• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

seccomp / libseccomp / 29
93%
main: 89%

Build:
LAST BUILD BRANCH: working-syscall
DEFAULT BRANCH: main
Ran 23 Feb 2017 05:58PM UTC
Jobs 1
Files 53
Run time 3s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

23 Feb 2017 - 17:27 coverage: 66.957% (+0.1%) from 66.846%
29

push

travis-ci

pcmoore
bpf: don't catch the -1 syscall in the x32/x86_64 check

The -1 syscall can be used by a tracing process to skip a syscall,
which up until Linux v4.8 was of no concern for libseccomp since the
seccomp filter was only executed at the start of the syscall and not
after the tracing process was notified, however recent kernels also
execute the seccomp filter after the tracing process finishes its
syscall handling; this caused problems on x86_64 systems that didn't
explicitly add an x32 architecture to their filters.

This patch fixes the x32 check to treat the -1 syscall like any other
syscall.

Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit ba73ee4f5)

1615 of 2412 relevant lines covered (66.96%)

176139.03 hits per line

Jobs
ID Job ID Ran Files Coverage
1 29.1 23 Feb 2017 05:58PM UTC 53
66.96
Travis Job 29.1
Source Files on build 29
  • List 53
  • Changed 21
  • Source Changed 10
  • Coverage Changed 20
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • Travis Build #29
  • 0006b53a on github
  • Prev Build on coverity-scan (#20)
  • Next Build on coverity-scan (#39)
Troubleshooting · Open an Issue · Sales · Support · ENTERPRISE · CAREERS · STATUS
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2023 Coveralls, Inc