forked from icl-utk-edu/papi
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathappio_test_socket.c
More file actions
110 lines (95 loc) · 3.17 KB
/
appio_test_socket.c
File metadata and controls
110 lines (95 loc) · 3.17 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
#include <stdio.h>
#include <string.h>
#include <stdlib.h> /* exit() */
#include <errno.h> /* herror() */
#include <netdb.h> /* gethostbyname() */
#include <sys/types.h> /* bind() accept() */
#include <sys/socket.h> /* bind() accept() */
#include <unistd.h>
#include "papi.h"
#include "papi_test.h"
#define PORT 3490
#define NUM_EVENTS 15
main(int argc, char *argv[]) {
int EventSet = PAPI_NULL;
const char* names[NUM_EVENTS] = {"appio:::READ_CALLS", "appio:::READ_BYTES", "appio:::READ_USEC", "appio:::READ_WOULD_BLOCK", "appio:::SOCK_READ_CALLS", "appio:::SOCK_READ_BYTES", "appio:::SOCK_READ_USEC", "appio:::SOCK_READ_WOULD_BLOCK", "appio:::WRITE_BYTES", "appio:::WRITE_CALLS", "appio:::WRITE_WOULD_BLOCK", "appio:::WRITE_USEC", "appio:::SOCK_WRITE_BYTES", "appio:::SOCK_WRITE_CALLS", "appio:::SOCK_WRITE_USEC"};
long long values[NUM_EVENTS];
/* Set TESTS_QUIET variable */
tests_quiet( argc, argv );
int version = PAPI_library_init (PAPI_VER_CURRENT);
if (version != PAPI_VER_CURRENT) {
fprintf(stderr, "PAPI_library_init version mismatch\n");
exit(1);
}
/* Create the Event Set */
if (PAPI_create_eventset(&EventSet) != PAPI_OK) {
fprintf(stderr, "Error creating event set\n");
exit(2);
}
if (!TESTS_QUIET)
printf("This program will listen on port 3490, and write data received to standard output AND socket\n"
"In the output ensure that the following identities hold:\n"
"READ_* == SOCK_READ_*\n"
"WRITE_{CALLS,BYTES} = 2 * SOCK_WRITE_{CALLS,BYTES}\n"
"SOCK_READ_BYTES == SOCK_WRITE_BYTES\n");
int retval;
int e;
int event_code;
for (e=0; e<NUM_EVENTS; e++) {
retval = PAPI_event_name_to_code((char*)names[e], &event_code);
if (retval != PAPI_OK) {
fprintf(stderr, "Error getting code for %s\n", names[e]);
exit(2);
}
retval = PAPI_add_event(EventSet, event_code);
if (retval != PAPI_OK) {
fprintf(stderr, "Error adding %s to event set\n", names[e]);
exit(2);
}
}
int bytes = 0;
char buf[1024];
int sockfd, n_sockfd, sin_size, len;
char *host_addr;
struct sockaddr_in my_addr;
struct sockaddr_in their_addr;
my_addr.sin_family = AF_INET;
my_addr.sin_port = htons(PORT);
my_addr.sin_addr.s_addr = INADDR_ANY;
sockfd = socket(AF_INET, SOCK_STREAM, 0);
if (sockfd < 0) {
perror("socket");
exit(1);
}
if ((bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr))) == -1) {
perror("bind");
exit(1);
}
listen(sockfd, 10);
if ((n_sockfd = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size)) == -1) {
perror("accept");
exit(1);
}
close(sockfd);
/* Start counting events */
if (PAPI_start(EventSet) != PAPI_OK) {
fprintf(stderr, "Error in PAPI_start\n");
exit(1);
}
while ((bytes = read(n_sockfd, buf, 1024)) > 0) {
write(1, buf, bytes);
write(n_sockfd, buf, bytes);
}
close(n_sockfd);
/* Stop counting events */
if (PAPI_stop(EventSet, values) != PAPI_OK) {
fprintf(stderr, "Error in PAPI_stop\n");
}
if (!TESTS_QUIET) {
printf("----\n");
for (e=0; e<NUM_EVENTS; e++)
printf("%s: %lld\n", names[e], values[e]);
}
test_pass( __FILE__ );
return 0;
}