Public bug reported:
A CPC test build of a jammy image with 6.8 edge kernel revealed that
AppArmor profiles are missing for 6.8 kernel in livecd-rootfs, leading
to fall back to generic AppArmor profiles which don't contain
configuration for io_uring. This leads to `snap debug seeding` output
non-e
** Description changed:
A CPC test build of a jammy image with 6.8 edge kernel revealed that
AppArmor profiles are missing for 6.8 kernel in livecd-rootfs, leading
to fall back to generic AppArmor profiles which don't contain
configuration for io_uring. This leads to `snap debug seeding` o
As a temporary workaround, put the file I have attached to
/etc/apparmor.d/docker-default and load it with "apparmor_parser -Kr
/etc/apparmor.d/docker-default". This will make dockerd skip loading its
builtin profile and use this one instead. The only difference between
the builtin one and this one
Forgot to attach the profile. Attached here.
** Attachment added: "docker-default"
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2039294/+attachment/5769855/+files/docker-default
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
There's a similar issue with runc (and containerd and docker) reported
here https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2039294
I've opened PRs with a fix upstream:
- https://github.com/containerd/containerd/pull/10123
- https://github.com/moby/moby/pull/47749
I think I'll need to wor
There's a fix proposed to upstream: https://github.com/moby/moby/pull/47749
The commit message describes the cause.
These bugs have the same cause:
- https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2039294
- https://bugs.launchpad.net/ubuntu/+source/libpod/+bug/2040483
The latter doesn'
I'll copy the workaround I mentioned in #2039294 here:
As a temporary workaround, put the file I have attached to
/etc/apparmor.d/docker-default and load it with "apparmor_parser -Kr
/etc/apparmor.d/docker-default". It will make dockerd skip loading its
builtin profile as docker-default. It will a
** Also affects: golang-github-containers-common (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2040483
Title:
AppArmor denies crun sending signal
** Merge proposal linked:
https://code.launchpad.net/~virtustom/ubuntu/+source/golang-github-containers-common/+git/golang-github-containers-common/+merge/465117
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
** Description changed:
- Mantic's system podman containers are completely broken due to bug
- 2040082. However, after fixing that (rebuilding with the patch, or a
- *shht don't try this at home* hack [1]), the AppArmor policy still
- causes bugs:
+ [ Impact ]
+
+ * On mantic and noble, when run
** Description changed:
[ Impact ]
- * On mantic and noble, when run as root, podman cannot stop any
+ * On mantic and noble, when run as root, podman cannot stop any
container running in background because crun is being run with a new
profile introduced in AppArmor v4.0.0 that doesn't
** Description changed:
[ Impact ]
* On mantic and noble, when run as root, podman cannot stop any
container running in background because crun is being run with a new
profile introduced in AppArmor v4.0.0 that doesn't have corresponding
signal receive rule container's profile.
This is not correct. The advice applies only to enabling debug messages
in modules, but how does one enable debug messages kernel image? For
example one could want to see debug messages from kernel/module.c which
is not in any module, and the kernel parameter would be:
dyndbg="file kernel/module
The fix synced from Debian checks for JDK (or JRE) directories under
/usr/lib/jvm and updates PATH with first found JRE. But it only checks
hardcoded paths with java version up to Java 9. On Impish, ca-
certificates-java package version is 20190909 and it is checks up to
java version 11. So when in
Public bug reported:
This is a fresh report of https://bugs.launchpad.net/ubuntu/+source/ca-
certificates-java/+bug/1406483 with same steps to reproduce. Currently
it can be reproduced in both impish and jammy.
ca-certificates-java installs /etc/ca-certificates/update.d/jks-keystore
that's being
Understood. Submitted new one:
https://bugs.launchpad.net/ubuntu/+source/ca-certificates-
java/+bug/1953121
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1406483
Title:
Possible to install (and trig
Public bug reported:
Since version 3.121ubuntu1 adduser's postinst script creates
/etc/adduser.conf.dpkg-save file on debootstrap's root filesystem, that
is, even when /etc/adduser.conf doesn't exist prior to package
installation.
Because of the change below the postinst script changes packaged
/
@lucaskanashiro,
I think you are trying top stop the container too soon after it's
created. The container receives SIGTERM from docker before is sets up
signal handlers, and because it's PID 1, the signal is ignored. Runc
then kills it with SIGKILL after 10s.
Try with sleep:
root@cloudimg:~# tim
@lucaskanashiro: This patch is for golang-github-containers-common
source package. This source package produces golang-github-containers-
common-dev binary package, which is just source code on filesystem. But
podman binary package, which is produced from libpod source package, has
golang-github-co
@neil-aldur, did you forget to attach the debdiff?
By restricting the signal set you also restrict what $SIG you can put to
"podman kill --signal $SIG".
I did not realize that there's a podman reference profile as well, but
since podman doesn't try to kill the container by itself, I wonder if it
Also, thanks for linking the podman issue. I'll try to merge patch
upstream similar to moby and containerd.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2040483
Title:
AppArmor denies crun sending
Sorry, I missed the conmon-podman denial. Would you mind making a PR to
the upstream with your changes with issue you posted linked? I think
Lucas will not have time until end of week.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
Thanks Neil, I'll let you handle the upstream. I think what you have in
the MP is fine.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2040483
Title:
AppArmor denies crun sending signals to container
Successfully tested docker.io on hirsute.
With docker.io 20.10.7-0ubuntu1~21.04.2 from hirsute:
$ sudo docker run ubuntu:impish apt-get remove - --allow-remove-essential
e2fsprogs
(Reading database ... 4386 files and directories currently installed.)
Removing e2fsprogs (1.46.3-1ubuntu3) ...
Public bug reported:
Request for package: add-nvidia-repositories
PPA: https://launchpad.net/~virtustom/+archive/ubuntu/add-nvidia-repositories
Source (native):
https://code.launchpad.net/~cloud-images/cloud-images/+git/add-nvidia-repositories
add-nvidia-repositories provides a script that slig
** Description changed:
[ Impact ]
* add-nvidia-repositories is a convenience tool for enabling NVIDIA
repositories. It's targeted primarily to users who need to use NVIDIA
CUDA and other libraries for artificial intelligence / machine learning
/ GPU compute tasks. It is our understa
Public bug reported:
[ Impact ]
* add-nvidia-repositories is a convenience tool for enabling NVIDIA
repositories. It's targeted primarily to users who need to use NVIDIA
CUDA and other libraries for artificial intelligence / machine learning
/ GPU compute tasks. It is our understanding that majo
** Tags removed: verification-needed-jammy verification-needed-noble
** Tags added: verification-done verification-done-jammy verification-done-noble
** Tags removed: verification-done
** Attachment added: "Script to preform verification"
https://bugs.launchpad.net/ubuntu/+source/add-nvidia-r
** Attachment added: "Verification output"
https://bugs.launchpad.net/ubuntu/+source/add-nvidia-repositories/+bug/2089830/+attachment/5858921/+files/add-nvidia-repositories-sru-verification
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
Hello Timo. I've performed the verification on jammy and noble by
installing the package from proposed, then checking whether the package
cuda-toolkit has NVIDIA maintainers, and then checking that there is a
NVIDIA repository with policy 400.
--
You received this bug notification because you are
Hello everyone and thank you very much for detailed feedback. I am going
to purse the path you recommended, that is, a separate packages for
keyrings and APT configuration. It definitely makes more sense than
this script.
What should we do with the package in Plucky though?
--
You received this
I talked with Andreas and Seth and we reached a conclusion that if I fix
all the reported bugs and maintaining and verify checksums, it'd be
worthwhile to have it in the archive. But I'm afraid it won't happen
before the beta freeze. In which case, I think it should be removed for
plucky.
--
You
32 matches
Mail list logo