feat: Testing via RISCOF #175
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What ❔
The RISCOF framework is used for differential testing of RISC-V implementations against reference emulators such as the formally specified Sail model. The dashboard here tracks compliance using the canonical RISC-V architecture tests, executed via RISCOF, and in time we may add additional tests as part of a custom test suite.
In the RISCOF approach, the target implementation and the reference both dump a region of memory to a file (the "signatures") for a direct value-by-value comparison. This pull request adds the signature extraction mechanism for Airbender.
Airbender is compliant for every rv32im opcode except
fence. This indicates a very high degree of compliance. For instance, theaddtest suite alone addresses over 500 edge cases. As you know, one can get by without this instruction, but it does complicate the use of certain tools such as fuzzers that may emit such instructions, since they are technically required for compliance.Why ❔
It seems you used to have the same (at least at a glance) tests set up, but the job as been disabled
zksync-airbender/Cargo.toml
Line 19 in 9ed7929
If this PR is accepted, the dashboard will be updated to run a nightly job looking for updates to the main branch, and running the tests in the case of a new commit. This is useful for catching regressions, and also for tracking any ISA changes that may occur.
Is this a breaking change?
Checklist