version 1.3.2.13, 2011/08/19 14:44:34
|
version 1.5.2.2, 2011/09/07 09:10:55
|
Line 51 rpc_srv_dispatchCall(void *arg)
|
Line 51 rpc_srv_dispatchCall(void *arg)
|
{ |
{ |
rpc_cli_t *c = arg; |
rpc_cli_t *c = arg; |
rpc_srv_t *s; |
rpc_srv_t *s; |
rpc_val_t *vals = NULL, *v = NULL; |
|
rpc_func_t *f = NULL; |
rpc_func_t *f = NULL; |
|
array_t *arr; |
struct tagRPCCall *rpc; |
struct tagRPCCall *rpc; |
struct tagRPCRet *rrpc; |
struct tagRPCRet *rrpc; |
rpc_sess_t ses = { 0 }; |
rpc_sess_t ses = { 0 }; |
fd_set fds; |
fd_set fds; |
u_char buf[BUFSIZ], *data; | u_char *buf; |
int ret, argc = 0, Limit = 0; |
int ret, argc = 0, Limit = 0; |
register int i; |
register int i; |
|
|
Line 67 rpc_srv_dispatchCall(void *arg)
|
Line 67 rpc_srv_dispatchCall(void *arg)
|
} else |
} else |
s = c->cli_parent; |
s = c->cli_parent; |
|
|
|
buf = malloc(s->srv_netbuf); |
|
if (!buf) { |
|
LOGERR; |
|
return NULL; |
|
} |
|
|
do { |
do { |
v = NULL; |
|
FD_ZERO(&fds); |
FD_ZERO(&fds); |
FD_SET(c->cli_sock, &fds); |
FD_SET(c->cli_sock, &fds); |
ret = select(c->cli_sock + 1, &fds, NULL, NULL, NULL); |
ret = select(c->cli_sock + 1, &fds, NULL, NULL, NULL); |
Line 80 rpc_srv_dispatchCall(void *arg)
|
Line 85 rpc_srv_dispatchCall(void *arg)
|
ret = -2; |
ret = -2; |
break; |
break; |
} |
} |
memset(buf, 0, sizeof buf); | memset(buf, 0, s->srv_netbuf); |
ret = recv(c->cli_sock, buf, sizeof buf, 0); | ret = recv(c->cli_sock, buf, s->srv_netbuf, 0); |
if (ret == -1) { |
if (ret == -1) { |
LOGERR; |
LOGERR; |
ret = -3; |
ret = -3; |
Line 92 rpc_srv_dispatchCall(void *arg)
|
Line 97 rpc_srv_dispatchCall(void *arg)
|
break; |
break; |
} |
} |
if (ret < sizeof(struct tagRPCCall)) { |
if (ret < sizeof(struct tagRPCCall)) { |
rpc_SetErr(EMSGSIZE, "Error:: too short RPC packet ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: too short RPC packet ...\n"); |
ret = -4; |
ret = -4; |
break; |
break; |
} else |
} else |
rpc = (struct tagRPCCall*) buf; |
rpc = (struct tagRPCCall*) buf; |
/* check RPC packet session info */ |
/* check RPC packet session info */ |
if (memcmp(&rpc->call_session, &s->srv_session, sizeof rpc->call_session)) { | if (rpc_chkPktSession(&rpc->call_session, &s->srv_session)) { |
rpc_SetErr(EINVAL, "Error:: get invalid RPC session ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: get invalid RPC session ...\n"); |
ret = -5; |
ret = -5; |
goto makeReply; |
goto makeReply; |
} else |
} else |
Limit = sizeof(struct tagRPCCall); |
Limit = sizeof(struct tagRPCCall); |
|
|
/* RPC is OK! Go decapsulate variables ... */ |
/* RPC is OK! Go decapsulate variables ... */ |
if (rpc->call_argc) { | if (ntohs(rpc->call_argc)) { |
v = (rpc_val_t*) (buf + Limit); | arr = io_buffer2vals(buf + Limit, s->srv_netbuf - Limit, |
/* check RPC packet length */ | ntohs(rpc->call_argc), 1); |
if (rpc->call_argc * sizeof(rpc_val_t) > sizeof buf - Limit) { | if (!arr) { |
rpc_SetErr(EMSGSIZE, "Error:: too long RPC packet ...\n"); | |
ret = -5; |
ret = -5; |
goto makeReply; |
goto makeReply; |
} else |
|
Limit += rpc->call_argc * sizeof(rpc_val_t); |
|
/* RPC received variables types OK! */ |
|
data = (u_char*) v + rpc->call_argc * sizeof(rpc_val_t); |
|
for (i = 0; i < rpc->call_argc; i++) { |
|
switch (v[i].val_type) { |
|
case buffer: |
|
if (v[i].val_len > sizeof buf - Limit) { |
|
rpc_SetErr(EMSGSIZE, "Error:: too long RPC packet ...\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} else |
|
Limit += v[i].val_len; |
|
|
|
v[i].val.buffer = data; |
|
data += v[i].val_len; |
|
break; |
|
case string: |
|
if (v[i].val_len > sizeof buf - Limit) { |
|
rpc_SetErr(EMSGSIZE, "Error:: too long RPC packet ...\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} else |
|
Limit += v[i].val_len; |
|
|
|
v[i].val.string = (int8_t*) data; |
|
data += v[i].val_len; |
|
break; |
|
case blob: |
|
if (s->srv_blob.state == disable) { |
|
rpc_SetErr(ENOTSUP, "Error:: BLOB server is disabled\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} |
|
if (s->srv_blob.state == kill) { |
|
rpc_SetErr(ENOTSUP, "Error:: BLOB server is gone.\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} |
|
default: |
|
break; |
|
} |
|
} |
} |
} | } else |
| arr = NULL; |
|
|
/* execute call */ |
/* execute call */ |
argc = 0; |
argc = 0; |
vals = NULL; |
|
memcpy(&ses, &rpc->call_session, sizeof ses); |
memcpy(&ses, &rpc->call_session, sizeof ses); |
if (!(f = rpc_srv_getCall(s, rpc->call_tag, rpc->call_hash))) { | if (!(f = rpc_srv_getCall(s, ntohs(rpc->call_tag), ntohl(rpc->call_hash)))) { |
rpc_SetErr(EINVAL, "Error:: call not found into RPC server ...\n"); | rpc_SetErr(EPROGUNAVAIL, "Error:: call not found into RPC server ...\n"); |
ret = -6; |
ret = -6; |
} else |
} else |
if ((ret = rpc_srv_execCall(f, rpc, v)) == -1) | if ((ret = rpc_srv_execCall(f, rpc, arr)) == -1) |
ret = -9; |
ret = -9; |
else | else { |
argc = rpc_srv_getVars(f, &vals); | if (arr) |
| io_arrayDestroy(&arr); |
| argc = rpc_srv_getVars(f, &arr); |
| goto makeReply; /* Call finish OK */ |
| } |
| |
| if (arr) |
| io_arrayDestroy(&arr); |
| |
makeReply: |
makeReply: |
/* made reply */ | /* Made reply */ |
memset(buf, 0, sizeof buf); | memset(buf, 0, s->srv_netbuf); |
rrpc = (struct tagRPCRet*) buf; |
rrpc = (struct tagRPCRet*) buf; |
Limit = sizeof(struct tagRPCRet); |
Limit = sizeof(struct tagRPCRet); |
|
|
memcpy(&rrpc->ret_session, &ses, sizeof(rpc_sess_t)); |
memcpy(&rrpc->ret_session, &ses, sizeof(rpc_sess_t)); |
rrpc->ret_tag = rpc->call_tag; |
rrpc->ret_tag = rpc->call_tag; |
rrpc->ret_hash = rpc->call_hash; |
rrpc->ret_hash = rpc->call_hash; |
rrpc->ret_errno = rpc_Errno; | rrpc->ret_errno = htonl(rpc_Errno); |
rrpc->ret_retcode = ret; | rrpc->ret_retcode = htonl(ret); |
rrpc->ret_argc = argc; | rrpc->ret_argc = htons(argc); |
|
|
if (argc && vals) { | if (argc && arr) { |
v = (rpc_val_t*) (buf + Limit); | /* Go Encapsulate variables ... */ |
if (argc * sizeof(rpc_val_t) > sizeof buf - Limit) { | if ((i = io_vals2buffer(buf + Limit, s->srv_netbuf - Limit, arr)) == -1) { |
for (i = 0; i < argc; i++) | rpc_srv_freeVals(f); |
RPC_FREE_VAL(&vals[i]); | |
rpc_srv_freeVars(f); | |
vals = NULL; | |
argc = 0; |
argc = 0; |
ret = -7; |
ret = -7; |
rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet values (-7) ...\n"); | rpc_SetErr(EBADRPC, "Error:: in prepare RPC packet values (-7) ...\n"); |
goto makeReply; |
goto makeReply; |
} else | } else { |
Limit += argc * sizeof(rpc_val_t); | Limit += i; |
memcpy(v, vals, argc * sizeof(rpc_val_t)); | |
data = (u_char*) v + argc * sizeof(rpc_val_t); | |
for (ret = i = 0; i < argc; i++) { | |
switch (vals[i].val_type) { | |
case buffer: | |
if (ret || Limit + vals[i].val_len > sizeof buf) { | |
rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet (-7) ...\n"); | |
rrpc->ret_retcode = ret = -7; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
|
|
memcpy(data, vals[i].val.buffer, vals[i].val_len); | rpc_srv_freeVals(f); |
data += vals[i].val_len; | |
Limit += vals[i].val_len; | |
break; | |
case string: | |
if (ret || Limit + vals[i].val_len > sizeof buf) { | |
rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet (-7) ...\n"); | |
rrpc->ret_retcode = ret = -7; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
| |
memcpy(data, vals[i].val.string, vals[i].val_len); | |
data += vals[i].val_len; | |
Limit += vals[i].val_len; | |
break; | |
case blob: | |
if (s->srv_blob.state == disable) { | |
rpc_SetErr(ENOTSUP, "Error:: BLOB server is disabled\n"); | |
rrpc->ret_retcode = ret = -5; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
if (s->srv_blob.state == kill) { | |
rpc_SetErr(ENOTSUP, "Error:: BLOB server is gone.\n"); | |
rrpc->ret_retcode = ret = -5; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
default: | |
break; | |
} | |
| |
RPC_FREE_VAL(&vals[i]); | |
} |
} |
rpc_srv_freeVars(f); |
|
vals = NULL; |
|
argc = 0; |
|
} |
} |
|
|
ret = send(c->cli_sock, buf, Limit, 0); |
ret = send(c->cli_sock, buf, Limit, 0); |
Line 254 makeReply:
|
Line 175 makeReply:
|
break; |
break; |
} |
} |
if (ret != Limit) { |
if (ret != Limit) { |
rpc_SetErr(ECANCELED, "Error:: in send RPC request, should be send %d bytes, " | rpc_SetErr(EPROCUNAVAIL, "Error:: in send RPC request, should be send %d bytes, " |
"really is %d\n", Limit, ret); |
"really is %d\n", Limit, ret); |
ret = -9; |
ret = -9; |
break; |
break; |
Line 264 makeReply:
|
Line 185 makeReply:
|
shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
close(c->cli_sock); |
close(c->cli_sock); |
memset(c, 0, sizeof(rpc_cli_t)); |
memset(c, 0, sizeof(rpc_cli_t)); |
|
free(buf); |
return (void*) (long)ret; |
return (void*) (long)ret; |
} |
} |
|
|
Line 320 rpc_srv_dispatchVars(void *arg)
|
Line 242 rpc_srv_dispatchVars(void *arg)
|
break; |
break; |
} |
} |
if (ret < sizeof(struct tagBLOBHdr)) { |
if (ret < sizeof(struct tagBLOBHdr)) { |
rpc_SetErr(EMSGSIZE, "Error:: too short BLOB packet ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: too short BLOB packet ...\n"); |
ret = -4; |
ret = -4; |
break; |
break; |
} else |
} else |
Line 364 rpc_srv_dispatchVars(void *arg)
|
Line 286 rpc_srv_dispatchVars(void *arg)
|
ret = -7; |
ret = -7; |
break; |
break; |
default: |
default: |
rpc_SetErr(EINVAL, "Error:: unsupported BLOB command (%d)...\n", | rpc_SetErr(EPROCUNAVAIL, "Error:: unsupported BLOB command (%d)...\n", |
blob->hdr_cmd); |
blob->hdr_cmd); |
ret = -7; |
ret = -7; |
} |
} |
Line 380 makeReply:
|
Line 302 makeReply:
|
break; |
break; |
} |
} |
if (ret != sizeof buf) { |
if (ret != sizeof buf) { |
rpc_SetErr(ECANCELED, "Error:: in send BLOB reply, should be send %d bytes, " | rpc_SetErr(EPROCUNAVAIL, "Error:: in send BLOB reply, should be send %d bytes, " |
"really is %d\n", sizeof buf, ret); |
"really is %d\n", sizeof buf, ret); |
ret = -9; |
ret = -9; |
break; |
break; |
Line 390 makeReply:
|
Line 312 makeReply:
|
shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
close(c->cli_sock); |
close(c->cli_sock); |
memset(c, 0, sizeof(rpc_cli_t)); |
memset(c, 0, sizeof(rpc_cli_t)); |
return (void*) (long)ret; | return (void*) ((long)ret); |
} |
} |
|
|
// ------------------------------------------------- |
// ------------------------------------------------- |
Line 461 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
Line 383 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
close(srv->srv_blob.server.cli_sock); |
close(srv->srv_blob.server.cli_sock); |
return -1; |
return -1; |
} |
} |
|
n = srv->srv_netbuf; |
|
if (setsockopt(srv->srv_blob.server.cli_sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_blob.server.cli_sock); |
|
return -1; |
|
} |
|
if (setsockopt(srv->srv_blob.server.cli_sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_blob.server.cli_sock); |
|
return -1; |
|
} |
if (bind(srv->srv_blob.server.cli_sock, &srv->srv_blob.server.cli_sa, |
if (bind(srv->srv_blob.server.cli_sock, &srv->srv_blob.server.cli_sa, |
sizeof srv->srv_blob.server.cli_sa) == -1) { |
sizeof srv->srv_blob.server.cli_sa) == -1) { |
LOGERR; |
LOGERR; |
Line 479 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
Line 412 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
|
|
pthread_mutex_init(&srv->srv_blob.mtx, NULL); |
pthread_mutex_init(&srv->srv_blob.mtx, NULL); |
|
|
pthread_mutex_lock(&srv->srv_mtx); |
|
rpc_srv_registerCall(srv, NULL, CALL_BLOBSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBCLIENTS, 0); | rpc_srv_registerCall(srv, NULL, CALL_BLOBCLIENTS, 1); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBVARS, 0); | rpc_srv_registerCall(srv, NULL, CALL_BLOBVARS, 1); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBSTATE, 1); | rpc_srv_registerCall(srv, NULL, CALL_BLOBSTATE, 0); |
pthread_mutex_unlock(&srv->srv_mtx); | |
|
|
srv->srv_blob.state = enable; /* enable BLOB */ |
srv->srv_blob.state = enable; /* enable BLOB */ |
return 0; |
return 0; |
Line 519 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
Line 450 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
close(srv->srv_blob.server.cli_sock); |
close(srv->srv_blob.server.cli_sock); |
|
|
|
pthread_mutex_lock(&srv->srv_blob.mtx); |
if (srv->srv_blob.clients) { |
if (srv->srv_blob.clients) { |
free(srv->srv_blob.clients); |
free(srv->srv_blob.clients); |
srv->srv_blob.clients = NULL; |
srv->srv_blob.clients = NULL; |
} |
} |
|
|
/* detach blobs */ |
/* detach blobs */ |
pthread_mutex_lock(&srv->srv_blob.mtx); |
|
while ((f = srv->srv_blob.blobs)) { |
while ((f = srv->srv_blob.blobs)) { |
srv->srv_blob.blobs = f->blob_next; |
srv->srv_blob.blobs = f->blob_next; |
rpc_srv_blobFree(srv, f); |
rpc_srv_blobFree(srv, f); |
Line 538 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
Line 469 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
} |
} |
|
|
/* |
/* |
* rpc_srv_execBLOBServer() Execute Main BLOB server loop and wait for clients requests | * rpc_srv_loopBLOB() Execute Main BLOB server loop and wait for clients requests |
* @srv = RPC Server instance |
* @srv = RPC Server instance |
* return: -1 error or 0 ok, infinite loop ... |
* return: -1 error or 0 ok, infinite loop ... |
*/ |
*/ |
int |
int |
rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv) | rpc_srv_loopBLOB(rpc_srv_t * __restrict srv) |
{ |
{ |
socklen_t salen = sizeof(struct sockaddr); |
socklen_t salen = sizeof(struct sockaddr); |
register int i; |
register int i; |
Line 567 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 498 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
if (!c->cli_sa.sa_family) |
if (!c->cli_sa.sa_family) |
break; |
break; |
if (i >= srv->srv_numcli) { |
if (i >= srv->srv_numcli) { |
|
#ifdef HAVE_PTHREAD_YIELD |
|
pthread_yield(); |
|
#else |
usleep(1000000); |
usleep(1000000); |
|
#endif |
continue; |
continue; |
} |
} |
|
|
Line 596 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 531 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
pthread_detach(c->cli_tid); |
pthread_detach(c->cli_tid); |
} |
} |
|
|
srv->srv_blob.state = disable; | srv->srv_blob.state = kill; |
|
|
return 0; |
return 0; |
} |
} |
Line 607 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 542 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
* @regProgID = ProgramID for authentication & recognition |
* @regProgID = ProgramID for authentication & recognition |
* @regProcID = ProcessID for authentication & recognition |
* @regProcID = ProcessID for authentication & recognition |
* @concurentClients = Concurent clients at same time to this server |
* @concurentClients = Concurent clients at same time to this server |
|
* @netBuf = Network buffer length, if =0 == BUFSIZ (also meaning max RPC packet) |
* @family = Family type, AF_INET, AF_INET6 or AF_LOCAL |
* @family = Family type, AF_INET, AF_INET6 or AF_LOCAL |
* @csHost = Host name or address for bind server, if NULL any address |
* @csHost = Host name or address for bind server, if NULL any address |
* @Port = Port for bind server, if Port == 0 default port is selected |
* @Port = Port for bind server, if Port == 0 default port is selected |
Line 614 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 550 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
*/ |
*/ |
rpc_srv_t * |
rpc_srv_t * |
rpc_srv_initServer(u_int regProgID, u_int regProcID, int concurentClients, |
rpc_srv_initServer(u_int regProgID, u_int regProcID, int concurentClients, |
u_short family, const char *csHost, u_short Port) | int netBuf, u_short family, const char *csHost, u_short Port) |
{ |
{ |
rpc_srv_t *srv = NULL; |
rpc_srv_t *srv = NULL; |
int n = 1; |
int n = 1; |
Line 631 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 567 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
} |
} |
if (!Port) |
if (!Port) |
Port = RPC_DEFPORT; |
Port = RPC_DEFPORT; |
|
if (!netBuf) |
|
netBuf = BUFSIZ; |
if (csHost && family != AF_LOCAL) { |
if (csHost && family != AF_LOCAL) { |
host = gethostbyname2(csHost, family); |
host = gethostbyname2(csHost, family); |
if (!host) { |
if (!host) { |
Line 670 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 608 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
} else |
} else |
memset(srv, 0, sizeof(rpc_srv_t)); |
memset(srv, 0, sizeof(rpc_srv_t)); |
|
|
|
srv->srv_netbuf = netBuf; |
srv->srv_numcli = concurentClients; |
srv->srv_numcli = concurentClients; |
srv->srv_session.sess_version = RPC_VERSION; |
srv->srv_session.sess_version = RPC_VERSION; |
srv->srv_session.sess_program = regProgID; |
srv->srv_session.sess_program = regProgID; |
Line 703 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 642 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
free(srv); |
free(srv); |
return NULL; |
return NULL; |
} |
} |
|
n = srv->srv_netbuf; |
|
if (setsockopt(srv->srv_server.cli_sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_server.cli_sock); |
|
free(srv); |
|
return NULL; |
|
} |
|
if (setsockopt(srv->srv_server.cli_sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_server.cli_sock); |
|
free(srv); |
|
return NULL; |
|
} |
if (bind(srv->srv_server.cli_sock, &srv->srv_server.cli_sa, sizeof srv->srv_server.cli_sa) == -1) { |
if (bind(srv->srv_server.cli_sock, &srv->srv_server.cli_sa, sizeof srv->srv_server.cli_sa) == -1) { |
LOGERR; |
LOGERR; |
close(srv->srv_server.cli_sock); |
close(srv->srv_server.cli_sock); |
Line 723 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 675 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
pthread_mutex_init(&srv->srv_mtx, NULL); |
pthread_mutex_init(&srv->srv_mtx, NULL); |
|
|
rpc_srv_registerCall(srv, NULL, CALL_SRVSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_SRVSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_SRVCLIENTS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVCLIENTS, 1); |
rpc_srv_registerCall(srv, NULL, CALL_SRVCALLS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVSESSIONS, 4); |
rpc_srv_registerCall(srv, NULL, CALL_SRVSESSIONS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVCALLS, 1); |
return srv; |
return srv; |
} |
} |
|
|
Line 778 rpc_srv_endServer(rpc_srv_t * __restrict srv)
|
Line 730 rpc_srv_endServer(rpc_srv_t * __restrict srv)
|
} |
} |
|
|
/* |
/* |
* rpc_srv_execServer() Execute Main server loop and wait for clients requests | * rpc_srv_loopServer() Execute Main server loop and wait for clients requests |
* @srv = RPC Server instance |
* @srv = RPC Server instance |
* return: -1 error or 0 ok, infinite loop ... |
* return: -1 error or 0 ok, infinite loop ... |
*/ |
*/ |
int |
int |
rpc_srv_execServer(rpc_srv_t * __restrict srv) | rpc_srv_loopServer(rpc_srv_t * __restrict srv) |
{ |
{ |
socklen_t salen = sizeof(struct sockaddr); |
socklen_t salen = sizeof(struct sockaddr); |
register int i; |
register int i; |
Line 797 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 749 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
return -1; |
return -1; |
} |
} |
|
|
|
/* activate BLOB server worker if srv->srv_blob.state == enable */ |
|
rpc_srv_execBLOBServer(srv); |
|
|
if (listen(srv->srv_server.cli_sock, SOMAXCONN) == -1) { |
if (listen(srv->srv_server.cli_sock, SOMAXCONN) == -1) { |
LOGERR; |
LOGERR; |
return -1; |
return -1; |
Line 807 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 762 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
if (!c->cli_sa.sa_family) |
if (!c->cli_sa.sa_family) |
break; |
break; |
if (i >= srv->srv_numcli) { |
if (i >= srv->srv_numcli) { |
|
#ifdef HAVE_PTHREAD_YIELD |
|
pthread_yield(); |
|
#else |
usleep(1000000); |
usleep(1000000); |
|
#endif |
continue; |
continue; |
} |
} |
|
|
Line 845 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 804 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
* rpc_srv_execCall() Execute registered call from RPC server |
* rpc_srv_execCall() Execute registered call from RPC server |
* @call = Register RPC call |
* @call = Register RPC call |
* @rpc = IN RPC call structure |
* @rpc = IN RPC call structure |
* @args = IN RPC call array of rpc values | * @args = IN RPC calling arguments from RPC client |
* return: -1 error, !=-1 ok |
* return: -1 error, !=-1 ok |
*/ |
*/ |
int |
int |
rpc_srv_execCall(rpc_func_t * __restrict call, struct tagRPCCall * __restrict rpc, |
rpc_srv_execCall(rpc_func_t * __restrict call, struct tagRPCCall * __restrict rpc, |
rpc_val_t * __restrict args) | array_t * __restrict args) |
{ |
{ |
void *dl; |
void *dl; |
rpc_callback_t func; |
rpc_callback_t func; |
Line 869 rpc_srv_execCall(rpc_func_t * __restrict call, struct
|
Line 828 rpc_srv_execCall(rpc_func_t * __restrict call, struct
|
|
|
func = dlsym(dl, (char*) call->func_name); |
func = dlsym(dl, (char*) call->func_name); |
if (func) |
if (func) |
ret = func(call, rpc->call_argc, args); | ret = func(call, ntohs(rpc->call_argc), args); |
else { |
else { |
rpc_SetErr(ENOEXEC, "Error:: Can`t find function %s!\n", dlerror()); |
rpc_SetErr(ENOEXEC, "Error:: Can`t find function %s!\n", dlerror()); |
ret = -1; |
ret = -1; |