Ran
|
Jobs
1
|
Files
53
|
Run time
4s
|
Badge
Embed ▾
README BADGES
|
push
travis-ci
bpf: don't catch the -1 syscall in the x32/x86_64 check The -1 syscall can be used by a tracing process to skip a syscall, which up until Linux v4.8 was of no concern for libseccomp since the seccomp filter was only executed at the start of the syscall and not after the tracing process was notified, however recent kernels also execute the seccomp filter after the tracing process finishes its syscall handling; this caused problems on x86_64 systems that didn't explicitly add an x32 architecture to their filters. This patch fixes the x32 check to treat the -1 syscall like any other syscall. Signed-off-by: Paul Moore <paul@paul-moore.com> (imported from commit ba73ee4f5)
6 of 6 new or added lines in 1 file covered. (100.0%)
1615 of 2412 relevant lines covered (66.96%)
176139.03 hits per line
Lines | Coverage | ∆ | File |
---|---|---|---|
7 |
89.11 |
0.0% | src/arch.c |
12 |
82.76 |
0.12% | src/api.c |
85 |
82.04 |
-0.16% | src/db.c |
ID | Job ID | Ran | Files | Coverage | |
---|---|---|---|---|---|
1 | 28.1 | 53 |
66.96 |
Travis Job 28.1 |
Coverage | ∆ | File | Lines | Relevant | Covered | Missed | Hits/Line |
---|