Forked from WJWH/gist:f3a196e65fdabd6eace5f89da430600e
Created
April 16, 2022 10:28
-
-
Save tivrfoa/23a05bb3fa5ab87f1fda5de863951519 to your computer and use it in GitHub Desktop.
Server that does no syscalls for handling connections
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Extremely hacky server program that will send a standard response | |
// to every client that connects, then closes the connection. Will | |
// issue no system calls (as measured by `strace`) after initial setup | |
// no matter how many requests are served. | |
// Yes, this program is sorely lacking in error checking. It's a toy | |
// and not meant to be taken seriously. | |
// compile with gcc no_syscall_server.c -luring | |
#include <stdio.h> | |
#include <netinet/in.h> | |
#include <string.h> | |
#include <unistd.h> | |
#include <stdlib.h> | |
#include <signal.h> | |
#include <liburing.h> | |
int ENTRIES = 1024; | |
struct io_uring ring; | |
const char *standard_response = \ | |
"HTTP/1.0 200 OK\r\n" | |
"Content-type: text/html\r\n" | |
"Content-length: 17\r\n" | |
"\r\n" | |
"Have a nice day!\n"; | |
int setup_listening_socket(int port) { | |
int sock; | |
struct sockaddr_in srv_addr; | |
int enable = 1; | |
sock = socket(PF_INET, SOCK_STREAM, 0); | |
setsockopt(sock,SOL_SOCKET, SO_REUSEADDR,&enable, sizeof(int)); | |
memset(&srv_addr, 0, sizeof(srv_addr)); | |
srv_addr.sin_family = AF_INET; | |
srv_addr.sin_port = htons(port); | |
srv_addr.sin_addr.s_addr = htonl(INADDR_ANY); | |
bind(sock, (const struct sockaddr *)&srv_addr, sizeof(srv_addr)); | |
listen(sock, 10); | |
return (sock); | |
} | |
void add_accept_request(int server_socket, | |
struct sockaddr_in *client_addr, | |
socklen_t *client_addr_len) { | |
struct io_uring_sqe *sqe = io_uring_get_sqe(&ring); | |
io_uring_prep_accept(sqe, | |
server_socket, | |
(struct sockaddr *) client_addr, | |
client_addr_len, | |
0); | |
// magic number in the userdata to differentiate between accept CQEs and others | |
io_uring_sqe_set_data(sqe, (void*) 123); | |
io_uring_submit(&ring); | |
} | |
void add_write_and_close_requests(int fd) { | |
struct io_uring_sqe *sqe; | |
sqe = io_uring_get_sqe(&ring); | |
io_uring_prep_write(sqe, fd, standard_response, strlen(standard_response), 0); | |
// make sure the write is complete before doing the close(): | |
sqe->flags |= IOSQE_IO_LINK; | |
sqe = io_uring_get_sqe(&ring); | |
io_uring_prep_close(sqe, fd); | |
io_uring_submit(&ring); | |
} | |
void server_loop(int server_socket) { | |
struct io_uring_cqe *cqe; | |
struct sockaddr_in client_addr; | |
socklen_t client_addr_len = sizeof(client_addr); | |
int peek_result = 0; | |
// initial accept call | |
add_accept_request(server_socket, &client_addr, &client_addr_len); | |
while(1){ | |
peek_result = io_uring_peek_cqe(&ring,&cqe); | |
// peek_result is 0 if a cqe was available and -errno otherwise | |
if(!peek_result){ | |
if (cqe->user_data == 123) { | |
// accept CQE | |
add_write_and_close_requests(cqe->res); | |
add_accept_request(server_socket, &client_addr, &client_addr_len); | |
} | |
else { | |
// no action required | |
} | |
io_uring_cqe_seen(&ring, cqe); | |
} | |
} | |
} | |
void sigint_handler(int signo) { | |
printf("^C pressed. Shutting down.\n"); | |
io_uring_queue_exit(&ring); | |
exit(0); | |
} | |
int main(){ | |
struct io_uring_params params; | |
int server_socket; | |
if (geteuid()) { | |
fprintf(stderr, "You need root privileges to run this program.\n"); | |
return 1; | |
} | |
memset(¶ms, 0, sizeof(params)); | |
params.flags |= IORING_SETUP_SQPOLL; | |
params.sq_thread_idle = 120000; // 2 minutes in ms | |
io_uring_queue_init_params(ENTRIES, &ring, ¶ms); | |
signal(SIGINT, sigint_handler); | |
server_socket = setup_listening_socket(8000); | |
server_loop(server_socket); | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment