@rbalint how would you feel about - for now - reverting debian/patches
/test-expect-mmap-to-fail-in-seccomp-test-on-s390-and-s390.patch and
instead also mark __i386__ as failing-to-protect?

That would allow the current combination of systemd&libseccomp in Focal to pass.
Once this issue is sorted out between the upstreams we can adapt as needed.

Well, lets give upstreams some time now - but knowing your opinion on
this would be nice.

Furthermore FYI systemd is atm FTFBS on arm64 and needs
https://git.launchpad.net/~ubuntu-core-
dev/ubuntu/+source/systemd/commit/?h=fix-
MemoryDenyWriteExecute-x86-s390-bug-1853852&id=90a9551007b37be0c8a2569b918c33f56649682b

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853852

Title:
  hard to reproduce issues in systemd autopkgtest against new libseccomp
  2.4.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/libseccomp/+bug/1853852/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to