Am 26.01.21 um 18:40 schrieb Raphael Hertzog:
On Tue, 26 Jan 2021, Michael Biebl wrote:
Am 26.01.21 um 17:44 schrieb Michael Biebl:
Cherry-picking the patch from the above PR causes those failures on i386
Looks like this needs an updated libseccomp to actually work.
As such, this issue is
On Tue, 26 Jan 2021, Michael Biebl wrote:
> Am 26.01.21 um 17:44 schrieb Michael Biebl:
> > Cherry-picking the patch from the above PR causes those failures on i386
>
> Looks like this needs an updated libseccomp to actually work.
> As such, this issue is probably out of scope for a stable
Am 26.01.21 um 17:44 schrieb Michael Biebl:
Cherry-picking the patch from the above PR causes those failures on i386
Looks like this needs an updated libseccomp to actually work.
As such, this issue is probably out of scope for a stable update.
Sorry :-/
Michael
OpenPGP_signature
Am 26.01.21 um 09:33 schrieb Raphael Hertzog:
On Mon, 25 Jan 2021, Michael Biebl wrote:
Good timing. I was about to prepare a pu request for buster 10.8 and we
could include this one as well.
Do you have a minimal test case?
Or to put it differently: Have you verified that PR#13975 fixes the
On Mon, 25 Jan 2021, Michael Biebl wrote:
> > Good timing. I was about to prepare a pu request for buster 10.8 and we
> > could include this one as well.
> > Do you have a minimal test case?
>
> Or to put it differently: Have you verified that PR#13975 fixes the issue
> you are seeing?
I have
Am 25.01.21 um 18:23 schrieb Michael Biebl:
Am 25.01.21 um 15:49 schrieb Raphaël Hertzog:
But it would still be nice if this could be fixed via a point release.
Good timing. I was about to prepare a pu request for buster 10.8 and we
could include this one as well.
Do you have a minimal test
Am 25.01.21 um 15:49 schrieb Raphaël Hertzog:
But it would still be nice if this could be fixed via a point release.
Good timing. I was about to prepare a pu request for buster 10.8 and we
could include this one as well.
Do you have a minimal test case?
Regards,
Michael
OpenPGP_signature
Package: systemd
Version: 241-7~deb10u5
Severity: important
Tags: patch upstream
User: de...@kali.org
Usertags: origin-kali
Control: fixed -1 systemd/244.1-1
We are running dist-upgrade tests within systemd-nspawn containers
and since we upgraded to buster, our i386 tests, running on an amd64
8 matches
Mail list logo