit;
+
+#if defined(__linux__)
+ len = sizeof(ucred);
+ if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &len) < 0) {
+ pw_log_warn("server %p: no peercred: %m", s);
+ } else {
+ pw_properties_setf(props, PW_KEY_SEC_PID, "%d", ucred.pid);
+ pw_properties_setf(props, PW_KEY_SEC_UID, "%d", ucred.uid);
+ pw_properties_setf(props, PW_KEY_SEC_GID, "%d", ucred.gid);
+ }
+
+ len = sizeof(buffer);
+ if (getsockopt(fd, SOL_SOCKET, SO_PEERSEC, buffer, &len) < 0) {
+ if (errno == ENOPROTOOPT)
+ pw_log_info("server %p: security label not available", s);
+ else
+ pw_log_warn("server %p: security label error: %m", s);
+ } else {
+ if (!check_print(buffer, len)) {
+ char *hex, *p;
+ static const char *ch = "0123456789abcdef";
+
+ p = hex = alloca(len * 2 + 10);
+ p += snprintf(p, 5, "hex:");
+ for(i = 0; i < (int)len; i++)
+ p += snprintf(p, 3, "%c%c",
+ ch[buffer[i] >> 4], ch[buffer[i] & 0xf]);
+ pw_properties_set(props, PW_KEY_SEC_LABEL, hex);
+
+ } else {
+ /* buffer is not null terminated, must use length explicitly */
+ pw_properties_setf(props, PW_KEY_SEC_LABEL, "%.*s",
+ (int)len, buffer);
+ }
+ }
+#elif defined(__FreeBSD__) || defined(__MidnightBSD__)
+ len = sizeof(xucred);
+ if (getsockopt(fd, 0, LOCAL_PEERCRED, &xucred, &len) < 0) {
+ pw_log_warn("server %p: no peercred: %m", s);
+ } else {
+#if __FreeBSD__ >= 13
+ pw_properties_setf(props, PW_KEY_SEC_PID, "%d", xucred.cr_pid);
+#endif
+ pw_properties_setf(props, PW_KEY_SEC_UID, "%d", xucred.cr_uid);
+ pw_properties_setf(props, PW_KEY_SEC_GID, "%d", xucred.cr_gid);
+ // this is what Linuxulator does at the moment, see sys/compat/linux/linux_socket.c
+ pw_properties_set(props, PW_KEY_SEC_LABEL, "unconfined");
+ }
+#endif
+
+ pw_properties_setf(props, PW_KEY_MODULE_ID, "%d", d->module->global->id);
+
+ client = pw_context_create_client(s->this.core,
+ protocol, props, sizeof(struct client_data));
+ if (client == NULL)
+ goto exit;
+
+ this = pw_impl_client_get_user_data(client);
+ spa_list_append(&s->this.client_list, &this->protocol_link);
+
+ this->server = s;
+ this->client = client;
+ pw_map_init(&this->compat_v2.types, 0, 32);
+
+ pw_impl_client_add_listener(client, &this->client_listener, &client_events, this);
+
+ this->source = pw_loop_add_io(pw_context_get_main_loop(context),
+ fd, SPA_IO_ERR | SPA_IO_HUP, true,
+ connection_data, this);
+ if (this->source == NULL) {
+ res = -errno;
+ goto cleanup_client;
+ }
+
+ this->connection = pw_protocol_native_connection_new(protocol->context, fd);
+ if (this->connection == NULL) {
+ res = -errno;
+ goto cleanup_client;
+ }
+
+ pw_protocol_native_connection_add_listener(this->connection,
+ &this->conn_listener,
+ &server_conn_events,
+ this);
+
+ if ((res = pw_impl_client_register(client, NULL)) < 0)
+ goto cleanup_client;
+
+ if (!client->busy)
+ pw_loop_update_io(pw_context_get_main_loop(context),
+ this->source, this->source->mask | SPA_IO_IN);
+
+ return this;
+
+cleanup_client:
+ pw_impl_client_destroy(client);
+ errno = -res;
+exit:
+ return NULL;
+}
+
+static const char *
+get_runtime_dir(void)
+{
+ const char *runtime_dir;
+
+ runtime_dir = getenv("PIPEWIRE_RUNTIME_DIR");
+ if (runtime_dir == NULL)
+ runtime_dir = getenv("XDG_RUNTIME_DIR");
+ if (runtime_dir == NULL)
+ runtime_dir = getenv("USERPROFILE");
+ return runtime_dir;
+}
+
+
+static int init_socket_name(struct server *s, const char *name)
+{
+ int name_size;
+ const char *runtime_dir;
+ bool path_is_absolute;
+
+ path_is_absolute = name[0] == '/';
+
+ runtime_dir = get_runtime_dir();
+
+ pw_log_debug("name:%s runtime_dir:%s", name, runtime_dir);
+
+ if (runtime_dir == NULL && !path_is_absolute) {
+ pw_log_error("server %p: name %s is not an absolute path and no runtime dir found. "
+ "Set one of PIPEWIRE_RUNTIME_DIR, XDG_RUNTIME_DIR or "
+ "USERPROFILE in the environment", s, name);
+ return -ENOENT;
+ }
+
+ s->addr.sun_family = AF_LOCAL;
+ if (path_is_absolute)
+ name_size = snprintf(s->addr.sun_path, sizeof(s->addr.sun_path),
+ "%s", name) + 1;
+ else
+ name_size = snprintf(s->addr.sun_path, sizeof(s->addr.sun_path),
+ "%s/%s", runtime_dir, name) + 1;
+
+ if (name_size > (int) sizeof(s->addr.sun_path)) {
+ if (path_is_absolute)
+ pw_log_error("server %p: socket path \"%s\" plus null terminator exceeds %i bytes",
+ s, name, (int) sizeof(s->addr.sun_path));
+ else
+ pw_log_error("server %p: socket path \"%s/%s\" plus null terminator exceeds %i bytes",
+ s, runtime_dir, name, (int) sizeof(s->addr.sun_path));
+ *s->addr.sun_path = 0;
+ return -ENAMETOOLONG;
+ }
+ return 0;
+}
+
+static int lock_socket(struct server *s)
+{
+ int res;
+
+ snprintf(s->lock_addr, sizeof(s->lock_addr), "%s%s", s->addr.sun_path, LOCK_SUFFIX);
+
+ s->fd_lock = open(s->lock_addr, O_CREAT | O_CLOEXEC,
+ (S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP));
+
+ if (s->fd_lock < 0) {
+ res = -errno;
+ pw_log_error("server %p: unable to open lockfile '%s': %m", s, s->lock_addr);
+ goto err;
+ }
+
+ if (flock(s->fd_lock, LOCK_EX | LOCK_NB) < 0) {
+ res = -errno;
+ pw_log_error("server %p: unable to lock lockfile '%s': %m"
+ " (maybe another daemon is running)",
+ s, s->lock_addr);
+ goto err_fd;
+ }
+ return 0;
+
+err_fd:
+ close(s->fd_lock);
+ s->fd_lock = -1;
+err:
+ *s->lock_addr = 0;
+ *s->addr.sun_path = 0;
+ return res;
+}
+
+static void
+socket_data(void *data, int fd, uint32_t mask)
+{
+ struct server *s = data;
+ struct client_data *client;
+ struct sockaddr_un name;
+ socklen_t length;
+ int client_fd;
+
+ length = sizeof(name);
+ client_fd = accept4(fd, (struct sockaddr *) &name, &length, SOCK_CLOEXEC);
+ if (client_fd < 0) {
+ pw_log_error("server %p: failed to accept: %m", s);
+ return;
+ }
+
+ client = client_new(s, client_fd);
+ if (client == NULL) {
+ pw_log_error("server %p: failed to create client", s);
+ close(client_fd);
+ return;
+ }
+}
+
+static int write_socket_address(struct server *s)
+{
+ long v;
+ int fd, res = 0;
+ char *endptr;
+ const char *env = getenv("PIPEWIRE_NOTIFICATION_FD");
+
+ if (env == NULL || env[0] == '\0')
+ return 0;
+
+ errno = 0;
+ v = strtol(env, &endptr, 10);
+ if (endptr[0] != '\0')
+ errno = EINVAL;
+ if (errno != 0) {
+ res = -errno;
+ pw_log_error("server %p: strtol() failed with error: %m", s);
+ goto error;
+ }
+ fd = (int)v;
+ if (v != fd) {
+ res = -ERANGE;
+ pw_log_error("server %p: invalid fd %ld: %s", s, v, spa_strerror(res));
+ goto error;
+ }
+ if (dprintf(fd, "%s\n", s->addr.sun_path) < 0) {
+ res = -errno;
+ pw_log_error("server %p: dprintf() failed with error: %m", s);
+ goto error;
+ }
+ close(fd);
+ unsetenv("PIPEWIRE_NOTIFICATION_FD");
+ return 0;
+
+error:
+ return res;
+}
+
+static int add_socket(struct pw_protocol *protocol, struct server *s)
+{
+ socklen_t size;
+ int fd = -1, res;
+ bool activated = false;
+
+#ifdef HAVE_SYSTEMD
+ {
+ int i, n = sd_listen_fds(0);
+ for (i = 0; i < n; ++i) {
+ if (sd_is_socket_unix(SD_LISTEN_FDS_START + i, SOCK_STREAM,
+ 1, s->addr.sun_path, 0) > 0) {
+ fd = SD_LISTEN_FDS_START + i;
+ activated = true;
+ pw_log_info("server %p: Found socket activation socket for '%s'",
+ s, s->addr.sun_path);
+ break;
+ }
+ }
+ }
+#endif
+
+ if (fd < 0) {
+ struct stat socket_stat;
+
+ if ((fd = socket(PF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0)) < 0) {
+ res = -errno;
+ goto error;
+ }
+ if (stat(s->addr.sun_path, &socket_stat) < 0) {
+ if (errno != ENOENT) {
+ res = -errno;
+ pw_log_error("server %p: stat %s failed with error: %m",
+ s, s->addr.sun_path);
+ goto error_close;
+ }
+ } else if (socket_stat.st_mode & S_IWUSR || socket_stat.st_mode & S_IWGRP) {
+ unlink(s->addr.sun_path);
+ }
+
+ size = offsetof(struct sockaddr_un, sun_path) + strlen(s->addr.sun_path);
+ if (bind(fd, (struct sockaddr *) &s->addr, size) < 0) {
+ res = -errno;
+ pw_log_error("server %p: bind() failed with error: %m", s);
+ goto error_close;
+ }
+
+ if (listen(fd, 128) < 0) {
+ res = -errno;
+ pw_log_error("server %p: listen() failed with error: %m", s);
+ goto error_close;
+ }
+ }
+
+ res = write_socket_address(s);
+ if (res < 0) {
+ pw_log_error("server %p: failed to write socket address: %s", s,
+ spa_strerror(res));
+ goto error_close;
+ }
+ s->activated = activated;
+ s->loop = pw_context_get_main_loop(protocol->context);
+ if (s->loop == NULL) {
+ res = -errno;
+ goto error_close;
+ }
+ s->source = pw_loop_add_io(s->loop, fd, SPA_IO_IN, true, socket_data, s);
+ if (s->source == NULL) {
+ res = -errno;
+ goto error_close;
+ }
+ return 0;
+
+error_close:
+ close(fd);
+error:
+ return res;
+
+}
+
+static int impl_steal_fd(struct pw_protocol_client *client)
+{
+ struct client *impl = SPA_CONTAINER_OF(client, struct client, this);
+ int fd;
+
+ if (impl->source == NULL)
+ return -EIO;
+
+ fd = fcntl(impl->source->fd, F_DUPFD_CLOEXEC, 3);
+ if (fd < 0)
+ return -errno;
+
+ pw_protocol_client_disconnect(client);
+ return fd;
+}
+
+static int
+process_remote(struct client *impl)
+{
+ const struct pw_protocol_native_message *msg;
+ struct pw_protocol_native_connection *conn = impl->connection;
+ struct pw_core *this = impl->this.core;
+ int res = 0;
+
+ impl->ref++;
+ while (!impl->disconnecting && !impl->paused) {
+ struct pw_proxy *proxy;
+ const struct pw_protocol_native_demarshal *demarshal;
+ const struct pw_protocol_marshal *marshal;
+
+ res = pw_protocol_native_connection_get_next(conn, &msg);
+ if (res < 0) {
+ if (res == -EAGAIN)
+ res = 0;
+ break;
+ }
+ if (res == 0)
+ break;
+
+ pw_log_trace("%p: got message %d from %u seq:%d",
+ this, msg->opcode, msg->id, msg->seq);
+
+ this->recv_seq = msg->seq;
+
+ if (debug_messages)
+ debug_msg("<<<<<< in", msg, false);
+
+ pre_demarshal(conn, msg, this, footer_core_demarshal,
+ SPA_N_ELEMENTS(footer_core_demarshal));
+
+ proxy = pw_core_find_proxy(this, msg->id);
+ if (proxy == NULL || proxy->zombie) {
+ if (proxy == NULL)
+ pw_log_error("%p: could not find proxy %u", this, msg->id);
+ else
+ pw_log_debug("%p: zombie proxy %u", this, msg->id);
+
+ /* FIXME close fds */
+ continue;
+ }
+
+ marshal = pw_proxy_get_marshal(proxy);
+ if (marshal == NULL || msg->opcode >= marshal->n_server_methods) {
+ pw_log_error("%p: invalid method %u for %u (%d)",
+ this, msg->opcode, msg->id,
+ marshal ? marshal->n_server_methods : (uint32_t)-1);
+ continue;
+ }
+
+ demarshal = marshal->client_demarshal;
+ if (!demarshal[msg->opcode].func) {
+ pw_log_error("%p: function %d not implemented on %u",
+ this, msg->opcode, msg->id);
+ continue;
+ }
+ proxy->refcount++;
+ pw_protocol_native_connection_enter(conn);
+ res = demarshal[msg->opcode].func(proxy, msg);
+ pw_protocol_native_connection_leave(conn);
+ pw_proxy_unref(proxy);
+
+ if (res < 0) {
+ pw_log_error("%p: invalid message received %u for %u: %s",
+ this, msg->opcode, msg->id, spa_strerror(res));
+ debug_msg("*invalid*", msg, true);
+ }
+ res = 0;
+ }
+ client_unref(impl);
+ return res;
+}
+
+static void
+on_remote_data(void *data, int fd, uint32_t mask)
+{
+ struct client *impl = data;
+ struct pw_core *this = impl->this.core;
+ struct pw_proxy *core_proxy = (struct pw_proxy*)this;
+ struct pw_protocol_native_connection *conn = impl->connection;
+ struct pw_context *context = pw_core_get_context(this);
+ struct pw_loop *loop = pw_context_get_main_loop(context);
+ int res;
+
+ core_proxy->refcount++;
+ impl->ref++;
+
+ if (mask & (SPA_IO_ERR | SPA_IO_HUP)) {
+ res = -EPIPE;
+ goto error;
+ }
+ if (mask & SPA_IO_IN) {
+ if ((res = process_remote(impl)) < 0)
+ goto error;
+ }
+ if (mask & SPA_IO_OUT || impl->need_flush) {
+ if (!impl->connected) {
+ socklen_t len = sizeof res;
+
+ if (getsockopt(fd, SOL_SOCKET, SO_ERROR, &res, &len) < 0) {
+ res = -errno;
+ pw_log_error("getsockopt: %m");
+ goto error;
+ }
+ if (res != 0) {
+ res = -res;
+ goto error;
+ }
+ impl->connected = true;
+ pw_log_debug("%p: connected, fd %d", impl, fd);
+ }
+ impl->need_flush = false;
+ res = pw_protocol_native_connection_flush(conn);
+ if (res >= 0) {
+ pw_loop_update_io(loop, impl->source,
+ impl->source->mask & ~SPA_IO_OUT);
+ } else if (res != -EAGAIN)
+ goto error;
+ }
+
+done:
+ client_unref(impl);
+ pw_proxy_unref(core_proxy);
+ return;
+error:
+ pw_log_debug("%p: got connection error %d (%s)", impl, res, spa_strerror(res));
+ if (impl->source) {
+ pw_loop_destroy_source(loop, impl->source);
+ impl->source = NULL;
+ }
+ pw_proxy_notify(core_proxy,
+ struct pw_core_events, error, 0, 0,
+ this->recv_seq, res, "connection error");
+ goto done;
+}
+
+static int impl_connect_fd(struct pw_protocol_client *client, int fd, bool do_close)
+{
+ struct client *impl = SPA_CONTAINER_OF(client, struct client, this);
+
+ impl->connected = false;
+ impl->disconnecting = false;
+
+ pw_protocol_native_connection_set_fd(impl->connection, fd);
+ impl->source = pw_loop_add_io(impl->context->main_loop,
+ fd,
+ SPA_IO_IN | SPA_IO_OUT | SPA_IO_HUP | SPA_IO_ERR,
+ do_close, on_remote_data, impl);
+ if (impl->source == NULL)
+ return -errno;
+
+ return 0;
+}
+
+static void impl_disconnect(struct pw_protocol_client *client)
+{
+ struct client *impl = SPA_CONTAINER_OF(client, struct client, this);
+
+ impl->disconnecting = true;
+
+ if (impl->source)
+ pw_loop_destroy_source(impl->context->main_loop, impl->source);
+ impl->source = NULL;
+
+ pw_protocol_native_connection_set_fd(impl->connection, -1);
+}
+
+static void impl_destroy(struct pw_protocol_client *client)
+{
+ struct client *impl = SPA_CONTAINER_OF(client, struct client, this);
+
+ impl_disconnect(client);
+
+ if (impl->connection)
+ pw_protocol_native_connection_destroy(impl->connection);
+ impl->connection = NULL;
+
+ spa_list_remove(&client->link);
+ client_unref(impl);
+}
+
+static int impl_set_paused(struct pw_protocol_client *client, bool paused)
+{
+ struct client *impl = SPA_CONTAINER_OF(client, struct client, this);
+ uint32_t mask;
+
+ if (impl->source == NULL)
+ return -EIO;
+
+ mask = impl->source->mask;
+
+ impl->paused = paused;
+
+ SPA_FLAG_UPDATE(mask, SPA_IO_IN, !paused);
+
+ pw_log_debug("%p: paused %d", client->protocol, paused);
+ pw_loop_update_io(impl->context->main_loop, impl->source, mask);
+
+ return paused ? 0 : process_remote(impl);
+}
+
+static int pw_protocol_native_connect_internal(struct pw_protocol_client *client,
+ const struct spa_dict *props,
+ void (*done_callback) (void *data, int res),
+ void *data)
+{
+ int res, sv[2];
+ struct pw_protocol *protocol = client->protocol;
+ struct protocol_data *d = pw_protocol_get_user_data(protocol);
+ struct server *s = d->local;
+ struct pw_permission permissions[1];
+ struct client_data *c;
+
+ pw_log_debug("server %p: internal connect", s);
+
+ if (socketpair(PF_LOCAL, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0, sv) < 0) {
+ res = -errno;
+ pw_log_error("server %p: socketpair() failed with error: %m", s);
+ goto error;
+ }
+
+ c = client_new(s, sv[0]);
+ if (c == NULL) {
+ res = -errno;
+ pw_log_error("server %p: failed to create client: %m", s);
+ goto error_close;
+ }
+ permissions[0] = PW_PERMISSION_INIT(PW_ID_ANY, PW_PERM_ALL);
+ pw_impl_client_update_permissions(c->client, 1, permissions);
+
+ res = pw_protocol_client_connect_fd(client, sv[1], true);
+done:
+ if (done_callback)
+ done_callback(data, res);
+ return res;
+
+error_close:
+ close(sv[0]);
+ close(sv[1]);
+error:
+ goto done;
+}
+
+static void on_client_connection_destroy(void *data)
+{
+ struct client *impl = data;
+ spa_hook_remove(&impl->conn_listener);
+}
+
+static void on_client_need_flush(void *data)
+{
+ struct client *impl = data;
+
+ pw_log_trace("need flush");
+ impl->need_flush = true;
+
+ if (impl->source && !(impl->source->mask & SPA_IO_OUT)) {
+ pw_loop_update_io(impl->context->main_loop,
+ impl->source, impl->source->mask | SPA_IO_OUT);
+ }
+}
+
+static const struct pw_protocol_native_connection_events client_conn_events = {
+ PW_VERSION_PROTOCOL_NATIVE_CONNECTION_EVENTS,
+ .destroy = on_client_connection_destroy,
+ .need_flush = on_client_need_flush,
+};
+
+static struct pw_protocol_client *
+impl_new_client(struct pw_protocol *protocol,
+ struct pw_core *core,
+ const struct spa_dict *props)
+{
+ struct client *impl;
+ struct pw_protocol_client *this;
+ const char *str = NULL;
+ int res;
+
+ if ((impl = calloc(1, sizeof(struct client))) == NULL)
+ return NULL;
+
+ pw_log_debug("%p: new client %p", protocol, impl);
+
+ this = &impl->this;
+ this->protocol = protocol;
+ this->core = core;
+
+ impl->ref = 1;
+ impl->context = protocol->context;
+ impl->connection = pw_protocol_native_connection_new(protocol->context, -1);
+ if (impl->connection == NULL) {
+ res = -errno;
+ goto error_free;
+ }
+ pw_protocol_native_connection_add_listener(impl->connection,
+ &impl->conn_listener,
+ &client_conn_events,
+ impl);
+
+ if (props) {
+ str = spa_dict_lookup(props, PW_KEY_REMOTE_INTENTION);
+ if (str == NULL &&
+ (str = spa_dict_lookup(props, PW_KEY_REMOTE_NAME)) != NULL &&
+ spa_streq(str, "internal"))
+ str = "internal";
+ }
+ if (str == NULL)
+ str = "generic";
+
+ pw_log_debug("%p: connect %s", protocol, str);
+
+ if (spa_streq(str, "screencast"))
+ this->connect = pw_protocol_native_connect_portal_screencast;
+ else if (spa_streq(str, "internal"))
+ this->connect = pw_protocol_native_connect_internal;
+ else
+ this->connect = pw_protocol_native_connect_local_socket;
+
+ this->steal_fd = impl_steal_fd;
+ this->connect_fd = impl_connect_fd;
+ this->disconnect = impl_disconnect;
+ this->destroy = impl_destroy;
+ this->set_paused = impl_set_paused;
+
+ spa_list_append(&protocol->client_list, &this->link);
+
+ return this;
+
+error_free:
+ free(impl);
+ errno = -res;
+ return NULL;
+}
+
+static void destroy_server(struct pw_protocol_server *server)
+{
+ struct server *s = SPA_CONTAINER_OF(server, struct server, this);
+ struct client_data *data, *tmp;
+
+ pw_log_debug("%p: server %p", s->this.protocol, s);
+
+ spa_list_remove(&server->link);
+
+ spa_list_for_each_safe(data, tmp, &server->client_list, protocol_link)
+ pw_impl_client_destroy(data->client);
+
+ if (s->source)
+ pw_loop_destroy_source(s->loop, s->source);
+ if (s->resume)
+ pw_loop_destroy_source(s->loop, s->resume);
+ if (s->addr.sun_path[0] && !s->activated)
+ unlink(s->addr.sun_path);
+ if (s->lock_addr[0])
+ unlink(s->lock_addr);
+ if (s->fd_lock != -1)
+ close(s->fd_lock);
+ free(s);
+}
+
+static void do_resume(void *_data, uint64_t count)
+{
+ struct server *server = _data;
+ struct pw_protocol_server *this = &server->this;
+ struct client_data *data, *tmp;
+ int res;
+
+ pw_log_debug("flush");
+
+ spa_list_for_each_safe(data, tmp, &this->client_list, protocol_link) {
+ data->client->refcount++;
+ if ((res = process_messages(data)) < 0)
+ handle_client_error(data->client, res, "do_resume");
+ pw_impl_client_unref(data->client);
+ }
+ return;
+}
+
+static const char *
+get_server_name(const struct spa_dict *props)
+{
+ const char *name = NULL;
+
+ name = getenv("PIPEWIRE_CORE");
+ if (name == NULL && props != NULL)
+ name = spa_dict_lookup(props, PW_KEY_CORE_NAME);
+ if (name == NULL)
+ name = PW_DEFAULT_REMOTE;
+ return name;
+}
+
+static struct server *
+create_server(struct pw_protocol *protocol,
+ struct pw_impl_core *core,
+ const struct spa_dict *props)
+{
+ struct pw_protocol_server *this;
+ struct server *s;
+
+ if ((s = calloc(1, sizeof(struct server))) == NULL)
+ return NULL;
+
+ s->fd_lock = -1;
+
+ this = &s->this;
+ this->protocol = protocol;
+ this->core = core;
+ spa_list_init(&this->client_list);
+ this->destroy = destroy_server;
+
+ spa_list_append(&protocol->server_list, &this->link);
+
+ pw_log_debug("%p: created server %p", protocol, this);
+
+ return s;
+}
+
+static struct pw_protocol_server *
+impl_add_server(struct pw_protocol *protocol,
+ struct pw_impl_core *core,
+ const struct spa_dict *props)
+{
+ struct pw_protocol_server *this;
+ struct server *s;
+ const char *name;
+ int res;
+
+ if ((s = create_server(protocol, core, props)) == NULL)
+ return NULL;
+
+ this = &s->this;
+
+ name = get_server_name(props);
+
+ if ((res = init_socket_name(s, name)) < 0)
+ goto error;
+
+ if ((res = lock_socket(s)) < 0)
+ goto error;
+
+ if ((res = add_socket(protocol, s)) < 0)
+ goto error;
+
+ if ((s->resume = pw_loop_add_event(s->loop, do_resume, s)) == NULL)
+ goto error;
+
+ pw_log_info("%p: Listening on '%s'", protocol, name);
+
+ return this;
+
+error:
+ destroy_server(this);
+ errno = -res;
+ return NULL;
+}
+
+static const struct pw_protocol_implementation protocol_impl = {
+ PW_VERSION_PROTOCOL_IMPLEMENTATION,
+ .new_client = impl_new_client,
+ .add_server = impl_add_server,
+};
+
+static struct spa_pod_builder *
+impl_ext_begin_proxy(struct pw_proxy *proxy, uint8_t opcode, struct pw_protocol_native_message **msg)
+{
+ struct client *impl = SPA_CONTAINER_OF(proxy->core->conn, struct client, this);
+ return pw_protocol_native_connection_begin(impl->connection, proxy->id, opcode, msg);
+}
+
+static uint32_t impl_ext_add_proxy_fd(struct pw_proxy *proxy, int fd)
+{
+ struct client *impl = SPA_CONTAINER_OF(proxy->core->conn, struct client, this);
+ return pw_protocol_native_connection_add_fd(impl->connection, fd);
+}
+
+static int impl_ext_get_proxy_fd(struct pw_proxy *proxy, uint32_t index)
+{
+ struct client *impl = SPA_CONTAINER_OF(proxy->core->conn, struct client, this);
+ return pw_protocol_native_connection_get_fd(impl->connection, index);
+}
+
+static void assert_single_pod(struct spa_pod_builder *builder)
+{
+ /*
+ * Check the invariant that the message we just marshaled
+ * consists of at most one POD.
+ */
+ struct spa_pod *pod = builder->data;
+ spa_assert(builder->data == NULL ||
+ builder->state.offset < sizeof(struct spa_pod) ||
+ builder->state.offset == SPA_POD_SIZE(pod));
+}
+
+static int impl_ext_end_proxy(struct pw_proxy *proxy,
+ struct spa_pod_builder *builder)
+{
+ struct pw_core *core = proxy->core;
+ struct client *impl = SPA_CONTAINER_OF(core->conn, struct client, this);
+ assert_single_pod(builder);
+ marshal_core_footers(&impl->footer_state, core, builder);
+ return core->send_seq = pw_protocol_native_connection_end(impl->connection, builder);
+}
+
+static struct spa_pod_builder *
+impl_ext_begin_resource(struct pw_resource *resource,
+ uint8_t opcode, struct pw_protocol_native_message **msg)
+{
+ struct client_data *data = resource->client->user_data;
+ return pw_protocol_native_connection_begin(data->connection, resource->id, opcode, msg);
+}
+
+static uint32_t impl_ext_add_resource_fd(struct pw_resource *resource, int fd)
+{
+ struct client_data *data = resource->client->user_data;
+ return pw_protocol_native_connection_add_fd(data->connection, fd);
+}
+static int impl_ext_get_resource_fd(struct pw_resource *resource, uint32_t index)
+{
+ struct client_data *data = resource->client->user_data;
+ return pw_protocol_native_connection_get_fd(data->connection, index);
+}
+
+static int impl_ext_end_resource(struct pw_resource *resource,
+ struct spa_pod_builder *builder)
+{
+ struct client_data *data = resource->client->user_data;
+ struct pw_impl_client *client = resource->client;
+ assert_single_pod(builder);
+ marshal_client_footers(&data->footer_state, client, builder);
+ return client->send_seq = pw_protocol_native_connection_end(data->connection, builder);
+}
+static const struct pw_protocol_native_ext protocol_ext_impl = {
+ PW_VERSION_PROTOCOL_NATIVE_EXT,
+ .begin_proxy = impl_ext_begin_proxy,
+ .add_proxy_fd = impl_ext_add_proxy_fd,
+ .get_proxy_fd = impl_ext_get_proxy_fd,
+ .end_proxy = impl_ext_end_proxy,
+ .begin_resource = impl_ext_begin_resource,
+ .add_resource_fd = impl_ext_add_resource_fd,
+ .get_resource_fd = impl_ext_get_resource_fd,
+ .end_resource = impl_ext_end_resource,
+};
+
+static void module_destroy(void *data)
+{
+ struct protocol_data *d = data;
+
+ spa_hook_remove(&d->module_listener);
+
+ pw_protocol_destroy(d->protocol);
+}
+
+static const struct pw_impl_module_events module_events = {
+ PW_VERSION_IMPL_MODULE_EVENTS,
+ .destroy = module_destroy,
+};
+
+static int need_server(struct pw_context *context, const struct spa_dict *props)
+{
+ const char *val = NULL;
+
+ val = getenv("PIPEWIRE_DAEMON");
+ if (val == NULL && props != NULL)
+ val = spa_dict_lookup(props, PW_KEY_CORE_DAEMON);
+ if (val && pw_properties_parse_bool(val))
+ return 1;
+ return 0;
+}
+
+SPA_EXPORT
+int pipewire__module_init(struct pw_impl_module *module, const char *args)
+{
+ struct pw_context *context = pw_impl_module_get_context(module);
+ struct pw_protocol *this;
+ struct protocol_data *d;
+ const struct pw_properties *props;
+ int res;
+
+ PW_LOG_TOPIC_INIT(mod_topic);
+ PW_LOG_TOPIC_INIT(mod_topic_connection);
+
+ if (pw_context_find_protocol(context, PW_TYPE_INFO_PROTOCOL_Native) != NULL)
+ return 0;
+
+ this = pw_protocol_new(context, PW_TYPE_INFO_PROTOCOL_Native, sizeof(struct protocol_data));
+ if (this == NULL)
+ return -errno;
+
+ debug_messages = mod_topic_connection->level >= SPA_LOG_LEVEL_DEBUG;
+
+ this->implementation = &protocol_impl;
+ this->extension = &protocol_ext_impl;
+
+ pw_protocol_native_init(this);
+ pw_protocol_native0_init(this);
+
+ pw_log_debug("%p: new debug:%d", this, debug_messages);
+
+ d = pw_protocol_get_user_data(this);
+ d->protocol = this;
+ d->module = module;
+
+ props = pw_context_get_properties(context);
+ d->local = create_server(this, context->core, &props->dict);
+
+ if (need_server(context, &props->dict)) {
+ if (impl_add_server(this, context->core, &props->dict) == NULL) {
+ res = -errno;
+ goto error_cleanup;
+ }
+ }
+
+ pw_impl_module_add_listener(module, &d->module_listener, &module_events, d);
+
+ pw_impl_module_update_properties(module, &SPA_DICT_INIT_ARRAY(module_props));
+
+ return 0;
+
+error_cleanup:
+ pw_protocol_destroy(this);
+ return res;
+}