|
version 1.3.2.10, 2011/08/19 14:24:54
|
version 1.5.2.5, 2011/09/07 10:46:54
|
|
Line 51 rpc_srv_dispatchCall(void *arg)
|
Line 51 rpc_srv_dispatchCall(void *arg)
|
| { |
{ |
| rpc_cli_t *c = arg; |
rpc_cli_t *c = arg; |
| rpc_srv_t *s; |
rpc_srv_t *s; |
| rpc_val_t *vals = NULL, *v = NULL; |
|
| rpc_func_t *f = NULL; |
rpc_func_t *f = NULL; |
| |
array_t *arr; |
| struct tagRPCCall *rpc; |
struct tagRPCCall *rpc; |
| struct tagRPCRet *rrpc; |
struct tagRPCRet *rrpc; |
| rpc_sess_t ses = { 0 }; |
rpc_sess_t ses = { 0 }; |
| fd_set fds; |
fd_set fds; |
| u_char buf[BUFSIZ], *data; | u_char *buf; |
| int ret, argc = 0, Limit = 0; |
int ret, argc = 0, Limit = 0; |
| register int i; |
register int i; |
| |
uint16_t tag = 0; |
| |
uint32_t hash = 0; |
| |
|
| if (!arg) { |
if (!arg) { |
| rpc_SetErr(EINVAL, "Error:: Invalid parameter can`t procced RPC client ...\n"); |
rpc_SetErr(EINVAL, "Error:: Invalid parameter can`t procced RPC client ...\n"); |
|
Line 67 rpc_srv_dispatchCall(void *arg)
|
Line 69 rpc_srv_dispatchCall(void *arg)
|
| } else |
} else |
| s = c->cli_parent; |
s = c->cli_parent; |
| |
|
| |
buf = malloc(s->srv_netbuf); |
| |
if (!buf) { |
| |
LOGERR; |
| |
return NULL; |
| |
} |
| |
|
| do { |
do { |
| v = NULL; |
|
| FD_ZERO(&fds); |
FD_ZERO(&fds); |
| FD_SET(c->cli_sock, &fds); |
FD_SET(c->cli_sock, &fds); |
| ret = select(c->cli_sock + 1, &fds, NULL, NULL, NULL); |
ret = select(c->cli_sock + 1, &fds, NULL, NULL, NULL); |
|
Line 80 rpc_srv_dispatchCall(void *arg)
|
Line 87 rpc_srv_dispatchCall(void *arg)
|
| ret = -2; |
ret = -2; |
| break; |
break; |
| } |
} |
| memset(buf, 0, sizeof buf); | memset(buf, 0, s->srv_netbuf); |
| ret = recv(c->cli_sock, buf, sizeof buf, 0); | ret = recv(c->cli_sock, buf, s->srv_netbuf, 0); |
| if (ret == -1) { |
if (ret == -1) { |
| LOGERR; |
LOGERR; |
| ret = -3; |
ret = -3; |
| break; |
break; |
| } |
} |
| if (!ret) { // receive EOF | if (!ret) { /* receive EOF */ |
| ret = 0; |
ret = 0; |
| break; |
break; |
| } |
} |
| if (ret < sizeof(struct tagRPCCall)) { |
if (ret < sizeof(struct tagRPCCall)) { |
| rpc_SetErr(EMSGSIZE, "Error:: too short RPC packet ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: too short RPC packet ...\n"); |
| ret = -4; |
ret = -4; |
| break; |
break; |
| } else |
} else |
| rpc = (struct tagRPCCall*) buf; |
rpc = (struct tagRPCCall*) buf; |
| // check RPC packet session info | /* check RPC packet session info */ |
| if (memcmp(&rpc->call_session, &s->srv_session, sizeof rpc->call_session)) { | if (rpc_chkPktSession(&rpc->call_session, &s->srv_session)) { |
| rpc_SetErr(EINVAL, "Error:: get invalid RPC session ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: get invalid RPC session ...\n"); |
| ret = -5; |
ret = -5; |
| goto makeReply; |
goto makeReply; |
| } else |
} else |
| Limit = sizeof(struct tagRPCCall); |
Limit = sizeof(struct tagRPCCall); |
| // RPC is OK! Go decapsulate variables ... |
|
| if (rpc->call_argc) { |
|
| v = (rpc_val_t*) (buf + Limit); |
|
| // check RPC packet length |
|
| if (rpc->call_argc * sizeof(rpc_val_t) > sizeof buf - Limit) { |
|
| rpc_SetErr(EMSGSIZE, "Error:: Too big RPC packet ...\n"); |
|
| ret = -5; |
|
| goto makeReply; |
|
| } else |
|
| Limit += rpc->call_argc * sizeof(rpc_val_t); |
|
| // RPC received variables types OK! |
|
| data = (u_char*) v + rpc->call_argc * sizeof(rpc_val_t); |
|
| for (i = 0; i < rpc->call_argc; i++) { |
|
| switch (v[i].val_type) { |
|
| case buffer: |
|
| if (v[i].val_len > sizeof buf - Limit) { |
|
| rpc_SetErr(EMSGSIZE, "Error:: Too big RPC packet ...\n"); |
|
| ret = -5; |
|
| goto makeReply; |
|
| } else |
|
| Limit += v[i].val_len; |
|
| |
|
| v[i].val.buffer = data; | tag = rpc->call_tag; |
| data += v[i].val_len; | hash = rpc->call_hash; |
| break; | |
| case string: | |
| if (v[i].val_len > sizeof buf - Limit) { | |
| rpc_SetErr(EMSGSIZE, "Error:: Too big RPC packet ...\n"); | |
| ret = -5; | |
| goto makeReply; | |
| } else | |
| Limit += v[i].val_len; | |
| |
|
| v[i].val.string = (int8_t*) data; | /* RPC is OK! Go decapsulate variables ... */ |
| data += v[i].val_len; | if (ntohs(rpc->call_argc)) { |
| break; | arr = io_buffer2vals(buf + Limit, s->srv_netbuf - Limit, |
| case blob: | ntohs(rpc->call_argc), 1); |
| if (s->srv_blob.state == disable) { | if (!arr) { |
| rpc_SetErr(ENOTSUP, "Error:: BLOB server is disabled\n"); | ret = -5; |
| ret = -5; | goto makeReply; |
| goto makeReply; | |
| } | |
| if (s->srv_blob.state == kill) { | |
| rpc_SetErr(ENOTSUP, "Error:: BLOB server is killed\n"); | |
| ret = -5; | |
| goto makeReply; | |
| } | |
| default: | |
| break; | |
| } | |
| } |
} |
| } | } else |
| | arr = NULL; |
| |
|
| |
/* execute call */ |
| argc = 0; |
argc = 0; |
| vals = NULL; |
|
| memcpy(&ses, &rpc->call_session, sizeof ses); |
memcpy(&ses, &rpc->call_session, sizeof ses); |
| if (!(f = rpc_srv_getCall(s, rpc->call_tag, rpc->call_hash))) { | if (!(f = rpc_srv_getCall(s, ntohs(tag), ntohl(hash)))) { |
| rpc_SetErr(EINVAL, "Error:: call not found into RPC server ...\n"); | rpc_SetErr(EPROGUNAVAIL, "Error:: call not found into RPC server ...\n"); |
| ret = -6; |
ret = -6; |
| } else |
} else |
| if ((ret = rpc_srv_execCall(f, rpc, v)) == -1) | if ((ret = rpc_srv_execCall(f, rpc, arr)) == -1) |
| ret = -9; |
ret = -9; |
| else | else { |
| argc = rpc_srv_getVars(f, &vals); | if (arr) |
| | io_arrayDestroy(&arr); |
| | argc = rpc_srv_getVars(f, &arr); |
| | goto makeReply; /* Call finish OK */ |
| | } |
| | |
| | if (arr) |
| | io_arrayDestroy(&arr); |
| | |
| makeReply: |
makeReply: |
| memset(buf, 0, sizeof buf); | /* Made reply */ |
| | memset(buf, 0, s->srv_netbuf); |
| rrpc = (struct tagRPCRet*) buf; |
rrpc = (struct tagRPCRet*) buf; |
| Limit = sizeof(struct tagRPCRet); |
Limit = sizeof(struct tagRPCRet); |
| |
|
| memcpy(&rrpc->ret_session, &ses, sizeof(rpc_sess_t)); |
memcpy(&rrpc->ret_session, &ses, sizeof(rpc_sess_t)); |
| rrpc->ret_tag = rpc->call_tag; | rrpc->ret_tag = tag; |
| rrpc->ret_hash = rpc->call_hash; | rrpc->ret_hash = hash; |
| rrpc->ret_errno = rpc_Errno; | rrpc->ret_errno = htonl(rpc_Errno); |
| rrpc->ret_retcode = ret; | rrpc->ret_retcode = htonl(ret); |
| rrpc->ret_argc = argc; | rrpc->ret_argc = htons(argc); |
| |
|
| if (argc && vals) { | if (argc && arr) { |
| v = (rpc_val_t*) (buf + Limit); | /* Go Encapsulate variables ... */ |
| if (argc * sizeof(rpc_val_t) > sizeof buf - Limit) { | if ((i = io_vals2buffer(buf + Limit, s->srv_netbuf - Limit, arr)) == -1) { |
| for (i = 0; i < argc; i++) | rpc_srv_freeVals(f); |
| RPC_FREE_VAL(&vals[i]); | |
| rpc_srv_freeVars(f); | |
| vals = NULL; | |
| argc = 0; |
argc = 0; |
| ret = -7; |
ret = -7; |
| rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet values (-7) ...\n"); | rpc_SetErr(EBADRPC, "Error:: in prepare RPC packet values (-7) ...\n"); |
| goto makeReply; |
goto makeReply; |
| } else | } else { |
| Limit += argc * sizeof(rpc_val_t); | Limit += i; |
| memcpy(v, vals, argc * sizeof(rpc_val_t)); | |
| data = (u_char*) v + argc * sizeof(rpc_val_t); | |
| for (ret = i = 0; i < argc; i++) { | |
| switch (vals[i].val_type) { | |
| case buffer: | |
| if (ret || Limit + vals[i].val_len > sizeof buf) { | |
| rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet (-7) ...\n"); | |
| rrpc->ret_retcode = ret = -7; | |
| rrpc->ret_argc = 0; | |
| break; | |
| } | |
| |
|
| memcpy(data, vals[i].val.buffer, vals[i].val_len); | rpc_srv_freeVals(f); |
| data += vals[i].val_len; | |
| Limit += vals[i].val_len; | |
| break; | |
| case string: | |
| if (ret || Limit + vals[i].val_len > sizeof buf) { | |
| rpc_SetErr(EMSGSIZE, "Error:: in prepare RPC packet (-7) ...\n"); | |
| rrpc->ret_retcode = ret = -7; | |
| rrpc->ret_argc = 0; | |
| break; | |
| } | |
| |
| memcpy(data, vals[i].val.string, vals[i].val_len); | |
| data += vals[i].val_len; | |
| Limit += vals[i].val_len; | |
| break; | |
| case blob: | |
| if (s->srv_blob.state == disable) { | |
| rpc_SetErr(ENOTSUP, "Error:: BLOB server is disabled\n"); | |
| rrpc->ret_retcode = ret = -5; | |
| rrpc->ret_argc = 0; | |
| break; | |
| } | |
| if (s->srv_blob.state == kill) { | |
| rpc_SetErr(ENOTSUP, "Error:: BLOB server is killed\n"); | |
| rrpc->ret_retcode = ret = -5; | |
| rrpc->ret_argc = 0; | |
| break; | |
| } | |
| default: | |
| break; | |
| } | |
| |
| RPC_FREE_VAL(&vals[i]); | |
| } |
} |
| rpc_srv_freeVars(f); |
|
| vals = NULL; |
|
| argc = 0; |
|
| } |
} |
| |
|
| ret = send(c->cli_sock, buf, Limit, 0); |
ret = send(c->cli_sock, buf, Limit, 0); |
|
Line 252 makeReply:
|
Line 180 makeReply:
|
| break; |
break; |
| } |
} |
| if (ret != Limit) { |
if (ret != Limit) { |
| rpc_SetErr(ECANCELED, "Error:: in send RPC request, should be send %d bytes, " | rpc_SetErr(EPROCUNAVAIL, "Error:: in send RPC request, should be send %d bytes, " |
| "really is %d\n", Limit, ret); |
"really is %d\n", Limit, ret); |
| ret = -9; |
ret = -9; |
| break; |
break; |
|
Line 262 makeReply:
|
Line 190 makeReply:
|
| shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
| close(c->cli_sock); |
close(c->cli_sock); |
| memset(c, 0, sizeof(rpc_cli_t)); |
memset(c, 0, sizeof(rpc_cli_t)); |
| |
free(buf); |
| return (void*) (long)ret; |
return (void*) (long)ret; |
| } |
} |
| |
|
|
Line 284 rpc_srv_dispatchVars(void *arg)
|
Line 213 rpc_srv_dispatchVars(void *arg)
|
| s = c->cli_parent; |
s = c->cli_parent; |
| |
|
| do { |
do { |
| // check for disable service at this moment? | /* check for disable service at this moment? */ |
| if (s->srv_blob.state == disable && s->srv_kill != kill) { |
if (s->srv_blob.state == disable && s->srv_kill != kill) { |
| usleep(100000); |
usleep(100000); |
| |
#ifdef HAVE_PTHREAD_YIELD |
| pthread_yield(); |
pthread_yield(); |
| |
#endif |
| continue; |
continue; |
| } |
} |
| |
|
|
Line 316 rpc_srv_dispatchVars(void *arg)
|
Line 247 rpc_srv_dispatchVars(void *arg)
|
| break; |
break; |
| } |
} |
| if (ret < sizeof(struct tagBLOBHdr)) { |
if (ret < sizeof(struct tagBLOBHdr)) { |
| rpc_SetErr(EMSGSIZE, "Error:: too short BLOB packet ...\n"); | rpc_SetErr(ERPCMISMATCH, "Error:: too short BLOB packet ...\n"); |
| ret = -4; |
ret = -4; |
| break; |
break; |
| } else |
} else |
| blob = (struct tagBLOBHdr*) buf; |
blob = (struct tagBLOBHdr*) buf; |
| // check BLOB packet session info | /* check BLOB packet session info */ |
| if (memcmp(&blob->hdr_session, &s->srv_session, sizeof blob->hdr_session)) { |
if (memcmp(&blob->hdr_session, &s->srv_session, sizeof blob->hdr_session)) { |
| rpc_SetErr(EINVAL, "Error:: get invalid BLOB session ...\n"); |
rpc_SetErr(EINVAL, "Error:: get invalid BLOB session ...\n"); |
| ret = -5; |
ret = -5; |
| goto makeReply; |
goto makeReply; |
| } |
} |
| // Go to proceed packet ... | /* Go to proceed packet ... */ |
| switch (blob->hdr_cmd) { |
switch (blob->hdr_cmd) { |
| case get: |
case get: |
| if (!(b = rpc_srv_getBLOB(s, blob->hdr_var))) { |
if (!(b = rpc_srv_getBLOB(s, blob->hdr_var))) { |
|
Line 346 rpc_srv_dispatchVars(void *arg)
|
Line 277 rpc_srv_dispatchVars(void *arg)
|
| break; |
break; |
| case set: |
case set: |
| if ((b = rpc_srv_registerBLOB(s, blob->hdr_len))) { |
if ((b = rpc_srv_registerBLOB(s, blob->hdr_len))) { |
| // set new BLOB variable for reply :) | /* set new BLOB variable for reply :) */ |
| blob->hdr_var = b->blob_var; |
blob->hdr_var = b->blob_var; |
| |
|
| ret = rpc_srv_recvBLOB(c, b); |
ret = rpc_srv_recvBLOB(c, b); |
|
Line 360 rpc_srv_dispatchVars(void *arg)
|
Line 291 rpc_srv_dispatchVars(void *arg)
|
| ret = -7; |
ret = -7; |
| break; |
break; |
| default: |
default: |
| rpc_SetErr(EINVAL, "Error:: unsupported BLOB command (%d)...\n", | rpc_SetErr(EPROCUNAVAIL, "Error:: unsupported BLOB command (%d)...\n", |
| blob->hdr_cmd); |
blob->hdr_cmd); |
| ret = -7; |
ret = -7; |
| } |
} |
| |
|
| makeReply: |
makeReply: |
| // Replay to client! | /* Replay to client! */ |
| blob->hdr_cmd = ret < 0 ? error : ok; |
blob->hdr_cmd = ret < 0 ? error : ok; |
| blob->hdr_ret = ret; |
blob->hdr_ret = ret; |
| ret = send(c->cli_sock, buf, sizeof buf, 0); |
ret = send(c->cli_sock, buf, sizeof buf, 0); |
|
Line 376 makeReply:
|
Line 307 makeReply:
|
| break; |
break; |
| } |
} |
| if (ret != sizeof buf) { |
if (ret != sizeof buf) { |
| rpc_SetErr(ECANCELED, "Error:: in send BLOB reply, should be send %d bytes, " | rpc_SetErr(EPROCUNAVAIL, "Error:: in send BLOB reply, should be send %d bytes, " |
| "really is %d\n", sizeof buf, ret); |
"really is %d\n", sizeof buf, ret); |
| ret = -9; |
ret = -9; |
| break; |
break; |
|
Line 386 makeReply:
|
Line 317 makeReply:
|
| shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
| close(c->cli_sock); |
close(c->cli_sock); |
| memset(c, 0, sizeof(rpc_cli_t)); |
memset(c, 0, sizeof(rpc_cli_t)); |
| return (void*) (long)ret; | return (void*) ((long)ret); |
| } |
} |
| |
|
| // ------------------------------------------------- |
// ------------------------------------------------- |
|
Line 457 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
Line 388 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
| close(srv->srv_blob.server.cli_sock); |
close(srv->srv_blob.server.cli_sock); |
| return -1; |
return -1; |
| } |
} |
| |
n = srv->srv_netbuf; |
| |
if (setsockopt(srv->srv_blob.server.cli_sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof n) == -1) { |
| |
LOGERR; |
| |
close(srv->srv_blob.server.cli_sock); |
| |
return -1; |
| |
} |
| |
if (setsockopt(srv->srv_blob.server.cli_sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof n) == -1) { |
| |
LOGERR; |
| |
close(srv->srv_blob.server.cli_sock); |
| |
return -1; |
| |
} |
| if (bind(srv->srv_blob.server.cli_sock, &srv->srv_blob.server.cli_sa, |
if (bind(srv->srv_blob.server.cli_sock, &srv->srv_blob.server.cli_sa, |
| sizeof srv->srv_blob.server.cli_sa) == -1) { |
sizeof srv->srv_blob.server.cli_sa) == -1) { |
| LOGERR; |
LOGERR; |
|
Line 475 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
Line 417 rpc_srv_initBLOBServer(rpc_srv_t * __restrict srv, u_s
|
| |
|
| pthread_mutex_init(&srv->srv_blob.mtx, NULL); |
pthread_mutex_init(&srv->srv_blob.mtx, NULL); |
| |
|
| pthread_mutex_lock(&srv->srv_mtx); |
|
| rpc_srv_registerCall(srv, NULL, CALL_BLOBSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_BLOBSHUTDOWN, 0); |
| rpc_srv_registerCall(srv, NULL, CALL_BLOBCLIENTS, 0); | rpc_srv_registerCall(srv, NULL, CALL_BLOBCLIENTS, 1); |
| rpc_srv_registerCall(srv, NULL, CALL_BLOBVARS, 0); | rpc_srv_registerCall(srv, NULL, CALL_BLOBVARS, 1); |
| rpc_srv_registerCall(srv, NULL, CALL_BLOBSTATE, 1); | rpc_srv_registerCall(srv, NULL, CALL_BLOBSTATE, 0); |
| pthread_mutex_unlock(&srv->srv_mtx); | |
| |
|
| srv->srv_blob.state = enable; // enable BLOB | srv->srv_blob.state = enable; /* enable BLOB */ |
| return 0; |
return 0; |
| } |
} |
| |
|
|
Line 515 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
Line 455 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
| shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
| close(srv->srv_blob.server.cli_sock); |
close(srv->srv_blob.server.cli_sock); |
| |
|
| |
pthread_mutex_lock(&srv->srv_blob.mtx); |
| if (srv->srv_blob.clients) { |
if (srv->srv_blob.clients) { |
| free(srv->srv_blob.clients); |
free(srv->srv_blob.clients); |
| srv->srv_blob.clients = NULL; |
srv->srv_blob.clients = NULL; |
| } |
} |
| |
|
| /* detach blobs */ |
/* detach blobs */ |
| pthread_mutex_lock(&srv->srv_blob.mtx); |
|
| while ((f = srv->srv_blob.blobs)) { |
while ((f = srv->srv_blob.blobs)) { |
| srv->srv_blob.blobs = f->blob_next; |
srv->srv_blob.blobs = f->blob_next; |
| rpc_srv_blobFree(srv, f); |
rpc_srv_blobFree(srv, f); |
|
Line 534 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
Line 474 rpc_srv_endBLOBServer(rpc_srv_t * __restrict srv)
|
| } |
} |
| |
|
| /* |
/* |
| * rpc_srv_execBLOBServer() Execute Main BLOB server loop and wait for clients requests | * rpc_srv_loopBLOB() Execute Main BLOB server loop and wait for clients requests |
| * @srv = RPC Server instance |
* @srv = RPC Server instance |
| * return: -1 error or 0 ok, infinite loop ... |
* return: -1 error or 0 ok, infinite loop ... |
| */ |
*/ |
| int |
int |
| rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv) | rpc_srv_loopBLOB(rpc_srv_t * __restrict srv) |
| { |
{ |
| socklen_t salen = sizeof(struct sockaddr); |
socklen_t salen = sizeof(struct sockaddr); |
| register int i; |
register int i; |
|
Line 563 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 503 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
| if (!c->cli_sa.sa_family) |
if (!c->cli_sa.sa_family) |
| break; |
break; |
| if (i >= srv->srv_numcli) { |
if (i >= srv->srv_numcli) { |
| |
#ifdef HAVE_PTHREAD_YIELD |
| |
pthread_yield(); |
| |
#else |
| usleep(1000000); |
usleep(1000000); |
| |
#endif |
| continue; |
continue; |
| } |
} |
| |
|
|
Line 592 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 536 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
| pthread_detach(c->cli_tid); |
pthread_detach(c->cli_tid); |
| } |
} |
| |
|
| srv->srv_blob.state = disable; | srv->srv_blob.state = kill; |
| |
|
| return 0; |
return 0; |
| } |
} |
|
Line 603 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 547 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
| * @regProgID = ProgramID for authentication & recognition |
* @regProgID = ProgramID for authentication & recognition |
| * @regProcID = ProcessID for authentication & recognition |
* @regProcID = ProcessID for authentication & recognition |
| * @concurentClients = Concurent clients at same time to this server |
* @concurentClients = Concurent clients at same time to this server |
| |
* @netBuf = Network buffer length, if =0 == BUFSIZ (also meaning max RPC packet) |
| * @family = Family type, AF_INET, AF_INET6 or AF_LOCAL |
* @family = Family type, AF_INET, AF_INET6 or AF_LOCAL |
| * @csHost = Host name or address for bind server, if NULL any address |
* @csHost = Host name or address for bind server, if NULL any address |
| * @Port = Port for bind server, if Port == 0 default port is selected |
* @Port = Port for bind server, if Port == 0 default port is selected |
|
Line 610 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
Line 555 rpc_srv_execBLOBServer(rpc_srv_t * __restrict srv)
|
| */ |
*/ |
| rpc_srv_t * |
rpc_srv_t * |
| rpc_srv_initServer(u_int regProgID, u_int regProcID, int concurentClients, |
rpc_srv_initServer(u_int regProgID, u_int regProcID, int concurentClients, |
| u_short family, const char *csHost, u_short Port) | int netBuf, u_short family, const char *csHost, u_short Port) |
| { |
{ |
| rpc_srv_t *srv = NULL; |
rpc_srv_t *srv = NULL; |
| int n = 1; |
int n = 1; |
|
Line 627 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 572 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
| } |
} |
| if (!Port) |
if (!Port) |
| Port = RPC_DEFPORT; |
Port = RPC_DEFPORT; |
| |
if (!netBuf) |
| |
netBuf = BUFSIZ; |
| if (csHost && family != AF_LOCAL) { |
if (csHost && family != AF_LOCAL) { |
| host = gethostbyname2(csHost, family); |
host = gethostbyname2(csHost, family); |
| if (!host) { |
if (!host) { |
|
Line 666 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 613 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
| } else |
} else |
| memset(srv, 0, sizeof(rpc_srv_t)); |
memset(srv, 0, sizeof(rpc_srv_t)); |
| |
|
| |
srv->srv_netbuf = netBuf; |
| srv->srv_numcli = concurentClients; |
srv->srv_numcli = concurentClients; |
| srv->srv_session.sess_version = RPC_VERSION; |
srv->srv_session.sess_version = RPC_VERSION; |
| srv->srv_session.sess_program = regProgID; |
srv->srv_session.sess_program = regProgID; |
|
Line 699 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 647 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
| free(srv); |
free(srv); |
| return NULL; |
return NULL; |
| } |
} |
| |
n = srv->srv_netbuf; |
| |
if (setsockopt(srv->srv_server.cli_sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof n) == -1) { |
| |
LOGERR; |
| |
close(srv->srv_server.cli_sock); |
| |
free(srv); |
| |
return NULL; |
| |
} |
| |
if (setsockopt(srv->srv_server.cli_sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof n) == -1) { |
| |
LOGERR; |
| |
close(srv->srv_server.cli_sock); |
| |
free(srv); |
| |
return NULL; |
| |
} |
| if (bind(srv->srv_server.cli_sock, &srv->srv_server.cli_sa, sizeof srv->srv_server.cli_sa) == -1) { |
if (bind(srv->srv_server.cli_sock, &srv->srv_server.cli_sa, sizeof srv->srv_server.cli_sa) == -1) { |
| LOGERR; |
LOGERR; |
| close(srv->srv_server.cli_sock); |
close(srv->srv_server.cli_sock); |
|
Line 719 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
Line 680 rpc_srv_initServer(u_int regProgID, u_int regProcID, i
|
| pthread_mutex_init(&srv->srv_mtx, NULL); |
pthread_mutex_init(&srv->srv_mtx, NULL); |
| |
|
| rpc_srv_registerCall(srv, NULL, CALL_SRVSHUTDOWN, 0); |
rpc_srv_registerCall(srv, NULL, CALL_SRVSHUTDOWN, 0); |
| rpc_srv_registerCall(srv, NULL, CALL_SRVCLIENTS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVCLIENTS, 1); |
| rpc_srv_registerCall(srv, NULL, CALL_SRVCALLS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVSESSIONS, 4); |
| rpc_srv_registerCall(srv, NULL, CALL_SRVSESSIONS, 0); | rpc_srv_registerCall(srv, NULL, CALL_SRVCALLS, 1); |
| return srv; |
return srv; |
| } |
} |
| |
|
| /* |
/* |
| * rpc_srv_endServer() Destroy RPC server, close all opened sockets and free resources |
* rpc_srv_endServer() Destroy RPC server, close all opened sockets and free resources |
| * @srv = RPC Server instance | * @psrv = RPC Server instance |
| * return: none |
* return: none |
| */ |
*/ |
| void |
void |
| rpc_srv_endServer(rpc_srv_t * __restrict srv) | rpc_srv_endServer(rpc_srv_t ** __restrict psrv) |
| { |
{ |
| rpc_cli_t *c; |
rpc_cli_t *c; |
| register int i; |
register int i; |
| rpc_func_t *f; |
rpc_func_t *f; |
| |
|
| if (!srv) { | if (!psrv || !*psrv) { |
| rpc_SetErr(EINVAL, "Error:: Can`t destroy server because parameter is null!\n"); |
rpc_SetErr(EINVAL, "Error:: Can`t destroy server because parameter is null!\n"); |
| return; |
return; |
| } |
} |
| |
|
| rpc_srv_endBLOBServer(srv); | rpc_srv_endBLOBServer(*psrv); |
| |
|
| /* close all clients connections & server socket */ |
/* close all clients connections & server socket */ |
| for (i = 0, c = srv->srv_clients; i < srv->srv_numcli && c; i++, c++) | for (i = 0, c = (*psrv)->srv_clients; i < (*psrv)->srv_numcli && c; i++, c++) |
| if (c->cli_sa.sa_family) { |
if (c->cli_sa.sa_family) { |
| shutdown(c->cli_sock, SHUT_RDWR); |
shutdown(c->cli_sock, SHUT_RDWR); |
| close(c->cli_sock); |
close(c->cli_sock); |
| } |
} |
| close(srv->srv_server.cli_sock); | close((*psrv)->srv_server.cli_sock); |
| |
|
| if (srv->srv_clients) { | if ((*psrv)->srv_clients) { |
| free(srv->srv_clients); | free((*psrv)->srv_clients); |
| srv->srv_clients = NULL; | (*psrv)->srv_clients = NULL; |
| srv->srv_numcli = 0; | (*psrv)->srv_numcli = 0; |
| } |
} |
| |
|
| /* detach exported calls */ |
/* detach exported calls */ |
| pthread_mutex_lock(&srv->srv_mtx); | pthread_mutex_lock(&(*psrv)->srv_mtx); |
| while ((f = srv->srv_funcs)) { | while ((f = (*psrv)->srv_funcs)) { |
| srv->srv_funcs = f->func_next; | (*psrv)->srv_funcs = f->func_next; |
| | rpc_srv_destroyVars(f); |
| free(f); |
free(f); |
| } |
} |
| pthread_mutex_unlock(&srv->srv_mtx); | pthread_mutex_unlock(&(*psrv)->srv_mtx); |
| |
|
| while (pthread_mutex_trylock(&srv->srv_mtx) == EBUSY); | while (pthread_mutex_trylock(&(*psrv)->srv_mtx) == EBUSY); |
| pthread_mutex_destroy(&srv->srv_mtx); | pthread_mutex_destroy(&(*psrv)->srv_mtx); |
| |
|
| free(srv); | free(*psrv); |
| srv = NULL; | *psrv = NULL; |
| } |
} |
| |
|
| /* |
/* |
| * rpc_srv_execServer() Execute Main server loop and wait for clients requests | * rpc_srv_loopServer() Execute Main server loop and wait for clients requests |
| * @srv = RPC Server instance |
* @srv = RPC Server instance |
| * return: -1 error or 0 ok, infinite loop ... |
* return: -1 error or 0 ok, infinite loop ... |
| */ |
*/ |
| int |
int |
| rpc_srv_execServer(rpc_srv_t * __restrict srv) | rpc_srv_loopServer(rpc_srv_t * __restrict srv) |
| { |
{ |
| socklen_t salen = sizeof(struct sockaddr); |
socklen_t salen = sizeof(struct sockaddr); |
| register int i; |
register int i; |
|
Line 793 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 755 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
| return -1; |
return -1; |
| } |
} |
| |
|
| |
/* activate BLOB server worker if srv->srv_blob.state == enable */ |
| |
rpc_srv_execBLOBServer(srv); |
| |
|
| if (listen(srv->srv_server.cli_sock, SOMAXCONN) == -1) { |
if (listen(srv->srv_server.cli_sock, SOMAXCONN) == -1) { |
| LOGERR; |
LOGERR; |
| return -1; |
return -1; |
|
Line 803 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 768 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
| if (!c->cli_sa.sa_family) |
if (!c->cli_sa.sa_family) |
| break; |
break; |
| if (i >= srv->srv_numcli) { |
if (i >= srv->srv_numcli) { |
| |
#ifdef HAVE_PTHREAD_YIELD |
| |
pthread_yield(); |
| |
#else |
| usleep(1000000); |
usleep(1000000); |
| |
#endif |
| continue; |
continue; |
| } |
} |
| |
|
|
Line 841 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
Line 810 rpc_srv_execServer(rpc_srv_t * __restrict srv)
|
| * rpc_srv_execCall() Execute registered call from RPC server |
* rpc_srv_execCall() Execute registered call from RPC server |
| * @call = Register RPC call |
* @call = Register RPC call |
| * @rpc = IN RPC call structure |
* @rpc = IN RPC call structure |
| * @args = IN RPC call array of rpc values | * @args = IN RPC calling arguments from RPC client |
| * return: -1 error, !=-1 ok |
* return: -1 error, !=-1 ok |
| */ |
*/ |
| int |
int |
| rpc_srv_execCall(rpc_func_t * __restrict call, struct tagRPCCall * __restrict rpc, |
rpc_srv_execCall(rpc_func_t * __restrict call, struct tagRPCCall * __restrict rpc, |
| rpc_val_t * __restrict args) | array_t * __restrict args) |
| { |
{ |
| void *dl; |
void *dl; |
| rpc_callback_t func; |
rpc_callback_t func; |
|
Line 865 rpc_srv_execCall(rpc_func_t * __restrict call, struct
|
Line 834 rpc_srv_execCall(rpc_func_t * __restrict call, struct
|
| |
|
| func = dlsym(dl, (char*) call->func_name); |
func = dlsym(dl, (char*) call->func_name); |
| if (func) |
if (func) |
| ret = func(call, rpc->call_argc, args); | ret = func(call, ntohs(rpc->call_argc), args); |
| else { |
else { |
| rpc_SetErr(ENOEXEC, "Error:: Can`t find function %s!\n", dlerror()); |
rpc_SetErr(ENOEXEC, "Error:: Can`t find function %s!\n", dlerror()); |
| ret = -1; |
ret = -1; |