Upstream is tracking the same issue on aarch64 too:
https://github.com/seccomp/libseccomp/issues/418
** Bug watch added: github.com/seccomp/libseccomp/issues #418
https://github.com/seccomp/libseccomp/issues/418
--
You received this bug notification because you are a member of Ubuntu
Touch se
** Tags added: 4.4 xenial
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/2040484
Title:
ubuntu_seccomp pseudo-syscall fails on s390 / PowerPC
Status in ubuntu-kernel-t
** Summary changed:
- ubuntu_seccomp pseudo-syscall fails on s390
+ ubuntu_seccomp pseudo-syscall fails on s390 / PowerPC
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/2
This issue can be found on ppc64el (openstack VM) as well, all the way
from 5.4 to 6.5
** Tags added: 5.15 5.4 6.2 6.5 focal jammy lunar mantic ppc64el s390x
sru-20231030 ubuntu-seccomp
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subsc
Adding a task against libseccomp until we know more about where the bug
lies.
** Also affects: libseccomp (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubun
5 matches
Mail list logo