Skip to content

seccomp: add riscv_flush_icache to allow list#25018

Merged
bluca merged 1 commit intosystemd:mainfrom
CoelacanthusHex:patch-1
Oct 16, 2022
Merged

seccomp: add riscv_flush_icache to allow list#25018
bluca merged 1 commit intosystemd:mainfrom
CoelacanthusHex:patch-1

Conversation

@CoelacanthusHex
Copy link
Contributor

This system call is harmless because it only enforces ordering between stores and instruction cache fetch.

fixed #24991
Related: felixonmars/archriscv-packages#1840

Signed-off-by: Celeste Liu [email protected]

This system call is harmless because it only enforces ordering between stores
and instruction cache fetch.

fixed systemd#24991
Related: felixonmars/archriscv-packages#1840

Signed-off-by: Celeste Liu <[email protected]>
@CoelacanthusHex
Copy link
Contributor Author

CoelacanthusHex commented Oct 16, 2022

I'm very sorry. After I fixed it locally, I forgot to commit before pushing.

@poettering poettering added good-to-merge/waiting-for-ci 👍 PR is good to merge, but CI hasn't passed at time of review. Please merge if you see CI has passed seccomp labels Oct 16, 2022
@bluca bluca merged commit 0992503 into systemd:main Oct 16, 2022
martinetd added a commit to martinetd/containers-common that referenced this pull request Jun 5, 2024
martinetd added a commit to martinetd/containers-common that referenced this pull request Jun 5, 2024
apparently harmless and used

Link: systemd/systemd#25018
Link: containerd/containerd#6882
Link: moby/moby#43553
Signed-off-by: Dominique Martinet <[email protected]>
openshift-merge-bot bot pushed a commit to containers/common that referenced this pull request Jun 7, 2024
apparently harmless and used

Link: systemd/systemd#25018
Link: containerd/containerd#6882
Link: moby/moby#43553
Signed-off-by: Dominique Martinet <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

good-to-merge/waiting-for-ci 👍 PR is good to merge, but CI hasn't passed at time of review. Please merge if you see CI has passed seccomp

Development

Successfully merging this pull request may close these issues.

Adding arch-specific syscalls to seccomp allow list?

3 participants