@rbalint how would you feel about - for now - reverting debian/patches /test-expect-mmap-to-fail-in-seccomp-test-on-s390-and-s390.patch and instead also mark __i386__ as failing-to-protect?
That would allow the current combination of systemd&libseccomp in Focal to pass. Once this issue is sorted out between the upstreams we can adapt as needed. Well, lets give upstreams some time now - but knowing your opinion on this would be nice. Furthermore FYI systemd is atm FTFBS on arm64 and needs https://git.launchpad.net/~ubuntu-core- dev/ubuntu/+source/systemd/commit/?h=fix- MemoryDenyWriteExecute-x86-s390-bug-1853852&id=90a9551007b37be0c8a2569b918c33f56649682b -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853852 Title: hard to reproduce issues in systemd autopkgtest against new libseccomp 2.4.2 To manage notifications about this bug go to: https://bugs.launchpad.net/libseccomp/+bug/1853852/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs