Tested for libseccomp as follows:

cat <<EOF | sudo tee /etc/apt/sources.list.d/ubuntu-$(lsb_release 
-cs)-proposed.list
# Enable Ubuntu proposed archive
deb http://archive.ubuntu.com/ubuntu/ $(lsb_release -cs)-proposed restricted 
main multiverse universe
EOF
cat <<EOF | sudo tee /etc/apt/preferences.d/proposed-updates
# Configure apt to allow selective installs of packages from proposed
Package: *
Pin: release a=$(lsb_release -cs)-proposed
Pin-Priority: 400
EOF
sudo apt update
sudo apt install seccomp/$(lsb_release -cs)-proposed libseccomp2/$(lsb_release 
-cs)-proposed
[ $(scmp_sys_resolver openat2) = 437 ] && echo passed || echo FAIL

Passed for each xenial, bionic, focal and groovy.

I have also done extensive regression testing of this libseccomp update
via both the various autopkgtests of dependant packages and through the
QRT test script https://git.launchpad.net/qa-regression-
testing/tree/scripts/test-libseccomp.py which exercises various packages
and their use of libseccomp under this update.

** Tags removed: verification-needed-bionic verification-needed-focal 
verification-needed-groovy verification-needed-xenial
** Tags added: verification-done-bionic verification-done-focal 
verification-done-groovy verification-done-xenial

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1891810

Title:
  Backport 2.5.1 to fix missing openat2 syscall, causing problems for
  fuse-overlayfs in nspawn containers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1891810/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to