version 1.3.2.11, 2011/08/19 14:39:23
|
version 1.5.2.5, 2011/09/07 10:46:54
|
Line 51 rpc_srv_dispatchCall(void *arg)
|
Line 51 rpc_srv_dispatchCall(void *arg)
|
{ |
{ |
rpc_cli_t *c = arg; |
rpc_cli_t *c = arg; |
rpc_srv_t *s; |
rpc_srv_t *s; |
rpc_val_t *vals = NULL, *v = NULL; |
|
rpc_func_t *f = NULL; |
rpc_func_t *f = NULL; |
|
array_t *arr; |
struct tagRPCCall *rpc; |
struct tagRPCCall *rpc; |
struct tagRPCRet *rrpc; |
struct tagRPCRet *rrpc; |
rpc_sess_t ses = { 0 }; |
rpc_sess_t ses = { 0 }; |
fd_set fds; |
fd_set fds; |
u_char buf[BUFSIZ], *data; | u_char *buf; |
int ret, argc = 0, Limit = 0; |
int ret, argc = 0, Limit = 0; |
register int i; |
register int i; |
|
uint16_t tag = 0; |
|
uint32_t hash = 0; |
|
|
if (!arg) { |
if (!arg) { |
rpc_SetErr(EINVAL, "Error:: Invalid parameter can`t procced RPC client ...\n"); |
rpc_SetErr(EINVAL, "Error:: Invalid parameter can`t procced RPC client ...\n"); |
Line 67 rpc_srv_dispatchCall(void *arg)
|
Line 69 rpc_srv_dispatchCall(void *arg)
|
} else |
} else |
s = c->cli_parent; |
s = c->cli_parent; |
|
|
|
buf = malloc(s->srv_netbuf); |
|
if (!buf) { |
|
LOGERR; |
|
return NULL; |
|
} |
|
|
do { |
do { |
v = NULL; |
|
FD_ZERO(&fds); |
FD_ZERO(&fds); |
FD_SET(c->cli_sock, &fds); |
FD_SET(c->cli_sock, &fds); |
ret = select(c->cli_sock + 1, &fds, NULL, NULL, NULL); |
ret = select(c->cli_sock + 1, &fds, NULL, NULL, NULL); |
Line 80 rpc_srv_dispatchCall(void *arg)
|
Line 87 rpc_srv_dispatchCall(void *arg)
|
ret = -2; |
ret = -2; |
break; |
break; |
} |
} |
memset(buf, 0, sizeof buf); | memset(buf, 0, s->srv_netbuf); |
ret = recv(c->cli_sock, buf, sizeof buf, 0); | ret = recv(c->cli_sock, buf, s->srv_netbuf, 0); |
if (ret == -1) { |
if (ret == -1) { |
LOGERR; |
LOGERR; |
ret = -3; |
ret = -3; |
Line 92 rpc_srv_dispatchCall(void *arg)
|
Line 99 rpc_srv_dispatchCall(void *arg)
|
break; |
break; |
} |
} |
if (ret < sizeof(struct tagRPCCall)) { |
if (ret < sizeof(struct tagRPCCall)) { |
rpc_SetErr(EMSGSIZE, "Error:: too short RPC packet ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: too short RPC packet ...\n"); |
ret = -4; |
ret = -4; |
break; |
break; |
} else |
} else |
rpc = (struct tagRPCCall*) buf; |
rpc = (struct tagRPCCall*) buf; |
/* check RPC packet session info */ |
/* check RPC packet session info */ |
if (memcmp(&rpc->call_session, &s->srv_session, sizeof rpc->call_session)) { | if (rpc_chkPktSession(&rpc->call_session, &s->srv_session)) { |
rpc_SetErr(EINVAL, "Error:: get invalid RPC session ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: get invalid RPC session ...\n"); |
ret = -5; |
ret = -5; |
goto makeReply; |
goto makeReply; |
} else |
} else |
Limit = sizeof(struct tagRPCCall); |
Limit = sizeof(struct tagRPCCall); |
|
|
|
tag = rpc->call_tag; |
|
hash = rpc->call_hash; |
|
|
/* RPC is OK! Go decapsulate variables ... */ |
/* RPC is OK! Go decapsulate variables ... */ |
if (rpc->call_argc) { | if (ntohs(rpc->call_argc)) { |
v = (rpc_val_t*) (buf + Limit); | arr = io_buffer2vals(buf + Limit, s->srv_netbuf - Limit, |
/* check RPC packet length */ | ntohs(rpc->call_argc), 1); |
if (rpc->call_argc * sizeof(rpc_val_t) > sizeof buf - Limit) { | if (!arr) { |
rpc_SetErr(EMSGSIZE, "Error:: too long RPC packet ...\n"); | |
ret = -5; |
ret = -5; |
goto makeReply; |
goto makeReply; |
} else |
|
Limit += rpc->call_argc * sizeof(rpc_val_t); |
|
/* RPC received variables types OK! */ |
|
data = (u_char*) v + rpc->call_argc * sizeof(rpc_val_t); |
|
for (i = 0; i < rpc->call_argc; i++) { |
|
switch (v[i].val_type) { |
|
case buffer: |
|
if (v[i].val_len > sizeof buf - Limit) { |
|
rpc_SetErr(EMSGSIZE, "Error:: too long RPC packet ...\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} else |
|
Limit += v[i].val_len; |
|
|
|
v[i].val.buffer = data; |
|
data += v[i].val_len; |
|
break; |
|
case string: |
|
if (v[i].val_len > sizeof buf - Limit) { |
|
rpc_SetErr(EMSGSIZE, "Error:: too long RPC packet ...\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} else |
|
Limit += v[i].val_len; |
|
|
|
v[i].val.string = (int8_t*) data; |
|
data += v[i].val_len; |
|
break; |
|
case blob: |
|
if (s->srv_blob.state == disable) { |
|
rpc_SetErr(ENOTSUP, "Error:: BLOB server is disabled\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} |
|
if (s->srv_blob.state == kill) { |
|
rpc_SetErr(ENOTSUP, "Error:: BLOB server is gone.\n"); |
|
ret = -5; |
|
goto makeReply; |
|
} |
|
default: |
|
break; |
|
} |
|
} |
} |
} | } else |
| arr = NULL; |
|
|
/* execute call */ |
/* execute call */ |
argc = 0; |
argc = 0; |
vals = NULL; |
|
memcpy(&ses, &rpc->call_session, sizeof ses); |
memcpy(&ses, &rpc->call_session, sizeof ses); |
if (!(f = rpc_srv_getCall(s, rpc->call_tag, rpc->call_hash))) { | if (!(f = rpc_srv_getCall(s, ntohs(tag), ntohl(hash)))) { |
rpc_SetErr(EINVAL, "Error:: call not found into RPC server ...\n"); | rpc_SetErr(EPROGUNAVAIL, "Error:: call not found into RPC server ...\n"); |
ret = -6; |
ret = -6; |
} else |
} else |
if ((ret = rpc_srv_execCall(f, rpc, v)) == -1) | if ((ret = rpc_srv_execCall(f, rpc, arr)) == -1) |
ret = -9; |
ret = -9; |
else | else { |
argc = rpc_srv_getVars(f, &vals); | if (arr) |
| io_arrayDestroy(&arr); |
| argc = rpc_srv_getVars(f, &arr); |
| goto makeReply; /* Call finish OK */ |
| } |
| |
| if (arr) |
| io_arrayDestroy(&arr); |
| |
makeReply: |
makeReply: |
/* made reply */ | /* Made reply */ |
memset(buf, 0, sizeof buf); | memset(buf, 0, s->srv_netbuf); |
rrpc = (struct tagRPCRet*) buf; |
rrpc = (struct tagRPCRet*) buf; |
Limit = sizeof(struct tagRPCRet); |
Limit = sizeof(struct tagRPCRet); |
|
|
memcpy(&rrpc->ret_session, &ses, sizeof(rpc_sess_t)); |
memcpy(&rrpc->ret_session, &ses, sizeof(rpc_sess_t)); |
rrpc->ret_tag = rpc->call_tag; | rrpc->ret_tag = tag; |
rrpc->ret_hash = rpc->call_hash; | rrpc->ret_hash = hash; |
rrpc->ret_errno = rpc_Errno; | rrpc->ret_errno = htonl(rpc_Errno); |
rrpc->ret_retcode = ret; | rrpc->ret_retcode = htonl(ret); |
rrpc->ret_argc = argc; | rrpc->ret_argc = htons(argc); |
|
|
if (argc && vals) { | if (argc && arr) { |
v = (rpc_val_t*) (buf + Limit); | /* Go Encapsulate variables ... */ |
if (argc * sizeof(rpc_val_t) > sizeof buf - Limit) { | if ((i = io_vals2buffer(buf + Limit, s->srv_netbuf - Limit, arr)) == -1) { |
for (i = 0; i < argc; i++) | rpc_srv_freeVals(f); |
RPC_FREE_VAL(&vals[i]); | |
rpc_srv_freeVars(f); | |
vals = NULL; | |
argc = 0; |
argc = 0; |
ret = -7; |
ret = -7; |
rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet values (-7) ...\n"); | rpc_SetErr(EBADRPC, "Error:: in prepare RPC packet values (-7) ...\n"); |
goto makeReply; |
goto makeReply; |
} else | } else { |
Limit += argc * sizeof(rpc_val_t); | Limit += i; |
memcpy(v, vals, argc * sizeof(rpc_val_t)); | |
data = (u_char*) v + argc * sizeof(rpc_val_t); | |
for (ret = i = 0; i < argc; i++) { | |
switch (vals[i].val_type) { | |
case buffer: | |
if (ret || Limit + vals[i].val_len > sizeof buf) { | |
rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet (-7) ...\n"); | |
rrpc->ret_retcode = ret = -7; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
|
|
memcpy(data, vals[i].val.buffer, vals[i].val_len); | rpc_srv_freeVals(f); |
data += vals[i].val_len; | |
Limit += vals[i].val_len; | |
break; | |
case string: | |
if (ret || Limit + vals[i].val_len > sizeof buf) { | |
rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet (-7) ...\n"); | |
rrpc->ret_retcode = ret = -7; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
| |
memcpy(data, vals[i].val.string, vals[i].val_len); | |
data += vals[i].val_len; | |
Limit += vals[i].val_len; | |
break; | |
case blob: | |
if (s->srv_blob.state == disable) { | |
rpc_SetErr(ENOTSUP, "Error:: BLOB server is disabled\n"); | |
rrpc->ret_retcode = ret = -5; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
if (s->srv_blob.state == kill) { | |
rpc_SetErr(ENOTSUP, "Error:: BLOB server is gone.\n"); | |
rrpc->ret_retcode = ret = -5; | |
rrpc->ret_argc = 0; | |
break; | |
} | |
default: | |
break; | |
} | |
| |
RPC_FREE_VAL(&vals[i]); | |
} |
} |
rpc_srv_freeVars(f); |
|
vals = NULL; |
|
argc = 0; |
|
} |
} |
|
|
ret = send(c->cli_sock, buf, Limit, 0); |
ret = send(c->cli_sock, buf, Limit, 0); |
Line 254 makeReply:
|
Line 180 makeReply:
|
break; |
break; |
} |
} |
if (ret != Limit) { |
if (ret != Limit) { |
rpc_SetErr(ECANCELED, "Error:: in send RPC request, should be send %d bytes, " | rpc_SetErr(EPROCUNAVAIL, "Error:: in send RPC request, should be send %d bytes, " |
"really is %d\n", Limit, ret); |
"really is %d\n", Limit, ret); |
ret = -9; |
ret = -9; |
break; |
break; |
Line 264 makeReply:
|
Line 190 makeReply:
|
shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
close(c->cli_sock); |
close(c->cli_sock); |
memset(c, 0, sizeof(rpc_cli_t)); |
memset(c, 0, sizeof(rpc_cli_t)); |
|
free(buf); |
return (void*) (long)ret; |
return (void*) (long)ret; |
} |
} |
|
|
Line 289 rpc_srv_dispatchVars(void *arg)
|
Line 216 rpc_srv_dispatchVars(void *arg)
|
/* check for disable service at this moment? */ |
/* check for disable service at this moment? */ |
if (s->srv_blob.state == disable && s->srv_kill != kill) { |
if (s->srv_blob.state == disable && s->srv_kill != kill) { |
usleep(100000); |
usleep(100000); |
|
#ifdef HAVE_PTHREAD_YIELD |
pthread_yield(); |
pthread_yield(); |
|
#endif |
continue; |
continue; |
} |
} |
|
|
Line 318 rpc_srv_dispatchVars(void *arg)
|
Line 247 rpc_srv_dispatchVars(void *arg)
|
break; |
break; |
} |
} |
if (ret < sizeof(struct tagBLOBHdr)) { |
if (ret < sizeof(struct tagBLOBHdr)) { |
rpc_SetErr(EMSGSIZE, "Error:: too short BLOB packet ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: too short BLOB packet ...\n"); |
ret = -4; |
ret = -4; |
break; |
break; |
} else |
} else |
Line 362 rpc_srv_dispatchVars(void *arg)
|
Line 291 rpc_srv_dispatchVars(void *arg)
|
ret = -7; |
ret = -7; |
break; |
break; |
default: |
default: |
rpc_SetErr(EINVAL, "Error:: unsupported BLOB command (%d)...\n", | rpc_SetErr(EPROCUNAVAIL, "Error:: unsupported BLOB command (%d)...\n", |
blob->hdr_cmd); |
blob->hdr_cmd); |
ret = -7; |
ret = -7; |
} |
} |
Line 378 makeReply:
|
Line 307 makeReply:
|
break; |
break; |
} |
} |
if (ret != sizeof buf) { |
if (ret != sizeof buf) { |
rpc_SetErr(ECANCELED, "Error:: in send BLOB reply, should be send %d bytes, " | rpc_SetErr(EPROCUNAVAIL, "Error:: in send BLOB reply, should be send %d bytes, " |
"really is %d\n", sizeof buf, ret); |
"really is %d\n", sizeof buf, ret); |
ret = -9; |
ret = -9; |
break; |
break; |
Line 388 makeReply:
|
Line 317 makeReply:
|
shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
close(c->cli_sock); |
close(c->cli_sock); |
memset(c, 0, sizeof(rpc_cli_t)); |
memset(c, 0, sizeof(rpc_cli_t)); |
return (void*) (long)ret; | return (void*) ((long)ret); |
} |
} |
|
|
// ------------------------------------------------- |
// ------------------------------------------------- |
Line 459 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
Line 388 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
close(srv->srv_blob.server.cli_sock); |
close(srv->srv_blob.server.cli_sock); |
return -1; |
return -1; |
} |
} |
|
n = srv->srv_netbuf; |
|
if (setsockopt(srv->srv_blob.server.cli_sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_blob.server.cli_sock); |
|
return -1; |
|
} |
|
if (setsockopt(srv->srv_blob.server.cli_sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_blob.server.cli_sock); |
|
return -1; |
|
} |
if (bind(srv->srv_blob.server.cli_sock, &srv->srv_blob.server.cli_sa, |
if (bind(srv->srv_blob.server.cli_sock, &srv->srv_blob.server.cli_sa, |
sizeof srv->srv_blob.server.cli_sa) == -1) { |
sizeof srv->srv_blob.server.cli_sa) == -1) { |
LOGERR; |
LOGERR; |
Line 477 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
Line 417 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
|
|
pthread_mutex_init(&srv->srv_blob.mtx, NULL); |
pthread_mutex_init(&srv->srv_blob.mtx, NULL); |
|
|
pthread_mutex_lock(&srv->srv_mtx); |
|
rpc_srv_registerCall(srv, NULL, CALL_BLOBSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBCLIENTS, 0); | rpc_srv_registerCall(srv, NULL, CALL_BLOBCLIENTS, 1); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBVARS, 0); | rpc_srv_registerCall(srv, NULL, CALL_BLOBVARS, 1); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBSTATE, 1); | rpc_srv_registerCall(srv, NULL, CALL_BLOBSTATE, 0); |
pthread_mutex_unlock(&srv->srv_mtx); | |
|
|
srv->srv_blob.state = enable; // enable BLOB | srv->srv_blob.state = enable; /* enable BLOB */ |
return 0; |
return 0; |
} |
} |
|
|
Line 517 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
Line 455 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
close(srv->srv_blob.server.cli_sock); |
close(srv->srv_blob.server.cli_sock); |
|
|
|
pthread_mutex_lock(&srv->srv_blob.mtx); |
if (srv->srv_blob.clients) { |
if (srv->srv_blob.clients) { |
free(srv->srv_blob.clients); |
free(srv->srv_blob.clients); |
srv->srv_blob.clients = NULL; |
srv->srv_blob.clients = NULL; |
} |
} |
|
|
/* detach blobs */ |
/* detach blobs */ |
pthread_mutex_lock(&srv->srv_blob.mtx); |
|
while ((f = srv->srv_blob.blobs)) { |
while ((f = srv->srv_blob.blobs)) { |
srv->srv_blob.blobs = f->blob_next; |
srv->srv_blob.blobs = f->blob_next; |
rpc_srv_blobFree(srv, f); |
rpc_srv_blobFree(srv, f); |
Line 536 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
Line 474 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
} |
} |
|
|
/* |
/* |
* rpc_srv_execBLOBServer() Execute Main BLOB server loop and wait for clients requests | * rpc_srv_loopBLOB() Execute Main BLOB server loop and wait for clients requests |
* @srv = RPC Server instance |
* @srv = RPC Server instance |
* return: -1 error or 0 ok, infinite loop ... |
* return: -1 error or 0 ok, infinite loop ... |
*/ |
*/ |
int |
int |
rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv) | rpc_srv_loopBLOB(rpc_srv_t * __restrict srv) |
{ |
{ |
socklen_t salen = sizeof(struct sockaddr); |
socklen_t salen = sizeof(struct sockaddr); |
register int i; |
register int i; |
Line 565 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 503 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
if (!c->cli_sa.sa_family) |
if (!c->cli_sa.sa_family) |
break; |
break; |
if (i >= srv->srv_numcli) { |
if (i >= srv->srv_numcli) { |
|
#ifdef HAVE_PTHREAD_YIELD |
|
pthread_yield(); |
|
#else |
usleep(1000000); |
usleep(1000000); |
|
#endif |
continue; |
continue; |
} |
} |
|
|
Line 594 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 536 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
pthread_detach(c->cli_tid); |
pthread_detach(c->cli_tid); |
} |
} |
|
|
srv->srv_blob.state = disable; | srv->srv_blob.state = kill; |
|
|
return 0; |
return 0; |
} |
} |
Line 605 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 547 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
* @regProgID = ProgramID for authentication & recognition |
* @regProgID = ProgramID for authentication & recognition |
* @regProcID = ProcessID for authentication & recognition |
* @regProcID = ProcessID for authentication & recognition |
* @concurentClients = Concurent clients at same time to this server |
* @concurentClients = Concurent clients at same time to this server |
|
* @netBuf = Network buffer length, if =0 == BUFSIZ (also meaning max RPC packet) |
* @family = Family type, AF_INET, AF_INET6 or AF_LOCAL |
* @family = Family type, AF_INET, AF_INET6 or AF_LOCAL |
* @csHost = Host name or address for bind server, if NULL any address |
* @csHost = Host name or address for bind server, if NULL any address |
* @Port = Port for bind server, if Port == 0 default port is selected |
* @Port = Port for bind server, if Port == 0 default port is selected |
Line 612 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 555 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
*/ |
*/ |
rpc_srv_t * |
rpc_srv_t * |
rpc_srv_initServer(u_int regProgID, u_int regProcID, int concurentClients, |
rpc_srv_initServer(u_int regProgID, u_int regProcID, int concurentClients, |
u_short family, const char *csHost, u_short Port) | int netBuf, u_short family, const char *csHost, u_short Port) |
{ |
{ |
rpc_srv_t *srv = NULL; |
rpc_srv_t *srv = NULL; |
int n = 1; |
int n = 1; |
Line 629 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 572 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
} |
} |
if (!Port) |
if (!Port) |
Port = RPC_DEFPORT; |
Port = RPC_DEFPORT; |
|
if (!netBuf) |
|
netBuf = BUFSIZ; |
if (csHost && family != AF_LOCAL) { |
if (csHost && family != AF_LOCAL) { |
host = gethostbyname2(csHost, family); |
host = gethostbyname2(csHost, family); |
if (!host) { |
if (!host) { |
Line 668 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 613 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
} else |
} else |
memset(srv, 0, sizeof(rpc_srv_t)); |
memset(srv, 0, sizeof(rpc_srv_t)); |
|
|
|
srv->srv_netbuf = netBuf; |
srv->srv_numcli = concurentClients; |
srv->srv_numcli = concurentClients; |
srv->srv_session.sess_version = RPC_VERSION; |
srv->srv_session.sess_version = RPC_VERSION; |
srv->srv_session.sess_program = regProgID; |
srv->srv_session.sess_program = regProgID; |
Line 701 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 647 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
free(srv); |
free(srv); |
return NULL; |
return NULL; |
} |
} |
|
n = srv->srv_netbuf; |
|
if (setsockopt(srv->srv_server.cli_sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_server.cli_sock); |
|
free(srv); |
|
return NULL; |
|
} |
|
if (setsockopt(srv->srv_server.cli_sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof n) == -1) { |
|
LOGERR; |
|
close(srv->srv_server.cli_sock); |
|
free(srv); |
|
return NULL; |
|
} |
if (bind(srv->srv_server.cli_sock, &srv->srv_server.cli_sa, sizeof srv->srv_server.cli_sa) == -1) { |
if (bind(srv->srv_server.cli_sock, &srv->srv_server.cli_sa, sizeof srv->srv_server.cli_sa) == -1) { |
LOGERR; |
LOGERR; |
close(srv->srv_server.cli_sock); |
close(srv->srv_server.cli_sock); |
Line 721 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 680 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
pthread_mutex_init(&srv->srv_mtx, NULL); |
pthread_mutex_init(&srv->srv_mtx, NULL); |
|
|
rpc_srv_registerCall(srv, NULL, CALL_SRVSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_SRVSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_SRVCLIENTS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVCLIENTS, 1); |
rpc_srv_registerCall(srv, NULL, CALL_SRVCALLS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVSESSIONS, 4); |
rpc_srv_registerCall(srv, NULL, CALL_SRVSESSIONS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVCALLS, 1); |
return srv; |
return srv; |
} |
} |
|
|
/* |
/* |
* rpc_srv_endServer() Destroy RPC server, close all opened sockets and free resources |
* rpc_srv_endServer() Destroy RPC server, close all opened sockets and free resources |
* @srv = RPC Server instance | * @psrv = RPC Server instance |
* return: none |
* return: none |
*/ |
*/ |
void |
void |
rpc_srv_endServer(rpc_srv_t * __restrict srv) | rpc_srv_endServer(rpc_srv_t ** __restrict psrv) |
{ |
{ |
rpc_cli_t *c; |
rpc_cli_t *c; |
register int i; |
register int i; |
rpc_func_t *f; |
rpc_func_t *f; |
|
|
if (!srv) { | if (!psrv || !*psrv) { |
rpc_SetErr(EINVAL, "Error:: Can`t destroy server because parameter is null!\n"); |
rpc_SetErr(EINVAL, "Error:: Can`t destroy server because parameter is null!\n"); |
return; |
return; |
} |
} |
|
|
rpc_srv_endBLOBServer(srv); | rpc_srv_endBLOBServer(*psrv); |
|
|
/* close all clients connections & server socket */ |
/* close all clients connections & server socket */ |
for (i = 0, c = srv->srv_clients; i < srv->srv_numcli && c; i++, c++) | for (i = 0, c = (*psrv)->srv_clients; i < (*psrv)->srv_numcli && c; i++, c++) |
if (c->cli_sa.sa_family) { |
if (c->cli_sa.sa_family) { |
shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
close(c->cli_sock); |
close(c->cli_sock); |
} |
} |
close(srv->srv_server.cli_sock); | close((*psrv)->srv_server.cli_sock); |
|
|
if (srv->srv_clients) { | if ((*psrv)->srv_clients) { |
free(srv->srv_clients); | free((*psrv)->srv_clients); |
srv->srv_clients = NULL; | (*psrv)->srv_clients = NULL; |
srv->srv_numcli = 0; | (*psrv)->srv_numcli = 0; |
} |
} |
|
|
/* detach exported calls */ |
/* detach exported calls */ |
pthread_mutex_lock(&srv->srv_mtx); | pthread_mutex_lock(&(*psrv)->srv_mtx); |
while ((f = srv->srv_funcs)) { | while ((f = (*psrv)->srv_funcs)) { |
srv->srv_funcs = f->func_next; | (*psrv)->srv_funcs = f->func_next; |
| rpc_srv_destroyVars(f); |
free(f); |
free(f); |
} |
} |
pthread_mutex_unlock(&srv->srv_mtx); | pthread_mutex_unlock(&(*psrv)->srv_mtx); |
|
|
while (pthread_mutex_trylock(&srv->srv_mtx) == EBUSY); | while (pthread_mutex_trylock(&(*psrv)->srv_mtx) == EBUSY); |
pthread_mutex_destroy(&srv->srv_mtx); | pthread_mutex_destroy(&(*psrv)->srv_mtx); |
|
|
free(srv); | free(*psrv); |
srv = NULL; | *psrv = NULL; |
} |
} |
|
|
/* |
/* |
* rpc_srv_execServer() Execute Main server loop and wait for clients requests | * rpc_srv_loopServer() Execute Main server loop and wait for clients requests |
* @srv = RPC Server instance |
* @srv = RPC Server instance |
* return: -1 error or 0 ok, infinite loop ... |
* return: -1 error or 0 ok, infinite loop ... |
*/ |
*/ |
int |
int |
rpc_srv_execServer(rpc_srv_t * __restrict srv) | rpc_srv_loopServer(rpc_srv_t * __restrict srv) |
{ |
{ |
socklen_t salen = sizeof(struct sockaddr); |
socklen_t salen = sizeof(struct sockaddr); |
register int i; |
register int i; |
Line 795 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 755 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
return -1; |
return -1; |
} |
} |
|
|
|
/* activate BLOB server worker if srv->srv_blob.state == enable */ |
|
rpc_srv_execBLOBServer(srv); |
|
|
if (listen(srv->srv_server.cli_sock, SOMAXCONN) == -1) { |
if (listen(srv->srv_server.cli_sock, SOMAXCONN) == -1) { |
LOGERR; |
LOGERR; |
return -1; |
return -1; |
Line 805 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 768 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
if (!c->cli_sa.sa_family) |
if (!c->cli_sa.sa_family) |
break; |
break; |
if (i >= srv->srv_numcli) { |
if (i >= srv->srv_numcli) { |
|
#ifdef HAVE_PTHREAD_YIELD |
|
pthread_yield(); |
|
#else |
usleep(1000000); |
usleep(1000000); |
|
#endif |
continue; |
continue; |
} |
} |
|
|
Line 843 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 810 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
* rpc_srv_execCall() Execute registered call from RPC server |
* rpc_srv_execCall() Execute registered call from RPC server |
* @call = Register RPC call |
* @call = Register RPC call |
* @rpc = IN RPC call structure |
* @rpc = IN RPC call structure |
* @args = IN RPC call array of rpc values | * @args = IN RPC calling arguments from RPC client |
* return: -1 error, !=-1 ok |
* return: -1 error, !=-1 ok |
*/ |
*/ |
int |
int |
rpc_srv_execCall(rpc_func_t * __restrict call, struct tagRPCCall * __restrict rpc, |
rpc_srv_execCall(rpc_func_t * __restrict call, struct tagRPCCall * __restrict rpc, |
rpc_val_t * __restrict args) | array_t * __restrict args) |
{ |
{ |
void *dl; |
void *dl; |
rpc_callback_t func; |
rpc_callback_t func; |
Line 867 rpc_srv_execCall(rpc_func_t * __restrict call, struct
|
Line 834 rpc_srv_execCall(rpc_func_t * __restrict call, struct
|
|
|
func = dlsym(dl, (char*) call->func_name); |
func = dlsym(dl, (char*) call->func_name); |
if (func) |
if (func) |
ret = func(call, rpc->call_argc, args); | ret = func(call, ntohs(rpc->call_argc), args); |
else { |
else { |
rpc_SetErr(ENOEXEC, "Error:: Can`t find function %s!\n", dlerror()); |
rpc_SetErr(ENOEXEC, "Error:: Can`t find function %s!\n", dlerror()); |
ret = -1; |
ret = -1; |