Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A CI for bpftool #64

Open
qmonnet opened this issue Jan 9, 2023 · 1 comment
Open

A CI for bpftool #64

qmonnet opened this issue Jan 9, 2023 · 1 comment
Labels
enhancement New feature or request

Comments

@qmonnet
Copy link
Member

qmonnet commented Jan 9, 2023

We should really have a more robust CI for bpftool.

Current status

Build

  • GitHub CI builds: Building bpftool on Ubuntu, running on PRs and pushes on this repository. Mostly help checking that everything seems in order when synchronising the mirror.
  • test_bpftool_build.sh: Builds bpftool as part of BPF selftests (hence BPF CI). Ensures that basic build from a number of locations in the kernel repo and with or without passing an output directory still works as expected.

Selftests

Part of the BPF selftests (and running as part of the BPF CI).

Miscellaneous

  • test_bpftool_synctypes.py: Checks that various definitions in kernel headers, bpftool sources, bpftool docs and bash completion remain in sync. Not part of BPF selftests, but explicitly run as part of the BPF CI.
  • Some other workflows in the current repository, not directly related to the bpftool application.

Wish list

There is a variety of components that we would like to test. The list below is mostly a brain dump. Ideally, we want as much as possible as this testing to happen as part of the BPF CI, meaning we probably want to upstream it and make it part of the BPF selftests (Or have a dedicated repo for bpftool CI and see with BPF CI folks, to do something similar to libbpf's CI? Maybe for building bpftool, but testing that features work correctly should really go upstream).

Build

  • Try various feature sets (LLVM library vs. libbfd, with and without the other features...).
  • Try various kernel versions. In particular, we're having some issues when bpftool uses new definitions in skeletons for the BPF programs the binary relies on.
  • Try various distros/arch. It would be nice to cover aarch64, also something big-endian.
  • In the future: Windows?

Selftests

  • Check that all supported program and map types remain supported, by trying to load minimal objects of each type. I had something in progress on a dedicated branch but I never finished it.

  • Check that most/all commands behave as expected. This will require quite some work, because:

    • We must create a bunch of BPF programs (and related objects) that we can use for covering all BPF commands.
    • We must set up the host to be able to observe whatever we need to validate that the commands are working.
    • Everything we set up for introspection (or retrieving prog/map IDs etc.) should ideally not rely on bpftool itself (or libbpf)? So that if set up is broken we can still list objects. Although the alternatives to libbpf are mostly Go and Rust libraries and I don't see us introducing them in the CI.
    • We already have a lot of commands and options!
  • A code coverage tool could be helpful at some point, if we manage to cover a significant portion of the command list.

Misc

  • Simplify docs/sources to remove as much as possible the need to sync each time new types are added. Some work has been done in that direction already, but maybe we can improve more.
  • Add tests for bash completion, likely based on what the project does (see tests/ and GitHub workflows).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant