Increase stack depth for PR fault_injection tests (#3489)
* increase stack depth for PR fault_injection tests * fix memleak in unit tests --------- Co-authored-by: Alan Jowett <alanjo@microsoft.com>
This commit is contained in:
Родитель
db14b8209d
Коммит
fa003d8650
|
@ -221,7 +221,7 @@ jobs:
|
||||||
shell: cmd
|
shell: cmd
|
||||||
run: |
|
run: |
|
||||||
set EBPF_ENABLE_WER_REPORT=yes
|
set EBPF_ENABLE_WER_REPORT=yes
|
||||||
OpenCppCoverage.exe -q --cover_children --sources %CD% --excluded_sources %CD%\external\Catch2 --export_type cobertura:ebpf_for_windows.xml --working_dir ${{env.BUILD_PLATFORM}}\${{env.BUILD_CONFIGURATION}} -- powershell.exe .\Test-FaultInjection.ps1 ${{env.DUMP_PATH}} ${{env.TEST_TIMEOUT}} ${{env.TEST_COMMAND}} 4
|
OpenCppCoverage.exe -q --cover_children --sources %CD% --excluded_sources %CD%\external\Catch2 --export_type cobertura:ebpf_for_windows.xml --working_dir ${{env.BUILD_PLATFORM}}\${{env.BUILD_CONFIGURATION}} -- powershell.exe .\Test-FaultInjection.ps1 ${{env.DUMP_PATH}} ${{env.TEST_TIMEOUT}} ${{env.TEST_COMMAND}} 8
|
||||||
|
|
||||||
- name: Run test with low resource simulation
|
- name: Run test with low resource simulation
|
||||||
if: (inputs.code_coverage != true) && (inputs.fault_injection == true) && (steps.skip_check.outputs.should_skip != 'true')
|
if: (inputs.code_coverage != true) && (inputs.fault_injection == true) && (steps.skip_check.outputs.should_skip != 'true')
|
||||||
|
|
|
@ -2946,6 +2946,7 @@ extension_reload_test(ebpf_execution_type_t execution_type)
|
||||||
bpf_object_ptr unique_test_sample_ebpf_object;
|
bpf_object_ptr unique_test_sample_ebpf_object;
|
||||||
int program_fd = -1;
|
int program_fd = -1;
|
||||||
const char* error_message = nullptr;
|
const char* error_message = nullptr;
|
||||||
|
int result;
|
||||||
|
|
||||||
// Should fail.
|
// Should fail.
|
||||||
REQUIRE(
|
REQUIRE(
|
||||||
|
@ -2966,14 +2967,19 @@ extension_reload_test(ebpf_execution_type_t execution_type)
|
||||||
program_info_provider_t sample_program_info;
|
program_info_provider_t sample_program_info;
|
||||||
REQUIRE(sample_program_info.initialize(EBPF_PROGRAM_TYPE_SAMPLE) == EBPF_SUCCESS);
|
REQUIRE(sample_program_info.initialize(EBPF_PROGRAM_TYPE_SAMPLE) == EBPF_SUCCESS);
|
||||||
|
|
||||||
REQUIRE(
|
result = ebpf_program_load(
|
||||||
ebpf_program_load(
|
execution_type == EBPF_EXECUTION_NATIVE ? "test_sample_ebpf_um.dll" : "test_sample_ebpf.o",
|
||||||
execution_type == EBPF_EXECUTION_NATIVE ? "test_sample_ebpf_um.dll" : "test_sample_ebpf.o",
|
BPF_PROG_TYPE_UNSPEC,
|
||||||
BPF_PROG_TYPE_UNSPEC,
|
execution_type,
|
||||||
execution_type,
|
&unique_test_sample_ebpf_object,
|
||||||
&unique_test_sample_ebpf_object,
|
&program_fd,
|
||||||
&program_fd,
|
&error_message);
|
||||||
&error_message) == 0);
|
|
||||||
|
if (error_message) {
|
||||||
|
printf("ebpf_program_load failed with %s\n", error_message);
|
||||||
|
ebpf_free((void*)error_message);
|
||||||
|
}
|
||||||
|
REQUIRE(result == 0);
|
||||||
|
|
||||||
bpf_link* link = nullptr;
|
bpf_link* link = nullptr;
|
||||||
// Attach only to the single interface being tested.
|
// Attach only to the single interface being tested.
|
||||||
|
|
Загрузка…
Ссылка в новой задаче