[Bug 2089830] Re: [SRU] Make add-nvidia-repositories available in jammy and noble

2025-02-27 Thread Tomáš Virtus
Hello everyone and thank you very much for detailed feedback. I am going to purse the path you recommended, that is, a separate packages for keyrings and APT configuration. It definitely makes more sense than this script. What should we do with the package in Plucky though? -- You received this

[Bug 2089830] Re: [SRU] Make add-nvidia-repositories available in jammy and noble

2025-02-19 Thread Tomáš Virtus
Hello Timo. I've performed the verification on jammy and noble by installing the package from proposed, then checking whether the package cuda-toolkit has NVIDIA maintainers, and then checking that there is a NVIDIA repository with policy 400. -- You received this bug notification because you are

[Bug 2089830] Re: [SRU] Make add-nvidia-repositories available in jammy and noble

2025-02-19 Thread Tomáš Virtus
** Tags removed: verification-needed-jammy verification-needed-noble ** Tags added: verification-done verification-done-jammy verification-done-noble ** Tags removed: verification-done ** Attachment added: "Script to preform verification" https://bugs.launchpad.net/ubuntu/+source/add-nvidia-r

[Bug 2089830] Re: [SRU] Make add-nvidia-repositories available in jammy and noble

2025-02-19 Thread Tomáš Virtus
** Attachment added: "Verification output" https://bugs.launchpad.net/ubuntu/+source/add-nvidia-repositories/+bug/2089830/+attachment/5858921/+files/add-nvidia-repositories-sru-verification -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to U

[Bug 2089830] Re: [SRU] Make add-nvidia-repositories available in jammy and noble

2024-11-28 Thread Tomáš Virtus
** Description changed: [ Impact ]  * add-nvidia-repositories is a convenience tool for enabling NVIDIA repositories. It's targeted primarily to users who need to use NVIDIA CUDA and other libraries for artificial intelligence / machine learning / GPU compute tasks. It is our understa

[Bug 2089830] [NEW] [SRU] Make add-nvidia-repositories available in jammy and noble

2024-11-28 Thread Tomáš Virtus
Public bug reported: [ Impact ]  * add-nvidia-repositories is a convenience tool for enabling NVIDIA repositories. It's targeted primarily to users who need to use NVIDIA CUDA and other libraries for artificial intelligence / machine learning / GPU compute tasks. It is our understanding that majo

[Bug 2089579] [NEW] [needs-packaging] add-nvidia-repositories

2024-11-25 Thread Tomáš Virtus
Public bug reported: Request for package: add-nvidia-repositories PPA: https://launchpad.net/~virtustom/+archive/ubuntu/add-nvidia-repositories Source (native): https://code.launchpad.net/~cloud-images/cloud-images/+git/add-nvidia-repositories add-nvidia-repositories provides a script that slig

[Bug 2074204] Re: AppArmor profiles missing for jammy and 6.8 kernel

2024-07-26 Thread Tomáš Virtus
** Description changed: A CPC test build of a jammy image with 6.8 edge kernel revealed that AppArmor profiles are missing for 6.8 kernel in livecd-rootfs, leading to fall back to generic AppArmor profiles which don't contain configuration for io_uring. This leads to `snap debug seeding` o

[Bug 2074204] [NEW] AppArmor profiles missing for jammy and 6.8 kernel

2024-07-26 Thread Tomáš Virtus
Public bug reported: A CPC test build of a jammy image with 6.8 edge kernel revealed that AppArmor profiles are missing for 6.8 kernel in livecd-rootfs, leading to fall back to generic AppArmor profiles which don't contain configuration for io_uring. This leads to `snap debug seeding` output non-e

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-05-17 Thread Tomáš Virtus
Thanks Neil, I'll let you handle the upstream. I think what you have in the MP is fine. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2040483 Title: AppArmor denies crun sending signals to container

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-05-16 Thread Tomáš Virtus
Sorry, I missed the conmon-podman denial. Would you mind making a PR to the upstream with your changes with issue you posted linked? I think Lucas will not have time until end of week. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. ht

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-05-16 Thread Tomáš Virtus
Also, thanks for linking the podman issue. I'll try to merge patch upstream similar to moby and containerd. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2040483 Title: AppArmor denies crun sending

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-05-16 Thread Tomáš Virtus
@neil-aldur, did you forget to attach the debdiff? By restricting the signal set you also restrict what $SIG you can put to "podman kill --signal $SIG". I did not realize that there's a podman reference profile as well, but since podman doesn't try to kill the container by itself, I wonder if it

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-05-15 Thread Tomáš Virtus
@lucaskanashiro: This patch is for golang-github-containers-common source package. This source package produces golang-github-containers- common-dev binary package, which is just source code on filesystem. But podman binary package, which is produced from libpod source package, has golang-github-co

[Bug 2063099] Re: Stopping container signal blocked by AppArmor on Ubuntu

2024-05-13 Thread Tomáš Virtus
@lucaskanashiro, I think you are trying top stop the container too soon after it's created. The container receives SIGTERM from docker before is sets up signal handlers, and because it's PID 1, the signal is ignored. Runc then kills it with SIGKILL after 10s. Try with sleep: root@cloudimg:~# tim

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-04-29 Thread Tomáš Virtus
** Description changed: [ Impact ]  * On mantic and noble, when run as root, podman cannot stop any container running in background because crun is being run with a new profile introduced in AppArmor v4.0.0 that doesn't have corresponding signal receive rule container's profile.

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-04-29 Thread Tomáš Virtus
** Description changed: [ Impact ] - * On mantic and noble, when run as root, podman cannot stop any +  * On mantic and noble, when run as root, podman cannot stop any container running in background because crun is being run with a new profile introduced in AppArmor v4.0.0 that doesn't

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-04-28 Thread Tomáš Virtus
** Description changed: - Mantic's system podman containers are completely broken due to bug - 2040082. However, after fixing that (rebuilding with the patch, or a - *shht don't try this at home* hack [1]), the AppArmor policy still - causes bugs: + [ Impact ] + + * On mantic and noble, when run

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-04-28 Thread Tomáš Virtus
** Merge proposal linked: https://code.launchpad.net/~virtustom/ubuntu/+source/golang-github-containers-common/+git/golang-github-containers-common/+merge/465117 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpa

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-04-28 Thread Tomáš Virtus
** Also affects: golang-github-containers-common (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2040483 Title: AppArmor denies crun sending signal

[Bug 2063099] Re: Stopping container signal blocked by AppArmor on Ubuntu

2024-04-24 Thread Tomáš Virtus
I'll copy the workaround I mentioned in #2039294 here: As a temporary workaround, put the file I have attached to /etc/apparmor.d/docker-default and load it with "apparmor_parser -Kr /etc/apparmor.d/docker-default". It will make dockerd skip loading its builtin profile as docker-default. It will a

[Bug 2063099] Re: Stopping container signal blocked by AppArmor on Ubuntu

2024-04-24 Thread Tomáš Virtus
There's a fix proposed to upstream: https://github.com/moby/moby/pull/47749 The commit message describes the cause. These bugs have the same cause: - https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2039294 - https://bugs.launchpad.net/ubuntu/+source/libpod/+bug/2040483 The latter doesn'

[Bug 2040483] Re: AppArmor denies crun sending signals to containers (stop, kill)

2024-04-23 Thread Tomáš Virtus
There's a similar issue with runc (and containerd and docker) reported here https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2039294 I've opened PRs with a fix upstream: - https://github.com/containerd/containerd/pull/10123 - https://github.com/moby/moby/pull/47749 I think I'll need to wor

[Bug 2039294] Re: apparmor docker

2024-04-23 Thread Tomáš Virtus
Forgot to attach the profile. Attached here. ** Attachment added: "docker-default" https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2039294/+attachment/5769855/+files/docker-default -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to U

[Bug 2039294] Re: apparmor docker

2024-04-23 Thread Tomáš Virtus
As a temporary workaround, put the file I have attached to /etc/apparmor.d/docker-default and load it with "apparmor_parser -Kr /etc/apparmor.d/docker-default". This will make dockerd skip loading its builtin profile and use this one instead. The only difference between the builtin one and this one

[Bug 1977710] [NEW] /etc/adduser.conf.dpkg-save created by postinst since 3.121ubuntu1

2022-06-06 Thread Tomáš Virtus
Public bug reported: Since version 3.121ubuntu1 adduser's postinst script creates /etc/adduser.conf.dpkg-save file on debootstrap's root filesystem, that is, even when /etc/adduser.conf doesn't exist prior to package installation. Because of the change below the postinst script changes packaged /

[Bug 1406483] Re: Possible to install (and trigger postinstall) of ca-certificates-java before Java has been installed

2021-12-02 Thread Tomáš Virtus
Understood. Submitted new one: https://bugs.launchpad.net/ubuntu/+source/ca-certificates- java/+bug/1953121 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1406483 Title: Possible to install (and trig

[Bug 1953121] [NEW] jks-keystore hook fails with "java: not found" during package install

2021-12-02 Thread Tomáš Virtus
Public bug reported: This is a fresh report of https://bugs.launchpad.net/ubuntu/+source/ca- certificates-java/+bug/1406483 with same steps to reproduce. Currently it can be reproduced in both impish and jammy. ca-certificates-java installs /etc/ca-certificates/update.d/jks-keystore that's being

[Bug 1406483] Re: Possible to install (and trigger postinstall) of ca-certificates-java before Java has been installed

2021-11-30 Thread Tomáš Virtus
The fix synced from Debian checks for JDK (or JRE) directories under /usr/lib/jvm and updates PATH with first found JRE. But it only checks hardcoded paths with java version up to Java 9. On Impish, ca- certificates-java package version is 20190909 and it is checks up to java version 11. So when in

[Bug 1838070] Re: Unable to add dyndbg to command line

2021-11-23 Thread Tomáš Virtus
This is not correct. The advice applies only to enabling debug messages in modules, but how does one enable debug messages kernel image? For example one could want to see debug messages from kernel/module.c which is not in any module, and the kernel parameter would be: dyndbg="file kernel/module

[Bug 1943049] Re: Docker ubuntu:impish: Problem executing scripts DPkg::Post-Invoke 'rm -f /var/cache/apt/archives/*.deb /var/cache/apt/archives/partial/*.deb /var/cache/apt/*.bin || true'

2021-10-07 Thread Tomáš Virtus
Successfully tested docker.io on hirsute. With docker.io 20.10.7-0ubuntu1~21.04.2 from hirsute: $ sudo docker run ubuntu:impish apt-get remove - --allow-remove-essential e2fsprogs (Reading database ... 4386 files and directories currently installed.) Removing e2fsprogs (1.46.3-1ubuntu3) ...