|
|
| version 1.21.2.1, 2013/11/14 22:29:31 | version 1.21.2.4, 2013/11/15 09:04:10 |
|---|---|
| Line 359 rxPacket(sched_task_t *task) | Line 359 rxPacket(sched_task_t *task) |
| return NULL; | return NULL; |
| } | } |
| } | } |
| len = estlen; | |
| #if 0 | #if 0 |
| /* check integrity of packet */ | /* check integrity of packet */ |
| Line 447 txUDPPacket(sched_task_t *task) | Line 448 txUDPPacket(sched_task_t *task) |
| rpc_func_t *f = NULL; | rpc_func_t *f = NULL; |
| u_char *buf = AIT_GET_BUF(&c->cli_buf); | u_char *buf = AIT_GET_BUF(&c->cli_buf); |
| struct tagRPCCall *rpc = (struct tagRPCCall*) buf; | struct tagRPCCall *rpc = (struct tagRPCCall*) buf; |
| int ret, wlen = sizeof(struct tagRPCCall); | int ret, estlen, wlen = sizeof(struct tagRPCCall); |
| struct timespec ts = { DEF_RPC_TIMEOUT, 0 }; | struct timespec ts = { DEF_RPC_TIMEOUT, 0 }; |
| struct pollfd pfd; | struct pollfd pfd; |
| Line 463 txUDPPacket(sched_task_t *task) | Line 464 txUDPPacket(sched_task_t *task) |
| rpc->call_rep.ret = RPC_ERROR(-1); | rpc->call_rep.ret = RPC_ERROR(-1); |
| rpc->call_rep.eno = RPC_ERROR(rpc_Errno); | rpc->call_rep.eno = RPC_ERROR(rpc_Errno); |
| } else { | } else { |
| /* calc estimated length */ | |
| estlen = ait_resideVars(RPC_RETVARS(c)) + wlen; | |
| if (estlen > AIT_LEN(&c->cli_buf)) | |
| AIT_RE_BUF(&c->cli_buf, estlen); | |
| buf = AIT_GET_BUF(&c->cli_buf); | |
| rpc = (struct tagRPCCall*) buf; | |
| rpc->call_argc = htons(array_Size(RPC_RETVARS(c))); | rpc->call_argc = htons(array_Size(RPC_RETVARS(c))); |
| /* Go Encapsulate variables */ | /* Go Encapsulate variables */ |
| ret = ait_vars2buffer(buf + wlen, AIT_LEN(&c->cli_buf) - wlen, | ret = ait_vars2buffer(buf + wlen, AIT_LEN(&c->cli_buf) - wlen, |
| Line 502 txUDPPacket(sched_task_t *task) | Line 510 txUDPPacket(sched_task_t *task) |
| } | } |
| ret = sendto(TASK_FD(task), buf, MIN(wlen, s->srv_netbuf), MSG_NOSIGNAL, | ret = sendto(TASK_FD(task), buf, MIN(wlen, s->srv_netbuf), MSG_NOSIGNAL, |
| &c->cli_sa.sa, c->cli_sa.sa.sa_len); | &c->cli_sa.sa, c->cli_sa.sa.sa_len); |
| printf("wl=%d l=%d\n", wlen, ret); | |
| if (ret == -1) { | if (ret == -1) { |
| /* close connection */ | /* close connection */ |
| schedEvent(TASK_ROOT(task), cbProto[s->srv_proto][CB_CLOSECLIENT], | schedEvent(TASK_ROOT(task), cbProto[s->srv_proto][CB_CLOSECLIENT], |
| Line 518 rxUDPPacket(sched_task_t *task) | Line 527 rxUDPPacket(sched_task_t *task) |
| { | { |
| rpc_srv_t *srv = TASK_ARG(task); | rpc_srv_t *srv = TASK_ARG(task); |
| rpc_cli_t *c = NULL; | rpc_cli_t *c = NULL; |
| int len, rlen, noreply; | int len, rlen, noreply, estlen; |
| u_short crc, off = 0; | u_short crc; |
| u_char buf[USHRT_MAX + 1]; | u_char *buf, b[sizeof(struct tagRPCCall)]; |
| struct tagRPCCall *rpc = (struct tagRPCCall*) buf; | struct tagRPCCall *rpc = (struct tagRPCCall*) b; |
| sockaddr_t sa; | sockaddr_t sa; |
| socklen_t salen; | socklen_t salen; |
| struct timespec ts = { DEF_RPC_TIMEOUT, 0 }; | struct timespec ts = { DEF_RPC_TIMEOUT, 0 }; |
| struct pollfd pfd; | |
| /* receive connect packet */ | /* receive connect packet */ |
| salen = sa.ss.ss_len = sizeof(sockaddr_t); | salen = sa.ss.ss_len = sizeof(sockaddr_t); |
| rlen = recvfrom(TASK_FD(task), buf, sizeof buf, 0, &sa.sa, &salen); | rlen = recvfrom(TASK_FD(task), b, sizeof b, MSG_PEEK, &sa.sa, &salen); |
| if (rlen < 1) | if (rlen < sizeof(struct tagRPCCall)) { |
| rpc_SetErr(ERPCMISMATCH, "Short RPC packet"); | |
| goto end; | goto end; |
| } | |
| c = _allocClient(srv, &sa); | c = _allocClient(srv, &sa); |
| if (!c) | if (!c) { |
| EVERBOSE(1, "RPC client quota exceeded! Connection will be shutdown!\n"); | |
| usleep(2000); /* blocked client delay */ | |
| goto end; | goto end; |
| else { | } else { |
| estlen = ntohl(rpc->call_len); | |
| if (estlen > AIT_LEN(&c->cli_buf)) | |
| AIT_RE_BUF(&c->cli_buf, estlen); | |
| rpc = (struct tagRPCCall*) AIT_GET_BUF(&c->cli_buf); | |
| buf = AIT_GET_BUF(&c->cli_buf); | |
| len = estlen; | |
| c->cli_sock = TASK_FD(task); | c->cli_sock = TASK_FD(task); |
| memcpy(&c->cli_sa, &sa, sizeof c->cli_sa); | memcpy(&c->cli_sa, &sa, sizeof c->cli_sa); |
| memcpy(AIT_GET_BUF(&c->cli_buf), buf, AIT_LEN(&c->cli_buf)); | |
| /* armed timer for close stateless connection */ | /* armed timer for close stateless connection */ |
| schedCancelby(TASK_ROOT(task), taskTIMER, CRITERIA_DATA, c, NULL); | schedCancelby(TASK_ROOT(task), taskTIMER, CRITERIA_DATA, c, NULL); |
| schedTimer(TASK_ROOT(task), cbProto[srv->srv_proto][CB_CLOSECLIENT], | schedTimer(TASK_ROOT(task), cbProto[srv->srv_proto][CB_CLOSECLIENT], |
| c, ts, c, 0); | c, ts, c, 0); |
| } | } |
| do { | /* get next part of packet */ |
| /* check RPC packet */ | memset(buf, 0, len); |
| if (rlen < sizeof(struct tagRPCCall)) { | pfd.fd = TASK_FD(task); |
| rpc_SetErr(ERPCMISMATCH, "Short RPC packet"); | pfd.events = POLLIN | POLLPRI; |
| break; | for (; len > 0; len -= rlen, buf += rlen) { |
| } else | if ((rlen = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || |
| rpc = (struct tagRPCCall*) (AIT_GET_BUF(&c->cli_buf) + off); | pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) { |
| if (rlen) | |
| len = ntohl(rpc->call_len); | LOGERR; |
| rlen -= len; | else |
| rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond"); | |
| /* check RPC packet lengths */ | schedEvent(TASK_ROOT(task), cbProto[srv->srv_proto][CB_CLOSECLIENT], |
| if (rlen < 0 || len < sizeof(struct tagRPCCall)) { | c, 0, NULL, 0); |
| rpc_SetErr(ERPCMISMATCH, "Broken RPC packet length"); | return NULL; |
| /* skip entire packet */ | |
| break; | |
| } | } |
| salen = sa.ss.ss_len = sizeof(sockaddr_t); | |
| /* check integrity of packet */ | rlen = recvfrom(TASK_FD(task), buf, len, 0, &sa.sa, &salen); |
| crc = ntohs(rpc->call_crc); | if (rlen == -1) { |
| rpc->call_crc ^= rpc->call_crc; | /* close connection */ |
| if (crc != crcFletcher16((u_short*) rpc, len / 2)) { | schedEvent(TASK_ROOT(task), cbProto[srv->srv_proto][CB_CLOSECLIENT], |
| rpc_SetErr(ERPCMISMATCH, "Bad CRC RPC packet"); | c, 0, NULL, 0); |
| return NULL; | |
| off += len; | |
| /* try next packet remaining into buffer */ | |
| continue; | |
| } | } |
| if (e_addrcmp(&c->cli_sa, &sa, 42)) | |
| rlen ^= rlen; /* skip if arrive from different address */ | |
| } | |
| len = estlen; | |
| noreply = RPC_CHK_NOREPLY(rpc); | /* check integrity of packet */ |
| crc = ntohs(rpc->call_crc); | |
| rpc->call_crc ^= rpc->call_crc; | |
| if (crc != crcFletcher16((u_short*) rpc, len / 2)) { | |
| rpc_SetErr(ERPCMISMATCH, "Bad CRC RPC packet"); | |
| return NULL; | |
| } | |
| /* check RPC packet session info */ | noreply = RPC_CHK_NOREPLY(rpc); |
| if (rpc_chkPktSession(&rpc->call_session, &srv->srv_session)) { | |
| rpc_SetErr(ERPCMISMATCH, "Get invalid RPC session"); | |
| rpc->call_argc ^= rpc->call_argc; | /* check RPC packet session info */ |
| rpc->call_rep.ret = RPC_ERROR(-1); | if (rpc_chkPktSession(&rpc->call_session, &srv->srv_session)) { |
| rpc->call_rep.eno = RPC_ERROR(errno); | rpc_SetErr(ERPCMISMATCH, "Get invalid RPC session"); |
| } else { | |
| /* execute RPC call */ | |
| schedEvent(TASK_ROOT(task), execCall, c, | |
| (int) noreply, rpc, len); | |
| } | |
| /* send RPC reply */ | rpc->call_argc ^= rpc->call_argc; |
| if (!noreply) | rpc->call_rep.ret = RPC_ERROR(-1); |
| schedWrite(TASK_ROOT(task), cbProto[srv->srv_proto][CB_TXPACKET], | rpc->call_rep.eno = RPC_ERROR(errno); |
| c, TASK_FD(task), rpc, len); | } else { |
| /* execute RPC call */ | |
| schedEvent(TASK_ROOT(task), execCall, c, (int) noreply, rpc, len); | |
| } | |
| off += len; | /* send RPC reply */ |
| } while (rlen > 0); | if (!noreply) |
| schedWrite(TASK_ROOT(task), cbProto[srv->srv_proto][CB_TXPACKET], | |
| c, TASK_FD(task), rpc, len); | |
| end: | end: |
| schedReadSelf(task); | schedReadSelf(task); |
| return NULL; | return NULL; |