Repro: $ cd ~/wireshark-3.6.2/obj-s390x-linux-gnu $ /usr/bin/cmake -E env PYTHONIOENCODING=UTF-8 /usr/bin/python3.10 ../test/test.py --verbose --program-path /root/wireshark-3.6.2/obj-s390x-linux-gnu/run suite_decryption
This will trigger the same fails, but run just this test. And to pick just one sub-case from that like: $ /usr/bin/cmake -E env PYTHONIOENCODING=UTF-8 /usr/bin/python3.10 ../test/test.py --verbose --program-path /root/wireshark-3.6.2/obj-s390x-linux-gnu/run suite_decryption.case_decrypt_80211.test_80211_wpa2_ft_eap From here you can modify the python code and run the test programs as you need to find what is wrong. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1961901 Title: 3.6.2-1 FTBFS in Jammy on x86/s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lto-disabled-list/+bug/1961901/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs