-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump libseccomp #7657
Bump libseccomp #7657
Conversation
Codecov Report
@@ Coverage Diff @@
## main #7657 +/- ##
=========================================
- Coverage 11.63% 9.03% -2.61%
=========================================
Files 20 22 +2
Lines 1160 1715 +555
=========================================
+ Hits 135 155 +20
- Misses 1022 1556 +534
- Partials 3 4 +1
Flags with carried forward coverage won't be shown. Click here to find out more.
Continue to review full report at Codecov.
|
because they're not really errors but rather a race between the proc crawling during PID translation, and short-lived processes.
c0f4f12
to
1f0f301
Compare
/lgtm |
LGTM label has been added. Git tree hash: 3162d6bc28052088b43c61be900cbf1dc2392bac
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aledbf Associated issue: #5954 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Description
This PR bumps the libseccomp-golang dependency which improves the stability of the seccomp-notify interface.
We stress-tested the
mount
syscall in a preview environment and were able to reproduce the the issue. Talking to IWS directly, we were unable to reproduce the issue.Related Issue(s)
Fixes #5945
How to test
Put stress on the
mount
syscall, e.g. starting many containers in parallel.Release Notes