From 65f1dec34f0bbac21a4b2c24305ac0c6c468dfe4 Mon Sep 17 00:00:00 2001
From: "Dmitriy A. Gerasimov" <dmitriy.gerasimov@demlabs.net>
Date: Tue, 8 Sep 2020 17:27:31 +0700
Subject: [PATCH] [+] Some more checks in worker [+] More debug output for
 packet lost

---
 CMakeLists.txt                                |  2 +-
 dap-sdk/net/core/dap_worker.c                 | 29 ++++++++++++-------
 .../http_server/http_client/dap_http_client.c |  2 +-
 modules/service/vpn/dap_chain_net_srv_vpn.c   | 13 +++++----
 4 files changed, 29 insertions(+), 17 deletions(-)

diff --git a/CMakeLists.txt b/CMakeLists.txt
index bc528cb634..0b0e3d1327 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -2,7 +2,7 @@ project(cellframe-sdk C)
 cmake_minimum_required(VERSION 2.8)
 
 set(CMAKE_C_STANDARD 11)
-set(CELLFRAME_SDK_NATIVE_VERSION "2.5-12")
+set(CELLFRAME_SDK_NATIVE_VERSION "2.5-13")
 add_definitions ("-DCELLFRAME_SDK_VERSION=\"${CELLFRAME_SDK_NATIVE_VERSION}\"")
 
 set(DAPSDK_MODULES "")
diff --git a/dap-sdk/net/core/dap_worker.c b/dap-sdk/net/core/dap_worker.c
index c5cd7f2c92..c4f1e540a0 100644
--- a/dap-sdk/net/core/dap_worker.c
+++ b/dap-sdk/net/core/dap_worker.c
@@ -276,8 +276,8 @@ void *dap_worker_thread(void *arg)
                         l_cur->buf_out_zero_count++;
 
                         if(l_cur->buf_out_zero_count > buf_out_zero_count_max) { // How many time buf_out on write event could be empty
-                            log_it(L_WARNING, "Output: nothing to send %u times, remove socket from the write set",
-                                    buf_out_zero_count_max);
+                            //log_it(L_WARNING, "Output: nothing to send %u times, remove socket from the write set",
+                            //        buf_out_zero_count_max);
                             dap_events_socket_set_writable_unsafe(l_cur, false);
                         }
                     }
@@ -310,14 +310,17 @@ void *dap_worker_thread(void *arg)
                         l_cur->flags |= DAP_SOCK_SIGNAL_CLOSE;
                     }
                 }else{
+
                     //log_it(L_DEBUG, "Output: %u from %u bytes are sent ", l_bytes_sent,l_cur->buf_out_size);
                     if (l_bytes_sent) {
-                        l_cur->buf_out_size -= l_bytes_sent;
-                        if (l_cur->buf_out_size) {
-                            memmove(l_cur->buf_out, &l_cur->buf_out[l_bytes_sent], l_cur->buf_out_size);
-                        } else {
-                            if (!l_cur->is_dont_reset_write_flag)
-                                dap_events_socket_set_writable_unsafe(l_cur, false);
+                        if ( l_bytes_sent <= l_cur->buf_out_size ){
+                            l_cur->buf_out_size -= l_bytes_sent;
+                            if (l_cur->buf_out_size ) {
+                                memmove(l_cur->buf_out, &l_cur->buf_out[l_bytes_sent], l_cur->buf_out_size);
+                            }
+                        }else{
+                            log_it(L_ERROR, "Wrong bytes sent, %zd more then was in buffer %zd",l_bytes_sent, l_cur->buf_out_size);
+                            l_cur->buf_out_size = 0;
                         }
                     }
                 }
@@ -325,16 +328,22 @@ void *dap_worker_thread(void *arg)
             if (l_cur->buf_out_size) {
                 dap_events_socket_set_writable_unsafe(l_cur,true);
             }
-            if((l_cur->flags & DAP_SOCK_SIGNAL_CLOSE) && !l_cur->no_close) {
+            if((l_cur->flags & DAP_SOCK_SIGNAL_CLOSE) && !l_cur->no_close  && l_cur->buf_out_size == 0) {
                 // protect against double deletion
                 l_cur->kill_signal = true;
                 //dap_events_socket_remove_and_delete(cur, true);
                 log_it(L_INFO, "Got signal to close %s, sock %u [thread %u]", l_cur->hostaddr, l_cur->socket, l_tn);
+            } else if (l_cur->buf_out_size ){
+                log_it(L_INFO, "Got signal to close %s, sock %u [thread %u] but buffer is not empty(%zd)", l_cur->hostaddr, l_cur->socket, l_tn,
+                       l_cur->buf_out_size);
             }
 
-            if(l_cur->kill_signal) {
+            if(l_cur->kill_signal && l_cur->buf_out_size == 0) {
                 log_it(L_INFO, "Kill %u socket (processed).... [ thread %u ]", l_cur->socket, l_tn);
                 dap_events_socket_remove_and_delete_unsafe( l_cur, false);
+            }else if (l_cur->buf_out_size ){
+                log_it(L_INFO, "Kill %u socket (processed).... [ thread %u ] but buffer is not empty(%zd)", l_cur->socket, l_tn,
+                       l_cur->buf_out_size);
             }
 
         }
diff --git a/dap-sdk/net/server/http_server/http_client/dap_http_client.c b/dap-sdk/net/server/http_server/http_client/dap_http_client.c
index 93524fa883..59f30cf660 100644
--- a/dap-sdk/net/server/http_server/http_client/dap_http_client.c
+++ b/dap-sdk/net/server/http_server/http_client/dap_http_client.c
@@ -508,7 +508,7 @@ void dap_http_client_write( dap_events_socket_t * cl, void *arg )
             dap_http_header_t *hdr = l_http_client->out_headers;
             if ( hdr == NULL ) {
                 log_it(L_DEBUG, "Output: headers are over (reply status code %u content_lentgh %u)",
-                       l_http_client->reply_status_code);
+                       l_http_client->reply_status_code, l_http_client->out_content_length);
                 dap_events_socket_write_f_unsafe(cl, "\r\n");
                 dap_events_socket_set_writable_unsafe(cl, true);
                 if ( l_http_client->out_content_length || l_http_client->out_content_ready ) {
diff --git a/modules/service/vpn/dap_chain_net_srv_vpn.c b/modules/service/vpn/dap_chain_net_srv_vpn.c
index a959d2162b..cbd7a4603e 100644
--- a/modules/service/vpn/dap_chain_net_srv_vpn.c
+++ b/modules/service/vpn/dap_chain_net_srv_vpn.c
@@ -196,8 +196,8 @@ static bool s_tun_client_send_data_unsafe(dap_chain_net_srv_ch_vpn_t * l_ch_vpn,
     size_t l_data_to_send = (l_pkt_out->header.op_data.data_size + sizeof(l_pkt_out->header));
     size_t l_data_sent = dap_stream_ch_pkt_write_unsafe(l_ch_vpn->ch, DAP_STREAM_CH_PKT_TYPE_NET_SRV_VPN_DATA, l_pkt_out, l_data_to_send);
     s_update_limits(l_ch_vpn->ch,l_srv_session,l_usage, l_data_sent );
-    if ( l_data_sent != l_data_to_send){
-        log_it(L_WARNING, "Wasn't sent all the data in tunnel: probably buffer overflow");
+    if ( l_data_sent < l_data_to_send){
+        log_it(L_WARNING, "Wasn't sent all the data in tunnel (%zd was sent from %zd): probably buffer overflow", l_data_sent, l_data_to_send);
         l_srv_session->stats.bytes_recv_lost += l_data_to_send - l_data_sent;
         l_srv_session->stats.packets_recv_lost++;
         return false;
@@ -226,14 +226,17 @@ static bool s_tun_client_send_data(dap_chain_net_srv_ch_vpn_info_t * l_ch_vpn_in
             if(s_debug_more){
                 char l_str_daddr[INET_ADDRSTRLEN];
                 inet_ntop(AF_INET,&l_in_daddr,l_str_daddr,sizeof (l_in_daddr));
-                log_it(L_INFO, "Sent packet for desitnation %s in own context",l_str_daddr);
+                log_it(L_DEBUG, "Sent packet size %zd for desitnation in own context", a_data_size);
             }
 
             s_tun_client_send_data_unsafe(l_ch_vpn_info->ch_vpn,l_pkt_out);
+            DAP_DELETE(l_pkt_out);
         }else{
             log_it(L_WARNING, "Was no esocket %p on worker #%u, lost %zd data",l_ch_vpn_info->esocket, l_ch_vpn_info->worker->id,a_data_size );
+            DAP_DELETE(l_pkt_out);
+            return false;
         }
-        DAP_DELETE(l_pkt_out);
+
     }else{
         struct tun_socket_msg * l_msg= DAP_NEW_Z(struct tun_socket_msg);
         l_msg->type = TUN_SOCKET_MSG_CH_VPN_SEND;
@@ -249,7 +252,7 @@ static bool s_tun_client_send_data(dap_chain_net_srv_ch_vpn_info_t * l_ch_vpn_in
         if(s_debug_more){
             char l_str_daddr[INET_ADDRSTRLEN];
             inet_ntop(AF_INET,&l_in_daddr,l_str_daddr,sizeof (l_in_daddr));
-            log_it(L_INFO, "Sent packet for desitnation %s between contexts",l_str_daddr);
+            log_it(L_INFO, "Sent packet for desitnation %zd between contexts",a_data_size);
         }
 
     }
-- 
GitLab