Coverage: add a flag to disable capsicum when running for coverage
modified libpkg/triggers.c
@@ -438,9 +438,11 @@ trigger_execute_lua(const char *script, bool sandbox, pkghash *args)
|
|
|
|
|
|
| + | |
|
|
|
|
|
|
| + | |
|
|
|
|
|
modified src/audit.c
@@ -378,6 +378,7 @@ exec_audit(int argc, char **argv)
|
|
|
|
|
|
| + | |
|
|
|
|
|
@@ -385,6 +386,7 @@ exec_audit(int argc, char **argv)
|
|
|
|
|
|
| + | |
|
|
|
|
|
modified src/clean.c
@@ -382,12 +382,14 @@ exec_clean(int argc, char **argv)
|
|
|
|
|
|
| + | |
|
|
|
|
|
|
|
|
|
|
|
|
| + | |
|
|
|
|
|
modified src/event.c
@@ -225,11 +225,13 @@ event_sandboxed_call(pkg_sandbox_cb func, int fd, void *ud)
|
|
|
|
|
|
| + | |
|
|
|
|
|
|
|
|
|
|
| + | |
|
|
|
|
|
@@ -332,11 +334,13 @@ event_sandboxed_get_string(pkg_sandbox_cb func, char **result, int64_t *len,
|
|
|
|
|
|
| + | |
|
|
|
|
|
|
|
|
|
|
| + | |
|
|
|
|
|
modified src/info.c
@@ -277,12 +277,14 @@ exec_info(int argc, char **argv)
|
|
|
|
|
|
| + | |
|
|
|
|
|
|
|
|
|
|
|
|
| + | |
|
|
|
|
|
modified src/ssh.c
@@ -81,11 +81,13 @@ exec_ssh(int argc, char **argv __unused)
|
|
|
|
|
|
| + | |
|
|
|
|
|
|
|
|
|
|
| + | |
|
|
|
|
|
modified src/updating.c
@@ -316,12 +316,14 @@ exec_updating(int argc, char **argv)
|
|
|
|
|
|
| + | |
|
|
|
|
|
|
|
|
|
|
|
|
| + | |
|
|
|
|
|
modified src/upgrade.c
@@ -124,6 +124,7 @@ check_vulnerable(struct pkg_audit *audit, struct pkgdb *db, int sock)
|
|
|
|
|
|
| + | |
|
|
|
|
|
@@ -132,6 +133,7 @@ check_vulnerable(struct pkg_audit *audit, struct pkgdb *db, int sock)
|
|
|
|
|
|
| + | |
|
|
|
|
|