• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

seccomp / libseccomp / 27 / 1
93%
main: 89%

Build:
Build:
LAST BUILD BRANCH: issues/463
DEFAULT BRANCH: main
Ran 23 Feb 2017 05:46PM UTC
Files 59
Run time 4s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

23 Feb 2017 05:17PM UTC coverage: 66.927% (+0.08%) from 66.846%
27.1

push

travis-ci

pcmoore
bpf: don't catch the -1 syscall in the x32/x86_64 check

The -1 syscall can be used by a tracing process to skip a syscall,
which up until Linux v4.8 was of no concern for libseccomp since the
seccomp filter was only executed at the start of the syscall and not
after the tracing process was notified, however recent kernels also
execute the seccomp filter after the tracing process finishes its
syscall handling; this caused problems on x86_64 systems that didn't
explicitly add an x32 architecture to their filters.

This patch fixes the x32 check to treat the -1 syscall like any other
syscall.

Signed-off-by: Paul Moore <paul@paul-moore.com>

1627 of 2431 relevant lines covered (66.93%)

181631.85 hits per line

Source Files on job 27.1
  • Tree
  • List 0
  • Changed 8
  • Source Changed 6
  • Coverage Changed 8
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 27
  • Travis Job 27.1
  • ba73ee4f on github
  • Prev Job for on master (#25.1)
  • Next Job for on master (#30.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc