• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

iovisor / ubpf / 21422523864
78%

Build:
DEFAULT BRANCH: main
Ran 28 Jan 2026 03:00AM UTC
Jobs 6
Files 129
Run time 1min
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

28 Jan 2026 02:28AM UTC coverage: 78.015% (-0.09%) from 78.1%
21422523864

push

github

web-flow
Fix integer overflow vulnerabilities in bounds_check (#720)

* Add integer overflow checks to bounds_check function

- Check for negative size values
- Check for overflow in access_start + size calculation
- Check for overflow in stack_start + stack_len calculation
- Check for overflow in mem_start + mem_len calculation
- Add test case for integer overflow scenario

Co-authored-by: Alan-Jowett <20480683+Alan-Jowett@users.noreply.github.com>

* Address code review feedback - improve mem NULL handling

Co-authored-by: Alan-Jowett <20480683+Alan-Jowett@users.noreply.github.com>

* Add type cast for bounds check function call

Co-authored-by: Alan-Jowett <20480683+Alan-Jowett@users.noreply.github.com>

* Fix goto jumping over variable initializers and relax test pattern

- Move all variable declarations before any goto statements to avoid -Wjump-misses-init errors
- Use validity flags (stack_valid, mem_valid) to track which regions are safe to check
- Relax test error pattern from specific hex format to .* for portability

Co-authored-by: Alan-Jowett <20480683+Alan-Jowett@users.noreply.github.com>

* Fix pointer arithmetic overflow at call sites

Addresses comment 2733624376: The macros BOUNDS_CHECK_LOAD and BOUNDS_CHECK_STORE
now perform address computation safely in uint64_t space with overflow detection
before casting to void* and passing to bounds_check(). This prevents overflow in
the expression (char*)reg[inst.src] + inst.offset from bypassing the overflow
checks in bounds_check().

The fix handles both positive and negative offsets correctly:
- For positive offsets: check if base_addr + offset would overflow
- For negative offsets: check if base_addr - abs(offset) would underflow

Co-authored-by: Alan-Jowett <20480683+Alan-Jowett@users.noreply.github.com>

* Use computed safe address in memory operations

Extract address computation into helper macro and use the safely computed
address (_eff_addr) in all memory load/store operations instead of reco... (continued)

46 of 63 new or added lines in 1 file covered. (73.02%)

5965 of 7646 relevant lines covered (78.01%)

389599.79 hits per line

New Missed Lines in Diff

Lines Coverage ∆ File
17
77.6
-0.46% vm/ubpf_vm.c
Jobs
ID Job ID Ran Files Coverage
1 run-Debug-ubuntu-24.04-arm-arm64 - 21422523864.1 28 Jan 2026 03:07AM UTC 68
58.94
GitHub Action Run
2 run-Debug-ubuntu-latest-x86_64 - 21422523864.2 28 Jan 2026 03:18AM UTC 67
74.04
GitHub Action Run
3 run-RelWithDebInfo-ubuntu-24.04-arm-arm64 - 21422523864.3 28 Jan 2026 03:00AM UTC 68
58.96
GitHub Action Run
4 run-Debug-macos-latest-x86_64 - 21422523864.4 28 Jan 2026 03:27AM UTC 83
76.24
GitHub Action Run
5 run-RelWithDebInfo-macos-latest-x86_64 - 21422523864.5 28 Jan 2026 03:19AM UTC 83
76.1
GitHub Action Run
6 run-RelWithDebInfo-ubuntu-latest-x86_64 - 21422523864.6 28 Jan 2026 03:23AM UTC 67
74.01
GitHub Action Run
Source Files on build 21422523864
  • Tree
  • List 129
  • Changed 1
  • Source Changed 1
  • Coverage Changed 1
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • Github Actions Build #21422523864
  • 8d92f8f6 on github
  • Prev Build on main (#21422474740)
  • Next Build on main (#21422982819)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc