Repro:
$ cd ~/wireshark-3.6.2/obj-s390x-linux-gnu
$ /usr/bin/cmake -E env PYTHONIOENCODING=UTF-8 /usr/bin/python3.10 
../test/test.py --verbose --program-path 
/root/wireshark-3.6.2/obj-s390x-linux-gnu/run suite_decryption

This will trigger the same fails, but run just this test.

And to pick just one sub-case from that like:
$ /usr/bin/cmake -E env PYTHONIOENCODING=UTF-8 /usr/bin/python3.10 
../test/test.py --verbose --program-path 
/root/wireshark-3.6.2/obj-s390x-linux-gnu/run 
suite_decryption.case_decrypt_80211.test_80211_wpa2_ft_eap

From here you can modify the python code and run the test programs as
you need to find what is wrong.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961901

Title:
  3.6.2-1 FTBFS in Jammy on x86/s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lto-disabled-list/+bug/1961901/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to