From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B6F2533890A for ; Thu, 5 Feb 2026 22:29:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.177 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770330574; cv=none; b=FqGmZbDvedNQuY2Iu61N+o/q7X23MrZvOMjWoy/0tjj0xlW/q/MuAHxjMbChdnteyWWJxV4OlEO8Uw1iVGdM4pzP/42D2V9aCp/fS+De9MG0ADrqVGp1/GAb4Q5X99BVShRpa3JVGhs1xtvjsFjb8PTH4VgwDP+hALNF4VWSAPQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770330574; c=relaxed/simple; bh=ccp3EztJlEJzQLmiEu1DIzpJsXT5LIfKYR2G67v0qAc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=M1mbf+OWaR1UiX6gK2nlC3EMl5nzj8+JcwTzBs26u9IzEuor0JRYJmCbjvavZW+o0y0n0jBQRslLN60FFF4vGtZqTlVXeVQUiv3jPWA/mx7gqXZE+ULfrI2YLiT+GdxpoMcllVM5ziC6XXGGJ2PJLq9fADxlKN9PNrqWNZepj+I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=GQPgRVOI; arc=none smtp.client-ip=209.85.210.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="GQPgRVOI" Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-823f9f81da5so809901b3a.1 for ; Thu, 05 Feb 2026 14:29:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1770330574; x=1770935374; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=6dhstHRDqQgEPx9WkzXkwbtwT/zsNcRbIl8bglWWgQI=; b=GQPgRVOIHeGEaE7zxBxxkql7LIObuvKhjojcJYPFJczat0tx9vNJmQDIUqEluZbKqj DNHv+tN7a8aXvPDhVAeacrL/SivRBeL65bVoG3bSVxy7+879sflieCjulog9hkQzGJLt VaGHOvDY1gPX5kazSISqgCpNwO5Nh98LVelqNOL8JdR/wnAWRyJekmUHmI5C508FYj1B ZZBT8tC5jVKo6q/9b+qtc2rnzM9eQFphEHQGbNO+s6UuzC2lHu+20WNdz6ic4rOMoEt4 GTcf50A2FZdac6KosxgiB5zf83TJMLg1qqP/ubfABzw7AR5NazdT9vGfuxTV7cfSa0Em rr8A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770330574; x=1770935374; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=6dhstHRDqQgEPx9WkzXkwbtwT/zsNcRbIl8bglWWgQI=; b=HiVjusjH9bJL3O+C0mxZ6bDXtx/a56/gV40ea1+pNUeR8UeFtD4vK7NBfqMVNQ0h0Y DhaFLOoIDacJqe0bt6m7g3L9355TF6eUqlM7SGlT8otSBFEEMOS4o25tPsUH7vJ/SDN6 bVbY+akKQXEG2ZwTI/Wu7HiwN6tEY/oGApcHuGvQtULMKkI4KDlOQOd0WaFTHShga6hc 35z7QzbeehyCTuqxQoydWp93uy8aVKuZCFmUCrHw6leu5K5KKPeuHNql6zA+jSi6ILnU msz5y8NE5fp3oZm0QFRH1QYscYzjFEZcf2QFDxIpUH5U+0oTpE9yyZnCUviE7c5QGyQK d2jw== X-Gm-Message-State: AOJu0YyNJkSE7+72qBdG8Ix/NiOZD5Gr5g6jbe6/1pDmZjmTQr116+zS LqdKTQ9nmygjwPiXXIeqPqYV7JNaepCMYtdNNTmcvkVYIz6spL5htvYR X-Gm-Gg: AZuq6aI+yljJRc+UpOtCJv3Clg9k3XtOdYludpN9piLTKtS5x2/8R45yHnpax48mFI2 sQVt10khsm6xPOGlTZKYD2t106RCJvkOqXsHRIOeuPiij7AuoB8BxPH3WPmm1y+csYTDbNCU3Tf v21g7Ab2gd5KEm9ikTsT5Rofmvoz7Atb92dhecKRXhrhDb7LOoYuZg/FsOCMZcHDkr5LNDTUNcF mtuARju0Cz0MoLnR4AMD8xgHF0ElhynOP+gBrQZJl47rtgTVWQelKIrfSJMJJNwW9tgGiepv/YZ EsF9YJfzAypAtsmlUWuFHT5WfSncFx2LhT+nADeo5CqIhe2tP7xZAqduoMbeInzXyGdiOyBygHv kxdahXtFUIqDYSVe4AFuSLWFafVn2GfBiPVXyVA9Wqe83B9SALXoynmR6LE9Vg3ZVH0nGqH2vUs muog== X-Received: by 2002:a17:90a:d40e:b0:354:9b9b:54da with SMTP id 98e67ed59e1d1-354b3c7b04emr390584a91.14.1770330574200; Thu, 05 Feb 2026 14:29:34 -0800 (PST) Received: from localhost ([2a03:2880:ff:5b::]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-354b21f9178sm616472a91.11.2026.02.05.14.29.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Feb 2026 14:29:33 -0800 (PST) From: Amery Hung To: bpf@vger.kernel.org Cc: netdev@vger.kernel.org, alexei.starovoitov@gmail.com, andrii@kernel.org, daniel@iogearbox.net, memxor@gmail.com, martin.lau@kernel.org, kpsingh@kernel.org, yonghong.song@linux.dev, song@kernel.org, haoluo@google.com, ameryhung@gmail.com, kernel-team@meta.com Subject: [PATCH bpf-next v7 15/17] selftests/bpf: Remove test_task_storage_map_stress_lookup Date: Thu, 5 Feb 2026 14:29:13 -0800 Message-ID: <20260205222916.1788211-16-ameryhung@gmail.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20260205222916.1788211-1-ameryhung@gmail.com> References: <20260205222916.1788211-1-ameryhung@gmail.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Remove a test in test_maps that checks if the updating of the percpu counter in task local storage map is preemption safe as the percpu counter is now removed. Signed-off-by: Amery Hung --- .../bpf/map_tests/task_storage_map.c | 128 ------------------ .../bpf/progs/read_bpf_task_storage_busy.c | 38 ------ 2 files changed, 166 deletions(-) delete mode 100644 tools/testing/selftests/bpf/map_tests/task_storage_map.c delete mode 100644 tools/testing/selftests/bpf/progs/read_bpf_task_storage_busy.c diff --git a/tools/testing/selftests/bpf/map_tests/task_storage_map.c b/tools/testing/selftests/bpf/map_tests/task_storage_map.c deleted file mode 100644 index a4121d2248ac..000000000000 --- a/tools/testing/selftests/bpf/map_tests/task_storage_map.c +++ /dev/null @@ -1,128 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -/* Copyright (C) 2022. Huawei Technologies Co., Ltd */ -#define _GNU_SOURCE -#include -#include -#include -#include -#include -#include -#include - -#include -#include - -#include "bpf_util.h" -#include "test_maps.h" -#include "task_local_storage_helpers.h" -#include "read_bpf_task_storage_busy.skel.h" - -struct lookup_ctx { - bool start; - bool stop; - int pid_fd; - int map_fd; - int loop; -}; - -static void *lookup_fn(void *arg) -{ - struct lookup_ctx *ctx = arg; - long value; - int i = 0; - - while (!ctx->start) - usleep(1); - - while (!ctx->stop && i++ < ctx->loop) - bpf_map_lookup_elem(ctx->map_fd, &ctx->pid_fd, &value); - return NULL; -} - -static void abort_lookup(struct lookup_ctx *ctx, pthread_t *tids, unsigned int nr) -{ - unsigned int i; - - ctx->stop = true; - ctx->start = true; - for (i = 0; i < nr; i++) - pthread_join(tids[i], NULL); -} - -void test_task_storage_map_stress_lookup(void) -{ -#define MAX_NR_THREAD 4096 - unsigned int i, nr = 256, loop = 8192, cpu = 0; - struct read_bpf_task_storage_busy *skel; - pthread_t tids[MAX_NR_THREAD]; - struct lookup_ctx ctx; - cpu_set_t old, new; - const char *cfg; - int err; - - cfg = getenv("TASK_STORAGE_MAP_NR_THREAD"); - if (cfg) { - nr = atoi(cfg); - if (nr > MAX_NR_THREAD) - nr = MAX_NR_THREAD; - } - cfg = getenv("TASK_STORAGE_MAP_NR_LOOP"); - if (cfg) - loop = atoi(cfg); - cfg = getenv("TASK_STORAGE_MAP_PIN_CPU"); - if (cfg) - cpu = atoi(cfg); - - skel = read_bpf_task_storage_busy__open_and_load(); - err = libbpf_get_error(skel); - CHECK(err, "open_and_load", "error %d\n", err); - - /* Only for a fully preemptible kernel */ - if (!skel->kconfig->CONFIG_PREEMPTION) { - printf("%s SKIP (no CONFIG_PREEMPTION)\n", __func__); - read_bpf_task_storage_busy__destroy(skel); - skips++; - return; - } - - /* Save the old affinity setting */ - sched_getaffinity(getpid(), sizeof(old), &old); - - /* Pinned on a specific CPU */ - CPU_ZERO(&new); - CPU_SET(cpu, &new); - sched_setaffinity(getpid(), sizeof(new), &new); - - ctx.start = false; - ctx.stop = false; - ctx.pid_fd = sys_pidfd_open(getpid(), 0); - ctx.map_fd = bpf_map__fd(skel->maps.task); - ctx.loop = loop; - for (i = 0; i < nr; i++) { - err = pthread_create(&tids[i], NULL, lookup_fn, &ctx); - if (err) { - abort_lookup(&ctx, tids, i); - CHECK(err, "pthread_create", "error %d\n", err); - goto out; - } - } - - ctx.start = true; - for (i = 0; i < nr; i++) - pthread_join(tids[i], NULL); - - skel->bss->pid = getpid(); - err = read_bpf_task_storage_busy__attach(skel); - CHECK(err, "attach", "error %d\n", err); - - /* Trigger program */ - sys_gettid(); - skel->bss->pid = 0; - - CHECK(skel->bss->busy != 0, "bad bpf_task_storage_busy", "got %d\n", skel->bss->busy); -out: - read_bpf_task_storage_busy__destroy(skel); - /* Restore affinity setting */ - sched_setaffinity(getpid(), sizeof(old), &old); - printf("%s:PASS\n", __func__); -} diff --git a/tools/testing/selftests/bpf/progs/read_bpf_task_storage_busy.c b/tools/testing/selftests/bpf/progs/read_bpf_task_storage_busy.c deleted file mode 100644 index 69da05bb6c63..000000000000 --- a/tools/testing/selftests/bpf/progs/read_bpf_task_storage_busy.c +++ /dev/null @@ -1,38 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0 -/* Copyright (C) 2022. Huawei Technologies Co., Ltd */ -#include "vmlinux.h" -#include -#include - -extern bool CONFIG_PREEMPTION __kconfig __weak; -extern const int bpf_task_storage_busy __ksym; - -char _license[] SEC("license") = "GPL"; - -int pid = 0; -int busy = 0; - -struct { - __uint(type, BPF_MAP_TYPE_TASK_STORAGE); - __uint(map_flags, BPF_F_NO_PREALLOC); - __type(key, int); - __type(value, long); -} task SEC(".maps"); - -SEC("raw_tp/sys_enter") -int BPF_PROG(read_bpf_task_storage_busy) -{ - int *value; - - if (!CONFIG_PREEMPTION) - return 0; - - if (bpf_get_current_pid_tgid() >> 32 != pid) - return 0; - - value = bpf_this_cpu_ptr(&bpf_task_storage_busy); - if (value) - busy = *value; - - return 0; -} -- 2.47.3