From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2412B352953 for ; Wed, 11 Feb 2026 19:05:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.44 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770836706; cv=none; b=N3STFsi8q6mBdjlvMI6fBeMeKGpa7/Xj5door1ZzXhjM0AiUUthP6A1ftq0+3HI9auVD8URKRnpZy0U+Z6IMXiE4h0WBKbMk/8t+ZrAcYiceImPv/UUwAPqL950mK38UfHsDnRC68E4GVUHhqgyP+jEXXZgb2xbAej/Z5D64Ono= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770836706; c=relaxed/simple; bh=KJtKd1KGmJYYrWIqh/HfajENl6KXQvABlGfdviM0aWE=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=cTbRtS0GTWJRC4rsx8d/AW5lSY2XCcxKP+f2k78hvSnWLUnn7dgqojNDIuRwL12QgGKbDBAqGQdlNpK9jIixQcCBdu3Vz2uF8ATFtKrCgbBRpDMSCo+esRnYP9jIlA0KboDtuLT1qkD72tObYV/q6MUPnxYWvPcvzXb1G8YPlSg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=HvYazG8W; arc=none smtp.client-ip=209.85.221.44 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="HvYazG8W" Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-4376c0bffc1so3055239f8f.0 for ; Wed, 11 Feb 2026 11:05:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1770836702; x=1771441502; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=wdBdwsVxWNNKNCyWp6pnznrp93RIrThkOlfNRSRS63U=; b=HvYazG8WfglXuIbobIYHGzXVsLxsdeCAHi7y+3Ke6637NWxT2n23u6AkpfKsKM/S8X uDVMSPv2MOKbTSYTShP+hQLb73ZCVAq2YKZBgQEcepAmociZvUl3sWXUWaQsvu563cFo hxZ6cqik05cfhbS6XV1UjZnyaiz5H0TbUs0Jl5bJLS3SObImsLRA6Gm3jYRyb4+rRtRC GoZsdp9ZMIUqzh77cTfpVwlThiK3m6KUD8UgRtcjX3kKr7gSQbG5If9Uvi9b56CfsySk LFcozEGGsX0X9ozydEbuwJNhP5XsQYQoZiYVMr3aRW9Bv+Q79SoWobVRAR+mG4m+Oba7 68wQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770836702; x=1771441502; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=wdBdwsVxWNNKNCyWp6pnznrp93RIrThkOlfNRSRS63U=; b=dWbqpjN+fAeuDufv5MTcltg1bOZm947NIIXCcaQRycfOjDpXM7B2YzCddM/Pg4hSK8 u+8v9iQFf4ZiA0y6rRFW6TYWgXNesZkqMVUMhAoZRkE8bGO9bk8VOx1nN9JrWJqS+r+O B3uTdgyzPDceRpgAFBESKBdSv7hAa+k2/AKpCCbY0CTbkdeoVCONfHQfx8XqdHPCpN03 CDL3C29w+oIE2nfYGErvbaWlIerAUJCipYOkvaR+/6PM3MAHcFttgTyC8RtVNoGoUQ4X 2HLdqMXDy/F1Q0kCSb/3eQrPfTbA4i92p2hc+6/KRhXro6zIZgHsAC7PK7BAI4RG8tD3 0oCg== X-Gm-Message-State: AOJu0YySOmj4THY1tRyykUtGCMaRPbqgyC4nu2cOy7iOQTCTxjq2JhVD mpXByL6anKlZzOutjq0UkZyuHzG0ILLPXLUQIvTSjj3PTZNsNfU+lCC8JG8s7plE X-Gm-Gg: AZuq6aL6YPRI49UDdc3+kkNcaiUy3R1IWrJr0o4h4+j9Dqm4yNkLYzSZ8FxH8mDACwU rmtTU6Cw4zqXdDe0NJQ+gvJOUEvQetQFyvZo2F7u29NKBV1Ul4GtRh3H1kTqesJoktTDsetmiHi Oe1fmA5h5RjpLgGe87Wf7OvrAm9sGBqWeJEOGQH+6TnFh9xBkdLhiAVkDjDxkhKTkLmAgLIZOsg MxHrLdM3l64Y+cOndzeeKiGQQDtr4GusE9Vm3gWQ3HgsjxoRpXiSmwQ2PyiDb+gPypeXnWB7cqS hO11Sz5K3R7hgvuXxTWc0kDmmjsObzbDQhYHLYdGgrGQzTSccCx7MyrilCTmm6qhBsvK0F6WrIE w88HzW7H2ZXAAthgcS63T65d8bIWwJrAd0mUBsIa8zPX7dBtix/6NAxbjd/oRKdZVr+Zv34y2bA sjIZWSuB6wslmouWikig/BC5/pqBt8I5jl69ypPLJaWIzoAgZsWa7W/5K7injdfqTAukGWH2UAN ERu6DqAIKKN2BQ+J4Gtqm4fAbiWrw== X-Received: by 2002:a05:6000:240f:b0:430:fdc8:8be3 with SMTP id ffacd0b85a97d-4378ac716a1mr797733f8f.29.1770836701815; Wed, 11 Feb 2026 11:05:01 -0800 (PST) Received: from 127.mynet ([2a01:4b00:bd21:4f00:7cc6:d3ca:494:116c]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43783dfc8b9sm6174169f8f.24.2026.02.11.11.05.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Feb 2026 11:05:00 -0800 (PST) From: Pavel Begunkov To: io-uring@vger.kernel.org Cc: asml.silence@gmail.com, bpf@vger.kernel.org, axboe@kernel.dk, Alexei Starovoitov Subject: [PATCH v6 5/5] selftests/io_uring: add a bpf io_uring selftest Date: Wed, 11 Feb 2026 19:04:56 +0000 Message-ID: <82bd9cd01352c83db37a62d5564033d788ba0d78.1770836401.git.asml.silence@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: io-uring@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Add a simple io_uring BPF selftest, where the BPF program implemented in basic.bpf.c executes a given number of NOP requests with QD=1, writes some stats and returns back. The makefile is borrowed from sched_ext tests. Signed-off-by: Pavel Begunkov --- tools/testing/selftests/Makefile | 3 +- tools/testing/selftests/io_uring/Makefile | 162 ++++++++++++++++++ tools/testing/selftests/io_uring/common.h | 7 + .../selftests/io_uring/nops_loop.bpf.c | 131 ++++++++++++++ tools/testing/selftests/io_uring/nops_loop.c | 110 ++++++++++++ tools/testing/selftests/io_uring/unreg.bpf.c | 26 +++ tools/testing/selftests/io_uring/unreg.c | 113 ++++++++++++ 7 files changed, 551 insertions(+), 1 deletion(-) create mode 100644 tools/testing/selftests/io_uring/Makefile create mode 100644 tools/testing/selftests/io_uring/common.h create mode 100644 tools/testing/selftests/io_uring/nops_loop.bpf.c create mode 100644 tools/testing/selftests/io_uring/nops_loop.c create mode 100644 tools/testing/selftests/io_uring/unreg.bpf.c create mode 100644 tools/testing/selftests/io_uring/unreg.c diff --git a/tools/testing/selftests/Makefile b/tools/testing/selftests/Makefile index 56e44a98d6a5..5e965ba3697c 100644 --- a/tools/testing/selftests/Makefile +++ b/tools/testing/selftests/Makefile @@ -130,6 +130,7 @@ TARGETS += vfio TARGETS += x86 TARGETS += x86/bugs TARGETS += zram +TARGETS += io_uring #Please keep the TARGETS list alphabetically sorted # Run "make quicktest=1 run_tests" or # "make quicktest=1 kselftest" from top level Makefile @@ -147,7 +148,7 @@ endif # User can optionally provide a TARGETS skiplist. By default we skip # targets using BPF since it has cutting edge build time dependencies # which require more effort to install. -SKIP_TARGETS ?= bpf sched_ext +SKIP_TARGETS ?= bpf sched_ext io_uring ifneq ($(SKIP_TARGETS),) TMP := $(filter-out $(SKIP_TARGETS), $(TARGETS)) override TARGETS := $(TMP) diff --git a/tools/testing/selftests/io_uring/Makefile b/tools/testing/selftests/io_uring/Makefile new file mode 100644 index 000000000000..2b4f8d5bc5bc --- /dev/null +++ b/tools/testing/selftests/io_uring/Makefile @@ -0,0 +1,162 @@ +# SPDX-License-Identifier: GPL-2.0 +include ../../../build/Build.include +include ../../../scripts/Makefile.arch +include ../../../scripts/Makefile.include + +TEST_GEN_PROGS := unreg nops_loop + +# override lib.mk's default rules +OVERRIDE_TARGETS := 1 +include ../lib.mk + +CURDIR := $(abspath .) +REPOROOT := $(abspath ../../../..) +TOOLSDIR := $(REPOROOT)/tools +LIBDIR := $(TOOLSDIR)/lib +BPFDIR := $(LIBDIR)/bpf +TOOLSINCDIR := $(TOOLSDIR)/include +BPFTOOLDIR := $(TOOLSDIR)/bpf/bpftool +APIDIR := $(TOOLSINCDIR)/uapi +GENDIR := $(REPOROOT)/include/generated +GENHDR := $(GENDIR)/autoconf.h + +OUTPUT_DIR := $(OUTPUT)/build +OBJ_DIR := $(OUTPUT_DIR)/obj +INCLUDE_DIR := $(OUTPUT_DIR)/include +BPFOBJ_DIR := $(OBJ_DIR)/libbpf +IOUOBJ_DIR := $(OBJ_DIR)/io_uring +LIBBPF_OUTPUT := $(OBJ_DIR)/libbpf/libbpf.a +BPFOBJ := $(BPFOBJ_DIR)/libbpf.a + +DEFAULT_BPFTOOL := $(OUTPUT_DIR)/host/sbin/bpftool +HOST_OBJ_DIR := $(OBJ_DIR)/host/bpftool +HOST_LIBBPF_OUTPUT := $(OBJ_DIR)/host/libbpf/ +HOST_LIBBPF_DESTDIR := $(OUTPUT_DIR)/host/ +HOST_DESTDIR := $(OUTPUT_DIR)/host/ + +VMLINUX_BTF_PATHS ?= $(if $(O),$(O)/vmlinux) \ + $(if $(KBUILD_OUTPUT),$(KBUILD_OUTPUT)/vmlinux) \ + ../../../../vmlinux \ + /sys/kernel/btf/vmlinux \ + /boot/vmlinux-$(shell uname -r) +VMLINUX_BTF ?= $(abspath $(firstword $(wildcard $(VMLINUX_BTF_PATHS)))) +ifeq ($(VMLINUX_BTF),) +$(error Cannot find a vmlinux for VMLINUX_BTF at any of "$(VMLINUX_BTF_PATHS)") +endif + +BPFTOOL ?= $(DEFAULT_BPFTOOL) + +ifneq ($(wildcard $(GENHDR)),) + GENFLAGS := -DHAVE_GENHDR +endif + +CFLAGS += -g -O2 -rdynamic -pthread -Wall -Werror $(GENFLAGS) \ + -I$(INCLUDE_DIR) -I$(GENDIR) -I$(LIBDIR) \ + -I$(TOOLSINCDIR) -I$(APIDIR) -I$(CURDIR)/include + +# Silence some warnings when compiled with clang +ifneq ($(LLVM),) +CFLAGS += -Wno-unused-command-line-argument +endif + +LDFLAGS = -lelf -lz -lpthread -lzstd + +IS_LITTLE_ENDIAN = $(shell $(CC) -dM -E - &1 \ + | sed -n '/<...> search starts here:/,/End of search list./{ s| \(/.*\)|-idirafter \1|p }') \ +$(shell $(1) $(2) -dM -E - $@ +else + $(call msg,CP,,$@) + $(Q)cp "$(VMLINUX_H)" $@ +endif + +$(IOUOBJ_DIR)/%.bpf.o: %.bpf.c $(INCLUDE_DIR)/vmlinux.h | $(BPFOBJ) $(IOUOBJ_DIR) + $(call msg,CLNG-BPF,,$(notdir $@)) + $(Q)$(CLANG) $(BPF_CFLAGS) -target bpf -c $< -o $@ + +$(INCLUDE_DIR)/%.bpf.skel.h: $(IOUOBJ_DIR)/%.bpf.o $(INCLUDE_DIR)/vmlinux.h $(BPFTOOL) | $(INCLUDE_DIR) + $(eval sched=$(notdir $@)) + $(call msg,GEN-SKEL,,$(sched)) + $(Q)$(BPFTOOL) gen object $(<:.o=.linked1.o) $< + $(Q)$(BPFTOOL) gen object $(<:.o=.linked2.o) $(<:.o=.linked1.o) + $(Q)$(BPFTOOL) gen object $(<:.o=.linked3.o) $(<:.o=.linked2.o) + $(Q)diff $(<:.o=.linked2.o) $(<:.o=.linked3.o) + $(Q)$(BPFTOOL) gen skeleton $(<:.o=.linked3.o) name $(subst .bpf.skel.h,,$(sched)) > $@ + $(Q)$(BPFTOOL) gen subskeleton $(<:.o=.linked3.o) name $(subst .bpf.skel.h,,$(sched)) > $(@:.skel.h=.subskel.h) + +override define CLEAN + rm -rf $(OUTPUT_DIR) + rm -f $(TEST_GEN_PROGS) +endef + +all_test_bpfprogs := $(foreach prog,$(wildcard *.bpf.c),$(INCLUDE_DIR)/$(patsubst %.c,%.skel.h,$(prog))) + +$(OUTPUT)/%: $(IOUOBJ_DIR)/%.o $(BPFOBJ) + $(CC) $(CFLAGS) -o $@ $^ $(LDFLAGS) + +$(IOUOBJ_DIR)/%.o: %.c $(all_test_bpfprogs) | $(IOUOBJ_DIR) $(BPFOBJ) + $(CC) $(CFLAGS) -c $< -o $@ + +.DEFAULT_GOAL := all + +.DELETE_ON_ERROR: + +.SECONDARY: diff --git a/tools/testing/selftests/io_uring/common.h b/tools/testing/selftests/io_uring/common.h new file mode 100644 index 000000000000..9e726ca72d0c --- /dev/null +++ b/tools/testing/selftests/io_uring/common.h @@ -0,0 +1,7 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#define CQ_ENTRIES 8 +#define SQ_ENTRIES 8 + +#define SLOT_RES 0 +#define SLOT_NR_CQES 1 +#define SLOT_NR_SQES 2 diff --git a/tools/testing/selftests/io_uring/nops_loop.bpf.c b/tools/testing/selftests/io_uring/nops_loop.bpf.c new file mode 100644 index 000000000000..7bec9de54c7b --- /dev/null +++ b/tools/testing/selftests/io_uring/nops_loop.bpf.c @@ -0,0 +1,131 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#include +#include +#include +#include +#include "vmlinux.h" +#include "common.h" + +char LICENSE[] SEC("license") = "Dual BSD/GPL"; + +#define REQ_TOKEN 0xabba1741 + +const unsigned max_inflight = 8; +const volatile unsigned cq_hdr_offset; +const volatile unsigned sq_hdr_offset; +const volatile unsigned cqes_offset; + +int reqs_to_run; +unsigned inflight; + +struct { + __uint(type, BPF_MAP_TYPE_ARRAY); + __uint(max_entries, 3); + __type(key, u32); + __type(value, s64); +} res_map SEC(".maps"); + +#define t_min(a, b) ((a) < (b) ? (a) : (b)) + +static inline void set_cq_wait(struct iou_loop_params *lp, + struct io_uring *cq_hdr, unsigned to_wait) +{ + lp->cq_wait_idx = cq_hdr->head + to_wait; +} + +static inline void write_result(int res) +{ + u32 key = SLOT_RES; + u64 *val; + + val = bpf_map_lookup_elem(&res_map, &key); + if (val) + *val = res; +} + +static inline void write_stats(int idx, unsigned int v) +{ + u32 key = idx; + u64 *val; + + val = bpf_map_lookup_elem(&res_map, &key); + if (val) + *val += v; +} + +SEC("struct_ops.s/link_loop") +int BPF_PROG(link_loop, struct io_ring_ctx *ring, struct iou_loop_params *ls) +{ + struct io_uring *sq_hdr, *cq_hdr; + struct io_uring_sqe *sqes; + struct io_uring_cqe *cqes; + void *rings; + int ret; + + sqes = (void *)bpf_io_uring_get_region(ring, IOU_REGION_SQ, + SQ_ENTRIES * sizeof(struct io_uring_sqe)); + rings = (void *)bpf_io_uring_get_region(ring, IOU_REGION_CQ, + cqes_offset + CQ_ENTRIES * sizeof(struct io_uring_cqe)); + if (!rings || !sqes) { + write_result(-1); + return IOU_LOOP_STOP; + } + + sq_hdr = rings + (sq_hdr_offset & 63); + cq_hdr = rings + (cq_hdr_offset & 63); + cqes = rings + cqes_offset; + + unsigned to_wait = cq_hdr->tail - cq_hdr->head; + to_wait = t_min(to_wait, CQ_ENTRIES); + for (int i = 0; i < to_wait; i++) { + struct io_uring_cqe *cqe = &cqes[cq_hdr->head & (CQ_ENTRIES - 1)]; + + if (cqe->user_data != REQ_TOKEN) { + write_result(-3); + return IOU_LOOP_STOP; + } + cq_hdr->head++; + } + + reqs_to_run -= to_wait; + inflight -= to_wait; + write_stats(SLOT_NR_CQES, to_wait); + + if (reqs_to_run <= 0) { + write_result(1); + return IOU_LOOP_STOP; + } + + if (inflight < max_inflight) { + unsigned to_submit = max_inflight - inflight; + + to_submit = t_min(to_submit, reqs_to_run); + + for (int i = 0; i < to_submit; i++) { + struct io_uring_sqe *sqe; + + sqe = &sqes[sq_hdr->tail & (SQ_ENTRIES - 1)]; + *sqe = (struct io_uring_sqe){}; + sqe->opcode = IORING_OP_NOP; + sqe->user_data = REQ_TOKEN; + sq_hdr->tail++; + } + + ret = bpf_io_uring_submit_sqes(ring, to_submit); + if (ret != to_submit) { + write_result(-2); + return IOU_LOOP_STOP; + } + + inflight += to_submit; + write_stats(SLOT_NR_SQES, to_submit); + } + + set_cq_wait(ls, cq_hdr, 1); + return IOU_LOOP_CONTINUE; +} + +SEC(".struct_ops.link") +struct io_uring_bpf_ops nops_loop_ops = { + .loop_step = (void *)link_loop, +}; diff --git a/tools/testing/selftests/io_uring/nops_loop.c b/tools/testing/selftests/io_uring/nops_loop.c new file mode 100644 index 000000000000..cd93851c37db --- /dev/null +++ b/tools/testing/selftests/io_uring/nops_loop.c @@ -0,0 +1,110 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#include +#include +#include +#include + +#include +#include + +#include "nops_loop.bpf.skel.h" +#include "common.h" + +static struct io_uring_params params; +static struct nops_loop *skel; +static struct bpf_link *nops_loop_link; + +#define NR_ITERS 1000 + +static void setup_ring(struct io_uring *ring) +{ + int ret; + + memset(¶ms, 0, sizeof(params)); + params.cq_entries = CQ_ENTRIES; + params.flags = IORING_SETUP_SINGLE_ISSUER | + IORING_SETUP_DEFER_TASKRUN | + IORING_SETUP_NO_SQARRAY | + IORING_SETUP_CQSIZE; + + ret = io_uring_queue_init_params(SQ_ENTRIES, ring, ¶ms); + if (ret) { + fprintf(stderr, "ring init failed\n"); + exit(1); + } +} + +static void setup_bpf_ops(struct io_uring *ring) +{ + int ret; + + skel = nops_loop__open(); + if (!skel) { + fprintf(stderr, "can't generate skeleton\n"); + exit(1); + } + + skel->struct_ops.nops_loop_ops->ring_fd = ring->ring_fd; + skel->bss->reqs_to_run = NR_ITERS; + skel->rodata->sq_hdr_offset = params.sq_off.head; + skel->rodata->cq_hdr_offset = params.cq_off.head; + skel->rodata->cqes_offset = params.cq_off.cqes; + + ret = nops_loop__load(skel); + if (ret) { + fprintf(stderr, "failed to load skeleton\n"); + exit(1); + } + + nops_loop_link = bpf_map__attach_struct_ops(skel->maps.nops_loop_ops); + if (!nops_loop_link) { + fprintf(stderr, "failed to attach ops\n"); + exit(1); + } +} + +static void run_ring(struct io_uring *ring) +{ + __s64 res[3] = {}; + int i, ret; + + ret = io_uring_enter(ring->ring_fd, 0, 0, IORING_ENTER_GETEVENTS, NULL); + if (ret) { + fprintf(stderr, "run failed\n"); + exit(1); + } + + for (i = 0; i < 3; i++) { + __u32 key = i; + + ret = bpf_map__lookup_elem(skel->maps.res_map, + &key, sizeof(key), + &res[i], sizeof(res[i]), 0); + if (ret) + fprintf(stderr, "can't read map idx %i: %i\n", i, ret); + } + + if (res[SLOT_RES] != 1) + fprintf(stderr, "run failed: %i\n", (int)res[SLOT_RES]); + if (res[SLOT_NR_CQES] != NR_ITERS) + fprintf(stderr, "unexpected number of CQEs: %i\n", + (int)res[SLOT_NR_CQES]); + if (res[SLOT_NR_SQES] != NR_ITERS) + fprintf(stderr, "unexpected submitted number: %i\n", + (int)res[SLOT_NR_SQES]); +} + +int main() +{ + struct io_uring ring; + + setup_ring(&ring); + setup_bpf_ops(&ring); + + run_ring(&ring); + + bpf_link__destroy(nops_loop_link); + nops_loop__destroy(skel); + io_uring_queue_exit(&ring); + return 0; +} diff --git a/tools/testing/selftests/io_uring/unreg.bpf.c b/tools/testing/selftests/io_uring/unreg.bpf.c new file mode 100644 index 000000000000..01e836af506d --- /dev/null +++ b/tools/testing/selftests/io_uring/unreg.bpf.c @@ -0,0 +1,26 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#include +#include +#include +#include +#include "vmlinux.h" +#include "common.h" + +char LICENSE[] SEC("license") = "Dual BSD/GPL"; + +SEC("struct_ops.s/dummy") +int BPF_PROG(dummy, struct io_ring_ctx *ring, struct iou_loop_params *ls) +{ + struct io_uring_sqe *sqes; + + sqes = (void *)bpf_io_uring_get_region(ring, IOU_REGION_SQ, + sizeof(struct io_uring_sqe)); + if (sqes) + sqes->user_data++; + return IOU_LOOP_STOP; +} + +SEC(".struct_ops.link") +struct io_uring_bpf_ops unreg_ops = { + .loop_step = (void *)dummy, +}; diff --git a/tools/testing/selftests/io_uring/unreg.c b/tools/testing/selftests/io_uring/unreg.c new file mode 100644 index 000000000000..b0e75e671a5c --- /dev/null +++ b/tools/testing/selftests/io_uring/unreg.c @@ -0,0 +1,113 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#include +#include +#include +#include + +#include +#include + +#include "unreg.bpf.skel.h" +#include "common.h" + +static void setup_ring(struct io_uring *ring) +{ + struct io_uring_params params; + int ret; + + memset(¶ms, 0, sizeof(params)); + params.cq_entries = CQ_ENTRIES; + params.flags = IORING_SETUP_SINGLE_ISSUER | + IORING_SETUP_DEFER_TASKRUN | + IORING_SETUP_NO_SQARRAY | + IORING_SETUP_CQSIZE; + + ret = io_uring_queue_init_params(SQ_ENTRIES, ring, ¶ms); + if (ret) { + fprintf(stderr, "ring init failed\n"); + exit(1); + } +} + +static struct unreg *load_unreg(struct io_uring *ring) +{ + struct unreg *skel; + int ret; + + skel = unreg__open(); + if (!skel) { + fprintf(stderr, "can't generate skeleton\n"); + exit(1); + } + + skel->struct_ops.unreg_ops->ring_fd = ring->ring_fd; + + ret = unreg__load(skel); + if (ret) { + fprintf(stderr, "failed to load skeleton\n"); + exit(1); + } + + return skel; +} + +static void run_ring(struct io_uring *ring) +{ + io_uring_enter(ring->ring_fd, 0, 0, IORING_ENTER_GETEVENTS, NULL); +} + +int main() +{ + struct bpf_link *link1, *link2; + struct unreg *skel1, *skel2; + struct io_uring_sqe *sqe; + struct io_uring ring; + + setup_ring(&ring); + sqe = &ring.sq.sqes[0]; + sqe->user_data = 0; + + skel1 = load_unreg(&ring); + skel2 = load_unreg(&ring); + + link1 = bpf_map__attach_struct_ops(skel1->maps.unreg_ops); + if (!link1) { + fprintf(stderr, "failed to attach ops\n"); + return 1; + } + + run_ring(&ring); + if (sqe->user_data != 1) { + fprintf(stderr, "failed to run BPF\n"); + return 1; + } + + /* remove the program and give the kernel time to actually destroy it */ + bpf_link__destroy(link1); + unreg__destroy(skel1); + sleep(1); + + run_ring(&ring); + if (sqe->user_data != 1) { + fprintf(stderr, "Executed removed BPF\n"); + return 1; + } + + /* try to attach another program */ + link2 = bpf_map__attach_struct_ops(skel2->maps.unreg_ops); + if (!link2) { + fprintf(stderr, "failed to reattach ops\n"); + return 1; + } + + run_ring(&ring); + if (sqe->user_data != 2) { + fprintf(stderr, "failed to run reattached BPF\n"); + return 1; + } + + bpf_link__destroy(link2); + unreg__destroy(skel2); + io_uring_queue_exit(&ring); + return 0; +} -- 2.52.0