Arm64: $ grep NR_open $(dpkg -L linux-libc-dev | xargs) 2>/dev/null /usr/include/asm-generic/unistd.h:#define __NR_openat 56 /usr/include/asm-generic/unistd.h:__SYSCALL(__NR_openat, sys_openat) /usr/include/asm-generic/unistd.h:#define __NR_open_by_handle_at 265 /usr/include/asm-generic/unistd.h:__SYSCALL(__NR_open_by_handle_at, sys_open_by_handle_at) /usr/include/asm-generic/unistd.h:#define __NR_open_tree 428 /usr/include/asm-generic/unistd.h:__SYSCALL(__NR_open_tree, sys_open_tree)
Amd64: $ grep NR_open $(dpkg -L linux-libc-dev | xargs) 2>/dev/null /usr/include/asm-generic/unistd.h:#define __NR_openat 56 /usr/include/asm-generic/unistd.h:__SYSCALL(__NR_openat, sys_openat) /usr/include/asm-generic/unistd.h:#define __NR_open_by_handle_at 265 /usr/include/asm-generic/unistd.h:__SYSCALL(__NR_open_by_handle_at, sys_open_by_handle_at) /usr/include/asm-generic/unistd.h:#define __NR_open_tree 428 /usr/include/asm-generic/unistd.h:__SYSCALL(__NR_open_tree, sys_open_tree) /usr/include/x86_64-linux-gnu/asm/unistd_32.h:#define __NR_open 5 /usr/include/x86_64-linux-gnu/asm/unistd_32.h:#define __NR_openat 295 /usr/include/x86_64-linux-gnu/asm/unistd_32.h:#define __NR_open_by_handle_at 342 /usr/include/x86_64-linux-gnu/asm/unistd_32.h:#define __NR_open_tree 428 /usr/include/x86_64-linux-gnu/asm/unistd_64.h:#define __NR_open 2 /usr/include/x86_64-linux-gnu/asm/unistd_64.h:#define __NR_openat 257 /usr/include/x86_64-linux-gnu/asm/unistd_64.h:#define __NR_open_by_handle_at 304 /usr/include/x86_64-linux-gnu/asm/unistd_64.h:#define __NR_open_tree 428 /usr/include/x86_64-linux-gnu/asm/unistd_x32.h:#define __NR_open (__X32_SYSCALL_BIT + 2) /usr/include/x86_64-linux-gnu/asm/unistd_x32.h:#define __NR_openat (__X32_SYSCALL_BIT + 257) /usr/include/x86_64-linux-gnu/asm/unistd_x32.h:#define __NR_open_by_handle_at (__X32_SYSCALL_BIT + 304) /usr/include/x86_64-linux-gnu/asm/unistd_x32.h:#define __NR_open_tree (__X32_SYSCALL_BIT + 428) So this really might be different on arm, not sure what to do about it yet. Might be related to https://github.com/seccomp/libseccomp/commit/0db8babb27eed3ce202d54ec1cd99f23367631cf -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1849785 Title: FTBFS on i386/ppc64/s390x (Eoan+Focal) To manage notifications about this bug go to: https://bugs.launchpad.net/libseccomp/+bug/1849785/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
