Tested for libseccomp as follows: cat <<EOF | sudo tee /etc/apt/sources.list.d/ubuntu-$(lsb_release -cs)-proposed.list # Enable Ubuntu proposed archive deb http://archive.ubuntu.com/ubuntu/ $(lsb_release -cs)-proposed restricted main multiverse universe EOF cat <<EOF | sudo tee /etc/apt/preferences.d/proposed-updates # Configure apt to allow selective installs of packages from proposed Package: * Pin: release a=$(lsb_release -cs)-proposed Pin-Priority: 400 EOF sudo apt update sudo apt install seccomp/$(lsb_release -cs)-proposed libseccomp2/$(lsb_release -cs)-proposed [ $(scmp_sys_resolver openat2) = 437 ] && echo passed || echo FAIL
Passed for each xenial, bionic, focal and groovy. I have also done extensive regression testing of this libseccomp update via both the various autopkgtests of dependant packages and through the QRT test script https://git.launchpad.net/qa-regression- testing/tree/scripts/test-libseccomp.py which exercises various packages and their use of libseccomp under this update. ** Tags removed: verification-needed-bionic verification-needed-focal verification-needed-groovy verification-needed-xenial ** Tags added: verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891810 Title: Backport 2.5.1 to fix missing openat2 syscall, causing problems for fuse-overlayfs in nspawn containers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1891810/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs