|
|
| version 1.4.2.10, 2011/09/06 23:58:48 | version 1.5.2.1, 2011/09/07 08:56:32 |
|---|---|
| Line 103 rpc_srv_dispatchCall(void *arg) | Line 103 rpc_srv_dispatchCall(void *arg) |
| } else | } else |
| rpc = (struct tagRPCCall*) buf; | rpc = (struct tagRPCCall*) buf; |
| /* check RPC packet session info */ | /* check RPC packet session info */ |
| if (memcmp(&rpc->call_session, &s->srv_session, sizeof rpc->call_session)) { | if (rpc_chkPktSession(&rpc->call_session, &s->srv_session)) { |
| rpc_SetErr(ERPCMISMATCH, "Error:: get invalid RPC session ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: get invalid RPC session ...\n"); |
| ret = -5; | ret = -5; |
| goto makeReply; | goto makeReply; |
| Line 117 rpc_srv_dispatchCall(void *arg) | Line 117 rpc_srv_dispatchCall(void *arg) |
| ret = -5; | ret = -5; |
| goto makeReply; | goto makeReply; |
| } | } |
| } | } else |
| arr = NULL; | |
| /* execute call */ | /* execute call */ |
| argc = 0; | argc = 0; |
| Line 529 rpc_srv_loopBLOB(rpc_srv_t * __restrict srv) | Line 530 rpc_srv_loopBLOB(rpc_srv_t * __restrict srv) |
| pthread_detach(c->cli_tid); | pthread_detach(c->cli_tid); |
| } | } |
| srv->srv_blob.state = disable; | srv->srv_blob.state = kill; |
| return 0; | return 0; |
| } | } |