Skip to content

Commit

Permalink
Merge branch 'main' into issue45
Browse files Browse the repository at this point in the history
Signed-off-by: Alan Jowett <alanjo@microsoft.com>
  • Loading branch information
Alan-Jowett committed Nov 3, 2022
2 parents 89f97f9 + 355d773 commit 8ff79ab
Show file tree
Hide file tree
Showing 3 changed files with 17 additions and 15 deletions.
24 changes: 13 additions & 11 deletions .github/workflows/posix.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
# SPDX-License-Identifier: Apache-2.0
#
# Copyright (c) 2022-present, IO Visor Project
# SPDX-License-Identifier: Apache-2.0
# All rights reserved.
#
# This source code is licensed in accordance with the terms specified in
Expand Down Expand Up @@ -61,13 +62,13 @@ jobs:

- name: Initialize CodeQL
if: inputs.build_codeql == true
uses: github/codeql-action/init@cc7986c02bac29104a72998e67239bb5ee2ee110
uses: github/codeql-action/init@18fe527fa8b29f134bb91f32f1a5dc5abb15ed7f
with:
languages: 'cpp'

- name: Generate the cache key
id: cache_key
run: echo ::set-output name=VALUE::platform-${{ inputs.platform }}_arch=${{ inputs.arch }}_type-${{ inputs.build_type }}_sanitizers-${{ inputs.enable_sanitizers }}_coverage-${{ inputs.enable_coverage }}_scan_build-${{ inputs.scan_build }}
run: echo "VALUE=platform-${{ inputs.platform }}_arch=${{ inputs.arch }}_type-${{ inputs.build_type }}_sanitizers-${{ inputs.enable_sanitizers }}_coverage-${{ inputs.enable_coverage }}_scan_build-${{ inputs.scan_build }}" >> $GITHUB_OUTPUT

- name: Update the cache (ccache)
uses: actions/cache@v3.0.11
Expand Down Expand Up @@ -182,7 +183,7 @@ jobs:

- name: Run the local bpf_conformance tests
run: |
export BPF_CONFORMANCE_RUNNER="build_bpf_conformance/src/bpf_conformance_runner"
export BPF_CONFORMANCE_RUNNER="build_bpf_conformance/bin/bpf_conformance_runner"
export BPF_CONFORMANCE_TEST_DIR="--test_file_directory tests"
# For arm64, we need to run the tests in qemu, so use the scripts
Expand All @@ -199,8 +200,10 @@ jobs:
- name: Run the upstream bpf_conformance tests
run: |
export BPF_CONFORMANCE_RUNNER="build_bpf_conformance/src/bpf_conformance_runner"
export BPF_CONFORMANCE_RUNNER="build_bpf_conformance/bin/bpf_conformance_runner"
export BPF_CONFORMANCE_TEST_DIR="--test_file_directory external/bpf_conformance/tests"
# Exclude tests that check atomic operations, as they are not supported by uBPF yet.
export BPF_CONFORMANCE_TEST_FILTER="--exclude_regex lock"
# For arm64, we need to run the tests in qemu, so use the scripts
if [[ "${{ inputs.arch }}" == "arm64" ]] ; then
Expand All @@ -211,8 +214,8 @@ jobs:
export BPF_CONFORMANCE_PLUGIN_INTERPRET="--plugin_path build/bin/ubpf_plugin --plugin_options --interpret"
fi
${BPF_CONFORMANCE_RUNNER} ${BPF_CONFORMANCE_TEST_DIR} ${BPF_CONFORMANCE_PLUGIN_JIT}
${BPF_CONFORMANCE_RUNNER} ${BPF_CONFORMANCE_TEST_DIR} ${BPF_CONFORMANCE_PLUGIN_INTERPRET}
${BPF_CONFORMANCE_RUNNER} ${BPF_CONFORMANCE_TEST_DIR} ${BPF_CONFORMANCE_TEST_FILTER} ${BPF_CONFORMANCE_PLUGIN_JIT}
${BPF_CONFORMANCE_RUNNER} ${BPF_CONFORMANCE_TEST_DIR} ${BPF_CONFORMANCE_TEST_FILTER} ${BPF_CONFORMANCE_PLUGIN_INTERPRET}
- name: Run the CTest suite
if: inputs.arch != 'arm64'
Expand Down Expand Up @@ -293,9 +296,9 @@ jobs:
id: package_locations
if: inputs.upload_packages == true
run: |
echo ::set-output name=REL_DEB_PACKAGE_PATH::$(ls build/*.deb)
echo ::set-output name=REL_RPM_PACKAGE_PATH::$(ls build/*.rpm)
echo ::set-output name=REL_TGZ_PACKAGE_PATH::$(ls build/*.tar.gz)
echo "REL_DEB_PACKAGE_PATH=$(ls build/*.deb)" >> $GITHUB_OUTPUT
echo "REL_RPM_PACKAGE_PATH=$(ls build/*.rpm)" >> $GITHUB_OUTPUT
echo "REL_TGZ_PACKAGE_PATH=$(ls build/*.tar.gz)" >> $GITHUB_OUTPUT
- name: Upload the DEB package
if: inputs.upload_packages == true && inputs.platform == 'ubuntu-20.04'
Expand Down Expand Up @@ -331,5 +334,4 @@ jobs:

- name: Perform CodeQL Analysis
if: inputs.build_codeql == true
uses: github/codeql-action/analyze@cc7986c02bac29104a72998e67239bb5ee2ee110

uses: github/codeql-action/analyze@18fe527fa8b29f134bb91f32f1a5dc5abb15ed7f
6 changes: 3 additions & 3 deletions .github/workflows/windows.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ jobs:

- name: Initialize CodeQL
if: inputs.build_codeql == true
uses: github/codeql-action/init@cc7986c02bac29104a72998e67239bb5ee2ee110
uses: github/codeql-action/init@18fe527fa8b29f134bb91f32f1a5dc5abb15ed7f
with:
languages: 'cpp'

Expand Down Expand Up @@ -80,7 +80,7 @@ jobs:
if: inputs.upload_packages == true
shell: bash
run: |
echo ::set-output name=REL_TGZ_PACKAGE_PATH::$(ls build/*.tar.gz)
echo "REL_TGZ_PACKAGE_PATH=$(ls build/*.tar.gz)" >> $GITHUB_OUTPUT
- name: Upload the Windows TGZ package
if: inputs.upload_packages == true
Expand All @@ -92,4 +92,4 @@ jobs:

- name: Perform CodeQL Analysis
if: inputs.build_codeql == true
uses: github/codeql-action/analyze@cc7986c02bac29104a72998e67239bb5ee2ee110
uses: github/codeql-action/analyze@18fe527fa8b29f134bb91f32f1a5dc5abb15ed7f
2 changes: 1 addition & 1 deletion external/bpf_conformance
Submodule bpf_conformance updated 49 files
+25 −1 .github/workflows/Build.yml
+1 −1 .github/workflows/CICD.yml
+9 −0 CMakeLists.txt
+8 −1 include/bpf_conformance.h
+4 −8 libbpf_plugin/libbpf_plugin.cc
+1 −1 negative/invalid.sh
+7 −0 negative/invalid_lock.data
+7 −0 negative/invalid_lock2.data
+6 −0 negative/invalid_unknown_directive.data
+1 −1 scripts/check-license.sh
+205 −56 src/CMakeLists.txt
+149 −12 src/bpf_assembler.cc
+94 −9 src/bpf_conformance.cc
+166 −120 src/ebpf.h
+16 −3 src/runner.cc
+1 −1 tests/jeq32-imm.data
+1 −1 tests/jeq32-reg.data
+2 −1 tests/jge32-imm.data
+2 −1 tests/jge32-reg.data
+2 −1 tests/jgt32-imm.data
+2 −1 tests/jgt32-reg.data
+2 −1 tests/jle32-imm.data
+2 −1 tests/jle32-reg.data
+2 −1 tests/jlt32-imm.data
+2 −1 tests/jlt32-reg.data
+2 −1 tests/jne32-imm.data
+2 −1 tests/jne32-reg.data
+2 −1 tests/jset32-imm.data
+2 −1 tests/jset32-reg.data
+3 −2 tests/jsge32-imm.data
+3 −2 tests/jsge32-reg.data
+3 −2 tests/jsgt32-imm.data
+3 −2 tests/jsgt32-reg.data
+3 −2 tests/jsle32-imm.data
+4 −3 tests/jsle32-reg.data
+3 −2 tests/jslt32-imm.data
+3 −2 tests/jslt32-reg.data
+14 −0 tests/lock_add.data
+14 −0 tests/lock_add32.data
+14 −0 tests/lock_and.data
+14 −0 tests/lock_and32.data
+34 −0 tests/lock_cmpxchg.data
+35 −0 tests/lock_cmpxchg32.data
+14 −0 tests/lock_or.data
+15 −0 tests/lock_or32.data
+26 −0 tests/lock_xchg.data
+26 −0 tests/lock_xchg32.data
+14 −0 tests/lock_xor.data
+14 −0 tests/lock_xor32.data

0 comments on commit 8ff79ab

Please sign in to comment.