wepoll/test/test-udp-pings.c

163 lines
3.9 KiB
C

#include <stdio.h>
#include <stdlib.h>
#include "error.h"
#include "test-util.h"
#include "wepoll.h"
#include "win.h"
#define LISTEN_PORT 12345
#define NUM_PINGERS 10000
#define RUN_TIME 5000
static const char PING[] = "PING";
int main(void) {
HANDLE epoll_hnd;
int r;
u_long one = 1;
struct sockaddr_in address;
DWORD ticks_start, ticks_last;
uint64_t pings = 0, pings_sent = 0;
int i;
SOCKET srv;
struct epoll_event ev;
epoll_hnd = epoll_create1(0);
check(epoll_hnd != NULL);
srv = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
r = ioctlsocket(srv, (long) FIONBIO, &one);
check(r == 0);
address.sin_family = AF_INET;
address.sin_port = htons(LISTEN_PORT);
address.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
r = bind(srv, (struct sockaddr*) &address, sizeof address);
check(r == 0);
ev.events = EPOLLIN | EPOLLERR;
ev.data.sock = srv;
r = epoll_ctl(epoll_hnd, EPOLL_CTL_ADD, srv, &ev);
check(r == 0);
for (i = 0; i < NUM_PINGERS; i++) {
SOCKET sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
r = ioctlsocket(sock, (long) FIONBIO, &one);
check(r == 0);
r = setsockopt(
sock, SOL_SOCKET, SO_REUSEADDR, (const char*) &one, sizeof one);
check(r == 0);
r = connect(sock, (struct sockaddr*) &address, sizeof address);
/* Unlike unix, windows sets the error to EWOULDBLOCK when the connection
* is being established in the background. */
check(r == 0 || WSAGetLastError() == WSAEWOULDBLOCK);
ev.events = EPOLLOUT | EPOLLERR | EPOLLONESHOT;
ev.data.sock = sock;
r = epoll_ctl(epoll_hnd, EPOLL_CTL_ADD, sock, &ev);
check(r == 0);
}
ticks_start = GetTickCount();
ticks_last = ticks_start;
for (;;) {
int count;
struct epoll_event events[16];
DWORD ticks;
ticks = GetTickCount();
if (ticks >= ticks_last + 1000) {
printf("%I64d pings (%0.0f per sec), %I64d sent (%0.0f per sec)\n",
pings,
(double) pings / (ticks - ticks_start) * 1000.0,
pings_sent,
(double) pings_sent / (ticks - ticks_start) * 1000.0);
ticks_last = ticks;
if (ticks - ticks_start > RUN_TIME)
break;
}
count = epoll_wait(epoll_hnd, events, 15, 1000);
check(count >= 0);
for (i = 0; i < count; i++) {
uint32_t revents = events[i].events;
if (revents & EPOLLERR) {
SOCKET sock = events[i].data.sock;
int err = -1;
int err_len = sizeof err;
r = getsockopt(sock, SOL_SOCKET, SO_ERROR, (char*) &err, &err_len);
check(r == 0);
fprintf(stderr, "Socket error: %d\n", err);
r = epoll_ctl(epoll_hnd, EPOLL_CTL_DEL, sock, NULL);
check(r == 0);
continue;
}
if (revents & EPOLLIN) {
SOCKET sock = events[i].data.sock;
char buf[1024];
WSABUF wsa_buf;
DWORD flags, bytes;
wsa_buf.buf = buf;
wsa_buf.len = sizeof buf;
flags = 0;
for (;;) {
r = WSARecv(sock, &wsa_buf, 1, &bytes, &flags, NULL, NULL);
if (r == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK)
break;
check(r >= 0);
check(bytes == sizeof PING);
pings++;
}
continue;
}
if (revents & EPOLLOUT) {
SOCKET sock = events[i].data.sock;
WSABUF wsa_buf;
DWORD bytes;
wsa_buf.buf = (char*) PING;
wsa_buf.len = sizeof PING;
r = WSASend(sock, &wsa_buf, 1, &bytes, 0, NULL, NULL);
check(r >= 0);
check(bytes == sizeof PING);
pings_sent++;
uint32_t rev = EPOLLOUT | EPOLLONESHOT;
struct epoll_event e;
e.data.sock = sock;
e.events = rev;
if (epoll_ctl(epoll_hnd, EPOLL_CTL_MOD, sock, &e) < 0)
abort();
continue;
}
check(0);
}
}
r = epoll_close(epoll_hnd);
check(r == 0);
closesocket(srv);
return 0;
}