• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

systemd / systemd / 16556981419

27 Jul 2025 10:50PM UTC coverage: 72.164% (-0.009%) from 72.173%
16556981419

push

github

bluca
include: update kernel headers from v6.16-rc7

- netfilter changes in v6.16-rc1 were reverted,
- vm_sockets.h now includes sys/socket.h, hence our workaround is not
  necessary anymore.

302524 of 419218 relevant lines covered (72.16%)

729103.13 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

93.58
/src/basic/stat-util.c
1
/* SPDX-License-Identifier: LGPL-2.1-or-later */
2

3
#include <fcntl.h>
4
#include <linux/magic.h>
5
#include <sys/statvfs.h>
6
#include <unistd.h>
7

8
#include "alloc-util.h"
9
#include "chase.h"
10
#include "dirent-util.h"
11
#include "errno-util.h"
12
#include "fd-util.h"
13
#include "filesystems.h"
14
#include "fs-util.h"
15
#include "hash-funcs.h"
16
#include "log.h"
17
#include "mountpoint-util.h"
18
#include "path-util.h"
19
#include "siphash24.h"
20
#include "stat-util.h"
21
#include "string-util.h"
22
#include "time-util.h"
23

24
static int verify_stat_at(
2,201,631✔
25
                int fd,
26
                const char *path,
27
                bool follow,
28
                int (*verify_func)(const struct stat *st),
29
                bool verify) {
30

31
        struct stat st;
2,201,631✔
32
        int r;
2,201,631✔
33

34
        assert(fd >= 0 || fd == AT_FDCWD);
2,201,631✔
35
        assert(!isempty(path) || !follow);
2,201,631✔
36
        assert(verify_func);
2,201,631✔
37

38
        if (fstatat(fd, strempty(path), &st,
5,231,291✔
39
                    (isempty(path) ? AT_EMPTY_PATH : 0) | (follow ? 0 : AT_SYMLINK_NOFOLLOW)) < 0)
2,201,631✔
40
                return -errno;
7,635✔
41

42
        r = verify_func(&st);
2,193,996✔
43
        return verify ? r : r >= 0;
2,193,996✔
44
}
45

46
int stat_verify_regular(const struct stat *st) {
2,656,008✔
47
        assert(st);
2,656,008✔
48

49
        /* Checks whether the specified stat() structure refers to a regular file. If not returns an
50
         * appropriate error code. */
51

52
        if (S_ISDIR(st->st_mode))
2,656,008✔
53
                return -EISDIR;
54

55
        if (S_ISLNK(st->st_mode))
2,653,820✔
56
                return -ELOOP;
57

58
        if (!S_ISREG(st->st_mode))
2,653,806✔
59
                return -EBADFD;
17✔
60

61
        return 0;
62
}
63

64
int verify_regular_at(int fd, const char *path, bool follow) {
828,285✔
65
        return verify_stat_at(fd, path, follow, stat_verify_regular, true);
828,285✔
66
}
67

68
int fd_verify_regular(int fd) {
828,008✔
69
        assert(fd >= 0);
828,008✔
70
        return verify_regular_at(fd, NULL, false);
828,008✔
71
}
72

73
int stat_verify_directory(const struct stat *st) {
1,394,838✔
74
        assert(st);
1,394,838✔
75

76
        if (S_ISLNK(st->st_mode))
1,394,838✔
77
                return -ELOOP;
78

79
        if (!S_ISDIR(st->st_mode))
1,394,828✔
80
                return -ENOTDIR;
8✔
81

82
        return 0;
83
}
84

85
int fd_verify_directory(int fd) {
18✔
86
        assert(fd >= 0);
18✔
87
        return verify_stat_at(fd, NULL, false, stat_verify_directory, true);
18✔
88
}
89

90
int is_dir_at(int fd, const char *path, bool follow) {
1,358,976✔
91
        return verify_stat_at(fd, path, follow, stat_verify_directory, false);
1,358,976✔
92
}
93

94
int is_dir(const char *path, bool follow) {
508,056✔
95
        assert(!isempty(path));
508,056✔
96
        return is_dir_at(AT_FDCWD, path, follow);
508,056✔
97
}
98

99
int stat_verify_symlink(const struct stat *st) {
14,229✔
100
        assert(st);
14,229✔
101

102
        if (S_ISDIR(st->st_mode))
14,229✔
103
                return -EISDIR;
104

105
        if (!S_ISLNK(st->st_mode))
14,214✔
106
                return -ENOLINK;
266✔
107

108
        return 0;
109
}
110

111
int is_symlink(const char *path) {
14,229✔
112
        assert(!isempty(path));
14,229✔
113
        return verify_stat_at(AT_FDCWD, path, false, stat_verify_symlink, false);
14,229✔
114
}
115

116
int stat_verify_linked(const struct stat *st) {
1,798,897✔
117
        assert(st);
1,798,897✔
118

119
        if (st->st_nlink <= 0)
1,798,897✔
120
                return -EIDRM; /* recognizable error. */
2✔
121

122
        return 0;
123
}
124

125
int fd_verify_linked(int fd) {
3✔
126
        assert(fd >= 0);
3✔
127
        return verify_stat_at(fd, NULL, false, stat_verify_linked, true);
3✔
128
}
129

130
int stat_verify_device_node(const struct stat *st) {
3,191✔
131
        assert(st);
3,191✔
132

133
        if (S_ISLNK(st->st_mode))
3,191✔
134
                return -ELOOP;
135

136
        if (S_ISDIR(st->st_mode))
3,191✔
137
                return -EISDIR;
138

139
        if (!S_ISBLK(st->st_mode) && !S_ISCHR(st->st_mode))
3,080✔
140
                return -ENOTTY;
5✔
141

142
        return 0;
143
}
144

145
int is_device_node(const char *path) {
120✔
146
        assert(!isempty(path));
120✔
147
        return verify_stat_at(AT_FDCWD, path, false, stat_verify_device_node, false);
120✔
148
}
149

150
int dir_is_empty_at(int dir_fd, const char *path, bool ignore_hidden_or_backup) {
36,646✔
151
        _cleanup_close_ int fd = -EBADF;
36,646✔
152
        struct dirent *buf;
36,646✔
153
        size_t m;
36,646✔
154

155
        fd = xopenat(dir_fd, path, O_DIRECTORY|O_CLOEXEC);
36,646✔
156
        if (fd < 0)
36,646✔
157
                return fd;
158

159
        /* Allocate space for at least 3 full dirents, since every dir has at least two entries ("."  +
160
         * ".."), and only once we have seen if there's a third we know whether the dir is empty or not. If
161
         * 'ignore_hidden_or_backup' is true we'll allocate a bit more, since we might skip over a bunch of
162
         * entries that we end up ignoring. */
163
        m = (ignore_hidden_or_backup ? 16 : 3) * DIRENT_SIZE_MAX;
2,140✔
164
        buf = alloca(m);
2,140✔
165

166
        for (;;) {
3,417✔
167
                struct dirent *de;
3,417✔
168
                ssize_t n;
3,417✔
169

170
                n = getdents64(fd, buf, m);
3,417✔
171
                if (n < 0)
3,417✔
172
                        return -errno;
×
173
                if (n == 0)
3,417✔
174
                        break;
175

176
                assert((size_t) n <= m);
2,140✔
177
                msan_unpoison(buf, n);
2,140✔
178

179
                FOREACH_DIRENT_IN_BUFFER(de, buf, n)
5,584✔
180
                        if (!(ignore_hidden_or_backup ? hidden_or_backup_file(de->d_name) : dot_or_dot_dot(de->d_name)))
4,307✔
181
                                return 0;
182
        }
183

184
        return 1;
185
}
186

187
bool stat_may_be_dev_null(struct stat *st) {
402,821✔
188
        assert(st);
402,821✔
189

190
        /* We don't want to hardcode the major/minor of /dev/null, hence we do a simpler "is this a character
191
         * device node?" check. */
192

193
        return S_ISCHR(st->st_mode);
402,821✔
194
}
195

196
bool stat_is_empty(struct stat *st) {
386,739✔
197
        assert(st);
386,739✔
198

199
        return S_ISREG(st->st_mode) && st->st_size <= 0;
386,739✔
200
}
201

202
int null_or_empty_path_with_root(const char *fn, const char *root) {
294,334✔
203
        struct stat st;
294,334✔
204
        int r;
294,334✔
205

206
        assert(fn);
294,334✔
207

208
        /* A symlink to /dev/null or an empty file?
209
         * When looking under root_dir, we can't expect /dev/ to be mounted,
210
         * so let's see if the path is a (possibly dangling) symlink to /dev/null. */
211

212
        if (path_equal(path_startswith(fn, root ?: "/"), "dev/null"))
588,668✔
213
                return true;
294,334✔
214

215
        r = chase_and_stat(fn, root, CHASE_PREFIX_ROOT, NULL, &st);
294,172✔
216
        if (r < 0)
294,172✔
217
                return r;
218

219
        return null_or_empty(&st);
294,059✔
220
}
221

222
int fd_is_read_only_fs(int fd) {
1,811✔
223
        struct statfs st;
1,811✔
224

225
        assert(fd >= 0);
1,811✔
226

227
        if (fstatfs(fd, &st) < 0)
1,811✔
228
                return -errno;
×
229

230
        if (st.f_flags & ST_RDONLY)
1,811✔
231
                return true;
232

233
        if (is_network_fs(&st)) {
1,445✔
234
                /* On NFS, fstatfs() might not reflect whether we can actually write to the remote share.
235
                 * Let's try again with access(W_OK) which is more reliable, at least sometimes. */
236
                if (access_fd(fd, W_OK) == -EROFS)
×
237
                        return true;
×
238
        }
239

240
        return false;
241
}
242

243
int path_is_read_only_fs(const char *path) {
1,518✔
244
        _cleanup_close_ int fd = -EBADF;
1,518✔
245

246
        assert(path);
1,518✔
247

248
        fd = open(path, O_CLOEXEC | O_PATH);
1,518✔
249
        if (fd < 0)
1,518✔
250
                return -errno;
146✔
251

252
        return fd_is_read_only_fs(fd);
1,372✔
253
}
254

255
int inode_same_at(int fda, const char *filea, int fdb, const char *fileb, int flags) {
15,947✔
256
        struct stat sta, stb;
15,947✔
257
        int r;
15,947✔
258

259
        assert(fda >= 0 || fda == AT_FDCWD);
15,947✔
260
        assert(fdb >= 0 || fdb == AT_FDCWD);
15,947✔
261
        assert((flags & ~(AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW|AT_NO_AUTOMOUNT)) == 0);
15,947✔
262

263
        /* Refuse an unset filea or fileb early unless AT_EMPTY_PATH is set */
264
        if ((isempty(filea) || isempty(fileb)) && !FLAGS_SET(flags, AT_EMPTY_PATH))
31,644✔
265
                return -EINVAL;
15,947✔
266

267
        /* Shortcut: comparing the same fd with itself means we can return true */
268
        if (fda >= 0 && fda == fdb && isempty(filea) && isempty(fileb) && FLAGS_SET(flags, AT_SYMLINK_NOFOLLOW))
15,949✔
269
                return true;
270

271
        _cleanup_close_ int pin_a = -EBADF, pin_b = -EBADF;
31,893✔
272
        if (!FLAGS_SET(flags, AT_NO_AUTOMOUNT)) {
15,946✔
273
                /* Let's try to use the name_to_handle_at() AT_HANDLE_FID API to identify identical
274
                 * inodes. We have to issue multiple calls on the same file for that (first, to acquire the
275
                 * FID, and then to check if .st_dev is actually the same). Hence let's pin the inode in
276
                 * between via O_PATH, unless we already have an fd for it. */
277

278
                if (!isempty(filea)) {
15,946✔
279
                        pin_a = openat(fda, filea, O_PATH|O_CLOEXEC|(FLAGS_SET(flags, AT_SYMLINK_NOFOLLOW) ? O_NOFOLLOW : 0));
15,697✔
280
                        if (pin_a < 0)
15,697✔
281
                                return -errno;
15,643✔
282

283
                        fda = pin_a;
15,375✔
284
                        filea = NULL;
15,375✔
285
                        flags |= AT_EMPTY_PATH;
15,375✔
286
                }
287

288
                if (!isempty(fileb)) {
15,624✔
289
                        pin_b = openat(fdb, fileb, O_PATH|O_CLOEXEC|(FLAGS_SET(flags, AT_SYMLINK_NOFOLLOW) ? O_NOFOLLOW : 0));
15,373✔
290
                        if (pin_b < 0)
15,373✔
291
                                return -errno;
4✔
292

293
                        fdb = pin_b;
15,369✔
294
                        fileb = NULL;
15,369✔
295
                        flags |= AT_EMPTY_PATH;
15,369✔
296
                }
297

298
                int ntha_flags = at_flags_normalize_follow(flags) & (AT_EMPTY_PATH|AT_SYMLINK_FOLLOW);
15,620✔
299
                _cleanup_free_ struct file_handle *ha = NULL, *hb = NULL;
15,620✔
300
                int mntida = -1, mntidb = -1;
15,620✔
301

302
                r = name_to_handle_at_try_fid(
15,620✔
303
                                fda,
304
                                filea,
305
                                &ha,
306
                                &mntida,
307
                                ntha_flags);
308
                if (r < 0) {
15,620✔
309
                        if (is_name_to_handle_at_fatal_error(r))
201✔
310
                                return r;
311

312
                        goto fallback;
201✔
313
                }
314

315
                r = name_to_handle_at_try_fid(
15,419✔
316
                                fdb,
317
                                fileb,
318
                                &hb,
319
                                &mntidb,
320
                                ntha_flags);
321
                if (r < 0) {
15,419✔
322
                        if (is_name_to_handle_at_fatal_error(r))
5✔
323
                                return r;
324

325
                        goto fallback;
5✔
326
                }
327

328
                /* Now compare the two file handles */
329
                if (!file_handle_equal(ha, hb))
15,414✔
330
                        return false;
331

332
                /* If the file handles are the same and they come from the same mount ID? Great, then we are
333
                 * good, they are definitely the same */
334
                if (mntida == mntidb)
15,292✔
335
                        return true;
336

337
                /* File handles are the same, they are not on the same mount id. This might either be because
338
                 * they are on two entirely different file systems, that just happen to have the same FIDs
339
                 * (because they originally where created off the same disk images), or it could be because
340
                 * they are located on two distinct bind mounts of the same fs. To check that, let's look at
341
                 * .st_rdev of the inode. We simply reuse the fallback codepath for that, since it checks
342
                 * exactly that (it checks slightly more, but we don't care.) */
343
        }
344

345
fallback:
×
346
        if (fstatat(fda, strempty(filea), &sta, flags) < 0)
606✔
347
                return log_debug_errno(errno, "Cannot stat %s: %m", strna(filea));
×
348

349
        if (fstatat(fdb, strempty(fileb), &stb, flags) < 0)
606✔
350
                return log_debug_errno(errno, "Cannot stat %s: %m", strna(fileb));
×
351

352
        return stat_inode_same(&sta, &stb);
303✔
353
}
354

355
bool is_fs_type(const struct statfs *s, statfs_f_type_t magic_value) {
8,279,048✔
356
        assert(s);
8,279,048✔
357
        assert_cc(sizeof(statfs_f_type_t) >= sizeof(s->f_type));
8,279,048✔
358

359
        return F_TYPE_EQUAL(s->f_type, magic_value);
8,279,048✔
360
}
361

362
int is_fs_type_at(int dir_fd, const char *path, statfs_f_type_t magic_value) {
8,274,211✔
363
        struct statfs s;
8,274,211✔
364
        int r;
8,274,211✔
365

366
        r = xstatfsat(dir_fd, path, &s);
8,274,211✔
367
        if (r < 0)
8,274,211✔
368
                return r;
8,274,211✔
369

370
        return is_fs_type(&s, magic_value);
8,274,210✔
371
}
372

373
bool is_temporary_fs(const struct statfs *s) {
8,354✔
374
        return fs_in_group(s, FILESYSTEM_SET_TEMPORARY);
8,354✔
375
}
376

377
bool is_network_fs(const struct statfs *s) {
18,020✔
378
        return fs_in_group(s, FILESYSTEM_SET_NETWORK);
18,020✔
379
}
380

381
int fd_is_temporary_fs(int fd) {
151✔
382
        struct statfs s;
151✔
383

384
        if (fstatfs(fd, &s) < 0)
151✔
385
                return -errno;
×
386

387
        return is_temporary_fs(&s);
151✔
388
}
389

390
int fd_is_network_fs(int fd) {
16,468✔
391
        struct statfs s;
16,468✔
392

393
        if (fstatfs(fd, &s) < 0)
16,468✔
394
                return -errno;
×
395

396
        return is_network_fs(&s);
16,468✔
397
}
398

399
int path_is_temporary_fs(const char *path) {
11✔
400
        struct statfs s;
11✔
401

402
        if (statfs(path, &s) < 0)
11✔
403
                return -errno;
2✔
404

405
        return is_temporary_fs(&s);
9✔
406
}
407

408
int path_is_network_fs(const char *path) {
×
409
        struct statfs s;
×
410

411
        if (statfs(path, &s) < 0)
×
412
                return -errno;
×
413

414
        return is_network_fs(&s);
×
415
}
416

417
int proc_mounted(void) {
30,471✔
418
        int r;
30,471✔
419

420
        /* A quick check of procfs is properly mounted */
421

422
        r = path_is_fs_type("/proc/", PROC_SUPER_MAGIC);
30,471✔
423
        if (r == -ENOENT) /* not mounted at all */
30,471✔
424
                return false;
×
425

426
        return r;
427
}
428

429
bool stat_inode_same(const struct stat *a, const struct stat *b) {
1,385,723✔
430

431
        /* Returns if the specified stat structure references the same (though possibly modified) inode. Does
432
         * a thorough check, comparing inode nr, backing device and if the inode is still of the same type. */
433

434
        return stat_is_set(a) && stat_is_set(b) &&
2,769,369✔
435
                ((a->st_mode ^ b->st_mode) & S_IFMT) == 0 &&  /* same inode type */
1,347,563✔
436
                a->st_dev == b->st_dev &&
2,674,271✔
437
                a->st_ino == b->st_ino;
1,288,548✔
438
}
439

440
bool stat_inode_unmodified(const struct stat *a, const struct stat *b) {
120,791✔
441

442
        /* Returns if the specified stat structures reference the same, unmodified inode. This check tries to
443
         * be reasonably careful when detecting changes: we check both inode and mtime, to cater for file
444
         * systems where mtimes are fixed to 0 (think: ostree/nixos type installations). We also check file
445
         * size, backing device, inode type and if this refers to a device not the major/minor.
446
         *
447
         * Note that we don't care if file attributes such as ownership or access mode change, this here is
448
         * about contents of the file. The purpose here is to detect file contents changes, and nothing
449
         * else. */
450

451
        return stat_inode_same(a, b) &&
120,791✔
452
                a->st_mtim.tv_sec == b->st_mtim.tv_sec &&
75,530✔
453
                a->st_mtim.tv_nsec == b->st_mtim.tv_nsec &&
75,368✔
454
                (!S_ISREG(a->st_mode) || a->st_size == b->st_size) && /* if regular file, compare file size */
196,123✔
455
                (!(S_ISCHR(a->st_mode) || S_ISBLK(a->st_mode)) || a->st_rdev == b->st_rdev); /* if device node, also compare major/minor, because we can */
75,332✔
456
}
457

458
bool statx_inode_same(const struct statx *a, const struct statx *b) {
4,162,011✔
459

460
        /* Same as stat_inode_same() but for struct statx */
461

462
        return statx_is_set(a) && statx_is_set(b) &&
8,324,022✔
463
                FLAGS_SET(a->stx_mask, STATX_TYPE|STATX_INO) && FLAGS_SET(b->stx_mask, STATX_TYPE|STATX_INO) &&
4,162,011✔
464
                ((a->stx_mode ^ b->stx_mode) & S_IFMT) == 0 &&
4,162,011✔
465
                a->stx_dev_major == b->stx_dev_major &&
4,162,011✔
466
                a->stx_dev_minor == b->stx_dev_minor &&
3,958,083✔
467
                a->stx_ino == b->stx_ino;
3,944,817✔
468
}
469

470
bool statx_mount_same(const struct statx *a, const struct statx *b) {
3,914,911✔
471
        if (!statx_is_set(a) || !statx_is_set(b))
7,829,822✔
472
                return false;
473

474
        /* if we have the mount ID, that's all we need */
475
        if (FLAGS_SET(a->stx_mask, STATX_MNT_ID) && FLAGS_SET(b->stx_mask, STATX_MNT_ID))
3,914,911✔
476
                return a->stx_mnt_id == b->stx_mnt_id;
3,914,911✔
477

478
        /* Otherwise, major/minor of backing device must match */
479
        return a->stx_dev_major == b->stx_dev_major &&
×
480
                a->stx_dev_minor == b->stx_dev_minor;
×
481
}
482

483
int xstatfsat(int dir_fd, const char *path, struct statfs *ret) {
8,274,599✔
484
        _cleanup_close_ int fd = -EBADF;
8,274,599✔
485

486
        assert(dir_fd >= 0 || dir_fd == AT_FDCWD);
8,274,599✔
487
        assert(ret);
8,274,599✔
488

489
        if (!isempty(path)) {
8,274,599✔
490
                fd = xopenat(dir_fd, path, O_PATH|O_CLOEXEC|O_NOCTTY);
30,980✔
491
                if (fd < 0)
30,980✔
492
                        return fd;
493
                dir_fd = fd;
494
        }
495

496
        return RET_NERRNO(fstatfs(dir_fd, ret));
8,274,599✔
497
}
498

499
usec_t statx_timestamp_load(const struct statx_timestamp *ts) {
4,988✔
500
        return timespec_load(&(const struct timespec) { .tv_sec = ts->tv_sec, .tv_nsec = ts->tv_nsec });
4,988✔
501
}
502
nsec_t statx_timestamp_load_nsec(const struct statx_timestamp *ts) {
820✔
503
        return timespec_load_nsec(&(const struct timespec) { .tv_sec = ts->tv_sec, .tv_nsec = ts->tv_nsec });
820✔
504
}
505

506
void inode_hash_func(const struct stat *q, struct siphash *state) {
37,387✔
507
        siphash24_compress_typesafe(q->st_dev, state);
37,387✔
508
        siphash24_compress_typesafe(q->st_ino, state);
37,387✔
509
}
37,387✔
510

511
int inode_compare_func(const struct stat *a, const struct stat *b) {
31,537✔
512
        int r;
31,537✔
513

514
        r = CMP(a->st_dev, b->st_dev);
31,537✔
515
        if (r != 0)
26,760✔
516
                return r;
4,879✔
517

518
        return CMP(a->st_ino, b->st_ino);
26,658✔
519
}
520

521
DEFINE_HASH_OPS_WITH_KEY_DESTRUCTOR(inode_hash_ops, struct stat, inode_hash_func, inode_compare_func, free);
816✔
522

523
const char* inode_type_to_string(mode_t m) {
7,367✔
524

525
        /* Returns a short string for the inode type. We use the same name as the underlying macros for each
526
         * inode type. */
527

528
        switch (m & S_IFMT) {
7,367✔
529
        case S_IFREG:
530
                return "reg";
531
        case S_IFDIR:
2,826✔
532
                return "dir";
2,826✔
533
        case S_IFLNK:
1✔
534
                return "lnk";
1✔
535
        case S_IFCHR:
970✔
536
                return "chr";
970✔
537
        case S_IFBLK:
441✔
538
                return "blk";
441✔
539
        case S_IFIFO:
441✔
540
                return "fifo";
441✔
541
        case S_IFSOCK:
593✔
542
                return "sock";
593✔
543
        }
544

545
        /* Note anonymous inodes in the kernel will have a zero type. Hence fstat() of an eventfd() will
546
         * return an .st_mode where we'll return NULL here! */
547
        return NULL;
3✔
548
}
549

550
mode_t inode_type_from_string(const char *s) {
13✔
551
        if (!s)
13✔
552
                return MODE_INVALID;
553

554
        if (streq(s, "reg"))
13✔
555
                return S_IFREG;
556
        if (streq(s, "dir"))
10✔
557
                return S_IFDIR;
558
        if (streq(s, "lnk"))
7✔
559
                return S_IFLNK;
560
        if (streq(s, "chr"))
6✔
561
                return S_IFCHR;
562
        if (streq(s, "blk"))
5✔
563
                return S_IFBLK;
564
        if (streq(s, "fifo"))
4✔
565
                return S_IFIFO;
566
        if (streq(s, "sock"))
2✔
567
                return S_IFSOCK;
2✔
568

569
        return MODE_INVALID;
570
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc